text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
apple–intel architecture apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors rather powerpc motorola 68000 68k series processors used predecessors change architecture change firmware became necessary apple selected intel-designed extensible firmware interface efi comparable component open firmware used powerpc architectures firmware-based replacement pc bios intel change processor architecture x86 macs gained ability boot x86-native operating systems microsoft windows intel vt-x brought near-native virtualization mac os x host os apple–intel architecture mactel unofficial name used apple macintosh personal computers developed manufactured apple inc. use intel x86 processors name implies refers changes architecture earlier powerpc apple 68k preceding processors apple uses subset standard pc architecture provides support mac os x support operating systems hardware firmware components must supported run operating system apple-intel hardware include extensible firmware interface change architecture change firmware became necessary extensible firmware interface efi firmware-based replacement pc bios intel designed intel chosen apple replace open firmware used powerpc architectures since many operating systems windows xp many versions windows vista incompatible efi apple released firmware upgrade compatibility support module provides subset traditional bios support boot camp product guid partition table gpt standard layout partition table physical hard disk part extensible firmware interface efi standard proposed intel substitute earlier pc bios gpt replaces master boot record mbr used bios intel macs boot two ways directly via efi legacy bios compatibility mode multibooting holding option gives choice bootable devices refind bootloader commonly used added configurability standard live usbs used intel macs efi firmware recognize boot usb drives efi mode–when firmware switches bios mode longer recognizes usb drives due lack bios-mode usb driver many operating systems earlier versions windows linux booted bios mode easily booted perform better booted bios mode thus usb booting intel-based macs time largely limited mac os x easily booted via efi april 5 2006 apple made available download public beta version boot camp collection technologies allows users intel-based macs boot windows xp service pack 2 first non-beta version boot camp included mac os x v10.5 leopard introduction boot camp provides hardware drivers windows xp drivers xp difficult find linux also booted boot camp intel-based mac computers use similar hardware pcs manufacturers ship microsoft windows linux operating systems particular cpus chipsets gpus entirely compatible however apple computers also include custom hardware design choices found competing systems differences pose obstacles running macos non-apple hardware booting alternative operating systems mac computers – apple provides drivers custom hardware macos microsoft windows part boot camp drivers operating systems linux need written third parties usually volunteer free software enthusiasts digital rights management apple–intel architecture accomplished via dont steal mac os x.kext sometimes referred dsmos dsmosx file present intel-capable versions mac os x operating system presence enforces form digital rights management preventing mac os x installed stock pcs name kext reference mac os x license conditions allow installation apple hardware according apple anything else stealing mac os x kext located /system/library/extensions volume containing operating system extension contains kernel function called performs aes decryption apple-protected programs system lacking proper key able run apple-restricted binaries include initial announcement first intel-based mac hardware configurations reporting trusted platform module among system components believed tpm responsible handling drm protection later proven case keys actually contained within system management controller component exclusive apple computers easily retrieved two 32-byte keys form human-readable ascii string copyrighted apple establishing another possible line legal defence prospective clone makers intel core duo later including current i5 i7 xeon processors found intel macs support intel vt-x allowing high performance near native virtualization gives user ability run switch two operating systems simultaneously rather dual-boot run one operating system time first software take advantage technology parallels desktop mac released june 2006 parallels virtualization products allow users use installations windows xp later virtualized mode running os x. virtualbox virtualization software oracle corporation released january 2007 available mac os x well host operating systems supports intel vt-x run multiple guest operating systems including windows xp later available free charge either proprietary license gpl free software license used default running docker images operating systems vmware offers product similar parallels called fusion released august 2007 vmware virtualization product also allows users use installations windows xp later os x regardless product used inherent limitations performance penalties using virtualized guest os versus native mac os booting alternative os solution offered via boot camp
|
Computer architecture
|
twister software twister free software experimental peer-to-peer microblogging completely decentralized means one able shut single point attack system uses end-to-end encryption safeguard communications based bittorrent bitcoin-like protocols considered distributed twitter clone twister twitter-like microblogging platform utilizes blockchain technology bitcoin file exchange method bittorrent based p2p technologies twister experimental software alpha phase implemented distributed file sharing system user registration authentication provided bitcoin-like network completely distributed depend central authority distribution posts uses kademlia distributed hash table dht network bittorrent-like swarms provided libtorrent included versions bitcoin libtorrent highly patched intentionally interoperable already existing networks miguel freitas aiming build censor-resistant public posting platform began development twister july 2013 address concerns free speech privacy building work bitcoin bittorrent able core working october 2013 lucas leal hired create html css user interface miguel writing required javascript code 2,500 user accounts registered first six days operation completely decentralized network one capable incapacitating twister since unique point attack system twister uses end-to-end encryption protect communications furthermore twister designed prevent users knowing gsm localization ip address following users publish public messages microblogging platforms send direct messages private messages users protected unsolicited access brazilian computer engineer programmer miguel freitas started developing new social network learning massive spy programs usa national security agency nsa revealed nsa whistle-blower edward snowden started worry accessibility amount information control single company american jurisdiction according freitas twitter social network helped promote democracy organize protests magazine 'wired claims believes massive surveillance likes nsa makes dangerous provide personal information social networks currently exist reason decided build new system based privacy-preserving technology freitas used believe future social networks would based decentralized protocols central point control learning existing social networks already massively compromised state began take action development alternative service based closely twitter miguel developer lucas leal considered alpha version application android linux os x versions windows iphone ’ planned since open source free migrate application operating systems even though project moment alpha phase brian armstrong co-founder coinbase believes great example open protocol bitcoin used diverse purposes twister decentralized system instead networks kind like pump.io identi.ca statusnet gnu social diaspora n't require use server ’ require trust third one order use works peer-to-peer program achieved bitcoin protocol net used cryptocurrency basically protocol handles register users accesses way miners verify transactions bitcoin network secure one makes double spent twister network verifies users names messages belonging specific user really user messages driven bittorrent protocol allows keeping distribution system great number messages along network fast efficient way also allows users receive notifications almost instantly new messages alerts – without necessity central server since twister uses end-to-end encryption intercepted private direct messages read person apart addressee code used elliptic curve cryptography different one used nsa used bitcoin thought give security level similar rsa code 3072 bits data ’ stored anywhere ’ used cut consequence lose entry password impossible access private messages peer-to-peer system ’ central server publications may compiled see prism freitas explains system designed way users ’ know online ip address messages read information ’ registered anywhere despite freitas warns users anonymity may total depending circumstances twister developed linux environment freitas migrated successfully system android os x another long-term interesting objective would moving whole cryptographic code implementation interface user browser way users would capable accessing twister client platform use choosing third server still maintaining security private passwords times first twister prototype intended reproducing basic characteristics microblogging platform including private messages require addressee follower speaker common requisite existing platforms characteristics difficult implement completely decentralized system requiring effort includes arbitrary register words posts recompilation hashtaghs find main tendencies twister uses parameters elliptic curves bitcoin secp256k1.this ’ curve usually implicated nsa called sec256r1 256 bits public-key cryptography comprometido ecc must proportionate security similar key rsa 3072 bits least said experts usually stimulate people try break security systems something everyone desires money millions usd table coded keys secp256k1 bitcoin direct application messages encoding based example code published internet ladar levison lavabit known ladar took service denied cooperating us government allows control clients twister platform microblogging peer-to-peer means communication established computers without going central node would one recorded information company behind provides server machinery used detect case conversations people run node delete posts dht block account due fact messages sent directly user another without going central node also encrypted way – beginning end encrypted exit decrypted arrival – travel private way web black-box besides ip directions also protected application ip direction machine go internet recorded moment avoiding followed entity company according freitas guarantees anonymity mean ip ’ detected isp internet service provider content message ’ visible except spy knows decrypt breaking algorithms order 100 anonymous would use browser masks ip tor another one similar protecting spies
|
Distributed computing architecture
|
scsi pass interface scsi pass interface spti application programming interface api accessing scsi device developed microsoft corporation part windows nt family operating systems storage port drivers provide interface win32 applications send scsi command descriptor block cdb messages scsi devices interfaces ioctl_scsi_pass_through ioctl_scsi_pass_through_direct applications build pass-through request send device using ioctl spti accessible windows software using deviceiocontrol windows api imgburn offers spti method accessing optical disc drives
|
Operating systems
|
usix usix discontinued unix-like computer operating system created system six inc. russia ineum institut elektronnykh upravlyaushikh mashin institute electronic control machines one leading software r organizations soviet union collapse funding system six operating system development closed
|
Operating systems
|
sql server management studio sql server management studio ssms software application first launched microsoft sql server 2005 used configuring managing administering components within microsoft sql server successor enterprise manager sql 2000 tool includes script editors graphical tools work objects features server central feature ssms object explorer allows user browse select act upon objects within server also shipped separate express edition could freely downloaded however recent versions ssms fully capable connecting manage sql server express instance microsoft also incorporated backwards compatibility older versions sql server thus allowing newer version ssms connect older versions sql server instances also comes microsoft sql server express 2012 users download separately starting version 11 application based visual studio 2010 shell using wpf user interface versions 18 based visual studio 2017 isolated shell june 2015 microsoft announced intention release future versions ssms independently sql server database engine releases
|
Databases
|
windows master control panel shortcut windows master control panel shortcut labeled tasks also called windows god mode bloggers tasks folder least one microsoft developer short-cut access various control settings windows vista later operating systems including windows 10 creating folder certain name users access operating system control panels within single folder hack published outside microsoft documentation 2007 gained popularity name god mode used bloggers variations method access different settings also called “ god mode ” folders functionality discovered named master control panel god mode designed base folder searching control panel options using new start menu search function allows users type want e. g. “ change screen resolution ” get right control panel options search result shortcut implemented creating folder extension codice_1 godmode original folder name used feature publicised name used functionality achieved creating standard windows shortcut path codice_2 creating codice_3 file folder includes extension clsid class id general method creating shortcuts documented microsoft though microsoft publicized specific guid codice_4 master control panel third parties published method since least 2007 modest title “ registry hack vista control panel setting tasks one place ” numerous blogs tweets subject appeared december 2009 january 2010 “ windows 7 godmode ” many sites repeating information available elsewhere general folder shortcut format codice_5 codice_6 valid class id clsid system.applicationname entry windows registry technique documented microsoft “ using file system folders junction points ” clsid codice_7 particular interest associated widget allows access many windows settings microsoft documents guids regular control panel applets msdn cnet article attributed many guid shortcuts head microsoft windows division steven sinofsky pre-java 8 applications using swing windows look-and-feel including compiled excelsior jet known crash windows 10 creators update god folder exists
|
Operating systems
|
mimic simulator mimic simulator product suite gambit communications consisting simulation software network systems management space mimic simulator suite several components related simulation managed networks data centers purposes software development software testing training sales marketing network management applications see mimic snmp simulator solves classical simulation problem network management operations support system software typically manages large networks traditionally order set networks purposes physical equipment separately purchased assembled laboratories reduce expense network simulated e.g see principle behind snmp simulation snmp protocol interface simulated snmp requests carry data values mib objects shaped simulator thus representing device snmp interface contrast network simulation entire network modeled within computer type empirical simulation visible network one communicate simulator network concept extended protocols modern management software typically uses multiple protocols manage networks simulator thus integrate required protocols present authentic instrumentation mimic ios simulator allows simulating cli protocol encountered cisco ios junos tl/1 low-end mimic virtual lab products used training cisco ccna mimic netflow simulator creates many custom netflow exporters mimic sflow simulator sflow mimic ipmi simulator simulates ipmi rmcp via lan interface high-end servers mimic web simulator handles http soap xml wsdl wsman redfish interfaces management via web services mimic iot simulator creates large iot environments based standard protocols mqtt coap
|
Internet protocols
|
tenten corpus family tenten corpus family also called tenten corpora set comparable web text corpora i.e collections texts crawled world wide web processed match standards corpora made available sketch engine corpus manager tenten corpora 35 languages target size 10 billion 10 words per language gave rise corpus family name creation tenten corpora data crawled world wide web processed natural language processing tools developed natural language processing centre faculty informatics masaryk university brno czech republic lexical computing company developer sketch engine corpus linguistics text corpus large structured collection texts electronically stored processed used hypothesis testing languages validating linguistic rules frequency distribution words n-grams within languages electronically processed corpora provide fast search text processing procedures tokenization part-of-speech tagging word-sense disambiguation enrich corpus texts detailed linguistic information enables narrow search particular parts speech word sequences specific part corpus first text corpora created 1960s 1-million-word brown corpus american english time many corpora produced british national corpus lob corpus work begun also corpora larger sizes covering languages english development linked emergence corpus creation tools help achieve larger size wider coverage cleaner data etc procedure tenten corpora produced based creators earlier research preparing web corpora subsequent processing thereof beginning huge amount text data downloaded world wide web dedicated spiderling web crawler later stage texts undergo cleaning consists removing non-textual material navigation links headers footers html source code web pages justext tool full solid sentences preserved eventually onion tool applied remove duplicate text portions corpus naturally occur world wide web due practices quoting citing copying etc tenten corpora follow specific metadata structure common metadata contained structural attributes relate individual documents paragraphs corpus tenten corpora feature additional specific attributes following corpora accessed sketch engine october 2018
|
Computational linguistics
|
tresorit tresorit online cloud storage service based switzerland hungary emphasizes enhanced security data encryption businesses individuals/freelancers business version offers 1tb storage space per user solo version offers 2tb one user extra security features drm granular access levels functions aim create safer collaborative environment tresorit likened high-security alternative dropbox tresorit service accessible client desktop software web-based application mobile apps currently software available windows macos android windows phone 8 ios linux tresorit founded 2011 hungarian programmers istvan lam remains ceo szilveszter szebeni currently cio gyorgy szilagyi cpo company tresorit officially launched client-side encrypted cloud storage service emerging stealth beta april 2014 august 2015 wuala owned lacie seagate pioneer secure cloud storage announced closing service 7 years recommended users choose tresorit secure cloud alternative end 2016 tresorit launched beta software development kit sdk zerokit january 2017 apple sdk project carekit announced option mobile app developers using carekit integrate zerokit enabling zero knowledge user authentication encryption medical health apps tresorit encrypts files using client-side encryption aes-256 uploading files also secured hmac message authentication codes applied sha-512 hashes tresors german vaults encrypted counterparts uploaded directories tresors automatically sync cloud files added removed similar box.com dropbox desktop software main difference tresorit competition tresorit applies aes-256 client-side encryption files still local uploads cloud company claims due end-to-end encryption users share protected files folders others work together keeping documents synced secure every step process additional layers security core privacy feature service encryption key never leaves user using zero-knowledge encryption protocols tresorit possession users ’ authentication data content files accessed servers delivered authorities upon request 2013 2014 tresorit hosted hacking contest offering 10,000 anyone hacked data encryption methods gain access servers months reward increased 25,000 later 50,000 challenging experts institutions like harvard stanford mit contest ran 468 days according company nobody able break encryption tresorit received number nominations awards up-cloud rewards named one top 5 cloud security solutions 2012 early 2016 forbes listed tresorit cofounder istvan lam among european 30 30 2017 tresorit listed finalist cybersecurity excellence awards category encryption
|
Distributed computing architecture
|
archinform archinform online database international architecture originally emerging records interesting building projects architecture students university karlsruhe germany self-described largest online-database worldwide architects buildings contains plans images buildings built potential forms record architecture 20th century database uses search engine allows particular project found listing architect location key word described librarian calouste gulbenkian foundation one useful reference tools concerning architecture available internet
|
Databases
|
security printing security printing field printing industry deals printing items banknotes cheques passports tamper-evident labels security tapes product authentication stock certificates postage stamps identity cards main goal security printing prevent forgery tampering counterfeiting recently many techniques used protect high-value documents become available commercial printers whether using traditional offset flexographic presses newer digital platforms businesses protecting lesser-value documents transcripts coupons prescription pads incorporating features listed ensure forged alteration data occur undetected number technical methods used security printing industry security printing often done security paper also occur plastic materials substrate banknotes made paper almost always cotton fibres strength durability cases linen speciality coloured forensic fibres added give paper added individuality protect counterfeiting countries including canada nigeria romania mexico new zealand israel singapore malaysia england australia produce polymer plastic banknotes improve longevity may include transparent windows 10 millimeters diameter security feature areas covered opacifying layer paper substrate may also include windows based laser-cut holes covered security foil holografic elements makes difficult reproduce using common counterfeiting techniques true watermark recognizable image pattern paper appears lighter darker surrounding paper viewed light behind paper due paper density variations watermark made impressing water coated metal stamp dandy roll onto paper manufacturing watermarks first introduced bologna italy 1282 well use security printing also used papermakers identify product proofing authenticity thinner part watermark shine brighter light source background darker dark background watermark proven anti-counterfeit technology counterfeits simulating appearance printing pattern printed white ink simulated watermarks different reflectance base paper seen angle ink white photocopied scanned similar effect achieved iriodin varnish creates reflections certain viewing angles transparent otherwise watermarks sometimes simulated polymer currency printing according pattern little anti-counterfeiting effect example australian dollar coat arms watermarked plastic bills diffractive optical element doe within transparent window create comparable effect requires laser beam verifcation intaglio printing technique image incised surface normally copper zinc plates used incisions created etching engraving image one may also use mezzotint printing surface covered ink rubbed vigorously tarlatan cloth newspaper remove ink surface leaving incisions damp piece paper placed top plate paper run printing press pressure transfers ink paper sharp printing obtained intaglio process hard imitate means intaglio also allows creation latent images visible document viewed shallow angle guilloché ornamental pattern formed two curved bands interlace repeat circular design made geometric lathe involves use extremely small text often used currency bank checks text generally small enough indiscernible naked eye cheques example use microprint signature line optically variable ink ovi made mica colored magnetizable inks prepared including chromatic pigments high color strength magnetic pigments ’ strong inherent color generally reduces spectrum achievable shades generally pigments used high concentrations ensure sufficient magnetizable material applied even thin offset coats magnetic pigment best suited colored magnetizable inks due lower blackness homogenous magnetization preferred orientation easily obtained pigment made spherical particles best results achieved remanence coercive field strength low saturating magnetization high pearlescent pigments viewed different angles angle light perceived makes color appear change magnetic fields within particles shift direction hologram may embedded either via hot-stamping foil wherein extremely thin layer micrometers depth bonded paper plastic substrate means hot-melt adhesive called size coat heat metal die may directly embossed holographic paper onto laminate card incorporated custom design pattern logo hologram hot stamping foils become security foils protect credit cards passports bank notes value documents counterfeiting holograms help curtailing forging duplication products hence essential security purposes stamped product removed forged enhancing product time also security perspective stamped hologram superior security device virtually impossible remove substrate metal threads foils simple iridescent features foil color copying foils additional optically variable effects often used two kinds security threads one thin aluminum coated partly de-metalized polyester film thread microprinting embedded security paper banknote passport paper kind security thread single multicolor sewing thread made cotton synthetic fibers mostly uv fluorescent bookbinding passport booklets recent designs security thread enhanced security features holograms three-dimensional effects tilted occasion banknote designers succumb titanic effect excess belief latest technology place much faith particular trick example forgery british banknotes 1990s british banknotes 1990s featured windowed metal strip paper 1 mm wide comes paper surface every 8 mm examined reflected light appears dotted metallic line running across viewed transmitted light metal strip dark solid duplicating thought difficult criminal gang able reproduce quickly used cheap hot-stamping process lay metal strip surface paper printed pattern solid bars using white ink leave expected metal pattern visible trial found forged tens millions pounds ’ worth notes period years speed read computer systems magnetic ink character recognition used extensively banking primarily personal checks ink used magnetic ink character recognition micr technology also used greatly reduce errors automated computerized reading pigment dispersed binder system resin solvent wax compound applied either pressing hot melt carrier film usually polyethylene people believe magnetic ink intended fraud prevention concept yet original intent non-optical technology writing cheque like signatures would interfere reading main magnetic fonts e13-b cmc7 downloadable small fee addition magnetic toner available many printers higher resolution toners sufficient magnetic properties magnetic reading successful without special toner serial numbers help make legitimate documents easier track audit help detect forgeries serial numbers normally check digit verify serial number banknote printing unique serial number provides effective means monitoring verification production volume another method protection create trap numbers within serial number range example system may automatically invalidate numbers range 200-300 e.g 210 205 would invalid system may even take single random numbers within block e.g ending 51 37 48 within 200-300 range would invalid late twentieth century advances computer photocopy technology made possible people without sophisticated training easily copy currency attempt prevent banks sought add filtering features software hardware available public senses features currency locks reproduction material marks one known example system eurion constellation sometimes original document value original signed cheque example value photocopy original prescription script filled photocopy copy-evident technologies provide security hard copy documents helping distinguish original document copy common technology help differentiate originals copies void pantograph void pantographs essentially invisible untrained naked eye original scanned copied layout lines dots dashes reveal word frequently void hence name symbol clearly allows copy identified technology available traditional presses offset flexographic newer digital platforms advantage digital press single pass printer void pantograph variable data printed plain paper copy-evident paper sometimes marketed ‘ security paper ’ pre-printed void pantograph paper usually produced offset flexographic press quality void pantograph usually quite good produced press high resolution small number originals printed cost effective solution however advent digital printer rapidly eroded benefit second technology complements enhances effectiveness void pantograph verification grid technology visible original usually fine lines symbols photocopied lines images disappear inverse reaction void pantograph common examples technology fine lines edge cheque disappear copied coupon symbol shopping cart disappears unauthorized copy made verification grid available either traditional digital presses together void pantograph verification grid complement reactions copying inverse resulting higher degree assurance hard copy document original use color greatly assist prevention forgeries including color document color photocopier must used attempt make copy however use machines also tends enhance effectiveness technologies void pantographs verification grids see copy-evident using two colors background blending together prismatic effect created done either traditional digital press document using technique attempted photocopied scanning re-creation color copier inexact usually resulting banding blotching thereby immediate recognition document copy frequent example prismatic coloring checks combined techniques void pantograph increase difficulty successful counterfeiting carefully created images hidden background picture document images seen without help inexpensive lens specific line screening placed location image rotated image becomes visible document photocopied halo image lost known implementation scrambled indicia halo printed traditional digital presses advantage traditional presses multiple images overlaid location become visible turn lens rotated halo used technique authenticate originality document may used verify critical information within document example value coupon might encoded halo image could verified time redemption similarly seat number sporting event ticket false-positive testing derives name testing requires false positive reaction authenticate document common instance widely available counterfeit detector marker seen many banks stores counterfeit detector markers use chemical interaction substrate usually paper document turning particular color usually marker turns newsprint black leaves currency specially treated areas document clear gold reaction coloring varies depending upon formulation banknotes specially manufactured substrate usually behave differently standard newsprint paper difference counterfeits detected markers false-positive testing also done documents currencies means test authenticity stroke marker symbol word value revealed allow user quickly verify document coupon advanced applications marker creates barcode scanned verification reference data within document resulting higher degree assurance authenticity photocopied documents lack special characteristics substrate easily detectable false-positive testing generally one time test done results remain visible useful part coupon technique suitable id badges example fluorescent dyes react fluorescence ultraviolet light unusual lighting show words patterns pictures may visible invisible normal lighting feature also incorporated many banknotes documents e.g northern ireland nhs prescriptions show picture local '8th wonder giant causeway uv light producers include multi-frequency fluorescence different elements fluoresce specific frequencies light phosphorescence may accompany fluorescence shows after-glow uv light switched banknotes typically printed fine alignment so-called see-through registration window offset printing side note allows note examined feature provides opportunities unambiguously align features note printing difficult imitate accurately enough print shops advent rfid based smart card technology possible insert extremely small rf-active devices printed product enhance document security apparent modern biometric passports rfid chip mirrors printed information biometric passports additionally include data verification individual fingerprint face recognition automated border control gates security ink normal trigger temperature either disappear change colors ink rubbed usually fingertips pressure-sensitive hot stamped labels characterized normal gray colored appearance viewed via special filter polarizer additional normally latent image appears intaglio printing similar effect may achieved viewing banknote slanted angle
|
Computer security
|
national law review national law review american law journal legal news website legal analysis content-aggregating database site offers news coverage analysis recent court decisions regulatory changes legislative actions includes original content content submitted various professionals legal business communities online version national law review started research tool group corporate attorneys looking store classify useful legal analysis news located internet on-line version specializes news analysis following types american law administrative law banking law bankruptcy law civil procedure common law competition law conflicts laws construction law consumer protection contract law copyright law business criminal law cyberlaw election law energy law entertainment law environment law family law financial regulation law health law immigration law insurance law intellectual property law labour law labor law military law municipal law patent law product liability property law securities law statutory law tort law tax law trademark law trust law national law review print edition founded 1888 philadelphia legal publishers kay brother monthly scholarly law review included sections current legal news book review section digest important decisions summarized recent judicial decisions various states section devoted current legal thought organized legal topic historically articles law reviews often considered persuasive authority american courts though influence generally thought waning recent years on-line edition national law review developed chicago illinois corporate attorney jennifer schaller legal internet professionals order provide easily accessible reliable database articles written experts analyzing legal news trends on-line edition described straightforward practical informative traditional law review containing information potential interest legal business professionals often serves reference source legal periodicals addition serving source emerging american legal issues mainstream media national law review provides several services interest practicing lawyers law students running example law student writing competition published articles multiple areas law
|
Databases
|
national forensic dna database south africa national forensic dna database south africa nfdd national dna database used law enforcement south africa criminal law forensic procedures amendment act 37 2013 dna act provides expansion administration database south africa enabling south african police service saps match forensic dna profiles derived samples collected crime scenes forensic dna profiles offenders convicted suspects arrested offences listed new schedule 8 amended criminal procedure act 1977 dna profiling used south african law enforcement since 1998 albeit without legal framework prior commencement dna act dna criminal intelligence database dcid developed saps administered biology unit saps forensic science laboratory fsl repository dna profiles held fsl prior commencement dna act comprises two indices namely casework index containing forensic dna profiles derived biological samples collected crime scenes reference index containing forensic dna profiles known people including victims suspects volunteers personnel criminal procedure act 1977 currently prevents dna samples taken convicted offenders dna profiles dcid generated analysing ampflstr profiler plus str multiplex system 9 different str loci d3s1358 vwa fga d8s1179 d21s11 d18s51 d5s818 d13s317 d7s820 plus amelogenin sex determination approximately 80,000 dna profiles dcid 2007 number increasing approximately 180,000 late 2013 criminal law forensic procedures amendment act 37 2013 dna act provides expansion regulation administration national dna database known national forensic dna database south africa nfdd initial criminal law forensic procedures amendment bill drafted 2008 tabled parliament 2009 subsequently split two separate bills criminal law forensic procedures amendment bill b2–2009 dealing fingerprints body-prints assented 2010 came effect 18 january 2013 separate bill unofficially known dna bill re-introduced parliament may 2013 addresses various concerns arose regarding initial bill including relating human rights issues final version dna bill namely criminal law forensic procedures amendment bill b9d–2013 passed national assembly 12 november 2013 assented president jacob zuma 23 january 2014 commencement date dna act 31 january 2015 dna act provides inter alia nfdd comprises six indices containing forensic dna profiles namely crime scene index arrestee index convicted offender co index investigative index elimination index missing persons unidentified human remains index mandatory dna sampling applies persons convicted persons arrested offences listed new schedule 8 amended criminal procedure act 1977 offences listed schedule 8 may amended initial implementation phase takes account capacity constraints dna profiles nfdd generated analysing 15 different str loci plus amelogenin sex determination different retention frameworks apply six different indices crime scene index contains forensic dna profiles obtained crime scene samples biological evidence collected crime scenes held nfdd indefinitely arrestee index convicted offender index contains forensic dna profiles persons arrested convicted case may schedule 8 offence range rape murder burglary forensic dna profiles entered arrestee index either migrated convicted offender index upon conviction held indefinitely removed within three years arrest result conviction forensic dna profiles obtained volunteers informed consent held investigative index removed nfdd within 3 months case finalised repository dna profiles held state fsl expected transferred nfdd within 3 months dna database operational 2013 fsl investigating implementing combined dna index system database software developed fbi dna act subject five-year implementation plan takes account new training equipment requirements brazil families crime victims south africa successfully campaigned establishment national forensic dna database dna project non-profit organisation advocacy initiative founded attorney vanessa lynch following unsolved murder lynch father john lynch 2004 dna project advocates establishment expansion national forensic dna database hence earlier identification criminal suspects campaigned passing dna bill donated laboratory equipment fsl funded uk forensic science service diagnostic review south africa fsl initiated dna forensic awareness training programs developed post-graduate forensic analyst qualification
|
Databases
|
bitdefender bitdefender romanian cybersecurity anti-virus software company founded 2001 florin talpeș currently ceo bitdefender develops sells anti-virus software internet security software endpoint security software cybersecurity products services 2018 software 500 million users worldwide bitdefender software originally developed softwin sold avx antivirus expert 1996 2001 name changed 2007 softwin spun bitdefender bitdefender develops markets anti-virus internet security endpoint security cyber security products services bitdefender internet things device protection solution called bitdefender box box router designed protect smart home products internet things devices blocking malicious internet traffic available windows mac bitdefender offers cloud-based security solution anti-malware anti-theft capabilities android ios users called bitdefender mobile security businesses company markets bitdefender gravityzone enterprise security includes self-configuring kits deployment desktop datacenter cloud software secures physical virtual cloud-based endpoints software uses network malware data stay updated software product small businesses looking simple security called bitdefender gravityzone business security bitdefender antispam neunet antispam filter trained bitdefender antispam lab series spam messages learns recognize new spam perceiving similarities messages already examined may 2006 bitdefender developed new technology b-have reduce dependency virus signatures proactive detection unknown threats technology based behavioral analysis virtualized environment bitdefender introduced active virus control august 2009 technology continuously monitors program specific processes running pc executes notes malware-like actions action scored given threshold reached process reported harmful 2014 version company claimed feature new technology called fuoton technology says visibly improves computer speed performance gradually adapting pc content filtering technologies developed filter raw online content applicable used antispam anti-phishing web filtering scanning spam social networks facilitate creation signatures proactively detect never-before-seen malicious files company claims bitdefender using cloud-based machine learning identify new malware malicious urls online threats processing analysing big data obtain behavioral patterns predict future advanced threats may 2009 customers criticized bitdefender support service lack responses bitdefender responded saying aware problems would take steps solve attributed problem unexpectedly high surge customers currently company website claims support available 24/7 telephone email livechat online knowledge base 20 march 2010 computers running bitdefender 64-bit versions windows affected malfunctioning update classified every executable program well dll files infected files marked 'trojan.fakealert.5 moved quarantine action led software systems malfunctions affected users around world bitdefender representatives announced removal faulty update workaround users affected except using 2008 version version 2012 bitdefender comodo firewall bitdefender co-exist currently official solution unofficial suggestions forums bitdefender bitdefender incompatible asus aisuite2 asus aisuite3 motherboard optimization suite software bundled asus motherboards enables automatic overclocking power tuning fan control bitdefender claims incompatibility due ndis asus driver winpkfilter lightweight filter prevents installation bitdefender files
|
Computer security
|
smtp authentication smtp authentication often abbreviated smtp auth extension simple mail transfer protocol smtp whereby client may log using authentication mechanism supported server mainly used submission servers authentication mandatory smtp specified jon postel 1970s provide using passwords sending email messages server design open mail relay initially problem late '90s spam worms become plague smtp auth relay client identified ip address practical email services provided internet service provider isp supplying connection else using specific hacks pop smtp john gardiner myers published first draft smtp auth 1995 successively developed discussed ietf along mail submission protocol extended smtp esmtp simple authentication security layer sasl older sasl mechanism esmtp authentication esmtpa cram-md5 uses md5 algorithm hmacs hash-based message authentication codes still considered sound internet mail consortium imc reported 55 mail servers open relays 1998 less 1 2002 using mail submission agent msa generally port 587 implies smtp auth msa usage supported software recommended especially support nomadic users several network hubs either block port 25 use smtp proxies msa responsible ensuring message envelope contains good addresses may enforce local policies codice_1 header field verifying envelope sender a.k.a codice_2 used spf address agree authenticated user-id particularly important domains sign messages using dkim keywords ending codice_3 codice_4 provided codice_5 clause codice_6 header fields messages received smtp auth keywords provided statistical diagnostic purposes rfc 3848 checked clients e.g spamassassin smtp extensions smtp auth advertised ehlo response along list supported authentication methods methods may change issuing starttls typically allowing plain text passwords latter case rfc 4954 provides following example c part protocol indicate lines sent client server respectively smtp auth used also port 25 usually servers reject rcpt commands imply relaying unless authentication credentials accepted specification recommends servers issue 530 5.7.0 authentication required response commands case server configured require authentication client n't done yet servers listening port 587 private servers configured way message exchange mx however historical trait smtp authenticated default results different behavior regard access protocols cases example using auth external starttls besides auth command extension also provides auth parameter mail command allow distinguish authentication authorization way sender identify transmit several messages session authentication n't need vary established different messages may sent according different agreements hence require different authorization example messages may relayed behalf different users use parameter much less popular using command grant relay privileges using authentication ehlo used greeting indicate extended smtp use opposed deprecated helo greeting still accepted extension used backward compatibility capitalized text auth command list types authorization smtp server accept examples authorization protocols include
|
Computer security
|
personal cloud personal cloud collection digital content services accessible device personal cloud tangible entity place gives users ability store synchronize stream share content relative core moving one platform screen location another created connected services applications reflects sets consumers ’ expectations next-generation computing services work four primary types personal cloud use today online cloud nas device cloud server device cloud home-made clouds online cloud also sometimes referred public cloud online cloud cloud computing model online resources like software data storage made available internet service provider online cloud model cloud services provided virtualized system constructed using pooled shared physical resources accessed internet typically individual organization little control ecosystem online cloud hosted core infrastructure shared many individuals organizations data applications provided service provider logically segregated authorized allowed access network-attached storage nas device computer connected network provides file-based data storage services devices network although may technically possible run software nas device designed general purpose server cloud nas remote storage accessed internet local cloud nas often used backups archiving one benefits nas cloud data cloud accessed time anywhere main drawback however speed transfer rate fast network connection data accessed therefore fairly slow three examples nas personal clouds cloud western digital cloudbox lacie central seagate many ways cloud servers work way physical servers functions perform different typically cloud server on-premises device connected internet gives users functions available online cloud added benefit security files control premises server cloud historically enterprise-based deployed businesses needing in-house cloud however also in-house options available individual users open-source owncloud runs linux cloudlocker device stoamigo nimbus project technologically proficient user common solution using personal cloud create home-made cloud system connecting external usb hard drive wi-fi router enables wired wireless computers access usb hard drive use storage retrieving files user needs share network thereby acting like cloud challenge home-made cloud order set user certain degree skills technology network setup solution novices average consumers setup done tech expert biggest issue security leaving files accessible anyone technical knowledge every router supports type access modification three biggest routers allow type connection linksys netgear asus
|
Distributed computing architecture
|
b1 free archiver b1 free archiver proprietary freeware multi-platform file archiver file manager b1 archiver available microsoft windows linux macos android full support compression unpacking encryption zip native b1 format program decompresses 20 popular archive formats creates split encrypted archives b1 free archiver translated 30 languages translations made volunteers crowdin localization management platform program used graphical user interface command line interface b1 free archiver written c++/qt released proprietary license b1 free archiver supports opening popular archive formats b1 zip rar 7z gzip tar.gz tar.bz2 iso create .b1 .zip archives utility also create split archives consist several parts specified size password-protected archives encrypted 256 bit aes algorithm desktop application supports editing archive adding new files deleting files archive editing files directly archive b1 free archiver full drag-and-drop support keyboard shortcuts hotkeys navigation program works windows xp higher linux ubuntu/debian fedora macos 10.6 higher android also online b1 free archiver decompression tool
|
Computer file systems
|
multilevel security multilevel security multiple levels security mls application computer system process information incompatible classifications i.e. different security levels permit access users different security clearances needs-to-know prevent users obtaining access information lack authorization two contexts use multilevel security one refer system adequate protect subversion robust mechanisms separate information domains trustworthy another context refer application computer require computer strong enough protect subversion possess adequate mechanisms separate information domains system must trust distinction important systems need trusted necessarily trustworthy mls operating environment often requires highly trustworthy information processing system often built mls operating system os necessarily mls functionality supported system composed entirely untrusted computers although requires multiple independent computers linked hardware security-compliant channels see section b.6.2 trusted network interpretation ncsc-tg-005 example hardware enforced mls asymmetric isolation one computer used mls mode computer must use trusted operating system os information mls environment physically accessible os strong logical controls must exist ensure access information strictly controlled typically involves mandatory access control uses security labels like bell–lapadula model customers deploy trusted operating systems typically require product complete formal computer security evaluation evaluation stricter broader security range lowest highest classification levels system process trusted computer system evaluation criteria tcsec first evaluation criteria developed assess mls computer systems criteria clear uniform mapping security requirements breadth mls security range historically implementations certified capable mls processing security range unclassified top secret among honeywell scomp usaf sacdin nsa blacker boeing mls lan tcsec 1980s vintage intel 80386-based currently mls products evaluated common criteria late 2008 first operating system certified high evaluated assurance level evaluation assurance level eal eal 6+ high robustness auspices u.s. government program requiring multilevel security high threat environment assurance level many similarities old orange book a1 formal methods functional requirements focus fundamental isolation information flow policies rather higher level policies bell-la padula common criteria decoupled tcsec pairing assurance eal functionality protection profile clear uniform mapping security requirements mls security range capability documented csc-std-004-85 largely lost common criteria superseded rainbow series freely available operating systems features support mls include linux security-enhanced linux feature enabled freebsd security evaluation thought problem free mls implementations three reasons notwithstanding suppositions red hat enterprise linux 5 certified lspp rbacpp capp eal4+ june 2007 uses security-enhanced linux implement mls first common criteria certification enforce toe security properties security-enhanced linux vendor certification strategies misleading laypersons common strategy exploits layperson overemphasis eal level over-certification certifying eal 3 protection profile like capp elevated levels like eal 4 eal 5 another adding certifying mls support features role-based access control protection profile rbacpp labeled security protection profile lspp kernel evaluated mls-capable protection profile types features services run kernel depend kernel protect corruption subversion kernel evaluated mls-capable protection profile mls features trusted regardless impressive demonstration looks particularly noteworthy capp specifically mls-capable profile specifically excludes self-protection capabilities critical mls general dynamics offers pitbul l trusted mls operating system pitbull currently offered enhanced version red hat enterprise linux earlier versions existed sun microsystems solaris ibm aix svr4 unix pitbull provides bell lapadula security mechanism biba integrity mechanism privilege replacement superuser many features pitbull security base general dynamics trusted network environment tne product since 2009 tne enables multilevel information sharing access users department defense intelligence communities operating varying classification levels also foundation multilevel coalition sharing environment battlefield information collection exploitation systems extended bices-x sun microsystems oracle corporation offers solaris trusted extensions integrated feature commercial oss solaris opensolaris addition controlled access protection profile capp role-based access control rbac protection profiles trusted extensions also certified eal4 labeled security protection profile lspp security target includes desktop network functionality lspp mandates users authorized override labeling policies enforced kernel x window system x11 server evaluation include covert channel analysis certifications depend capp common criteria certifications suggest product trustworthy mls bae systems offers xts-400 commercial system supports mls vendor claims high assurance predecessor products including xts-300 evaluated tcsec b3 level mls-capable xts-400 evaluated common criteria eal5+ capp lspp protection profiles capp lspp eal3 protection profiles inherently mls-capable security target common criteria evaluation product contains enriched set security functions provide mls capability sanitization problem area mls systems systems implement mls restrictions like defined bell–lapadula model allow sharing obviously violate security restrictions users lower clearances easily share work users holding higher clearances vice versa efficient reliable mechanism top secret user edit top secret file remove top secret information deliver users secret lower clearances practice mls systems circumvent problem via privileged functions allow trustworthy user bypass mls mechanism change file security classification however technique reliable covert channels pose another problem mls systems mls system keep secrets perfectly must possible way top secret process transmit signals kind secret lower process includes side effects changes available memory disk space changes process timing process exploits side effect transmit data exploiting covert channel extremely difficult close covert channels practical computing system may impossible practice process identifying covert channels challenging one commercially available mls systems attempt close covert channels even though makes impractical use high security applications bypass problematic introduced means treat system high object mls trusted common example extract data secret system high object sent unclassified destination citing property data trusted evidence 'really unclassified e.g 'strict format system high system trusted preserve trusted evidence result overt data path opened logical way securely mediate bypass risky unlike narrow bandwidth covert channels difficult exploit bypass present large easily exploitable overt leak system bypass often arises failure use trusted operating environments maintain continuous separation security domains way back origin origin lies outside system boundary may possible validate trusted separation origin case risk bypass unavoidable flow truly essential common example unavoidable bypass subject system required accept secret ip packets untrusted source encrypt secret userdata header deposit result untrusted network source lies outside sphere influence subject system although source untrusted e.g system high trusted mls provides packets unclassified headers secret plaintext userdata mls data construct since source untrusted could corrupt place secrets unclassified packet header corrupted packet headers could nonsense impossible subject system determine reasonable reliability packet userdata cryptographically well protected packet header contain readable secrets corrupted packets passed untrusted network subject system may routable cooperating corrupt process network could grab packets acknowledge subject system may detect leak large overt leak hard detect viewing classified packets unclassified headers system high structures instead mls structures really presents common serious threat bypass avoidable avoidable bypass often results system architects design system correctly considering security attempt apply security fact add-on functions situation bypass appears easy way make system work pseudo-secure schemes proposed approved examine contents bypassed data vain attempt establish bypassed data contains secrets possible without trusting something data format contrary assumption source trusted preserve characteristics source data assured secure bypass myth so-called high assurance guard hag transparently implements bypass risk introduce long acknowledged extant solutions ultimately procedural rather technical way know certainty much classified information taken systems exploitation bypass decline compusec experts laypersons compusec-astute designing secure computing systems mistakenly drawing conclusion term mls overloaded two uses mls processing environment vs mls capability false conclusion based belief products certified operate mls environment mode therefore mls capability exist one imply many systems operate environment containing data unequal security levels therefore mls computer security intermediate value theorem cs-ivt consequence confusion runs deeper noted however nsa-certified mls operating systems databases networks existed operational mode since 1970s mls products continuing built marketed deployed laypersons often conclude admit system operates mls environment environment-centric meaning mls backed perceived corner problem mls solution capability-centric meaning mls mls deceptively complex simple solutions obvious justify conclusion exist lead crippling ignorance compusec manifests whispers one talk mls thing mls mls-denial schemes change rapidly addressed instead important clarify distinction mls-environment mls-capable original use term mls applied security environment mode one solution confusion retain original definition mls specific mls-capable context used multiple independent levels security mils architecture addresses domain separation component mls note ucdmo us government lead cross domain multilevel systems created term cross domain access category baseline dod intelligence community accredited systems category seen essentially analogous mils security models biba model integrity bell–lapadula model confidentiality allow one-way flow certain security domains otherwise assumed isolated mils addresses isolation underlying mls without addressing controlled interaction domains addressed models trusted security-compliant channels mentioned link mils domains support mls functionality mils approach pursues strategy characterized older term msl multiple single level isolates level information within single-level environment system high rigid process communication isolation offered mils may useful ultra high reliability software applications mls mils notably address hierarchical structure embodied notion security levels requires addition specific import/export applications domains needs accredited appropriately mils might better called multiple independent domains security mls emulation mils would require similar set accredited applications mls applications declining address box interaction among levels consistent hierarchical relations bell-la padula mils almost deceptively simple implement initially needs non-trivial supplementary import/export applications achieve richness flexibility expected practical mls applications mils/mls comparison consider accreditation set simpler export applications achievable accreditation one complex mls kernel question depends part extent import/export interactions stakeholders require favour mils possibility export applications require maximal assurance another way solving problems known multiple single-level security level isolated separate untrusted domain absence medium communication domains assures interaction possible mechanism isolation usually physical separation separate computers often used support applications operating systems possibility supporting mls microsoft windows infrastructure trusted operating systems important component mls systems order fulfill criteria required definition mls cnssi 4009 paraphrased start article system must provide user interface capable allowing user access process content multiple classification levels one system ucdmo ran track specifically focused mls nsa information assurance symposium 2009 highlighted several accredited production emergent mls systems note use mls selinux several databases classified mls systems oracle product named oracle label security ols implements mandatory access controls typically adding 'label column table oracle database ols deployed us army inscom foundation all-source intelligence database spanning jwics siprnet networks project create labeled version postgresql also older labeled-database implementations trusted rubix mls database systems provide unified back-end system content spanning multiple labels resolve challenge users process content multiple security levels one system enforcing mandatory access controls also several mls end-user applications mls capability currently ucdmo baseline called mlchat chat server runs xts-400 operating system created us naval research laboratory given content users different domains passes mlchat server dirty-word scanning employed protect classified content debate truly mls system form cross-domain transfer data guard mandatory access controls maintained combination xts-400 application-specific mechanisms joint cross domain exchange jcdx another example mls capability currently ucdmo baseline jcdx department defense dod defense intelligence agency dia accredited multilevel security mls command control communication computers intelligence c4i system provides near real-time intelligence warning support theater forward deployed tactical commanders jcdx architecture comprehensively integrated high assurance protection level four pl4 secure operating system utilizing data labeling disseminate near real-time data information force activities potential terrorist threats around world oceans installed locations united states allied partner countries capable providing data top secret/sci secret-releasable levels single platform mls applications currently part ucdmo baseline include several applications bluespace bluespace several mls applications including mls email client mls search application mls c2 system bluespace leverages middleware strategy enable applications platform neutral orchestrating one user interface across multiple windows os instances virtualized remote terminal sessions us naval research laboratory also implemented multilevel web application framework called mlweb integrates ruby rails framework multlevel database based sqlite3 perhaps greatest change going multilevel security arena today convergence mls virtualization increasing number trusted operating systems moving away labeling files processes instead moving towards unix containers virtual machines examples include zones solaris 10 tx padded cell hypervisor systems green hill integrity platform xenclient xt citrix high assurance platform nsa implemented general dynamics trusted virtualization environment tve another example uses selinux core support mls applications span multiple domains
|
Computer security
|
resource reservation protocol resource reservation protocol rsvp transport layer protocol designed reserve resources across network quality service qos using integrated services model rsvp operates ipv4 ipv6 provides receiver-initiated setup resource reservations multicast unicast data flows transport application data similar control protocol like internet control message protocol icmp internet group management protocol igmp rsvp described rsvp used hosts routers request deliver specific levels qos application data streams flows rsvp defines applications place reservations relinquish reserved resources longer required rsvp operation generally result resources reserved node along path rsvp routing protocol designed interoperate current future routing protocols rsvp rarely deployed telecommunications networks today traffic engineering extension rsvp rsvp-te becoming widely accepted nowadays many qos-oriented networks next steps signaling nsis proposed replacement rsvp basic concepts rsvp originally proposed rsvp93 zhang l. deering s. estrin d. shenker s. d. zappala rsvp new resource reservation protocol ieee network september 1993 rsvp described series rfc documents ietf two key concepts rsvp reservation model flowspec filterspec rsvp reserves resources flow flow identified destination address protocol identifier optionally destination port multiprotocol label switching mpls flow defined label switched path lsp flow rsvp also identifies particular quality service required flow although understand specific information flow qos qos specific information called flowspec rsvp passes flowspec application hosts routers along path systems analyse flowspec accept reserve resources flowspec consists filterspec defines set packets shall affected flowspec i.e data packets receive qos defined flowspec filterspec typically selects subset packets processed node selection depend attribute packet e.g sender ip address port currently defined rsvp reservation styles rsvp reservation request consists flowspec filterspec pair called flowdescriptor effects node spec flowspec sets parameters packet scheduler node filterspec sets parameters packet classifier two primary types messages data objects rsvp messages transmitted order complete list rsvp messages date objects see rfc 2205 rsvp host needs send data flow specific qos transmit rsvp path message every 30 seconds travel along unicast multicast routes pre-established working routing protocol path message arrives router understand rsvp router forwards message without interpreting contents message reserve resources flow want listen send corresponding resv short reserve message traces path backwards sender resv message contains flow specs router receives rsvp resv message resv message also filterspec object defines packets receive requested qos defined flowspec simple filter spec could sender ’ ip address optionally udp tcp port
|
Internet protocols
|
up2date up2date also known red hat update agent tool used older versions red hat enterprise linux centos fedora core downloads installs new software upgrades operating system functions front-end rpm package manager adds advanced features automatic dependency resolution file /etc/sysconfig/rhn/sources specifies up2date search packages default red hat enterprise linux up2date retrieves packages red hat network rhn server though users add directories full packages even debian yum repositories wish up2date fedora core defaults retrieving packages yum repositories sources added apart rhn red hat enterprise linux specific fedora core 5 red hat enterprise linux 5 up2date longer shipped distribution yum used instead centos up2date downloads packages yum repositories centos mirror network
|
Operating systems
|
reverse engineering reverse engineering also called back engineering process man-made object deconstructed reveal designs architecture extract knowledge object similar scientific research difference scientific research natural phenomenon reverse engineering applicable fields mechanical engineering electronic engineering software engineering chemical engineering systems biology many reasons performing reverse engineering various fields reverse engineering origins analysis hardware commercial military advantage however reverse engineering process concerned creating copy changing artifact way analysis order deduce design features products little additional knowledge procedures involved original production cases goal reverse engineering process simply redocumentation legacy systems even product reverse engineered competitor goal may copy perform competitor analysis reverse engineering may also used create interoperable products despite narrowly tailored united states european union legislation legality using specific reverse engineering techniques purpose hotly contested courts worldwide two decades software reverse engineering help improve understanding underlying source code maintenance improvement software relevant information extracted order make decision software development graphical representations code provide alternate views regarding source code help detect fix software bug vulnerability frequently software develops design information improvements often lost time lost information usually recovered reverse engineering process also help cut time required understand source code reducing overall cost software development reverse engineering also help detect eliminate malicious code written software better code detectors reversing source code used find alternate uses source code detect unauthorized replication source code n't intended used reveal competitors product built process commonly used cracking software media remove copy protection create possibly improved copy even knockoff usually goal competitor hacker malware developers often use reverse engineering techniques find vulnerabilities operating system os order build computer virus exploit system vulnerabilities reverse engineering also used cryptanalysis order find vulnerabilities substitution cipher symmetric-key algorithm public-key cryptography addition purposes uses reverse engineering computer-aided design cad become popular reverse engineering become viable method create 3d virtual model existing physical part use 3d cad cam cae software reverse-engineering process involves measuring object reconstructing 3d model physical object measured using 3d scanning technologies like cmms laser scanners structured light digitizers industrial ct scanning computed tomography measured data alone usually represented point cloud lacks topological information design intent former may recovered converting point cloud triangular-faced mesh reverse engineering aims go beyond producing mesh recover design intent terms simple analytical surfaces appropriate planes cylinders etc well possibly nurbs surfaces produce boundary-representation cad model recovery model allows design modified meet new requirements manufacturing plan generated etc hybrid modelling commonly used term nurbs parametric modelling implemented together using combination geometric freeform surfaces provide powerful method 3d modelling areas freeform data combined exact geometric surfaces create hybrid model typical example would reverse engineering cylinder head includes freeform cast features water jackets high tolerance machined areas reverse engineering also used businesses bring existing physical geometry digital product development environments make digital 3d record products assess competitors products used analyse instance product works components consists estimate costs identify potential patent infringement etc value engineering related activity also used businesses involves de-constructing analysing products objective find opportunities cost cutting 1990 institute electrical electronics engineers ieee defined reverse engineering process analyzing subject system identify system components interrelationships create representations system another form higher level abstraction subject system end product software development reverse engineering process examination software system consideration modified would make re-engineering restructuring reverse engineering performed stage product cycle necessarily functional end product two components reverse engineering redocumentation design recovery redocumentation creation new representation computer code easier understand meanwhile design recovery use deduction reasoning general knowledge personal experience product order fully understand product functionality also seen going backwards development cycle model output implementation phase source code form reverse-engineered back analysis phase inversion traditional waterfall model another term technique program comprehension working conference reverse engineering wcre held yearly explore expand techniques reverse engineering computer-aided software engineering case automated code generation contributed greatly field reverse engineering software anti-tamper technology like obfuscation used deter reverse engineering re-engineering proprietary software software-powered systems practice two main types reverse engineering emerge first case source code already available software higher-level aspects program perhaps poorly documented documented longer valid discovered second case source code available software efforts towards discovering one possible source code software regarded reverse engineering second usage term one people familiar reverse engineering software make use clean room design technique avoid copyright infringement related note black box testing software engineering lot common reverse engineering tester usually api goals find bugs undocumented features bashing product outside purposes reverse engineering include security auditing removal copy protection cracking circumvention access restrictions often present consumer electronics customization embedded systems engine management systems in-house repairs retrofits enabling additional features low-cost crippled hardware graphics card chip-sets even mere satisfaction curiosity binary reverse engineering performed source code software unavailable process sometimes termed reverse code engineering rce example decompilation binaries java platform accomplished using jad one famous case reverse engineering first non-ibm implementation pc bios launched historic ibm pc compatible industry overwhelmingly dominant computer hardware platform many years reverse engineering software protected u.s. fair use exception copyright law samba software allows systems running microsoft windows systems share files systems classic example software reverse engineering since samba project reverse-engineer unpublished information windows file sharing worked non-windows computers could emulate wine project thing windows api openoffice.org one party microsoft office file formats reactos project even ambitious goals strives provide binary abi api compatibility current windows oses nt branch allowing software drivers written windows run clean-room reverse-engineered free software gpl counterpart windowsscope allows reverse-engineering full contents windows system live memory including binary-level graphical reverse engineering running processes another classic well-known example 1987 bell laboratories reverse-engineered mac os system 4.1 originally running apple macintosh se could run risc machines reverse engineering software accomplished various methods three main groups software reverse engineering software classification process identifying similarities different software binaries example two different versions binary used detect code relations software samples task traditionally done manually several reasons patch analysis vulnerability detection copyright infringement nowadays done somewhat automatically large numbers samples method used mostly long thorough reverse engineering tasks complete analysis complex algorithm big piece software general statistical classification considered hard problem also true software classification therefore n't many solutions/tools handle task well number uml tools refer process importing analysing source code generate uml diagrams reverse engineering see list uml tools although uml one approach providing reverse engineering recent advances international standards activities resulted development knowledge discovery metamodel kdm standard delivers ontology intermediate abstracted representation programming language constructs interrelationships object management group standard way becoming iso standard well kdm started take hold industry development tools analysis environments deliver extraction analysis source binary byte code source code analysis kdm granular standards architecture enables extraction software system flows data control call maps architectures business layer knowledge rules terms process standard enables use common data format xmi enabling correlation various layers system knowledge either detailed analysis e.g root cause impact derived analysis e.g business process extraction although efforts represent language constructs never-ending given number languages continuous evolution software languages development new languages standard allow use extensions support broad language set well evolution kdm compatible uml bpmn rdf standards enabling migration environments thus leverage system knowledge efforts software system transformation enterprise business layer analysis protocols sets rules describe message formats messages exchanged i.e. protocol state-machine accordingly problem protocol reverse-engineering partitioned two subproblems message format state-machine reverse-engineering message formats traditionally reverse-engineered tedious manual process involved analysis protocol implementations process messages recent research proposed number automatic solutions typically automatic approaches either group observed messages clusters using various clustering analyses emulate protocol implementation tracing message processing less work reverse-engineering state-machines protocols general protocol state-machines learned either process offline learning passively observes communication attempts build general state-machine accepting observed sequences messages online learning allows interactive generation probing sequences messages listening responses probing sequences general offline learning small state-machines known np-complete online learning done polynomial time automatic offline approach demonstrated comparetti et al online approach cho et al components typical protocols like encryption hash functions reverse-engineered automatically well typically automatic approaches trace execution protocol implementations try detect buffers memory holding unencrypted packets reverse engineering invasive destructive form analyzing smart card attacker grinds away layer layer smart card takes pictures electron microscope technique possible reveal complete hardware software part smart card major problem attacker bring everything right order find everything works makers card try hide keys operations mixing memory positions example bus scrambling cases even possible attach probe measure voltages smart card still operational makers card employ sensors detect prevent attack attack common requires large investment effort special equipment generally available large chip manufacturers furthermore payoff attack low since security techniques often employed shadow accounts uncertain time whether attacks chip/pin cards replicate encryption data consequentially crack pins would provide cost effective attack multifactor authentication reverse engineering often used people order copy nations technologies devices information obtained regular troops fields intelligence operations often used second world war cold war well-known examples wwii later include reverse engineering applies primarily gaining understanding process artifact manner construction use internal processes made clear creator patented items reverse-engineered studied since essence patent inventor provides detailed public disclosure return receives legal protection invention involved however item produced one patents could also include technology patented disclosed indeed one common motivation reverse engineering determine whether competitor product contains patent infringements copyright infringements united states even artifact process protected trade secrets reverse-engineering artifact process often lawful long legitimately obtained reverse engineering computer software us often falls contract law breach contract well relevant laws end user license agreements specifically prohibit u.s. courts ruled terms present override copyright law expressly permits see bowers v. baystate technologies sec 103 f dmca 17 u.s.c § 1201 f says person legal possession program permitted reverse-engineer circumvent protection necessary order achieve interoperability — term broadly covering devices programs able interact make use use transfer data useful ways limited exemption exists allows knowledge thus gained shared used interoperability purposes eu directive 2009/24 legal protection computer programs superseded earlier 1991 directive governs reverse engineering european union
|
Computer security
|
netpresenz netpresenz written peter n. lewis stairways software pty ltd world wide web ftp server developed use classic mac os update older product called simply ftpd time significant ftp daemon available macintosh platform added web gopher functionality originally shareware package netpresenz rendered obsolete increasing functionality mac os made freeware work macos
|
Web technology
|
simple loop prevention protocol simple loop prevention protocol slpp computer networking data link layer protocol developed nortel previously acquired avaya part extreme networks protect layer 2 network loops slpp uses small hello packet detect network loops slpp protocol checks packets originating switch peer switch smlt configuration sending hello packets per vlan basis allows slpp detect vlan based network loops un-tagged well tagged ieee 802.1q vlan link configurations loop detected associated port shut =external links=
|
Internet protocols
|
dynamic linker computing dynamic linker part operating system loads links shared libraries needed executable executed run time copying content libraries persistent storage ram filling jump tables relocating pointers specific operating system executable format determine dynamic linker functions implemented linking often referred process performed executable compiled dynamic linker special part operating system loads external shared libraries running process binds shared libraries dynamically running process approach also called dynamic linking late linking dynamic-link library dll microsoft implementation shared library concept microsoft windows os/2 operating systems libraries usually file extension codice_1 codice_2 libraries containing activex controls codice_3 legacy system drivers file formats dlls windows exe files portable executable pe 32-bit 64-bit windows new executable ne 16-bit windows exes dlls contain code data resources combination data files file format dll different file extensions possibly containing resource sections called resource dlls examples dlls include icon libraries sometimes extension codice_4 font files extensions codice_5 codice_6 unix-like systems machine code makes dynamic linker actually external executable operating system kernel loads executes first process address space newly constructed result calling codice_7 codice_8 functions link time path dynamic linker used embedded executable image executable file loaded operating system kernel reads path dynamic linker attempts load execute executable binary attempt fails example file path attempt execute original executable fails dynamic linker loads initial executable image dynamically-linked libraries depends starts executable result pathname dynamic linker part operating system application binary interface unix-like systems use elf executable images dynamic libraries solaris 64-bit versions hp-ux linux freebsd netbsd openbsd dragonfly bsd path dynamic linker used embedded link time codice_9 section executable codice_10 segment systems dynamically loaded shared libraries identified filename suffix codice_11 shared object dynamic linker influenced modifying behavior either program execution program linking examples seen run-time linker manual pages various unix-like systems typical modification behavior use codice_12 codice_13 environment variables adjust runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively example zlibc also known codice_14 facilitates transparent decompression used codice_13 hack result possible read pre-compressed gzipped file data bsd linux systems files compressed essentially allowing user add transparent compression underlying filesystem although caveats mechanism flexible allowing trivial adaptation code perform additional alternate processing data file read prior provision said data user process requested apple darwin operating system macos ios operating systems built top path dynamic linker used embedded link time one mach-o load commands executable image systems dynamically loaded shared libraries identified either filename suffix codice_16 placement inside bundle framework dynamic linker links target executable shared libraries also places machine code functions specific address points memory target executable knows link time executable wishes interact dynamic linker simply executes machine-specific call jump instruction one well-known address points executables macos ios platforms often interact dynamic linker execution process even known executable might interact dynamic linker causing load libraries resolve symbols hours initially launches reason macos ios program interacts dynamic linker often due apple cocoa cocoa touch apis objective-c language implemented see main articles information dynamic linker coerced modifying behavior however unlike unix-like operating systems modifications hints sometimes ignored dynamic linker examples seen codice_17 manual page typical modification behavior use codice_18 codice_19 environment variables former previously-mentioned variables adjusts executables search path shared libraries latter displays names libraries loaded linked apple macos dynamic linker open-source project released part darwin found apple open-source codice_17 project unix-like operating systems using xcoff aix dynamically-loaded shared libraries use filename suffix codice_21 dynamic linker influenced modifying behavior either program execution program linking typical modification behavior use codice_22 environment variable variable adjusts runtime linking process searching shared libraries alternate locations forcibly loading linking libraries would otherwise respectively dynamic linking assembler language programs ibm os/360 successors done typically using link macro instruction containing supervisor call instruction activates operating system routines makes library module linked available program library modules may reside steplib joblib specified control cards available specific execution program library included linklist parmlib specified system startup time link pack area specific reentrant modules loaded system startup time multics operating system files including executables segments call routine part current segment cause system find referenced segment memory disk add address space running process dynamic linking normal method operation static linking using binder exception
|
Computer security
|
xlnt xlnt scripting language windows platforms based dcl language vax-vms machines proprietary implementation maintained originator advanced systems concepts inc. since 1997 implementation contains xlnt executable windows scripting host engine integrated development environment also used cgi mode one handful windows-vms emulation interoperability tools others pc-dcl accelr8 dcl lite console mode interpreters run automated scripting mode older programme type vcl used vms functionality ms-dos pc dos os/2 unix variants vcl run later windows versions provide 16-bit dos programmes run e.g windows nt via win16/dos environmental subsystem program compatibility option windows xp et seq
|
Programming language topics
|
moon patrol player takes role luna city police officer assigned sector nine home toughest thugs galaxy player controls moon buggy travels moon surface viewing side moves towards right side screen driving obstacles craters mines must avoided various enemies ufos tanks ground must shot gameplay within number courses divided 26 checkpoints named letters english alphabet five major checkpoints— e j z —denote new stage new background theme example third stage starting j introduces mines top portion screen shows timeline-style map course five major checkpoints clearly marked map indicator current checkpoint time spent stage three indicator lights top light indicates upcoming enemy aerial attacks middle one indicates upcoming minefield bottom one indicates enemies approaching behind end stage time spent compared average bonus points awarded accordingly 1,000 plus 100 per second bettered completing entire course gives additional 5,000 points plus 100 per second bettered two unique courses beginner course champion course champion course loops forever loop numbered convenience 3 extra lives given 10,000 points per 20,000 scored 50,000 thereafter lives given game ends last patrol car destroyed game continued points scored one game carry 999,990 points maximum high score achieved players exceed score game retains last six digits moon patrol ported apple ii atari 8-bit family atari 2600 atari 5200 atari st commodore 64 vic-20 msx ibm pc ti-99/4a tandy color computer many published atari atarisoft label moon patrol received certificate merit category 1984 best science fiction/ fantasy video game 5th annual arkie awards arcade express reviewed arcade version january 1983 scored 8 10 scott mace infoworld stated moon patrol commodore 64 favorite atarisoft game making good use computer sound moon patrol included retro compilations arcade hits moon patrol spy hunter game boy color midway presents arcade greatest hits midway collection 2 dreamcast playstation windows 2006 bandai released enhanced version moon patrol ex cell phones march 22 2018 moon patrol released nintendo switch hamster part arcade archives series bootleg version called moon ranger released arcades year moon patrol home clones include desert patrol trs-80 color computer 1983 gas hog atari 2600 1983 lunar rover patrol dragon 32 1983 moon buggy commodore 64 1983 moon alert zx spectrum 1984 luna rover zx spectrum 1985 moon control amstrad cpc 1985 moonrider msx 1986 overlander amiga 1993 battle time 1984 commodore 64 re-themed gameplay major wars twentieth century open-source clones named moon-buggy ascii patrol run unix-like terminals
|
Computer architecture
|
andy wellings andy j. wellings professor computer science department university york northern england works closely alan burns real-time systems distributed concurrent real-time programming languages andy wellings member team responsible creation real-time specification java also ada programming language expert wellings written number books programming especially ada
|
Programming language topics
|
power10 power10 family multi-core processors based power isa primarily designed ibm substantial contributions openpower foundation partners designed tackle future demands analytics big data domains power10 processors manufactured using 7 nm process feature enhancements compared predecessor power9 regarding core count microarchitecture design memory controllers i/o support opencapi 4.0 nvlink3 systems using power10 expected available 2020
|
Computer architecture
|
actor-lab actor-lab program visualizes lego mindstorms internal logic visual flowcharts ideas underlying actor-lab derived event-driven message-passing computer languages began actor based languages devised hewit actor-lab requires constant communication programmable brick e.g rcx via infra-red link means user mount programmable brick vertically models move hold tower form gantry crane actor-lab shows user real-time happening programmable brick including simulation motors sensors lights sounds one also add controls bottom screen give oneself real-time control program/model similar program lego called robolab one actually download programs lego programmable brick notice one control edited control power stop
|
Programming language topics
|
rambler portal rambler russian search engine one biggest russian web portals owned rambler media group prof-media since 2006 launched 1996 stack ltd including sergey lysakov dmitry kryukov vladimir samoylov others rambler online since 1996 2005 rambler media group went public bought prof-media 2006 july 18 2008 announced google acquire begun part rambler media one biggest russian contextual advertising services 140 million deal blocked russian federal antimonopoly service main competitors rambler russian market yandex mail.ru july 2013 rambler ranked 11th popularity among russian sites september 2016 reported site breached february 2012 leakedsource received dump user database time included usernames passwords icq instant messaging accounts 98 million users revealed rambler.ru database stored user passwords plaintext — meaning whoever breached database instantly access e-mail accounts users services offered rambler include web search e-mail news aggregation e-commerce services russian-speaking community globally complemented number rambler media group owned web properties including
|
Web technology
|
end interrupt end interrupt eoi signal sent programmable interrupt controller pic indicate completion interrupt processing given interrupt eoi used cause pic clear corresponding bit service register isr thus allow interrupt requests equal lower priority generated pic eois may indicate interrupt vector implicitly explicitly explicit eoi vector indicated eoi whereas implicit eoi vector typically use vector indicated pics priority schema example highest vector isr also eois may sent end interrupt processing interrupt handler operation pic may set auto-eoi start interrupt handler
|
Computer architecture
|
nolisting nolisting name given technique defend electronic mail domain names e-mail spam domain name internet series one mx records specifying mail servers responsible accepting email messages behalf domain preference nolisting simply adding mx record pointing non-existent server primary i.e lowest preference value means initial mail contact always fail many spam sources n't retry failure spammer move next victim legitimate email servers retry next higher numbered mx normal email delivered small delay simple example mx records demonstrate technique defeats spam programs connect highest priority lowest numbered mx follow standard error-handling retrying next priority mx alternate techniques suggest sandwiching valid mx records non-responsive ones variants also suggest configuring highest-numbered hosts always return 4xx errors i.e retry later simple example mx records demonstrate technique greylisting also relies fact spammers often use custom software persevere deliver message correct rfc-compliant way
|
Computer security
|
amazon drive amazon drive formerly known amazon cloud drive cloud storage application managed amazon service offers secure cloud storage file backup file sharing photo printing using amazon account files folders transferred managed multiple devices including web browsers desktop applications mobiles tablets amazon drive also lets u.s. users order photo prints photo books using amazon prints service today amazon drive offers free unlimited photo storage amazon prime subscription kindle fire device paid limited storage service launched major countries including u.s canada european nations japan australia also functions china brazil free limited 5gb storage service amazon first announced storage service march 29 2011 initially offering pay-as-you-need tiered storage plans users users paid storage tier utilized expandable maximum 1 terabyte plan march 2015 unlimited storage plans intended non-business customer sections introduced plan offered free 3-month free trial customers wish try service entering annual subscription 2015 black friday plan became popular amazon offered 92 discounted unlimited storage plan 5 60 year purchase fine print stated unlimited storage private use restricted file type must substantially exceed differ normal use users amazon anytime may impose restrictions use service june 2017 amazon reverted unlimited storage plans us 15 november 2017 amazon removed unlimited storage plans canadian customers well july 2019 amazon offers two plans marketplaces prime photos since november 2014 free limited file storage china brazil prime photos plan offers unlimited storage photos raw files 5 gigabytes storage videos files photos uploaded amazon drive ios android apps kindle device cloud drive website additionally users kindle fire tablets also get plan benefits along purchase device photos videos automatically backup device amazon drive cloud storage according amazon prime photos available personal non-commercial use ca n't used conjunction photography business full resolution photo formats raw files uploaded raw formats wo n't viewable within service web interface apps china brazil amazon drive service limited 5gb storage storage counts space taken photos videos files types customers countries amazon drive n't offer expansion plan neither tier-based unlimited store media files exceeding limited 5gb service supported almost types devices ranging pcs mobiles web application supported common web browsers including internet explorer firefox safari google chrome one create folders organize files rename files move around forth application handle photos better files web app photos videos viewed played whereas files viewable default images sorted date taken photos include basic metadata filename capture date added date filesize pixel dimension amazon drive released desktop application supported mac windows designed drop panel allowing users drag drop files initiate uploading users install application pc mac use application supports one-touch button downloading files cloud restored notably files 2gb uploaded amazon drive desktop clients bulk upload files folders paused cancelled progress amazon drive offers free smartphone application ios android mobile devices mobile application everything web addition automatically backs upload media files mobile device cloud amazon proprietary devices kindle fire fire phone ship free unlimited photo storage similarly backs photos files tablet amazon drive files folders selected downloaded device generate randomized shareable link link directed e-mailed shared social media anyone link access shared files point time future application allow owner break shared link make files private september 2016 amazon drive launched amazon prints u.s. users edit photos order prints photo books application ordered amazon ship print orders customer address similar retail orders service available major amazon marketplaces applications supported multiple languages usage different countries popular languages supported regional variations english spanish french italian simplified chinese japanese amazon drive also built amazon fire tv amazon video application media players smart tvs devices users browse personal photos videos large tv screens view slideshow prime photo users upload unlimited number picture file formats rest formats including video formats counted additional 5gb storage plan additional files exceeding 5gb need stored one opt unlimited storage plan one paid plans depending country unlimited plans files 2gb restricted uploading application desktop application however exempted uploading files greater 2gb size amazon drive streaming available videos longer 20 minutes larger 2 gb stored amazon drive download watch offline unlike popular file hosting services amazon drive offer file-syncing automatic backup web users latest desktop version documents images also shared documents collaborated others downloaded editing however mobile applications support automatic backup capabilities service limits usage personal non-commercial use one may use store transfer distribute content behalf third parties operate file storage application service operate photography business commercial service
|
Distributed computing architecture
|
webdna webdna server-side scripting interpreted language embedded database system specifically designed world wide web primary use creating database-driven dynamic web page applications released 1995 name registered trademark 1998 webdna currently maintained webdna software corporation webdna contains ram-resident database system hybrid in-memory database searching editing capabilities resilient persistent backup ram databases maintained disk webdna code interweave css html/html5 js/ajax allowing mix layout programming server-side client-side scripting instructions allow interact remote servers usually considered easy-to-learn scripting language designed webmasters webdesigners programmers looking quick results webdna made syntax uses square brackets english language example display today date web page simply insert nowiki date /nowiki within html css code want live date appear likewise nowiki time /nowiki show text specific client ip address request 'showif context used showif ipaddress =xxx.xxx.xxx.xxx text /showif webdna tags contexts commands follow similar conventions webdna syntax based simple format webdna instructions based two types parameters included many tags contexts commands example code connects whois server shows information stores permanent database according grant hulbert one pacific coast software founders webcatalog webdna began set c macros help accomplish website graphical tasks webdna evolved general-purpose server-side language special-purpose server-side language designed help create web pages sold stock photography shopping cart features searchable fixed-field database specialized fields storing stock photo information pacific coast software quickly saw value creating web programming language webcatalog began mid-1990s public debut macintosh platform name implies early development focus allowed web master store administrator migrate traditional product catalog online catalog evident 1997 1998 storebuilder webmerchant products allowed user quickly build store front online term webcatalog referred entire product term webdna referred scripting syntax around year 2000 webcatalog pacific coast software purchased smith micro software inc. smith micro software inc. changed name webcatalog webdna point became name referenced aspects product starting release webdna version 4.0 ending version 6.0a years 1999 2004 active years webdna scripting language adopted many national international names including disney chrysler kodak ben jerry pillsbury dough boy shop ncaa final four museum television radio also time development language gained contemporary tools nowiki function /nowiki nowiki scope /nowiki lend modular programming structured programming 2005 2008 perhaps various reasons including success smith micro software products webdna users began lose support smith micro webdna lost users free solutions like php mysql ultimately developers webdna revived language june 2008 formed together organized establish webdna software corporation wsc wsc purchased intellectual property webdna 2009 wsc released new webdna version 6.2 cicada december 2011 fastcgi version webdna engine released version along offering compatibility non-apache installations changes scope webdna server-wide application domain name-specific application means website owner easily install webdna specifically one domain without affecting domains may reside server
|
Programming language topics
|
java bindings opengl java binding opengl api jsr api specification jsr 231 java platform standard edition allows use opengl java software platform also java binding opengl es api jsr 239 java platform micro edition core opengl api glu library calls available java thin wrapper looking much original opengl c api except glu nurbs routines exposed public api platform specific libraries available cgl api mac os x glx x window system wgl microsoft windows also abstracted create platform independent way selecting framebuffer attributes performing platform specific framebuffer operations platform-specific extensions included public api implementation choose export apis via gl.getplatformglextensions gl.getextension string method calls return objects whose data types specific given implementation example shows draw polygon without initialization repaint code reference c implementation translates following java implementation
|
Programming language topics
|
krakout krakout breakout clone released zx spectrum amstrad cpc bbc micro commodore 64 thomson computers msx platforms 1987 one wave enhanced breakout variants emerge wake arkanoid key distinctions gameplay horizontal layout allows player select acceleration characteristics bat playing written andy green rob toone published gremlin graphics music composed ben daglish 1990 dragon gave game 4 5 stars calling one favorites breakout different flavor
|
Computer architecture
|
adf solutions advanced digital forensic solutions inc. adf solutions company based bethesda maryland develops tools scanning suspect computers digital devices order locate extract data process known digital forensics digital forensic tools scan mobile phones computers digital devices collect intelligence evidence crime identify computers contain content relevant investigation tools used digital forensic labs field operatives defense intelligence law enforcement border security government agencies adf produces four forensic triage tools mobile device investigator digital evidence investigator triage-g2 triage-investigator tool targets different kinds users specific scenarios triage-g2 media exploitation medex tool used computers peripheral devices typically deployed usb device military personnel working field usb devices known triage keys prepared advance field selecting specific search criteria users tool require significant technical computer skills triage-g2 currently use several u.s. defense intelligence agencies mobile device investigator provides field investigators rapid evidence collection analysis reporting ios android devices smartphones tablets recover call records messages saved contacts calendar data browsing history download history search terms wifi connections installed applications pictures videos audio files documents police investigators review analyze results immediately make on-scene decisions digital evidence investigator forensic triage tool used computers forensic examiners lab environments location scan suspect devices prioritize full examinations digital evidence investigator use law enforcement agencies worldwide triage-investigator used law enforcement investigators field scan suspect computers evidence crime like triage-g2 users minimal technical experience tool also comes usb key used create field reports developed partnership u.s. department homeland security science technology directorate software used technology employs sets search criteria known captures software allows analysts operators describe specific search exploitation want conduct also used automate recurring categories investigations shared among agencies need according technopedia.com document media exploitation defined extraction translation analysis physical digital documents media generate useful timely information also known domex similar discipline computer forensics digital forensics media exploitation
|
Computer security
|
computer emergency response team computer emergency response team cert expert group handles computer security incidents alternative names groups include computer emergency readiness team computer security incident response team csirt name computer emergency response team first used 1988 cert coordination center cert-cc carnegie mellon university cmu abbreviation cert historic name picked teams around world teams took specific name csirt point task handling computer security incidents instead tech support work cmu threatening take legal action individuals organisations referred team cert-cc cert turn century cmu relaxed position terms cert csirt used interchangeably history certs linked existence malware especially computer worms viruses whenever new technology arrives misuse long following first worm ibm vnet covered shortly worm hit internet 3 november 1988 so-called morris worm paralysed good percentage led formation first computer emergency response team carnegie mellon university u.s. government contract massive growth use information communications technologies subsequent years now-generic term 'cert'/'csirt refers essential part large organisations structures many organisations cert evolves information security operations center first forum incident response security teams global association csirts
|
Computer security
|
ypsilon scheme implementation ypsilon scheme free software implementation r6rs standard scheme implements mostly concurrent garbage collection optimized multi-core cpu systems author yoshikatsu fujita developed ypsilon implementation satisfy need real-time scheme implementation suitable computer game development without giving garbage collected dynamic interpreter
|
Programming language topics
|
mandriva mandriva s.a. public software company specializing linux open-source software corporate headquarters paris development centers metz france curitiba brazil mandriva s.a. developer maintainer linux distribution called mandriva linux well various enterprise software products mandriva founding member desktop linux consortium mandriva s.a. began mandrakesoft 1998 february 2004 following lengthy litigation hearst corporation name mandrake hearst corporation owned comic strip called mandrake magician mandrakesoft required change name following acquisition brazilian linux distribution conectiva february 2005 company name changed 7 april 2005 mandriva reflect names mandrakesoft conectiva october 4 2004 mandrakesoft acquired professional support company edge focused corporate market france 6 employees june 15 2005 mandriva acquired lycoris formerly redmond linux corporation october 5 2006 mandriva signed agreement acquire linbox linux enterprise software infrastructure company agreement included acquisition shares linbox total 1.739 million mandriva stock plus earn 401,000 based 2006 linbox financials 2007 mandriva reached deal government nigeria put operating system 17,000 school computers january 16 2008 mandriva turbolinux announced partnership create lab named manbo-labs share resources technology release common base system companies linux distributions although mandriva operating system eventually became significant entity data center company operating margins thin 2012 company brink bankruptcy january 30 2012 mandriva announced external entity bid rejected minority share holder deal go end first semester 2012 solution situation appeared january year found settlement achieved mandriva subsequently owned several different shareholders mandriva filed administrative receivership early 2015 liquidated may 22 2015 mandriva linux distribution continues survive openmandriva lx notable forks include mageia linux rosa linux addition selling linux distributions online store authorized resellers mandriva previously sold subscriptions mandriva club several levels membership costs ranging us 66 €60 per year 2007 €600 per year club members gained access club website additional mirrors torrents downloading free downloads boxed products depending membership level interim releases mandriva linux distribution additional software updates example gold-level higher members could download powerpack+ editions many mandriva commercial products came short-term membership club however mandriva linux completely usable without club membership mandriva linux 2008.0 released october 2007 mandriva made club membership free charge comers splitting download subscriptions separate service mandriva also mandriva corporate club larger organizations
|
Operating systems
|
oracle toplink oracle toplink mapping persistence framework java developers toplink produced oracle part oracle oracleas weblogic oc4j servers object-persistence object-transformation framework toplink provides development tools run-time functionalities ease development process help increase functionality persistent object-oriented data stored relational databases helps build high-performance applications storing data either xml extensible markup language relational databases made possible transforming object-oriented data rich user-interface possible toplink help toplink mapping workbench mapping workbench makes possible carry following ease oracle jdeveloper ide provides easy integration functionalities provided mapping workbench use toplink users stay focused primary cause let toplink handle integration persistence object transformation application designing implementing deploying process accelerated toplink supports variety data sources formats relational database object-relational database enterprise information system eis xml many others toplink originally developed object people smalltalk ported java 1996-1998 called toplink java 2002 toplink acquired oracle corporation developed oracle fusion middleware product toplink code donated eclipse foundation eclipselink project born 2007 eclipselink provides functionality toplink sun microsystems selected eclipselink march 2008 implementation jpa 2.0 jsr 317 reference number versions toplink released since latest version 12c 12.1.3 available free download runtime component toplink provided eclipselink core api provides direct access runtime embedded application persistence behavior enabled making application calls invoke eclipselink api perform functionalities provides safe access shared databases import following class use extended functionality eclipselink binding java classes xml schemas possible help object-xml eclipselink component implementing jaxb mapping information provided annotations also provides manipulation xml service data objects sdo provides use sdo api use dynamic objects customize manipulate xml use static data objects conversion xml schema database web services dbws facilitates access relational databases help web service database access made without need write java code xml soap messages databases connected runtime component dbws uses eclipselink toplink grid integration mechanism provides connection oracle coherence eclipselink application generally interacts relational database primary database toplink application store data coherence grid called jpa grid toplink grid functionality used user license oracle coherence functionality provided get support toplink grid eclipselink users also need import following package classes database operations like insert update delete also performed toplink changes made database reflected oracle coherence cache java persistence api entity persistence class using toplink number performance features writing large amounts data implemented batch writing stored procedure support parameter binding statement ordering features offered satisfy database constraints basic operations entitymanager method persist object entity used add instance marks insertion database completion transaction codice_1 data inserted database updating entity means simply reading transaction updating properties entity updating employee lastname done follows deleting entity opposite insertion one using codice_2 method entitymanager.the entitymanager method codice_3 deletes entity completion transaction users use tools market use toplink along following toots provide special integration toplink
|
Databases
|
dimension data dimension data company specialising information technology services based johannesburg south africa company maintains operations every inhabited continent dimension data focuses services including consulting technical support services managed services company official technology partner tour de france vuelta españa also sponsors team name 2010 company fully acquired nippon telegraph telephone ntt 1 july 2019 dimension data operations excluding middle east africa became part ntt ltd. dimension data founded 1983 keith mclachlan werner sievers jeremy ord peter neale kevin hamilton company listed johannesburg stock exchange 15 july 1987 jeremy ord appointed company executive chairman year position continued hold 2016 1991 company became official south african distributor cisco systems 1993 company expanded botswana 1995 1997 began expansion asia pacific region 1996 dimension data purchased 45 stake australian company comtech would later buyout company fully 2000 company also bought stake south african company internet solutions 1996 dimension data would increase stake company following year also 1997 company purchased majority stakes merchants group datacraft 1998 2000 company focused expansion efforts northern hemisphere investing acquiring variety companies europe united kingdom united states one acquisition 1998 purchase london-based telecommunications company plessey 31 july 2000 dimension data listed london stock exchange raising 1.25 billion process 2003 company revenue jumped 2 billion 2004 brett dawson appointed ceo company jeremy ord appointed group executive chairman next 6 years company expanded africa middle east south america september 2009 company annual revenue around 4 billion july 2010 dimension data acquired nippon telegraph telephone ntt £2.1 billion 3.2 billion october year ntt announced dimension data would delisted johannesburg stock exchange london stock exchange end year next years dimension data continued acquiring integrating businesses like opsource nextiraone oakton june 2016 brett dawson stepped ceo replaced coo jason goodall time dimension data maintained 31,000 staff 58 countries across 6 inhabited continents annual revenue company 7.5 billion 1 july 2019 majority dimension data became part ntt ltd. along ntt security ntt communications however brand continues operate middle east africa grant bodley ceo dimension data current subsidiaries include accesskenya group alwayson continuitysa e2y commerce earthwave euricom internet solutions jq network merchants nexus oakton plessey security assessment sql services training partners viiew early acquisitions included australian companies comtech internet solutions 1996 merchants datacraft acquired year later 2000 company purchased plessey joint venture worldwide african investment holdings sql services acquired 2008 nippon telegraph telephone purchased company 2010 dimension data began adding subsidiaries fold include e2y commerce award-winning digital experience commerce marketplace consultancy sap cx hybris mirakl earthwave information communications technology specialist based australia cosuses cybersecurity umbrella dimension data 2013 accesskenya nexus 2014 nexus acquisition nearly doubled dimension data presence united states dimension data subsidiaries like alwayson continuitysa first acquired fellow subsidiary internet solutions dimension data provides information technology products services data centers security network integration converged communications microsoft support company placing primary focus four service areas include digital infrastructure hybrid cloud workspaces tomorrow cybersecurity addition offering sale physical data centers provides operation management transformation relocation data centers dimension data also manages operates servers storage provides backup services case damage disaster 2016 association amaury sports organization dimension data overhauled digital infrastructure tour de france company added big data upgrades allowed new technologies like data capture race coordination improved graphics analytics dimension data provides public private cloud computing servers also offer hybrid cloud customers choose resources public private data stored customer servers dimension data servers company operates locations including johannesburg sydney london dimension data provides cybersecurity businesses enterprise scale includes infrastructure security governance compliance risk assessment variety cybersecurity services also offers services mobile security data leakage prevention march 2013 dimension data named leader green quadrant® sustainable technology services report verdantix dimension data named along seven companies dedicated sustainability practice wide range capabilities strong track record corporate sustainability april 2015 dimension data honored three separate cisco partner year awards three different regions following year company 2016 microsoft country partner year award rwanda tanzania regions along communications partner year cloud productivity partner year global arena 3 may 2015 amaury sports organisation aso signed five-year deal dimension data dimension data official technology partner cycling events part deal dimension data provides telemetrics including gps positioning speed real time september 2015 company also became sponsor former mtn-qhubeka becoming team dimension data qhubeka
|
Distributed computing architecture
|
list data-erasing software list utilities performing data erasure
|
Computer security
|
information security operations center information security operations center isoc soc facility enterprise information systems web sites applications databases data centers servers networks desktops endpoints monitored assessed defended soc related people processes technologies provide situational awareness detection containment remediation threats soc handle behalf institution company threatening incident ensure properly identified analyzed communicated investigated reported soc also monitors applications identify possible cyber-attack intrusion event determines genuine malicious threat incident could affect business establishing operating soc expensive difficult organisations need good reason may include security operations center soc also called security defense center sdc security analytics center sac network security operations center nsoc security intelligence center cyber security center threat defense center security intelligence operations center sioc canadian federal government term infrastructure protection center ipc used describe soc socs typically based around security information event management siem system aggregates correlates data security feeds network discovery vulnerability assessment systems governance risk compliance grc systems web site assessment monitoring systems application database scanners penetration testing tools intrusion detection systems ids intrusion prevention system ips log management systems network behavior analysis cyber threat intelligence wireless intrusion prevention system firewalls enterprise antivirus unified threat management utm siem technology creates single pane glass security analysts monitor enterprise soc staff includes analysts security engineers soc managers seasoned networking professionals usually trained computer engineering cryptography network engineering computer science may credentials cissp giac soc staffing plans range eight hours day five days week 8x5 twenty four hours day seven days week 24x7 shifts include least two analysts responsibilities clearly defined large organizations governments may operate one soc manage different groups information communication technology provide redundancy event one site unavailable soc work outsourced instance using managed security service term soc traditionally used governments managed computer security providers although growing number large corporations organizations also centers soc network operations center noc complement work tandem noc usually responsible monitoring maintaining overall network infrastructure primary function ensure uninterrupted network service soc responsible protecting networks well web sites applications databases servers data centers technologies likewise soc physical security operations center coordinate work together physical soc facility large organizations security staff monitor control security officers/guards alarms cctv physical access lighting vehicle barriers etc every soc role three different focus areas soc may active combined combination cases soc noc physical soc may housed facility organizationally combined especially focus operational tasks soc originates cert organisation focus usually monitoring control case soc operates independently noc maintain separation duties typically larger organizations maintain separate soc ensure focus expertise soc collaborates closely network operations physical security operations socs usually well protected physical electronic computer personnel security centers often laid desks facing video wall displays significant status events alarms ongoing incidents corner wall sometimes used showing news weather tv channel keep soc staff aware current events may affect information systems security engineer security analyst may several computer monitors desk processes procedures within soc clearly spell roles responsibilities well monitoring procedures processes include business technology operational analytical processes lay steps taken event alert breach including escalation procedures reporting procedures breach response procedures cloud security operations center cloudsoc may set monitor cloud service use within enterprise keep shadow problem control parse audit infrastructure application logs via siem technologies machine data platforms logrhythm splunk ibm qradar arctic wolf networks assuria hp arcsight cybershark elastica provide alerts details suspicious activity smart soc security operations center comprehensive technology agnostic cybersecurity solution utilizes leading-edge technology tools highly skilled experienced human talent composed cyber intelligence gatherers analysts security experts proactive cyberwarfare principles prevent neutralize threats organization ’ digital infrastructure assets data addition many commonly referenced terms related original isoc title including following
|
Computer security
|
license program product license program product lpp aix terminology referring complete software product collection including one packages filesets
|
Operating systems
|
io programming language io pure object-oriented programming language inspired smalltalk self lua lisp act1 newtonscript io prototype-based object model similar ones self newtonscript eliminating distinction instance class like smalltalk everything object uses dynamic typing like lisp programs data trees io uses actors concurrency remarkable features io minimal size openness using external code resources io executed small portable virtual machine language created steve dekorte 2002 trying help friend dru nelson language cel found really n't know much languages worked set write tiny language understand problems better io goal explore conceptual unification dynamic languages tradeoffs tend favor simplicity flexibility performance simplest form composed single identifier assuming dostuff method called zero arguments result explicit parentheses required dostuff arguments would look like io message passing language since everything io message excluding comments message sent receiver example demonstrates well fully describe point better let look next example example demonstrates message passing io version message sent system object operators special case syntax cut-and-dried examples io parser intercepts set operators defined interpreter translates method calls example following translates see also little bit operator precedence happening precedence levels c precedence levels operators also turned method calls fact operators io methods fact require explicit parentheses convenience io two ways creating anonymous functions methods blocks almost identical except scope blocks lexical scope methods dynamic scope method block higher-order functions ubiquitous hello world program new objects created cloning objects io specifically new empty object created differences parent stored within new object behavior known differential inheritance example behavior shown simple non-recursive factorial function io assignment codice_1 codice_2 last action taken function implicitly returns result explicit return expression needed demonstrates usage ranges n't use codice_3 loop would faster
|
Programming language topics
|
apple a7 apple a7 64-bit system chip soc designed apple inc first appeared iphone 5s introduced september 10 2013 apple states twice fast twice graphics power compared predecessor apple a6 first 64-bit arm cpu first ship consumer smartphone tablet computer software updates systems using chip cease late 2019 ios 13 support iphone 5s ipados 13 support ipad air mini 2 3 a7 features apple-designed 64-bit 1.3–1.4 ghz armv8-a dual-core cpu called cyclone 64-bit a64 instruction set armv8-a architecture doubles number registers a7 compared armv7 architecture used a6 31 general purpose registers 64-bits wide 32 floating-point/neon registers 128-bits wide a7 also integrates graphics processing unit gpu anandtech believes powervr g6430 four cluster configuration a7 per-core l1 cache 64 kb data 64 kb instructions l2 cache 1 mb shared cpu cores 4 mb l3 cache services entire soc a7 includes new image processor feature originally introduced a5 used functionality related camera image stabilizing color correction light balance a7 also includes area called secure enclave stores protects data touch id fingerprint sensor iphone 5s ipad mini 3 speculated security data secure enclave enforced arm trustzone/securcore technology change apple a6 a7 soc longer services accelerometer gyroscope compass order reduce power consumption functionality moved new m7 motion coprocessor appears separate arm-based microcontroller nxp semiconductors apple uses apl0698 variant a7 chip running 1.3 ghz iphone 5s ipad mini 2 ipad mini 3 a7 manufactured samsung high-κ metal gate hkmg 28 nm process chip includes 1 billion transistors die 102 mm size according abi research a7 drew 1100 fixed point operations 520 floating point operations predecessor a6 processor iphone 5 drew 485 320 manufactured package package pop together 1 gb lpddr3 dram 64-bit wide memory interface onto package apple uses apl5698 variant a7 chip running 1.4 ghz,1.4 ipad air die identical size layout first a7 manufactured samsung however unlike first version a7 a7 used ipad air pop stacked ram instead uses chip-on-board mounting immediately adjacent dram covered metallic heat spreader similar apple a5x a6x a7 branch predictor claimed infringe 1998 patent october 14 2015 district judge found apple guilty infringing u.s. patent table based data speculation circuit parallel processing computer apple a7 a8 processors patent owned wisconsin alumni research foundation warf firm affiliated university wisconsin july 24 2017 apple ordered pay warf 506 million patent infringement apple filed appellate brief october 26 2017 u.s. court appeals federal circuit argued apple infringe patent owned wisconsin alumni research foundation september 28 2018 ruling overturned appeal award thrown u.s. federal circuit court appeals patent expired december 2016 images illustrations
|
Computer architecture
|
sun cloud sun cloud on-demand cloud computing service operated sun microsystems prior acquisition oracle corporation sun cloud compute utility provided access substantial computing resource internet us 1 per cpu-hour launched sun grid march 2006 based supported open source technologies solaris 10 sun grid engine java platform sun cloud delivered enterprise computing power resources internet enabling developers researchers scientists businesses optimize performance speed time results accelerate innovation without investment infrastructure early 2010 oracle announced discontinuing sun cloud project since sunday march 7 2010 network.com web site inaccessible typical application could run compute utility fit following parameters resources collections files contain user data executable jobs compute utility concept define elements unit work submitted sun cloud compute utility major elements job include name shell script controlling program execution required arguments shell script list resources must place job run run specific instantiation job description submitted sun cloud compute utility runs occur job submitted compute utility execution job one submits runs cloud sun cloud cpu usage aggregated rounded nearest whole hour example job used 1000 cpus one minute would aggregated 1000 cpu minutes 16.67 cpu hours software rounds 17 hours job would billed us 17 march 13 2007 sun announced launch application catalog online service allows developers isvs develop publish applications enabling communities scientists academics life sciences education engineering fields accelerate innovation complete research projects quickly less expensively network.com application catalog gives users immediate online access popular isv open-source applications easy-to-use web portal contractual obligation users upload run applications create personal library favorites take advantage pre-installed configured applications giving instant productivity portal gives everything need conduct analysis complete complex computational tasks help speed scientific discovery shorten time market new products simply select application upload data get results fast network.com enables anyone publish applications application catalog take advantage powerful solaris 10-based cloud platform users publish applications private library access whenever want also share applications others retaining data securely private space applications available catalog include category examples types suitable applications include
|
Distributed computing architecture
|
snapshot isolation databases transaction processing transaction management snapshot isolation guarantee reads made transaction see consistent snapshot database practice reads last committed values existed time started transaction successfully commit updates made conflict concurrent updates made since snapshot snapshot isolation adopted several major database management systems interbase firebird oracle mysql postgresql sql anywhere mongodb microsoft sql server 2005 later main reason adoption allows better performance serializability yet still avoids concurrency anomalies serializability avoids always practice snapshot isolation implemented within multiversion concurrency control mvcc generational values data item versions maintained mvcc common way increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object snapshot isolation used criticize ansi sql-92 standard definition isolation levels exhibits none anomalies sql standard prohibited yet serializable anomaly-free isolation level defined ansi spite distinction serializability snapshot isolation sometimes referred serializable oracle transaction executing snapshot isolation appears operate personal snapshot database taken start transaction transaction concludes successfully commit values updated transaction changed externally since snapshot taken write-write conflict cause transaction abort write skew anomaly two transactions t1 t2 concurrently read overlapping data set e.g values v1 v2 concurrently make disjoint updates e.g t1 updates v1 t2 updates v2 finally concurrently commit neither seen update performed system serializable anomaly would impossible either t1 t2 would occur first visible contrast snapshot isolation permits write skew anomalies concrete example imagine v1 v2 two balances held single person phil bank allow either v1 v2 run deficit provided total held never negative i.e v1 v2 ≥ 0 balances currently 100 phil initiates two transactions concurrently t1 withdrawing 200 v1 t2 withdrawing 200 v2 database guaranteed serializable transactions simplest way coding t1 deduct 200 v1 verify v1 v2 ≥ 0 still holds aborting t2 similarly deducts 200 v2 verifies v1 v2 ≥ 0 since transactions must serialize either t1 happens first leaving v1 100 v2 100 preventing t2 succeeding since v1 v2 200 200 t2 happens first similarly prevents t1 committing database snapshot isolation mvcc however t1 t2 operate private snapshots database deducts 200 account verifies new total zero using account value held snapshot taken since neither update conflicts commit successfully leaving v1 v2 100 v1 v2 200 systems built using multiversion concurrency control mvcc may support snapshot isolation allow transactions proceed without worrying concurrent operations importantly without needing re-verify read operations transaction finally commits convenient mvcc maintains series recent history consistent states information must stored transaction list updates made scanned conflicts fairly easily committed however mvcc systems marklogic use locks serialize writes together mvcc gain performance gains still support stronger serializability level isolation potential inconsistency problems arising write skew anomalies fixed adding otherwise unnecessary updates transactions order enforce serializability property example materialize conflict adding new table makes hidden constraint explicit mapping person total balance phil would start total balance 200 transaction would attempt subtract 200 creating write-write conflict would prevent two succeeding concurrently however approach violates normal form alternatively promote one transaction reads write instance t2 could set v1 v1 creating artificial write-write conflict t1 preventing two succeeding concurrently solution may always possible general therefore snapshot isolation puts problem maintaining non-trivial constraints onto user may appreciate either potential pitfalls possible solutions upside transfer better performance snapshot isolation called serializable mode oracle postgresql versions prior 9.1 may cause confusion real serializability mode arguments decision clear users must aware distinction avoid possible undesired anomalous behavior database system logic snapshot isolation arose work multiversion concurrency control databases multiple versions database maintained concurrently allow readers execute without colliding writers system allows natural definition implementation isolation level interbase later owned borland acknowledged provide si rather full serializability version 4 likely permitted write-skew anomalies since first release 1985 unfortunately ansi sql-92 standard written lock-based database mind hence rather vague applied mvcc systems berenson et al wrote paper 1995 critiquing sql standard cited snapshot isolation example isolation level exhibit standard anomalies described ansi sql-92 standard yet still anomalous behaviour compared serializable transactions 2008 cahill et al showed write-skew anomalies could prevented detecting aborting dangerous triplets concurrent transactions implementation serializability well-suited multiversion concurrency control databases adopted postgresql 9.1 referred serializable snapshot isolation abbreviated ssi used consistently eliminates need workarounds downside snapshot isolation increase aborted transactions perform better worse snapshot isolation workarounds depending workload 2011 jimenez-peris et al filed patent shown possible scale many millions update transactions per second new method attaining snapshot isolation distributed manner method based observation becomes possible commit transactions fully parallel without coordination therefore removing bottleneck traditional transactional processing methods method uses commit sequencer generates commit timestamps snapshot server advances current snapshot gaps filled serialization order method base database leanxcale first implementation method made 2010 part cumulonimbo european project
|
Databases
|
ixsystems ixsystems inc. privately owned american computer technology company based san jose california develops sells supports computing storage products services principal products customized open source freebsd distributions including desktop operating system trueos formerly pc-bsd file servers network attached storage systems freenas truenas also markets hardware platforms products develops enterprise-scale storage architectures converged architectures part activities company strong ties freebsd community repeatedly donated hardware support fledgling projects within bsd community sponsors develops development within freebsd well sponsor attendee open-source community events ixsystems founded 1991 berkeley software design inc. bsdi later bsdi rick adams members university california berkeley computer systems research group csrg including keith bostic kirk mckusick mike karels bill jolitz donn seeley year 2000 berkeley software design inc. acquired enterprise server manufacturer telenet system solutions inc. founded 1996 operated san jose california office manufacturing facility ixsystems operates today 2001 bsdi sold operating systems business wind river systems spun hardware business ixtreme line servers ixsystems inc 2002 offmyserver inc. owned two bsdi employees acquired ixsystems inc. operated offmyserver inc. restoring ixsystems name 2005 2006 ixsystems adopted pc-bsd project hired founder kris moore 2007 ixsystems acquired freebsd mall inc. reuniting portions original bsdi spun wind river systems 2009 ixsystems negotiated continue freenas project developers decided move debian linux ixsystems introduced comprehensive rewrite freenas 2011 provides platform freenas mini smb nas arrays truenas enterprise storage arrays august 2010 bsd author dru lavigne joined ixsystems july 2013 jordan k. hubbard one founders freebsd project joined ixsystems cto ixsystems designs sells supports custom x86 servers workgroups data centers focus support freebsd operating system company relies partnerships hardware vendors intel supermicro western digital lsi corporation combined on-staff freebsd developers ixsystems servers subjected three-day burn-in process reduce returns available linux alternative operating system freenas project originally launched third party developers october 2005 aimed create open source network attached storage system based freebsd 6.0 september 2009 development team concluded project release 0.7 required complete rewrite accommodate modern features plug-in architecture project gradually forked new version based debian linux existing version transferred ixsystems rewrote new architecture based freebsd 8.1 releasing freenas 8 beta november 2010 november 19 2010 ixsystems released freenas 8 beta first release popular free open-source software-defined storage project adopted rewrote freenas based freebsd operating system openzfs file system aug 3 2011 ixsystems introduced truenas line enterprise storage arrays network-attached storage nas system storage area network san device supports smb afp nfs iscsi ssh rsync ftp/tftp sharing protocols ethernet fibre channel network fabrics truenas also supports vendor-certified protocols including vmware vaai microsoft csv odx vss veeam custom tool-less enclosure provides truenas high availability using dual controllers four user-serviceable components disks power supplies fans controllers truenas uses openzfs file system hybrid all-flash configurations 4.8 petabytes raw capacity ixsystems freenas certified line small medium-sized enterprise storage arrays designed run freenas storage operating system available 1u 2u 4u configurations ixsystems freenas mini line soho storage arrays designed run freenas storage operating system available 4 bay 8 bay configurations
|
Operating systems
|
hd loader hd loader program playstation 2 video game console allows users play games installed optional hard drive peripheral via playstation 2 network adaptor games copied hard drive within program using computer image dumping software outputs specific custom format hd loader software require original sony hard drive function properly however drives may impossible attach without modifying connectors games may also refuse detect drive unofficial sony public stance hd loader supported illegal enable game piracy allowing games installed played later without owning disc october 2006 federal court california ordered defendants pay excess 9 million damages digital millennium copyright act violations selling hd loader clone patched version official version sold hd advance still manufactured purchased many online retailers hd loader 100 compatible ps2 games incompatibilities exist game software depends certain peculiarities ps2 drive hardware additional incompatibilities arise use dual-layer dvds ps2 games sometimes parsed properly hd loader incidentally dual-layer games installed pc 0.8c possible install hd loader finally intentional impediments introduced recent high-profile ps2 titles god war gran turismo 4 prevent executed hard drive response limitations hd loader number independent programmers developed patches extend functionality hd loader improve game compatibility different software entirely e.g. openps2loader include fix improve dual-layer support one implement non-aligned data buffer allows gradius v played hd one defeat newer copy-protection measures popularly known god war fix one support new slimline scph-70000 series playstation 2 hardware one implement 48-bit logical block addressing allows hd loader take full advantage hard drives larger 137 gb 128 gib reported hd loader 0.7c hard drives 2 terabytes used unofficial patches accumulated hd loader release known 0.8b unofficial hd loader currently version 0.8c april 2007 version 0.8c continues support 48-bit 2 terabyte hard drives patches god war ii 3 modes support installing running dual layer games directly hard drive games need patched order played hd loader another may require using tricks starting game older digital controller switching dualshock 2 refuse install according ps2hd.com compatibility rate patched hd loader around 88.2 original playstation games compatible method official hd loader extracted released internet retaliation free library files used creation 0.6d first unofficial version improved game compatibility 0.7c fix suikoden v patches 48bit hdds 2 terabytes dma modes udma/mdma dvd9 fix allow dual layer games played added stable gui patching app created allowed one choose patches various edits apply official unpatched version updated compatibility menu added 0.7e patches fixed shadow colossus super monkey ball added version enabled playing many previously incompatible games updated compatibility menu changed modes description 0.8 patch fixed ability edit dma button configuration 0.8b fixes bug hdl0.8 installing hdds 128 gb minor errors updated compatibility menu 0.8b+ patch fixed god war ii added version known different names author rename version additionally patch breaks support 0.8c fix buffer alignment added gui patcher app made gow2 gta lcs run without crashing current version unofficial releases run console modchip installed using exploit free mcboot ps2 independence exploit hd advance cloned version hd loader software playstation 2 allow users play games installed optional hard drive peripheral available ps2 hd advance identical functionality many patched versions hd loader freely available online include dvd-9 support 48-bit hard drive addressing different theme changed text strings benefit hd advance distributed pressed disk giving patched version hd loader run console without modchip installed also without need ps2 independence exploit software modification however players using hd advance 2.0 retail pressed discs cd dvd format maxtor hard disk 80 gb capacity subsequently use disc play ps2 games hdd reported experiencing strange problem hd loader versions 0.7c boot perfectly via independence exploit subsequent versions hd loader 0.8 onwards freezes splash screen refuses start formatted hd advance disc possibly due newer patches hd advance discs solution reformat hard disk hd loader version 0.8 higher recommended newer ps2 games however confirmed work 100 across board certain ps2 models mainly pal 7xxx consoles reported still freeze splash screen currently-unfixable problem related hd loader version 0.8 higher pal single-port network adapter models main problem open ps2 loader abbreviated opl open-source program allows playing commercial games homebrew installed external storage devices support hard disk drive like hd loader usb like hd advance smb network also additional features like gsm feature used disable videos change resolution game output virtual memory cards allowing save usb hdd smb usage dualshock3 controller usb bluetooth using dongle cheat engine interface open ps2 loader customized themes developed version control since september 27 2009
|
Computer architecture
|
cross-domain interoperability cross-domain interoperability exists organizations systems different domains interact information exchange services and/or goods achieve common goals interoperability method systems working together inter-operate domain instance community related infrastructure bound common purpose interests consistent mutual interactions rules engagement separable communities social technical linguistic professional legal sovereignty related boundaries capability cross-domain interoperability becoming increasingly important business government operations become global interdependent cross-domain interoperability enables synergy extends product utility enables users effective successful within domains combined effort cross-domain interoperability characterized common understanding agreements sides domain boundary enable individual organizations tailor make products assets services interoperable within larger community participant accepts enforces use mutual domain-wide worldwide standards interface protocols consequently cross-domain interfaces may control single element authority -- unlike integrated system-of-systems environment one domain authority may control interfaces used domains two examples activities benefit information systems interoperable across domains disaster response work 2013 typhoon relief philippines multi-national peacekeeping missions allied forces support france 2012-2013 conflict mali another effort cross-domain interoperability critical overall success implementation u.s affordable care act federal state governments insurance companies healthcare providers perform individual functions using variety networks divergent computer platforms – interoperable environment enable participants different domains effectively exchange information perform essential services protecting privacy rights individual patients exchange healthcare-related community begun focus establishing cross-domain interoperability yet large-scale basis cloud computing promotes communication collaboration connecting internet migrating information cloud group clouds guarantee cross-domain interoperability organizations connected internet mean cross-domain interoperability automatically happens eliminating technological barriers enabling information sharing collaboration involves designing building computer programs environments interoperate also cooperative agreements place regarding management administrative policies governing issues security user identification trust information assurance internal policies government regulations also impact either promote impede cross-domain interoperability establish cross-domain interoperability needs spirit cooperation among different participants domains must agreed-to standards translations interface conversions enable entity exchange information extract data needs order perform role contribute knowledge adds value overall mission number organizations businesses institutions work technology policies make cross-domain interoperability reality including national institute standards technology united states department defense nato network centric operations industry consortium ncoic ncoic number resources government industry foster cross-domain interoperability including open process ncoic rapid response capability nrrc™ first designed national geospatial-intelligence agency
|
Computer architecture
|
replay system replay system little-known subsystem within intel pentium 4 processor primary function catch operations mistakenly sent execution processor scheduler operations caught replay system re-executed loop conditions necessary proper execution fulfilled replay system came result intel quest ever-increasing clock speeds higher clock speeds necessitated lengthy pipelines 31 stages prescott core six stages scheduler execution units prescott core attempt maintain acceptable performance intel engineers design scheduler optimistic scheduler pentium 4 processor aggressive send operations execution without guarantee successfully executed among things scheduler assumes data level 1 trace cache cpu cache common reason execution fails requisite data available likely due cache miss happens replay system signals scheduler stop repeatedly executes failed string dependent operations completed successfully surprisingly cases replay system bad impact performance normal circumstances execution units pentium 4 use roughly 33 time replay system invoked occupy execution units nearly every available cycle wastes power increasingly important architectural design metric poses performance penalty execution units would sitting idle anyway however hyper-threading use replay system prevent thread utilizing execution units true cause performance degradation concerning hyper-threading prescott pentium 4 gained replay queue reduces time replay system occupy execution units cases thread processing different types operations replay system interfere performance increase appear explains performance hyper-threading application-dependent
|
Computer architecture
|
insteon company insteon irvine ca-based developer home automation aka domotics hardware software technology also called insteon allows light switches lights thermostats motion sensors electrical devices interoperate power lines radio frequency rf communications company produces 200 products featuring technology insteon subsidiary smartlabs inc. also based irvine ca insteon founded 2005 irvine ca ceo joe dada dada previously founded smarthome 1992 home automation product catalog company operator smarthome.com e-commerce site late 1990s dada acquired two product engineering firms undertook extensive product development efforts create networking technology based power-line rf communications 2004 company filed patent protection resultant technology called insteon released 2005 2012 company released first network-controlled light bulb using insteon-enabled technology point dada spun insteon smarthome insteon technology uses dual-mesh networking topology devices peers device independently transmits receives repeats messages insteon produces 200 products using technology including led bulbs wall switches wall keypads sensors thermostats plug modules embedded devices along central controllers system management insteon markets two different central controllers brand called insteon hub newer homekit-enabled insteon hub pro designed apple homekit compatibility 2012 company introduced first network-controlled led light bulb
|
Distributed computing architecture
|
biometrics biometrics technical term body measurements calculations refers metrics related human characteristics biometrics authentication realistic authentication used computer science form identification access control also used identify individuals groups surveillance biometric identifiers distinctive measurable characteristics used label describe individuals biometric identifiers often categorized physiological versus behavioral characteristics physiological characteristics related shape body examples include limited fingerprint palm veins face recognition dna palm print hand geometry iris recognition retina odour/scent behavioral characteristics related pattern behavior person including limited typing rhythm gait voice researchers coined term behaviometrics describe latter class biometrics traditional means access control include token-based identification systems driver license passport knowledge-based identification systems password personal identification number since biometric identifiers unique individuals reliable verifying identity token knowledge-based methods however collection biometric identifiers raises privacy concerns ultimate use information many different aspects human physiology chemistry behavior used biometric authentication selection particular biometric use specific application involves weighting several factors jain et al 1999 identified seven factors used assessing suitability trait use biometric authentication proper biometric use application dependent certain biometrics better others based required levels convenience security single biometric meet requirements every possible application block diagram illustrates two basic modes biometric system first verification authentication mode system performs one-to-one comparison captured biometric specific template stored biometric database order verify individual person claim three steps involved verification person first step reference models users generated stored model database second step samples matched reference models generate genuine impostor scores calculate threshold third step testing step process may use smart card username id number e.g pin indicate template used comparison 'positive recognition common use verification mode aim prevent multiple people using identity second identification mode system performs one-to-many comparison biometric database attempt establish identity unknown individual system succeed identifying individual comparison biometric sample template database falls within previously set threshold identification mode used either 'positive recognition user provide information template used 'negative recognition person system establishes whether person implicitly explicitly denies latter function achieved biometrics since methods personal recognition passwords pins keys ineffective first time individual uses biometric system called enrollment enrollment biometric information individual captured stored subsequent uses biometric information detected compared information stored time enrollment note crucial storage retrieval systems secure biometric system robust first block sensor interface real world system acquire necessary data times image acquisition system change according characteristics desired second block performs necessary pre-processing remove artifacts sensor enhance input e.g removing background noise use kind normalization etc third block necessary features extracted step important step correct features need extracted optimal way vector numbers image particular properties used create template template synthesis relevant characteristics extracted source elements biometric measurement used comparison algorithm discarded template reduce filesize protect identity enrollee enrollment phase template simply stored somewhere card within database matching phase obtained template passed matcher compares existing templates estimating distance using algorithm e.g hamming distance matching program analyze template input output specified use purpose e.g entrance restricted area selection biometrics practical application depending upon characteristic measurements user requirements selecting particular biometric factors consider include performance social acceptability ease circumvention and/or spoofing robustness population coverage size equipment needed identity theft deterrence selection biometric based user requirements considers sensor device availability computational time reliability cost sensor size power consumption multimodal biometric systems use multiple sensors biometrics overcome limitations unimodal biometric systems instance iris recognition systems compromised aging irises electronic fingerprint recognition worsened worn-out cut fingerprints unimodal biometric systems limited integrity identifier unlikely several unimodal systems suffer identical limitations multimodal biometric systems obtain sets information marker i.e. multiple images iris scans finger information different biometrics requiring fingerprint scans using voice recognition spoken passcode multimodal biometric systems fuse unimodal systems sequentially simultaneously combination thereof series refer sequential parallel hierarchical serial integration modes respectively fusion biometrics information occur different stages recognition system case feature level fusion data features extracted multiple biometrics fused matching-score level fusion consolidates scores generated multiple classifiers pertaining different modalities finally case decision level fusion final results multiple classifiers combined via techniques majority voting feature level fusion believed effective levels fusion feature set contains richer information input biometric data matching score output decision classifier therefore fusion feature level expected provide better recognition results spoof attacks consist submitting fake biometric traits biometric systems major threat curtail security multi-modal biometric systems commonly believed intrinsically robust spoof attacks recent studies shown evaded spoofing even single biometric trait following used performance metrics biometric systems early cataloguing fingerprints dates back 1891 juan vucetich started collection fingerprints criminals argentina josh ellenbogen nitzan lebovic argued biometrics originated identification systems criminal activity developed alphonse bertillon 1853–1914 francis galton theory fingerprints physiognomy according lebovic galton work led application mathematical models fingerprints phrenology facial characteristics part absolute identification key inclusion exclusion populations accordingly biometric system absolute political weapon era form soft control theoretician david lyon showed past two decades biometric systems penetrated civilian market blurred lines governmental forms control private corporate control kelly gates identified 9/11 turning point cultural language present language cultural studies aftermath 9/11 moment articulation objects events necessary connection come together new discourse formation established automated facial recognition homeland security technology kelly gates biometric future facial recognition technology culture surveillance new york 2011 p. 100 adaptive biometric systems aim auto-update templates model intra-class variation operational data two-fold advantages systems solving problem limited training data tracking temporal variations input data adaptation recently adaptive biometrics received significant attention research community research direction expected gain momentum key promulgated advantages first adaptive biometric system one longer needs collect large number biometric samples enrollment process second longer necessary enrol retrain system scratch order cope changing environment convenience significantly reduce cost maintaining biometric system despite advantages several open issues involved systems mis-classification error false acceptance biometric system cause adaptation using impostor sample however continuous research efforts directed resolve open issues associated field adaptive biometrics information adaptive biometric systems found critical review rattani et al recent times biometrics based brain electroencephalogram heart electrocardiogram signals emerged research group university kent led ramaswamy palaniappan shown people certain distinct brain heart patterns specific individual another example finger vein recognition using pattern-recognition techniques based images human vascular patterns advantage 'futuristic technology fraud resistant compared conventional biometrics like fingerprints however technology generally cumbersome still issues lower accuracy poor reproducibility time new generation biometrical systems called biometrics intent aims scan intent technology analyze physiological features eye movement body temperature breathing etc predict dangerous behaviour hostile intent materializes action portability side biometric products vendors embracing significantly miniaturized biometric authentication systems bas thereby driving elaborate cost savings especially large-scale deployments operator signature biometric mode manner person using device complex system recorded verification template one potential use type biometric signature distinguish among remote users telerobotic surgery systems utilize public networks communication john michael mike mcconnell former vice admiral united states navy former director u.s. national intelligence senior vice president booz allen hamilton promoted development future capability require biometric authentication access certain public networks keynote speech 2009 biometric consortium conference basic premise proposal person uniquely authenticated using biometrics computer fact also agent performing potentially malicious actions computer however control computer subverted example computer part botnet controlled hacker knowledge identity user terminal materially improve network security aid law enforcement activities recently another approach biometric security developed method scans entire body prospects guarantee better identification prospect method globally accepted complex prospects concerned privacy rather tags tattoos biometric techniques may used identify individual animals zebra stripes blood vessel patterns rodent ears muzzle prints bat wing patterns primate facial recognition koala spots tried biometrics considered also instrumental development state authority put foucauldian terms discipline biopower turning human subject collection biometric parameters biometrics would dehumanize person infringe bodily integrity ultimately offend human dignity well-known case italian philosopher giorgio agamben refused enter united states protest united states visitor immigrant status indicator us-visit program requirement visitors fingerprinted photographed agamben argued gathering biometric data form bio-political tattooing akin tattooing jews holocaust according agamben biometrics turn human persona bare body agamben refers two words used ancient greeks indicating life zoe life common animals humans life bios life human context meanings purposes agamben envisages reduction bare bodies whole humanity new bio-political relationship citizens state turning citizens pure biological life zoe depriving humanity bios biometrics would herald new world dark matters surveillance blackness surveillance scholar simone browne formulates similar critique agamben citing recent study relating biometrics r found gender classification system researched inclined classify africans males mongoloids females consequently browne argues conception objective biometric technology difficult systems subjectively designed vulnerable cause errors described study stark expansion biometric technologies public private sector magnifies concern increasing commodification biometrics private sector adds danger loss human value indeed corporations value biometric characteristics individuals value browne goes suggest modern society incorporate biometric consciousness entails informed public debate around technologies application accountability state private sector ownership access one body data intellectual property generated one body data must understood right scholars emphasized however globalized world confronted huge mass people weak absent civil identities developing countries weak unreliable documents poorer people countries even unreliable documents without certified personal identities certainty right civil liberty one claim rights including right refuse identified identifiable subject public identity sense biometrics could play pivotal role supporting promoting respect human dignity fundamental rights biometrics intent poses risks paper harvard international review prof nayef al-rodhan cautions high risks miscalculations wrongful accusations infringements civil liberties critics us also signalled conflict 4th amendment possible data obtained biometric enrollment may used ways enrolled individual consented example biometric features could disclose physiological and/or pathological medical conditions e.g. fingerprint patterns related chromosomal diseases iris patterns could reveal genetic sex hand vein patterns could reveal vascular diseases behavioral biometrics could reveal neurological diseases etc. moreover second generation biometrics notably behavioral electro-physiologic biometrics e.g. based electrocardiography electroencephalography electromyography could also used emotion detection three categories privacy concerns thieves get access secure properties chance thieves stalk assault property owner gain access item secured biometric device damage owner could irreversible potentially cost secured property example 2005 malaysian car thieves cut finger mercedes-benz s-class owner attempting steal car context biometric systems presentation attacks may also called spoofing attacks per recent iso/iec 30107 standard presentation attacks defined presentation biometric capture subsystem goal interfering operation biometric system attacks either impersonation obfuscation attacks impersonation attacks try gain access pretending someone else obfuscation attacks may example try evade face detection face recognition systems recently several methods proposed counteract presentation attacks automated detection presentation attack called presentation attack detection pad one advantage passwords biometrics re-issued token password lost stolen cancelled replaced newer version naturally available biometrics someone face compromised database cancel reissue electronic biometric identifier stolen nearly impossible change biometric feature renders person biometric feature questionable future use authentication case hacking security-clearance-related background information office personnel management opm united states cancelable biometrics way incorporate protection replacement features biometrics create secure system first proposed ratha et al cancelable biometrics refers intentional systematically repeatable distortion biometric features order protect sensitive user-specific data cancelable feature compromised distortion characteristics changed biometrics mapped new template used subsequently cancelable biometrics one major categories biometric template protection purpose besides biometric cryptosystem biometric cryptosystem error-correcting coding techniques employed handle intraclass variations ensures high level security limitations specific input format small intraclass variations several methods generating new exclusive biometrics proposed first fingerprint-based cancelable biometric system designed developed tulyakov et al essentially cancelable biometrics perform distortion biometric image features matching variability distortion parameters provides cancelable nature scheme proposed techniques operate using recognition engines teoh et al savvides et al whereas methods dabbah et al take advantage advancement well-established biometric research recognition front-end conduct recognition although increases restrictions protection system makes cancellable templates accessible available biometric technologies soft biometrics traits physical behavioral adhered human characteristics derived way human beings normally distinguish peers e.g height gender hair color used complement identity information provided primary biometric identifiers although soft biometric characteristics lack distinctiveness permanence recognize individual uniquely reliably easily faked provide evidence users identity could beneficial words despite fact unable individualize subject effective distinguishing people combinations personal attributes like gender race eye color height visible identification marks used improve performance traditional biometric systems soft biometrics easily collected actually collected enrollment two main ethical issues raised soft biometrics first soft biometric traits strongly cultural based e.g. skin colors determining ethnicity risk support racist approaches biometric sex recognition best recognizes gender tertiary sexual characters unable determine genetic chromosomal sexes soft biometrics aging recognition often deeply influenced ageist stereotypes etc second soft biometrics strong potential categorizing profiling people risking supporting processes stigmatization exclusion many countries including united states planning share biometric data nations testimony us house appropriations committee subcommittee homeland security biometric identification 2009 kathleen kraninger robert mocny commented international cooperation collaboration respect biometric data follows according article written 2009 s. magnuson national defense magazine entitled defense department pressure share biometric data united states bilateral agreements nations aimed sharing biometric data quote article certain members civilian community worried biometric data used full disclosure may forthcoming particular unclassified report united states defense science board task force defense biometrics states wise protect sometimes even disguise true total extent national capabilities areas related directly conduct security-related activities also potentially applies biometrics goes say classic feature intelligence military operations short goal preserve security 'sources methods countries using biometrics include australia brazil canada cyprus greece china gambia germany india iraq ireland israel italy malaysia netherlands new zealand nigeria norway pakistan south africa saudi arabia tanzania ukraine united arab emirates united kingdom united states venezuela among low middle income countries roughly 1.2 billion people already received identification biometric identification program also numerous countries applying biometrics voter registration similar electoral purposes according international idea ’ icts elections database countries using 2017 biometric voter registration bvr armenia angola bangladesh bhutan bolivia brazil burkina faso cambodia cameroon chad colombia comoros congo democratic republic costa rica ivory coast dominican republic fiji gambia ghana guatemala india iraq kenya lesotho liberia malawi mali mauritania mexico morocco mozambique namibia nepal nicaragua nigeria panama peru philippines senegal sierra leone solomon islands somaliland swaziland tanzania uganda uruguay venezuela yemen zambia zimbabwe india national id program called aadhaar largest biometric database world biometrics-based digital identity assigned person lifetime verifiable online instantly public domain time anywhere paperless way designed enable government agencies deliver retail public service securely based biometric data fingerprint iris scan face photo along demographic data name age gender address parent/spouse name mobile phone number person data transmitted encrypted form internet authentication aiming free limitations physical presence person given place 550 million residents enrolled assigned 480 million aadhaar national identification numbers 7 november 2013 aims cover entire population 1.2 billion years however challenged critics privacy concerns possible transformation state surveillance state banana republic.§ project also met mistrust regarding safety social protection infrastructures tackle fear amongst people india supreme court put new ruling action stated privacy seen fundamental right 24 august 2017 new law established
|
Computer security
|
minipanzer megapanzer minipanzer megapanzer two variants bundestrojaner german federal trojan horse written era solutions swiss federal government contractor software engineer ruben unteregger later used federal department environment transport energy communications uvek intercept skype generally voice ip traffic windows xp systems source code program released gnu general public license version 3 gplv3 2009 author retained copyright thereafter trojan apparently detected wild one designations given anti-virus companies trojan.peskyspy
|
Computer security
|
ghost push ghost push family malware infects android os automatically gaining root access downloading malicious unwanted software malware appears discovered september 2015 security research lab cheetah mobile subsequently developed diagnostic software determine whether device compromised september 2015 twenty variants circulation latter day versions employed routines made harder detect remove malware hogs system resources making phone slow draining battery consuming cellular data advertisements continually appear either full partial screen ads status bar applications installed malware appear difficult remove impervious anti-virus software even surviving factory reset device infection typically comes via downloading applications third-party app stores least thirty-nine applications identified carriers peak ghost push virus infected 600,000 devices daily 50 infections occurring india well indonesia philippines ranking second third malware discovered september 2015 cheetah mobile security research lab
|
Computer security
|
deep content inspection deep content inspection dci form network filtering examines entire file mime object passes inspection point searching viruses spam data loss key words content level criteria deep content inspection considered evolution deep packet inspection ability look actual content contains instead focusing individual multiple packets deep content inspection allows services keep track content across multiple packets signatures may searching cross packet boundaries yet still found exhaustive form network traffic inspection internet traffic examined across seven osi iso layers importantly application layer traditional inspection technologies unable keep recent outbreaks widespread attacks unlike shallow inspection methods deep packet inspection dpi data part possibly also header packet inspected deep content inspection dci -based systems exhaustive network traffic packets reassembled constituting objects un-encoded and/or decompressed required finally presented inspected malware right-of-use compliance understanding traffic ’ intent reconstruction comprehension done real-time real-time policies applied traffic preventing propagation malware spam valuable data loss dci correlation comprehension digital objects transmitted many communication sessions leads new ways network performance optimization intelligence regardless protocol blended communication sessions historically dpi developed detect prevent intrusion used provide quality service flow network traffic prioritized latency-sensitive traffic types e.g. voice ip utilized provide higher flow priority new generation network content security devices unified threat management next generation firewalls garner ras core research note g00174908 use dpi prevent attacks small percentage viruses worms signatures malware fit within payload dpi ’ inspection scope however detection prevention new generation malware conficker stuxnet possible exhaustive analysis provided dci computer networks send information across network one point another data sometimes referred payload ‘ encapsulated ’ within ip packet looks follows networks evolve inspection techniques evolve attempting understand payload throughout last decade vast improvements including historically inspection technology examined ip header tcp/udp header dubbed ‘ packet filtering ’ devices would drop sequence packets packets allowed network scheme network traffic inspection first used firewalls protect packet attacks stateful packet inspection developed examine header information packet content increase source destination understanding instead letting packets result addresses ports packets stayed network context appropriate networks ’ current ‘ state ’ scheme first used check point firewalls eventually intrusion prevention/detection systems deep packet inspection currently predominant inspection tool used analyze data packets passing network including headers data protocol structures technologies scan packet streams look offending patterns effective deep packet inspection systems must ‘ string ’ match packet payloads malware signatures specification signatures dictate request/response like wire speeds fpgas field programmable gate arrays network processors even graphics processing units gpus programmed hardwired signatures result traffic passes circuitry quickly matched using hardware allows quick inline matches dpi systems following limitations including hardware limitations since dpi systems implement pattern matching searches ‘ offending ’ patterns hardware systems typically limited payload limitations web applications communicate content using binary-to-text encoding compression zipped archived etc obfuscation even encryption payload structure becoming complex straight ‘ string ’ matching signatures longer sufficient common workaround signatures similarly ‘ encoded ’ zipped given ‘ search limitations ’ scale support every application type nested zipped archived files parallel development deep packet inspection beginnings deep content inspection traced back early 1995 introduction proxies stopped malware spam deep content inspection seen third generation network content inspection network content exhaustively examined proxies deployed provide internet caching services retrieve objects forward consequently network traffic intercepted potentially stored graduated known secure web gateways proxy-based inspections retrieve scans object script images proxies relies fetch content first cached forwarding content recipient introduced form file inspection early 1995 mailsweeper released content technologies clearswift replaced mimesweeper 2005 2006 saw release open-source cross-platform antivirus software clamav provided support caching proxies squid netcache using internet content adaptation protocol icap proxy pass downloaded content scanning icap server running anti-virus software since complete files ‘ objects ’ passed scanning proxy-based anti-virus solutions considered first generation network content inspection bluecoat webwasher secure computing inc. mcafee division intel provided commercial implementations proxies eventually becoming standard network element enterprise networks limitations proxies secure web gateways provide in-depth network traffic inspection use limited second generation network traffic inspection solutions implemented firewalls and/or utms given network traffic choked devices addition dpi inspection proxy-like inspection possible approach first pioneered netscreen technologies inc. acquired juniper networks inc however given expensive cost operation feature applied tandem dpi system activated a-per-need basis content failed qualified dpi system third current generation network content inspection known deep content inspection solutions implemented fully transparent devices perform full application level content inspection wire speed order understand communication session ’ intent —in entirety— deep content inspection system must scan handshake payload digital objects executables images javascript ’ .pdfs etc also referred data-in-motion carried within payload constructed usability compliance threat analysis session payload achieved given handshake sequence complete payload session available dci system unlike dpi systems simple pattern matching reputation search possible exhaustive object analysis possible inspection provided dci systems include signature matching behavioral analysis regulatory compliance analysis correlation session inspection history previous sessions availability complete payload objects schemes inspection deep content inspection systems typically deployed high-grade security compliance required end-point security solutions possible bring device cloud installations third generation approach deep content inspection developed within defence intelligence community first appearing guard products sybard later wedge networks inc.. key-implementation highlights company approach deduced patent uspto 7,630,379 main differentiators deep content inspection deep content inspection content-focused instead analyzing packets classifying traffic based application types next generation firewalls understanding content intent highest level intelligence gained network traffic important information flow moving away packet towards application ultimately content example inspection levels availability complete objects payload deep content inspection system services/inspection examples include dci currently adopted enterprises service providers governments reaction increasingly complex internet traffic benefits understanding complete file types intent typically organizations mission-critical applications rigid requirements type inspection deals real time protocols continue increase complexity size one key barriers providing level inspection looking content dealing network throughput solutions must overcome issue introducing latency network environment must also able effectively scale meet tomorrow demands demands envisioned growing cloud computing trend one approach use selective scanning however avoid compromising accuracy selection criteria based recurrence following patent uspto 7,630,379 provides scheme deep content inspection carried effectively using recurrence selection scheme novelty introduced patent addresses issues content e.g. mp3 file could renamed transmission dealing amount traffic information applying services requires high speed look ups able effective need compare full services platforms else traffic utilized effectively example often found dealing viruses malicious content solutions compare content small virus database instead full complete one
|
Computer security
|
joel moses joel moses born 1941 israeli-american mathematician computer scientist institute professor emeritus massachusetts institute technology joel moses born mandatory palestine 1941 emigrated u.s. 1954 attended midwood high school brooklyn new york received undergraduate degree mathematics columbia university master degree mathematics also columbia supervision marvin minsky moses received doctorate mathematics mit 1967 thesis entitled symbolic integration laid groundwork macsyma symbolic mathematics program created mit largely supervision 1969 1983 macsyma able solve problems simplification polynomial factorization indefinite integration solution differential equations higher-order mathematical questions moses served administrative posts mit 1974 1998 associate director laboratory computer science head electrical engineering computer science department dean engineering provost also served acting director engineering systems division mit 2006 2007 acting director center technology policy industrial development 2007 2010 memoirs published interviewed occasion mit 150th anniversary appears independent documentary film called plug pray talks impact eliza computer program published joseph weizenbaum 1966 moses member national academy engineering fellow american academy arts sciences association computing machinery american association advancement science life fellow ieee
|
Programming language topics
|
hiperdispatch hiperdispatch workload dispatching feature found newest ibm mainframe models system z10 ibm zenterprise system processors running recent releases z/os hiperdispatch introduced february 2008 support added z/vm v6r3 release july 26 2013 one engineering challenges large smp server designs maintain near-linear scalability number cpus increases performance throughput double doubling number processors many overhead factors including contention cache main memory access overhead factors become increasingly difficult mitigate number cpus increases design goal delivering maximum performance minimize overhead factors new mainframe model supports higher maximum number cpus 64 main processors single system z10 mainframe example engineering challenge becomes ever important hiperdispatch helps address problem combination hardware features z/os dispatching z/os workload manager z/os may tasks waiting processing attention transaction programs task often requires access memory large smp design system z cpus physically closer faster access cache memory might hold supporting data particular tasks hiperdispatch exploits fact steers tasks cpus likely fastest access relevant data already cache particular cpu busy hiperdispatch first wait finish task even another less favorable cpu idle however limitations patient hiperdispatch governed workload manager goals z/os workload manager senses risk pending task miss service level responding within certain number milliseconds user request example workload manager hiperdispatch send task idle cpu processing even cpu must fetch data slower main memory hiperdispatch offers little cpu savings benefit machines configured relatively small number cpus however feature help quite lot cpu count increases ibm mainframe capacity tables thus software pricing based assumption hiperdispatch active benefit hiperdispatch parking logical cpus number cpus z/os dispatches work closely matches lpar weight applicable even small machine configurations benefit reduction short engine effect making system performance responsive workload manager wlm must configured correctly hiperdispatch work well mainframe users latent problems wlm goal settings exposed hiperdispatch option disable hiperdispatch cases mainframe users want correct issues right away z/os system resource manager srm configure z/os system resource manager modify parmlib-member ieaoptxx hiperdispatch=yes|no yes srm turn hiperdispatch mode srm turn hiperdispatch mode partitions 64 logical processors ipl time forced run hiperdispatch=yes ipl lpars 64 logical processors switch hiperdispatch=no case hiperdispatch=yes z196 follow-on cpcs vary cpu management automatically turned independent varycpu -specification default value
|
Operating systems
|
computer security incident management fields computer security information technology computer security incident management involves monitoring detection security events computer computer network execution proper responses events computer security incident management specialized form incident management primary purpose development well understood predictable response damaging events computer intrusions incident management requires process response team follows process definition computer security incident management follows standards definitions described national incident management system nims incident coordinator manages response emergency security incident natural disaster event requiring response emergency services incident coordinator would act liaison emergency services incident manager computer security incident management administrative function managing protecting computer assets networks information systems systems continue become critical personal economic welfare society organizations public private sector groups associations enterprises must understand responsibilities public good welfare memberships stakeholders responsibility extends management program “ things go wrong. ” incident management program defines implements process organization may adopt promote welfare security public event observable change normal behavior system environment process workflow person components three basic types events computer security information technology personnel must handle emergency events according well-defined computer security incident response plan incident event attributable human root cause distinction particularly important event product malicious intent harm important note incidents events many events incidents system application failure due age defect may emergency event random flaw failure incident security incident coordinator manages response process responsible assembling team coordinator ensure team includes individuals necessary properly assess incident make decisions regarding proper course action incident team meets regularly review status reports authorize specific remedies team utilize pre-allocated physical virtual meeting place investigation seeks determine circumstances incident every incident warrant require investigation however investigation resources like forensic tools dirty networks quarantine networks consultation law enforcement may useful effective rapid resolution emergency incident incident response steps detection- incident detected sensor network analyst user reporting something unusual his/her pc containment- event malicious network traffic computer virus incident response manager stop traffic taking computer network clean- run virus scan remove virus wipe computer clean reimage machine reverse engineering- use computer forensics tools understand malicious traffic occurred first place incident completely understood make plans decrease future risk
|
Computer security
|
rad5500 rad5500 radiation-hardened 64-bit multi-core processor platform created bae systems electronics intelligence support based powerpc e5500 designed ibm freescale semiconductor successor rad750 rad5500 processor platform use high radiation environments experienced board satellites spacecraft rad5500 platform supports vpx high speed connectors ddr2/ddr3 memory serialize/deserialize serdes spacewire io rad5500 family radiation-hardened processors based versions freescale semiconductor e5500-based qoriq system-on-chip rad5510 rad5515 rad5545 radspeed-hb host bridge four system chip processors implemented rad5500 cores produced 45 nm soi technology ibm trusted foundry rad5510 rad5515 processors employ single rad5500 core intended medium processing capability environments require low power consumption 11.5 13.7 watts respectively processor provides 1.4 giga operations per second gops 0.9 gflops performance rad5545 processor employs four rad5500 cores achieving performance characteristics 5.6 giga-operations per second gops 3.7 gflops power consumption 20 watts peripherals operating based rad5545 radspeed-hb intended host processing data management support one four radspeed dsps radspeed-hb replaces secondary ddr2/ddr3 memory interface connection found rad5545 connections radspeed dsps instead note radspeed dsps entirely different processors specialized digital signal processing confused radspeed-hb serves host bridge rad5545 spacevpx single-board computer use harsh environmental conditions outer space designed operating temperatures −55 °c 125 °c radiation-hardened total ionizing dose 100 krad silicon chips 6u-220 format module compliant ansi/vita 78.00 spacevpx standard includes either rad5515 rad5545 processor rad5545 spacevpx single-board computer produced bae systems facility manassas virginia u.s. department defense category 1a microelectronics trusted source
|
Computer architecture
|
motomagx motomagx linux kernel-based mobile operating system developed launched 2007 motorola run mid-to-high-end mobile phones system based montavista mobilinux originally intended 60 upcoming devices soon dropped favor android windows mobile operating systems motomagx compatible motorola gsm/umts devices shown due lack implementation compatible qualcomm cdma2000 devices result motorola often sold multiple device variants radically different firmware example motorola razr2 t-mobile shipped motomagx whereas razr2 verizon wireless shipped motorola p2k firmware created significant confusion customers user experience varied widely two identical devices simply based carrier phones based os
|
Operating systems
|
diana initiative diana initiative computer security conference based las vegas nevada aimed supporting women cybersecurity first diana initiative conference took place 2017 diana initiative founded cheryl biswas virginia robbins pablo breuer elizabeth etherington michael smith 2019 conference held westin las vegas def con
|
Computer security
|
dragon slayer legend heroes originally released 1989 nec pc-8801 within next years would also ported nec pc-9801 msx 2 sharp x68000 sega mega drive super famicom turbografx-cd pc engine cd-rom dragon slayer legend heroes barcode battler card set also released epoch co. 1992 pc engine version released united states turbografx-cd game series released us playstation portable remake legend heroes iv akai shizuku 1995 version game broadcast exclusively japanese markets via super famicom satellaview subunit name bs dragon slayer eiyu densetsu 1998 remake legend heroes bundled remake released playstation sega saturn korean conversion original pc-9801 version released ms-dos/ibm pc mantra samsung 1996 japanese pc edition released 1997 game soundtrack composed members soundtrack turbografx-16 version arranged upon release famitsu scored pc engine cd-rom version 29 40 1991 later scored super famicom version 29 40 1992 sega mega drive version 23 40 1994 january 1993 issue electronic games magazine electronic gaming awards nominated turbografx-cd version 1992 multimedia game year award stated demonstrates far multimedia come since design team ys ii mammoth quest meticulously detailed incorporates highly involved game play
|
Computer architecture
|
oneid oneid digital security service based redwood city california oneid sells digital identity system claims provide security across devices using public key cryptography instead passwords technology utilized non-profits salsa labs increase frequency security online donations company founded 2011 serial entrepreneur steve kirsch kirsch recruited engineers jim fenton adam back bobby beckmann create flagship product launched early 2012 following launch company raised us 7 million venture capital financing menlo park-based venture capital firm khosla ventures following series alex doll took position ceo doll previously executive-in-residence khosla ventures founding executive pgp corp. doll appointment founder kirsch moved cto role shirish sathaye general partner khosla ventures jonathan heiliger added oneid board directors following growth period late 2013 company appointed kirsch ceo 2014 fast company named oneid one top 10 innovative companies finance
|
Computer security
|
lucidpress lucidpress web-based desktop publishing software application developed lucid software used create brochures flyers newsletters business cards posters magazines presentations built web standards html5 javascript lucidpress supported modern web browsers including google chrome firefox safari internet explorer 8+ though started platform single users small businesses lucidpress found substantial user bases education enterprise spaces october 2013 lucid software announced lucidpress public beta version following release lucidpress featured techcrunch venturebeat pc world techcrunch noting chance test app launch indeed easy use 've ever used desktop publishing app past 'll feel right home lucidpress features kind standard top-bar menu layout options publishing apps terms features also hold similar desktop-based apps october 2013 lucidpress became available g suite marketplace may 2015 lucidpress hit 1 million users one year later june 2016 lucidpress hit 2 million users announced advanced template locking feature november 2016 lucidpress announced print ship feature users order printed versions documents create lucidpress october 2016 lucidpress conducted survey research firm demand metric impact brand consistency report titled impact brand consistency contains insights 200 senior marketing brand leaders found among insights consistent brand marketing worth estimated 23 increase revenue lucid software raised 1 million seed 2011 led google ventures may 2014 company received 5 million investment round led salt lake-based kickstart seed fund september 2016 company received 36 million investment spectrum equity whose previous investments include online platforms ancestry.com lynda.com prezi surveymonkey kickstart seed fund grayhawk capital also participated round lucidpress alternative complex design programs like adobe indesign microsoft publisher especially mac users design capabilities range single-page documents like business cards flyers multi-page documents like annual reports digital magazines lucidpress accessible anywhere modern web browsers documents securely stored cloud application require download incorporating real-time collaborative editor lucidpress allows multiple users edit document simultaneously users also make comments chat collaborators real time lucidpress content published several different mediums including lucidpress offers large library templates designing print digital content template categories include lucidpress fully integrated google drive google apps known g suite lucidpress integration consistently one top productivity apps g suite marketplace users import images flickr facebook dropbox
|
Distributed computing architecture
|
vaxft vaxft family fault-tolerant minicomputers developed manufactured digital equipment corporation dec using processors implementing vax instruction set architecture isa vaxft stood virtual address extension fault tolerant systems ran openvms operating system first supported vms 5.4 two layered software products vaxft system services vms volume shadowing required support fault-tolerant features vaxft redundancy data stored hard disk drives vaxft systems shared basic system architecture vaxft system consisted two zones operated lock-step zone zone b zone fully functional computer capable running operating system identical hardware configuration lock-step achieved hardware cpu module cpu module zone connected crosslink cable crosslink cables carried results instructions executed one cpu module compared hardware results instructions executed latter ensure identical two zones kept synchronous clock signal carried crosslink cables hardware failure occurred one zones affected zone brought offline without bringing zone continued operate normal repairs completed offline zone powered automatically resynchronized zone restoring redundancy vaxft model 310 introduced vaxft 3000 model 310 code named cirrus introduced february 1990 shipped june first vaxft model dec first fault-tolerant computer generally available 1991 launch new vaxft models vax 3000 model 310 renamed follow new naming scheme becoming vaxft model 310 model 310 theoretical maximum performance 3.8 vups announced model 310 starting price us 200,000 august 1990 slow sales prompted dec reduce us price model 310 us 168,000 used ka520 cpu module containing 16.67 mhz 60 ns cycle time cvax+ chip set 32 kb external secondary cache system contained two cpu modules one zone running lock-step vaxft model 110 code named cirrus entry-level model announced 18 march 1991 alongside three models model 110 essentially low-cost model vaxft model 310 theoretical maximum performance 2.4 vups contained two zones packed side side enclosure compared model 310 limited expandability regards memory storage capacity available options available either pedestal rackmount configuration rackmount configuration pedestal without plastic covers casters fitted standard 19-inch retma cabinet zone five-slot backplane ka510 cpu module one three 32 mb ms520 memory modules one two kfe52 system i/o controller modules one two dec wancontroller 620 dsf32 wide area network wan communications adapters leftmost slot first slot primary system controller resided first slot cpu module second memory modules third fourth fifth slots second system i/o controller resided either fourth fifth slots wan communications adapters also fourth fifth slots basic system contained cpu module memory module system i/o controller dec wancontroller 620 designed use vaxft systems provided two synchronous lines bandwidth 64 kb lines could operated two independent lines paired provide redundancy vaxft model 410 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 410 identical model 310 used ka550 cpu module containing 28.57 mhz 35 ns cycle time soc microprocessor 128 kb external secondary cache supported 256 mb memory model 410 theoretical maximum performance 6.0 vups vaxft model 610 code named cirrus ii mid-range model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 610 architecturally identical model 410 except two zones packaged vertically 60 high cabinet zone zone b cabinet storage capacity systems packaged pedestals reason model 610 intended data centers could one two expander cabinets placed left right system additional storage devices cabinets front rear cooled vaxft model 612 high-end model announced 18 march 1991 alongside three models originally supposed ship june july 1991 delayed september 1991 reason given dec wanted tune new release vms system model 612 vaxcluster two vaxft model 610s expansion cabinet positioned two systems standard theoretical maximum performance 12.0 vups second expansion cabinet could added two system cabinets vaxft model 810 code named jetstream high-end model introduced october 1993 instead targeted introduction date late summer early fall 1992 system developed dec manufactured italian industrial manufacturer alenia spa theoretical maximum performance 30.0 vups model 810 third generation vaxft system contained two zones vertically packaged cabinet optional expansion cabinet could connected system addition two uninterruptable power supplies one zone used ka560-aa cpu module contained two 83.33 mhz 12 ns cycle time nvax+ microprocessors 512 kb b-cache l2 cache module two microprocessors operated lock-step fashion like previous vaxft systems two cpu modules system one two zones operated lock-step fashion model 810 cabinet 60.0 cm 24 wide 170.0 cm 67 high 86.0 cm 34 deep
|
Computer architecture
|
gatekeeper macos gatekeeper security feature macos operating system apple enforces code signing verifies downloaded applications allowing run thereby reducing likelihood inadvertently executing malware gatekeeper builds upon file quarantine introduced mac os x leopard expanded mac os x snow leopard feature originated version 10.7.3 mac os x lion command-line utility spctl graphical user interface added os x mountain lion later also version 10.7.5 lion security privacy panel system preferences user three options command-line utility spctl provides granular controls custom rules individual blanket permissions well option turn gatekeeper upon download application particular extended file attribute quarantine flag added downloaded file attribute added application downloads file web browser email client added torrent downloaders transmission bittorrent client bit torrent behavior disabled default third-party applications developers need opt system also force behavior upon individual applications using signature-based system named xprotect user attempts open application attribute system delay execution verify whether since snow leopard system keeps two blacklists identify known malware insecure software blacklists updated periodically application blacklisted file quarantine refuse open recommend user move trash gatekeeper refuse open application code-signing requirements met apple revoke developer certificate application signed prevent distribution application passed file quarantine gatekeeper allowed run normally verified override gatekeeper user acting administrator either switch lenient policy security privacy panel system preferences authorize manual override particular application either opening application context menu adding spctl developers sign disk images verified unit system macos sierra allows developers guarantee integrity bundled files prevent attackers infecting subsequently redistributing addition path randomization executes application bundles random hidden path prevents accessing external files relative location feature turned application bundle originated signed installer package disk image user manually moved application without files another directory effectiveness rationale gatekeeper combating malware acknowledged met reservations security researcher chris miller noted gatekeeper verify developer certificate consult known-malware list application first opened malware already passed gatekeeper stopped addition gatekeeper verify applications quarantine flag flag added applications system neglect failure trigger gatekeeper according security blogger thomas reed bittorrent clients frequent offenders flag also added application came different source like network shares usb flash drives questions also raised registration process acquire developer certificate prospect certificate theft september 2015 security researcher patrick wardle wrote another shortcoming concerns applications distributed external files libraries even html files contain javascript attacker manipulate files exploit vulnerability signed application application external files redistributed leaving original signature application bundle intact gatekeeper verify individual files security compromised path randomization signed disk images apple provided mechanisms mitigate issue macos sierra
|
Operating systems
|
rudder software rudder open source audit configuration management utility help automate system configuration across large infrastructures rudder relies lightweight local agent installed managed machine rudder produced normation founded 2010 server-side web interface written scala local agent written c published free software gnu general public license 3.0 rudder created founding team normation first released free software october 2011 rudder 3.0 released february 2015 following operating systems supported root server following operating systems supported rudder nodes packages available platforms
|
Operating systems
|
smartbook smartbook class mobile device combined certain features smartphone netbook computer produced 2009 2010 smartbooks advertised features always all-day battery life 3g wi-fi connectivity gps typically found smartphones laptop tablet-style body screen size 5 10 inches physical soft touchscreen keyboard german company sold laptops brand smartbook held trademark word many countries including big markets like united states china japan india acted preempt others using term smartbook describe products smartbooks tended designed entertainment purposes productivity typically targeted work online applications projected sold subsidized mobile network operators like mobile phones along wireless data plan advent much popular tablets like android tablets ipad coupled prevailing popularity conventional desktop computers laptops displaced smartbook smartbook concept mentioned qualcomm may 2009 marketing snapdragon technology products expected later year difficulties adapting key software particular adobe proprietary flash player arm architecture delayed releases first quarter 2010 smartbooks would powered processors energy-efficient traditional ones typically found desktop laptop computers first smartbooks expected use variants linux operating system google android chrome os arm processor would allowed achieve longer battery life many larger devices using x86 processors february 2010 abi research projected 163 million smartbooks would ship 2015 many countries word smartbook trademark registered smartbook ag august 2009 german court ruled qualcomm must block access germany webpages containing word smartbook unless smartbook ag mentioned smartbook ag defended trademark february 2010 ruling prevented lenovo using term end 2010 qualcomm ceo paul jacobs admitted tablet computers ipad already occupied niche smartbook name dropped february 2011 qualcomm legal battle german patent office ruled words smart book could used however several trademarks registered march 2009 always innovating company announced touch book based texas instruments omap 3530 implemented arm cortex-a8 architecture originally developed texas instruments beagle board touchscreen detachable keyboard contained second battery device came linux operating system company offered license hardware designs sharp electronics introduced pc-z1 netwalker device august 2009 promised ship date october 2009 featured 5.5 touchscreen runs ubuntu arm cortex-a8 based freescale i.mx515 packaged small clamshell design sharp reported device weighs less 500 grams run 10 hours one battery charge device said run 720p video 2d 3d graphics acceleration comes adobe flash lite 3.1 installed pegatron asus company showed working prototype smartbook august 2009 consisted arm cortex-a8 based freescale i.mx515 supports 2d/3d graphics well 720p hd video 512 mb ddr2 ram 1024x600 8.9 lcd screen bluetooth 2.0 802.11g run sd card also featured one usb one micro usb port vga port well card reader smartbook ran ubuntu netbook 9.04 contained version adobe flash player date bill materials pegatron smartbook prototype 120 november 2009 pegatron said received large number orders smartbooks would launch early 2010 devices rumored sell 200 subsidized asus announced plans release smartbook first quarter 2010 asus later postponed smartbook launch second quarter 2010 qualcomm expected announce smartbook november 12 2009 analyst meeting lenovo device concept shown announced january 2010 may 2010 skylight cancelled late january 2010 u.s. federal communications commission fcc listing featured device hp referred smartbook prototype device already shown earlier beginning february mobile world congress barcelona hp announced bring device market specifications likely following end march 2010 smartbook made appearance fcc time listing 3g capabilities according fcc device support gsm 850 1900 well wcdma ii v bands wcdma bands may indicate usage network united states details product available hp website june 2010 smartbook device toshiba announced features nvidia tegra processor able remain stand-by mode 7 days device officially available toshiba united kingdom site originally delivered android v2.1 upgradable v2.2 since 2011 also modified run customized linux distribution japan sold dynabook az genesi company announced mx smartbook part efika line august 2010 originally priced us 349 reviewers questioned small enough fit definition ostensibly derivative above-mentioned pegatron design september 2009 foxconn announced working smartbook development november 2009 quanta computer pre-production snapdragon powered sample smartbook device ran android unveiled companies like acer inc. planned release smartbook due popularity tablets macbook air ultrabooks plans scrapped
|
Computer architecture
|
motorola 68881 motorola 68881 motorola 68882 floating-point coprocessor fpu devices used computer systems conjunction 68020 68030 microprocessors motorola 68881 introduced 1984 addition one devices added substantial cost computer added floating-point unit could rapidly perform floating point mathematical calculations mid 1980s feature useful mostly scientific mathematical software 68020 68030 cpus designed separate 68881 chip mind instruction sets reserved f-line instructions – opcodes beginning hexadecimal digit f could either forwarded external coprocessor used traps would throw exception handing control computer operating system fpu present system os would either call fpu emulator execute instruction equivalent using 68020 integer-based software code return error program terminate program crash require reboot 68881 eight 80-bit data registers 64-bit mantissa plus sign bit 15-bit signed exponent allowed seven different modes numeric representation including single-precision double-precision extended-precision defined ieee floating-point standard ieee 754 designed specifically floating-point math general-purpose cpu example instruction required address calculations main cpu would handle 68881 took control cpu/fpu pair designed could run time cpu encountered 68881 instruction would hand fpu operands needed instruction fpu would release cpu go execute next instruction 68882 improved version 68881 better pipelining eventually available higher clock speeds instruction set exactly 68881 motorola claimed marketing literature executed instructions 40 faster 68881 clock speed though reflect typical performance seen modest improvement table 68882 pin compatible 68881 used direct replacement systems important software incompatibility 68882 used larger fsave state frame affected unix preemptive multitasking oses modified allocate space 68881 68882 used sun microsystems sun-3 workstations ibm rt pc workstations apple computer macintosh ii family next computer sharp x68000 amiga 3000 atari mega ste tt falcon030 third-party amiga atari products used 68881 68882 memory-mapped peripheral 68000 statistics came comp.sys.m68k faq statistics listed 16 mhz 20 mhz 68882 though chips indeed produced starting motorola 68040 floating point support included cpu
|
Computer architecture
|
intel socket g3 socket g3 also known rpga 946b/947 fcpga 946 socket intel microprocessors supports haswell-based mobile cpus compatible skus 'm suffix model number socket g3 designed replacement socket g2 also known rpga 988b socket g3 holes make contact 946 947 pins processor pin grid array pga lynx point platform controller hub pch associated socket g3 socket rpga 947 one extra pin hole identical socket g3 last pin grid array socket intel mobile processors mobile processors microarchitectures succeding haswell exclusively available bga packaging
|
Computer architecture
|
email backbone email backbone typically middleware email infrastructure manages smtp-based applications internal external email message routing policy management enforcement email backbone normally portion email infrastructure sits gateway dmz layer “ email groupware system ” layer messaging infrastructure microsoft exchange lotus notes/domino email backbone sometimes referred messaging fabric messaging infrastructure layer many businesses either considering actively migrating cloud-based email offer number important benefits benefits may include lower cost ownership predictable costs shift capital expenditure capex operational cost opex model less demand internal resources typical email infrastructure functions moved cloud include email filtering layer spam virus protection message archiving email groupware system mailboxes email backbone layer typically stays on-premises benefits moving email cloud compelling quantifiable advantages keeping email backbone layer messaging infrastructure on-premises leveraging cloud-based services common email functions spam virus filtering end user mailbox system microsoft exchange example on-premises email backbone provide policy management enforce outbound messaging policies encrypting sensitive messages contents email leaves organization benefits on-premises email backbone include ability manage wide variety mobile platforms potentially lower cost ability maintain legacy records management systems integration existing voicemail systems many organizations complex routing smtp application requirements require use email backbone even key parts email infrastructure migrated cloud example routing control requirements quite complex often satisfied cloud-based email systems examples requirements include enterprise level choice manage email decision on-premises cloud rather services remain on-premises managed cloud next several years email management evolve toward hybrid model using email backbone virtually smallest organizations
|
Distributed computing architecture
|
clesh clesh clip load edit share cloud-based video editing platform designed consumers prosumers online communities integrate user generated content core technology based forscene geared towards professionals working example broadcasting news media post production video audio graphical content uploaded clesh via standard web browser mobile device phone tablet desktop software dv capture firewire hosted material reviewed searched edited published online anyone standard web browser compatible mobile device clesh supports storyboard shot selection frame-accurate editing transitions various functions pan zoom colour light correction audio levels content published formats example podcast mpeg2 html5 video proprietary java format cloud-based software provides greater scope sharing information collaborating compared lan desktop based systems users cloud-based software rely cloud owner adequate security performance resilience clesh assert rights uploaded content contrast platforms youtube rights content uploaded clesh remain author services available clesh users clesh based technology forscene array servers internet backbone provide cloud computing platform host clesh white-label solution clesh would branded hosted per client requirement end-users access clesh rich user interface clients standard java-enabled web browsers android enabled mobile devices tablets smartphones clesh launched january 2006 subject several upgrades year extend functionality including storyboard podcasting moderation chat showreel 2007 consumers offered clesh via subscription model upgrades include web start graphics upload mr paparazzi selects clesh platform host video offering truetube 2008 choosing use clesh manage video portal several upgrades applied include better audio quality image enhancement controls transitions fades titles additional publishing options jpeg 2010 version clesh demonstrated android os tablet device samsung galaxy tab several upgrades applied including html5 publishing pan zoom overlays
|
Distributed computing architecture
|
ioke programming language ioke dynamic strongly typed prototype-based programming language targeting java virtual machine common language runtime designed ola bini developer jruby simple homoiconic syntax somewhat similar io ioke designed expressiveness else including performance designed important tool example language-oriented programming encourages creation domain-specific languages ioke first announced november 6 2008 ioke code contains documentation unit tests
|
Programming language topics
|
windows rally windows rally set technologies microsoft intended simplify setup maintenance wired wireless network-connected devices aim increase reliability security connectivity users connect devices internet computers running microsoft windows technologies provide control network quality service qos diagnostics data sharing communications entertainment windows rally technologies provide provisioning following devices windows rally includes following set technologies link layer topology discovery lltd protocol enables applications discover devices determine network topology windows vista enables graphical view devices network network map windows xp computers appear network map lltd responder must downloaded installed devices provide audio video playback bandwidth sensitive implement qos extension part protocol receive prioritized streams changes available bandwidth less impact playback experience windows vista includes qwave pre-configured quality service api time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets delayed little possible providing high quality channel data packets qwave-enabled applications together devices implement lltd qos extensions aim improve end user experience streaming video prioritizing traffic reducing effects network-related transient issues windows connect wcn name windows rally technologies aimed simpler wireless device configuration windows connect users running windows vista windows xp sp2 create network configuration settings transmit access point alternatively users also print configuration settings reference manually configuring device windows connect one following methods may used easier configuration devices profile web services dpws standard defines minimal set implementation constraints enable secure web service messaging discovery description eventing resource-constrained devices dpws describes set requirements enable device discovered clients describe available services clients dpws similar universal plug play upnp fully aligned web services technology supports standards device connectivity ws-discovery ws-eventing includes numerous extension points allowing integration device-provided services enterprise-wide application scenarios roaming devices work across internet windows vista web services devices wsdapi unmanaged code implementation devices profile web services dpws standard windows communication foundation wcf executes managed code offers enterprise-level services web services solutions windows xp windows vista support simple service discovery protocol ssdp ws-discovery extensible discovery support protocols windows vista includes function discovery api function discovery serves abstraction layer applications devices allowing applications discover devices referencing device function rather bus type nature connection function discovery api aims create applications enumerate system resources use devices specific type discover manage lists devices objects sorted functionality class whether local network connected function discovery supports extensible discovery provider model vendors also create custom provider expose resources function discovery pnp-x uses ssdp ws-discovery network communication protocols make network-connected devices discoverable connected directly computer bus universal serial bus usb pnp-x allows network-connected devices appear devices inside windows connected physically provides installation experience similar attaching bus-connected device device manufacturer implements pnp-x capabilities supplement either upnp web services devices wsd enabled devices result end users device relatively easy install traditional plug play devices universal plug play upnp ip-based protocol suite based preliminary versions web services protocols xml simple object access protocol soap upnp device dynamically join network obtain ip address convey capability discover presence capabilities devices network information set services particular device type provide captured xml device description document device hosts device description also lists properties device name icons associated device upnp adopted widely devices interact home network audio-video scenarios upnp supported windows windows xp windows vista windows vista upnp integrated pnp-x function discovery
|
Operating systems
|
rent rule rent rule pertains organization computing logic specifically relationship number external signal connections logic block i.e. number pins number logic gates logic block applied circuits ranging small digital circuits mainframe computers 1960s e. f. rent ibm employee found remarkable trend number pins terminals boundaries integrated circuit designs ibm number internal components g logic gates standard cells log–log plot datapoints straight line implying power-law relation formula_1 p constants p 1.0 generally 0.5 p 0.8 rent findings ibm-internal memoranda published ibm journal research development 2005 relation described 1971 landman russo performed hierarchical circuit partitioning way hierarchical level top-down least number interconnections cut partition circuit less equal parts partitioning step noted number terminals number components partition partitioned sub-partitions found power-law rule applied resulting versus g plot named rent rule rent rule empirical result based observations existing designs therefore less applicable analysis non-traditional circuit architectures however provides useful framework compare similar architectures christie stroobandt later derived rent rule theoretically homogeneous systems pointed amount optimization achieved placement reflected parameter formula_2 rent exponent also depends circuit topology particular values formula_3 correspond greater fraction short interconnects constant formula_4 rent rule viewed average number terminals required single logic block since formula_5 formula_6 random arrangement logic blocks typically formula_7 larger values impossible since maximal number terminals region containing g logic components homogeneous system given formula_8 lower bounds p depend interconnection topology since generally impossible make wires short lower bound formula_9 often called intrinsic rent exponent notion first introduced hagen et al used characterize optimal placements also measure interconnection complexity circuit higher intrinsic rent exponent values correspond higher topological complexity one extreme example formula_10 long chain logic blocks clique formula_7 realistic 2d circuits formula_9 ranges 0.5 highly-regular circuits sram 0.75 random logic system performance analysis tools bacpac typically use rent rule calculate expected wiring lengths wiring demands estimate rent exponent one use top-down partitioning used min-cut placement every partition count number terminals connected partition compare number logic blocks partition rent exponent found fitting datapoints log–log plot resulting exponent p optimally partitioned circuits formula_13 longer case practical heuristic partitioning approaches partitioning-based placement algorithms formula_14 landman russo found deviation rent rule near far end i.e. partitions large number blocks known region ii rent rule similar deviation also exists small partitions found stroobandt called region iii another ibm employee donath discovered rent rule used estimate average wirelength wirelength distribution vlsi chips motivated system level interconnect prediction workshop founded 1999 entire community working wirelength prediction see survey stroobandt resulting wirelength estimates improved significantly since used technology exploration use rent rule allows perform estimates priori i.e. actual placement thus predict properties future technologies clock frequencies number routing layers needed area power based limited information future circuits technologies comprehensive overview work based rent rule published stroobandt
|
Computer architecture
|
text simplification text simplification operation used natural language processing modify enhance classify otherwise process existing corpus human-readable text way grammar structure prose greatly simplified underlying meaning information remains text simplification important area research natural human languages ordinarily contain complex compound constructions easily processed automation terms reducing language diversity semantic compression employed limit simplify set words used given texts text simplification illustrated example siddharthan 2006 first sentence contains two relative clauses one conjoined verb phrase text simplification system aims simplify first sentence second sentence “ ability simplify means eliminate unnecessary necessary may speak ”
|
Computational linguistics
|
defense depth computing defense depth also known castle approach information assurance ia concept multiple layers security controls defense placed throughout information technology system intent provide redundancy event security control fails vulnerability exploited cover aspects personnel procedural technical physical security duration system life cycle idea behind defense depth approach defend system particular attack using several independent methods layering tactic conceived national security agency nsa comprehensive approach information electronic security term defense depth computing inspired military strategy name quite different concept military strategy revolves around weaker perimeter defense intentionally yielding space buy time envelop ultimately counter-attack opponent whereas ia strategy simply involves parallel systems controls intentionally ceding ground cf honeypot defense depth divided three areas physical technical administrative physical controls anything physically limits prevents access systems fences guards dogs cctv systems like technical controls hardware software whose purpose protect systems resources examples technical controls would disk encryption fingerprint readers windows active directory hardware technical controls differ physical controls prevent access contents system physical systems administrative controls organization policies procedures purpose ensure proper guidance available regards security regulations met include things hiring practices data handling procedures security requirements usage non-standard ports valid means security using one following layers constitutes defense depth
|
Computer security
|
vault corporation vault corporation founded 1981 w. krag brotby unsung technology pioneer already successful real-estate entrepreneur brotby authored book software program called tax cash frustrated pirating software people making copies free without paying brotby came mechanism attempt defeat illegal copying called prolok disk us patent 4,785,361 technology influential many later copy-protection techniques original patent referenced 140 later patents prolok used many early 80 software companies including ashton-tate developers first massively successful pc database software vault also invested millions dollars legal front behalf software industry whole authoring testing first many controversial shrink wrap software law vault contract ultimately defeated 5th circuit federal appeals court
|
Computer security
|
return ishtar translating english resurrection ishtar action role-playing arcade game released namco 1986 runs namco system 86 hardware sequel tower druaga released two years earlier second game company babylonian castle saga series later ported msx nec pc-8801 fm7 sharp x68000 platforms also included namco museum volume 4 playstation return ishtar adventure game requires two players also first game namco password feature give players opportunity continue left first feature scoring system player 1 controls priestess ki fights magic player 2 controls sword-wielding prince gilgamesh sequel starts directly gilgamesh saved ki druaga focuses escape tower inhabitants gilgamesh ki avenge former master total 128 rooms sixty-floor tower screen scroll according ki location second player stay close partner traverse tower ki attacks casting spells enemies gilgamesh automatically draws sword whenever enemy gets close enough allowing attack enemy bumping blade similar adol ys games however colliding enemies also damage gilgamesh counter bottom-right screen decrease preset amount depending enemy type counter reaches 0 disappear game players also happen ki touched enemy also several different items found rooms collected aid gilgamesh ki quest easter egg game designer masanobu endō appears unconscious desk dead end room ki use blue crystal rod spell wake proceed warp gilgamesh calvary prison room reviewing namco museum volume 4 jeff gerstmann gamespot described return ishtar plain weird incredibly boring electronic gaming monthly shawn smith said genji heike clans pretty lame due difficult control games ... well fun
|
Computer architecture
|
vs/9 vs/9 discontinued computer operating system available univac series 90 mainframes 90/60 90/70 90/80 late 1960s 1980s 90/60 90/70 repackaged univac 9700 computers rca acquisition sperry determined rca tsos operating system far advanced univac counterpart company opted merge univac hardware rca software introduced 90/70 90/60 introduced shortly thereafter slower less expensive 90/70 introduction 90/80 vs/9 finally hardware platform optimized take full advantage capability allow interactive batch operations computer september 1971 rca decided exit mainframe computer business losing half billion dollars trying failing compete ibm assets computer division sold univac included rca spectra series computers various external hardware designs video terminals tape drives punched card readers operating system time sharing operating system tsos tsos may better operating system user standpoint ibm time operating systems considered something sold separately computer manufacturer included free part purchase price univac introduced additional new features tsos renamed vs/9 name 'tsos however remained username primary privileged system manager account unix-type systems called 'root rca also sold tsos would become fujitsu basis fujitsu bs2000 operating system mainframes name interactive use vs/9 done terminals connected terminal concentrator unit passed control signals terminals manner similar way ibm would provide ibm 3270-style terminals provided general input terminal sent response enter key opposed practice pcs taking input one character time concentrator unit originally known communications control module ccm however rca sold patents designs ccm terminal controller singer corporation univac developed emulator device ccm known multiterminal connection controller model 16 mcc-16 mcc-16 supported univac standard terminal rca renamed uniscope video display terminal vdt well ordinary ascii dumb terminals univac uniscope vdt provided sophisticated time editing capability including ability edit text screen make changes line time page time transmit text back computer vdt also supported direct cursor positioning input protection cursor indicated text cursor recognized also supported special scroll mode subset screen window instead entire screen scrolling upward last line displayed possible make scroll area bottom half screen feature split screen scroll would become available 20 years later apple ii microcomputer distinction made interactive timesharing terminals transactional terminals interactive terminals controlled directly operating system transactional terminals controlled batch program initially batch program known mcp multichannel communications program developed rca sperry batch-oriented operating systems tdos tape-disk operating system dos disk operating system became clear would phased favor much robust interactive operating system vmos mcp ported run vmos vmos virtual memory operating system became new moniker tsos rca spectra 70 models 46 61 3 7 computers initially univac series 70 formerly rca computers eventually mcp enhanced support sperry univac terminals name changed cos communication operating system ports ccm later mcc running emulation mode could designated either interactive transactional port designated interactive port controlled timesharing services integrated vmos vs/9 operating system transactional ports hand controlled cos. terminals connected ports became property respective controlling host software timesharing used program development allowing much faster program development traditional batch process state art time timesharing user task could execute programs create files request system resources needed made much possible operating system ability manage virtual memory temporarily save pages memory including executing programs disk drum use retrieve later needed virtual memory page size fixed 4096 bytes allowed many tasks running simultaneously would otherwise constrained limited expensive main memory space transactional users hand controlled single program view environment limited presented identified individual tasks ability run programs request system resources ccm mcc running emulation mode dumb hardware interfaces network protocol intelligence including terminal polling error recovery message construction resided mainframe ccm mcc simply acted conduits mainframe phone lines mcc used true front end processor much overhead polling error recovery offloaded mainframe thus freeing computer time running application programs occur vs/9 era vs/9 supported one card readers connected computer activated user placing card deck hopper pressing start button presumably computer would read source deck place cards read output hopper card deck consisted valid login would process card deck job execute vs/9 controlled computer operator central site computer operators interacted system system console initially console teletype device later upgraded video display device attached system console printer system console messages logged system console printer unsolicited messages originating operating system also logged system console printer computer operators number responsibilities one useful enhancements late life vs/9 volume groups disk technology time provided limited storage space disk since disk drives comparatively large quite expensive manufacturers disk drives provided capability physically remove actual disk device replace another customers thus ability store many times capacity disk drives albeit could necessarily used simultaneously unless enough free disk drives limited disk storage space also presented users another problem often files would larger could contained one disk volume groups helped mitigate technological problem allowing files span multiple disks volumes disks mounted simultaneously designated volume group owners could defined order limit access sensitive data mounted attached active task entire volume group could dismounted attached tasks either released terminated every disk available system part volume group even one volume group volume groups could designated removable fixed fixed volume groups could removed time necessary disks housed operating system files supported transactional terminals remote batch processing rbp capability existed vs/9 although never completely exploited probably due limited demand rbp allowed remote users submit batch jobs execution mainframe receive results back offsite printer typically remote batch device consisted card reader printer connected communication line interfaced remote batch services operating system like local batch job operators could receive requests tape disk mounts/dismounts program prompts responses questions vs/9 managed tasks task type task types could either executing programs queues pending tasks following task types used vs/9 mcp cos always type 2 tasks computer operator would see count number tasks within queue system console complete list task queues available interactive terminal administrator access via field-written program known stat200 program would scan task queues every seconds display rolling list tasks terminal screen interrupted terminated officially released product became de facto standard task monitoring vs/9 controlled access use account name user name account name 1 7 character identifier user name also 1 8 character identifier identifiers account names user names could letters numbers account name equivalent directory name unix-style user accounts note user name indicated person sharing account party using thus example account name s0103 two users whose name pat leslie account would complete identifier s0103 pat s0103 leslie files would stored directory s0103 thus could create files name note account name say pa5 user named pat identifier would pa5 pat would completely unrelated user named pat accounts could given restrictions requiring password use limits amount files amount usage time permitted usage allowing logons 5 p.m. 8 a.m. cpu limits user could also issue commands system interrupt program current session used certain amount wall-clock cpu time user terminal logged wanted start session would press red transmit key univac vdt use control-c ascii terminal vs/9 would issue following response followed slash case univac vdt prompt character looked like inverse color greater sign user would logon typing word 'logon followed identifier e.g account name comma user name password account would type comma followed password could 1 4 characters contained one spaces trailing spaces could omitted typed single quotes contained non-printable binary characters typed using letter x followed quote 8-character hexadecimal value password account s0103 password hexadecimal a0b0c0 space user leslie would logon system typing credentials incorrect either account name user name password incorrect would get message would given prompt logon credentials correct system manager owner account tsos posted system message would display time user would command mode standard prompt would appear could type various commands user would finish session typing logoff pressing transmit univac vdt control-c ascii terminal univac vdt terminal four function keys top vs/9 specifically recognized vs/9 accepted commands typing command options commands issued batch stream either cards batch file required preceded slash commands entered terminal require use slash commands included following one issued break running program break key ascii terminal f1 key univac vdt used load command instead exec one would break mode program suspended allow user command mode could issue commands well following file names could 56 characters length file could consist letters numbers dashes digits file name digits permissible file could two consecutive periods access file another account necessary user account make file public file public could accessed another user prefixing name file indicator file referenced another account dollar sign followed account name followed period file named account s0103 user account pa5 wanted access file account s0103 first file would marked public second would referenced account name name file user account pa5 wanted access file account s0103 file public would reference s0103.a note user account s0103 could reference file simply could reference fully qualified file name including dollar sign account name followed period name public files special account tsos could accessed using alone first character file unless file began name identical account number case explicit account reference tsos would required also tsos would called path name missing files referenced name found user account example file called s0103.xyzzy account tsos account system named s0103 user wanting access would access tsos.s0103.xyzzy tsos also default account file referenced exist locally example execute edt editor program one would issue command run program exec followed name file called edt user created file named edt could execute edt editor typing pressing transmit key reason created program name use system editor would type could explicitly type system account unisys discontinued sales 9000 series mainframes favor exec 8 series computers probably longer cost effective market mainframes shrank vs/9 effectively abandoned company
|
Operating systems
|
comparison business integration software article comparison notable business integration business process automation software scope comparison supported hardware depends supported operating systems
|
Distributed computing architecture
|
multipath i/o computer storage multipath i/o fault-tolerance performance-enhancement technique defines one physical path cpu computer system mass-storage devices buses controllers switches bridge devices connecting example scsi hard disk drive may connect two scsi controllers computer disk may connect two fibre channel ports one controller port switch fail operating system route i/o remaining controller port switch transparently changes visible applications perhaps resulting increased latency multipath software layers leverage redundant paths provide performance-enhancing features including dynamic load balancing traffic shaping automatic path management dynamic reconfiguration
|
Computer architecture
|
x.500 x.500 series computer networking standards covering electronic directory services x.500 series developed telecommunication standardization sector international telecommunications union itu-t itu-t formerly known consultative committee international telephony telegraphy ccitt x.500 approved first 1988 directory services developed support requirements x.400 electronic mail exchange name lookup international organization standardization iso partner developing standards incorporating open systems interconnection suite protocols iso/iec 9594 corresponding iso identification protocols defined x.500 include protocols used osi networking stack number alternatives dap developed allow internet clients access x.500 directory using tcp/ip networking stack well-known alternative dap lightweight directory access protocol ldap dap x.500 protocols use tcp/ip networking stack ldap remains popular directory access protocol primary concept x.500 single directory information tree dit hierarchical organization entries distributed across one servers called directory system agents dsa entry consists set attributes attribute one values entry unique distinguished name formed combining relative distinguished name rdn one attributes entry rdns superior entries root dit ldap implements similar data model x.500 description data model article ldap x.520 x.521 together provide definition set attributes object classes used representing people organizations entries dit one widely deployed white pages schema x.509 portion standard providing authentication framework also widely used outside x.500 directory protocols specifies standard format public-key certificates current use x.509v3 certificates outside directory structure loaded directly web browsers necessary e-commerce develop allowing secure web based ssl/tls communications require x.500 directory source digital certificates originally conceived x.500 1988 one contrast role x.500 x.509 understand relationship x.509 designed secure access method updating x.500 www web browsers became popular needed simple method encrypting connections transport layer web sites hence trusted root certificates supported certificate authorities pre loaded certificate storage areas personal computer device added security envisaged scheduled 2011-2014 implementation us national strategy trusted identities cyberspace two- three-year project protecting digital identities cyberspace www e-commerce implementation x.509v3 bypassed replace original iso standard authentication mechanism binding distinguished names x.500 directory packages certificates added removed end user software reviewed microsoft mozilla terms continued trustworthiness problem arise occurred diginotar browser security experts issue update mark certificate authority untrusted serious removal effectively ca internet trust x.500 offers way view organization claims specific root certificate outside provided bundle function 4 corner model trust adding another check determine root certificate compromised rules governing federal bridge policy revoking compromised certificates available www.idmanagement.gov contrast browser bundled approach x.500 ldap attribute cacertificate bound directory entry checked addition default pre-loaded bundle certificates end users typically never noticed unless ssl warning message appeared example web site using ssl typically dns site name www.foobar.com verified browser software using libraries would check see certificate signed one trusted root certificates given user therefore creating trust users reached correct web site via https however stronger checks also possible indicate domain name verified contrast x.500 certificate one attribute many entry entry could contain anything allowable specific directory schema thus x.500 store digital certificate one many attributes could potentially verify organization physical address contact telephone number email contact ca certs certificate authority certs loaded browser automatically case microsoft update mechanism new version updates browsers user given choices import delete develop individual trust relationship loaded certificate authorities determine browser behave ocsp revocation servers unreachable contrast directory model associates attribute cacertificate listed certificate authority thus browser verify ssl cert website means loaded group accepted certificates root certificates looked x.500 ldap directory via http/s imported list trusted certificate authorities bound distinguished name located subject fields certificate matches directory entry x.509v3 contain extensions depending community interest international domain names broad internet use rfc-5280 pkix describes profile fields may useful applications encrypted email end user relies authenticity certificate presented browser email simple way compare forged certificate presented perhaps triggers browser warning valid certificate without also given opportunity validate dn distinguished name designed looked x.500 dit certificate public considered unforgeable therefore distributed manner associated binding identity occurs directory binding links certificate identity claims using certificate example x.500 software runs federal bridge cross certificates enable trust certificate authorities simple homographic matching domain names resulted phishing attacks domain appear legitimate x.509v3 certificate bound valid organization distinguished name within directory simple check made regards authenticity certificate comparison presented browser present directory options exist check notaries see certificate recently seen therefore likely compromised cert likely trusted failing domain name slight mismatch initially fail browser subjected notary trust bypass browser warning valid organizational entry o=foobarwidgets also associated alphanumeric oid identity proofed ansi providing another layer assurance regarding binding certificate identity recent events 2011 indicated threat unknown actors nation states forged certificates done order create mitm attack political activists syria accessing facebook web would normally triggered browser warning would mitm certificate issued valid certificate authority already trusted browser software similar attacks used stuxnet allowed software impersonate trusted code point certificate transparency allow end user determine using simple procedure certificate fact valid checking default bundle certificates may enough therefore additional check desired suggestions certificate transparency also advanced different attack used comodo certificate authority resulted forged certificates directed high-profile communications websites necessitated emergency patch major browsers certificates actually issued trusted certificate authority therefore user would warning gone faked website contrast syria incident certificate crudely forged including substituting alto palo palo alto incorrect serial numbers projects designed exchange phi protected health information considered highly hipaa sensitive may obtain x.509v3 certs via cert dns resource record via ldap x.500 2008 directory issue authoritative bind detailed rfcs related accuracy dns information secured signing root using dnssec concept root name servers source major contention internet community dns largely resolved name space associated x.500 traditionally thought start national naming authority mirrors iso/itu approach global systems national representation thus different countries create unique x.500 services u.s. x.500 privatized 1998 u.s. government longer offered x.500 dns registration outside known government agencies x.500 pilot project development commercial space technology continues present major installations millions users within corporate data centers within u.s. government credentialing authors rfc 2693 concerning spki note original x.500 plan unlikely ever come fruition collections directory entries ... considered valuable even confidential owning lists likely released world form x.500 directory sub-tree x.500 idea distinguished name single globally unique name everyone could use referring entity also likely occur x.500 complex support desktops internet ldap created provide service 'for rest us
|
Internet protocols
|
objectpal objectpal short object-oriented paradox application language programming language used borland paradox database application owned corel paradox 11th version constituent corel word perfect x3 office suite 32-bit microsoft windows language tightly-bound application forms provides rapid robust development environment creating database applications windows objectpal full free-standing object-oriented language belongs family languages inspired hypercard influences pal wherever functionality could kept smalltalk garnet ui language created brad myers objects encapsulate source code support polymorphism limited inheritance concept wedded objects form controlled code placed higher object form object hierarchy however objectpal provides wideranging versatile language creating paradox applications syntax structure language resembles visual basic knowing visual basic would help someone new objectpal sense programming skill would transferable objectpal objectpal successor pal paradox dos programming language advent paradox windows 1.0 1993 owned borland corporation objectpal born version 1.0 quickly succeeded version 4.5 year used web server scripting language combined corel web server control ocx implements server api similar cgi standalone console corel web server
|
Programming language topics
|
ys ii ancient ys vanished – final chapter later adapted anime ys ii castle heavens 1992 like predecessor ys ii ported various platforms following first release fm-7 x1 msx2 famicom released along predecessor part enhanced compilation ys ii turbografx-cd hudson soft 1989 many years version ys ii received official english release ms-dos remake called ys ii special developed mantra released exclusively south korean market 1994 mash-up ys ii anime ys ii castle heavens 1992 along large amount new content including secrets version game game success korea despite competition korean rpg astonishia story year years later third remake released microsoft windows-based pcs ys ii eternal later ys ii complete versions game also developed mobile phone platforms ys ii also remade 2008 nintendo ds english translation version released atlus north america along ds version ys single card legacy ys books ii 2009 japanese version released single game came 2008 ys ii picks immediately ys left adol christin transported floating island ys meets young woman named lilia takes adol home lance village begin quest unravel secrets ys finally rid esteria evil player controls adol battles way across land ys first game adol strength measured typical rpg fashion numerical statistics hp attack power defense power determine strength stats increased raising experience level battling also returning first game 'bump combat system player attacks enemies running enemy takes damage according adol stats enemy stats adol position enemy position new addition ys ii magic system adol acquire several different spells use throughout course play fire spell attack time spell stop enemies long active use magic consumes adol mp stat another major change combat game compared previous game bump combat system used bosses crashing two bosses game attempt damage result adol taking damage bosses must defeated fire spell soundtrack ys ii composed yuzo koshiro hideya nagata several music cds dedicated music ys ii released falcom include japanese game magazine famitsu gave famicom nes version score 27 40 famitsu gave pce-cd turbografx-cd version score 35 40
|
Computer architecture
|
xploder xploder brand game cheats multimedia devices games consoles similar action replay xploder products released dreamcast ps2 playstation psp xbox gamecube n64 game boy game boy advance pc others support ps3 xbox 360 nintendo wii started 2006-2007 xploder products often bundled accessories game consoles lexar memory sticks psp x-link cable ps2 v5 media centre version newer versions xbox 360 playstation 3 allow users download saved games internet utilizing xploder disc original playstation users found possible boot backup copied versions games
|
Computer architecture
|
xmpp extensible messaging presence protocol xmpp communication protocol message-oriented middleware based xml extensible markup language enables near-real-time exchange structured yet extensible data two network entities originally named jabber protocol developed homonym open-source community 1999 near real-time instant messaging im presence information contact list maintenance designed extensible protocol used also publish-subscribe systems signalling voip video file transfer gaming internet things iot applications smart grid social networking services unlike instant messaging protocols xmpp defined open standard uses open systems approach development application anyone may implement xmpp service interoperate organizations implementations xmpp open protocol implementations developed using software license many server client library implementations distributed free open-source software numerous freeware commercial software implementations also exist internet engineering task force ietf formed xmpp working group 2002 formalize core protocols ietf instant messaging presence technology xmpp working group produced four specifications rfc 3920 rfc 3921 rfc 3922 rfc 3923 approved proposed standards 2004 2011 rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 respectively rfc 6122 specifying xmpp address format 2015 rfc 6122 superseded rfc 7622 addition core protocols standardized ietf xmpp standards foundation formerly jabber software foundation active developing open xmpp extensions xmpp-based software deployed widely across internet 2003 used ten million people worldwide according xmpp standards foundation jeremie miller began working jabber technology 1998 released first version jabberd server january 4 1999 early jabber community focused open-source software mainly jabberd server major outcome proved development xmpp protocol early jabber protocol developed 1999 2000 formed basis xmpp published rfc 3920 rfc 3921 primary changes formalization ietf xmpp working group addition tls channel encryption sasl authentication note rfc 3920 rfc 3921 superseded rfc 6120 rfc 6121 published 2011 first im service based xmpp jabber.org operated continuously offered free accounts since 1999 1999 february 2006 service used jabberd server software time migrated ejabberd free software application servers january 2010 service migrated proprietary m-link server software produced isode ltd august 2005 google introduced google talk combination voip im system uses xmpp instant messaging base voice file transfer signaling protocol called jingle initial launch include server-to-server communications google enabled feature january 17 2006 google since added video functionality google talk also using jingle protocol signaling may 2013 google announced xmpp compatibility would dropped google talk server-to-server federation although would retain client-to-server support january 2008 aol introduced experimental xmpp support aol instant messenger aim service allowing aim users communicate using xmpp however march 2008 service discontinued may 2011 aol offers limited xmpp support september 2008 cisco systems acquired jabber inc. creators commercial product jabber xcp february 2010 social-networking site facebook opened chat feature third-party applications via xmpp functionality unavailable xmpp support dropped april 2014 similarly december 2011 microsoft released xmpp interface microsoft messenger service skype de facto successor also provides limited xmpp support however native xmpp implementations xmpp network uses client–server architecture clients talk directly one another model decentralized anyone run server design central authoritative server services aol instant messenger windows live messenger confusion often arises point public xmpp server run jabber.org large number users subscribe however anyone may run xmpp server domain every user network unique xmpp address called jid historical reasons xmpp addresses often called jabber ids jid structured like email address username domain name ip address server user resides separated sign username example.com since user may wish log multiple locations may specify resource resource identifies particular client belonging user example home work mobile may included jid appending slash followed name resource example full jid user mobile account could username example.com/mobile resource may specified numerical value called priority messages simply sent username example.com go client highest priority sent username example.com/mobile go mobile client highest priority one largest numerical value jids without username part also valid may used system messages control special features server resource remains optional jids well means route messages based logical endpoint identifier jid instead explicit ip address present opportunities use xmpp overlay network implementation top different underlay networks one original design goals early jabber open-source community enabling users connect multiple instant messaging systems especially non-xmpp systems single client application done entities called transports gateways instant messaging protocols also protocols sms email unlike multi-protocol clients xmpp provides access server level communicating via special gateway services running alongside xmpp server user register one gateways providing information needed log network communicate users network though xmpp users thus gateways function client proxies gateway authenticates user behalf non-xmpp service result client fully supports xmpp access network gateway without extra code client without need client direct access internet however client proxy model may violate terms service protocol used although terms service legally enforceable several countries also requires user send im username password third-party site operates transport may raise privacy security concerns another type gateway server-to-server gateway enables non-xmpp server deployment connect native xmpp servers using built interdomain federation features xmpp server-to-server gateways offered several enterprise im software products including xmpp provides general framework messaging across network offers multitude applications beyond traditional instant messaging im distribution presence data several service discovery protocols exist today zeroconf service location protocol xmpp provides solid base discovery services residing locally across network availability services via presence information specified xep-0030 disco building capability support discovery across local network domains xmpp well-suited cloud computing virtual machines networks firewalls would otherwise present obstacles alternative service discovery presence-based solutions cloud computing storage systems rely various forms communication multiple levels including messaging systems relay state also migration distribution larger objects storage virtual machines along authentication in-transit data protection xmpp applied variety levels may prove ideal extensible middleware message-oriented middleware mom protocol widely known ability exchange xml-based content natively become open platform exchange forms content including proprietary binary streams full motion video fmv content transport file-based content via example jingle series extensions majority applications nothing human communications i.e. im instead provide open means support machine-to-machine peer-to-peer communications across diverse set networks xmpp implemented large number clients servers code libraries implementations provided variety software licenses original native transport protocol xmpp transmission control protocol tcp using open-ended xml streams long-lived tcp connections alternative tcp transport xmpp community also developed http transport web clients well users behind restricted firewalls original specification xmpp could use http two ways polling binding polling method deprecated essentially implies messages stored server-side database fetched posted regularly xmpp client way http 'get 'post requests binding method implemented using bidirectional-streams synchronous http bosh allows servers push messages clients soon sent push model notification efficient polling many polls return new data client uses http firewalls allow clients fetch post messages without hindrances thus scenarios tcp port used xmpp blocked server listen normal http port traffic pass without problems various websites let people sign xmpp via browser furthermore open public servers listen standard http port 80 https port 443 ports hence allow connections behind firewalls however iana-registered port bosh actually 5280 80 several large public im services natively use xmpp including livejournal lj talk nimbuzz hipchat various hosting services dreamhost enable hosting customers choose xmpp services alongside traditional web email services specialized xmpp hosting services also exist form cloud domain owners need directly run xmpp servers including cisco webex connect chrome.pl flosoft.biz i-pobox.net hosted.im largest messaging providers use using various forms xmpp based protocols backend systems without necessarily exposing fact end users includes whatsapp google talk facebook chat deprecated facebook messaging system deployments built free-software erlang-based xmpp server called ejabberd xmpp also used deployments non-im services including smart grid systems demand response applications message-oriented middleware replacement sms provide text messaging many smartphone clients xmpp de facto standard private chat gaming related platforms origin raptr playstation discontinued xfire two notable exceptions steam xbox live use proprietary messaging protocols xmpp standards foundation xsf develops publishes extensions xmpp standards process centered xmpp extension protocols xeps previously known jabber enhancement proposals jeps following extensions especially wide use xmpp features federation across domains publish/subscribe authentication security even mobile endpoints used implement internet things several xmpp extensions part experimental implementation efficient xml interchange exi format sensor data provisioning control concentrators discovery efforts documented page xmpp wiki dedicated internet things xmpp iot mailing list ietf xmpp working group produced series request comments rfc documents important widely implemented specifications xmpp often regarded competitor simple based session initiation protocol sip standard protocol instant messaging presence notification xmpp extension multi-user chat seen competitor internet relay chat irc although irc far simpler far fewer features far widely used xmpp extensions publish-subscribe provide many features advanced message queuing protocol amqp xmpp standards foundation xsf formerly jabber software foundation active developing open xmpp extensions called xep however extensions also defined individual software project organization another example federation protocol apache wave based xmpp
|
Internet protocols
|
windows color system windows color system wcs platform color management first included windows vista aims achieve color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc profiles windows color system features color infrastructure translation engine cite core backed color processing pipeline supports bit-depths 32 bits per pixel multiple color channels three alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also supports floating point calculations minimize round-off errors inherent integer processing color pipeline finishes processing colors cite engine applies color translation according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer support deprecated v2 standard show dark images used v4 profiles windows imaging component hd photo format xps print path xps documents support color management wcs superset image color management icm first included windows 2000 windows xp windows server 2003
|
Operating systems
|
encyclopedia triangle centers encyclopedia triangle centers etc online list thousands points centers associated geometry triangle maintained clark kimberling professor mathematics university evansville list identifies 32,784 triangle centers point list identified index number form x n —for example x 1 incenter information recorded point includes trilinear barycentric coordinates relation lines joining identified points links geometer sketchpad diagrams provided key points encyclopedia also includes glossary terms definitions point list assigned unique name cases particular name arises geometrical historical considerations name star used instead example 770th point list named point acamar first 10 points listed encyclopedia points entries encyclopedia include similar albeit shorter lists exist quadri-figures quadrilaterals systems four lines polygon geometry see external links
|
Databases
|
data loss prevention software data loss prevention software detects potential data breaches/data ex-filtration transmissions prevents monitoring detecting blocking sensitive data use endpoint actions motion network traffic rest data storage terms data loss data leak related often used interchangeably data loss incidents turn data leak incidents cases media containing sensitive information lost subsequently acquired unauthorized party however data leak possible without losing data originating side terms associated data leakage prevention information leak detection prevention ildp information leak prevention ilp content monitoring filtering cmf information protection control ipc extrusion prevention system eps opposed intrusion prevention system technological means employed dealing data leakage incidents divided categories standard security measures advanced/intelligent security measures access control encryption designated dlp systems standard security measures firewalls intrusion detection systems idss antivirus software commonly available products guard computers outsider insider attacks use firewall example prevents access outsiders internal network intrusion detection system detects intrusion attempts outsiders inside attacks averted antivirus scans detect trojan horses send confidential information use thin clients operate client-server architecture personal sensitive data stored client device advanced security measures employ machine learning temporal reasoning algorithms detecting abnormal access data e.g. databases information retrieval systems abnormal email exchange honeypots detecting authorized personnel malicious intentions activity-based verification e.g. recognition keystroke dynamics user activity monitoring detecting abnormal data access designated systems detect prevent unauthorized attempts copy send sensitive data intentionally unintentionally mainly personnel authorized access sensitive information order classify certain information sensitive use mechanisms exact data matching structured data fingerprinting statistical methods rule regular expression matching published lexicons conceptual definitions keywords network data motion technology typically installed network egress points near perimeter analyzes network traffic detect sensitive data sent violation information security policies multiple security control points may report activity analyzed central management server endpoint data use systems run internal end-user workstations servers like network-based systems endpoint-based technology address internal well external communications therefore used control information flow groups types users e.g 'chinese walls also control email instant messaging communications reach corporate archive blocked communication i.e. one never sent therefore subject retention rules identified subsequent legal discovery situation endpoint systems advantage monitor control access physical devices mobile devices data storage capabilities cases access information encrypted endpoint-based systems provide application controls block attempted transmissions confidential information provide immediate user feedback must installed every workstation network used mobile devices e.g. cell phones pdas practically installed example workstation internet café dlp includes techniques identifying confidential sensitive information sometimes confused discovery data identification process organizations use dlp technology determine look data classified either structured unstructured structured data resides fixed fields within file spreadsheet unstructured data refers free-form text media text documents pdf files video estimated 80 data unstructured 20 structured data classification divided content analysis focused structured data contextual analysis looks place origin application system generated data methods describing sensitive content abundant divided precise imprecise methods precise methods involve content registration trigger almost zero false positive incidents methods imprecise include keywords lexicons regular expressions extended regular expressions meta data tags bayesian analysis statistical analysis techniques machine learning behavior analytics hierarchical threat modeling predefined dlp templates etc strength analysis engine directly relates accuracy accuracy dlp identification important lowering/avoiding false positives negatives accuracy depend many variables may situational technological testing accuracy recommended ensure virtually zero false positives/negatives high false positive rates cause system considered dld dlp sometimes data distributor gives sensitive data one third parties sometime later data found unauthorized place e.g. web user laptop distributor must investigate source leak data rest specifically refers old archived information information great concern businesses government institutions simply longer data left unused storage likely might retrieved unauthorized individuals protecting data involves methods access control data encryption data retention policies data use refers data user currently interacting dlp systems protect data in-use may monitor flag unauthorized activities activities include screen-capture copy/paste print fax operations involving sensitive data intentional unintentional attempts transmit sensitive data communication channels data motion data traversing network endpoint
|
Computer security
|
john c. reynolds john charles reynolds june 1 1935 – april 28 2013 american computer scientist john reynolds studied purdue university earned phd theoretical physics harvard university 1961 professor information science syracuse university 1970 1986 death professor computer science carnegie mellon university also held visiting positions aarhus university denmark university edinburgh imperial college london microsoft research cambridge queen mary university london uk reynolds main research interest area programming language design associated specification languages especially concerning formal semantics invented polymorphic lambda calculus system f formulated property semantic parametricity calculus independently discovered jean-yves girard wrote seminal paper definitional interpreters clarified early work continuations introduced technique defunctionalization applied category theory programming language semantics defined programming languages gedanken forsythe known use intersection types worked separation logic describe reason shared mutable data structures editor journals communications acm journal acm 2001 appointed fellow acm acm sigplan programming language achievement award 2003 lovelace medal british computer society 2010
|
Programming language topics
|
computation offloading computer science computation offloading transfer resource intensive computational tasks external platform cluster grid cloud offloading may necessary due hardware limitations devices limited computational power storage energy resource intensive tasks may searching virus scanning image processing artificial intelligence computational decision making etc offloading mainly used mobile cloud computing edge computing fog computing
|
Distributed computing architecture
|
qpopper qpopper one oldest popular server implementations pop3 free open-source server distributed bsd style license common choice internet service providers schools corporations organizations included several linux unix distributions qpopper longer maintained final version 4.1.0 released 2011 qpopper distributed qualcomm source code parties offer pre-compiled pre-configured versions various platforms qpopper ran wide variety platforms including virtually unix linux distribution mac os x even windows cygwin qpopper generally recognized fast stable secure commonly used standard unix mbox format inboxes spools also supported homedir mail mbox linear format messages stored sequentially qpopper supports number optimizations improve speed scalability including cache file maintain mailbox state sessions several optional i/o techniques qpopper started popper around 1989 university california berkeley qualcomm took 1993 renamed qpopper qualcomm original goal promote availability correct modern servers eudora mail client use also provide platform newer extensions
|
Internet protocols
|
cyber storm ii cyber storm ii international cyber security exercise sponsored united states department homeland security 2008 week-long exercise centered washington dc concluded march 15
|
Computer security
|
sqlalchemy sqlalchemy open-source sql toolkit object-relational mapper orm python programming language released mit license sqlalchemy provides full suite well known enterprise-level persistence patterns designed efficient high-performing database access adapted simple pythonic domain language sqlalchemy philosophy relational databases behave less like object collections scale gets larger performance starts concern object collections behave less like tables rows abstraction designed reason adopted data mapper pattern similar hibernate java rather active record pattern used number object-relational mappers however optional plugins allow users develop using declarative syntax sqlalchemy first released february 2006 quickly become one widely used object-relational mapping tools python community alongside django orm following example represents n-to-1 relationship movies directors shown user-defined python classes create corresponding database tables instances relationships created either side relationship finally data queried—illustrating automatically-generated sql queries lazy eager loading creating two python classes according database tables dbms one insert director-movie relationship via either entity sqlalchemy issues following query dbms omitting aliases output setting codice_1 default instead sqlalchemy would first issue query get list movies needed lazy director query get name according director
|
Databases
|
multi-user basic multi-user basic dialect basic language dec pdp-11 running rt-11 operating system one users supported separate address spaces sharing language interpreter syntax language similar identical basic-11 key language element support virtual files similar virtual arrays basic-plus limited array integers floatingpoint character strings length 1 2 4 8 16 32 64 could placed file accessed subscript file could actually opened re-opened different definition allowing integers characters floating point numbers stored file like basic-11 multi-user basic provided support lab equipment support character terminals la30 vt100 multi-user system support real-time data collection
|
Programming language topics
|
threatconnect threatconnect cyber-security firm based arlington virginia provide threat intelligence platform companies aggregate act upon threat intelligence firm founded 2011 cyber squared inc. adam vincent richard barger andrew pendergast leigh reichel renamed threatconnect series funding 4 million 2014 december 2015 obtained series b funding 16 million company gained attention linked anthem medical data breach chinese government-sponsored entities according cybercrime expert brian krebs threatconnect identified domains used group intentionally similar legitimate domains used anthem also linked guccifer 2.0 responsible 2016 democratic national committee email leak russian-backed cyberespionage group fancy bear cyberattacks attributed fancy bear include group investigating malaysia airlines 17 crash world anti-doping agency recently issued report state-sponsored doping
|
Computer security
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.