text
stringlengths
6
1.88M
source
stringclasses
13 values
elliott algol elliott algol algol 60 compiler elliott 803 computer implemented tony hoare others differed slightly reference version algol particularly supported character set first released february 1962 believed first implementation algol 60 compiler commercial context unexpectedly popular product company
Programming language topics
asphalt 6 adrenaline asphalt 6 adrenaline 2010 racing video game developed published gameloft part asphalt series released ios december 21 2010 mac os x february 17 2011 android june 15 symbian^3 july 20 mobile phones august 31 webos september 3 blackberry playbook october 12 bada 2.0 january 10 2012 gameplay asphalt 6 adrenaline similar asphalt 5 player given option either tilting device touching side screen steer game also multiplayer mode local wi-fi bluetooth global internet connection player acquire five stars race performance based conditions set prior race concerning primary secondary objectives destroying certain number opponents drifting certain amount time new feature asphalt 6 adrenaline mode achieved hitting nitro meter full adrenaline mode player car becomes virtually indestructible ability easily wreck opponents upon slightest contact 42 licensed vehicles available game player starts dmc delorean abarth 500 ss nissan nismo 370z cars motorcycles custom painted tuned vehicles become available player progresses include shelby gt500 ktm x-bow tesla roadster sport audi s5 bmw z4 sdrive35is spyder citroën survolt maserati gran turismo bmw m3 gts ducati hypermotard bentley gt speed lamborghini estoque ferrari california nissan gt-r ducati 1198 ferrari f430 scuderia dodge viper srt10 acr-x ruf rt 12 mercedes-benz slr mclaren stirling moss lamborghini gallardo lp 570-4 superleggera ferrari 458 italia mclaren mp4-12c lamborghini murciélago lp 670-4 sv ruf ctr3 pagani zonda cinque ktm rc8 aston martin one-77 bugatti veyron 16.4 grand sport fastest car available player bentley speed 8 however acceleration bugatti veyron 16.4 grand sport due electronic arts ownership porsche license porsche vehicles although tuned variants ruf locations include nassau chamonix cape town havana new orleans moscow tokyo los angeles reykjavík new york city monte carlo shanghai exclusive android version rio de janeiro detroit hong kong game consists variety events java version asphalt 6 mobile phones consists slightly different gameplay style game consists free play mode well career mode racer must race way across number leagues winning races additional challenges one ultimately become lord asphalt game reaches 100 completion upon release asphalt 6 adrenaline received generally favorable reviews ios version holds aggregate score 79 100 metacritic based thirteen reviews 82 gamerankings based six reviews pocket gamer keith andrew scored game 9 10 arguing overall gameplay second-to-none elements come together – boosting burning bashing racers – asphalt 6 really finds rhythm delivering kind heart-hammering experience usually confined racers adorning big screen living room gameloft limits comes asphalt 6 adrenaline mobile game efforts marry exploits every racing franchise sun ends delivering experience outstrips almost felix xiao appadvice similar reaction praising graphics concluding 're looking action-packed racer pass time look asphalt 6 provide plus much dollars greatly improved artwork another set fantastic rides massive amount gameplay almost guarantee wo n't ever get enough 6.99 asphalt 6 must buy likely remain best arcade racing game time chris hall 148apps also reacted positively awarding score 4.5 5 praising feel game going fast asphalt 6 feels like going really fast engine explodes sound high rpm adrenaline boosts turbo look like straight tron crazy speed effects make game quite entertaining n't go thinking going looking next real racing 2 ... question racing fans get kick asphalt 6 fans arcade racers love bit graphics solid sound good driving mechanics exciting maybe bit forgiving racing sim fans game plain fun like kinds games definitely wo n't regret purchase ign levi buchanan slightly less impressed awarding game score 7.5 10 praising graphics controls arguing asphalt series become somewhat predictable asphalt 6 adrenaline fun arcade racer bunch cars tracks want speed exotic locations game let honest asphalt series starting get really familiar though still reliable fun series needs something next time offer slide play andrew podolsky similar mind ign feeling series become stagnant scoring game 3 4 score awarded asphalt 5 gameloft got us bit bind games consistently push technical limits iphone new iteration long-running series like asphalt looking sounding better one without bit creativity asphalt series starting feel like stuck second gear sixth asphalt game third iphone another brilliant technical achievement environments detailed colorful distinctive detected almost graphical pop-in frame rate slowdown played 4th generation ipod touch time huge leap saw asphalt 5 ... really missing asphalt 6 adrenaline graphical flair well-balanced gameplay progression gameloft found way churn iphone games look good feel viscerally exciting hollywood blockbusters like blockbusters sometimes left looking product lacks basic creativity basically events last game little incentive buy year asphalt
Operating systems
richard p. gabriel richard p. gabriel born 1949 american computer scientist known work computing related programming language lisp especially common lisp best known work 1990 essay lisp good news bad news win big introduced phrase worse better set benchmarks lisp termed gabriel benchmarks published 1985 performance evaluation lisp systems became standard way benchmark lisp implementations born 1949 town merrimac northeastern massachusetts two dairy farmers studied northeastern university boston earned b.a mathematics 1967–1972 resides redwood city california wife jo son named joseph daughter named mariko doctor physical therapy los altos california subsequently pursued graduate studies mathematics mit 1972–73 tapped patrick winston become permanent member artificial intelligence ai lab mit funding difficulties made impossible retain gabriel tried start dave waltz ai lab university illinois urbana–champaign two years lab fell due general apathy time 1973–75 gabriel managed earn ms mathematics mathematical work gabriel admitted stanford university time 1975–1981 served teaching assistant john mccarthy founder lisp ported maclisp native operating system incompatible timesharing system waits earned phd computer science topic natural language generation wife kathy son around time became spokesperson league programming freedom earning phd continued work ai projects mccarthy although thesis advisor terry winograd eventually began working lawrence livermore national laboratory recruited several researchers programmers company lucid incorporated founded 1984 would leave 1992 survived 1994 gabriel various times president chairman lucid inc product company shipped lisp integrated development environment ide sun microsystems ’ reduced instruction set computer risc hardware architecture named sparc sidestepped main failure lisp machines essence rewriting lisp machine ide use cost-effective less moribund architecture time gabriel married second wife daughter later divorced second wife 1993 eventually lucid focus shifted ai winter ide c++ core component ide richard stallman ’ version emacs gnu emacs gnu emacs lucid ’ needs however several lucid programmers assigned help develop gnu emacs friction arose programmers stallman handle graphical user interface gui issues lucid forked emacs thus became mainly responsible birth would come called xemacs one hires another notable programmer jamie w. zawinski gabriel left lucid inc. good became vice president development parcplace systems 1994–1995 consultant among others aspen smallworks joining sun microsystems distinguished engineer gabriel influential contributor evolution open source software strategy culminating publication book innovation happens elsewhere 2007 joined ibm research distinguished engineer gabriel received association computing machinery acm 1998 fellows award 2004 acm-aaai allen newell award citation reads “ innovations programming languages software design promoting interaction computer science disciplines notably architecture poetry. ” chairman object-oriented programming systems languages applications oopsla conference 2007 1998 received mfa poetry warren wilson college published poems literary journals chapbook drive published hollyridge press 2005
Programming language topics
versioning file system versioning file system computer file system allows computer file exist several versions time thus form revision control common versioning file systems keep number old copies file limit number changes per minute per hour avoid storing large numbers trivial changes others instead take periodic snapshots whose contents accessed similar semantics normal file access ... versioning file system similar periodic backup several key differences versioning file systems provide features revision control systems however unlike revision control systems transparent users requiring separate commit step record new revision versioning file systems confused journaling file systems whereas journaling file systems work keeping log changes made file committing changes file system overwriting prior version versioning file system keeps previous copies file saving new changes two features serve different purposes mutually exclusive object storage implementations offers object versioning amazon s3 early implementation versioning possibly first mit filename consisted two six-character parts second part numeric consisted digits treated version number specifying file open read write one could supply second part reading meant open highest-numbered version file writing meant increment highest existing version number create new version writing another early implementation versioning tenex became tops-20 powerful example file versioning system built rsx-11 openvms operating system digital equipment corporation essence whenever application opens file writing file system automatically creates new instance file version number appended name version numbers start 1 count upward new instances file created application opens file reading either specify exact file name including version number file name without version number case recent instance file opened purge dcl/ccl command used time manage number versions specific directory default highest numbered versions files current directory deleted behavior overridden /keep=n switch and/or specifying directory path and/or filename patterns vms systems often scripted purge user directories regular schedule sometimes misconstrued end-users property versioning system mainstream linux file system supports versioning number experimental/research lesser-known solutions namely lisp machine file system supports versioning provided implementations mit lmi symbolics texas instruments operating system symbolics genera starting lion 10.7 macos feature called versions allows time machine-like saving browsing past versions documents applications written use versions functionality however takes place application layer filesystem layer lion later releases incorporate true versioning file system htfs adopted primary filesystem sco openserver 1995 supports file versioning versioning enabled per-directory basis setting directory setuid bit inherited subdirectories created versioning enabled new file version created file directory removed existing file opened truncation non-current versions remain filesystem namespace name original file suffix attached consisting semicolon version sequence number current version hidden directory reads unless showversions environment variable set versions otherwise accessible normal operations environment variable general accessibility allow versions managed usual filesystem utilities though also undelete command used purge restore files enable disable versioning directories etc following versioning filesystems allow similar functionality
Computer file systems
macos version history history macos apple current mac operating system originally named mac os x 2012 os x 2016 began company project replace classic mac os system including final release mac os 9 direct descendant operating system apple used macintosh computers since introduction 1984 however current macos unix operating system built technology developed next 1980s apple purchased company early 1997 although originally marketed simply version 10 mac os indicated roman numeral x completely different codebase mac os 9 well substantial changes user interface transition technologically strategically significant one ease transition versions 10.4 able run mac os 9 applications compatibility layer first released 1999 mac os x server 1.0 widely released desktop version—mac os x 10.0—following march 2001 since several distinct desktop server editions macos released starting mac os x 10.7 lion macos server longer offered separate operating system instead server management tools available purchase add-on starting intel build mac os x 10.5 leopard releases certified unix systems conforming single unix specification macos retained major version number 10 throughout development history date releases macos also named big cats versions 10.0–10.8 locations california 10.9–present apple removed steve jobs management 1985 left company attempted create next big thing funding ross perot result next computer first workstation include digital signal processor dsp high-capacity optical disc drive next hardware advanced time expensive relative rapidly commoditizing workstation market marred design problems hardware phased 1993 however company object-oriented operating system nextstep lasting legacy nextstep based mach kernel developed cmu carnegie mellon university bsd implementation unix dating back 1970s featured object-oriented programming framework based objective-c language environment known today mac world cocoa also supported innovative enterprise objects framework database access layer webobjects application server development environment among notable features abandoning idea operating system next managed maintain business selling webobjects consulting services never commercial success nextstep underwent evolution openstep separated object layers operating system allowing run less modification platforms openstep short time adopted sun microsystems however point number companies — notably apple ibm microsoft even sun — claiming would soon releasing similar object-oriented operating systems development tools efforts taligent fully come fruition others like java gained widespread adoption february 4 1997 apple computer acquired next 427 million used openstep basis mac os x called time traces next software heritage still seen macos example cocoa development environment objective-c library classes ns prefixes history section manual page codice_1 command macos straightforwardly states command first appeared nextstep meanwhile apple facing commercial difficulties decade-old macintosh system software reached limits single-user co-operative multitasking architecture once-innovative user interface looking increasingly outdated massive development effort replace known copland started 1994 generally perceived outside apple hopeless case due political infighting conflicting goals 1996 copland nowhere near ready release project eventually cancelled elements copland incorporated mac os 8 released july 26 1997 considering purchase beos — multimedia-enabled multi-tasking os designed hardware similar apple company decided instead acquire next use openstep basis new os avie tevanian took os development steve jobs brought consultant first plan develop new operating system based almost entirely updated version openstep addition virtual machine subsystem — known blue box — running classic macintosh applications result known code name rhapsody slated release late 1998 apple expected developers would port software considerably powerful openstep libraries learned power flexibility instead several major developers adobe told apple would never occur would rather leave platform entirely rejection apple plan largely result string previous broken promises apple watching one next os another disappear apple market share dwindle developers interested much work platform let alone re-write apple financial losses continued board directors lost confidence ceo gil amelio asking resign board asked steve jobs lead company interim basis essentially giving carte blanche make changes return company profitability jobs announced world wide developer conference developers really wanted modern version mac os apple going deliver met thunderous applause next two years major effort applied porting original macintosh apis unix libraries known carbon mac os applications could ported carbon without need complete re-write making operate native applications new operating system meanwhile applications written using older toolkits would supported using classic mac os 9 environment support c c++ objective-c java python added furthering developer comfort new platform time lower layers operating system mach kernel bsd layers top re-packaged released apple public source license became known darwin darwin kernel provides stable flexible operating system takes advantage contributions programmers independent open-source projects outside apple however sees little use outside macintosh community period java programming language increased popularity effort started improve mac java support consisted porting high-speed java virtual machine platform exposing macos-specific cocoa apis java language first release new os — mac os x server 1.0 — used modified version mac os gui client versions starting mac os x developer preview 3 used new theme known aqua aqua substantial departure mac os 9 interface evolved little change original macintosh operating system incorporated full color scalable graphics anti-aliasing text graphics simulated shading highlights transparency shadows animation key new feature dock application launcher took advantage capabilities despite os x maintained substantial degree consistency traditional mac os interface apple apple human interface guidelines pull-down menu top screen familiar keyboard shortcuts support single-button mouse development aqua delayed somewhat switch openstep display postscript engine one developed in-house free license restrictions known quartz exception mac os x server 1.0 original public beta first several macos versions named big cats prior release version 10.0 code named cheetah internally apple version 10.1 code named internally puma code name jaguar version 10.2 received publicity media apple began openly using names promote operating system 10.3 marketed panther 10.4 tiger 10.5 leopard 10.6 snow leopard 10.7 lion 10.8 mountain lion panther tiger leopard registered trademarks apple registered lynx cougar allowed lapse apple instead using name iconic locations california subsequent releases 10.9 mavericks named mavericks popular surfing destination 10.10 yosemite named yosemite national park 10.11 el capitan named el capitan 10.12 sierra named sierra nevada mountain range 10.13 high sierra named area around high sierra camps september 13 2000 apple released 29.95 preview version mac os x internally codenamed kodiak order gain feedback users marked first public availability aqua interface apple made many changes ui based customer feedback mac os x public beta expired ceased function spring 2001 march 24 2001 apple released mac os x 10.0 internally codenamed cheetah initial version slow incomplete applications available time launch mostly independent developers many critics suggested operating system ready mainstream adoption recognized importance initial launch base improve simply releasing mac os x received macintosh community great accomplishment attempts completely overhaul mac os underway since 1996 delayed countless setbacks following bug fixes kernel panics became much less frequent mac os x 10.1 internally codenamed puma released september 25 2001 better performance provided missing features dvd playback apple released 10.1 free upgrade cd 10.0 users apple released upgrade cd mac os 9 january 7 2002 apple announced mac os x default operating system macintosh products end month august 23 2002 apple followed mac os x 10.2 jaguar first release use code name part branding brought great raw performance improvements sleeker look many powerful user-interface enhancements 150 according apple including quartz extreme compositing graphics directly ati radeon nvidia geforce2 mx agp-based video card least 16 mb vram system-wide repository contact information new address book instant messaging client named ichat happy mac appeared mac os startup sequence almost 18 years replaced large grey apple logo introduction mac os x 10.2 mac os x panther released october 24 2003 addition providing much improved performance also incorporated extensive update yet user interface panther included many new features jaguar year including updated finder incorporating brushed-metal interface fast user switching exposé window manager filevault safari ichat av added videoconferencing features ichat improved portable document format pdf rendering much greater microsoft windows interoperability support early g3 computers power macintosh powerbook discontinued mac os x tiger released april 29 2005 apple stated tiger contained 200 new features panther certain older machines longer supported tiger requires mac built-in firewire port among new features tiger introduced spotlight dashboard smart folders updated mail program smart mailboxes quicktime 7 safari 2 automator voiceover core image core video initial release apple tv used modified version tiger different graphical interface fewer applications services january 10 2006 apple released first intel-based macs along 10.4.4 update tiger operating system functioned identically powerpc-based macs new intel-based machines exception intel release dropping support classic environment powerpc macs booted retail copies tiger client dvd universal dvd tiger server 10.4.7 8k1079 boot powerpc intel macs mac os x leopard released october 26 2007 called apple largest update mac os x leopard supports powerpc- intel x86-based macintosh computers support g3 processor dropped g4 processor required minimum clock rate 867 mhz least 512 mb ram installed single dvd works supported macs including 64-bit machines new features include new look updated finder time machine spaces boot camp pre-installed full support 64-bit applications including graphical applications new features mail ichat number new security features leopard open brand unix 03 registered product intel platform also first bsd-based os receive unix 03 certification leopard dropped support classic environment classic applications final version mac os x support powerpc architecture mac os x snow leopard released august 28 2009 last version available disc rather delivering big changes appearance end user functionality like previous releases development snow leopard deliberately focused hood changes increasing performance efficiency stability operating system users noticeable changes disk space operating system frees clean installation compared mac os x 10.5 leopard responsive finder rewritten cocoa faster time machine backups reliable user friendly disk ejects powerful version preview application well faster safari web browser update introduced support mac app store apple digital distribution platform macos applications subsequent macos upgrades snow leopard supports machines intel cpus requires least 1 gb ram drops default support applications built powerpc architecture rosetta installed additional component retain support powerpc-only applications mac os x lion released july 20 2011 brought developments made apple ios easily navigable display installed applications launchpad greater use multi-touch gestures mac release removed rosetta making incapable running powerpc applications dropped support 32-bit intel processors requires 2gb memory changes made gui graphical user interface include launchpad similar home screen ios devices auto-hiding scrollbars appear used mission control unifies exposé spaces dashboard full-screen applications within single interface apple also made changes applications resume state closed similar ios documents auto-save default os x mountain lion released july 25 2012 incorporates features seen ios 5 include game center support imessage new messages messaging application reminders to-do list app separate ical renamed calendar like ios app also includes support storing iwork documents icloud 2gb memory required notification center makes debut mountain lion desktop version similar one ios 5.0 higher application pop-ups concentrated corner screen center pulled right side screen mountain lion also includes chinese features including support baidu option safari search engine notification center added providing overview alerts applications notes added application separate mail synching ios counterpart icloud service messages instant messaging software application replaces ichat os x mavericks released october 22 2013 free update mac app store worldwide placed emphasis battery life finder enhancements enhancements power users continued icloud integration well bringing apple ios apps os x platform ibooks apple maps applications added mavericks requires 2gb memory operate first version named apple then-new theme places california dubbed mavericks surfing location unlike previous versions os x progressively decreasing prices since 10.6 10.9 available charge users compatible systems running snow leopard 10.6 later beginning apple policy free upgrades life operating system business software os x yosemite released general public october 16 2014 free update mac app store worldwide featured major overhaul user interface replaced skeuomorphism flat graphic design blurred translucency effects following aesthetic introduced ios 7 introduced features called continuity handoff allow tighter integration paired os x ios devices user handle phone calls text messages either mac iphone edit pages document either mac ipad later update os included photos replacement iphoto aperture os x el capitan revealed june 8 2015 wwdc keynote speech made available public beta july made available publicly september 30 2015 apple described release containing refinements mac experience improvements system performance rather new features refinements include public transport built maps application gui improvements notes application well adopting san francisco system font metal api application enhancing software debuted operating system available macs since 2012 macos sierra announced june 13 2016 wwdc keynote speech update brought siri macos featuring several mac-specific features like searching files also allowed websites support apple pay method transferring payment using either nearby ios device touch id authenticate icloud also received several improvements ability store user ’ desktop documents folders icloud could synced macs apple id released publicly september 20 2016. macos high sierra announced june 5 2017 wwdc keynote speech released september 25 2017 release includes many under-the-hood improvements including switch apple file system apfs introduction metal 2 support hevc video improvements vr support addition numerous changes made standard applications including photos safari notes spotlight macos mojave announced june 4 2018 wwdc keynote speech released september 24 2018 key new features dark mode desktop stacks dynamic desktop changes desktop background image correspond user current time day macos catalina announced june 3 2019 wwdc keynote speech primarily focuses updates built-in apps replacing itunes separate music podcasts tv apps redesigned reminders books apps new find app also features sidecar allows user use ipad second screen computer even simulate graphics tablet apple pencil first version macos support 32-bit applications
Operating systems
npl programming language npl functional programming language pattern matching designed rod burstall john darlington 1977 language allows certain sets logic constructs appear right hand side definitions e.g npl interpreter evaluates list generators left right conditions mention bound variables occur left known set comprehensions npl eventually evolved hope lost set comprehensions made reappearance form list comprehensions later functional languages
Programming language topics
li3 software li₃ formerly lithium full-stack web framework producing web applications written php supporting php 5.3 onwards based model–view–controller development architecture described adhering no-nonsense philosophies project sponsored engine yard radify atelier disko october 2009 cakephp project manager garrett woodworth developer nate abele resigned project focus lithium framework code base originally developed cakephp project cake3 2012 project gained official sponsorship engine yard january 2014 project rebranded name li₃ release version 1.0 june 6th 2016 david persson followed nate abele lead developer project
Web technology
iqrf iqrf technology wireless packet-oriented communication via radio frequency rf sub-ghz ism bands intended general use wireless connectivity needed either point-to-point complex networks e.g telemetry industrial control automation buildings cities internet things fully open functionality depends solely user-specific application basic iqrf communication device transceiver module tr including mcu built-in operating system os implementing link layer network layer supporting mesh networking utilizing iqmesh protocol application software written directly os c language unlike solution stack used e.g zigbee application program compiled development higher communication level transport layer dpa optional open protocol framework enabling control sending commands receiving responses via standard wired interface uart spi via rf dpa implemented ready-to-use software plug-in called hardware profile hwp uploaded transceiver programming needed however possible modify existing hwp functionality user-specific custom dpa handler programmed c. transceivers supporting dpa called dctr data controlled transceivers iqrf connectivity 3rd party devices programmable c java supported open source development sdk package iqrf sdk gateways datalogger option lan connectivity utilize cloud server providing plug-and-play worldwide access end iqrf wireless devices iqrf alliance international community developers manufacturers system integrators others engaged wireless connectivity based iqrf technology main goal interoperability products dctrs inside
Distributed computing architecture
yamaha v9958 yamaha v9958 video display processor used msx2+ msx turbo r series home computers tim upgrade ti-99/4a also known msx-video chip successor yamaha v9938 main new features three graphical yjk modes 19268 colours horizontal scrolling registers v9958 widely adopted v9938 following features added removed yamaha v9938 specifications msx screen modes often referred assigned number msx-basic mapping follows
Computer architecture
separation mechanism policy separation mechanism policy design principle computer science states mechanisms parts system implementation control authorization operations allocation resources dictate overly restrict policies according decisions made operations authorize resources allocate commonly discussed context security mechanisms authentication authorization actually applicable much wider range resource allocation problems e.g cpu scheduling memory allocation quality service general question good object abstraction per brinch hansen introduced concept separation policy mechanism operating systems rc 4000 multiprogramming system artsy livny 1987 paper discussed approach operating system design extreme separation mechanism policy 2000 article chervenak et al described principles mechanism neutrality policy neutrality separation mechanism policy fundamental approach microkernel distinguishes monolithic one microkernel majority operating system services provided user-level server processes important operating system flexibility providing adequate mechanisms support broadest possible spectrum real-world security policies almost impossible envision different ways system might used different types users life product means hard-coded policies likely inadequate inappropriate perhaps even potential users decoupling mechanism implementations policy specifications makes possible different applications use mechanism implementations different policies means mechanisms likely better meet needs wider range users longer period time possible enable new policies without changing implementing mechanisms costs risks policy changes greatly reduced first instance could accomplished merely segregating mechanisms policies distinct modules replacing module dictates policy e.g cpu scheduling policy without changing module executes policy e.g scheduling mechanism change behaviour system cases wide variable range policies anticipated depending applications needs makes sense create non-code means specifying policies i.e policies hardcoded executable code specified independent description instance file protection policies e.g unix user/group/other read/write/execute might parametrized alternatively implementing mechanism could designed include interpreter new policy specification language cases systems usually accompanied deferred binding mechanism e.g late binding configuration options via configuration files runtime programmability via apis permits policy specifications incorporated system replaced another delivered customer everyday example mechanism/policy separation use card keys gain access locked doors mechanisms magnetic card readers remote controlled locks connections security server impose limitations entrance policy people allowed enter doors times decisions made centralized security server turn probably makes decisions consulting database room access rules specific authorization decisions changed updating room access database rule schema database proved limiting entire security server could replaced leaving fundamental mechanisms readers locks connections unchanged contrast issuing physical keys want change open door issue new keys change lock intertwines unlocking mechanisms access policies hotel significantly less effective using key cards
Operating systems
linspire linspire commercial operating system based debian gnu/linux ubuntu currently owned pc/opensystems llc 2001 2008 owned linspire inc. 2008 2017 xandros july 1 2008 linspire stockholders elected change company name digital cornerstone assets acquired xandros august 8 2008 andreas typaldos ceo xandros announced linspire would discontinued favor xandros freespire would change base code ubuntu debian linspire brand would cease exist january 1 2018 announced pc/opensystems llc purchased linspire freespire xandros linspire 7 available 79.99 freespire 3 available free based san diego california lindows inc. founded august 2001 michael robertson goal developing linux-based operating system capable running major microsoft windows applications based windows compatibility wine api company later abandoned approach favor attempting make linux applications easy download install use end program named cnr developed based debian advanced packaging tool provides easy-to-use graphical user interface slightly modified package system annual fee first public release lindows version 1.0 released late 2001 2002 microsoft sued lindows inc. claiming name lindows constituted infringement windows trademark microsoft claims rejected court asserted microsoft used term windows describe graphical user interfaces windows product ever released windowing technique already implemented xerox apple computer many years microsoft sought retrial postponed february 2004 offered settle case part licensing settlement microsoft paid estimated 20 million lindows inc. transferred lindows trademark microsoft changed name linspire inc. 15 june 2005 michael robertson stepped ceo linspire inc continues chairman replaced ceo kevin carmony carmony resigned linspire july 31 2007 linspire became member interop vendor alliance founded 2006 february 8 2007 linspire inc. canonical ltd lead sponsor developer ubuntu operating system announced plans new technology partnership linspire aiming begin basing ... desktop linux offerings ubuntu 13 june 2007 linspire microsoft announced interoperability collaboration agreement focus document format compatibility instant messaging digital media web search patent covenants linspire customers agreement criticised notably groklaw website disingenuously short-lived limited spirit gnu general public license kevin carmony one regular linspire letters asserted agreement would bring even choices desktop linux users ... offer better linux experience linspire bases product code names fish found near headquarters linspire/lindowsos 4.5 code named coho linspire five-0 5.0 5.1 freespire 1.0 marlin freespire 2.0 linspire 6.0 skipjack linspire cnr originally click n'run software distribution service based debian apt designed serve gui-based user-accessible means downloading installing various applications free proprietary service allowed users install available applications using single click cnr also included set click buy cnb software included many commercial applications members discounted rate cnr 38,000 different software packages ranging simple applications major commercial works win4lin staroffice cnr originally subscription-based two tiers basic service cost 20 annually gold featuring discounts commercial applications 50 2006 linspire announced basic service made available free linspire planned port cnr ubuntu distribution company announced april 24 2006 cnr would released open source license release free cnr client planned coincide release freespire 2.0 linspire 6.0 january 23 2007 linspire announced intended provide cnr linux distributions apt- rpm-based including debian fedora opensuse ubuntu support expected appear mid-2007 february 8 2007 linspire inc. announced partnership canonical ltd. publisher ubuntu linux distribution deal would see linspire freespire migrate unpredictable debian release process semiannual ubuntu release cycle intended main ubuntu distribution would become first recipient opening click n'run service linux distributions besides linspire august 2005 andrew betts released freespire live cd based linspire users mistook product linspire inc. linspire inc. offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 april 24 2006 linspire announced project named freespire followed model community-oriented releases red hat novell form fedora opensuse freespire community-driven -supported project tied commercial linspire distribution included previously proprietary elements linspire cnr client elements linspire inc. licenses like windows media audio compatibility libraries remain closed-source consequently two versions freespire one closed source libraries one called freespire oss edition includes open-source components freespire 1.0 released august 7 2006 three weeks ahead schedule known freespire change code base ubuntu debian future releases july 10 2007 linspire released linspire 6.0 based freespire 2.0 final release freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 supported 18 months reached end-of-life 19 october 2008 freespire therefore receives security updates upstream present distribution considered discontinued distrowatch linspire inc. sponsored open source projects including pidgin kopete instant messaging clients mozilla firefox web browser reiserfs file system nvu wysiwyg website editor kde-apps.org kde-look.org websites past linspire hosted several linux open source events annual desktop linux summit debconf kde developers conference linspire drawn criticism linux free software community included criticism including proprietary software gnu founder richard stallman commenting gnu/linux distribution backslided far away freedom switching ms windows linspire bring freedom gets different master addition following initial freespire announcement pamela jones groklaw website published article entitled freespire linux distro could n't care less freedom highly critical linspire inc. freespire project including closed-source components advertising favourable point—an action classed ignoring free open-source software foss community values community-driven distribution asserting free software n't proprietary drivers proprietary codecs drivers applications open source open way response linspire inc. ceo kevin carmony stated via journalist linspire website ten years holding foss community made relatively gains many users already using proprietary software although would hold would prefer something works rather nothing also asserted company believed open source software also freedom individuals choose whatever software want
Operating systems
seabird colony register seabird colony register scr database managed british joint nature conservation committee contains counts breeding seabirds british seabird colonies made 1969 1998 used analysing past changes breeding seabird numbers changes colony size britain ireland data included scr include results two complete seabird censuses britain ireland operation seafarer 1969/70 seabird colony register census 1985–1987 well ad hoc counts counts surveys data held 25 species seabird breeding throughout britain ireland scr partially superseded seabird 2000 database
Databases
mohol programming languages mohol refers machine oriented high order languages dijkstra terminology
Programming language topics
file binder file binders utility software allow user bind multiple files together resulting single executable commonly used hackers insert programs trojan horses otherwise harmless files making difficult detect malware builders keyloggers stealers often include binder default polymorphic packer file binder ability make signature mutate time difficult detect remove commonly used hackers insert malware packages contain user content
Computer security
zigbee zigbee ieee 802.15.4-based specification suite high-level communication protocols used create personal area networks small low-power digital radios home automation medical device data collection low-power low-bandwidth needs designed small scale projects need wireless connection hence zigbee low-power low data rate close proximity i.e. personal area wireless ad hoc network technology defined zigbee specification intended simpler less expensive wireless personal area networks wpans bluetooth general wireless networking wi-fi applications include wireless light switches home energy monitors traffic management systems consumer industrial equipment requires short-range low-rate wireless data transfer low power consumption limits transmission distances 10–100 meters line-of-sight depending power output environmental characteristics zigbee devices transmit data long distances passing data mesh network intermediate devices reach distant ones zigbee typically used low data rate applications require long battery life secure networking zigbee networks secured 128 bit symmetric encryption keys zigbee defined rate 250 kbit/s best suited intermittent data transmissions sensor input device zigbee conceived 1998 standardized 2003 revised 2006 name refers waggle dance honey bees return beehive zigbee low-cost low-power wireless mesh network standard targeted battery-powered devices wireless control monitoring applications zigbee delivers low-latency communication zigbee chips typically integrated radios microcontrollers zigbee operates industrial scientific medical ism radio bands 2.4 ghz jurisdictions worldwide though devices also use 784 mhz china 868 mhz europe 915 mhz usa australia however even regions countries still use 2.4 ghz commercial zigbee devices home use data rates vary 20 kb/s 868 mhz band 250 kb/s 2.4 ghz band zigbee builds physical layer media access control defined ieee standard 802.15.4 low-rate wireless personal area networks wpans specification includes four additional key components network layer application layer zigbee device objects zdos manufacturer-defined application objects zdos responsible tasks including keeping track device roles managing requests join network well device discovery security zigbee network layer natively supports star tree networks generic mesh networking every network must one coordinator device within star networks coordinator must central node trees meshes allow use zigbee routers extend communication network level another defining feature zigbee facilities carrying secure communications protecting establishment transport cryptographic keys ciphering frames controlling device builds basic security framework defined ieee 802.15.4 zigbee-style self-organizing ad-hoc digital radio networks conceived 1990s ieee 802.15.4-2003 zigbee specification ratified december 14 2004 zigbee alliance announced availability specification 1.0 june 13 2005 known zigbee 2004 specification september 2006 zigbee 2006 specification announced obsoleting 2004 stack 2006 specification replaces message/key value pair structure used 2004 stack cluster library library set standardised commands organised groups known clusters names smart energy home automation zigbee light link january 2017 zigbee alliance renamed library dotdot announced new protocol represented emoticon || also announced additionally run network types using internet protocol interconnect standards thread since unveiling dotdot functioned default application layer almost zigbee devices zigbee pro also known zigbee 2007 finalized 2007 zigbee pro device may join operate legacy zigbee network vice versa due differences routing options zigbee pro devices must become non-routing zigbee end devices zeds legacy zigbee network legacy zigbee devices must become zeds zigbee pro network operates 2.4 ghz band also sub-ghz band zigbee protocols intended embedded applications requiring low power consumption tolerating low data rates resulting network use little power—individual devices must battery life least two years pass zigbee certification typical application areas include zigbee situations high mobility among nodes hence suitable tactical ad hoc radio networks battlefield high data rate high mobility present needed established 2002 zigbee alliance group companies maintain publish zigbee standard term zigbee registered trademark group single technical standard alliance publishes application profiles allow multiple oem vendors create interoperable products relationship ieee 802.15.4 zigbee similar ieee 802.11 wi-fi alliance years alliance membership grown 500 companies including likes comcast ikea legrand samsung smartthings amazon zigbee alliance three levels membership adopter participant promoter adopter members allowed access completed zigbee specifications standards participant members voting rights play role zigbee development early access specifications standards product development requirements membership zigbee alliance cause problems free software developers annual fee conflicts gnu general public licence requirements developers join zigbee alliance also conflict free software licenses zigbee alliance board asked make license compatible gpl refused bluetooth gpl licensed implementations first zigbee application profile home automation announced november 2 2007 additional application profiles since published specifications define internet protocol monitor control inform automate delivery use energy water enhancement zigbee smart energy version 1 specifications adds services plug-in electric vehicle charging installation configuration firmware download prepay services user information messaging load control demand response common information application profile interfaces wired wireless networks developed partners including zigbee smart energy relies zigbee ip network layer routes standard ipv6 traffic ieee 802.15.4 using 6lowpan header compression 2009 rf4ce radio frequency consumer electronics consortium zigbee alliance agreed deliver jointly standard radio frequency remote controls zigbee rf4ce designed broad range consumer electronics products tvs set-top boxes promised many advantages existing remote control solutions including richer communication increased reliability enhanced features flexibility interoperability line-of-sight barrier zigbee rf4ce specification lifts networking weight support mesh features traded smaller memory configurations lower cost devices remote control consumer electronics introduction second zigbee rf4ce application profile 2012 increased momentum mso market zigbee rf4ce team provides overview current status standard applications future technology radio design used zigbee analog stages uses digital circuits wherever possible though radios inexpensive zigbee qualification process involves full validation requirements physical layer radios derived validated semiconductor mask set would enjoy rf characteristics uncertified physical layer malfunctions could cripple battery lifespan devices zigbee network zigbee radios tight constraints power bandwidth thus radios tested guidance given clause 6 802.15.4-2006 standard products integrate radio microcontroller single module available standard specifies operation unlicensed 2.4 2.4835 ghz worldwide 902 928 mhz americas australia 868 868.6 mhz europe ism bands sixteen channels allocated 2.4 ghz band channel spaced 5 mhz apart though using 2 mhz bandwidth radios use direct-sequence spread spectrum coding managed digital stream modulator binary phase-shift keying bpsk used 868 915 mhz bands offset quadrature phase-shift keying oqpsk transmits two bits per symbol used 2.4 ghz band raw over-the-air data rate 250 kbit/s per channel 2.4 ghz band 40 kbit/s per channel 915 mhz band 20 kbit/s 868 mhz band actual data throughput less maximum specified bit rate due packet overhead processing delays indoor applications 2.4 ghz transmission distance may 10–20 depending construction materials number walls penetrated output power permitted geographical location outdoors line-of-sight range may 1500 depending power output environmental characteristics output power radios generally 0-20 dbm 1-100 mw zigbee devices three kinds current zigbee protocols support beacon non-beacon enabled networks non-beacon-enabled networks unslotted csma/ca channel access mechanism used type network zigbee routers typically receivers continuously active requiring robust power supply however allows heterogeneous networks devices receive continuously others transmit external stimulus detected typical example heterogeneous network wireless light switch zigbee node lamp may constantly receive since connected mains supply battery-powered light switch would remain asleep switch thrown switch wakes sends command lamp receives acknowledgment returns sleep network lamp node least zigbee router zigbee coordinator switch node typically zigbee end device beacon-enabled networks special network nodes called zigbee routers transmit periodic beacons confirm presence network nodes nodes may sleep beacons thus lowering duty cycle extending battery life beacon intervals depend data rate may range 15.36 milliseconds 251.65824 seconds 250 kbit/s 24 milliseconds 393.216 seconds 40 kbit/s 48 milliseconds 786.432 seconds 20 kbit/s however low duty cycle operation long beacon intervals requires precise timing conflict need low product cost general zigbee protocols minimize time radio reduce power use beaconing networks nodes need active beacon transmitted non-beacon-enabled networks power consumption decidedly asymmetrical devices always active others spend time sleeping except smart energy profile 2.0 zigbee devices required conform ieee 802.15.4-2003 low-rate wireless personal area network lr-wpan standard standard specifies lower protocol layers—the physical layer phy media access control portion data link layer dll basic channel access mode carrier sense multiple access/collision avoidance csma/ca nodes talk way humans converse briefly check see one talking start three notable exceptions beacons sent fixed timing schedule use csma message acknowledgments also use csma finally devices beacon-enabled networks low latency real-time requirements may also use guaranteed time slots gts definition use csma software designed easy develop small inexpensive microprocessors detail please use one sources listed references section go directly zigbee alliance web site using external links provided main functions network layer enable correct use mac sublayer provide suitable interface use next upper layer namely application layer capabilities structure typically associated network layers including routing network layer function exactly sounds deals network functions connecting disconnecting setting networks add network allocate addresses add/remove certain devices layer makes use star mesh tree topologies adds interface application layer one hand data entity creates manages network layer data units payload application-layer performs routing according current topology hand layer control used handle configuration new devices establish new networks determine whether neighboring device belongs network discovers new neighbors routers control also detect presence receiver allows direct communication mac synchronization routing protocol used network layer aodv aodv find destination device aodv broadcasts route request neighbors neighbors broadcast request neighbors onward destination reached destination reached sends route reply via unicast transmission following lowest cost path back source source receives reply update routing table destination address next hop path path cost application layer highest-level layer defined specification effective interface zigbee system end users comprises majority components added zigbee specification zdo management procedures together application objects defined manufacturer considered part layer layer binds tables sends messages bound devices manages group addresses reassembles packets also transports data responsible providing service zigbee device profiles zdo zigbee device object protocol zigbee protocol stack responsible overall device management security keys policies responsible defining role device either coordinator end device mentioned also discovery new one-hop devices network identification offered services may go establish secure links external devices reply binding requests accordingly application support sublayer aps main standard component layer offers well-defined interface control services works bridge network layer elements application layer keeps up-to-date binding tables form database used find appropriate devices depending services needed different devices offer union specified layers also routes messages across layers protocol stack application may consist communicating objects cooperate carry desired tasks focus zigbee distribute work among many different devices reside within individual zigbee nodes turn form network said work typically largely local device instance control household appliance collection objects form network communicates using facilities provided aps supervised zdo interfaces application layer data service follows typical request-confirm/indication-response structure within single device 240 application objects exist numbered range 1-240 0 reserved zdo data interface 255 broadcast 241-254 range currently use may future two services available application objects use zigbee 1.0 addressing also part application layer network node consists 802.15.4-conformant radio transceiver one device descriptions basically collections attributes polled set monitored events transceiver base addressing devices within node specified endpoint identifier range 1-240 applications communicate comprising devices must use common application protocol types messages formats sets conventions grouped profiles furthermore binding decided upon matching input output cluster identifiers unique within context given profile associated incoming outgoing data flow device binding tables contain source destination pairs depending available information device discovery may follow different methods network address known ieee address requested using unicast communication petitions broadcast ieee address part response payload end devices simply respond requested address network coordinator router also send addresses devices associated extended discovery protocol permits external devices find devices network services offer endpoints report queried discovering device previously obtained addresses matching services also used use cluster identifiers enforces binding complementary entities using binding tables maintained zigbee coordinators table must always available within network coordinators likely permanent power supply backups managed higher-level layers may needed applications binding requires established communication link exists whether add new node network decided according application security policies communication happen right association direct addressing uses radio address endpoint identifier whereas indirect addressing uses every relevant field address endpoint cluster attribute requires sent network coordinator maintains associations translates requests communication indirect addressing particularly useful keep devices simple minimize need storage besides two methods broadcast endpoints device available group addressing used communicate groups endpoints belonging set devices one defining features zigbee provides facilities carrying secure communications protecting establishment transport cryptographic keys cyphering frames controlling devices builds basic security framework defined ieee 802.15.4 part architecture relies correct management symmetric keys correct implementation methods security policies basic mechanism ensure confidentiality adequate protection keying material trust must assumed initial installation keys well processing security information implementation globally work general conformance specified behaviors assumed keys cornerstone security architecture protection paramount importance keys never supposed transported insecure channel momentary exception rule occurs initial phase addition network previously unconfigured device zigbee network model must take particular care security considerations ad hoc networks may physically accessible external devices also state working environment predicted within protocol stack different network layers cryptographically separated access policies needed conventional design assumed open trust model within device allows key sharing notably decreases potential cost nevertheless layer creates frame responsible security malicious devices may exist every network layer payload must ciphered unauthorized traffic immediately cut exception transmission network key confers unified security layer grid new connecting device zigbee uses 128-bit keys implement security mechanisms key associated either network usable zigbee layers mac sublayer link acquired pre-installation agreement transport establishment link keys based master key controls link key correspondence ultimately least initial master key must obtained secure medium transport pre-installation security whole network depends link master keys visible application layer different services use different one-way variations link key avoid leaks security risks key distribution one important security functions network secure network designate one special device devices trust distribution security keys trust center ideally devices center trust address initial master key preloaded momentary vulnerability allowed sent described typical applications without special security needs use network key provided trust center initially insecure channel communicate thus trust center maintains network key provides point-to-point security devices accept communications originating key supplied trust center except initial master key security architecture distributed among network layers follows security levels infrastructure based ccm* adds encryption- integrity-only features ccm according german computer magazine website zigbee home automation 1.2 using fallback keys encryption negotiation known changed makes encryption highly vulnerable network simulators like ns2 omnet++ opnet netsim used simulate ieee 802.15.4 zigbee networks simulators come open source c c++ libraries users modify way users determine validity new algorithms hardware implementation
Distributed computing architecture
simpro simpro private saas company provides cloud-based job project management software field service trade contracting industries company customers partners australia new zealand united kingdom united states simpro offices located countries recent opening operation colorado united states simpro founded 2002 electrical business owner steve bradshaw approached software engineering student vaughan mckillop creating website electrical contracting business mckillop explained bradshaw strengths lay writing software rather web design two men created simpro first iteration using web-based php mysql languages initially focused making digital job lists moved building scheduling tool could allocate time technicians mckillop bradshaw continued expand software capability functionality realised new tool could also offered customers company first started trading acorn software service management pty ltd 2003 changed name simpro software 2011 simpro 2017 february 2019 simpro board management executive team five members chief executive officer sean diljore chief operating officer chief financial officer alan bignell chief technology officer jonathan eastgate executive financial controller rhiza lahoylahoy chief learning development officer erika entz peter darley currently general manager simpro australia ricky sevta general manager simpro new zealand 2009 simpro launched united kingdom current general manager richard pratley previously managed new zealand office 2015 company opened location colorado united states effort grow presence local market current president glenn nott october 2016 simpro received usd 31 million capital funding new york-based growth equity firm level equity marked first time company accepted external investment since founding level equity partner benjamin levin principal charles chen sit simpro board directors 2013 simpro acquired vehicle fleet tracking management company simtrac aud 2.5 million designed help business managers monitor work vehicles road real time minimise travel times simpro key features include quoting estimating scheduling service project management inventory management asset maintenance invoicing payment processing integration accounting software designed eliminate double entry data provide transfer financial data assist financial reporting simpro mobile applications used smartphones tablets ios android operation systems keep remote staff connected office simpro connect app field users process payment job complete customer credit card simpro eforms app used digitise company existing paper forms use field simpro ’ add-ons include simpro software integrates range third-party applications cloud accounting software sage xero myob quickbooks among others
Distributed computing architecture
newlisp newlisp scripting language dialect lisp family programming languages designed developed lutz mueller newlisp free open-source software released gnu general public license version 3 later newlisp design influenced two main lisp dialects common lisp scheme languages like pascal c. newlisp originated 1991 originally developed sun-4 workstation later moved windows 3.0 version 1.3 released compuserve around 1993 became available windows graphical user interface gui graphics-capable application dos console application 16-bit 1995 release windows 95 newlisp moved 32-bit april 1999 newlisp ported linux core algorithms rewritten windows-specific code removed newlisp released open-source software project licensed gpl development windows stopped version 6.0.25 first half 2001 newlisp ported back windows cygwin platform without graphics abilities second half 2001 cross-platform tcl/tk frontend named newlisp-tk released around version 6.3.0 2006 64-bit precision introduced integer arithmetic operations files version 9.0 since release 6.5 mid-2002 development active many new features added newlisp attempts provide fast powerful cross-platform full-featured scripting version language lisp using modest system resources data storage e.g. disk space memory provides lisp features lists symbol processing function mapping anonymous functions lambda expressions s-expressions excluding improper lists macros also provides functions expected modern scripting language including supporting regular expressions xml unicode utf-8 networking via transmission control protocol tcp internet protocol ip user datagram protocol udp matrix array processing advanced math statistics bayesian statistical analysis mathematical finance distributed computing newlisp runs operating systems berkeley software distribution bsd linux macos solaris windows supports mysql sqlite odbc database access common gateway interface cgi simple mail transfer protocol smtp post office protocol pop 3 file transfer protocol ftp xml remote procedure call xml-rpc run server mode daemon newlisp supports namespaces termed contexts assigned variables passed functions associated globally unique symbols limiting use first-class citizens objects prototype-based object-oriented style programming possible newlisp using contexts prototypes construct objects variables inside contexts interfere variables name contexts inside context variables behave according rules dynamic scoping newlisp uses dynamic scoping function called function see variables caller caller caller within context namespace supports explicitly implicitly defined local dynamic variables shadow variables name outer environment thus preventing accidental use change variables caller environment parameter variables called function automatically shadow caller variable environment globally variables grouped separate namespaces newlisp uses method automatic memory management different traditional garbage collection schemes termed one reference oro memory management variable referenced context context referenced globally sharing subobjects among objects cyclic structures multiple variables pointing object unsupported newlisp objects copied stored data structures passed functions except certain built-in functions exceptions symbols contexts shared instead copied thus used indirection symbols contexts globally named deleted explicitly deleting symbol context scans objects replace references codice_1 newlisp graphical user interface gui server newlisp-gs java-based internet protocol suite tcp/ip server providing graphical programming interface newlisp-gs based development environment included newlisp binary distributions gtk-server opengl tcl/tk-based programming interfaces available newlisp version allows building executable files portable applications deployment self-contained need installing newlisp import function allows importing functions dynamic-link library dll windows api win32 shared library linux unix web frameworks available newlisp include dragonfly rockets
Programming language topics
windows dreamscene windows dreamscene utility allows videos .gif optimized animations used desktop wallpapers one windows ultimate extras windows vista prior official announcement dreamscene rumored creation names motion desktop borealis several months testing final version released september 25 2007 rendered content included dreamscene animated realization windows aurora background produced stardock photographic content provided discovery channel third-party video content mpeg wmv format may also used addition avi files played altering file extension additionally partnership dell microsoft released separate dreamscene alongside product red version ultimate edition windows vista one purported advantages dreamscene previous methods desktop animation makes use gpu display instead cpu leaving latter free perform user tasks extent achieved specified full-screen program run game window maximized video automatically stop since video seen means uses less gpu cpu video also stopped manually content encoders need strive balance compression file size decompression requires cpu larger files take memory may cause disk accessed frequently running video background would significant impact battery life mobile computers whether rendered gpu dreamscene may display static background computer running batteries software relies heavily desktop window manager dwm part windows aero stardock offers chargeable add-on windows dreamscene called deskscapes software allows implementation dynamic wallpapers .dream files released new version 3.5 makes program compatible non-ultimate editions vista newer versions windows 7 8 windows 7 dreamscene replaced desktop slideshow feature produces slideshow background wallpapers support videos however still enabled via third-party tools
Operating systems
uiq uiq formerly known user interface quartz software platform based upon symbian os created uiq technology essentially graphical user interface layer provides additional components core os enable development feature-rich mobile phones open expanded capabilities third-party applications uiq result 'quartz user interface pen pdas one three provisional interfaces designed symbian ltd first three quartz phones never made market including psion odin joint venture motorola cancelled january 2001 causing psion shares deteriorate engineers thereafter created lighter version software presented 2002 first shipped year sony ericsson p800 sony ericsson main oem using uiq platform products motorola also developed products using uiq abandoned platform 2003 favour linux along stake symbian ltd 2007 returned uiq launch motorola rizr z8 nokia using competing series 60 later s60 platform created one uiq device called nokia 6708 rebadged benq p31 released asia pacific region sony ericsson bought uiq technology november 2006 next year motorola bought half creation symbian foundation favouring s60 ui choice uiq future uncertain could longer develop software symbian os many motorola uiq devices planned 2009 cancelled including motorola razr3 codenamed ruby uiq technology filed bankruptcy january 2009 final nail coffin uiq platform sony ericsson moved windows mobile open source symbian foundation whilst motorola adopted google android software uiq 3.3 last version platform based upon symbian os v9.3 developers developed uiq 3.x platform much better story previous releases since uiq 3.x phones served single core sdk native applications written c++ using symbian/uiq sdk uiq-based phones 2.x 3.x also support java applications uiq phones employ touch screens resolution 208×320 pixels uiq 1.x 2.x 240×320 uiq 3.x depending phone color depth 12-bit 4096 colors 16-bit 65536 colors 18-bit 262144 colors 24-bit 16,777,216 colors newer phones developers significant items sony ericsson motorola benq nokia arima following list smartphones announced/confirmed running newer uiq 3.x platform pda-style design similar handheld computer hybrid pda/phone design candy-bar phone touchscreen display slider design
Operating systems
microphone blocker microphone blocker device prohibits audio hacking form hardware accessory smartphone laptop pda similar device blocker intended disable internal microphone also android software name disables microphone microphone blocker also known mic blocker mic lock physically microphone blocker dummy plug inserted external microphone socket mobile device blocker disables signal internal microphone tricking device thinking external microphone already plugged successful operation microphone blocker depends internal scheme mobile device may fully block microphone without possibility recovering data disregard signal internal microphone possibility recording needed microphone blocker cheap simple accessory provides protection eavesdropping cellphone surveillance types audio hacking variety spyware programs turn mobile device microphone remotely vast majority devices internal hardware protection prevent eavesdropping anti-spying software guarantee microphone fully blocked disabled spyware malware constantly changing improving leaked documents published wikileaks codenamed vault 7 dated 2013 2016 described capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones turning permanent listening devices millions smartphones could also vulnerable hacking via accelerometers new data access technique discovered research team israel ben-gurion university cybersecurity research center allows data extracted using computer speakers headphones forbes published report stating researches found way see information displayed using microphone 96.5 accuracy
Computer security
android go android go tailored android distribution low-end devices first unveiled android oreo intended devices 1 gb ram less mode platform optimizations designed reduce mobile data usage including enabling data saver mode default special suite google mobile services designed less resource- bandwidth-intensive google play services also modularized reduce memory footprint google play store highlight lightweight apps suited devices operating system interface differs mainline android quick-settings panel giving greater prominence information regarding battery mobile-data limit available storage recent apps menu using modified layout limited four apps order reduce ram consumption api allowing mobile carriers implement data-tracking top-ups within android settings menu android go made available oems android 8.1 later android pie
Operating systems
rss tracking rss tracking methodology tracking rss feeds rss feeds around since 1999 form internet marketing however unlike forms publishing information internet difficult track usage rss feeds feed tracking methods growing popularity currently many methods tracking rss feeds problems terms accuracy transparent 1×1 pixel images images embedded within content rss feed linking image held web server number requests made measured using web server log files give rough estimate many times rss feed viewed problem method rss feed aggregators display images parse html third-party services services available internet syndicate rss feed track requests made syndication rss feed services come free paid forms problem method analytical data feeds controlled service provider easily accessible transferable unique url per feed method requires heavy web server programming auto generate different rss feed url visitor website visitor rss feed activity tracked accurately using standard web analytics applications problem method feed syndicated search engine instance defeat purpose unique urls many people could potentially view rss feed via single url estimating number subscribers log files aggregators example bloglines google reader include number unique users whose behalf feed downloaded http request readers -- web browsers -- counted noting number unique ip addresses retrieve file given period provides estimate actual readership although probably higher real number people may sign accounts multiple aggregators never delete subscriptions may read feeds different computers computer may different ip address different times
Web technology
north atlantic population project north atlantic population project napp collaboration historical demographers britain canada denmark germany iceland norway sweden produce massive census microdata collection north atlantic region late-nineteenth century database includes complete individual-level census enumerations country provides information 110 million people large scale allows detailed analysis small geographic areas population subgroups napp database designed compatible integrated public use microdata series ipums disseminated ipums data-access system minnesota population center university minnesota major collaborators project include lisa dillon university montreal chad gaffield university ottawa ólöf garðarsdóttir statistics iceland marianne jarnes erikstad university tromsø jan oldervall university bergen evan roberts university minnesota steven ruggles university minnesota kevin schürer uk data archive gunnar thorvaldsen university tromsø matthew woollard uk data archive project also coordinated minnesota population center university minnesota
Databases
enchanting programming language enchanting free open-source cross-platform educational programming language designed program lego mindstorms nxt robots primarily developed southern alberta robotics enthusiasts group province alberta canada runs mac os x windows experimentally linux devices since 2013 enchanting version 0.2 available predecessor 1998 robotics invention system developed scratch developer team led mitch resnick mit media lab based byob developed university california berkeley current version enchanting runs windows xp windows vista windows 7 windows 8 windows 8 rt mac os x runs version 10.4 newer linux runs ubuntu version 10.10 used secondary-to-tertiary computer science program monash university australia interactive pdf book use computer ipad titled robotics enchanting lego® nxt available free download recent sabre games organized 2013 southern alberta robotics enthusiasts group consisted three disciplines tug war two robots tied together string tries pull opponent center line sumo two robots placed sumo ring tries find push opponent without going ring parade robots follow line trying crash robot front
Programming language topics
sis file format sis acronym stands software installation script standard software installation package format symbian os sis files archive containing installation instructions application file usually .app .exe file dependencies convention .sisx denotes signed file different ways sis file created basic approach create package definition file .pkg contains information package like vendor package name files include package use makesis signsis utilities processes .pkg file creates actual sis file alternatives use carbide.c++ ide automatically builds sis file part build process graphically define create installation package using packageforge windows utility siscontents able convert various file formats
Operating systems
3wplayer 3wplayer malware disguises media player infect computers running microsoft windows designed exploit users download video files instructing download install program order view video 3wplayer employs form social engineering infect computers seemingly desirable video files recent movies released via bittorrent distribution channels files resemble conventional avi files engineered display message played media player programs instructing user visit 3wplayer website download software view video 3wplayer infected trojan.win32.obfuscated.en according symantec 3wplayer may download piece adware refer adware.lop adds toolbar search button internet explorer perl script posted online reportedly decrypt 3wplayer files back avi claim tested mixed results intended avi file rarely desired video file developers made application automatically identify 3wplayer encrypted files multiple 3wplayer clones divocodec divo codec x3codec also identified trojan similar 3wplayer users instructed download codec order view play avi/mp4/mp3/wma file often downloaded via p2p programs instead actual codecs divocodec installs malware users computer divocodec polymorphic change structure also known write another process virtual memory process hijacking domplayer similar divocodec 3wplayer users also instructed download player order view avi file divocodec false .avi easily spotted duration file usually lying 10–12 seconds one conclude chance file may film/tv series despite size file always case however many distributors recently begun falsifying file meta data display normal durations file sizes x3 player similar domplayer instructs users download player view avi file also circulated 5-second asf video disguised mp3 file instructing users install player
Computer security
datapoint advanced systems language dasl datapoint advanced systems language programming language compiler proprietary datapoint primarily influenced pascal c touches created early 1980s gene hughes compiler output assembly language typically processed peep-hole optimizer assembler linker reflecting name dasl used systems programming mainly vendor
Programming language topics
resources events agents accounting model resources events agents rea model accounting system re-engineered computer age rea originally proposed 1982 william e. mccarthy generalized accounting model contained concepts resources events agents mccarthy 1982 rea popular model teaching accounting information systems ais rare business practice companies easily dismantle legacy data warehouse systems unwilling workday inc. ibm scalable architecture financial reporting reatechnology iso 15944-4 exceptions fallon polovina 2013 however shown rea also add value modelling current erp business processes providing tool increases understanding implementation underlying data model rea model gets rid many accounting objects necessary computer age visible debits credits—double-entry bookkeeping disappears rea system many general ledger accounts also disappear least persistent objects e.g. accounts receivable accounts payable computer generate accounts real time using source document records rea treats accounting system virtual representation actual business words creates computer objects directly represent real-world-business objects computer science terms rea ontology real objects included rea model objects contrast conventional accounting terms asset liability less directly tied real-world objects example conventional accounting asset goodwill rea resource separate rea model business process company business process roughly corresponds functional department function michael porter value chain examples business processes would sales purchases conversion manufacturing human resources financing heart rea model usually pair events linked exchange relationship typically referred duality relation one events usually represents resource given away lost represents resource received gained example sales process one event would sales —where goods given up—and would cash receipt cash received two events linked cash receipt occurs exchange sale vice versa duality relationship complex e.g. manufacturing process would often involve two events see dunn et al 2004 examples rea systems usually modeled relational databases entity-relationship diagrams though compulsory philosophy rea draws idea reusable design patterns though rea patterns used describe databases rather object oriented programs quite different 23 canonical patterns original designs pattern book gamma et al research rea emphasizes patterns e.g. hruby et al 2006 example basic rea pattern shown e-r diagram pattern extended encompass commitments promises engage transactions e.g. sales order policies constructs dunn et al 2004 provide good overview undergraduate level accounting majors hruby et al 2006 advanced reference computer scientists diagram extended rea pattern hruby et al 2006 rea continuing influence electronic commerce standard ebxml w. mccarthy actively involved standards committee competing xbrl gl standard however odds rea concept closely mimics double-entry book-keeping rea recognised open group og within togaf® standard industry standard enterprise framework one modelling tools useful modelling business processes sensorica world first open value network ovn specialized open innovation peer production hardware uses rea model basis network resource planning contribution/value accounting system nrp-vas nrp-vas created bob haugen collaboration sensorica ovn
Databases
secure state secure state information systems security term describe entities computer system divided subjects objects formally proven state transition preserves security moving one secure state another secure state thereby inductively proven system secure defined bell–lapadula model secure state built concept state machine set allowable states system transition one state another state defined transition functions system state defined secure permitted access modes subjects objects accordance security policy
Computer security
hisilicon hisilicon chinese fabless semiconductor company based shenzhen guangdong fully owned huawei hisilicon purchases licenses cpu designs arm holdings including arm cortex-a9 mpcore arm cortex-m3 arm cortex-a7 mpcore arm cortex-a15 mpcore arm cortex-a53 arm cortex-a57 also mali graphics cores hisilicon also purchased licenses vivante corporation gc4000 graphics core hisilicon reputed largest domestic designer integrated circuits china hisilicon develops socs based arm architecture though exclusive socs see preliminary use handheld tablet devices parent company huawei first well known product hisilicon k3v2 used huawei ascend quad xl u9510 smartphones huawei mediapad 10 fhd7 tablets chipset based arm cortex-a9 mpcore fabbed 40 nm uses 16 core vivante gc4000 gpu soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption revised version k3v2 soc improved support intel baseband soc supports lpddr2-1066 actual products found lpddr-900 instead lower power consumption • supports usb 2.0 13 mp 1080p video encode • kirin 920 soc also contains image processor supports 32 megapixel • supports sd 3.0 uhs-i emmc 4.51 dual-band a/b/g/n wi-fi bluetooth 4.0 low energy usb 2.0 32 mp isp 1080p video encode • supports sd 4.1 uhs-ii ufs 2.0 emmc 5.1 mu-mimo 802.11ac wi-fi bluetooth 4.2 smart usb 3.0 nfs dual isp 42 mp native 10-bit 4k video encode i5 coprocessor tensilica hifi 4 dsp hisilicon first soc based 7 nm finfet technology hisilicon develops smartphone modems although exclusively socs see preliminary use handheld tablet devices parent company huawei balong 700 supports lte tdd/fdd specs mwc 2012 hisilicon released balong 710 multi-mode chipset supporting 3gpp release 9 lte category 4 gti global td-lte initiative balong 710 designed used k3v2 soc specs balong 720 supports lte cat6 300 mbit/s peak download rate specs balong 750 supports lte cat 12/13 first support 4cc ca 3.5ghz specs balong 765 supports 8×8 mimo technology lte cat.19 downlink data-rate 1.6 gbit/s fdd network 1.16 gbit/s td-lte network specs balong 5g01 supports 3gpp standard 5g downlink speeds 2.3 gbit/s supports 5g across frequency bands including sub-6ghz millimeter wave mmwave specs balong 5000 supports supports 2g 3g 4g 5g specs hisilicon develops server processor socs based arm architecture hi1610 hisilicon first generation server processor announced 2015 features hi1612 hisilicon second generation server processor launched 2016 features kunpeng 916 formally known hi1616 hisilicon third generation server processor launched 2017 kunpeng 916 utilized huawei taishan 2280 balanced server taishan 5280 storage server taishan xr320 high-density server node taishan x6000 high-density server features kunpeng 920 formally known hi1620 hisilicon fourth generation server processor announced 2018 launched 2019 huawei claim kunpeng 920 cpu scores estimated 930 specint®_rate_base2006 kunpeng 920 utilized huawei taishan 2280 v2 balanced server taishan 5280 v2 storage server taishan xa320 v2 high-density server node features kunpeng 930 formally known hi1630 hisilicon fifth-generation server processor announced 2019 scheduled launch 2021 features kunpeng 950 hisilicon sixth-generation server processor announced 2019 scheduled launch 2023 hisilicon also develops ai acceleration chips ai chip manufactured chinese communication electronics manufacturer huawei ascend 310 capable 16 tops int8 8 tops fp16 power consumption 8 w. fabbed tsmc 12nm ffc process ascend 310 chipsets based architecture called da vinci computing engine called 3d cube includes new ai framework called mindspore platform-as-a-service product called modelarts lower-level library called compute architecture neural networks cann ascend 910 7 nm chip delivers 256 tflops fp16 512 tops int8 power consumption 350w ascend cluster 1024 ascend 910 chips reach 256 petaflops fp16 ascend 910 ascend cluster available q2 2019 kirin processors compete products several companies including
Computer architecture
windows xp media center edition windows xp media center edition mce version windows xp operating system first version windows include windows media center designed serve home-entertainment hub last version windows xp media center edition 2005 released october 12 2004 windows media center included certain editions later windows versions optional paid addition windows 8 discontinued windows 10 windows xp media center edition following releases based windows xp professional features enabled except domain-joining ability disabled windows xp media center edition 2005 terminal services original release determine underlying edition windows xp particular revision mce based system properties control panel applet used determine revision mce used select media center option general settings area inside mce windows xp media center edition distinguished exclusive component media center media player supports watching recording tv programs well playing dvd-video photo slideshows music media center sports user interface optimized use distance large fonts icons unlike competing commercial dvr products microsoft charge monthly subscription fee media center tv guide service due strict hardware requirements microsoft opted supply media center independent retail version microsoft distributed msdn subscribers original equipment manufacturers certain countries consumers purchase media center preinstalled new computer set-top box embedded device media center higher hardware requirements editions windows xp mce 2005 requires least 1.6 ghz processor directx 9.0 hardware-accelerated gpu ati radeon 9 series nvidia geforce fx series higher 256 mb system ram functionality media center extender support use multiple tuners hdtv playback/recording carries higher system requirements media center much restricted range hardware supports software dvr solutions media center tuners must standardized driver interface must hardware mpeg-2 encoders changed companies ati wrote drivers support mce 2005 all-in-wonder cards hdtv wonder cards closed caption support number features media center remote controls standardized terms button labels functionality degree general layout
Operating systems
php-crawler php-crawler open-source crawling script based php mysql created implement simple possible local website search became popular small websites shared hosting script set distributed terms bsd license
Web technology
artist growth artist growth cloud-based touring music business management application numerous artist managers tour managers musicians use artist growth boost team collaboration simplify event logistics track finances automate ticket requests quickly find files consolidate data customers artist growth include artists jason aldean tiësto luke combs artist management companies red light vector major record labels artist growth founded matt urmy jonathan sexton 2011 prototype platform launched 2012 desktop version arriving 2013 may 2018 pinnacle financial partners announced taking stake artist growth effort expand music entertainment sports business artist growth software platform tour management live event support application software connects artist artist tour production team artist manager talent agent business manager record label third party tour service providers key product feature sets include artist growth platform includes electronic integrations related software applications artist growth api brings interoperability entertainment industry allowing artists management teams receive data directly partners talent agencies promoters songkick bandsintown users also submit set lists bmi via artist growth app order collect compensation performance royalties 2018 artist growth integrated music tour booking agency rising star travel streamline tour scheduling software today available ios android web 2018 artist growth introduced service labelled ag finance whereby artists apply receive capital fund touring business ag finance delivered partnership music sports entertainment division pinnacle financial partners first ag finance offering announced august 2018 artists may apply receive tour advance loans underwritten booked tour guarantees offering primarily aimed artist management companies emerging artists need growth funding artist growth title best music app mtv music awards named gizmodo app day 2012
Distributed computing architecture
dms-100 dms-100 switch digital multiplex system dms line telephone exchange switches manufactured northern telecom designed 1970s released 1979 control 100,000 telephone lines purpose dms-100 switch provide local service connections pstn public telephone network designed deliver services subscribers telephone lines trunks provides plain old telephone service pots mobility management cellular phone systems sophisticated business services automatic call distribution acd integrated services digital network isdn meridian digital centrex mdc formerly called integrated business network ibn also provides intelligent network functions cs1-r etsi inap used countries throughout world also dms-200 dms-250 variants tandem switches much hardware used dms-100 possible exception line cards used members dms family including dms-200 toll switch power distribution -48 vdc nominal dc dc converters every shelf provide necessary voltages central control complex comprises central processing unit cpu program store ps data store ds central message controller cmc cpu contains two identical 16-bit processors running hot standby mode original cpu core referred nt40 cpu implemented approximately 250 discrete logic devices across several circuit boards running 36 mhz nt40 core consisted mainly nt1x44 stack card provides register stack functions processor nt1x45 contained arithmetic logic functions nt1x46 provides registers load-route read-only memory rom nt1x47 timing control card provides micro-cycle source microstore decoding functions processor nt1x47 card also contained 2-digit hexadecimal display indicate test result codes condition core nt1x48 processor maintenance card contained thumbwheel faceplate enable various diagnostic tests cpu later modification five circuit boards faster pin-compatible discrete logic devices enabled cpu operate 40 mhz allowing central offices improve call throughput capacity 10 percent cpu configured dual hot standby mode mate exchange bus meb two cpus enables state one cpu continuously compared cpu cycle cycle basis discrepancy two cpus results maintenance circuitry determining cpu fault activity change cpu program store dedicated cpu memory program instructions required cpu processing calls maintenance administrative tasks ps associated cpu contains identical program instructions data store dedicated cpu contains dynamic information per-call basis well customer data office-specific settings cpu also associated ds containing duplicate data central message controller controls flow messages units ccc prioritizes network message controller nmc various network modules nm input/output controller ioc cpus access either cmc share message load line modules peripherals original nt40 based ccc replaced compatible dms supernode 1987 dms supernode computing module first based motorola 68020 central processing unit cpu upgraded motorola 68030 early 1990s upgraded use motorola 88100 88110 reduced instruction set computing risc cpus risc version supernode computing module known brisc bnr reduced instruction set computing cpu brisc cpu dms supernode processing capacity 1,500,000 call attempts per hour dms supernode featured increased processing capacity across distributed architecture allowing development new features services elements dms supernode uses common supernode cpu hardware design differing software used control supernode consists two main elements dms core dms bus dms core provides main computing facility made compute module system load module message controller compute module contains redundant supernode cpus handle call processing maintenance functions like nt40 core operate synchronized mode mate system load module contains necessary software every element dms switch also provides file system data storage functions magnetic tape hard disk message controller provides communications links dms core dms bus dms bus used interconnect dms core switching network input/output controller ioc manage message flows units consists redundant message switches message switches dms bus operate load-sharing mode one provides main clock source dms-100 system others synchronized messages supernode units carried optical ds512 links operating system used generations dms-100 switch called support operating system sos written high level language called protel stood procedure oriented type enforcing language developed bell northern research bnr hardware maintenance administered locally cathode-ray terminals multilevel menu system called mapci various methods used access dms remotely well including modem telnet backups hard drive work administered diskut command line program analog lines terminated individual line cards codec pull-out line drawers frames original design frames called line module lm 32 lines per drawer lms able send caller-id information class services became rare late century supplemented replaced newer line concentrating module lcm duplicated ringing generators serve lm pair lcm dc testing line card relay connect test bus lcm smaller line cards serving 64 lines per physical drawer 2 logical drawers size lm lcm require half space lm number lines majority line cards nt6x17 three relays loop start lines others include nt6x18 four relays slide switch ground start lines newer version nt6x18 eliminated ground switch nt6x18 also ability provide current reversal required coin phones business systems nt6x17ba nt6x18ba known world line card software configurable 15 million functional settings meet almost signalling transmission requirement market nt6x19 line card allows use older style neon message-waiting lamps feature also requires addition card per drawer supplies voltage type nt6x21 cards serve p-sets meridian business sets special analogue telephone proprietary nortel data link operating 8 khz provide advanced call handling services example telephone number may appear multiple p-sets even though telephone one pair wires thus providing simpler replacement key telephone systems lcme isdn service uses ntbx27 cards serve basic rate isdn lines provided ring generators lcme also support linecard types lcms served line group controller lgc communicate ds-30 connections nt6x48aa interface cards lgc number lcms per lgc depends traffic 3-4 lcm per lgc two traffic heavy remote offices anywhere kilometre 100 km host served remote line control module rlcm remote switching center rsc later vintage known rcc2 use t1 links host lgc rccs/rcc2s work like lgcs controlling lcms large remotes may 2+ rcc/rccs equipped links rccs interlinks calls within remote tie host links rccs/rcc2s usually equipped provide calling within remote office host links fail feature called esa emergency stand alone another type remote office known remote carrier urban rcu units typically reside side road large box approx 3 meters across almost 2 meters high almost meter 1980s many telcos installed early version instead pulling cable remote area much cheaper could provide approx 500 lines back needed two 'boxes work- host box called central terminal ct dial tone lines wired remote box called remote terminal rt dial tone 'came used 2-6 t1 links copper i.e ld-1 fiber telcos modernized remote boxes re-configured work directly smu peripheral host dms typically smu handle 3-6 rcus transmitters receivers service circuits trunk module tm miscellaneous trunk module mtm shelves trunks dtc digital trunk controller dtci digital trunk controller isdn pdtc pcm30 digital trunk controller shelves usually two t-1 lines per card ten cards per dtc total 480 ds0 voice channels turn century many original nt6x50aa cards still service perform t-carrier extended superframe signaling performed plug-in replacement nt6x50ab card used services pbx isdn t1s trunks also provisioned spm synchronus peripheral module capable handling 2016 ds0s nearly 4.2x dtc internal connections time switch network 2.56 mbit/s ds-30 speech links carrying thirty channels plus synchronization data channels four wires plus ground wire connections network handled nt6x40aa ds-30 interface card lgc ltc link may also ds-512 optical interfaces using nt6x44aa time switch card lgcs ltcs internally map channels nt6x48aa ds-30 nt6x50aa/ab ds1 interface links available channels nt6x40aa ds-30 nt6x40fa ds-512 interfaces network european pdtcs complemented dtcoi2 dtco2 dtcoi2 designed run pri dpnss services per existing pdtcoi msb7 peripherals dtco2 designed carry cas ss7 per existing pdtco peripheral time division switching performed e-net similar communication module 5ess switch switching network ewsd group switch axe telephone exchange also dms-200 dms-250 variants tandem switches 2006 nortel introduced communication server 1500 cs 1500 softswitch based voip modernize dms based telephone switches cs 1500 softswitch system replace dms component modules except lcms reducing footprint dms-100 one 19 rack allowing operators reduce cooling power requirements significantly successor dms-100 communication server 2000 cs2k shares many components software dms significant difference addition voip technology cs2k 2010 genband purchased nortel networks carrier voip application solutions cvas business 182.5 million nortel defunct
Internet protocols
yabasic yabasic yet another basic free open-source basic interpreter windows unix platforms yabasic originally developed marc-oliver ihm released last stable version 2.77.3 2016 version 2.77.1 project adopted mit licence well source code moved github encourage others participate development port yabasic fltk toolkit called flyab development would source-compatible programs written yab variant yabasic enables graphical programs written using beos api ports windows mac os x linux planned flyab added ability yabasic create native graphical user interfaces supported platforms november 2008 project appears halted sony also packaged version yabasic playstation 2 demo disc shipped ps2 consoles pal territories could considered home computer games machine thus bypassing european import taxes continuation project prior new changes original author version 3 developed team centered pedro sá thomas larsen development halted project appears abandoned
Programming language topics
mobile slotted aloha mobile slotted aloha ms-aloha wireless network protocol proposed applications vehicle networks considering typical taxonomy mac protocols ms-aloha represents hybrid solution based connection-oriented paradigm hence may fall class channel-based/tdma protocols however also reactive topology changes include reservations separate data exchanges classified among packet-based collision-free mac methods general slotted protocol either connectionless connection-oriented however latter case represents true alternative ieee 802.11p introducing determinism carrier sense multiple access collision avoidance csma/ca lacks vehicle networks connection set-up phases telephone call reservation request confirmation data exchange tear-down applied hold broadcast communications hampered hidden stations manageable heavy losses mobility varying channel conditions reasons ms-aloha connection oriented continuously refreshes reservation simply transmitting period ms-aloha adopts different approach subtends following hypotheses rules basically define main mechanisms
Internet protocols
apple a10x apple a10x fusion 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared 10.5 ipad pro second-generation 12.9 ipad pro announced june 5 2017 a10x variant a10 apple claims 30 percent faster cpu performance 40 percent faster gpu performance predecessor a9x a10x features apple-designed 64-bit 2.38 ghz armv8-a six-core cpu three high-performance hurricane cores three energy-efficient zephyr cores a10x also integrates twelve-core graphics processing unit gpu appears apple customized imagination powervr cores used a10 embedded a10x m10 motion coprocessor built tsmc 10 nm finfet process die size 96.4mm a10x 34 smaller a9x smallest ipad soc a10x first tsmc 10nm chip used consumer device a10x paired 4 gb lpddr4 memory second-generation 12.9 ipad pro 10.5 ipad pro 3 gb 4k apple tv
Computer architecture
ken batcher ken batcher full name kenneth edward batcher emeritus professor computer science kent state university also worked computer architect goodyear aerospace akron ohio 28 years born december 1935 queens new york city father ralph r. batcher chief engineer a. h. grebe radio company bankruptcy 1932 batcher graduated iowa state university b.e degree 1957 1964 batcher received ph.d. electrical engineering university illinois graduated brooklyn technical high school among designs worked goodyear published several technical papers owns 14 patents discovered two parallel sorting algorithms odd-even mergesort bitonic mergesort also discoverer scrambling data method random access memory allows accesses along multiple dimensions memories used staran mpp parallel processors 1980 received arnstein award presented goodyear aerospace corporation technical achievement 1990 batcher awarded acm/ieee eckert-mauchly award pioneering work parallel computers holds 14 patents 2007 batcher awarded ieee seymour cray computer engineering award fundamental theoretical practical contributions massively parallel computation including parallel sorting algorithms interconnection networks pioneering designs staran mpp computers credited discovering two important parallel sorting algorithms odd-even mergesort bitonic mergesort batcher known half-serious half-humorous definition supercomputer device turning compute-bound problems i/o-bound problems author co-author journal articles br patent number followed title year issued
Computer architecture
adobe document cloud adobe document cloud free service adobe store share pdf files cloud access go services also allows integration adobe tools fill sign forms electronically service offers 2gb free storage seemless integration mobile desktop apps creates ecosystem users use phone apps adobe scan take pictures documents convert pdfs upload store cloud files accessed webportal adobe document cloud well adobe applications adobe acrobat dc adobe acrobat reader free service upgraded using paid subscriptions allow user create pdfs electronic documents microsoft office documents edit pdfs protect documents using passwords create fillable forms collect feedback signatures
Distributed computing architecture
portmap port mapper rpc.portmap portmap rpcbind open network computing remote procedure call onc rpc service runs network nodes provide onc rpc services version 2 port mapper protocol maps onc rpc program number/version number pairs network port number version program onc rpc server started tell port mapper particular program number/version number pair implements particular transport protocol tcp udp port number using particular program number/version number pair transport protocol clients wishing make onc rpc call particular version particular onc rpc service must first contact port mapper server machine determine actual tcp udp port use versions 3 4 protocol called rpcbind protocol map program number/version number pair indicator specifies transport protocol transport-layer endpoint address program number/version number pair transport protocol port mapper service always uses tcp udp port 111 fixed port required client would able get port number port mapper service port mapper port mapper must started rpc servers started port mapper service first appeared sunos 2.0 shows different programs versions ports use example shows nfs running version 2 3 reached tcp port 2049 udp port 2049 depending transport protocol client wants use mount protocol version 1 2 running reached udp port 644 tcp port 645 depending transport protocol client wants use port mapper service discovered used distributed denial service ddos attacks distributed reflective denial service drdos attacks 2015 using spoofed port mapper request attacker amplify effects target portmap query return many times data original request
Internet protocols
file alteration monitor computing file alteration monitor also known fam sgi_fam provides subsystem developed silicon graphics unix-like operating systems fam subsystem allows applications watch certain files notified modified greatly aids applications fam existed applications would read disk repeatedly detect changes resulted high disk cpu usage example file manager application detect file changed update displayed icon and/or filename fam system consists two parts although fam may seem unnecessary many newer kernels include built-in notification support inotify linux example using fam provides two benefits main problem fam creation large number files example first login desktop environment slows entire system using many cpu cycles
Computer file systems
samsung experience samsung experience stylized samsung experience software overlay android launcher designed samsung galaxy devices introduced late 2016 beta build based android nougat galaxy s7 succeeding touchwiz succeeded one ui based android pie touchwiz former name samsung used ui icons originally released june 4 2010 galaxy smartphone reviewers criticized samsung including many features bloat especially galaxy s4 included many users called samsung feature creep following years though samsung incrementally removed bloatware extra features touchwiz longer recognized touchwiz leading rename samsung experience makes several changes android default homescreen apps icon bottom right screen instead bottom middle google search bar middle screen instead top weather widget provided weather channel accuweather select countries devices top right corner screen addition user edit apps grid layout edge curved glass edge screen originally introduced galaxy note edge popularized galaxy s6 edge tasks edge gives users shortcut commonly utilized tasks making phone call certain contact setting timer creating event planner assortment icons e.g contact pictures phone messaging mail icons app icon plus symbol bottom right corner photo library masked shape circle gallery icon bottom right corner right screen people edge allows user add 5 different contacts display screen quick access functions calling texting emailing displays contact name photo apps edge displays ten user frequently used apps five two columns user also add complete folder screen yahoo sports finance news panels included phone user download extra panels ease use rss reader twitter trends news cnn quick tools edge transforms ruler compass flashlight user swipes edge screen screen edge display turns displays missed calls current time weather news first released samsung galaxy note 7 android marshmallow grace ux named device codename eventually made way older devices including galaxy note 5 update korea eventually countries galaxy s7 s7 edge official android nougat update grace ux features cleaner flatter look iconography extensive use white space touchwiz grace ux devices also benefit secure folder functionality enables users keep certain data even apps behind secure password addition countries languages absent previous versions android marshmallow earlier available release starting galaxy tab s3 single pixels illuminated always-on display active screen display current time calendar selected image different styles option clock 7 styles calendar 2 styles image 3 styles always-on display available galaxy series 2017 2018 galaxy s7/s7 edge galaxy s8/s8+ galaxy s9/s9+ galaxy s10/s10+|galaxy s10 5g galaxy j7 2017 /j7 pro/j7+ c7 2017 galaxy c5/c7/c9 pro galaxy note 7/fe/8/9 devices samsung includes file manager galaxy phones unlike stock android game user downloads combined single folder folder one optimize frame rate resolution includes game tools button appears user playing game tapped mute notifications turn capacitive keys minimize game screenshot record gameplay bixby assistant launched samsung galaxy s8 replaces voice samsung phones three parts including bixby voice bixby vision bixby home bixby voice triggered saying hey bixby pressing holding button located volume rocker dubbed bixby button bixby vision built camera app see one see essentially augmented reality camera identify objects real time search various services offer user purchase available bixby also able translate text read qr codes recognize landmarks bixby home found swiping right home screen vertically scrolling list information bixby interact example weather fitness activity buttons controlling smart home gadgets bixby tasks related single keyword example simple good night request device turn silent mode turn night mode display note list exhaustive
Operating systems
executive systems problem oriented language espol short executive systems problem oriented language superset algol 60 provided capabilities would later known mohols machine oriented high order languages interrupting processor multiprocessor system burroughs large systems multiprocessor processor systems espol used write mcp master control program burroughs computer systems b5000 b6700 single-pass compiler espol could compile 250 lines per second espol superseded newp
Programming language topics
application isolation api application isolation api jsr 121 provides specification isolating controlling java application life cycles within single java virtual machine jvm multiple jvms isolated computation described isolate communicate exchange resource handles e.g open files isolates messaging facility
Programming language topics
yggdrasil linux/gnu/x yggdrasil linux/gnu/x lgx pronounced igg-drah-sill discontinued early linux distribution developed yggdrasil computing incorporated company founded adam j. richter berkeley california yggdrasil first company create live cd linux distribution yggdrasil linux described plug-and-play linux distribution automatically configuring hardware last release yggdrasil 1995 yggdrasil world tree norse mythology name chosen yggdrasil took disparate pieces software assembled complete product yggdrasil company motto free software rest us yggdrasil compliant unix filesystem hierarchy standard yggdrasil announced ‘ bootable linux/gnu/x-based unix r clone pc compatibles ’ 24 november 1992 made first release 8 december 1992 alpha release contained 0.98.1 version linux kernel v11r5 version x window system supporting 1024x768 256 colours various gnu utilities c/c++ compiler gnu debugger bison flex make tex groff ghostscript elvis emacs editors various software yggdrasil alpha release required 386 computer 8 mb ram 100 mb hard disk alpha release missing source code packages elvis beta release made 18 february 1993 beta cost us 60 lgx beta release 1993 contained 0.99.5 version linux kernel along software gnu x 22 august 1993 yggdrasil company sold 3100 copies lgx beta distribution production release version carried pricetag us 99 however yggdrasil offered free developer whose software included cd distribution according email company founder marginal cost subscription 35.70 early yggdrasil releases also available stores selling cd-rom software adam j. richter started yggdrasil company together bill selmeier richter spoke michael tiemann setting business interested joining forces cygnus richter member league programming freedom richter using 200 mb hard disk building alpha release lgx prevented practically able include source code packages contained cdrom yggdrasil incorporated published early linux compilation books linux bible gnu testament contributed significantly file system x window system functionality linux early days operation company moved san jose california 1996 1996 yggdrasil incorporated released winter 1996 edition linux internet archives six cds linux software tsx-11 sunsite gnu archive prep.ai.mit.edu x11r6 archives including free contributed x11r6 software ftp.x.org internet rfc standards total nine non-yggdrasil linux distributions company remained active least year 2000 released linux open source dvd website taken offline afterwards company released anything since company last corporate filing january 2004 california secretary state lists suspended company made offer donate 60 yggdrasil cdrom sales revenues computer systems research group founder adam j. richter later indicated company would lose much money changed offer accordingly still maintaining donations csrg company also volume discount plans
Operating systems
reed law reed law assertion david p. reed utility large networks particularly social networks scale exponentially size network reason number possible sub-groups network participants 2 − n − 1 n number participants grows much rapidly either even utility groups available joined small per-group basis eventually network effect potential group membership dominate overall economics system given set n people 2 possible subsets difficult see since form possible subset simply choosing element one two possibilities whether include element however includes one empty set n singletons properly subgroups 2 − n − 1 subsets remain exponential like 2 david p. reed law pack harvard business review february 2001 pp 23–4 reed law often mentioned explaining competitive dynamics internet platforms law states network becomes valuable people easily form subgroups collaborate value increases exponentially number connections business platform reaches sufficient number members generate network effects dominate overall economics system analysts network value functions including andrew odlyzko argued reed law metcalfe law overstate network value fail account restrictive impact human cognitive limits network formation according argument research around dunbar number implies limit number inbound outbound connections human group-forming network manage actual maximum-value structure much sparser set-of-subsets measured reed law complete graph measured metcalfe law
Computer architecture
quarantine computing quarantine function antivirus software automatically isolates infected files computer hard disk files put quarantine longer capable infecting hosting system december 1988 shortly morris worm work started quarantine anti-malware file reliability product released april 1989 quarantine first product use file signature instead viral signature methods original quarantine used hunt b-tree database files crc16 crc-ccitt signatures doubling signatures rendered useless least immoderately difficult attacks based crc invariant modifications release 2 april 1990 used crc-32 signature one based crc-32 bits word shuffled subsequent ms-av microsoft designed check point apparently relied eight bit checksum—at least thousand files hundreds identical signatures quarantine 1990 version also allowed quarantine allowed system managers track modifications selected files file structures hence quarantine users also got early warnings failing disks disk interface cards 1990 quarantine received lan magazine best year security award year quarantine reportedly responsible finding first stealth virus university toronto pattern matching virus detectors failed efforts expenses convert quarantine platforms went unrewarded tripwire 1991 copy quarantine *nix better funded publicized ondisk could afford match later efforts include modularized reliability intrusion approaches include either sha-1 md5 signatures like quarantine stopped shipping 1994
Computer security
graphics device interface graphics device interface subsystem operating systems use representing graphical objects transmitting output devices monitors printers cases graphics device interface able draw 2d graphics simple 3d graphics order make use advanced graphics keep performance api directx opengl needs installed microsoft windows gdi functionality resides gdi.exe 16-bit windows gdi32.dll 32-bit windows
Operating systems
windows fundamentals legacy pcs windows fundamentals legacy pcs winflp thin client operating system microsoft based windows xp embedded optimized older less powerful hardware released july 8 2006 marketed full-fledged general purpose operating system although functionally able perform tasks generally associated one includes certain functionality local workloads security management document viewing related tasks .net framework designed work client–server solution rdp clients third party clients citrix ica windows fundamentals legacy pcs originally announced code name eiger 12 may 2005 mönch announced potential follow-up project time name windows fundamentals legacy pcs appeared press release september 2005 introduced formerly code-named “ eiger ” described exclusive benefit sa nowiki /nowiki microsoft software assurance nowiki /nowiki customers gartner evaluation april 2006 stated rtm version windows fundamentals legacy pcs released july 8 2006 release announced press july 12 2006 may 2011 microsoft announced windows thin pc successor product microsoft positions windows fundamentals legacy pcs operating system provides basic computing services older hardware still providing core management features recent windows releases windows firewall group policy automatic updates management services however considered general-purpose operating system microsoft windows fundamentals legacy pcs windows xp embedded derivative optimized legacy pcs requires significantly fewer system resources fully featured windows xp also features basic networking extended peripheral support directx ability launch remote desktop clients compact discs addition local applications offers support hosted remote server using remote desktop installed local hard drive configured run diskless workstation despite optimized older pcs hardware requirements windows fundamentals legacy pcs similar windows xp although faster running slower clock speeds windows xp windows fundamentals legacy pcs smaller feature set windows xp example winflp include paint outlook express windows games solitaire another limitation absence compatibility tab properties ... dialog box executable files internet explorer 8 7 installed hotfix required auto-complete work newer versions browser windows fundamentals legacy pcs exclusively available microsoft software assurance customers designed inexpensive upgrade option corporations number windows 9x computers lack hardware necessary support latest windows available retail oem channels october 7 2008 service pack 3 windows embedded point service windows fundamentals legacy pcs made available april 18 2013 service pack 3 windows fundamentals legacy pcs made available download previously removed microsoft site microsoft marketing pages windows fundamentals redirect windows thin pc suggesting windows fundamentals longer available customers windows fundamentals legacy pcs lifecycle policy windows xp support lifespan ended 8 april 2014
Computer architecture
richard ledgett richard h. ledgett jr. former deputy director national security agency ledgett undergraduate degree psychology graduate degree strategic intelligence 1988 began working national security agency served variety positions cybersecurity division previous positions nsa included deputy director analysis production 2009–2010 deputy director data acquisition 2006–2009 assistant deputy director data acquisition 2005–2006 chief nsa/css pacific 2002–2005 2012 2013 director nsa/css threat operations center responsible round-the-clock cryptologic activities discover counter adversary cyber efforts june 2013 appointment deputy director january 2014 ledgett headed investigation leaks regarding nsa surveillance programs made edward snowden february 3 2017 ledgett announced would retiring spring successor george c. barnes august 15 2017 ledgett elected bank corporation board directors ledgett pledged increased transparency regarding nsa operations however defended operations nsa argued rare interview reuters nsa operations completely legal ledgett also accused media sensationalizing reports various nsa mass surveillance programs march 2014 ledgett stated ted talk nsa operates legally argued president james madison would proud way constitutional checks balances governed nsa mass surveillance
Computer security
etch protocol etch open-source cross-platform framework building network services first announced may 2008 cisco systems etch encompasses service description language compiler number language bindings intended supplement soap corba methods communicating networked pieces software especially emphasis portability transport independence small size high performance etch designed incorporated existing applications systems enabling transition service-oriented architecture derived work cisco unified application environment product acquired cisco part metreos acquisition mid-2008 release planned supported java c second wave support supposed include ruby python javascript c. july 2008 etch released apache 2.0 license part open source process etch submitted apache incubator accepted new podling august 25 2008 formal vote proposed eventually passed september 2008 etch entered start-up phase within apache incubator cisco announced unified application environment end life february 8 2012 january 2013 etch become apache top-level project etch marked retired project december 2016 replacement project announced specified
Internet protocols
.asec .asec file extension android secure encrypted asec file file extension specifically associated google android operating system first introduced android 2.2 code name froyo may 2010 like file extensions group characters end period represents actual format organization file purpose asec format prevent existing applications modified corrupted programs applications moved sd card use asec extension files found .android_secure folder sd card application must moved memory back device ’ local storage file decrypted asec file format basic apk android package file format
Operating systems
antix antix linux distribution built directly debian stable comparatively lightweight suitable older computers also providing cutting edge kernel applications well updates additions via apt-get package system debian-compatible repositories besides standard live release versions antix available base core allowing installations even lower amounts ram hard drive space overall hardware limitations antix available ia-32 x86-64 architectures comes 3 versions three versions joined antix mx 2014 developed cooperation mepis community uses xfce default desktop environment based directly debian stable highly stable gives solid performance medium-sized footprint november 2016 mx linux listed separate distro distrowatch antix linux distribution originally based mepis based debian stable distribution initially replaced mepis kde desktop environment fluxbox icewm window managers making suitable older less powerful x86-based systems unlike debian antix systemd-free
Operating systems
euphoria software euphoria game animation engine created naturalmotion based dynamic motion synthesis naturalmotion proprietary technology animating 3d characters on-the-fly based full simulation 3d character including body muscles motor nervous system instead using predefined animations characters actions reactions synthesized real-time different every time even replaying scene common current video games use limp ragdolls animations generated fly euphoria employs complex method animate entirety physically bound objects within game environment engine used indiana jones game since cancelled according web site euphoria runs microsoft windows os x linux playstation 3 playstation 4 xbox 360 xbox one ios android platforms compatible commercial physics engines press release enclosed second trailer eventually confirmed grand theft auto iv first rockstar games feature euphoria red dead redemption second game use engine star wars titles force unleashed ii use euphoria games based rockstar advanced game engine rage including grand theft auto v euphoria integrated source code rage
Distributed computing architecture
template attribute language template attribute language tal templating language used generate dynamic html xml pages main goal simplify collaboration programmers designers achieved embedding tal statements inside valid html xml tags worked using common design tools tal created zope used python-based projects well following attributes used normally prefixed codice_1 tag one tal attributes evaluated fairly logical order cases tag present lends take attributes special tal tags used making codice_1 prefix optional e.g would cause code inside codice_5 tags used whenever context whatever application server defines context e.g object contains variable codice_6 true value e.g list containing least one element identifier following colon arbitrary simply needs opening closing tag macro expansion template attribute language metal complements tal providing macros allow reuse code across template files created zope used python projects well metal complements tal ability reuse code allows developer define use macros turn may slots using macro variational content specified slot generating xml documents xml namespace must specified codice_7 following attributes recognised normally requiring „ codice_8 “ prefix normally one used time cases tag present lends take attributes special cases one metal attribute needed special metal tags used making „ metal “ prefix optional e. g. sketched roundup mind tal/tales/metal used following projects besides original zope implementation exhaustive
Web technology
walter daelemans walter daelemans born june 3 1960 professor computational linguistics university antwerp also research director computational linguistics psycholinguistics research center clips daelemans pioneered use machine learning techniques especially memory-based learning natural language processing europe early 1990s together antal van den bosch wrote book memory-based language processing developed software package timbl time professor tilburg university founded research group induction linguistic knowledge ilk 2003 elected fellow eccai european coordinating committee artificial intelligence “ pioneering work field artificial intelligence outstanding service european artificial intelligence community ” 2014 named fellow association computational linguistics
Computational linguistics
mydlp mydlp data loss prevention solution originally available released free open source software supported data inspection channels include web mail instant messaging file transfer removable storage devices printers mydlp development project originally made source code available terms gnu general public license mydlp one first free software projects data loss prevention acquired comodo group may 2014 comodo since begun marketing enterprise version comodo security solutions subsidiary free version removed website open source code updated since early 2014 october 2010 mydlp included following subprojects mydlp network mostly written erlang performance concurrent network operations python also used exceptional cases subsystem could run platform supported erlang python mydlp endpoint developed windows platforms written c++ c mydlp web ui written php adobe flex used mysql order store user configurations october 2010 mydlp included widespread data loss prevention features text extraction binary formats incident management queue source code detection data identification methods bank account credit card several national identification numbers besides features like data classification statistical analysis trained sentences native language processor integrated naive bayes classifier claimed included
Computer security
docstring programming docstring string literal specified source code used like comment document specific segment code unlike conventional source code comments even specifically formatted comments like javadoc documentation docstrings stripped source tree parsed retained throughout runtime program allows programmer inspect comments run time instance interactive help system metadata appears first introduced original teco implementation emacs languages support docstrings include python lisp elixir clojure gherkin julia documentation supported language level form docstrings markdown elixir de facto markup language choice use docstrings lisp docstrings known documentation strings common lisp standard states particular implementation may choose discard docstrings whenever want whatever reason kept docstrings may viewed changed using documentation function instance common practice documenting code object head definition captured addition docstring syntax python language docstring python code object module class function first statement code object immediately following definition 'def 'class statement statement must bare string literal kind expression docstring code object available code object codice_1 attribute codice_2 function following python file shows declaration docstrings within python source file assuming code saved mymodule.py following interactive session showing docstrings may accessed
Programming language topics
lazy jones lazy jones computer game commodore 64 zx spectrum msx tatung einstein written david whittaker released terminal software 1984 spectrum version ported simon cobb lazy jones essentially collection fifteen smaller sub-games game takes place inside hotel three floors connected elevator character lazy hotel employee much care work prefers sneak rooms play video games instead main screen lazy jones hotel interior character use elevator travel freely three floors must watch enemies current hotel manager top floor ghost previous manager bottom floor haunted cleaning cart middle floor enemies walk around pursue character contact fatal floor six rooms three side elevator room entered inside rooms video game character immediately begins playing well video games hotel bar bed cleaning closet toilet bar works like video game bed cleaning closet toilet useless decorations intentionally added whittaker run ideas new games rooms visited game starts increasingly faster time one tracks lazy jones soundtrack wall sampled german electro project zombie nation 1999 hit single kernkraft 400 plot game simple- hotel care taker named jones bored decides go rooms play games various sub-games generally simplified versions famous 1970s 1980s video games space invaders frogger snake h.e.r.o breakout chuckie egg plots gameplay simple player simply must avoid incoming enemies long enough score many points player must shoot enemies score points whittaker developed sub-game individually basic first make sure worked converted one almost line line assembly code sub-game time limit sub-games possible die thus ending sub-game prematurely others end time limit expires fourteen video games follows hotel bar character stands front rather wide bar barman patron hopelessly drunk moving back forth across bar different speeds pressing fire button standing front drink barman time earns points drunk patron bars movement jumped sub-games possible die prematurely eggie chuck jay walk res q wall sub-games end time limit runs 99 red balloons laser jones outland scoot star dust hills alive reflex turk wild wafers wipeout hotel bar game chiptune music characteristic sound distinct many c64 games 21 subtunes using two voices sid chip turn use sawtooth sound one voice plays simple octave bassline part one adding melody tunes share tempo well change seamlessly playing another sub game subtune 21 named star dust used german producer team zombie nation song kernkraft 400 without permission florian senfter splank later paid undisclosed sum david whittaker use melody tune title 99 red balloons comes english name song 99 luftballons german songstress nena version reached 1 uk singles chart visage fade grey also heard
Computer architecture
bahamas maritime authority bahamas maritime authority bma authority registers vessels bahamas enforces safety standards bahamian-registered craft authority office shirlaw house nassau also offices bahamas house new york city hutchinson house hong kong london agency established july 1995 prior establishment authority bahamas ministry transport maintained register ships bahamian-flagged bma formed due growth made prior arrangement difficult
Databases
cwshredder cwshredder program runs microsoft windows removing coolwebsearch family spyware originally created merijn bellekom bought intermute october 19 2004 june 2005 intermute acquired trend micro program distributed trend micro currently offered two forms program updated since ownership transferred trend micro currently available version v2.19 released november 2005 still functional unclear trend micro plans update program controversy quarters whether trend micro either declare cwshredder open source compelled give ownership another party program maintained updated
Computer security
mpc5xx mpc5xx family processors mpc555 mpc565 32-bit powerpc embedded microprocessors operate 40 66 mhz frequently used automotive applications including engine transmission controllers delphi corporation use either mpc561 mpc565 engine controllers supply general motors nearly 2009 model gm north america vehicles using mpc5xx engine controller bosch also used mpc5xx throughout edc-16 series diesel engine controllers cummins b series diesel engine ecu generally considered microcontrollers integrated peripheral set unusual architecture mmu large on-chip sram large much 1 mb low latency access on-chip flash memories means architecture tailored control applications instead block-address translation hardware-driven fixed-page address translation prescribed first powerpc specification 5xx cores provided software-driven translation mechanism supported variable page sizes model basis embedded mmu model current power isa specification mpc5xx – powerpc 5xx family processors share common naming scheme development powerpc 5xx family discontinued favour flexible powerful powerpc 55xx family peripherals model vary frequently include analog-to-digital converters adc time processor units tpu gpio uarts/serial qsmcm mpc5xx family descends mpc8xx powerquicc family core means uses harvard architecture single issue core unlike 8xx family 5xx variants floating point unit earlier chips like mpc509 instruction cache recent chips capability contain large amounts flash memory on-board capable bursting instructions processor low-cost chips omit flash memory adds lot die area driving price chip many controller applications run long control loops large dataset low latency deterministic access data instruction routines important data stored on-chip sram available datapath processor single cycle performance quite good data must accessed off-chip frequently performance reduced chip burst data accesses external ram slow bus access protocol simple memory interface programmed setting default memory location writing base registers chips quite popular hobbyists well automotive industrial developers
Computer architecture
basic a+ basic a+ developed optimized systems software cupertino california united states provide atari 8-bit family extended basic compatible faster simpler rom-based atari basic atari basic came 8 kb rom cartridge basic a+ delivered floppy disk took 15 kb computer ram leaving 23 kb available user programs 48 kb atari 800 basic a+ offered price us 80.00 1983 including products os/a+ easmd editor/assembler extension atari basic came supplement latter reference manual documentation addition faster rom-bound counterpart basic a+ provided number extra commands dos operations player/missile graphics debugging
Programming language topics
directx plugin computer music professional audio creation directx plugin software processing component loaded plugin host applications allow real-time processing audio effects mixing audio act virtual synthesizers directx plugins allow replacement traditional recording studio hardware rack units used professional studios software-based counterparts connected together modular way allows host manufacturers focus conviviality efficiency products specialized manufacturers focus digital signal processing aspect example plugins effects boxes reverbs delays effects pedals like guitar distortion flange chorus mixing mastering processors compressors limiters exciters sub bass enhancers stereo imagers many similar virtual studio technology later audio units apple mac os x directx plugins open standard architecture connecting audio synthesizers effect plugins audio editors hard-disk recording systems directx plug-ins based microsoft component object model com allows plugins recognised used applications via common interfaces plugins connect applications plugins pins via pass processes buffered streams audio video data architecturally directx plugins directshow filters directx plugins also two types directx effect plugins dx directx instrument plugins dxi effect plugins used generate process receive otherwise manipulate streams audio instrument plugins midi controllable directx plugins generally used synthesize sound playback sampled audio using virtual synthesizers samplers drum machines directx effect plugins developed microsoft part directshow directx instruments developed cakewalk co-operation microsoft available windows several wrapper plugins available directx plugins used applications support vst vice versa others chainer plugins also available allow chaining multiple plugins together directx plugins developed c++ using microsoft directx sdk sony audio plug-in development kit cakewalk directx wizard also delphi sdk available directx plugins superseded dmo-based signal processing filters recently media foundation transforms
Operating systems
david f. bacon david bacon american computer programmer bacon began working programmer age 16 worked startup senior year high school columbia college columbia university worked first david e. shaw non-von supercomputer network algorithms simulation yechiam yemini creating nest network simulator served basis number network simulators including cornell real thence lbl ns simulator bacon spent career ibm thomas j. watson research center starting programmer 1985 working hermes distributed programming language eventually becoming principal research staff member took sabbatical 2009 visiting professor computer science harvard 2015 joined google working spanner distributed database system much work focused garbage collection 2009 inducted acm fellow contributions real-time systems object-oriented language design implementation work metronome hard real-time tracing garbage collector became basis ibm websphere real time java virtual machine used software navy ddg 1000 destroyer original research subsequently selected 2013 influential paper award symposium principles programming languages work garbage collecting cyclic structures reference counted systems used number scripting languages including php 2013 published first garbage collector implemented completely hardware selected acm research highlight addition garbage collection work focused implementation concurrent object-oriented languages thesis work rapid type analysis rta used many compilers analysis frameworks construct call graphs object-oriented languages including soot go 2004 work high-performance locking java appeared list 50 influential pldi papers time
Programming language topics
michael collins computational linguist michael j. collins born 4 march 1970 researcher field computational linguistics research interests natural language processing well machine learning made important contributions statistical parsing statistical machine learning studies collins covers wide range topics parse re-ranking tree kernels semi-supervised learning machine translation exponentiated gradient algorithms general focus discriminative models structured prediction one notable contribution state-of-the-art parser penn wall street journal corpus november 11 2015 works cited 16,020 times h-index 47 collins worked researcher labs january 1999 november 2002 later held positions assistant associate professor m.i.t since january 2011 professor columbia university 2011 named fellow association computational linguistics
Computational linguistics
device fingerprint device fingerprint machine fingerprint browser fingerprint information collected remote computing device purpose identification fingerprints used fully partially identify individual users devices even persistent cookies also zombie cookies ca n't read stored browser client ip address hidden even one switches another browser device may allow remote application detect prevent online identity theft credit card fraud also compile long-term records individuals browsing histories even 're attempting avoid tracking raising major concern internet privacy advocates computer security experts consider ease bulk parameter extraction offered web browsers security hole basic web browser configuration information long collected web analytics services effort accurately measure real human web traffic discount various forms click fraud assistance client-side scripting languages collection much esoteric parameters possible assimilation information single string comprises device fingerprint 2010 electronic frontier foundation launched website visitors test browser fingerprint collecting sample 470161 fingerprints measured least 18.1 bits entropy possible browser fingerprinting advancements canvas fingerprinting claims add another 5.7 bits firefox provides feature protect browser fingerprinting since 2015 version 41 july 2018 still experimental disabled default wwdc 2018 apple announced safari macos mojave presents simplified system information users browse web preventing tracked based system configuration motivation device fingerprint concept stems forensic value human fingerprints ideal case web client machines would different fingerprint value diversity value would never change stability assumptions would possible uniquely distinguish machines network without explicit consent users practice neither diversity stability fully attainable improving one tendency adversely impact fingerprinting methods range passive active passive fingerprinting refers techniques involve obvious querying client machine methods rely upon precise classification factors client tcp/ip configuration os fingerprint ieee 802.11 wireless settings hardware clock skew active fingerprinting assumes client tolerate degree invasive querying active method installation executable code directly client machine code may access attributes typically available means mac address unique serial numbers assigned machine hardware data useful fingerprinting programs employ digital rights management passive collection device attributes web-browser layer may occur several osi model layers normal operation various network protocols transmit broadcast packets headers one may infer client configuration parameters sorted layer examples protocols collection device fingerprints web clients browser software relies availability javascript similar client-side scripting language harvesting suitably large number parameters two classes users limited clientside scripting mobile devices running privacy software browser extensions block ads trackers separate issue single device may multiple web clients installed even multiple virtual operating systems distinct client operating system distinct internal parameters one may change device fingerprint simply running different browser machine unless new crossbrowser fingerprinting technique used furthermore sandboxed devices like iphone exhibit little uniqueness fingerprinting techniques involving technical information device browser font list sufficient create unique fingerprint
Computer security
beyondtrust beyondtrust formerly symark american company develops markets supports family privileged identity management pam privileged remote access vulnerability management products unix linux windows mac os operating systems beyondtrust founded 2006 provided least privilege management software microsoft windows os unix vendor symark acquired beyondtrust 2009 2018 company acquired bomgar developer remote support pam software cases beyondtrust adopted new company name symark founded 1985 vax/vms utility software company los angeles san fernando valley name derived initials founders bob sommers doug yarrow symark also client-server computing vendor later acquiring license unix security product upm owned quest software rebranding version powerbroker symark relocated westlake village california agoura hills company focused identity access password management privileged users unix systems 2003—2008 company expanded spain portugal japan latin america time period also grew almost 300 percent one fastest growing private companies l.a. area 2003 autoprof introduced autoprof policy maker first commercial product build upon microsoft built-in group policy objects make common tasks like mapping network drives sharing printer connections easier 2005 autoprof grew 90 revenue previous year changed company name desktopstandard four million desktops management desktopstandard software across 3,500 customers 2003—2005 desktopstandard added six products portfolio rbac password management identity access management windows 2006 microsoft acquired desktopstandard products desktopstandard ceo formed new company beyondtrust around remaining policy maker application security product 2009 symark acquired windows-based business beyondtrust 2009 approximately 20 million adopted beyondtrust new company name 2011 beyondtrust acquired software likewise software acquisition expanded portfolio inside perimeter security capabilities windows unix-based systems include authentication auditing management cross-platform cloud environments may 2012 beyondtrust acquired vulnerability management pioneer eeye digital security december 2012 beyondtrust acquired blackbird group september 2014 veritas capital acquires beyondtrust 310 million october 2018 bomgar acquires beyondtrust veritas
Computer security
link layer discovery protocol link layer discovery protocol lldp vendor-neutral link layer protocol used network devices advertising identity capabilities neighbors local area network based ieee 802 technology principally wired ethernet protocol formally referred ieee station media access control connectivity discovery specified ieee 802.1ab ieee 802.3 section 6 clause 79 lldp performs functions similar several proprietary protocols cisco discovery protocol foundry discovery protocol nortel discovery protocol link layer topology discovery information gathered lldp stored device management information database mib queried simple network management protocol snmp specified rfc 2922 topology lldp-enabled network discovered crawling hosts querying database information may retrieved include link layer discovery protocol may used component network management network monitoring applications one example use data center bridging requirements dcbx discovery capability exchange protocol used conveying capabilities configuration features neighbors ensure consistent configuration across network lldp used advertise power ethernet capabilities requirements negotiate power delivery lldp information sent devices interfaces fixed interval form ethernet frame frame contains one lldp data unit lldpdu lldpdu sequence type-length-value tlv structures ethernet frame used lldp typically destination mac address set special multicast address 802.1d-compliant bridges forward multicast unicast destination addresses permitted ethertype field set 0x88cc lldp frame starts following mandatory tlvs chassis id port id time-to-live mandatory tlvs followed number optional tlvs frame ends special tlv named end lldpdu type length fields 0 accordingly ethernet frame containing lldpdu following structure tlv components following basic structure custom tlvs supported via tlv type 127 value custom tlv starts 24-bit organizationally unique identifier 1 byte organizationally specific subtype followed data basic format organizationally specific tlv shown according ieee std 802.1ab §9.6.1.3 organizationally unique identifier shall contain organization oui defined ieee std 802-2001 organization responsible managing subtypes media endpoint discovery enhancement lldp known lldp-med provides following facilities lldp-med protocol extension formally approved published standard ansi/tia-1057 telecommunications industry association tia april 2006
Internet protocols
nouveau software nouveau free open-source graphics device driver nvidia video cards tegra family socs written independent software engineers minor help nvidia employees project goal create open source driver reverse engineering nvidia proprietary linux drivers managed x.org foundation hosted freedesktop.org distributed part mesa 3d project initially based 2d-only free open-source nv driver red hat developer matthew garrett others claim obfuscated nouveau licensed mit license name project comes french word nouveau meaning new suggested original author irc client french autoreplace feature suggested word nouveau typed nv nouveau gallium3d-style device driver works top direct rendering infrastructure dri composed two kernel-components drm kms driver user-space components libdrm mesa 3d nouveau intends support nvidia microarchitectures tesla fermi kepler maxwell version 1.0.13 support pascal version 1.0.15 support volta latest version 1.0.16 supports new turing technical reasons nvidia gpus boot low frequency called clock device driver set higher frequency booting due lack documentation gpu nouveau lacked capability beginning result was/is major loss performance proven benchmarks compared performance nvidia proprietary device driver nouveau june 2014 breakthrough finally achieved initial re-clocking support added nouveau version 1.0.14 pascal support level maxwell 2 version 1.0.15 patch gtx 970 4gb accelerations pascal maxwell 2 level unlike amd nvidia provides documentation gpus developers nouveau forced use clean-room reverse engineering obtain necessary data enable write nouveau project uses several custom-made programs reverse engineering mmiotrace memory mapped i/o trace renouveau valgrind mmt renouveau reverse engineering nouveau program licensed gnu gpl using sdl collects data nouveau reverse engineering work users proprietary nvidia drivers help development nouveau providing information hardware nvidia cards renouveau renouveau works copying current graphics card mmio register space drawing graphics taking another copy mmio outputting difference text file runs six dozen different tests user computer makes tar.bz2 archive submits e-mail automatically transferred project ftp servers developers analyze kernel direct access hardware includes graphics card end-user software accesses various interfaces specific task nouveau written gallium3d-type device driver means shares large amounts code gallium3d drivers shared core mainlined mesa 3d distributed various linux distributions mesa 3d drivers includes supports multiple rendering interfaces designed give user-space programs e.g video games cad software access correspondent sip blocks free open-source implementation direct3d version 9 mainlined mesa 3d used nouveau however since software using direct3d programmed windows software used together wine linux rendering interface opengl developed khronos group implementations api part nvidia amd proprietary catalyst another implementation written free software enthusiasts brian paul intel coordinated mesa 3d gallium3d-type driver nouveau needs minor adaptations work implementation mesa 3d supports multiple interfaces designed give user-space programs e.g gstreamer handbrake access correspondent sip blocks also possible use ic designed rendering calculations purpose though approach consumes much electrical power compared utilizing purevideo sip block nouveau supports purevideo provides access vdpau partly xvmc nouveau support nvidia nvenc mesa galliumcompute also main project nvidia amd part near beta opencl 1.0 1.1 1.2 nouveau support cuda project coriander conversion cuda code opencl 1.2 possible cuda support therefore possible full opencl 1.2 support galliumcompute around year 2006 nvidia introduced falcon fast logic controller gpus 4th risc-v workshop july 2016 nvidia employees introduced plans replace falcon new proprietary custom design based risc-v instruction set nouveau started 2005 stéphane marchesin series patches upon nv driver officially announced february 2006 fosdem event first live demo nouveau linux.conf.au 2007 2010 nouveau accepted 2.6.33 version linux kernel experimental driver 26 march 2012 nouveau driver marked stable promoted staging area linux 3.4 nouveau gained major internal architecture overhaul linux 3.7 nouveau originally used direct rendering infrastructure dri mesa 3d rendering 3d computer graphics allows accelerate 3d drawing using graphics processing unit gpu directly 3d application february 2008 work dri support ceased moved new gallium3d nvidia publicly announced would release documentation gpus intent address areas impact out-of-the-box usability nvidia gpus nouveau nvidia alexandre courbot committed extensive patch set add initial support gk20a tegra k1 nouveau red hat employee ben skeggs committed patch adds support pascal-based gp104 chip found geforce gtx 1070 geforce gtx 1080-branded graphics cards linux kernel status 2016 future work introduced xdc2016 status new efforts opencl shown fosdem nouveau driver 3d counterpart mesa used default open-source driver nvidia cards many linux distributions including fedora 11 opensuse 11.3 ubuntu 10.04 debian compiz recommends nouveau nvidia proprietary driver june 2014 codethink reported run wayland-based weston compositor linux kernel 3.15 making use egl 100 open-source graphics driver stack tegra k1 october 2016 netbsd added experimental nouveau support netbsd 7 comparison benchmarks nouveau generally provides inferior performance nvidia proprietary graphics device drivers systems one unable boot linux properly due certain bugs nouveau thus nouveau disabled specifying kernel option nomodeset prior booting often done pressing codice_1 grub menu appending codice_2 linux line made permanent adding similar option codice_3
Operating systems
mapr fs mapr file system mapr fs clustered file system supports large-scale high-performance uses mapr fs supports variety interfaces including conventional read/write file access via nfs fuse interface well via hdfs interface used many systems apache hadoop apache spark addition file-oriented access mapr fs supports access tables message streams using apache hbase apache kafka apis well via document database interface first released 2010 mapr fs typically described mapr converged data platform due addition tabular messaging interfaces core technology however used implement forms persistent data storage interfaces ultimately supported server processes distinguish different capabilities overall data platform term mapr fs used specifically refer file-oriented interfaces mapr db mapr json db used refer tabular interfaces mapr streams used describe message streaming capabilities mapr fs cluster filesystem provides uniform access from/to files objects tables using universal namespace accessible client system access control also provided files tables streams using access control expressions extension common limited access control list allow permissions composed lists allowed users groups instead allow boolean combinations user id groups mapr fs developed starting 2009 mapr technologies extend capabilities apache hadoop providing performant stable platform design mapr fs influenced various systems andrew file system afs concept volumes afs strong similarity point view users although implementation mapr fs completely different one major difference afs mapr fs latter uses strong consistency model afs provides weak consistency meet original goals supporting hadoop programs mapr fs supports hdfs api translating hdfs function calls internal api based custom remote procedure call rpc mechanism normal write-once model hdfs replaced mapr fs fully mutable file system even using hdfs api ability support file mutation allows implementation nfs server translates nfs operations internal mapr rpc calls similar mechanisms used allow filesystem userspace fuse interface approximate emulation apache hbase api files mapr fs internally implemented splitting file contents chunks typically 256 mb size although size specific file chunk written containers element replication cluster containers replicated replication done either linear fashion replica forwards write operations next replica line star fashion master replica forwards write operations replicas time writes acknowledged master replica writes replicas complete internally containers implement b-trees used multiple levels map file offset chunk within file map file offset correct 8kb block within chunk b-trees also used implement directories long hash file directory name directory used find child file directory table volume special data structure similar directory many ways except allows additional access control management operations notable capability volumes nodes volume may reside within cluster restricted control performance particularly heavily contended multi-tenant systems running wide variety workloads proprietary technology used mapr fs implement transactions containers achieve consistent crash recovery features filesystem include
Computer file systems
correlation database correlation database database management system dbms data-model-independent designed efficiently handle unplanned ad hoc queries analytical system environment unlike row-oriented relational database management systems use records-based storage approach column-oriented databases use column-based storage method correlation database uses value-based storage vbs architecture unique data value stored auto-generated indexing system maintains context values correlation dbms stores unique data value physical database size significantly smaller relational column-oriented databases without use data compression techniques approximately 30gb correlation dbms may become smaller raw data set vbs model used cdbms consists three primary physical sets objects stored managed vbs model unique value raw data stored therefore data always normalized level unique values eliminates need normalize data sets logical schema data values stored together ordered sets based data types integers one set characters another etc optimizes data handling processes access values addition typical data values data value store contains special type data storing relationships tables functions similarly foreign keys rdbms structures cdbms relationship known dictionary stored data value making navigation tables completely automatic data dictionary contains typical metadata plus additional statistical data tables columns occurrences values logical schema also maintains information relationships logical tables index linking storage includes data used locate contents record ordered values data store ram-based storage system cdbms designed use much ram operating system provide large databases additional ram improves performance generally 4gb ram provide optimized access times 100 million records 8gb ram adequate databases 10 times size incremental ram consumed decreases database grows 16gb ram generally support databases containing approximately 20 billion records sample records shown illustrate physical differences storage structures used relational column-oriented correlation databases record-based structure used rdbms stores elements row adjacent variations like clustered indexing may change sequence rows rows columns values stored table table might stored column-based structure elements column stored adjacent consecutive duplicates within single column may automatically removed compressed efficiently vbs structure used cdbms unique value stored given abstract numeric identifier regardless number occurrences locations original data set original dataset constructed referencing logical identifiers correlation index may resemble storage note value mn occurs multiple times data included amount repeat data grows benefit multiplies records example table expressed correlation process form database normalization one achieve benefits column-oriented storage within rdbms one achieve benefits correlation database database normalization however traditional rdbms normalization process requires work form table configuration stored procedures sql statements say database correlation database naturally expresses fully normalized schema without extra configuration result correlation database may focused optimizations fully normalized structure correlation process similar occurs text-search oriented inverted index analytical data warehouse applications cdbms several advantages alternative database structures first database engine indexes data auto-generates schema fly loading implemented quickly easy update need physical pre-design need ever restructure database second cdbms enables creation execution complex queries associative queries show everything related x difficult impossible model sql primary advantage cdbms optimized executing ad hoc queries queries anticipated data warehouse design phase cdbms two drawbacks comparison database alternatives unlike relational databases used wide variety applications correlation database designed specifically analytical applications provide transaction management features used transactional processing second indexes data load process physical load speed cdbms slower relational column-oriented structures however eliminates need logical physical pre-design overall time use cdbms generally similar somewhat faster alternative structures
Databases
oryx/pecos oryx/pecos proprietary operating system developed scratch bell labs beginning 1978 express purpose running large-scale pbx switching equipment operating system first used flagship system 75 recently used variations including definity g3 generic 3 switches manufactured t/lucent technologies spinoff avaya last system based oryx/pecos avaya g3 csi running release 13.1 definity software formal end sale february 5 2007 although widely believed unix-like variant developed directly bell labs case based version unix oryx/pecos consists kernel oryx associated processes running top pecos system named pecos street bounds westminster co campus colorado bell labs location oryx last word alphabetically os office dictionary oryx purportedly origin unicorn myth system loosely based thoth developed university waterloo demos developed los alamos scientific labs features normally found commercial operating systems found oryx/pecos features include one historical link oryx/pecos unix authors article proposed future development implementation unix execution environment top oryx/pecos fact project undertaken denver however project never became official product lucent even though completed successfully introduced internally eli version oryx/pecos 5th release e release persons working large office environments using lucent technologies avaya-branded telephones likely using oxyx-pecos indirectly due narrow focus proprietary nature operating system remains obscure 2005 avaya discontinued use oryx/pecos operating system instead porting become application ran linux new incarnation known communication manager also early 2000s definity one later ip 600 s8100 earlier attempt phase away os definity one ran windows nt 4.0 linux emulator also emulated oryx/pecos system allegedly according administrators used specific system failure attempt windows run top oryx/pecos linux problem however due robust nature carrier-grade equipment widespread use t/lucent/avaya pbx systems oryx/pecos probably continue supported indefinitely
Operating systems
plua plua port programming language lua 5.0.3 along small ide palm computing platform lua programming language designed tecgraf computer graphics technology group puc-rio brazil plua includes extensions lua better support palm platform development ceased plua latest stable version plua 2.0 downloaded discussion board prior version plua 1.1 port lua 4.0 extensions differ somewhat versions new version thus sometimes called plua 2 avoid confusion plua special functions extensions support palm platform including compiler interpreter approximately 150 kb compiled helloworldapp.prc shown approximately 2 kb classic hello world program old version written follows text saved normal memo palm executed tapping run button ide alternatively program compiled prc palm os program file executable palm platform provided runtime program present ide breakdown program equivalent program new extensions written follows breakdown program first line comment rest little different
Programming language topics
object-relational impedance mismatch object-relational impedance mismatch set conceptual technical difficulties often encountered relational database management system rdbms served application program multiple application programs written object-oriented programming language style particularly objects class definitions must mapped database tables defined relational schema term object-relational impedance mismatch derived electrical engineering term impedance matching objects instances reference one another therefore form graph mathematical sense network including loops cycles relational schemas contrast tabular based relational algebra defines linked heterogeneous tuples groupings data fields row different types field object-oriented programs well designed techniques result encapsulated objects whose internal representation hidden object-oriented framework underlying properties given object expected exposed interface outside one implemented alongside object however object-relational mapping necessarily exposes underlying content object interact interface object implementation specify hence object-relational mapping violates encapsulation object since many object-relational mappers automatically generate public fields corresponding database columns relational thinking private versus public access relative need object-oriented oo model absolute characteristic data state relational oo models often conflicts relativity versus absolutism classifications characteristics object-oriented paradigm objects interfaces together provide access internals object relational model hand utilizes derived relation variables views provide varying perspectives constraints ensure integrity similarly essential oop concepts classes objects inheritance polymorphism supported relational database systems proper mapping relational concepts object-oriented concepts made relational database tables linked associations found object-oriented analysis major mismatch existing relational oo languages type system differences relational model strictly prohibits by-reference attributes pointers whereas oo languages embrace expect by-reference behavior scalar types operator semantics vastly different models causing problems mapping example sql systems support string types varying collations constrained maximum lengths open-ended text types tend hinder performance oo languages consider collation argument sort routines strings intrinsically sized available memory subtle related example sql systems often ignore trailing white space string purposes comparison whereas oo string libraries typically possible construct new data types matter constraining possible values primitive types oo language another mismatch differences structural integrity aspects contrasted models oo languages objects composed objects—often high degree—or specialize general definition may make mapping relational schemas less straightforward relational data tends represented named set global unnested relation variables relations sets tuples conforming header see tuple relational calculus ideal counterpart oo languages constraints oo languages generally declared manifested exception raising protection logic surrounding code operates encapsulated internal data relational model hand calls declarative constraints scalar types attributes relation variables database whole semantic differences especially apparent manipulative aspects contrasted models however relational model intrinsic relatively small well-defined set primitive operators usage query manipulation data whereas oo languages generally handle query manipulation custom-built lower-level case- physical-access-path-specific imperative operations oo languages support declarative query sublanguages oo languages typically deal lists perhaps hash tables manipulative primitives necessarily distinct set-based operations relational model concurrency transaction aspects significantly different also particular transactions smallest unit work performed databases much larger relational databases operations performed classes oo languages transactions relational databases dynamically bounded sets arbitrary data manipulations whereas granularity transactions oo language typically level individual assignments primitive-typed fields general oo languages analogue isolation durability atomicity consistency ensured writing fields primitive types working around impedance mismatch problem object-oriented programs starts recognition differences specific logic systems employed mismatch either minimized compensated object-relational impedance mismatch problem universal problem oo databases name suggests impedance problem occurs relational databases common solution problem use alternative database nosql xml database attempts building object-oriented database management systems oodbms would avoid impedance mismatch problem less successful practice relational databases however partly due limitations oo principles basis data model research performed extending database-like capabilities oo languages notions transactional memory one common solution impedance mismatch problem layer domain framework logic scheme oo language used model certain relational aspects runtime rather attempt static mapping frameworks employ method typically analogue tuple usually row dataset component generic entity instance class well analogue relation advantages approach may include disadvantages may include mixing levels discourse within oo application code presents problems common mechanisms used compensate biggest challenge provide framework support automation data manipulation presentation patterns within level discourse domain data modelled address reflection and/or code generation utilized reflection allows code classes addressed data thus provide automation transport presentation integrity etc data generation addresses problem addressing entity structures data inputs code generation tools meta-programming languages produce classes supporting infrastructure en masse schemes may still subject certain anomalies levels discourse merge instance generated entity classes typically properties map domain e. g. name address well properties provide state management framework infrastructure e. g. ismodified argued christopher j date others truly relational dbms would pose problem domains classes essentially one thing native mapping classes relational schemata fundamental design mistake individual tuples within database table relation ought viewed establishing relationships entities representations complex entities however view tends diminish influence role object-oriented programming using little field type management system impedance mismatch programming domain objects user interface sophisticated user interfaces allow operators managers non-programmers access manipulate records database often require intimate knowledge nature various database attributes beyond name type particular considered good practice end-user productivity point view design user interfaces ui prevents illegal transactions cause database constraint violated entered requires much logic present relational schemata duplicated code certain code-development frameworks leverage certain forms logic represented database schema referential integrity constraints issues handled generic standard fashion library routines rather ad hoc code written case-by-case basis argued sql due limited set domain types alleged flaws makes proper object domain-modelling difficult sql constitutes lossy inefficient interface dbms application program whether written object-oriented style however sql currently widely accepted common database language marketplace use vendor-specific query languages seen bad practice avoidable database languages business system 12 tutorial proposed none widely adopted dbms vendors current versions mainstream object-relational dbmss like oracle microsoft sql server point may non-issue engines functionality given database arbitrarily extended stored code functions procedures written modern oo language java oracle microsoft .net language sql server functions invoked in-turn sql statements transparent fashion user neither knows cares functions/procedures originally part database engine modern software-development paradigms fully supported thus one create set library routines re-used across multiple database schemas vendors decided support oo-language integration dbms back-end realized despite attempts iso sql-99 committee add procedural constructs sql sql never rich set libraries data structures today application programmers take granted reasonable leverage directly possible rather attempting extend core sql language consequently difference application programming database administration blurred robust implementation features constraints triggers may often require individual dual dba/oo-programming skills partnership individuals combine skills fact also bears division responsibility issue however would point contention moot due fact 1 rdbmses never intended facilitate object modelling 2 sql generally seen lossy inefficient interface language one trying achieve solution rdbmses designed sql efficient designed namely query sort filter store large sets data would additionally point inclusion oo language functionality back-end simply facilitates bad architectural practice admits high-level application logic data tier antithetical rdbms canonical copy state located database model generally assumes database management system authoritative repository state concerning enterprise copies state held application program — temporary copies may date underlying database record subsequently modified transaction many object-oriented programmers prefer view in-memory representations objects canonical data view database backing store persistence mechanism another point contention proper division responsibility application programmers database administrators dba often case needed changes application code order implement requested new feature functionality require corresponding changes database definition organizations database definition responsibility dba due need maintain production database system 24 hours day many dbas reluctant make changes database schemata deem gratuitous superfluous cases outright refuse use developmental databases apart production systems help somewhat newly developed application goes live dba need approve changes programmers view intransigence however dba frequently held responsible changes database definition cause loss service production system—as result many dbas prefer contain design changes application code design defects far less likely catastrophic consequences organizations non-dysfunctional relationship dbas developers though issue present decision change database schema would driven business needs new requirement persist additional data performance boost critical application would trigger schema modification example key philosophical differences oo relational models summarized follows result object-relational impedance mismatch often argued partisans sides debate technology ought abandoned reduced scope database advocates view traditional procedural languages compatible rdbms many oo languages suggest less oo style ought used particular argued long-lived domain objects application code ought exist objects exist created query made disposed transaction task complete conversely oo advocates argue oo-friendly persistence mechanisms oodbms ought developed used relational technology ought phased many programmers dbas hold neither viewpoints view object-relational impedance mismatch mere fact life information technology deal also argued o/r mapping paying situations probably oversold advantages besides drawbacks skeptics point worth think carefully using add little value cases
Databases
john g. kemeny john george kemeny born kemény jános györgy may 31 1926 – december 26 1992 hungarian-born american mathematician computer scientist educator best known co-developing basic programming language 1964 thomas e. kurtz kemeny served 13th president dartmouth college 1970 1981 pioneered use computers college education kemeny chaired presidential commission investigated three mile island accident 1979 according györgy marx one martians born budapest hungary jewish family kemeny attended rácz private primary school budapest classmate nandor balazs 1938 father left united states alone 1940 took whole kemeny family united states adoption second anti-jewish law hungary became imminent grandfather however refused leave perished holocaust along aunt uncle kemeny family settled new york city attended george washington high school graduated best results class three years later 1943 kemeny entered princeton university studied mathematics philosophy took year studies work manhattan project los alamos national laboratory boss richard feynman also worked john von neumann returning princeton kemeny graduated ba 1947 worked doctorate alonzo church also princeton worked albert einstein mathematical assistant graduate school 23 years old kemeny awarded doctorate 1949 dissertation entitled type-theory vs set-theory kemeny appointed dartmouth mathematics department full professor 1953 age 27 two years later became chairman department held post 1967 kemeny ventured curriculum development introduced finite mathematics courses teamed gerald l. thompson j. laurie snell write introduction finite mathematics 1957 students biology social sciences dartmouth mathematics department professors also wrote finite mathematical structures 1959 finite mathematics business applications 1962 colleges universities followed lead several textbooks finite mathematics composed elsewhere topic markov chains particularly popular kemeny teamed j. laurie snell publish finite markov chains 1960 provide introductory college textbook considering advances using potential theory obtained g. hunt wrote denumerable markov chains 1966 textbook suitable advanced seminars followed second edition 1976 additional chapter random fields david griffeath included kemeny kurtz pioneered use computers ordinary people early experiments lgp-30 invented basic programming language 1964 well one world first time-sharing systems dartmouth time-sharing system dtss 1974 american federation information processing societies gave award kemeny kurtz national computer conference work basic time-sharing kemeny president dartmouth 1970 1981 continued teach undergraduate courses research publish papers time president presided coeducation dartmouth 1972 also instituted dartmouth plan year-round operations thereby allowing students without buildings administration dartmouth became proactive recruiting retaining minority students revived founding commitment provide education american indians kemeny made dartmouth pioneer student use computers equating computer literacy reading literacy 1982 returned teaching full-time 1983 kemeny kurtz co-founded company called true basic inc. market true basic updated version language john kemeny died age 66 result heart failure lebanon new hampshire december 26 1992 lived etna near dartmouth campus
Programming language topics
extensible configuration checklist description format extensible configuration checklist description format xccdf xml format specifying security checklists benchmarks configuration documentation xccdf development pursued nist nsa mitre corporation us department homeland security xccdf intended serve replacement security hardening analysis documentation written prose xccdf used security content automation protocol
Computer security
anomaly detection data mining anomaly detection also outlier detection identification rare items events observations raise suspicions differing significantly majority data typically anomalous items translate kind problem bank fraud structural defect medical problems errors text anomalies also referred outliers novelties noise deviations exceptions particular context abuse network intrusion detection interesting objects often rare objects unexpected bursts activity pattern adhere common statistical definition outlier rare object many outlier detection methods particular unsupervised methods fail data unless aggregated appropriately instead cluster analysis algorithm may able detect micro clusters formed patterns three broad categories anomaly detection techniques exist unsupervised anomaly detection techniques detect anomalies unlabeled test data set assumption majority instances data set normal looking instances seem fit least remainder data set supervised anomaly detection techniques require data set labeled normal abnormal involves training classifier key difference many statistical classification problems inherent unbalanced nature outlier detection semi-supervised anomaly detection techniques construct model representing normal behavior given normal training data set test likelihood test instance generated learnt model anomaly detection applicable variety domains intrusion detection fraud detection fault detection system health monitoring event detection sensor networks detecting ecosystem disturbances often used preprocessing remove anomalous data dataset supervised learning removing anomalous data dataset often results statistically significant increase accuracy several anomaly detection techniques proposed literature popular techniques performance different methods depends lot data set parameters methods little systematic advantages another compared across many data sets parameters anomaly detection proposed intrusion detection systems ids dorothy denning 1986 anomaly detection ids normally accomplished thresholds statistics also done soft computing inductive learning types statistics proposed 1999 included profiles users workstations networks remote hosts groups users programs based frequencies means variances covariances standard deviations counterpart anomaly detection intrusion detection misuse detection
Computer security
socket f socket f cpu socket designed amd opteron line cpus released august 15 2006 2010 socket f replaced socket c32 entry-level servers socket g34 high-end servers socket 1207 pins 1.1mm pitch employs land grid array contact mechanism socket f primarily use amd server line considered socket generation socket am2 used athlon 64 athlon 64 x2 well socket s1 used turion 64 turion 64 x2 microprocessors socket f base amd quad fx platform referred 4x4 quadfather prior release unveiled amd november 30 2006 modified version socket f named socket 1207 fx amd socket l1 nvidia allows dual-socket dual-core four effective cores eight effective cores future processors desktop pcs home enthusiasts revisions except socket fr3 require usage registered ddr2 sdram revisions except socket fr1 require dual-plane power-supply circuit cpu
Computer architecture
external data representation external data representation xdr standard data serialization format uses computer network protocols allows data transferred different kinds computer systems converting local representation xdr called encoding converting xdr local representation called decoding xdr implemented software library functions portable different operating systems also independent transport layer xdr uses base unit 4 bytes serialized big-endian order smaller data types still occupy four bytes encoding variable-length types string opaque padded total divisible four bytes floating-point numbers represented ieee 754 format xdr developed mid 1980s sun microsystems first widely published 1987 xdr became ietf standard 1995 xdr data format use many systems including xdr standard exists three different versions following rfcs
Internet protocols
synopsys synopsys american eda company majority products include tools used design application-specific integrated circuit products include logic synthesis behavioral synthesis place route static timing analysis formal verification hardware description language systemc systemverilog/verilog vhdl simulators well transistor-level circuit simulation simulators include development debugging environments assist design logic chips computer systems recent years synopsys also expanded application security market founded 1986 aart j. de geus engineers general electric microelectronics center research triangle park north carolina synopsys first established optimal solutions charter develop market synthesis technology developed team general electric section lists various acquisitions synopsys made 1994-present synopsys three primary areas business including silicon design verification silicon intellectual property software integrity order preserve full history acquisitions included history across three business units coware part synopsys supplier platform-driven electronic system-level esl design software services coware headquartered san jose california offices around world major r offices belgium germany india coware development initiated interuniversity microelectronics centre imec belgium internal project 1992 1996 coware spun independent company coware one founding member systemc language 2005 coware acquired signal processing department cadence february 8 2010 synopsys announced acquisition coware products included platform architect model designer model library processor designer signal processing designer virtual platform designer novas software often referred novas company founded 1996 dr. paul huang address ongoing problem debugging chip designs novas purchased taiwan-based eda company springsoft may 2008 prior purchase novas partly owned springsoft developed underlying debug technology 2008 novas grew employ 50 people office locations across world headquartered san jose california springsoft novas acquired synopsys 2012 novas offered debugging visibility enhancement products cut verification time novas main product offerings included debussy debug system verdi automated debug system siloti family visibility enhancement products 2006 study found novas software sixth most-used eda vendor along novas software topped user satisfaction ratings 100 respondents europe 83 north america 69 asia saying either somewhat satisfied distinction also awarded novas software four years prior 2006 numerical technologies inc. san jose california united states based eda public nasdaq nmtc company company primarily known ip portfolio software tools services covering alternating phase shift mask alt-psm technology providing sub-wavelength design manufacturing solutions january 10 2000 numerical technologies acquired transcription enterprises inc. primarily known cats software mask data preparation october 27 2000 numerical technologies acquired cadabra design automation inc. cadabra provider automated ic layout cell creation technology used create building blocks standard cell semi-custom custom integrated circuits purchase price 99 million march 3 2003 acquired synopsys springsoft software company developed vlsi design debugging software company founded grant taiwanese national science council february 1996 1997 springsoft established novas software silicon valley market springsoft vlsi debugging software springsoft created custom layout tool called laker us-based company called silicon canvas may 2008 springsoft purchased novas software silicon canvas combined form wholly owned subsidiary springsoft usa springsoft employed 400 people office locations across world synopsys announced acquisition springsoft 2012 synplicity inc. supplier software solutions design programmable logic devices fpgas plds cplds used communications military/aerospace consumer semiconductor computer electronic systems synplicity tools provided logic synthesis physical synthesis verification functions fpga fpga-based asic prototyping dsp designers synplicity listed nasdaq acquired synopsys 227 million transaction finalized may 15 2008 synplicity founded ken mcelvain chief technical officer alisa yaffa former ceo arc international plc designer arc argonaut risc core embedded processors widely used soc devices iot storage digital home mobile automotive applications arc processors licensed 200 companies shipped 1.5 billion products per year arc international acquired synopsys 2010 roots arc international date back early 1990s company founded jez san build upon 3d accelerator technology previously developed super nintendo entertainment system division argonaut software forerunner arc originally called mario mathematical argonaut rotation i/o chip later dubbed super fx went sell millions time outselling arm risc core following success super fx designers split main company subsidiary called argonaut technology ltd atl design renamed arc marketed general-purpose configurable microprocessor later atl spun separate company arc international 1995 bob terwilliger took arc first ceo created company licensing strategy commercialized product including acquisition metaware vautomation precise software raised 50 million pre-ipo took company public september 2000 raising additional 250 million list notable events following synopsys announced acquisition virage logic june 10 2010 research development clarified networks tools began 2002 continued four years oulu university secure programming group ouspg clarified networks spun research group 2006 company entered venture cup competition year one finalists 2007 founders clarified networks also awarded vmware applicance called hownetworks 2011 company acquired codenomicon 2015 synopsys announced acquisition codenomicon coverity provider software development tools coverity tools operated via static dynamic software analysis capable finding defects related security stability testing february 2014 coverity announced agreement acquired synopsys 350 million net cash hand november 2016 synopsys acquired cigital software security firm specializes source-code static analysis penetration testing november 2017 synopsys acquired black duck software software firm based burlington focuses software composition analysis black duck hub solution scans source binary code open source libraries components providing visibility license security risks may impact organizations major way across three core business areas synopsys products services ranging silicon software coverity static application security testing sast finds fixes security quality issues code–fast black duck software composition analysis secures manages open source development deployment accurate automated security testing web applications defensics comprehensive versatile automated black box fuzzer enables organizations efficiently effectively discover remediate security weaknesses software reduce risk breach identifying exploiting business-critical vulnerabilities on-demand security testing expertise managed services include dynamic application security testing penetration testing static application security testing mobile application security testing managed network security testing accelerate application security program help experts professional services include strategy planning bsimm architecture design red teaming insider threat detection embedded software testing secure coding guidelines thick client testing application security testing services on-demand expertise help quickly identify open source legal security quality risks software audit services include open source audits application security audits code quality audits merger acquisition audits product formerly known black duck ondemand black duck audit services
Computer architecture
anti-subversion software software subversion process making software perform unintended actions either tampering program code altering behavior another fashion example code tampering could used change program code load malicious rules heuristics sql injection form subversion purpose data corruption theft buffer overflows form subversion purpose unauthorised access attacks examples computer hacking anti-subversion software detects subversion attempts stop effects hack software applications vulnerable effects subversion throughout lifecycle development deployment particularly operation maintenance anti-subversion protection accomplished static dynamic manner software applications running desktops corporate servers mobile devices embedded devices risk subversion
Computer security
william o. studeman william oliver bill studeman born january 16 1940 retired admiral united states navy former deputy director central intelligence agency two extended periods acting director central intelligence deputy director central intelligence served administrations george h. w. bush bill clinton three directors central intelligence robert gates r. james woolsey jr. john m. deutch studeman retired navy 1995 almost 35 years service 1988 1992 director national security agency director naval intelligence september 1985 july 1988 6 february 2004 studeman appointed iraq intelligence commission independent panel tasked investigating u.s. intelligence surrounding united states 2003 invasion iraq iraq weapons mass destruction wmd studeman retired 2005 northrop grumman corporation vice president deputy general manager mission systems position focused strategies programs business development marketing related intelligence information warfare well corporate cross-sector integration managing technology partnerships concepts related netcentricity isr io/iw advanced command environments served position approximately 9 years studeman served corporate boards government university corporate advisory boards recently commissioner presidential commission wmd currently serving national advisory board bio-security public interest declassification board also member defense science board well national geospatial-intelligence agency advisory board defense intelligence agency joint military intelligence college national reconnaissance office national labs advisory boards chairman board naval intelligence foundations member board national cryptologic museum foundation 1962 received bachelor degree history university south sewanee tennessee studeman holds master degree public international affairs george washington university elliott school international affairs navy also distinguished graduate naval war college national war college well recipient honorary doctorate strategic intelligence defense intelligence college receive second honorary doctorate degree fall university south studeman recipient numerous service commendations citations including navy distinguished service medal legion merit two gold stars 2007 studeman awarded william oliver baker award intelligence national security alliance also received service medals governments france brazil south korea
Computer security
hypr corp hypr corp venture-backed new york based company founded 2014 provides enterprises decentralized authentication technology accessing mobile web internet things iot applications hypr corp founded 2014 new york city team security researchers 800,000 private seed capital concluding 3 million growth funding round october 2016 ventures 10 million series funding round september 2017. company ’ decentralized authentication product unveiled international consumer electronics show ces january 2015 las vegas listed one top 10 best technologies ces 2015 zdnet company board member fast identity online fido alliance consortium global enterprises working towards open standards strong authentication 2017 gartner named firm cool vendor transforming multichannel unified retail commerce 2018 ceo co-founder george avetisov named forbes 30 30 list enterprise technology category hypr provides decentralized biometric tokenization scheme claims gives enterprises option replace use centralized password-based systems firm says forcing malicious attackers divert attention centralized validation server many client-side devices biometric tokenization decreases viability attack client-server authentication channel rendering common large-scale server-side data breach unscalable attack vector
Computer security
palm pre 2 palm pre 2 styled palm prē 2 slider smartphone designed marketed palm inc. hewlett-packard multi-touch screen physical sliding keyboard smartphone third use palm linux-based mobile operating system webos releasing version 2.0 pre 2 functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in palm pre 2 announced october 19 2010 initial launch date october 22 2010 french carrier sfr also announced pre 2 would coming united states carrier verizon wireless rogers wireless canada also unlocked umts developer phone additions include flat gorilla glass screen instead curved plastic predecessors surrounded plastic trim faster processor upgraded camera plastic door covered microusb port previous iterations considered flimsy removed otherwise pre 2 size design predecessors pre 2 last mobile phone branded palm name pre 3 veer touchpad branded hp devices august 11 2010 webos developer geoff gauchet discovered unknown device code name roadrunner accessing foursquare app using new version webos version 2.0 october 12 2010 several specifications pre 2 including processor speed memory leaked france sfr website prior official launch october 22 november 18 2010 pre 2 became available u.s. unlocked developer device december 20 2010 pre 2 launched canada rogers wireless february 17 2011 pre 2 launched u.s. verizon wireless pre 2 first phone use version 2.0 hp palm webos last version available pre 2 version 2.2.4 subject carrier approval certain models however
Operating systems
storm software storm python programming library object-relational mapping one sql databases python objects allows python developers formulate complex queries spanning multiple database tables support dynamic storage retrieval object information mysql postgresql sqlite database support built storm api allows support others storm also supports django zope web frameworks natively twisted support planned .20 release storm developed canonical ltd. python use launchpad landscape applications subsequently released 2007 free software project free software released gnu lesser general public license contributors required assign copyrights canonical version control done bazaar issue tracking launchpad
Databases
event-driven soa event-driven soa form service-oriented architecture soa combining intelligence proactiveness event-driven architecture organizational capabilities found service offerings event-driven soa typical soa platform orchestrated services centrally pre-defined business processes assuming already triggered defined business process older approach sometimes called soa 1.0 account events occur across outside specific business processes thus complex events pattern activities—both non-scheduled scheduled—should trigger set services accounted traditional soa 1.0 architecture soa 2.0 architecture event-driven soa lets business users monitor analyze enrich events make connections among disparate events first appear intuitively obvious makes enriched events visible others especially business analysts marketing directors also allows soa 2.0 system possibly automate actions take address unique pattern soa 2.0 ability create high-level business events numerous low-level system events events created filtering real-time data middleware applications databases web services example infusing defining detail dependencies causal relationships discovered correlating events clear enriched events produced soa 2.0 environment customer shopping cart abandonment rate escalated last days notification marketing department could initiate research competitors done cause customers buy products elsewhere common product shopping carts prices offered competition practice relationship streamed events processed causal vector engine performs lookup based recently viewed events assigns causal vector event relationship discovered causes b causal vector engine checks b ’ causal vector rule index contains reference engine may handle events different transactions simultaneously perhaps different order occurred unlike sequential procedural systems clients must poll change requests event-driven soa allows systems components respond dynamically real time events occur soa 2.0 complements extends soa 1.0 introducing long-running processing capabilities long running processing capability enables architecture collect various asynchronous events long period time correlate events causal relationships soa 2.0 event patterns designed implemented look event relationships span days weeks months certain criteria met trigger business process address event pattern soa 2.0 event-driven programming structured around concept decoupled relationships event producers event consumers event consumer n't care event occurs rather concerned invoked event occurred systems applications separate event producers event consumers typically rely event dispatcher channel channel contains event queue acts intermediary event producers event handlers prototypical soa 2.0 paradigm contains four essential elements soa 2.0 web services composed two ways orchestration choreography orchestration central process takes control involved web services coordinates execution different operations web services involved operation involved soa 2.0 services know need know part composition higher business process central coordinator orchestration knows orchestration centralized explicit definitions operations order invocation soa 2.0 services choreography hand rely central coordinator rather soa 2.0 service involved choreography knows exactly execute operations based defined trigger criteria interact choreography collaborative effort focused exchange messages participants choreography need aware business process operations execute messages exchange timing message exchanges bpel follows orchestration paradigm choreography covered standards wsci web services choreography interface ws-cdl web services choreography description language causal relationships inherent world around us intrinsic decision making human intelligence processes gathers relationships faster current artificial computational capability one fundamental obstacles artificial intelligence absence automated ability relate events together human uses human intuition using causal vector engine perception causality enhanced appropriate spatiotemporal conditions based structural temporal rules written engine perception complex causal semantics additive mediated bidirectional causalities need coded engine distinguish events related appear related fact engine uses preponderant causal vector rate-of-change propagation code relationship among events establishes partial order validates causality perceived multiple occurrences engine plays replays event sequence different temporal order infer could related topological connections compares replays rules preprogrammed analyst multiple low-level system events processed causal vector engine compared rules trigger higher-level business events causality vector engine cve console application displays events real-time business analysts streams events observed occur much like stock ticker cve console app several windows list events different contexts business analysts see cve relationships sequential window shows events date-timestamp order one windows various orders cve works list rules creates implied relationships events various buttons controls exist console application enable business analysts create relationships events on-the-fly define rules respond relationships business analysts infuse additional defining detail sql query statement attached rule event context cve app works much like modern-day stock trading application mutual funds managers use manage risk example cve application engine seen silk enterprise service bus esb implementations contain facility called mediation example mediation flows part websphere enterprise service bus intercept mule also supports mediation flows mediation flows modify messages passed existing services clients use services mediation flow mediates intervenes provide functions message logging data transformation routing typically functions implemented using interception design pattern messages pass esb esb enriches messages destined channel monitoring high-level business event message esb may query database obtain additional information data entity within message example based customer id esb mediation flow could get zip code customer resides based ip address originating request end-user esb mediation flow could lookup country state county ip address examples represent data enrichment concept adding additional value existing data based intent high-level business event eventually triggered esb mediation flow one component types service component architecture sca like sca component program accesses mediation flow exports provides mediation flow forwards messages external services via imports special kinds imports exports jms called jms bindings enable developers specify binding configuration write data handling code mediation flow consists series mediation primitives manipulate messages flow bus developers coded custom binding export import start focus mediation flow component websphere integration developer assembly editor done jms custom binding mediation component operation flow component interface represented request response service data objects sdo framework provides unified framework data application development sdo developers need familiar specific api order access utilize data sdo developers simply work data multiple data sources relational databases entity ejb components xml pages web services service component architecture javaserver pages pages mediation flows entirely independent bindings used imports exports fact purpose conversion sdo dataobject instance outside flow implementation mediation flows built without knowledge protocol format messages sent mediation module business-level trigger condition enables soa 2.0 architecture establish real-time customer intelligence marketing automation customer loyalty solutions among features business objects model real-world entities architecture customers accounts loans travel itineraries state one objects changes monitoring agent notices change significant compared list criteria monitor event created passed monitoring agents example detection actual business problem opportunity could lead increased revenue customer cancels order extra manufacturing capacity could reduce profitability production run soa 2.0 event could notify marketing department create special sales campaign would resell excess capacity thereby recapturing original profitable cost-per-unit automatic monitoring events operational business process activities processes execute see immediate action needs taken either inside outside enterprise monitoring agents continually test specific business conditions changes business operations necessary agents alert people make recommendations send messages applications invoke whole business processes conditions changes occur triggered business process directly support revenue growth cost containment responsiveness business conditions ability pursue new market opportunities resulting business processes could also measure operational progress toward achieving goals control operational costs communicating needed needs know report performance status key processes key decision makers example could construct crm event abandoned shopping cart message parsing transaction customer id time using filters extract value goods cart tapping correlation capabilities system add causal indicators whether commerce site suffering performance problems crm event might also include customer value rank customer database another example based types independent service calls received soa 2.0 platform could identify product defect detecting underlying pattern separate complaints triggering alert engineering production possible defect example 3 potential use event-driven soa could virtual electricity market home clothes dryers bid price electricity use real-time market pricing system real-time market price control system could turn home electricity customers active participants managing power grid monthly utility bills customers set limits much would pay electricity run clothes dryer example electricity providers willing transmit power price would alerted grid could sell electricity dryer one side consumer devices bid power based much owner device willing pay set ahead time consumer side suppliers enter bids automatically electricity generators based much would cost start run generators electricity suppliers could perform real-time market analysis determine return-on-investment optimizing profitability reducing end-user cost goods event-driven soa software could allow homeowners customize many different types electricity devices found within home desired level comfort economy event-driven software could also automatically respond changing electricity prices little five-minute intervals example reduce home owner electricity usage peak periods electricity expensive software could automatically lower target temperature thermostat central heating system winter raise target temperature thermostat central cooling system summer event-driven soa software could shut heating element water heaters pre-set response limits established individual homeowners example market price electricity given hour exceeded home owner limit home owner could plan go without recharging water hot temperature hour prices high opt delay hot water temperature recharge next hour electricity market prices might lower criteria would managed home owner personal computer internet connection programming various devices around home consume electricity management software approves consumption savings represented technique enabled event-driven soa like improving gas mileage vehicle makes home energy use efficient enabling consumption electricity real-time prices lower inhibiting consumption electricity real-time prices higher one mechanism used soa 1.0 enterprise service bus implementations publish/subscribe facility implementing esb functionality pub/sub messages advanced knowledge system events needed create soa 2.0 message patterns enterprise implemented many publish functions soa middleware analysts set task strategizing available publish messages could assembled unique pattern detect soa 2.0-enriched trigger causal vector engine cve mechanics implemented simply expandable view sql constructs written stored procedures causes b causality must occur within n number transactions sql order timestamp clause creates result set increments counter transactions occurred within timeframe n number matching b occurrence transactions creation additional stored procedures accomplished cve console application using standard database developer toolkit domain algorithms fever/flu/infection domain logic cited reference used derive sql code applies selected business rules use case using cves soa environments improve business agility application soa 2.0 principles identify business opportunities would otherwise missed identified much later functional magnetic resonance imaging fmri using granger causality analysis gca detects causal effects among brain regions results one sample test demonstrated positive causal effect rfic dorsal anterior cingulate cortex dacc oracle cve analytical engine uses set theoretical models evaluates data business analyst configures causal factors he/she specifies criteria indicating models consider causal factor
Web technology
acadine technologies acadine technologies holdings limited systems software company specializing mobile operating systems mobile wearable internet things iot devices core product h5os web-centric operating system primarily based open web standard html5 derived firefox os whose development company founder li gong overseen president mozilla corporation acadine technologies founded march 25 2015 based hong kong operations beijing taipei palo alto london initially started name gone fishing startup recruited various staff mozilla apart gong including james ho former mozilla cto andreas gal employees mozilla taiwan mozilla announced december 2015 would cease efforts partner mobile carriers use firefox os smartphones reported acadine would take mission h5os released first version h5os 17th feb 2016 announced july 15 2015 acadine technologies received 100m first-round funding tsinghua unigroup international hong kong entity controlled tsinghua university chinese government year li gong stated company already seeking second round funding international investors main rationale dispel early incorrect perception somehow china-backed company really pure silicon valley-style startup april 27 2016 reported funds tsinghua unigroup transferred acadine started reorganization h5os discontinued may 2016 never publicly released
Web technology
warflying warflying warstorming activity consisting using airplane wi-fi-equipped computer laptop pda detect wi-fi wireless networks warstorming shares similarities wardriving warwalking aspects except method transport originated western australia wafreenet wafn group taking grumman tiger four-seater near perth city 2002 documented weblog jason jordan due nature flying much difficult attempt access open networks warflying
Computer security
omega drivers omega drivers unofficial third-party device drivers ati nvidia graphics cards created angel trinidad differed official drivers offer customization extra features compatible ati graphics cards nvidia cards use detonator drivers drivers tweaked versions officially released ati nvidia mainly using registry tweaks offering alternative installer custom drivers compiled source code website omega ati driver based ati catalyst drivers driver particularly notable resolving 3d compatibility problems affecting past versions ati drivers versions 7.8-7.12 agp cards driver includes various third party utilities including 'multires entech taiwan ati tray tools tweaking utility drivers recognized ati best alternative drivers internet according terry makedon nvidia previously attempted legal action versions omega drivers company since allowed omega drivers nvidia cards made recently amd began offering upgraded driver known catalyst omega driver amd claims change brand due significant feature additions mentioned existence omega drivers omega drivers noted affiliated amd-distributed catalyst omega driver
Operating systems
mapreduce mapreduce programming model associated implementation processing generating big data sets parallel distributed algorithm cluster mapreduce program composed map procedure method performs filtering sorting sorting students first name queues one queue name reduce method performs summary operation counting number students queue yielding name frequencies mapreduce system also called infrastructure framework orchestrates processing marshalling distributed servers running various tasks parallel managing communications data transfers various parts system providing redundancy fault tolerance model specialization split-apply-combine strategy data analysis inspired map reduce functions commonly used functional programming although purpose mapreduce framework original forms key contributions mapreduce framework actual map reduce functions example resemble 1995 message passing interface standard reduce scatter operations scalability fault-tolerance achieved variety applications optimizing execution engine single-threaded implementation mapreduce usually faster traditional non-mapreduce implementation gains usually seen multi-threaded implementations multi-processor hardware use model beneficial optimized distributed shuffle operation reduces network communication cost fault tolerance features mapreduce framework come play optimizing communication cost essential good mapreduce algorithm mapreduce libraries written many programming languages different levels optimization popular open-source implementation support distributed shuffles part apache hadoop name mapreduce originally referred proprietary google technology since genericized 2014 google longer using mapreduce primary big data processing model development apache mahout moved capable less disk-oriented mechanisms incorporated full map reduce capabilities mapreduce framework processing parallelizable problems across large datasets using large number computers nodes collectively referred cluster nodes local network use similar hardware grid nodes shared across geographically administratively distributed systems use heterogeneous hardware processing occur data stored either filesystem unstructured database structured mapreduce take advantage locality data processing near place stored order minimize communication overhead mapreduce framework system usually composed three operations steps mapreduce allows distributed processing map reduction operations maps performed parallel provided mapping operation independent others practice limited number independent data sources and/or number cpus near source similarly set 'reducers perform reduction phase provided outputs map operation share key presented reducer time reduction function associative process often appears inefficient compared algorithms sequential multiple instances reduction process must run mapreduce applied significantly larger datasets single commodity server handle – large server farm use mapreduce sort petabyte data hours parallelism also offers possibility recovering partial failure servers storage operation one mapper reducer fails work rescheduled – assuming input data still available another way look mapreduce 5-step parallel distributed computation five steps logically thought running sequence – step starts previous step completed – although practice interleaved long final result affected many situations input data might already distributed sharded among many different servers case step 1 could sometimes greatly simplified assigning map servers would process locally present input data similarly step 3 could sometimes sped assigning reduce processors close possible map-generated data need process map reduce functions mapreduce defined respect data structured key value pairs map takes one pair data type one data domain returns list pairs different domain codice_3 → codice_4 map function applied parallel every pair keyed codice_5 input dataset produces list pairs keyed codice_6 call mapreduce framework collects pairs key codice_6 lists groups together creating one group key reduce function applied parallel group turn produces collection values domain codice_8 → codice_9 reduce call typically produces either one value v3 empty return though one call allowed return one value returns calls collected desired result list thus mapreduce framework transforms list key value pairs list values behavior different typical functional programming map reduce combination accepts list arbitrary values returns one single value combines values returned map necessary sufficient implementations map reduce abstractions order implement mapreduce distributed implementations mapreduce require means connecting processes performing map reduce phases may distributed file system options possible direct streaming mappers reducers mapping processors serve results reducers query canonical mapreduce example counts appearance word set documents document split words word counted map function using word result key framework puts together pairs key feeds call reduce thus function needs sum input values find total appearances word another example imagine database 1.1 billion people one would like compute average number social contacts person according age sql query could expressed using mapreduce k1 key values could integers 1 1100 representing batch 1 million records k2 key value could person age years computation could achieved using following functions mapreduce system would line 1100 map processors would provide corresponding 1 million input records map step would produce 1.1 billion n,1 records values ranging say 8 103 mapreduce system would line 96 reduce processors performing shuffling operation key/value pairs due fact need average per age provide millions corresponding input records reduce step would result much reduced set 96 output records would put final result file sorted count info record important processing reduced one time add count records computed average would wrong example reduce files 1 2 new file average 9 contacts 10-year-old person 9+9+9+9+9 /5 reduce file 3 lose count many records 've already seen end average 9.5 contacts 10-year-old person 9+10 /2 wrong correct answer 9.166 55 6 9*3+9*2+10*1 3+2+1 software framework architecture adheres open-closed principle code effectively divided unmodifiable frozen spots extensible hot spots frozen spot mapreduce framework large distributed sort hot spots application defines input reader divides input appropriate size 'splits practice typically 64 mb 128 mb framework assigns one split map function input reader reads data stable storage typically distributed file system generates key/value pairs common example read directory full text files return line record map function takes series key/value pairs processes generates zero output key/value pairs input output types map often different application word count map function would break line words output key/value pair word output pair would contain word key number instances word line value map function output allocated particular reducer application partition function sharding purposes partition function given key number reducers returns index desired reducer typical default hash key use hash value modulo number reducers important pick partition function gives approximately uniform distribution data per shard load-balancing purposes otherwise mapreduce operation held waiting slow reducers finish i.e reducers assigned larger shares non-uniformly partitioned data map reduce stages data shuffled parallel-sorted exchanged nodes order move data map node produced shard reduced shuffle sometimes take longer computation time depending network bandwidth cpu speeds data produced time taken map reduce computations input reduce pulled machine map ran sorted using application comparison function framework calls application reduce function unique key sorted order reduce iterate values associated key produce zero outputs word count example reduce function takes input values sums generates single output word final sum output writer writes output reduce stable storage mapreduce programs guaranteed fast main benefit programming model exploit optimized shuffle operation platform write map reduce parts program practice author mapreduce program however take shuffle step consideration particular partition function amount data written map function large impact performance scalability additional modules combiner function help reduce amount data written disk transmitted network mapreduce applications achieve sub-linear speedups specific circumstances designing mapreduce algorithm author needs choose good tradeoff computation communication costs communication cost often dominates computation cost many mapreduce implementations designed write communication distributed storage crash recovery tuning performance mapreduce complexity mapping shuffle sorting grouping key reducing taken account amount data produced mappers key parameter shifts bulk computation cost mapping reducing reducing includes sorting grouping keys nonlinear complexity hence small partition sizes reduce sorting time trade-off large number reducers may impractical influence split unit size marginal unless chosen particularly badly say 1mb gains mappers reading load local disks average minor processes complete quickly data fits main memory single machine small cluster using mapreduce framework usually effective since frameworks designed recover loss whole nodes computation write interim results distributed storage crash recovery expensive pays computation involves many computers long runtime computation task completes seconds restarted case error likelihood least one machine failing grows quickly cluster size problems implementations keeping data memory simply restarting computation node failures —when data small enough— non-distributed solutions often faster mapreduce system mapreduce achieves reliability parceling number operations set data node network node expected report back periodically completed work status updates node falls silent longer interval master node similar master server google file system records node dead sends node assigned work nodes individual operations use atomic operations naming file outputs check ensure parallel conflicting threads running files renamed possible also copy another name addition name task allowing side-effects reduce operations operate much way inferior properties regard parallel operations master node attempts schedule reduce operations node rack node holding data operated property desirable conserves bandwidth across backbone network datacenter implementations necessarily highly reliable example older versions hadoop namenode single point failure distributed filesystem later versions hadoop high availability active/passive failover namenode mapreduce useful wide range applications including distributed pattern-based searching distributed sorting web link-graph reversal singular value decomposition web access log stats inverted index construction document clustering machine learning statistical machine translation moreover mapreduce model adapted several computing environments like multi-core many-core systems desktop grids multi-cluster volunteer computing environments dynamic cloud environments mobile environments high-performance computing environments google mapreduce used completely regenerate google index world wide web replaced old ad hoc programs updated index ran various analyses development google since moved technologies percolator flumejava millwheel offer streaming operation updates instead batch processing allow integrating live search results without rebuilding complete index mapreduce stable inputs outputs usually stored distributed file system transient data usually stored local disk fetched remotely reducers david dewitt michael stonebraker computer scientists specializing parallel databases shared-nothing architectures critical breadth problems mapreduce used called interface low-level questioned whether really represents paradigm shift proponents claimed challenged mapreduce proponents claims novelty citing teradata example prior art existed two decades also compared mapreduce programmers codasyl programmers noting writing low-level language performing low-level record manipulation mapreduce use input files lack schema support prevents performance improvements enabled common database system features b-trees hash partitioning though projects pig piglatin sawzall apache hive ysmart hbase bigtable addressing problems greg jorgensen wrote article rejecting views jorgensen asserts dewitt stonebraker entire analysis groundless mapreduce never designed intended used database dewitt stonebraker subsequently published detailed benchmark study 2009 comparing performance hadoop mapreduce rdbms approaches several specific problems concluded relational databases offer real advantages many kinds data use especially complex processing data used across enterprise mapreduce may easier users adopt simple one-time processing tasks mapreduce programming paradigm also described danny hillis 1985 thesis widely-used time program connection machine special hardware support accelerate map reduce google granted patent mapreduce however claims patent granted mapreduce similar existing products example map reduce functionality easily implemented oracle pl/sql database oriented language supported developers transparently distributed database architectures clusterpoint xml database mongodb nosql database mapreduce tasks must written acyclic dataflow programs i.e stateless mapper followed stateless reducer executed batch job scheduler paradigm makes repeated querying datasets difficult imposes limitations felt fields machine learning iterative algorithms revisit single working set multiple times norm
Distributed computing architecture
web-based enterprise management computing web-based enterprise management wbem comprises set systems-management technologies developed unify management distributed computing environments wbem initiative initially sponsored 1996 bmc software cisco systems compaq computer intel microsoft widely adopted wbem based internet standards distributed management task force dmtf open standards although name labels wbem web-based necessarily dependent particular user interface see systems-management approaches include remote shells proprietary solutions ietf standardized network-management architectures like snmp netconf wbem allows management element standard inter-operable manner wbem provides technology underlying different management initiatives information technology understand wbem architecture consider components lie operator trying manage device configure turn collect alarms etc actual hardware software device pieces device manufacturer service provider write
Web technology
http strict transport security http strict transport security hsts web security policy mechanism helps protect websites protocol downgrade attacks cookie hijacking allows web servers declare web browsers complying user agents interact using secure https connections never via insecure http protocol hsts ietf standards track protocol specified rfc 6797 hsts policy communicated server user agent via https response header field named nowiki strict-transport-security /nowiki hsts policy specifies period time user agent access server secure fashion website using hsts must never accept clear text http either connect http systematically redirect users https consequence user-agent capable tls able connect site anymore hsts specification published rfc 6797 19 november 2012 approved 2 october 2012 iesg publication proposed standard rfc authors originally submitted internet-draft 17 june 2010 conversion internet-draft specification name altered strict transport security sts http strict transport security specification applies http http response header field defined hsts specification however remains named strict-transport-security last so-called community version then-named sts specification published 18 december 2009 revisions based community feedback original draft specification jeff hodges paypal collin jackson adam barth published 18 september 2009 hsts specification based original work jackson barth described paper forcehttps protecting high-security web sites network attacks additionally hsts realization one facet overall vision improving web security put forward jeff hodges andy steingruebl 2010 paper need coherent web security policy framework server implements hsts policy supplying header https connection hsts headers http ignored example server could send header future requests domain next year max-age specified seconds 31,536,000 equal one non-leap year use https codice_1 web application issues hsts policy user agents conformant user agents behave follows nowiki rfc 6797 /nowiki hsts policy helps protect web application users passive eavesdropping active network attacks man-in-the-middle attacker greatly reduced ability intercept requests responses user web application server user browser hsts policy effect web application important security vulnerability hsts fix ssl-stripping man-in-the-middle attacks first publicly introduced moxie marlinspike 2009 blackhat federal talk new tricks defeating ssl practice ssl tls stripping attack works transparently converting secure https connection plain http connection user see connection insecure crucially way knowing whether connection secure many websites use tls/ssl therefore way knowing without prior knowledge whether use plain http due attack simply website n't implemented tls/ssl additionally warnings presented user downgrade process making attack fairly subtle vigilant marlinspike sslstrip tool fully automates attack hsts addresses problem informing browser connections site always use tls/ssl hsts header stripped attacker user first visit google chrome mozilla firefox internet explorer microsoft edge attempt limit problem including pre-loaded list hsts sites unfortunately solution scale include websites internet see limitations hsts also help prevent one cookie-based website login credentials stolen widely available tools firesheep hsts time limited sensitive attacks involving shifting victim computer time e.g using false ntp packets initial request remains unprotected active attacks uses insecure protocol plain http uri initial request obtained insecure channel applies first request activity period specified advertised hsts policy nowiki max-age /nowiki sites set period several days months depending user activity behavior google chrome mozilla firefox internet explorer/microsoft edge address limitation implementing hsts preloaded list list contains known sites supporting hsts list distributed browser uses https initial request listed sites well previously mentioned pre-loaded lists scale cover entire web potential solution might achieved using dns records declare hsts policy accessing securely via dnssec optionally certificate fingerprints ensure validity requires running validating resolver avoid last mile issues junade ali noted hsts ineffective use phony domains using dns-based attacks possible man-in-the-middle interceptor serve traffic artificial domain hsts preload list made possible dns spoofing attacks simply domain name misleadingly resembles real domain name www.example.org instead www.example.com even hsts preloaded list hsts ca n't prevent advanced attacks tls beast crime attacks introduced juliano rizzo thai duong attacks tls orthogonal hsts policy enforcement see discussion overall hsts security considerations hsts used near-indelibly tag visiting browsers recoverable identifying data supercookies persist browser incognito privacy modes creating web page makes multiple http requests selected domains example twenty browser requests twenty different domains used theoretically one million visitors distinguished 2 due resulting requests arriving via http vs. https latter previously recorded binary bits established earlier via hsts headers depending actual deployment certain threats e.g cookie injection attacks avoided following best practices
Computer security
balance power video game balance power computer strategy game geopolitics cold war created chris crawford published 1985 macintosh mindscape followed ports variety platforms next two years game player takes role president united states general secretary soviet union goal improve player country standing world relative superpower yearly turn random events occur may effects player international prestige player choose respond events various ways may prompt response superpower creates brinkmanship situations two nations potentially escalating nuclear war ends game crawford already well-known especially eastern front 1941 1984 announcement moving macintosh platform work new concept generated considerable interest widely reviewed release including extremely positive review new york times magazine praised inventive non-action gameplay nevertheless exciting distinct named computer gaming world one innovative computer games time balance power successful mac combined ports ultimately sold quarter million units player may choose either president united states general secretary communist party soviet union must lead chosen superpower eight years seeking maximize prestige avoiding nuclear war turn one year long beginning year player presented set incidents crises various countries around globe must choose response one responses may range action diplomatic notes superpower military maneuvers response met counter-response may vary backing escalation player gets chance initiate actions deal opponent responses core mechanic similar bruce ketchledge 1983 game geopolitique 1990 published ssi one difference earlier game negotiations resolved games backing negotiation results loss prestige reverberate politically likewise games brinkmanship may result global war geopolitique wars actually fought in-game game continued balance power war ends game instantly following message ignited n accidental nuclear war animated display mushroom cloud parts bodies flying air reward failure crawford made name years atari late 1970s early 1980s smash hit eastern front 1941 made one game authors known name helped ensure later releases also successful degree early 1984 atari rapidly going bankrupt due effects north american video game crash 1983 march laid majority staff including crawford ample severance enough allow write new game freelancer considering sequel eastern front political game inca empire eventually decided write cold war game peace crawford cited bob dylan blowin wind emotional inspiration game considering atari platform lost cause crawford began looking new 16-bit platforms coming market dismissed ibm pc crude amiga likely fail business reasons thus chose macintosh platform develop time non-trivial decision development tools mac programmers buy apple lisa write code platform april 1984 interview origins game fair crawford stated working game macintosh entitled arms race based philosophy h-bombs n't kill people geopolitics kills people may initial concept fleshed game would take place top world map could show various details events would presented newspaper stories following algorithmic concept developed considering headlines national enquirer events outcomes would expressed terms prestige points crawford difficulty finding publisher balance power due small part lingering effects 1983 crash random house eventually agreed publish considerable ill crawford editor assigned prior experience video games random house ultimately cancelled contract demanded crawford return 10,000 advance payment almost causing lose home wife demanded get real job work saved friend infoworld heard troubles published two-part column game article seen producer newly formed mindscape agreed publish betas ready february 1985 polished spring summer game released september immediate sensation given world height cold war fame small part helped review new york times magazine written david l. aaron jimmy carter deputy assistant president national security affairs called close one might get cut-and-thrust international politics without going confirmation senate game immediate hit initial macintosh apple ii platforms release microsoft windows 1.0 1986 made multiplatform best seller followed versions atari st 1987 amiga among others total game sold 10 million heyday time total sales gaming hardware software combined 500 million 1986 crawford published book also called balance power details internals game great depth explains background politics formulas used calculate prestige related parameters account lengthy gestation around 2013 fulfilling 2011 promise crawford released source code several games public domain among balance power computer gaming world stated balance power stands prestigious circle innovative computer games time academy awards computer games bop would get votes best picture best director 1985 1992 survey magazine wargames modern settings gave game four stars five 1994 survey gave three stars 1996 magazine listed game game scene 11 list 15 best ways die computer gaming dragon recommended game called superb game global strategy goes beyond games wherein thoughtful calculated geopolitics could prevent worldwide nuclear war well truly entertaining thought-provoking simulation world geopolitics involves player quest prevent worldwide nuclear holocaust promoting either u.s.a. russia world prominence marvelous program everyone experience least byte praised game 1986 describing mac version best game ever seen computer ... means get program info gave amiga version four-plus stars five approving complex gameplay good user interface complaining lack sound obvious macintosh influence magazine concluded excellent game bob ewald reviewed balance power space gamer/fantasy gamer 81 ewald commented conclusion type game appeals problems worth suffering however 're hardcore wargamer n't interested diplomacy suggest pass one compute presented opposing views game may 1988 magazine included balance power list favorite games calling impressive recreation world geopolitical landscape ... call one many bluffs 'll see chilling message ignited nuclear war orson scott card however wrote review game crawford— best designer simulation games 've seen —was leaning shoulder bullying playing game way sweet delusion long united states nice n't anything offend russians go home n't play way 'll stop game nasty remark world destroyed nuclear war added since nuclear war fought crawford could know would cause one lot experts claim soviets seem behave lot nicer stand disarm crawford sure right balance power n't game propaganda 1989 compute stated 1990 edition multipolar features welcome additions game year card stated magazine 1988 list caused reevaluate game playing 1990 edition stating detailed carefully extrapolated future world 've worked still criticizing geopolitical absurdities forcing united states passively accept soviet troops syria contrary happened yom kippur war advisors mexico start nuclear war card concluded outcomes probably reflected computer limitations rather crawford political views advised players pretend balance power set alien planet astonishingly similar earth play solely based game assumptions world chuck moss disagreed card revised view describing balance power computer gaming world 1992 reflect ing extreme bias part designers called pacific treatise ... nuclear war erupted u.s. much sent five million dollars panama crawford stated 1987 proud work game feel made world better place ... think made small number people much realistic appraisal world affairs 1996 computer gaming world ranked 78th best game time calling wonderful game political intrigue felt like cold war n't require detail shadow president cyberjudas year ranked 75th top game time next generation commented although game premises hopelessly outdated u.s.s.r. disagree politics ai balance power combined unique play style make classic 2006 guardian listed first list 10 political games everyone play balance power crawford began work entirely new game released 1987 selling thousand copies mindscape disappointed pressured crawford follow-up balance power company pressed hard crawford felt owed one publishing siboot sequel released 1989 balance power 1990 edition apple iigs windows macintosh amiga atari st. crawford n't consider proper sequel saying simply tidying adding bells whistles balance power 1990 edition adds countries advisors help player new multi-polar level allows countries generate events declaring war countries 2-player hotseat mode 1992 crawford left game industry make something interactive artistic many false starts emerged erasmatron later re-released name storytron systems used make complex interactive storylines demo crawford used storytron build balance power 21st century version begins 12 september 2001 mostly involves us interactions asia emerging powers success crawford describes crap balance power basis number play mail versions manually run based moves posted internet forum systems one long-running example hosted eregime
Computer architecture
list data breaches list data breaches using data compiled various sources including press reports government news releases mainstream news articles list includes involving theft compromise 30,000 records although many smaller breaches occur continually breaches large organizations number records still unknown also listed various methods used breaches also listed hacking common breaches occur north america estimated average cost data breach 150 million 2020 global annual cost forecast 2.1 trillion estimated first half 2018 alone 4.5 billion records exposed result data breaches 2019 collection 2.7 billion identity records consisting 774 million unique email addresses 21 million unique passwords posted web sale
Computer security
adam kilgarriff adam kilgarriff 12 february 1960 – 16 may 2015 corpus linguist lexicographer co-author sketch engine parents booksellers spent one year volunteer kenya 1978–1979 began studying cambridge university graduating first class ba degree philosophy engineering 1982 first job housing officer london quadrant housing trust time studied south west london college 1987 left job started msc intelligent knowledge-based systems university sussex graduated following year continuing dphil computational linguistics thesis polysemy 1992 2008 made return trip kenya old friend raphael also participant hastings half marathon many years november 2014 diagnosed stage 4 bowel cancer succumbed may 2015 diagnosis started blog reflected experience disease thoughts language corpus linguistics life world general graduated university sussex phd 1992 became lecturer university brighton 1995 later visiting research fellow department informatics university sussex school modern languages cultures university leeds partnership b.t.s atkins sue atkins michael rundell brought setting first company lexicography masterclass ltd 2002 company provided consultancy training lexicography dictionary production shortly retirement sue atkins company dissolved 2012 2003 started company lexical computing limited delivering tools services corpus processing working lexicographer short period 1992–1995 longman dictionaries early research career closely associated word sense disambiguation phd thesis kilgarriff argued discrete classification word senses saw word senses rather continuous space meanings largely defined contexts word appears paper n't believe word senses 1997 became soon state-of-the-art argumentation topic work polysemy brought kilgarriff text corpora corpus linguistics devoted rest career one founding members former chair 2006–2008 special interest group web corpus sigwac association computational linguistics acl also one founding organizers senseval years 2000–2004 president special interest group lexicon siglex acl kilgarriff active member european association lexicography member board 2002–2006 consultant major publishing houses reviewer journals conferences around field working methods automatic acquisition large web corpora quantitative qualitative corpus analysis text genres corpus similarity homogeneity heterogeneity work corpora closely connected application computer lexicography kilgarriff invented notion word sketches one-page summaries word collocation behaviour particular grammatical relations represent core part sketch engine corpus management system
Computational linguistics
electromagnetic attack cryptography electromagnetic attacks side-channel attacks performed measuring electromagnetic radiation emitted device performing signal analysis attacks specific type sometimes referred van eck phreaking intention capture encryption keys electromagnetic attacks typically non-invasive passive meaning attacks able performed observing normal functioning target device without causing physical damage however attacker may get better signal less noise depackaging chip collecting signal closer source attacks successful cryptographic implementations perform different operations based data currently processed square-and-multiply implementation rsa different operations emit different amounts radiation electromagnetic trace encryption may show exact operations performed allowing attacker retrieve full partial private keys like many side-channel attacks electromagnetic attacks dependent specific implementation cryptographic protocol algorithm electromagnetic attacks often done conjunction side-channel attacks like power analysis attacks electronic devices emit electromagnetic radiation every wire carries current creates magnetic field electronic devices create small magnetic fields use magnetic fields unintentionally reveal information operation device properly designed electronic devices affected phenomenon term ‘ device ’ refer anything desktop computer mobile phone smart card electromagnetic waves type wave originate charged particles characterized varying wavelength categorized along electromagnetic spectrum device uses electricity emit electromagnetic radiation due magnetic field created charged particles moving along medium example radio waves emitted electricity moving along radio transmitter even satellite case electromagnetic side-channel attacks attackers often looking electromagnetic radiation emitted computing devices made circuits electronic circuits consist semiconducting materials upon billions transistors placed computer performs computations encryption electricity running transistors create magnetic field electromagnetic waves emitted electromagnetic waves captured using induction coil analog digital converter sample waves given clock rate convert trace digital signal processed computer electronic device performing computations synced clock running frequencies order mega-hertz mhz giga-hertz ghz however due hardware pipelining complexity instructions operations take multiple clock cycles complete therefore always necessary sample signal high clock rate often possible get information operations sampling order kilo-hertz khz different devices leak information different frequencies example intel atom processor leak keys rsa aes encryption frequencies 50 mhz 85 mhz android version 4.4 bouncy castle library implementation ecdsa vulnerable key extraction side channel attacks around 50 khz range every operation performed computer emits electromagnetic radiation different operations emit radiation different frequencies electromagnetic side-channel attacks attacker interested frequencies encryption occurring signal processing responsible isolating frequencies vast multitude extraneous radiation noise isolate certain frequencies bandpass filter blocks frequencies outside given range must applied electromagnetic trace sometimes attacker know frequencies encryption performed case trace represented spectrogram help determine frequencies prevalent different points execution depending device attacked level noise several filters may need applied electromagnetic attacks broadly separated simple electromagnetic analysis sema attacks differential electromagnetic analysis dema attacks simple electromagnetic analysis sema attacks attacker deduces key directly observing trace effective asymmetric cryptography implementations typically traces needed though attacker needs strong understanding cryptographic device implementation cryptographic algorithm implementation vulnerable sema attacks perform different operation depending whether bit key 0 1 use different amounts power and/or different chip components method prevalent many different types side-channel attacks particular power analysis attacks thus attacker observe entire computation encryption deduce key example common attack asymmetric rsa relies fact encryption steps rely value key bits every bit processed square operation multiplication operation bit equal 1 attacker clear trace deduce key simply observing multiplication operations performed cases simple electromagnetic analysis possible provide enough information differential electromagnetic analysis dema attacks complex effective symmetric cryptography implementation sema attacks additionally unlike sema dema attacks require much knowledge device attacked fact circuits emit high-frequency signals may leak secret information known since 1982 nsa classified 2000 right around time first electromagnetic attack encryption shown researchers since many complex attacks introduced smart cards often colloquially referred “ chip cards ” designed provide secure financial transaction traditional credit card contain simple embedded integrated circuits designed performed cryptographic functions connect directly card reader provides power necessary perform encrypted financial transaction many side-channel attacks shown effective smart cards obtain power supply clock directly card reader tampering card reader simple collect traces perform side-channel attacks works however also shown smart cards vulnerable electromagnetic attacks well field-programmable gate arrays fpga commonly used implement cryptographic primitives hardware increase speed hardware implementations vulnerable software based primitives 2005 implementation elliptic curve encryption shown vulnerable sema dema attacks aria block cipher common primitive implemented fpgas shown leak keys contrast smart cards simple devices performing single function personal computers many things thus much difficult perform electromagnetic side-channel attacks due high levels noise fast clock rates despite issues researchers 2015 2016 showed attacks laptop using near-field magnetic probe resulting signal observed seconds filtered amplified digitized offline key extraction attacks require expensive lab-grade equipment require attacker extremely close victim computer however researchers able show attacks using cheaper hardware distances half meter attacks however required collection traces expensive attacks smartphones particular interest electromagnetic side-channel attacks since advent mobile phone payment systems apple pay e-commerce systems become increasingly commonplace likewise amount research dedicated mobile phone security side channel attacks also increased currently attacks proofs concept use expensive lab-grade signal processing equipment one attacks demonstrated commercial radio receiver could detect mobile phone leakage three meters away however attacks using low-end consumer grade equipment also shown successful using external usb sound card induction coil salvaged wireless charging pad researchers able extract user signing key android openssl apple commoncrypto implementations ecdsa widely used theoretical encryption schemes mathematically secure yet type security consider physical implementations thus necessarily protect side-channel attacks therefore vulnerability lies code specific implementation shown insecure luckily many vulnerabilities shown since patched vulnerable implementations include definitely limited following attacks described thus far mainly focused use induction detect unintended radiation however use far-field communication technologies like radios also used side-channel attacks although key extraction methods far-field signal analysis demonstrated therefore rough characterization potential adversaries using attack range highly educated individuals low medium funded cartels following demonstrates possible scenarios point sale systems accept payment mobile phones smart cards vulnerable induction coils hidden systems record financial transactions smart cards mobile phone payments keys extracted malicious attacker could forge card make fraudulent charges private key belgarric et al propose scenario mobile payments performed bitcoin transactions since android implementation bitcoin client uses ecdsa signing key extracted point sale types attacks slightly complex magnetic card stripe skimmers currently used traditional magnetic strip cards many public venues starbucks locations already offering free public wireless charging pads previously shown coils used wireless charging used detection unintended radiation therefore charging pads pose potential hazard malicious charging pads might attempt extract keys addition charging user ’ phone coupled packet sniffing capabilities public wi-fi networks keys extracted could used perform man-in-the-middle attacks users far-field attacks discovered attacker needs point antenna victim perform attacks victim need actively charging phone one public pads several countermeasures electromagnetic attacks proposed though one perfect solution many following countermeasures make electromagnetic attacks harder impossible one effective ways prevent electromagnetic attacks make difficult attacker collect electromagnetic signal physical level broadly hardware designer could design encryption hardware reduce signal strength protect chip circuit wire shielding faraday cage effective reducing signal well filtering signal introducing extraneous noise mask signal additionally electromagnetic attacks require attacking equipment close target distance effective countermeasure circuit designers also use certain glues design components order make difficult impossible depackage chip without destroying many electromagnetic attacks especially sema attacks rely asymmetric implementations cryptographic algorithms effective countermeasure ensure given operation performed given step algorithm gives information value bit randomization order bit encryption process interrupts clock cycle randomization effective ways make attacks difficult classified national security agency program tempest focuses spying systems observing electromagnetic radiation securing equipment protect attacks federal communications commission outlines rules regulating unintended emissions electronic devices part 15 code federal regulations title 47 fcc provide certification devices produce excess emissions instead relies self-verification procedure
Computer security
consultant plus consultant plus assistance system work legislation russia consultant centralized database updated daily distributed via network partners major competitors garant codex techexpert proprietary full federal law database includes 3 million documents regional acts distributed separate database 4 million documents information contained system structured several notions including every class mentioned consists several information banks simplify search throughout database manually excluding classes banks inappropriate current search database includes
Databases
fork bomb computing fork bomb also called rabbit virus wabbit denial-of-service attack wherein process continually replicates deplete available system resources slowing crashing system due resource starvation around 1978 early variant fork bomb called wabbit reported run system/360 may descended similar attack called rabbits reported 1969 burroughs 5500 university washington fork bombs operate consuming cpu time process forking saturating operating system process table basic implementation fork bomb infinite loop repeatedly launches new copies unix-like operating systems fork bombs generally written use fork system call forked processes also copies first program resume execution next address frame pointer continue forking endlessly within copy infinite loop effect causing exponential growth processes modern unix systems generally use copy-on-write forking new processes fork bomb generally saturate system memory microsoft windows operating systems equivalent functionality unix fork system call fork bomb operating system must therefore create new process instead forking existing one inline shell example using perl interpreter import os true int main public class forkbomb -- requires luaposix module local unistd require posix.unistd true end section .text _start example shell script told run two instances 0 ― 0 shell variable returning name script ― pipe output one results exponentially replicating processes 0|./ 0 simpler way run 0 twice 0 0 bash fork bomb performed declaring calling multiple-recursive function bomb bomb additionally one famous commonly cited examples fork bomb dense one-line bash command command obfuscated version trick used function name possible colon reserved character bash languages otherwise identical unicode support similarly rendered shorter done command line using escape specials condensed version designed run directly run ... prompt true fork bomb mode operation entirely encapsulated creating new processes one way preventing fork bomb severely affecting entire system limit maximum number processes single user may linux achieved using ulimit utility example command codice_1 would limit affected user maximum thirty owned processes pam-enabled systems limit also set codice_2 freebsd system administrator put limits codice_3
Computer security
telemetry company telemetry independent online advertising security optimization firm offices london new york city january 2017 telemetry shut amid declining revenues telemetry founded 2009 anthony rushton russell irwin beau chesluk three began collaborating 2001 created branded online video games name jaildog launched online tv station wedigtv 2007 winning 2008 international interactive emmy award best international interactive tv network order get telemetry ground rushton irwin chesluk invested £10,000 money within two years launch company valued £175 million telemetry system initially developed exclusively video embedding code online video record click-through mouse activity real-time 2012 company expanded display forms online advertising january 2017 telemetry shut amid declining revenues telemetry private company working independently online digital video advertisers agencies provide impartial detailed analytics auditing real time company tracks efficiency exposure gained online digital advertising campaigns order ensure accountability determine true value campaign exposing inflated reach impressions investigates whether ads delivered suitable website desired market alongside intended type content previously advertisers rely biased analytics vender essentially reporting traditional ad server statistics designed track online digital video advertising campaigns telemetry advised programmatic buying ads bought sold per-impression basis ways impressions counted set price misleading ads purchased pre-roll sometimes placed instead banner video ads typically muted viewer still counted pre-roll impressions telemetry encourages advertisers diligent demanding details placement quality ensure ads running proper space proper time impressions trading genuine impressions telemetry occasionally facing criticism bypassing media agencies selling digital ad space working advertisers directly according 2014 estimates interactive advertising bureau approximately 36 reported web traffic considered fake corresponding amount fake ad views due hijacked computers programmed visit sites cheating advertisers pay based number times ad loaded response visit telemetry exposed large frauds perpetrated online advertising landscape 2014 investigation verizon wireless online video advertising purchases finding excess 1 million spent fake web views telemetry advice verizon eighth-largest advertiser us demanded make-goods later 2014 telemetry investigated mercedes-benz online advertising campaign detecting suspicious traffic activity finding 57 campaign viewed often automated computer programs human beings mercedes refunded false impressions telemetry also brought public attention scheme ads forcefully injected onto popular sites including walmart.com youtube others third-party sellers without site owners knowledge profits going third party june 2014 telemetry uncovered ad fraud scheme going several months websites running lucrative video ads placed banner ads cheaper websites behind operation skimming around 10 million video ad revenue per month scheme affected 75 advertisers including mcdonald coca-cola ford rushton called significant instance ad fraud telemetry seen telemetry publicly called companies name unethically monetizing digital ads without site owner permission manipulating impressions often generating negative user experience telemetry clients include reckitt benckiser anheuser-busch unilever verizon wireless l'oreal mercedes-benz
Web technology