text
stringlengths
6
1.88M
source
stringclasses
13 values
globus toolkit globus toolkit open-source toolkit grid computing developed provided globus alliance 25 may 2017 announced open source support project would discontinued january 2018 due lack financial support work globus service continues available research community freemium approach designed sustain software features freely available restricted subscribers globus toolkit contains set libraries programs provides developers specific tools apps solutions common problems encountered creating distributed system services applications globus software components capabilities includes globus toolkit adheres provides implementations following standards globus toolkit implementations ogf-defined protocols provide following globus toolkit components supported ogf-defined saga c++/python api number tools function globus toolkit including xml-based web services offer way access diverse services applications distributed environment 2004 univa corporation began providing commercial support globus toolkit using business model similar red hat gram grid resource allocation manager component globus toolkit officially supports following job schedulers batch-queuing systems unofficial job schedulers used globus toolkit globus alliance announced release globus toolkit version 5 gt5 late 2009 major change abandoning gram4 although continuing support least december 2010 favor enhanced gram2 called gram5 solve scalability issues add features reliable file transfer rft service replaced new globus.org service globus.org online hosted service i.e. software-as-a-service provides higher-level end-to-end grid capabilities initially concentrating reliable high-performance fire-and-forget data transfer retain web-service functionality without technology standards considered obsolete new project called globus crux started expects release alpha version end 2009 monitoring discovery tasks currently performed mds taken new crux-based integrated information services iis releases iis planned sometime 2010 release gt 5.0.2 announced 19 july 2010 gt 5.0.3 reported due release february 2011
Distributed computing architecture
apache freemarker freemarker free java-based template engine originally focusing dynamic web page generation mvc software architecture however general purpose template engine dependency servlets http html thus often used generating source code configuration files e-mails freemarker somewhat hectic history 2004 caused paradigm shifts significant changes multiple occasions freemarker 1 known freemarker classic separate project originally written benjamin geer mike bayer 2002 new project lead jonathan revusky released freemarker 2 started sequence several substantial changes main goal changes make template language strict i.e. detect many typos typical mistakes possible also automatic object wrapping introduced along gradual advancement type system template language language gained many power-user features powerful macro programming capabilities namespaces language reached quite settled state version 2.3 released 2004 q3 2016 product remained backward compatible significant backward incompatible changes expected freemarker 2 series future late 2015 freemarker granted apache software foundation entered apache incubator 2018-03-21 become fully accepted apache project following template processed freemarker produce something like variables like name messages coming outside template thus template author deal presentation issues template remains regardless variables coming database cookie calculated whatever ways also exact java api hence class values hidden freemarker using technique called object wrapping example messages seems list array javabeans body properties might well something different template affected long proper object wrapper used
Web technology
sdxf sdxf structured data exchange format data serialization format defined rfc 3072 allows arbitrary structured data different types assembled one file exchanging arbitrary computers ability arbitrarily serialize data self-describing format reminiscent xml sdxf text format xml — sdxf compatible text editors maximal length datum composite well elementary encoded using sdxf 16777215 bytes one less 16 mib sdxf data express arbitrary levels structural depth data elements self-documenting meaning metadata numeric character string structure encoded data elements design format simple transparent computer programs access sdxf data help well-defined functions exempting programmers learning precise data layout word exchange name reflects another kind transparency sdxf functions provide computer architecture independent conversion data serializations exchanged among computers via direct network file transfer cd without measures sdxf functions receiving side handle architectural adaptation structured data data patterns predictable complex strings text commercial example two companies want exchange digital invoices invoices following hierarchical nested structure basic element chunk sdxf serialization chunk chunk consist set smaller chunks chunks composed header prefix six bytes followed data header contains chunk identifier 2-byte binary number chunk_id chunk length type may contain additional information compression encryption chunk type indicates whether data consists text string characters binary number integer floating point chunk composite chunks structured chunks enable programmer pack hierarchical constructions invoice sdxf structure follow every named term invoice invoice_no date address_sender etc given unique number range 1 65535 2 byte unsigned binary integer without sign top/outermost chunk constructed id invoice means associated numerical chunk_id structured chunk level 1 invoice chunk filled chunks level 2 beyond invoice_no date address_sender address_recipient invoice_sum single_items conditions level 2 chunks structured turn two addresses single_items precise description see page 2 rfc alternatively sdxf allows programmer work sdxf structures compact function set following pseudocode creates invoices pseudocode extract invoice structure could look like sdxf designed readability modified text editors related editable structure sdef
Internet protocols
cdc kronos kronos operating system time-sharing capabilities written control data corporation 1970s kronos ran 60-bit cdc 6000 series mainframe computers successors cdc replaced kronos nos operating system late 1970s succeeded nos/ve operating system mid-1980s mace operating system apex forerunners kronos written control data systems programmer greg mansfield dave cahlander bob tate three others
Operating systems
list php editors article contains list text editors features specific php scripting language
Programming language topics
cybersecurity infrastructure security agency cybersecurity infrastructure security agency cisa established 16 november 2018 president donald trump signed law cybersecurity infrastructure security agency act 2018 cisa standalone united states federal agency operational component department homeland security dhs oversight activities continuation national protection programs directorate nppd former nppd secretary christopher krebs cisa first director former deputy secretary matthew travis first deputy director expected role cisa improve cybersecurity across levels government coordinate cybersecurity programs states improve government cybersecurity protections private nation-state hackers formed 2007 national protection programs directorate nppd component united states department homeland security nppd goal advance department national security mission reducing eliminating threats u.s. critical physical cyber infrastructure nppd led secretary homeland security national protection programs appointed president united states confirmation united states senate november 16 2018 president trump signed law cybersecurity infrastructure security agency act 2018 elevated mission former nppd within dhs establishing cybersecurity infrastructure security agency cisa nppd lead component united states department homeland security protection nation physical cyber critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents nppd collaborated shared information federal state local tribal international private-sector partners january 22 2019 cisa issued first-ever emergency directive mitigate dns infrastructure tampering 19-01 warning active attacker targeting government organizations using dns spoofing techniques perform man-in-the-middle attacks research group fireeye stated initial research suggests actor actors responsible nexus iran cisa subcomponents include federal protective service federal law enforcement agency provides integrated security law enforcement services federally owned leased buildings courthouses facilities properties assets well personnel associated agency leads department comprehensive security law enforcement services mitigating risk 9,000 federal facilities 1.1 million occupants nationwide operational activities include law enforcement response risk assessments federal facilities determine recommend install appropriate risk mitigation measures oversight 12,000 15,000 armed contract protective security officers depending customer requirements personnel conduct criminal investigations provide regular security awareness training stakeholders provide support major events office cybersecurity communications mission assuring security resiliency reliability nation cyber communications infrastructure includes national cyber security division collaborated public private international partners ensure security continuity nation cyber communications infrastructures event terrorist attacks natural disasters catastrophic incidents additionally cyber security communications protected strengthened reliability survivability interoperability nation communications capabilities including utilized emergencies federal state local tribal levels responsible overseeing national cyber security division national cybersecurity communications integration center coordinates responses cyberattacks headquartered arlington virginia office infrastructure protection led coordinated national effort reduce risk united states critical infrastructures key resources cikr posed acts terrorism department increases nation level preparedness ability respond quickly recover event attack natural disaster emergency formerly infrastructure analysis strategy division iasd within office infrastructure protection ocia established 2014 ocia important role dhs efforts implement presidential policy directive 21 calls integrated analysis critical infrastructure executive order 13636 identifying critical infrastructure cyber incidents could catastrophic impacts public health safety economy national security led coordinated efforts reducing risk nation physical critical infrastructure key resources terrorist attacks natural disasters catastrophic incidents integrating disseminating critical infrastructure key resources threat consequence vulnerability information developing risk mitigation strategies overseeing developing implementation national infrastructure protection plan nipp efforts helped ensure essential government missions public services economic functions maintained ip also ensured critical infrastructure key resources elements exploited use weapons mass destruction people institutions regulatory initiatives ammonium nitrate chemical facility anti-terrorism standards cfats programs office biometric identity management obim formerly united states visitor immigrant status indicator technology us-visit uses innovative biometrics-based technological solutions—digital fingerprints photographs—to provide decision-makers accurate information need according president proposed fiscal year 2013 budget us-visit program may transferred customs border protection immigration customs enforcement however proposed 2013 continuing resolutions house representatives senate rejected president proposal full transfer program instead senate establishes office biometric identity management nppd us-visit mission operations moving immigration customs enforcement likewise house proposed keeping us-visit program as-is nppd supports department homeland security responsibility protect nation providing biometric identification services help federal state local government decision makers accurately identify people encounter determine whether people pose risk united states us-visit supplies technology collecting storing biometric data provides analysis updates watchlist ensures integrity data
Computer security
vine toolkit vine toolkit open source software framework used create grid-aware web applications according vine toolkit web site vine modular extensible java library offers developers easy-to-use high-level application programmer interface api grid-enabling applications vine deployed use desktop java web start java servlet java portlet environments ease according vine toolkit project page vine case used basic form without additional plugins could perceived mvc framework one key concepts vine plug-in based structure vine toolkit consists core project defines base api programming model upon sub projects built sub project addresses particular problem area like grid vine build upon core vine define general concepts extensible elements others like globus toolkit 4 vine concerned adding support particular third party libraries services project conforms particular file structure defines source code built well third party libraries configuration files packaged deployed since vine java flex based framework works major platforms including windows unix mac os top vine offers several deployment scenarios
Distributed computing architecture
journal database management journal database management quarterly peer-reviewed academic journal covering database management established 1990 published igi global editor-in-chief keng siau missouri university science technology journal abstracted indexed according journal citation reports journal 2015 impact factor 0.120
Databases
late binding late binding dynamic binding dynamic linkage computer programming mechanism method called upon object function called arguments looked name runtime early binding static binding object-oriented language compilation phase fixes types variables expressions usually stored compiled program offset virtual method table v-table efficient late binding compiler read enough information verify method exists bind slot v-table instead method looked name runtime primary advantage using late binding component object model com programming require compiler reference libraries contain object compile time makes compilation process resistant version conflicts class v-table may accidentally modified concern jit-compiled platforms .net java v-table created runtime virtual machine libraries loaded running application term late binding dates back least 1960s found communications acm term widely used describe calling conventions languages like lisp though usually negative connotations performance 1980s smalltalk popularized object-oriented programming oop late binding alan kay said oop means messaging local retention protection hiding state-process extreme late-binding things done smalltalk lisp possibly systems possible 'm aware early mid-1990s microsoft heavily promoted com standard binary interface different oop programming languages com programming equally promoted early late binding many languages supporting syntax level 2000 alex martelli coined term duck typing refer similar concept different emphasis late binding generally focuses implementation details duck typing focuses ability ignore types concentrate methods object currently dynamically-typed languages list methods object altered runtime requires late binding lisp late bound global function calls efficiently looked runtime via symbol function cell function bindings mutable example using interactive clozure common lisp session c++ late binding also called dynamic binding refers normally happens codice_1 keyword used method declaration c++ creates so-called virtual table look-up table functions always consulted called usually late binding term used favor dynamic dispatch com programming late-bound method call performed using idispatch interface com-based languages visual basic 6 syntactical support calling interface done defining variable type object others c++ require explicitly call getidsofnames look method invoke call .net late binding refers overriding codice_1 method like c++ implementing interface compiler builds virtual tables every virtual interface method call used run-time determine implementation execute also like com java common language runtime provides reflection apis make late binding calls use calls varies language c 4 language also added dynamic pseudo-type would used place object type indicate late binding desired specific late binding mechanism needed determined runtime using dynamic language runtime starting point visual basic uses whenever variable type object compiler directive option strict force default setting new vb project prior version 9 .net com objects could late bound vb 10 extended dlr-based objects three definitions late binding java early documents java discussed classes linked together compile time types statically checked compile time different implementations classes could swapped prior runtime simply overwriting class file long new class definition class method names code would still work sense similar traditional definition late binding currently popular use term late binding java programming synonym dynamic dispatch specifically refers java single dispatch mechanism used virtual methods finally java use late binding using reflection apis type introspection much way done com .net programming generally speaking program java call late binding likewise use duck typing techniques frowned upon java programming abstract interfaces used instead oracle current owner java known use term late binding duck typing sense discussing java languages documentation using early binding ada database-stored procedure timestamp checked verify stored procedure changed since code compiled allows faster executions prevents application running wrong version stored procedure using late binding timestamp check performed stored procedure executed via anonymous pl/sql block slower removes need recompile client applications stored procedure changes distinction appears unique pl/sql ada languages call pl/sql procedures well database engines use late binding late binding poorer performance early bound method call implementations correct method address must looked name call requiring relatively expensive dictionary search possibly overload resolution logic yet generally negligible modern computers compilers late binding may prevent use static type checking making late bound call compiler assume method exists means simple spelling error cause run-time error thrown exact exception varies language usually named something like method found method missing modern compilers avoid ensuring every possible call must implementation compilation late binding may prevent forms static analysis needed integrated development environment ide example ide go definition feature may function late-bound call ide way know class call may refer modern ide easily solves especially object-oriented languages since late-bound method always specifies interface base class go definition leads find references used find implementations overrides similar problem possible lack typing information may prevent creation dependency graphs however programming methods abstract interfaces result problems modern ide create dependency graphs easily handles find references
Programming language topics
negative database database security negative database database saves attributes associated certain entry negative database kind database contains huge amount data consisting simulating data anyone tries get access databases actual negative data sets retrieved even steal entire database example instead storing personal details store personal details members n't negative databases avoid inappropriate queries inferences also support allowable operations scenario desirable database support allowable queries protecting privacy individual records say inspection insider collection negative data referred negative sousveillance
Databases
opensolaris opensolaris discontinued open source computer operating system based solaris created sun microsystems also name project initiated sun build developer user community around software acquisition sun microsystems 2010 oracle decided discontinue open development core software replaced opensolaris distribution model proprietary solaris express prior oracle moving core development behind closed doors group former opensolaris developers decided fork core software name openindiana openindiana project part illumos foundation aims continue development distribution opensolaris codebase since many illumos distributions available use continuing development open offering support opensolaris descendant unix system v release 4 svr4 code base developed sun late 1980s version system v variant unix available open source opensolaris developed combination several software consolidations open sourced subsequent solaris 10 includes variety free software including popular desktop server software friday august 13 2010 details started emerge relating discontinuation opensolaris project pending release new closed-source proprietary version solaris solaris 11 opensolaris based solaris originally released sun 1991 solaris version unix system v release 4 svr4 jointly developed sun merge features several existing unix systems licensed sun novell replace sunos planning opensolaris started early 2004 pilot program formed september 2004 18 non-sun community members ran 9 months growing 145 external participants sun submitted cddl common development distribution license osi approved january 14 2005 first part solaris code base open sourced solaris dynamic tracing facility commonly known dtrace tool aids analysis debugging tuning applications systems dtrace released cddl january 25 2005 newly launched opensolaris.org website bulk solaris system code released june 14 2005 remains system code open sourced available pre-compiled binary files direct newly fledged project community advisory board announced april 4 2005 two elected pilot community two employees appointed sun one appointed broader free software community sun members roy fielding al hopper rich teer casper dik simon phipps february 10 2006 sun approved opensolaris charter reestablished body independent opensolaris governing board task creating governance document constitution organization given ogb three invited members stephen hahn keith wesolowski developers sun solaris organization ben rockwood prominent opensolaris community member former next-generation solaris os version development sun eventually succeed solaris 10 codenamed 'nevada derived opensolaris codebase new code pulled new opensolaris 'nevada snapshot builds sun microsystems control bi-weekly snapshots solaris nevada codename next-generation solaris os eventually succeed solaris 10 new code pulled new opensolaris preview snapshots available genunix.org stable releases opensolaris based nevada builds initially sun solaris express program provided distribution based opensolaris code combination software found solaris releases first independent distribution released june 17 2005 many others emerged since march 19 2007 sun announced hired ian murdock founder debian head project indiana effort produce complete opensolaris distribution gnome userland tools gnu plus network-based package management system new distribution planned refresh user experience would become successor solaris express basis future releases solaris may 5 2008 opensolaris 2008.05 released format could booted live cd installed directly uses gnome desktop environment primary user interface later opensolaris 2008.11 release included gui zfs snapshotting capabilities known time slider provides functionality similar macos time machine december 2008 sun microsystems toshiba america information systems announced plans distribute toshiba laptops pre-installed opensolaris april 1 2009 tecra m10 portégé r600 came preinstalled opensolaris 2008.11 release several supplemental software packages june 1 2009 opensolaris 2009.06 released support sparc platform january 6 2010 announced solaris express program would closed opensolaris binary release scheduled released march 26 2010 opensolaris 2010.03 release never appeared august 13 2010 oracle rumored discontinued opensolaris binary distribution focus solaris express binary distribution program source code would continue accepted community oracle source code would continue released open source oracle code releases would occur binary releases internal email released opensolaris kernel developer unconfirmed oracle post confirming leak posted opensolaris forums august 13 2010 upstream contributions continue new oracle web site downstream source code publishing continue binary distribution continue old solaris express model release source code occur binary cuts binary cuts become less frequent september 14 2010 openindiana formally launched jisc centre london openindiana fork technical sense continuation opensolaris spirit project intends deliver system v family operating system binary-compatible oracle products solaris 11 solaris 11 express however rather based around os/net consolidation like opensolaris openindiana became distribution based illumos first release still based around os/net project uses ips package management system opensolaris november 12 2010 final build opensolaris 134b published oracle /release repository serve upgrade path solaris 11 express oracle solaris 11 express 2010.11 preview solaris 11 first release post-opensolaris distribution oracle released november 15 2010 opensolaris offered development unstable production stable releases opensolaris installed cd-rom usb drives network automated installer cd usb network install images made available types releases opensolaris uses network-aware package management system called image packaging system also known pkg 5 add remove manage installed software update newer releases packages development releases opensolaris published oracle typically every two weeks /dev repository production releases use /release repository receive updates next production release sun customers paid support contracts access updates production releases paid support production releases allows access security updates bug fixes offered sun /support repository pkg.sun.com hardware compatibility list hcl opensolaris consulted choosing hardware opensolaris deployment extensive opensolaris administration usage development documentation available online including community-contributed information sun released solaris source code common development distribution license cddl based mozilla public license mpl version 1.1 cddl approved open source license open source initiative osi january 2005 files licensed cddl combined files licensed licenses whether open source proprietary sun announcement java release gnu general public license gpl jonathan schwartz rich green hinted possibility releasing solaris gpl green saying certainly averse relicensing gpl schwartz pressed jokingly green said sun would take close look january 2007 eweek reported anonymous sources sun told opensolaris would dual-licensed cddl gplv3 green responded blog next day article incorrect saying although sun giving serious consideration dual-licensing arrangement would subject agreement rest opensolaris community first annual opensolaris developer conference abbreviated osdevcon organized german unix user group guug took place february 27 march 2 2007 freie universität berlin germany 2008 osdevcon joint effort guug czech opensolaris user group czosug look place june 25–27 2008 prague czech republic 2009 osdevcon look place october 27–30 2009 dresden germany 2007 sun microsystems organized first opensolaris developer summit held weekend october 13 2007 university california santa cruz united states 2008 opensolaris developer summit returned ucsc may 2–3 2008 took place immediately prior launch sun new opensolaris distribution may 5 2008 communityone conference san francisco california first opensolaris storage summit organized sun held september 21 2008 preceding snia storage developer conference sdc santa clara california second opensolaris storage summit preceded usenix conference file storage technologies fast february 23 2009 san francisco united states november 3 2009 solaris/opensolaris security summit held sun inner harbor area baltimore maryland preceding large installation system administration conference lisa notable derivatives include
Operating systems
squatting attack squatting attack computer science kind dos attack program interferes another program use shared synchronization objects unwanted unexpected way attack known microsoft windows operating system offers named objects interprocess synchronization mechanism named objects process may open synchronization object shared resource specifying name subsequent processes may use name open resource way synchronize first process squatting attack possible legitimate program enforce tight security rules resources processes arbitrary security contexts may gain access ultimately take control system consider example antivirus software installed microsoft windows machine solution two pieces service monitors scans every file opened manual scanner scans file system user requests normal conditions service scan system occasionally however user requests manual scan service must stop temporarily let manual scanner work otherwise every file would scanned twice manual scanner service solve problem vendor chooses implement event based synchronization mechanism service keeps named event opened checks whenever file opened event unset file scanned otherwise ignored manual scanner operate opens named event sets scanning disabling service scans file system resets event back finished design prone squatting attack malicious program set named event disable service completely
Computer security
xara xara acronym unauthorized cross-app resource access describes category zero-day vulnerabilities computer software systems academic research paper entitled unauthorized cross-app resource access mac os x ios published 26 may 2015 team researchers indiana university tsinghua university peking university chinese academy sciences georgia institute technology paper widely released public 16 june 2015 paper identifies number separate categories zero day threats applications stored passwords potentially exploited malware ios devices os x paper also discloses existence similar vulnerabilities android devices xara attack vector violates principles computer security sandbox
Computer security
backup disaster recovery appliance backup disaster recovery appliance also bdr appliance bdr specialized backup appliance includes backup software backup storage hypervisor support local disaster recovery appliance
Computer security
model driven interoperability model driven interoperability mdi methodological framework provides conceptual technical support make interoperable enterprises using ontologies semantic annotations following model driven development mdd principles initial idea works mdi application model-driven methods techniques solving interoperability problems business level data level three main ideas model driven interoperability mdi approach mdi initiated 2004 beginning two important research projects projects supported european commission two projects worked definition methodological framework application mdi concrete cases mdi framework within interop defined reference model proposed mdi approach shows different kinds models possible perform different levels abstraction successive model transformations needed carry different levels abstraction needed order make possible model transformations reducing gap existing enterprise models code level definition several levels based model driven architecture mda defines three levels abstraction cim pim psm moreover introduced partition cim level two sub-levels order reduce gap cim pim levels interoperability model also defined different levels abstraction proposed one example reference model mdi see next figure picture shows proposed levels different kind models performed grai top cim level uml levels final objective making interoperable two esa franchisor erp franchisee crm model driven interoperability method mdi method model-driven method used two enterprises need interoperate code level also enterprise modelling level ontological support final aim improving performances mdi method proposed solve interoperability problems like name indicates based mda approach also following principles applied definition method next picture show main features mdi method green areas give estimated effort related phase workflow mdi framework athena provides guidance mdd applied address interoperability framework structured three main integration areas reference model conceptual integration developed mdd point view focusing enterprise applications software system according mda computation independent model cim corresponds view defined computation independent viewpoint describes business context business requirements software system platform independent model pim corresponds view defined platform independent viewpoint describes software specifications independent execution platforms platform specific model psm corresponds view defined platform specific viewpoint describes realisation software systems technical integration reference model promotes use service-oriented solutions software system generally system provide set services required businesses users enterprise reference model applicative integration developed order emphasise dependencies different models views achieve interoperability model transformation one key approaches used support mdi method approach used horizontal vertical dimension reference model mdi model transformations performed based generic transformation architecture following services verification consistency models support automatic mapping discovery among heterogeneous models definition semantic preserving transformation support mdi tackle vertical horizontal issues vertical issues semantic support aiming horizontal issues semantic support aiming
Computer architecture
data erasure data erasure sometimes referred data clearing data wiping data destruction software-based method overwriting data aims completely destroy electronic data residing hard disk drive digital media using zeros ones overwrite data onto sectors device overwriting data storage device data rendered unrecoverable achieves data sanitization ideally software designed data erasure permanent data erasure goes beyond basic file deletion commands remove direct pointers data disk sectors make data recovery possible common software tools unlike degaussing physical destruction render storage media unusable data erasure removes information leaving disk operable new flash memory-based media implementations solid-state drives usb flash drives cause data erasure techniques fail allowing remnant data recoverable software-based overwriting uses software application write stream zeros ones meaningless pseudorandom data onto sectors hard disk drive key differentiators data erasure overwriting methods leave data intact raise risk data breach identity theft failure achieve regulatory compliance many data eradication programs also provide multiple overwrites support recognized government industry standards though single-pass overwrite widely considered sufficient modern hard disk drives good software provide verification data removal necessary meeting certain standards protect data lost stolen media data erasure applications remotely destroy data password incorrectly entered data erasure tools also target specific data disk routine erasure providing hacking protection method less time-consuming software encryption hardware/firmware encryption built drive integrated controllers popular solution degradation performance encryption place data erasure acts complement crypto-shredding practice 'deleting data deleting overwriting encryption keys presently dedicated hardware/firmware encryption solutions perform 256-bit full aes encryption faster drive electronics write data drives capability known self-encrypting drives seds present modern enterprise-level laptops increasingly used enterprise protect data changing encryption key renders inaccessible data stored sed easy fast method achieving 100 data erasure theft sed results physical asset loss stored data inaccessible without decryption key stored sed assuming effective attacks aes implementation drive hardware information technology assets commonly hold large volumes confidential data social security numbers credit card numbers bank details medical history classified information often stored computer hard drives servers inadvertently intentionally make way onto media printers usb flash zip jaz rev drives increased storage sensitive data combined rapid technological change shorter lifespan assets driven need permanent data erasure electronic devices retired refurbished also compromised networks laptop theft loss well portable media increasingly common sources data breaches data erasure occur disk retired lost organization user faces possibility data stolen compromised leading identity theft loss corporate reputation threats regulatory compliance financial impacts companies spend large amounts money make sure data erased discard disks high-profile incidents data theft include strict industry standards government regulations place force organizations mitigate risk unauthorized exposure confidential corporate government data regulations united states include hipaa health insurance portability accountability act facta fair accurate credit transactions act 2003 glb gramm-leach bliley sarbanes-oxley act sox payment card industry data security standards pci dss data protection act united kingdom failure comply result fines damage company reputation well civil criminal liability data erasure offers alternative physical destruction degaussing secure removal disk data physical destruction degaussing destroy digital media requiring disposal contributing electronic waste negatively impacting carbon footprint individuals companies hard drives nearly 100 recyclable collected charge variety hard drive recyclers sanitized data erasure may work completely flash based media solid state drives usb flash drives devices store remnant data inaccessible erasure technique data retrieved individual flash memory chips inside device data erasure overwriting works hard drives functioning writing sectors bad sectors usually overwritten may contain recoverable information bad sectors however may invisible host system thus erasing software disk encryption use prevents problem software-driven data erasure could also compromised malicious code software-based data erasure uses disk accessible application write combination ones zeroes alpha numeric character also known mask onto hard disk drive sector level security using software data destruction tools increased dramatically pre-testing hard drives sector abnormalities ensuring drive 100 working order number wipes become obsolete recent inclusion verify pass scans sectors disk checks character i.e 1 pass aa fill every writable sector hard disk makes 1 pass unnecessary certainly damaging act especially drives passed 1tb mark many overwriting programs capable complete data erasure offer full security destroying data areas hard drive disk overwriting programs access entire hard drive including hidden/locked areas like host protected area hpa device configuration overlay dco remapped sectors perform incomplete erasure leaving data intact accessing entire hard drive data erasure eliminates risk data remanence data erasure also bypass operating system os overwriting programs operate os always perform complete erasure modify contents hard drive actively use os many data erasure programs like dban provided bootable format run live cd necessary software erase disk data erasure deployed network target multiple pcs rather erase one sequentially contrast dos-based overwriting programs may detect network hardware linux-based data erasure software supports high-end server storage area network san environments hardware support serial ata serial attached scsi sas fibre channel disks remapped sectors operates directly sector sizes 520 524 528 removing need first reformat back 512 sector size winpe overtaken linux environment choice since drivers added little effort also helps data destruction tablets handheld devices require pure uefi environments without hardware nic installed and/or lacking uefi network stack support many government industry standards exist software-based overwriting removes data key factor meeting standards number times data overwritten also standards require method verify data removed entire hard drive view overwrite pattern complete data erasure account hidden areas typically dco hpa remapped sectors 1995 edition national industrial security program operating manual dod 5220.22-m permitted use overwriting techniques sanitize types media writing addressable locations character complement random character provision removed 2001 change manual never permitted top secret media still listed technique many providers data erasure software data erasure software provide user validation certificate indicating overwriting procedure completed properly data erasure software also comply requirements erase hidden areas provide defects log list list bad sectors could overwritten data sometimes recovered broken hard drive however platters hard drive damaged drilling hole drive platters inside data theoretically recovered bit-by-bit analysis platter advanced forensic technology data floppy disks sometimes recovered forensic analysis even disks overwritten zeros random zeros ones case modern hard drives e-waste presents potential security threat individuals exporting countries hard drives properly erased computer disposed reopened exposing sensitive information credit card numbers private financial data account information records online transactions accessed willing individuals organized criminals ghana commonly search drives information use local scams government contracts discovered hard drives found agbogbloshie multimillion-dollar agreements united states security institutions defense intelligence agency dia transportation security administration homeland security resurfaced agbogbloshie
Computer security
eni number eni number european number identification european vessel identification number registration ships capable navigating inland european waters unique eight-digit identifier attached hull entire lifetime independent vessel current name flag eni introduced inland transport committee united nations economic commission europe meeting 11–13 october 2006 geneva based rhine vessel certification system previously used ships navigating rhine comparable imo ship identification number eni number consists eight arabic numerals first three digits identify competent authority number assigned see list prefixes last five digits serial number ships vessel number accordance rhine inspection rules receive eni beginning 0 followed seven digit rhine number vessel issued imo number may receive eni number appropriate certifications inland water travel eni begin 9 followed seven digit imo number eni number transmitted inland-automatic identification system transponders european vessels required carry eni number april 2007 vessel must eni operates inland waterways meets following criteria length greater volume tug push boat operates qualifying vessel passenger ship floating installation/equipment vessel issued eni number must displayed sides stern vessel
Databases
installer programming language installer scripting language developed commodore international amigaos first released version 2.1 1992 grammar based lisp programming language compatible re-implementation named installerlg actively developed october 2018 example developer guide n't want write scripts line line may use installergen tool
Programming language topics
codecharge studio codecharge studio rapid application development rad integrated development environment ide creating database-driven web applications code generator templating engine separates presentation layer coding layer aim allowing designers programmers work cohesively web application model-view-controller design pattern codecharge first product released yes software inc. two years development codecharge utilizes point-and-click wizards creating record search forms grids editable grids without need programming databases supports include mysql ms sql server ms access postgresql oracle well database supports web connectivity codecharge export code major programing languages asp.net asp java coldfusion php perl codecharge employs interactive user interface ui designed creation web applications generating code codecharge automatically structures code using naming conventions comments describe code purpose moreover codecharge keeps application separate code generates projects may converted language time without additional programming codecharge-generated project routed web site everything routed example index.asp rather every page accessible reference name url listed technologies used application ready running application uses microsoft .net 2 framework also install .net 3.5 framework detected host computer 2003 regarding original version codecharge studio arbi arzoumani php architect wrote kevin yank sitepoint tech times impressed many ways experienced developers could draw added power software instead limited case rad tools web development review codecharge studio 2.0 troy dreier wrote intranet journal codecharge studio allows web application developers shave literally months development times codecharge studio 3.0 received rating 3.5 5 peter b. macintyre php|architect
Web technology
dropbox paper dropbox paper simply paper collaborative document-editing service developed dropbox originating company acquisition document collaboration company hackpad april 2014 dropbox paper officially announced october 2015 launched january 2017 offers web application well mobile apps android ios dropbox paper described official announcement post flexible workspace brings people ideas together paper teams create review revise manage organize—all shared documents reception dropbox paper mixed critics praised collaboration functionality including content available immediately ability mention specific collaborators assign tasks write comments well editing attribution revision history received particular praise support rich media variety sources one reviewer noting paper support rich media exceeds capabilities competitors however criticized lack formatting options editing features user interface liked minimal reviewers cited lack fixed formatting bar missing features present competitors products making dropbox paper seem like light tool dropbox acquired document collaboration company hackpad april 2014 year later dropbox launched dropbox notes note-taking product beta testing phase dropbox paper officially announced october 15 2015 followed open beta release mobile android ios apps august 2016 dropbox paper officially released january 30 2017 comparison dropbox paper evernote pc world michael ansaldo wrote emphasis document creation might expect formatting front center dropbox paper case ansaldo noted lack fixed formatting toolbar 'd find evernote word processor like google docs microsoft word instead text editor appears floating ribbon highlight selected text formatting options available emphasis bolding strikethrough bulleted numbered lists h1 h2 tags users also add links convert text checklists add comments ansaldo wrote evernote dropbox paper make easy add images document also noted dropbox paper n't support image editing paper supports rich media users add rich content document pasting link file addition dropbox paper supports media variety popular services including youtube spotify vimeo soundcloud facebook google productivity suite file appears delete link cleaner display start working people paper allows invite people via email within document sharing options view link anyone link invited person action permissions edit comment regarding collaboration ansaldo wrote creative collaboration paper ’ marquee feature provides variety ways work effectively others real time users make content immediately visible accessible specific collaborator mentions also use mentions create assign task lists within document paper also boasts essential collaboration tools including comments editing attribution revision history writing techradar john brandon wrote dropbox paper might 'light tool without extensive templates microsoft office integration apps zoho suite work well dropbox storage service popular office workers days kyle wiggers digital trends wrote paper minimizing distractions interface quite literally big blank canvas tap agenda organize notes title create to-do lists even basic formatting tools obscured view noting paper floating box words phrases highlighted cursor wiggers stated paper to-do organizer well suited purpose thanks bevy labor-saving conveniences highlighting paper supports media to-do note-taking counterparts praised collaboration tools writing extensive 'd hope citing invitation system permission controls lists changes revision history comment chat support perhaps best ability assign tasks mention business insider alex heath praised paper interface super clean friendly write n't feel overwhelmed formatting options criticized available features writing google docs much full-featured formatting department paper catching wants par competition writing verge casey newton praised paper handling rich media complimenting great added imagine creative types work teams appreciate rich media embedded documents 're working rather series infinite tabs
Distributed computing architecture
mr. object mr score many points possible digging tunnels ground collecting cherries title character mr. circus clown—except original japanese version game snowman constantly chased red monsters called creeps player loses life mr. caught one game last life lost cherries distributed throughout level groups eight 500 bonus points awarded mr. collects eight cherries row without stopping level complete either cherries removed creeps destroyed extra spelled diamond found mr. defeat creeps hitting bouncing power ball dropping large apples power ball bouncing toward creep mr. defenseless ball bounces area creeps hit behind fallen apple mr. use retrieved power ball hits creep reforms mr. hands delay increases use mr. creeps push apple edge vertical tunnel crush one creeps apple falls height breaks disappears mr. also crushed falling apple causing loss life occasionally creeps transform briefly powerful multicolored monsters tunnel ground one digs cherry leaves fewer cherries fewer points mr. collect digs apple often crushes creeps and/or mr. time score passes certain threshold play 5000 points letter word extra appears playfield alphamonster player defeat defeated monster way creep defeating alphamonster awards letter player collecting five letters word completes level goes cut scene playing theme astro boy awards player extra life alphamonsters attempt eat apples encounter makes difficult impossible crush creeps spawn center screen appeared generator turn food item picking scores bonus points freezes creeps calls alphamonster three large blue monsters latter eat apples well creeps stay frozen still deadly player either defeats three blue monsters defeats alphamonster case remaining blue monsters turned apples loses life completes stage rarely dropping apple reveal diamond collected within 15 seconds completes level awards bonus credit player well 8000 points allowing play free game feature relatively uncommon among arcade video games though standard feature many pinball machines mr ported atari 2600 atari 8-bit computers colecovision apple ii msx tomy tutor commodore 64 handheld lcd version released tomy 1983 colecovision adaptation alphamonster sidekicks unable eat apples making easier crush blue monsters eat shrubbery cherries also alphamonster letter already acquired dinosaur monsters freeze seconds release famicom tsūshin awarded super famicom version game 25 40 four reviewers electronic gaming monthly gave 4.875 10 dan hsu felt mr fun gameplay criticized lack enhancements decade old game recommended players get released significantly less normal retail price snes cartridge later feature 16-bit games reported contrary hopes game priced 50 mr followed three sequels mr. castle 1983 also known mr. vs. unicorns mr. wild ride run run 1984 expanded 99-level version mr developed arcades electrocoin 1989 mr adapted nintendo game boy super famicom/snes providing new gameplay features rebranded adaptation game released game boy color 1999 titled quest fantasy challenge holy magic century europe developed imagineer published sunsoft north america virgin interactive europe branded quest series game instead mr arcade version debuted wii virtual console japan april 27 2010.virtual console releases april 2010
Computer architecture
actel smartfusion smartfusion family microcontrollers integrated fpga actel device includes arm cortex-m3 hard processor core 512kb flash 64kb ram analog peripherals multi-channel adc dacs addition flash-based fpga fabric actel also sells two development boards include smartfusion chip one smartfusion evaluation kit low cost board smartfusion a2f200 sold 99 another smartfusion development kit fully featured board smartfusion a2f500 sold 999 amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer actel documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set actel additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official stm32 arm documents
Computer architecture
agiloft agiloft inc. technology company specializing business process management software redwood city california originally founded october 1990 integral solutions corporation colin earl agiloft started integral solutions corporation founded colin earl 1990 company worked development projects corporations developing software 1996 called supportwizard supportwizard designed help desk application 1999 officially supported mysql integral solutions continued build application adding call center crm functionality time company known name supportwizard software 2003 announced new revision software operating j2ee framework called enterprise wizard 2007 company offered platform version software called saaswizard users could automate business actions customization development continued enterprisewizard application operating top platform allowing users customize program web interface colin earl changed business software name agiloft 2012 2017 earl spoke proposed h1-b reforms stated one workers likelihood getting visa renewed return china agiloft low-code development platform prebuilt modules focus contract management service management platform configured via web-browser dropdown menus drag drop tools configure functions build new applications contract management portion software allows automation creation workflow renewal contracts used healthcare field software pc magazine editor choice award several years
Distributed computing architecture
unicorn web server unicorn rack http server serve ruby web applications unix environment optimised used nginx based mongrel 1.1.5 unicorn uses master/worker architecture master process forks worker processes control application runs single thread unicorn considered “ one popular servers rails ” twitter starts test unicorn 2010 server shipped discourse system administration expert sam saffron noted unicorn reliable reaps unresponsive workers gitlab also uses unicorn unicorn inspired projects like gunicorn fork run python applications 2018 projects tend favour puma heroku hosting provider recommends since 2015 migrate unicorn puma.. deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing pure cpu situations
Web technology
global serializability concurrency control databases transaction processing transaction management transactional distributed applications global serializability modular serializability property global schedule transactions global schedule unified schedule individual database transactional object schedules multidatabase environment e.g. federated database complying global serializability means global schedule serializable serializability property component database module serializable schedule well words collection serializable components provides overall system serializability usually incorrect need correctness across databases multidatabase systems makes global serializability major goal global concurrency control modular concurrency control proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones well increase systems management sophistication need atomic distributed transactions thus effective global serializability techniques ensure correctness among distributed transactional applications seems increase federated database system loosely defined multidatabase system typically distributed communication network transactions span multiple possibly distributed databases enforcing global serializability system different databases may use different types concurrency control problematic even every local schedule single database serializable global schedule whole system necessarily serializable massive communication exchanges conflict information needed databases reach conflict serializability globally would lead unacceptable performance primarily due computer communication latency achieving global serializability effectively different types concurrency control open several years commitment ordering commit ordering co serializability technique publicly introduced 1991 yoav raz digital equipment corporation dec provides effective general solution global conflict serializability across collection database systems transactional objects possibly different concurrency control mechanisms co need distribution conflict information rather utilizes already needed unmodified atomic commitment protocol messages without communication databases also allows optimistic non-blocking implementations co generalizes strong strict two phase locking ss2pl conjunction two-phase commit 2pc protocol de facto standard achieving global serializability across ss2pl based database systems result co compliant database systems different concurrency control types transparently join existing ss2pl based solutions global serializability applies also multiple transactional object systems use atomic transactions need global serializability correctness see examples nowadays need smaller database systems origin atomic transactions significant aspects co make uniquely effective general solution global serializability following aspects except first two also possessed popular ss2pl constrained blocking special case co inherits many co qualities difficulties described translate following problem lack appropriate solution global serializability problem driven researchers look alternatives serializability correctness criterion multidatabase environment e.g. see relaxing global serializability problem characterized difficult open following two quotations demonstrate mindset end year 1991 similar quotations numerous articles commitment ordering publicly introduced may 1991 see provides efficient elegant general solution practical theoretical points view global serializability problem across database systems possibly different concurrency control mechanisms provides conflict serializability negative effect availability worse performance de facto standard global serializability co special case strong strict two-phase locking ss2pl requires knowledge neither local global transactions commitment ordering solution comprises effective integration autonomous database management systems possibly different concurrency control mechanisms local global transactions execute parallel without restricting read write operation either local global transactions without compromising systems autonomy even later years public introduction commitment ordering general solution 1991 problem still considered many unsolvable quotation 1997 article proposing relaxed global serializability solution see relaxing global serializability referencing commitment ordering co articles co solution supports effectively full acid properties full local autonomy well meeting requirements posed problem statement section apparently misunderstood similar thinking see also following quotation 1998 article also quoted article proposes relaxed global serializability solution referencing co work co solution global serializability bridges different concurrency control protocols substantial concurrency reduction typically minor maintains autonomy local dbmss evidently also co misunderstood misunderstanding continues 2010 textbook authors relaxed global serializability technique two level serializability emphasized described detail co mentioned hand following quotation co appears 2009 book characteristics properties co solution discussed several solutions partial proposed global serializability problem among problem global serializability quite intensively researched subject late 1980s early 1990s commitment ordering co provided effective general solution problem insight understanding possible generalizations strong strict two phase locking ss2pl practically almost exclusively utilized conjunction two-phase commit protocol 2pc since 1980s achieve global serializability across databases important side-benefit co automatic global deadlock resolution provides applicable also distributed ss2pl though global deadlocks important research subject ss2pl automatic resolution overlooked except co articles today 2009 time quite many commercial database system types existed many non-relational databases relatively small multi database systems considered key database scalability database systems interoperability global serializability urgently needed since tremendous progress computing power storage communication networks resulted orders magnitude increases centralized databases sizes transaction rates remote access database capabilities well blurring boundaries centralized computing distributed one fast low-latency local networks e.g. infiniband together progress database vendors distributed solutions primarily popular ss2pl 2pc based de facto standard allows interoperability among different vendors ss2pl-based databases ss2pl 2pc technologies gained substantial expertise efficiency workflow management systems database replication technology cases provided satisfactory sometimes better information technology solutions without multi database atomic distributed transactions databases different concurrency control bypassing problem result sense urgency existed problem period general high-performance distributed atomic transactions databases different concurrency control types reduced however need concurrent distributed atomic transactions fundamental element reliability exists distributed systems also beyond database systems need global serializability fundamental correctness criterion transactional systems see also distributed serializability serializability proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones sophisticated systems management need effective global serializability techniques ensure correctness among distributed transactional applications seems increase thus also need commitment ordering including popular databases special case ss2pl ss2pl though meet requirements many transactional objects commitment ordering commit ordering co high-performance fault tolerant conflict serializability providing solution proposed fully distributed central computing component data-structure needed general mechanism combined seamlessly local database concurrency control mechanism see technical summary since co property schedule necessary condition global serializability autonomous databases context concurrency control provides general solution autonomous databases i.e. autonomous databases comply co global serializability may violated seemingly sheer luck co solution possesses many attractive properties overhead incurred co solution locally detecting conflicts already done known serializability mechanism pessimistic optimistic locally ordering database system local commits local transactions voting atomic commitment global transactions overhead low net effect co may delays commit events never delay ss2pl average less makes co instrumental global concurrency control multidatabase systems e.g. federated database systems underlying theory commitment ordering part serializability theory sound elegant even mathematically beautiful referring structure dynamics conflicts graph cycles deadlocks interesting implications transactional distributed applications qualities co list except first three also possessed ss2pl special case co blocking constraining partially explains popularity ss2pl solution practically solution many years achieving global serializability however property 9 automatic resolution global deadlocks noticed ss2pl database research literature today 2009 except co publications since phenomenon voting-deadlocks environments automatic resolution atomic commitment protocol overlooked existing database systems including major commercial database systems strong strict two phase locking ss2pl based already co compliant thus participate co based solution global serializability multidatabase environments without modification except popular multiversioning additional co aspects considered achieving global serializability across ss2pl based databases using atomic commitment primarily using two phase commit 2pc employed many years i.e. using co solution specific special case however reference known prior co notices special case automatic global deadlock resolution atomic commitment protocol augmented-conflict-graph global cycle elimination process virtually existing distributed transaction processing environments supporting products rely ss2pl provide 2pc matter fact ss2pl together 2pc become de facto standard solution homogeneous concurrency control one suboptimal serializability strictness needed see strict commitment ordering sco still quite effective cases sometimes cost increased computing power needed relatively optimum however better performance relaxed serializability used whenever applications allow allows inter-operation among ss2pl-compliant different database system types i.e. allows heterogeneity aspects concurrency control ss2pl constraining schedule property takes combined property example combined optimistic property result optimistic anymore rather characteristically ss2pl hand co change data-access scheduling patterns combined property characteristics remain unchanged since also co uses atomic commitment e.g. 2pc achieving global serializability ss2pl co compliant database system transactional object transparently join existing ss2pl based environments use 2pc maintain global serializability without environment change makes co straightforward natural generalization ss2pl conflict serializability based database system practical purposes commitment ordering quite widely known inside transaction processing databases communities digital equipment corporation dec since 1990 company confidentiality due patenting approach transaction management converging grid computing cloud computing see history commitment ordering techniques developed relaxed global serializability i.e. guarantee global serializability see also relaxing serializability among several publications local database system relaxed serializability methods compromise serializability performance gain utilized application tolerate possible resulting inaccuracies integrity unharmed unclear various proposed relaxed global serializability methods compromise global serializability provide performance gain commitment ordering guarantees global serializability typically declared intention methods performance gain effective global serializability methods apparently unknown inventors rather correctness criteria alternatives due lack known effective global serializability method oddly introduced years co introduced even quote co without realizing provides effective global serializability solution thus without providing performance comparison co justify alternatives global serializability applications e.g. two-level serializability two-level serializability even presented major global concurrency control method 2010 edition text-book databases authored two original authors two-level serializability one avi silberschatz also author original strong recoverability articles book neither mentions co references strangely apparently consider co valid global serializability solution another common reason nowadays global serializability relaxation requirement availability internet products services requirement typically answered large scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo alike global serializability relaxed compromised eventual consistency case relaxation done applications expected harmed classes schedules defined relaxed global serializability properties either contain global serializability class incomparable differentiates techniques relaxed global conflict serializability rgcsr properties relaxed conflict serializability rcsr properties rgcsr typically different way global cycles span two databases global conflict graph handled distinction global local cycles exists rcsr properties rgcsr rcsr contains rgcsr typically rgcsr techniques eliminate local cycles i.e. provide local serializability achieved effectively regular known concurrency control methods however obviously eliminate global cycles would achieve global serializability
Databases
visual risk visual risk treasury management software provider consulting company headquartered sydney australia visual risk part gtreasury software services gtreasury name company provides treasury risk management software specializes market risk management visual risk one australia original fintech companies company treasury software provider visual risk founded richard hughes paul nailand headquartered sydney richard hughes paul nailand currently serve managing directors visual risk december 2015 visual risk best risk management solution treasury management international 2015 awards awards considered benchmark industry april 2018 gtreasury acquired visual risk integrated visual risk risk management software offering bolster existing treasury cash management tool visual risk modular treasury risk management system consists five modules risk analytics asset-liability management treasury management hedge accounting cash liquidity modular system used separately fully integrated system addition visual risk provides reporting dashboard software deployed either locally via cloud 2014 visual risk partnered kpmg australia visual risk analyze kpmg hedging transactions client exposures
Distributed computing architecture
intrusion tolerance intrusion tolerance fault-tolerant design approach defending information systems malicious attack abandoning conventional aim preventing intrusions intrusion tolerance instead calls triggering mechanisms prevent intrusions leading system security failure
Computer security
contra video game according japanese promotional materials contra set distant future year 2633 a.d. evil red falcon organization set base fictional galuga archipelago near new zealand plot wipe humanity two commandos bill rizer lance bean earth marine corp contra unit elite group soldiers specializing guerrilla warfare sent island destroy enemy forces uncover true nature alien entity controlling promotional materials us arcade version downplays futuristic setting game manual later nes home computer versions changing game setting future present day location galuga amazon jungle contra employs variety playing perspectives include standard side view pseudo-3d view player proceeds shooting moving towards background addition left right fixed screen format player gun aimed upwards default two people play simultaneously one player bill blond-haired commando white tank top blue bandanna player lance shirtless dark-haired commando red bandanna controls consists eight-way joystick two action buttons shooting left jumping right one protagonists jumps curls somersault instead conventional jump like games joystick controls player movement walking jumping also aiming side view stages player shoot leftward rightward upward standing well horizontally diagonally running player also shoot eight directions including downwards jumping pressing joystick downwards standing cause character lie stomach allowing avoid enemy fire shoot low targets jump button pressed crouching higher platform player drop lower level player default weapon rifle unlimited ammunition upgraded one four guns obtained destroying pill box sensors flying item capsules containing defeating red-clad guards enemy bases consist machine gun fires rapidly fire button held laser gun shoots powerful beam fireball gun shoots rounds corkscrew pattern spread gun shoots five individual bullets individual directions also two auxiliary power-ups appear certain areas player armed default gun rapid bullets upgrade increases firing speed player shots barrier makes invulnerable limited period exception machine gun laser gun item comes form falcon-shaped symbol marked letter representing function f r b arcade version contra consists seven stages number stages level structures varies later versions first stage side-scrolling level player dropped jungle must fend enemy initial line defense reaching entrance first base must destroy large sensor enter base game switches 3d view second stage player character must fight way series passageways inside base time runs display top screen shows map base time remaining player must destroy generator side passageway order deactivate electric current preventing access third stage set core base fixed screen player must destroy enemy defense system order expose final target giant eyeball shoots fireballs stages 4 6 proceed similarly first three stages stage 4 vertical-scrolling level player must jump way top waterfall reaching entrance second base player must destroy large diamond-shaped sensor guarded defense system order clear stage stage 5 another 3d stage set inside another base stage 6 another boss battle time pair heads split two images heads damaged split images aligned together seventh final stage returns side-scrolling format first stage player fights way enemy final line defense includes hovercraft armored trucks giant helmeted soldiers proceeding areas snowfield energy plant hangar reaching alien lair regular enemy soldiers replaced otherworldly creatures player must fight giant alien head spawns larvae mouth reaching final target heart-like creature must destroyed order complete mission player loses life character bill lance gets touched enemy enemy bullet fails complete base stage time limit falls bottom screen visible platform happens revert default weapon next life losing lives player continue inserting coins necessary pressing start three times second player join-in anytime one player loses lives must wait player loses lives well continue together arcade game released three versions japanese american versions virtually identical aside japanese version using kanji characters spell game title however european version titled gryzor allows two players play game alternating rather simultaneously license konami ocean software produced ports contra title gryzor zx spectrum commodore 64 amstrad cpc released europe 1988 commodore 64 version released north america contra title ocean ports patterned original arcade version game ibm pc version developed banana development inc released north america version released europe gryzor name cover illustration ocean gryzor ports bob wakelin inspired different poses actor arnold schwarzenegger film predator illustration later used packaging nes version well msx2 version contra released nintendo entertainment system north america february 1988 version produced in-house konami features several differences arcade release order better suit nes hardware example sprites effects like explosions shown 30fps instead 60fps work around sprite limitations system another game use technique recca famicom version contains cutscenes additional music track environment effects removed nes version game played one two players due graphical limitations nes bill lance lost individualized character designs instead depicted shirtless commandos distinguished colors pants blue pants first player red pants second one player loses lives given option use player stock keep fighting power-up icons machine gun laser gun also changed represented letter-based falcon symbols l used weapons rapid bullets barrier power-ups also common version since unlike arcade game flying item capsules appear regardless weapon player character currently posseses nes version introduces seventh item clears screen on-screen enemies obtained nes version recomposes 7 stages arcade version 8 stages stages 2 3 combined one stage resulting renumbering waterfall level stage 4 stage 3 stages 5 6 combined new stage 4 final four stages nes version snowfield energy zone hangar alien lair based different areas featured arcade version final stage level designs drastically different arcade version two base stages example stage 2 4 longer maze-like structures time limit involved boss waterfall stage also changed diamond-shaped sensor alien statue contra one early nes games feature konami code inputting code title screen starts player thirty lives instead usual three cheat effect well player runs lives uses continue retry stage contra released famicom japan february 9 1988 gameplay remains identical nes version released around month famicom version custom-made multi-memory controller konami produced called vrc2 contrast unrom board used nes counterpart allowed inclusion cut-scenes graphical effects possible nes version game begins prologue sequence explaining game backstory followed map galuga archipelago shown start every stage indicate player progress cut-scenes also shown stages depicting bill lance giving status report current situation headquarters later stages shooting gun towards screen ending sequence also slightly different player holds select start buttons credits sequence secret message displayed konami logo differences include addition sound test mode added background animations certain stages windblown palm leaves stage 1 snowstorm stage 5 different stage clear jingle player clears final stage level select cheat code probotector modified version nes contra released pal region december 28 1990 version redesigns human protagonists enemy characters give robotic appearance done circumvent bpjm censorship laws germany prohibits sales violent video games minors subsequent contra games home consoles followed suit released pal region probotector title featuring similar modifications beginning konami abandoned probotector title localized games minimal changes msx2 version contra released konami exclusively japan may 26 1989 msx2 version greatly differs arcade nes versions due hardware limitations msx2 game scroll instead uses flip-screens like msx2 games metal gear vampire killer game uses scc sound chip rather one-hit kills energy gauge allows bill rizer take one shot hit losing life two main power-ups msx2 version falcon-shaped power-up increases player walking shooting speed well gun-shaped power-up allows player change current weapon picking weapon power-up player choose default normal gun four weapons spread gun featured version replaced rear gun similar tailgun gradius ii fires two directions time msx2 version contra composed 19 stages stages 1 6 drawn directly arcade version whereas stages 7 9 based different areas featured final stage arcade version matter similar final four stages nes version stages 10 19 new version take place primarily underground facility underneath galuga archipelago unlike arcade nes versions msx2 version single-player lance bean appear form continuation feature player loses lives game immediately however game master ii utility cartridge used save progress via s-ram backup feature much game popularity came two-player simultaneous gameplay uncommon feature video games time contra release successful arcades game became remained widely popular remembered ported nintendo entertainment system 1988 allgame editor skyler miller praised contra touting game became standard future platform shooters would judged japanese gaming magazine famitsu gave famicom nes version game score 27 40 computer gaming world called contra nes truly outstanding action epic set scrolling beautifully drawn playfield ms-dos version game reviewed 1989 dragon hartley patricia kirk lesser role computers column contra voted gaming website ign toughest game beat nintendo power ranked seventh best nes game calling one best multiplayer nes games gamesradar ranked 10th best nes game ever made considering possibly superior arcade version game informer also included list best games ever number 13 staff noted revolutionary fun 2017 contra ranked 82nd scientifically proven best video games time statistical meta-analysis compiled warp zoned 44 top games lists published 1995 2016 contra followed super contra year later contra sequel arcades developed in-house konami following success nes adaptations original sequel retitled super c american release subsequent sequels would produced specifically home console market super nes genesis becoming one konami landmark series series 11 installments music arcade version contra one soundtracks included video game album konami game music vol.4 jax released alfa records may 10 1988 cd catalog 28xa-201 cassette alc-22922 vinyl alr-22922 april 2017 beijing starlit movie tv culture announced producing live-action film version contra china wei nan listed screenwriter project scheduled release june 6 2018 meet release date
Computer architecture
input/output supervisor block input/output supervisor block iosb data structure employed exclusively start input/output interface mvs/370 successor ibm mainframe operating systems iosb describes i/o request passes parameters receives responses input/output supervisor ios iosb always paired service request block srb srb schedules processor activity required available processor connection i/o request although i/o operation may initiated another processor distinction allowed example effective use so-called attached processors processors connected i/o devices common early days mvs/370 installations requirements data processing power e.g. processor accesses also called cpu-bound applications perhaps i/o processing power e.g. disk tape accesses also called i/o-bound applications
Operating systems
nasan nasan clustered file system shared disk file system created company dataplow nasan software enables high-speed access shared files located shared storage area network san -attached storage devices utilizing high-performance scalable data transfers inherent storage area networks manageability network attached storage nas nasan derives name combination network attached storage nas storage area network san nasan clustered file sharing extension traditional lan file sharing yet utilizes storage area networks data transfers deploying nasan cluster entails configuring lan file sharing installing nasan file system software connecting computers storage devices san supports linux solaris operating systems supports san-based block-level storage protocols including fibre channel iscsi
Computer file systems
nano-rk nano-rk wireless sensor networking real-time operating system rtos real-time operating system rtos carnegie mellon university designed run micro-controllers use sensor networks nano-rk supports fixed-priority fully preemptive scheduler fine-grained timing primitives support real-time task sets nano implies rtos small consuming 2 kb ram using 18 kb flash rk short resource kernel resource kernel provides reservations often system resources consumed example task might allowed execute 10 ms every 150 ms cpu reservation node might allowed transmit 10 network packets per minute network reservation reservations form virtual energy budget ensure node meets designed battery lifetime well protecting failed node generating excessive network traffic nano-rk open source written c runs atmel-based firefly sensor networking platform micaz motes well msp430 processor following article discusses tradeoffs associated using rtos sensor networks nanork takes advantage priority-based preemptive scheduling help honor real-time factor deterministic thus ensuring task timeliness synchronization due characteristic limited battery power wireless node nano-rk provides cpu network sensor efficiency use virtual energy reservations labeling system resource kernel energy reservations enforce energy communication budgets minimize negative impact node ’ operational lifetime unintentional errors malicious behavior nodes within network supports packet forwarding routing network scheduling protocols help light-weight wireless networking stack compared current sensor operating systems nano-rk provides rich functionality timeliness scheduling small-footprint embedded resource kernel rk static configuration nano-rk uses static design-time approach energy usage control dynamic task creation disallowed nano-rk requiring application developers set task reservation quotas/priorities static testbed design design allows developers create energy budget task order maintain application requirements well energy efficiency throughout system ’ lifetime using static configuration approach runtime configurations well power requirements predefined verified designer system deployed executed real world approach also helps guarantee stability small-footprint characteristics compared traditional rtoss watchdog timer support watchdog software timer triggers system reset action system hangs crucial faults extended period time watchdog mechanism bring system back nonresponsive state normal operation waiting timer goes subsequently rebooting device nano-rk watchdog timer tied directly processor ’ reset signal reboot error default enabled system boots reset time scheduler executes system fails respond within predefined time period system reboot run initialization instruction sequence hopefully regain control deep sleep mode another feature nano-rk deep sleep mode energy efficiency reasons eligible tasks run system powered given option enter deep sleep mode system deep sleep mode deep sleep timer wake system predefined latency period waking deep sleep mode next context swap time set guarantee cpu wakes time sensor node wish perform deep sleep also presented choice go low energy consumption state still managing peripherals nano-rk implemented double-linked list ready queue nodes within fixed-size array termed ready queue orders ready tasks decreasing order whichever task ’ priorities higher number tasks running within nano-rk implementation statically-configured testbed deployment ready queue size also fixed number tasks ready run fixed-length array named nrk readyq found within nrk defs.h file along two pointers reference two important cells within array free node pointer free node head node pointer head node point next cell array allocated current highest priority task ready run respectively core nano-rk static preemptive real-time scheduler priority-based energy efficient priority-based preemptive scheduling scheduler always selects highest priority task ready queue save energy tasks poll resource rather tasks blocked certain events unlocked events occur task ready queue system powered save energy system working one one task current task signified nrk cur task tcb running predefined period important job scheduler decide task run next long next task run scheduler triggered run
Operating systems
colossus chess colossus chess series chess-playing computer programs developed martin bryant commercially available various home computers 1980s bryant started colossus chess 1983 using white knight mk 11 program winner 1983 european microcomputer chess championship basis developed apple ii first commercially released commodore 64 colossus chess 2.0 cds micro systems 1984 number releases 8-bit microcomputers followed version 3.0 released 1984 atari 8-bit family computers published english software followed 4.0 1985 released formats day published cds per games time acorn electron implementation required part screen memory used working space colossus chess featured time-controlled play game clocks opening book 3,000 positions problem-solving mode could solve normal mates selfmates helpmates pondering opponent time three-dimensional chessboard introduced colossus chess 4.0 releases written assembly language appropriate cpu zx spectrum version could examine average 170 positions per second uncommon microcomputer chess programs era colossus full implementation rules chess including underpromotion fifty-move rule draw repetition draw insufficient material colossus also able execute basic checkmates including difficult bishop knight checkmate program subsequently ported atari st 1988 amiga 1989 ibm pc 1990 title colossus chess x new releases featured four chess sets enhanced graphics developed assistance gary thomlinson carl cropley opening book extended 11,000 positions program ability learn past playing experiences work done colossus chess 1991 2005 martin bryant created completely new freely available windows version conforming universal chess interface written c converted c speed finally publicly released 2006. latest version 2008b info gave colossus chess iv commodore 64 three stars five stating less attractive darn sight playable chessmaster 2000 keyboard joystick controls magazine warned difficulty remembering shifted keyboard control sequences ... badly need quick-reference card
Computer architecture
gnu data language gnu data language gdl free alternative idl interactive data language together library routines gdl developed serve tool data analysis visualization disciplines astronomy geosciences medical imaging gdl licensed gpl open-source numerical data analysis tools similar gdl include gnu octave ncar command language ncl perl data language pdl r scilab scipy yorick gdl language dynamically-typed vectorized object-oriented programming capabilities gdl library routines handle numerical calculations e.g fft data visualisation signal/image processing interaction host os data input/output gdl supports several data formats netcdf hdf v4 v5 grib png tiff dicom graphical output handled x11 postscript svg z-buffer terminals last one allowing output graphics plots saved raster graphics formats gdl features integrated debugging facilities breakpoints gdl python bridge python code called gdl gdl compiled python module gdl uses eigen c++ library numerical library similar intel mkl excellent computing performance multi-cores processors better benchmark idl large matrix operations packaged versions gdl available several linux bsd flavours well mac os x source code compiles microsoft windows since gdl 0.9.3 unix systems including solaris gdl official gnu package
Programming language topics
roxen web server roxen free software web server produced roxen internet software company based linköping sweden named nearby lake roxen released gnu general public license roxen originally appeared spinner mid-1990s written ulpc pike heyday roxen used large companies realnetworks granada media xmission mci roxen many aspects ahead time featuring web-based graphical user interface gui administration interface loadable modules could written several languages including pike later java dynamic content generation comprehensive caching system replication systems multi-headed servers embedded sql server data-heavy server operations well broad support databases roxen built meet needs content creators rxml roxen macro language server-side scripting language integrated roxen language capabilities scripting languages like perl html-like syntax makes familiar content creators many roxen sites developed using mvc pattern notable tags include roxen modules typically provide functionality extending rxml rxml tags contain inline documentation used fill online manual included roxen documentation site every default server installation rxml also provides variable system variables exist within domain scope e.g form fields passed query accessible form.fieldname user defined variables stored var scope unfortunately attempt explain two methods variable instantiation documentation confuses people cases variables referred name also possible instantiate insert value variable anywhere in- out-side tags/markup using xml entity-style markup e.g page.path optionally one specify encoding/escaping instance e.g form.username mysql insert user-submitted value form safely sql database page.path js make variable javascript safe
Web technology
certificate management protocol certificate management protocol cmp internet protocol used obtaining x.509 digital certificates public key infrastructure pki described one two protocols far use certificate request message format crmf described protocol certificate management cms cmc described obsolete version cmp described respective crmf version cmp messages encoded asn.1 using der method usually transported http certificate authority ca issuing legal certificates acts server pki using cmp one clients obtaining digital certificates means protocol called end entity ee none number registration authorities ra used mediate ees ca end entity utilize cmp obtain certificates ca done initial registration/certification key pair update certificate update message sequence means revocation request also get one certificates revoked using cross-certification request ca get certificate signed another ca case end entity lost private key stored ca might recovered requesting key pair recovery several means transportation foreseen conveying cmp messages content-type used application/pkixcmp older versions draft used application/pkixcmp-poll application/x-pkixcmp application/x-pkixcmp-poll
Internet protocols
hyperbola gnu/linux-libre hyperbola gnu/linux-libre operating system i686 x86-64 architectures based arch snapshots debian development includes gnu operating system components linux-libre kernel instead generic linux kernel hyperbola gnu/linux-libre listed free software foundation completely free operating system true free system distribution guidelines hyperbola born 17th annual fórum internacional software livre porto alegre brazil 5 august 2017 support systemd dropped favor openrc default init system support init freedom campaign begun devuan 6 december 2018 hyperbola first brazilian distribution recognized completely free project gnu making part fsf list free distributions hyperbola established social contract hyperbola social contract commits project free software community free culture privacy stability follow arch-based system packaging yet principles stability development maintenance debian covenant included gnu free system distribution guidelines hyperbola established packaging guidelines hyperbola packaging guidelines contain collection common issues severity placed development backporting package releases debian patches hyperbola aliases stable releases using galaxy names codenames chosen list nearest known galaxies milky way ascending order distance stable version hyperbola gets released approximately every three years point releases available every months hyperbola release receive two years extra security updates end life eol however point releases made hyperbola release receive five years security support total two ways install hyperbola gnu/linux-libre either scratch using live images migrating existing arch-based system
Operating systems
jira studio jira studio integrated hosted software development suite developed atlassian software systems jira studio included subversion revision control jira issue tracking bug tracking confluence content management jira agile previously known greenhopper agile planning management bamboo continuous integration crucible code review fisheye source code repository browsing jira studio retired february 2013 atlassian cloud offers saas hosted model integrations plugin capability licensed per product jira studio supported atlassian ide connectors eclipse visual studio intellij idea information jira studio could displayed external systems using opensocial gadgets project information could externally accessed using activity streams programmatic access jira studio provided apis based rest java
Distributed computing architecture
tenex operating system tenex operating system developed 1969 bbn pdp-10 later formed basis digital equipment corporation tops-20 operating system 1960s bbn involved number lisp-based artificial intelligence projects darpa many large era memory requirements one solution problem add paging software lisp language allowing write unused portions memory disk later recall needed one system developed pdp-1 mit daniel murphy joined bbn early dec machines based 18-bit word allowing addresses encode 262-kword memory machines based expensive core memory included nowhere near required amount pager used significant bits address index table blocks magnetic drum acted pager backing store software would fetch pages needed re-write address point proper area ram 1964 dec announced pdp-6 dec still heavily involved mit ai lab many feature requests lisp hackers moved machine 36-bit computing especially useful lisp programming 18-bit address space word storage systems contained two addresses perfect match common lisp car cdr operations bbn became interested buying one ai work became available wanted dec add hardware version murphy pager directly system addition every program system would paging support invisibly making much easier sort programming machine dec initially interested soon 1966 announced fact dropping pdp-6 concentrating solely smaller 18-bit new 16-bit lines pdp-6 expensive complex sold well reasons long became clear dec entering 36-bit business would become pdp-10 bbn started talks dec get paging subsystem new machine known cpu name ka-10 dec terribly interested however one development talks support second virtual memory segment allowing part user address space mapped separate potentially read-only region physical memory additionally dec firm keeping cost machine low possible supporting bare-bones systems minimum 16k words core omitting fast semiconductor register option substituting core cost considerable performance decrease bbn nevertheless went ahead purchase several pdp-10s decided build hardware pager period debate began operating system run new machines strong arguments made continued use tops-10 order keep existing software running minimum effort would require re-write tops support paging system seemed like major problem time tops support number features developers wanted end decided make new system include emulation library would allow run existing tops-10 software minor effort developer team—amongst daniel murphy daniel g. bobrow—chose name tenex ten-extended new system included full virtual memory system—that could programs access full 18 bit address space 262144 words virtual memory every program could time pager system would handle mapping would always copying data backing store needed change needed pager able hold several sets mappings ram store one program using system pager also held access time information order tune performance resulting pager fairly complex filling full-height 19 rackmount chassis one notable feature tenex user-oriented command line interpreter unlike typical systems era tenex deliberately used long command names even included non-significant noise words expand commands clarity instance unix uses codice_1 print list files directory whereas tenex used codice_2 codice_3 command word codice_4 noise added make purpose command clearer relieve users need type long commands tenex used command completion system understood unambiguously abbreviated command words expanded partial command words complete words phrases instance user could type codice_5 escape key point tenex would replace codice_5 full command completion feature also worked file names took effort part interpreter system allowed long file names human-readable descriptions tenex also included command recognition help system typing question mark codice_7 printed list possible matching commands return user command line question mark removed command line completion help live current clis like tcsh tenex became fairly popular small pdp-10 market external pager hardware developed small business early 1970 dec started work upgrade pdp-10 processor ki-10 bbn attempted get dec support complex pager indirect page tables instead dec decided much simpler single-level page mapping system compromise impacted system sales point tenex popular customer-written pdp-10 operating systems would run new faster ki-10s correct problem dec pdp-10 sales manager purchased rights tenex bbn set project port new machine around time murphy moved bbn dec well helping porting project work centered emulating bbn pager hardware combination software ki-10 simpler hardware speed ki-10 compared pdp-6 made possible additionally porting effort required number new device drivers support newer backing store devices used new tenex shipping dec started work kl-10 intended low-cost version ki-10 going stanford university ai programmers many mit alumni working project build pdp-10 ten times faster original ka-10 project evolved foonly line computers dec visited many ideas folded kl-10 project year ibm also announced machine virtual memory making standard requirement computer end kl integrated number major changes system end lower cost start new decsystem-20 would run version tenex default operating system functional upgrades kl-10 processor architecture limited significant new feature called extended addressing modified pager microcode running model b hardware revision enlarge user virtual address space effective address calculations instructions located beyond original 18-bit address space performed 30 significant bits although 23-bit virtual address space supported program code located original 18-bit address space unchanged semantics backward compatibility first in-house code name operating system viros virtual memory operating system customers started asking questions name changed snark dec could truthfully deny project called viros name snark became known name briefly reversed become krans quickly abandoned someone objected krans meant funeral wreath swedish though simply means wreath part story may apocryphal ultimately dec picked tops-20 name operating system tops-20 marketed hacker community mindful origins quickly dubbed twenex portmanteau twenty tenex even though point little original tenex code remained analogously differences v7 unix bsd dec people cringed heard twenex term caught nevertheless written abbreviation 20x also used twenex successful popular fact period early 1980s commanded fervent culture partisans unix its—but dec decision scrap internal rivals vax architecture vms os killed dec-20 put end twenex brief period popularity dec attempted convince tops-20 users convert vms instead late 1980s tops-20 users migrated unix loyal group tops-20 enthusiasts kept working various projects preserve extend tops-20 notably mark crispin panda tops-20 distribution
Operating systems
open handset alliance open handset alliance oha consortium 84 firms develop open standards mobile devices member firms include htc sony dell intel motorola qualcomm texas instruments google samsung electronics lg electronics t-mobile sprint corporation nvidia wind river systems oha established 5 november 2007 led google 34 members including mobile handset makers application developers mobile carriers chip makers android flagship software alliance first developed google 2007 based open-source license competed mobile platforms apple microsoft nokia symbian hp formerly palm samsung electronics intel tizen bada blackberry part efforts promote unified android platform oha members contractually forbidden producing devices based competing forks android time announcement formation open handset alliance november 5 2007 oha also unveiled android open-source mobile phone platform based linux kernel early look sdk released developers 12 november 2007 first commercially available phone running android htc dream also known t-mobile g1 approved federal communications commission fcc 18 august 2008 became available 22 october year members open handset alliance
Operating systems
navicat navicat series graphical database management development software produced premiumsoft cybertech ltd. mysql mariadb mongodb oracle sqlite postgresql microsoft sql server explorer-like graphical user interface supports multiple database connections local remote databases design made meet needs variety audiences database administrators programmers various businesses/companies serve clients share information partners initial version navicat developed 2001 main target initial version simplify management mysql installations 2008 navicat mysql winner hong kong ict 2008 award year best business grand award best business product gold award navicat cross-platform tool works microsoft windows mac os x linux platforms upon purchase users able select language software eleven available languages english french german spanish japanese polish russian portuguese korean simplified chinese traditional chinese supports linux platform via bundled wine officially released march 2002 windows version navicat mysql became first product offered public premiumsoft subsequently company released two additional versions navicat mysql mac os x linux operating system june october 2003 respectively november 2013 added support mariadb premiumsoft continued expand navicat series releasing navicat postgresql windows october 2005 mac os x june 2006 linux version navicat postgresql would released 3 years later august 2009 august 2008 navicat decided continue product line branch oracle community creating navicat oracle windows mac august following year followed version linux platform oracle version navicat supports latest oracle objects features including directory tablespace synonym materialized view trigger sequence type etc navicat sqlite released windows mac os x simultaneously april 2009 linux version soon followed two months later june year april 2010 navicat premium began including navicat sqlite starting version 9 expand usability navicat premium navicat sql server released november 2010 windows platform mac os x also release sql server version included premium version navicat january 2011 support sql azure added navicat mariadb released november 2013 windows mac os x linux also release mariadb version included navicat premium navicat mysql 2018 navicat started support nosql databases mongodb currently newest addition list server navicat supports new line product called navicat mongodb released july 2018 windows mac os x linux provides native environment mongodb management supports extra features like mapreduce gridfs buckets also release mongodb version included navicat premium 2009 premiumsoft released navicat premium series navicat software combines previous navicat versions single version connect different database types including mysql oracle postgresql simultaneously allowing users data migration cross databases navicat premium version also supports cross-platform administration serving windows mac os x linux april 2010 version 9 navicat premium released added connectivity sqlite database navicat premium allowing navicat premium connect mysql oracle postgresql sqlite single application november 2010 support microsoft sql server added january 2011 sql azure included november 2013 added support mariadb july 2018 added support mongodb navicat essentials officially released november 2011 simple navicat version commercial use essentials editions navicat lack several features found standard/enterprise editions including form view record filtering visual query building data modeling options import export backup data etc navicat data modeler windows version officially released march 2012 mac os x linux version released may 2012 june 2012 standalone product developers create data models mysql sql server oracle postgresql sqlite databases navicat data modeler allows users visually design database structures perform reverse/forward engineer process import table structures odbc data sources generate sql files print models files etc june 2015 added support mariadb databases several features model conversion physical/logical/conceptual model types navicat cloud august 2014 premiumsoft released new product navicat ios database administration tool developed ios features included object viewer designer query builder editor navicat cloud server monitor etc mysql supported first release navicat postgresql ios version released january 2015 september 2017 navicat mariadb ios version released navicat cloud cloud service users synchronize connection settings queries models virtual groups multiple platforms devices user share project others collaborating connection settings queries models navicat monitor officially released april 2018 safe simple agentless remote server monitoring tool supports monitor mysql mariadb cloud databases users access navicat monitor anywhere via web browser main features navicat monitor including real-time instance performance monitoring alert notification query analyzer replications monitoring navicat features include differences features available across operating systems navicat also compatible forks mysql drizzle ourdelta percona navicat supports cloud databases like amazon rds amazon aurora amazon redshift sql azure oracle cloud google cloud alibaba cloud navicat community provides flexible environment navicat users post questions share experiences solutions includes forum discussions blog articles tutorial videos wiki faq
Databases
gigaspaces gigaspaces technologies inc. privately held israeli software company established 2000 headquarters located new york city additional offices europe asia gigaspaces founded 2000 nati shalom company cto also co-founder member israeli grid consortium israeli non-profit organization focused grid computing virtualization cloud computing technology gigaspaces initially focused products provide distributed computing extreme transaction processing february 2012 additional open source platform service called cloudify cloud computing technology made generally available established gigaspaces focused application platforms java .net environments based software architecture pattern space-based architecture borrowing concepts jini javaspaces specifications providing linear scalability stateful high-performance applications using tuple space paradigm gigaspaces extreme application platform xap distributed in-memory data-grid suited high performance low-latency transaction processing well real-time analytics use cases xap performance achieved maximizing utilization ram ssd main data store commonly used speed existing database performance scalability include built-in synchronization rdbs mysql well new databases mongodb cassandra etc xap designed serve system record data maintains therefore supports features databases complex queries transaction support etc among main features support wide range data models starting simple key value api advance aggregation object graph sql support flash provides high speed data store device xap uses combination ram flash handle speed cost requirements flash support known xap memoryxtend provides 50x capacity pure ram number machines memcache used side cache read mostly scenarios provides limited query support high availability transaction support etc xap used speed read write operations serves system record xap provides functionality expected database including transactional support new nosql solutions used alternative database traditional rdbms nosql databases use combination eventual consistency scale-out model handle scalability performance xap hand designed address existing database scalability performance fronting database in-memory data-store in-memory data-store provides high speed data access portion data needs includes built-in synchronization nosql rdbms type databases load data upon recovery keep database sync data gets updated architecture perspective lot similarities xap nosql databases use scale-out model handle scalability unlike nosql xap uses highly consistent transactional data access therefore serve high-speed transactional front-end nosql backend databases days xap used complex event processing real-time business intelligence big data xap replicate data relational database non-relational nosql database enabling data replication across remote sites wan disaster recovery also cloud-ready cloudify open source cloud computing platform service started february 2012 gigaspaces technologies inc. cloudify takes advantage underlying infrastructure iaas recipe-based model enable deployment application onto cloud without change application code architecture recipe provides execution plans installing starting orchestrating monitoring application stack gigaspaces also active participant open source projects compass project cloudify adjusts server usage according demand using load balancing middleware cloudify applies devops principle describing aspect production environment code configuration cloudify designed large degree lessons earlier generation paas solution earlier generation solution took cautious decision bind specifically amazon chose java primary language choice lot maturity cloud market time availability tools frameworks since rapid advancement almost every front changed entire landscape starting cloudify 2.2 cloudify supports chef technology deploy configure application services chef provides multi-platform framework configuring operating systems services complements cloudify recipes handling scope intra-machine configurations using chef lifecycle services simplified chef takes care keeping service configurations up-to-date current specifications defined roles cookbooks cloudify partnered ibm infosphere biginsights cloudify enables biginsights run consistently additional big data services nosql databases simplifying systems deployments consistent management well improving cost efficiency cloud enablement portability support cloudify consistent management refers specifically consistent deployment configuration management across stack applies deployment phase also post-deployment including failover scaling upgrades accomplished cloudify built-in recipe mechanism gigaspaces technologies recognized industry technology contributions several times including third place deloitte fast 50 award 2008 finalists venturebeat cloudbeat showdown 2011 crn 20 coolest cloud platforms development vendors 2012 red herring top 100 europe 2012 well 2012 sd times 100 software development superfecta cloud leader
Distributed computing architecture
gnome project gnome project community behind gnome desktop environment software platform upon based consists software developers artists writers translators contributors active users gnome part gnu project august 2000 gnome foundation set deal administrative tasks press interest act contact point companies interested developing gnome software directly involved technical decisions foundation coordinate releases decide projects part gnome membership open anyone made non-trivial contribution project members foundation elect board directors every november candidates positions must members gnome project holds several community programs events usually tailored local users developers main gathering gnome contributors gnome users developers european conference guadec annual conference used discuss development progress gnome idea guadec events attributed gnome developers users paris meeting 1998 annual asian conference called gnome.asia also exists gnome also participated desktop summit joint conference organized gnome kde communities held europe 2009 2011 among project community programs outreachy established goals increasing women participation improving resources available newcomers getting involved gnome gnome project actively collaborates free software projects previous collaboration efforts ordinarily organized project-to-project basis make collaboration broader freedesktop.org project founded project focuses
Operating systems
mitsubishi 740 mitsubishi 740 also known melps 740 series 8-bit cmos microcontrollers microprocessors enhanced mos technology 6502 compatible core based expanded wdc 65c02 ics manufactured mitsubishi electric 1980s 1990s 740 family primarily intended single-chip implementations included optional ram rom eprom on-die additions included variety optional timers input/output lines many features estimated around 600 variations could ordered 2002 mitsubishi hitachi merged chip divisions form renesas technology 2010 nec electronics produce renesas electronics 740 family properly known renesas 740 1984 first 740-series part m50740 appeared 1984 mitsubishi single-chip microcontroller databook manufactured mitsubishi electric research needed determine exact date m50740 announced 1998 reported edn magazine melps 740 family 600 different variations 2002 mitsubishi electric hitachi agreed merge chip operations new 7 billion semiconductor company called renesas technology companies said would move respective semiconductor operations renesas including microcomputer logic analog discrete devices memory flash memory sram etc exception drams renesas technology established april 1 2003 joint venture hitachi 55 mitsubishi electric 45 2009 renesas technology nec electronics reached basic agreement merge april 1 2010 two merged renesas electronics though legacy mitsubishi parts longer manufactured 740 instruction set still alive newer renesas microcontroller series 38000/740 series 7200 series mitsubishi 740 family processor core executes superset 6502 instruction set including many extensions added 65c02 core set new instructions common across 740 family members plus instructions exist specific parts major change 740 family compared 65c02 addition new processor status flag formerly unused bit 6 set 1 x register acted zero page address second operand instructions using zero page addressing allowed program select location zero page act sort second accumulator setting x register point removing address instruction format instance 6502 codice_1 adds contents zero-page memory location addr value accumulator using reduced single byte codice_2 improves code density avoids memory cycle needed read address value flag set cleared using new codice_3 codice_4 instructions members 740 family addresses 0008 0039 zero page set aside special function registers sfr used control various add-ons like built-in i/o ports timers members family also include stack page selection bit spsb within sfr spsb clear set 0 stack relocated zero page instead normal location page one members 740 family zero page implemented on-die instead external ram using spsb allows programs working system entirely single chip appropriate roms many members 740 family include on-dye rom eprom well allowing complete single-chip implementations small programs like device drivers since stack grows downward top page 00ff case requires upper portion page left otherwise unused provide space stack following list new instructions existing instructions new modes 740 family parts w65c02 others apply 740 family w65c02 opposed original 65c02 added several new instructions originally designed rockwell semiconductor included instructions set clear referred reset clear single bits memory well instructions branch bits set clear retained 740 family however w65c02 also included test-and-set/reset instructions tested bit set clear setting z flag appropriately either setting clearing bit useful waiting certain flags appear resetting handling flag instructions included 740 additionally original 65c02 codice_5 single-instruction store zero retained functionality partially replaced ldm w65c02 also added several new instructions low-power operation may may available members 740 series following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts following instructions available m50752 m50757 m50758 parts following instructions available m37450 parts following instructions available m50740a m50740asp m50741 m50752 m50757 m50758 parts parts n't internal eeprom rom thus require external eeprom rom hold firmware parts pins top package allow eprom plugged parts expensive primarily used development purposes parts internal eprom memory available either otp one-time programmable eprom eraseable window eprom commercial temperature extended temperature m50734 rom/ram-less device includes peripherals uart serial i/o a/d watchdog timer vcu 32 parallel i/o ports choice 8 16-bit timers manage real time tasks instruction set superset 6502 microprocessor incorporated particular ic following m50734sp/fp m50734sp/fp-10 unique cmos lsi microprocessor uart clocked serial i/o a-d converter vcu watchdog timer 32-bit parallel i/o arranged around m5040 cpu core since m50734 multiple internal timers real-time control ideal controlling office automation equipment printers typewriters plotters copy machines fax handy word processors use cmos process enables low power consumption making m50734sp also suitable applications battery-powered operation required difference m50734sp m50734fp m50734sp-10 m50734fp-10 lies package difference m50734sp/fp m50734sp/fp-10 lies maximum clock frequency 1990s clone m50959 manufactured russia designation kf1869ve1
Computer architecture
banana pi banana pi line low-cost credit card-sized single-board computers produced chinese company shenzhen sinovoip co. ltd hardware design banana pi computers influenced raspberry pi banana pi compatible raspberry pi boards banana pi also run netbsd android ubuntu debian arch linux raspbian operating systems though cpu complies requirements debian codice_1 port uses allwinner soc system chip mostly covered linux-sunxi port banana pi open-source hardware software platform designed assist banana-pi.org banana pi bpi-m1 business card-sized low-power single-board computer featuring high performance allwinner dual-core soc 1 ghz 1gb ddr3 sdram gigabit ethernet sata usb hdmi connections run variety operating systems including android lubuntu ubuntu debian raspbian key features bpi official wiki banana pi bpi-m1 wiki page br neither banana pi shenzhen sinovoip co. ltd. direct relationship raspberry pi foundation though similarities clear linux user developer consider direct clone considerable evolution whilst linux.com similarly sees clone improved performance board layout similar raspberry pi board though 10 larger relative spacing connectors varies raspberry pi accessories fit result banana bpi-m1+ credit-card-sized low-power single-board computer note banana pi bpi-m2+ released april 2016 allwinner h3 soc quad-core cpu on-board wifi module runs android debian ubuntu raspbian images raspberry pi banana pi pbi-m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram 8gb emmc flash board sdio wifi module board note banana pi bpi-m2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512m ddr3 sdram usb wifi bluetooth mini hdmi bpi-m2 zero size raspberry pi zero w use raspberry pi zero w case key features banana pi gpio headers raspberry pi 1 model b seen banana pi bpi-p2 zero low-power single-board computer featuring high-performance allwinner quad-core soc 1.2 ghz 512 mb ddr3 sdram usb wifi bluetooth mini hdmi key features 3 differences bpi-m2 zero rest hardware design bpi-m2 zero software banana pi bpi-m2 ultra bpi-m2u open source hardware platform uses allwinner r40 system-on-chip supports wifi+bt board supports sata interface board banana pi pbi-m2 ultra hardware quad core arm cortex a7 armv7 cpu 2gb ddr3 sdram 8g emmc flash board gigabit ethernet port built-in 3.7v li-ion battery charging circuit run android smoothly supports 1080p video 40 pin gpio header pin-compatible raspberry pi note banana pi bpi-m2 berry bpi-m2b open source hardware platform uses allwinner v40 system-on-chip supports wi-fi bluetooth board banana pi m2 berry hardware 32 bit quad core arm cortex a7 1.2 ghz cpu 1gb ddr3 sdram emmc gigabit ethernet port banana pi m2 berry series run android debian ubuntu raspbian os run android smoothly resolution hd gpu needed since r40 v40 chips pin-to-pin compatible swapped bpi-m2 ultra bpi-m2 berry versions resulting two hybrid products note banana pi bpi-m2 magic bpi-m2m single-board computer designed internet-of-things applications uses allwinner r16 system chip also use allwinner a33 chip board used home entertainment home automation high wireless performance etc br note banana pi m3 open source hardware platform octa-core version banana pi supports onboard wi-fi sata port banana pi m3 able run android 5.1.1 debian ubuntu raspberry pi os banana pi m3 hardware 2ghz arm7 octa-core processor 2gb lpddr3 sdram gigabit ethernet port gpio compatible raspberry pi b+ note banana pi bpi-m4 uses realtek rtd1395 system chip features 1 gb ram 8 gb emmc also onboard wifi b/g/n/ac bt 4.2 ports side bpi-m4 4 usb 2.0 ports 1 usb type c port 1 hdmi port 1 audio jack supports m.2 key e pcie 2.0 interface rtd1395 equipped high-performance quad-core cpu arm cortex-a53 512k l2 cache embedded rtd1395 also integrates arm mali-470 graphic processing unit gpu accelerate 2d 3d graphics processing acceleration osd 2k user interface built-in streaming engine rtd1395 provides commonly used drawing functions cpu dedicated applications functions rtd1395 dedicated manipulating decoding video streams vaious formats.e.g decoding 4kx2k h.265 full hd mpeg1/2/4/h.264/h.264 mvc avc/vc-1 vp8 vp9 avs avs plus hd jpeg etc video dsp also handle encoding full hd h.264 format video decoding encoding run simultaneously note note banana pi bpi-f2 uses freescale i.mx6 system chip i.mx6 arm cortex-a9 mpcore 4×cpu processor trustzone ths first banana pi board design freescale soc note banana pi bpi-s64 core uses actions s700 system chip s700 soc arm cortex-a53 quad-core cpu mali450 mp4 gpu bpi-s64 core 2gb lpddr3 8g emmc flash board bpi-s64 core modules small enough fit kinds hardware addition s64 core also provides i/o boards gpio ports well usb microusb csi dsi hdmi microsd many interfaces note banana pi r1 300mbit/s wireless 802.11n router wired wireless network connections designed specifically smart home networking use 2t2r mimo technology two detachable antennas r1 dual core system runs smoothly android 4.2.2 gigabit ethernet port sata socket supports games 1080p high definition video output note banana pi bpi-r2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-r2 integrates quad-code arm cortex-a7 mpcore operating 1.3 ghz router also includes variety peripherals including hdmi tx mipi dsi pcie2.0 usb2.0 otg usb3.0 port sata port,5 gbit/s port gigabit ethernet port 802.11a/b/g/n wifi bt4.1 board also supports 802.11ac/n wlan connection mini pci-e port bpi-r2can run android 5.1 smoothly time entry board work properly known linux distribution size banana pibpi-r2 bpi-r1 easily run games supports 1080p high definition video output note banana pi bpi-r64 highly integrated multimedia network router used high wireless performance home entertainment home automation etc banana pi r64 router based development board run variety open source operating systems including openwrt linux 4 gigabit lan ports 1 gigabit wan ac wifi ap function key features note banana pi bpi-w2 highly integrated multimedia network router used high wireless performance home entertainment home automation etc bpi-w2 integrates quad-core arm cortex-a53 mpcore operating 1.5 ghz router also includes variety peripherals including hdmi rx/tx mini dp pcie2.0 pcie1.1 sdio m.2 interface usb2.0 usb3.0 port sata port,2 gbit/s gigabit ethernet port also supports 802.11ac/n wlan connection thru pci-e port bpi-w2 run android 6.0 smoothly also run openwrt debian raspbian oses size banana pi bpi-w2 bpi-r2 easily run 1080p high-definition video output gpio compatible raspberry pi 3 note bpi-d1 one smallest open-source development boards currently market built-in hd mini camera 36mm w x36mm l weighing 10g claimed much smaller boards comparable features board specially suited mini-cam applications providing high-resolution image quality video still capture 1280x720p video capture rate 30 fps banana pi-d1 designed provide set multimedia tools one small package run external battery source features d1 include hd mini-cam audio sensor microphone cpu gpio wi-fi note banana pi-g1 integrated ieee 802.11 b/g/n wi-fi wireless network ieee 802.15.4 zigbee ieee 802.11-2007 standard bluetooth low energy 4.0 development board three wireless protocols used together exchange different transport protocols wireless protocol supported single-chip soc facilitate internet things iot projects wi-fi uses ti cc3200 high-performance arm cortex-m4 wireless soc internally integrated tcp/ip protocol stack allows simple connection internet using bsd socket zigbee uses ti cc2530 integrates wireless capabilities enhanced 8051 core soc years improvement quite mature stable ti z-stack achieved zigbee 2007/pro use 16 short address use 64-bit long address communication face large local interconnect systems providing advanced security encryption mesh network structure support bluetooth 4.0 ble uses ti cc2540/1 integrated ble stack enhanced 8051 core low-power wireless soc present mobile phones support bluetooth 4.0 wearable device mobile interactive accessories cc2540 easily completed meanwhile bpi g1 also incorporates high-performance stm32 arm cortex-m3 microcontroller help dealing time-consuming data transit three wireless soc coordinated therefore banana pi g1 supports wide range internet things diy wireless projects note powered axp209 power management unit banana pi able output 1.6a means users drive external hdd without extra power supply banana pi board similar cubieboard2 banana pi m2 bpi-m2 credit card-sized low-power single-board computer quad core version banana pi supports board wi-fi banana pi m2 series runs android debian ubuntu raspberry pi images images banana pi m2 hardware 1ghz arm7 quad-core processor 1gb ddr3 sdram gigabit ethernet port banana pi m2 size banana pi m1 supports 1080p video output gpio compatible raspberry pi b+ note banana pi pro credit card-sized low-power single-board computer developed china lemaker team goal promoting stem science technology engineering mathematics education schools like smaller sibling banana pi pro concept heavily influenced raspberry pi however banana pro provides various enhancements prior designs banana pro allwinner a20 system chip soc includes arm cortex-a7 dual-core armv7-a 1 ghz mali-400 mp2 gpu 1gb ddr3 sdram banana pro uses microsd card booting os also includes sata 2.0 interface allow connection hard disk additional storage however boot hard disk differences banana pi include on-board wi-fi 802.11 b/g/n ap6181 integrated composite video audio output 3.5 mm trrs jack makes space 40-pin extension header
Computer architecture
william lutwiniak william lutwiniak november 24 1919 – january 24 1992 american crossword constructor also known work cryptologist national security agency composed total 8,413 puzzles first five thousand composed 1965 1985 hobby lutwiniak born jersey city new jersey lutwiniak began solving crosswords 12 sold first puzzle new york herald-tribune 15 later considered puzzle bit prophetic contained word cryptographical 16 subscription journal american cryptogram association also joined national puzzlers league nom live devil five years followed regular participant aca activities brought attention william friedman friedman invited pursue advanced training cryptography join signal intelligence service lutwiniak february 1 1941 lutwiniak worked arlington hall solomon kullback aftermath attack pearl harbor point became concerned would drafted went munitions building asked colonel harold hayes advice hayes told go particular recruiting station enlist lutwiniak immediately assigned work harold hayes munitions building returned hayes promoted sergeant could skip basic training following october promoted staff sergeant technical sergeant war lutwiniak stopped creating solving crosswords things serious mid-1960s however found margaret farrar crossword copy new york times discovered able solve easily expected subsequently began selling crosswords one early puzzles used cryptic crossword-style cluing center gravity avi fourth july controversial creating lutwiniak words 'big uproar newspaper subsequently print explanation clues meant 1961 headed nsa a5 unit specialized soviet codes later became publisher cryptolog one nsa internal magazines also contributed articles puzzles 1985 joined washington post crossword co-editor sunday magazine became involved crossword culture 1987 attended stanley newman-run crossword tournament baltimore created 15-by-15 puzzle stage 15 minutes based suggestions audience upon retiring national security agency 1981 lutwiniak awarded national intelligence medal achievement 1991 crossw rd magazine named crossword puzzle person year
Computer security
guncon often styled guncon portmanteau gun controller known g-con europe family gun peripherals designed namco playstation consoles original controllers used traditional light gun technology newer controllers use led tracking technology first guncon npc-103 g-con 45 europe sony id sleh-00007 bundled playstation conversion time crisis make gun affordable consumers force feedback feature time crisis arcade gun omitted additional fire button included lieu releasing pedal controller game ducking mechanic second version guncon known guncon 2 npc-106 g-con 2 europe bundled playstation 2 conversion time crisis ii time crisis 3 time crisis 4 came playstation 3 bundled guncon 3 nc-109 g-con 3 europe japan three guncon models also available sale separate accessory outside game bundle prior guncon konami justifier first light gun peripheral playstation games support exception north american localization elemental gearbolt maximum force games support justifier compatible guncon vice versa guncon controller known g-con 45 europe uses cathode ray timing method determine barrel aimed screen trigger pulled features button barrel either side gun buttons b performing function auxiliary in-game control take cover reload time crisis controller released black japan gray eventually orange europe north america controller compatible playstation 2 guncon titles compatible playstation 3 due lack controller ports many games support allow b buttons swapped making comfortable right left-handed players guncon 2 g-con 2 europe features smaller body well rounded shape compared original guncon side buttons b moved rearward position directly trigger two new smaller buttons select start added left side shaft prominent additions second guncon model d-pad back gun barrel c button added bottom gun handle new buttons served open new gameplay opportunities character movement dino stalker ability use two guns time crisis ii gun uses usb connection opposed playstation controller port guncon 1 also hooks video signal console either composite video signal component video controller released black japan blue europe orange north america compatible original playstation titles playstation 3 titles guncon 2 compatible games work older models playstation 3 featuring form hardware-based playstation 2 backwards compatibility guncon 3 utilizes two infrared leds markers placed left right sides screen image sensor muzzle tracks markers reference points determining gun pointing screen opposed guncon guncon 2 compatible crt-based displays guncon 3 supports wide variety display types including lcd plasma guncon 3 features sub-grip mounted underneath barrel extending left side use left hand sub-grip analog stick two shoulder buttons like modern gamepad back end gun barrel another analog stick two buttons b1 b2 underneath another two buttons c1 c2 placed along left side barrel analog sticks allow player play first-person shooting games manual aiming/firing light gun regards appearance japanese guncon 3 controllers feature black coloring though due us toy gun laws us/pal release guncon 3 controllers molded bright orange plastic controller criticized uncomfortable left-handed gamers guncon 2 ps2 games compatible original guncon unless game utilizes extra buttons guncon 2 iguncon ios released july 21 2011 allows players use iphone ipod touch similar fashion guncon time crisis 2nd strike ios exclusive entry time crisis series iguncon along time crisis 2nd strike pulled app store march 2015
Computer architecture
briar software briar open-source software communication technology intended provide secure resilient peer-to-peer communications centralized servers minimal reliance external infrastructure connections made bluetooth wifi internet via tor private communication end-to-end encrypted relevant content stored encrypted form participating devices long term plans project include blogging crisis mapping collaborative document editing initial target audience briar includes activists journalists civil society plans make system simple enough help anyone keep data safe ability function absence internet infrastructure may also make project valuable disaster response aid organisations developers working open humanitarian initiative taarifa ultimately developers aim create system simple use whatsapp secure pgp keeps working somebody breaks internet briar source code published free software distributed terms gplv3 license audited cure53 spoken highly report delivered recommended given second audit development completes
Distributed computing architecture
software-defined protection software-defined protection sdp computer network security architecture methodology combines network security devices defensive protections leverage internal external intelligence sources sdp infrastructure designed modular scalable secure sdp architecture partitions security infrastructure three interconnected layers enforcement layer inspects traffic enforces protection within well-defined network segments control layer generates security policies deploys protections enforcement points management layer orchestrates infrastructure integrates security business processes sdp architecture supports traditional network security access control policy requirements well threat prevention required enterprises implementing technologies mobile computing software-defined networking sdn enforcement layer sdp enables organizations design segmented networks implement physical virtual security enforcement points based upon segmentation execute protection logic prescribed network segments sdp incorporates principal segmentation enforcement layer segmentation divides network compartments different security characteristics based upon segment requirements security controls established threat containment recovery enforcement points platforms executing protections must implemented boundaries segments enforce defined protection logic enforcement points may implemented network security gateways host-based software mobile device applications virtual machines cloud control layer core sdp architecture role generate protections deploy execution appropriate enforcement points within enforcement layer develop appropriate protections control layer relies upon repositories data include knowledge organization information systems access control knowledge data assets classifications data protection knowledge threats threat prevention security solutions commonly implemented within control layer include firewall anti-virus application control threat emulation anti-bot anti-spam email security data loss prevention dlp intrusion prevention systems ips systematic mapping protective controls associated risk segment assets within enforcement layer organizations deliver multi-layer protection attacks management layer serves interface network administrators two layers sdp infrastructure layer supports enterprise segmentation enables definition access data control policies activation threat prevention separately management layer also provides ability delegate management specific administrators work simultaneously management layer provides visibility happening network supports proactive incident response provides intelligence required tailor security controls organization
Computer security
targeted threat targeted threats class malware destined one specific organization industry type crimeware threats particular concern designed capture sensitive information targeted attacks may include threats delivered via smtp e-mail port attacks zero day attack vulnerability exploits phishing messages government organisations targeted sector financial industries second targeted sector likely cybercriminals desire profit confidential sensitive information financial industry infrastructure houses similarly online brokerage accounts also targeted attacks impact targeted attacks far-reaching addition regulatory sanctions imposed hipaa sarbanes-oxley gramm-leach-bliley act laws lead loss revenue focus corporate momentum expose sensitive customer data damage corporate reputations incur potential lawsuits contrast widespread spam attack widely noticed targeted attacks sent limited number organizations crimeware threats tend reported thus elude malware scanners
Computer security
apple help viewer help viewer webkit based html viewer macos aimed displaying help files documentation found /system/library/coreservices/help viewer.app default file extension .help help index files generated help indexer macos applications typically use help viewer display help content rather custom system help viewer implementation mac os x 10.5 leopard found way rob griffiths list leopard criticisms apple changed software standalone application standard window interface one floating window always appears front application windows obscuring interface one seeking help see image although one close minimize help viewer window difficult consult help viewer simultaneously working application short changing size windows fit screen help viewer window also work exposé window management feature mission control os x 10.7 later workaround using defaults command accessible terminal
Operating systems
zenith parsing engine zpe programming environment simply zpe formally zenith parsing engine general purpose compiler parser interpreter yass scripting language designed educational use well simple syntax originally created jamie balfour 2015 replacement another programming language developing time known blackrabbit script zpe yass designed help automation scripts clearing inconsistent syntaxes scripting languages zenithparser powers underlying parsers including csv json xml parsers language interpreted zpe runtime known yass yet another simple syntax several languages influenced yass syntax including c php java javascript vb.net c .net sml python remained largely since version 1.5 zpe programming environment written java making cross-platform side effect certain plugins built-in objects completely written java whilst zpe closed source standard library open-source written yass
Programming language topics
rpr fom real-time platform reference federation object model rpr fom enables linking computer simulations discrete physical entities complex virtual worlds high-level architecture hla federation object model developed distributed simulation applications defense security rpr fom listed nato modelling simulation standards profile amsp-01 rpr fom provides backwards compatibility simulations using distributed interactive simulation dis standard standardized simulation interoperability standards organization siso siso-std-001-2015 standard consists two parts high-level architecture introduced us department defense 1996 rpr fom effort initiated facilitate migration dis hla rpr fom version 1.0 released 1998 supports capabilities dis version ieee 1278.1-1995 dis 5 standard provides fom supporting hla version 1.3 rpr fom version 2.0 released 2015 siso-std-001 rpr fom 2.0 supports capabilities dis version ieee 1278.1a-1998 dis 6 development rpr fom 2.0 started 2000 came halt 2007 resulting widely used draft version 17 work restarted 2012 finalized published standard 2015 standard provides foms supporting following hla versions 1.3 ieee 1516-2000 ieee 1516-2010 “ hla evolved ” modular monolithic formats rpr fom version 3.0 development started 2016 siso dis rpr fom product support group 2018 development handed dedicated product development group goal rpr fom version 3.0 support capabilities dis version ieee 1278.1-2012 dis 7 rpr fom defines information exchanged runtime number fom modules additional supporting modules include foundation module basic data types enumerations module enumerations like types platforms equipment base module commonly used data types generic object classes switches module runtime switches rti rpr fom related number standards
Distributed computing architecture
stmicroelectronics stmicroelectronics french-italian multinational electronics semiconductor manufacturer headquartered geneva switzerland commonly called st europe largest semiconductor chip maker based revenue stmicroelectronics corporate headquarters headquarters emea region based geneva holding company stmicroelectronics n.v. registered amsterdam netherlands company us headquarters coppell texas headquarters asia-pacific region singapore whilst japan korea operations headquartered tokyo company headquarters greater china region shanghai st formed 1987 merger two government-owned semiconductor companies sgs microelettronica società generale semiconduttori italy thomson semiconducteurs semiconductor arm france thomson sgs microelettronica originated 1972 previous merger two companies thomson semiconducteurs created 1982 french government widespread nationalisation industries included time merger company named sgs-thomson took current name may 1998 following thomson ’ sale shares creation st ranked 14th among top 20 semiconductor suppliers sales around us 850 million company participated consolidation semiconductor industry since formation acquisitions including december 8 1994 company completed initial public offering paris new york stock exchanges owner thomson sa sold stake company 1998 company also listed borsa italiana milan 2002 motorola tsmc joined st philips new technology partnership crolles2 alliance created new 12 wafer manufacturing facility located crolles france 2005 st ranked fifth behind intel samsung texas instruments toshiba ahead infineon renesas nec nxp freescale company largest european semiconductors supplier ahead infineon nxp early 2007 nxp formerly philips semiconductors freescale formerly motorola semiconductors decided stop participation crolles2 alliance terms agreement alliance came end december 31 2007 may 22 2007 st intel created joint venture memory application called numonyx new company merged st intel flash memory activities semiconductor market consolidation continued st nxp announcing april 10 2008 creation new joint venture mobile activities st owning 80 new company nxp 20 joint venture began august 20 2008 february 10 2009 st ericsson joint venture bringing together st-nxp wireless ericsson mobile platforms established 2011 st announced creation joint lab sant'anna school advanced studies lab focus research innovation bio-robotics smart systems microelectronics past collaborations sant'anna school advanced studies included dustbot platform integrated self-navigating service robots waste collection st ericsson multinational manufacturer wireless products semiconductors supplying mobile device manufacturers st-ericsson 50/50 joint venture ericsson stmicroelectronics established february 3 2009 dissolved august 2 2013 headquartered geneva switzerland fabless company outsourcing semiconductor manufacturing foundry companies december 31 2014 shareholders following earlier failure stmicroelectronics stayed volatile markets dram pc microprocessors 1994 attempted launch compatible intel 80486 microprocessors partnership american company cyrix model one completed 1995 cyrix m1 microprocessor intended compete intel pentium family achieve success however pc-compatible x86 embedded systems market stpc soc line culminating 486-class stpc atlas reached end-of-life 2008 unlike so-called fabless semiconductor companies stmicroelectronics owns operates semiconductor wafer fabs company owned five 8 inch 200 mm wafer fabs one 12 inch 300 mm wafer fab 2006 production scaled 0.18 µm 0.13 µm 90 nm 65 nm measurements transistor gate length stmicroelectronics also owns back-end plants silicon dies assembled bonded plastic ceramic packages major sites include grenoble one company important r centres employing around 4,000 staff polygone site employs 2200 staff one historical bases company ex sgs historical wafer fab lines closed site hosts headquarters many divisions marketing design industrialization important r center focused silicon software design fab process development crolles site hosts fab originally built common r center submicrometre technologies part 1990 grenoble 92 partnership sgs-thomson cnet r center french telecom company france telecom fab known crolles 1 company first built part 1991 partnership sgs-thomson philips develop new manufacturing technologies crolles 1 opened september 9 1993 gérard longuet french minister industry fab inaugurated french president jacques chirac february 27 2003 includes r center focuses developing new nanometric technology processes 90 nm 32 nm scale using wafers developed crolles 2 alliance alliance stmicroelectronics tsmc nxp semiconductors formerly philips semiconductor freescale formerly motorola semiconductor partnered 2002 develop facility work together process development technologies developed facility also used global semiconductor foundry tsmc taiwan allowing tsmc build products developed crolles behalf alliance partners required foundry capacity new fab construction since 2015 employing around 3,000 staff rousset hosts several division headquarters including smartcards microcontrollers eeprom well several r centers rousset also hosts 8-inch 200 mm fab opened may 15 2000 french prime minister lionel jospin site opened 1979 fab operated eurotechnique joint venture saint-gobain france national semiconductor us rousset sold thomson-csf 1982 part french government 1981-82 nationalization several industries part nationalisation former thomson plant center aix-en-provence operating since 1960s closed staff transferred new rousset site original fab upgraded later fab 1996 shut 1988 small group employees thomson rousset plant including director marc lassus founded start-up company gemalto formerly known gemplus became leader smartcard industry employing 1,500 staff site hosts fab r centers employing 6,000 staff milan facilities match grenoble importance agrate brianza employs around 4000 staff historical base company ex sgs site several fab lines including fab r center castelletto employs 300 400 staff hosts divisions r centers update-2012 numonyx jv intel acquired micron r2 fab agrate previous r 200mm fab currently micron entity catania plant sicily employs 5,000 staff hosts several r centers divisions focusing flash memory technologies well two fabs plant launched 1961 ates supply licensing rca us initially using germanium site two major wafer fabs fab opened april 1997 romano prodi president italian council fab never completed transferred current state numonyx 2008 facility caserta italy manufacture esim sim cards.centre excellence stmicro purposes 2010 st employed 1,500 people kirkop making largest private sector employer country leading exporter 1970 sgs created first assembly back-end plant singapore area toa payoh 1981 sgs decided build wafer fab singapore singapore technical engineers trained italy fab ang mo kio started produce first wafers 1984 converted fab important wafer fab group ang mo kio also hosts design centers site currently employs 6000 staff update-2012 numonyx jv intel acquired micron 2010 amk8 fab 200mm hvm fab currently micron entity amk5 amk6 remains stm entities update-2019 amk8 reacquired stm micron application design support 110 employees divisions mcd phoenix arizona 8 inch 200 mm fab carrollton texas 6 inch 150 mm fab sebaa morocco fab beginning rampdown plans destined close 2010 casablanca morocco site consists two assembly parts bouskoura aïn sebaâ totals around 4000 employees opened 1960s thomson bristol united kingdom site employing well 300 peak 2001/2 ramped approx 150 employees close early 2014 ottawa ontario canada plant approx 450 employees close 2013 end stmicroelectronics involved project produce plastic solar cells employ matrix carbon nanotubes convert photons electrical power
Computer architecture
theano software theano python library optimizing compiler manipulating evaluating mathematical expressions especially matrix-valued ones theano computations expressed using numpy-esque syntax compiled run efficiently either cpu gpu architectures theano open source project primarily developed montreal institute learning algorithms mila université de montréal 28 september 2017 pascal lamblin posted message yoshua bengio head mila major development would cease 1.0 release due competing offerings strong industrial players theano 1.0.0 released 15 november 2017 following code original theano example defines computational graph 2 scalars b type double operation addition creates python function f actual computation import theano theano import tensor tensor.dscalar b tensor.dscalar c b f theano.function b c assert 4.0 == f 1.5 2.5
Programming language topics
daniel b. cid daniel b. cid tech entrepreneur open source developer book author cid founded ossec open source intrusion detection system 2004 led project acquired trend micro third brigade june 16 2008 founded sucuri 2010 web site security company served chief technology officer acquired godaddy mar 22 2017 cid wrote host-based intrusion detection guide book cid also founder cleanbrowsing dns filter advisor alienvault
Computer security
google wave federation protocol wave federation protocol formerly google wave federation protocol open protocol extension extensible messaging presence protocol xmpp used apache wave designed near real-time communication computer supported cooperative work wave servers still currently development wave federation protocol open protocol intended parallel openness email protocol waves may succeed email dominant form internet communication since protocol open anyone become wave provider share waves others like email communication possible regardless provider instance organizations operate wave providers members individual run private wave server single user family members internet service provider run wave service another internet service users supplement email im ftp etc model google wave one many wave providers java source code google wave federation prototype server released mercurial repository july 2009 apache license 2.0 features extensible messaging presence protocol inherited wave federation protocol discovery ip addresses port numbers using domain name system dns srv records tls authentication encryption connections xmpp transport encrypts operations transport level provides cryptographic security servers connected directly additional layer cryptography provides end-to-end authentication wave providers using cryptographic signatures certificates allowing wavelet providers verify properties operation therefore downstream wave provider verify wave provider spoofing wavelet operations able falsely claim wavelet operation originated user another wave provider originated different context addresses situation two users different trustworthy wave providers participants wavelet hosted malicious provider protocol requires participant sign user operations certificate signatures operations forwarded host evaluated participants stop malicious hosts altering spoofing contents messages user services signatures verifications done wave providers client software end users waves wavelets child waves identified globally unique wave id domain name id string domain name identifies wave provider wave originated waves wavelets hosted wave provider creator wavelets wave hosted different wave providers however user data federated i.e. shared wave providers private reply wavelets also possible participants knowledge access private wavelet sent users wave provider federated regardless parent wave hosted wave provider operates wave service one networked servers central pieces wave service wave store stores wavelet operations wave server resolves wavelet operations operational transformation writes reads wavelet operations wave store typically wave service serves waves users wave provider connect wave service frontend purpose federation wave service shares waves participants providers communicating wave provider servers copies wavelets distributed wave providers participants given wavelet copies wavelet particular provider either local remote use term refer two types wavelet copies cases referring wavelet copy wavelet wave view contain local remote wavelet copies simultaneously originating wave server responsible hosting processing wavelet operations submitted local participants remote participants wave providers wave server performs concurrency control ordering submitted wavelet operations relative using operational transformation also validates operations applying local wavelet remote wavelets hosted providers cached updated wavelet operations local provider gets remote host local participant submits wavelet operation remote wavelet wave server forwards operation wave server hosting provider transformed applied operation echoed back applied cached copy wave services use federation gateways federation proxy components communicate share waves wave providers federation gateways communicate local wavelet operations push new local wavelet operations remote wave providers participants fulfill requests old wavelet operations process wavelet operations submission requests federation proxy communicates remote wavelet operations component wave provider communicates federation gateway remote providers receives new wavelet operations pushed providers requests old wavelet operations submits wavelet operations providers
Internet protocols
control system security control system security prevention intentional unintentional interference proper operation industrial automation control systems control systems manage essential services including electricity petroleum production water transportation manufacturing communications rely computers networks operating systems applications programmable controllers could contain security vulnerabilities 2010 discovery stuxnet worm demonstrated vulnerability systems cyber incidents united states governments passed cyber-security regulations requiring enhanced protection control systems operating critical infrastructure control system security known several names scada security pcn security industrial network security control system cyber security insecurity vulnerabilities inherent industrial automation control systems iacs lead severe consequences categories safety loss life personal injury environmental impact lost production equipment damage information theft company image guidance assess evaluate mitigate potential risks provided application many governmental regulatory industry documents global standards addressed industrial automation control systems become far vulnerable security incidents due following trends occurred last 10 15 years cyber threats attack strategies automation systems changing rapidly fortunately regulation control system security rare regulation slow moving process united states example nuclear power chemical industries u.s. government computer emergency readiness team us-cert originally instituted control systems security program cssp national cybersecurity communications integration center nccic industrial control systems made available large set free national institute standards technology nist standards documents regarding control system security isa/iec-62443 series standards technical reports related information define procedures implementing electronically secure industrial automation control systems iacs guidance applies end-users i.e asset owner system integrators security practitioners control systems manufacturers responsible manufacturing designing implementing managing industrial automation control systems documents originally referred ansi/isa-99 isa99 standards created international society automation isa 99 committee accredited publicly released american national standards institute ansi documents 2010 renumbered ansi/isa-62443 series change intended align isa ansi document numbering corresponding international electrotechnical commission iec standards isa work products numbered using convention “ isa-62443-x-y ” previous isa99 nomenclature maintained continuity purposes isa99 remains name industrial automation control system security committee isa since 2002 committee developing multi-part series standards technical reports subject iacs security work products submitted isa approval publishing ansi also submitted iec consideration standards specifications iec 62443 series following iec standards development process iec-62443 cybersecurity standards result iec standards creation process ansi/isa-62443 proposals submitted country committees review done comments regarding changes submitted comments reviewed various iec 62443 committees comments discussed changes made agreed upon many members iec committees persons isa s99 committees date fundamental concepts original ansi/isa 62443 documents utilized standards used practitioners several industries design evaluate automation systems cybersecurity resilience several standards used personnel engineering process product system cybersecurity certification programs also called conformity assessment programs certifications awarded accredited certification bodies cb operate following iso/iec 17065 iso/iec 17025 certification bodies accredited perform auditing assessment testing work accreditation body ab often one national ab country abs operate per requirements iso/iec 17011 standard contains requirements competence consistency impartiality accreditation bodies accrediting conformity assessment bodies abs typically members international accreditation forum iaf work management systems products services personnel accreditation international laboratory accreditation cooperation ilac laboratory accreditation multilateral recognition arrangement mla abs ensure global recognition accredited cbs isci created first conformity assessment scheme commonly known certification scheme isa s99 iacs cybersecurity standards program certifies commercial off-the-shelf cots iacs products systems addressing securing iacs supply chain exida united states first organization accredited isci scheme american national standards institute ansi followed control systems security center – certification laboratory cssc-cl accredited japan accreditation board jab tüv rheinland accredited deutsche akkreditierungsstelle dakks ab organizations members iaf two cots product certifications available isasecure® brand isasecure-csa component security assurance certifying automation products 62443-4-1 62443-4-2 iacs cybersecurity standards isasecure-ssa system security assurance certifying iacs systems iec 62443-3-3 standard third certification sdla secure development lifecycle assurance available isci certifies iacs development organizations 62443-4-1 cybersecurity standard providing assurances supplier organization institutionalized cybersecurity product development practices isasecure 62443 conformity assessment scheme iso 17065 program whose labs certification bodies cb independently accredited ansi/anab jab global iso 17011 accreditation bodies ab certification labs must also meet iso 17025 lab accreditation requirements ensure consistent application certification requirements recognized tools mutual recognition arrangements mra iaf ilac others accreditation isasecure labs isa 17011 accreditation bodies ensures certificates issued isasecure labs globally recognized isasecure scheme includes process recognizing test tools ensure tools meet functional requirements necessary sufficient execute required product tests test results consistent among recognized tools isci development processes include maintenance policies ensure isasecure certifications remain alignment iec 62443 standards evolve iec 62443 standards designed horizontally address technical cybersecurity requirements cross-section industries isasecure scheme ’ certification requirements working groups include subject matter experts chemical oil gas industries reflective cybersecurity needs isci published 2017 study confirmed applicability iec 62443 standards isasecure certification building management systems resulting study executive summary ppt available free download www.isasecure.org website isci added leading bms suppliers membership established bms working group support ongoing expansion isasecure certifications bms iec 62443 certification schemes also established several global certification bodies defined scheme based upon referenced standards procedures programs offered globally several recognized cbs including exida tüv rheinland tüv sud tüv nord sgs-tüv saar
Computer security
turnkey linux virtual appliance library turnkey linux virtual appliance library free open source project developed range debian-based pre-packaged server software appliances a.k.a virtual appliances turnkey appliances deployed virtual machine range hypervisors supported cloud computing infrastructures including aws others installed physical computers project currently maintains around 100 virtual appliances freely licensed ready-to-use solution optimized ease use daily automatic security updates full backup capabilities built appliance designed work little configuration required packaged several formats optimized several different virtualization platforms addition two separate builds installing onto physical media non-virtualized hard disk usb hybrid iso onto amazon ec2 cloud pre-integrated server applications include lamp wordpress joomla drupal redmine mysql mediawiki domain controller file server ruby rails phpbb many others founded engineers israeli startup project conceived mid-2008 community-oriented open source project would focus helping users piece together turnkey solutions open source components largest linux distributions according one turnkey linux co-founders project part inspired desire provide open source alternatives proprietary virtual appliance vendors would aligned user interests could engage community project launched september 2008 three prototype appliances drupal joomla lamp based ubuntu 8.04.1 build following months usability improved dozen additional appliances released including ruby rails mediawiki django october 2009 project released 40 appliances based ubuntu 8.04.3 including 25 new additions virtual appliance library release included support amazon elastic compute cloud new virtual machine image format ovf support turnkey linux listed winner 2009 bossies infoworld one top 40 open source products year september 2010 official unveiling tklbam turnkey linux backup migration took place blog post describing goal ideal backup system according liraz siri many features described author along videos demonstrate functionality backup system november 2010 additions tklbam announced including integration webmin discussed future feature original unveiling tklbam turnkey linux nominated sourceforge february 2012 project month august 2012 version 12.0 released library increased include 100 appliances release also marked move away ubuntu underlying operating system debian 6.0 a.k.a squeeze move cited various reasons particularly security early june 2013 saw significant change tack version 12.1 update release built new tkldev open build infrastructure release also included first x86-64 builds later month turnkey linux custom application code moved github also included tracker appliances bug reports promised mid july turnkey linux released image building appliance tkldev well additional separate github account house appliance specific code used tkldev build appliances november 2013 saw release v13.0 based debian 7.2 a.k.a wheezy september 2015 saw long overdue release v14.0 based debian 8.2 a.k.a jessie followed april 2016 maintenance release v. 14.1 based debian 8.4 turnkey virtual appliances start life stripped debian bootstrap versions previous v12.0 based ubuntu added turnkey core includes common features project virtual appliances including turnkey core footprint approximately 110 mb available separate download application software installed top core typically increases size virtual appliance approximately 160 mb downloading installing appliance package hard drive intended developers administrators would gain easy method setting dedicated server new software appliances customised appliances developed forking appropriate appliance build code github built using tkldev additionally appliances also customized extended using tklpatch simple appliance modification mechanism turnkey linux run virtual machine virtualbox vmware although former described provided documentation
Computer architecture
ucsd pascal ucsd pascal pascal programming language system runs ucsd p-system portable highly machine-independent operating system ucsd pascal first released 1977 developed university california san diego ucsd 1977 university california san diego ucsd institute information systems developed ucsd pascal provide students common environment could run available microcomputers well campus dec pdp-11 minicomputers operating system became known ucsd p-system ucsd p-system one three operating systems along pc dos cp/m-86 ibm offered original ibm pc vendor softech microsystems emphasized p-system application portability virtual machines 20 cpus ibm pc release predicted users would able use applications purchased future computers running p-system advertisements called universal operating system pc magazine denounced ucsd p-system ibm pc stating review context mba written language simply produce good code p-system sell well ibm pc lack applications expensive choices previously ibm offered ucsd p-system option displaywriter 8086-based dedicated word processing machine confused ibm displaywrite word processing software displaywriter native operating system developed completely internally opened end-user programming notable extensions standard pascal include separately compilable units string type extensions influenced design ada language intrinsics provided accelerate string processing e.g scanning array particular search pattern language extensions provided allow ucsd p-system self-compiling self-hosted ucsd pascal based p-code machine architecture contribution early virtual machines extend p-code away roots compiler intermediate language full execution environment ucsd pascal p-machine optimized new small microcomputers addressing restricted 16-bit 64 kb memory james gosling cites ucsd pascal key influence along smalltalk virtual machine design java virtual machine ucsd p-system achieved machine independence defining virtual machine called p-machine pseudo-machine many users began call pascal-machine like os—although ucsd documentation always used pseudo-machine instruction set called p-code pseudo-code urs ammann student niklaus wirth originally presented p-code phd thesis ucsd implementation derived zurich pascal-p implementation ucsd implementation changed zurich implementation byte oriented ucsd p-code optimized execution pascal programming language hardware platform needed p-code interpreter program written port entire p-system tools run later versions also included additional languages compiled p-code base example apple computer offered fortran compiler written silicon valley software sunnyvale california producing p-code ran apple version p-system later telesoft also located san diego offered early ada development environment used p-code therefore able run number hardware platforms including motorola 68000 system/370 pascal microengine ucsd p-system shares concepts current java platform use virtual machine hide operating system hardware differences use programs written virtual machine provide cross-platform support likewise systems allow virtual machine used either complete operating system target computer run box another operating system ucsd pascal compiler distributed part portable operating system p-system ucsd p-system began around 1974 idea ucsd kenneth bowles believed number new computing platforms coming time would make difficult new programming languages gain acceptance based ucsd pascal pascal-p2 release portable compiler zurich particularly interested pascal language teach programming ucsd introduced two features important improvements original pascal variable length strings units independently compiled code idea included then-evolving ada programming language niklaus wirth credits p-system ucsd pascal particular popularizing pascal release turbo pascal ucsd version started slip first place among pascal users pascal dialect ucsd pascal came subset pascal implemented pascal-p2 designed full implementation language rather minimum subset would self-compile fit function bootstrap kit pascal compilers ucsd added strings basic several implementation dependent features although ucsd pascal later obtained many features full pascal language pascal-p2 subset persisted dialects notably borland pascal copied much ucsd dialect four versions ucsd p-code engine several revisions p-system ucsd pascal revision p-code engine i.e. p-machine meant change p-code language therefore compiled code portable different p-machine versions revision represented leading roman numeral operating system revisions enumerated dot number following p-code roman numeral example ii.3 represented third revision p-system running second revision p-machine original version never officially distributed outside university california san diego however pascal sources versions i.3 i.5 freely exchanged interested users specifically patch revision i.5a known one stable widely distributed available many early microcomputers numerous versions included apple ii dec pdp-11 zilog z80 mos 6502 based machines motorola 68000 ibm pc version ii pc restricted one 64k code segment one 64k stack/heap data segment version iv removed code segment limit cost lot br project members era include dr kenneth l bowles mark allen richard gleaves richard kaufmann pete lawrence joel mccormack mark overgaard keith shillington roger sumner john van zandt custom version written western digital run pascal microengine microcomputer included support parallel processes first time commercial version developed sold softech based version ii include changes version iii sell well due combination pricing structure performance problems due p-code interpreter competition native operating systems top often ran softech dropped product picked pecan systems relatively small company formed p-system users fans sales revived somewhat due mostly pecan reasonable pricing structure p-system ucsd pascal gradually lost market native operating systems compilers available ti-99/4a equipped p-code card commodore pet corvus systems computer used ucsd pascal user software innovative concept constellation os run pascal interpretively compiled include common software manual users could modify needed using open source default era
Operating systems
chipmunk basic chipmunk basic freeware version basic programming language maintained developer ron nicholson chipmunk basic originally developed apple macintosh ported linux windows windowed macintosh version includes wide variety graphics drawing commands also object-oriented capabilities current version chipmunk basic spinoff products palm os cbaspad hotpaw basic based public domain pascal implementation david gillespie author pascal translation tool p2c january 2015 cocoa version released may lack features older carbon-based os x port
Programming language topics
user datagram protocol computer networking user datagram protocol udp one core members internet protocol suite protocol designed david p. reed 1980 formally defined udp computer applications send messages case referred datagrams hosts internet protocol ip network prior communications required order set communication channels data paths udp uses simple connectionless communication model minimum protocol mechanisms udp provides checksums data integrity port numbers addressing different functions source destination datagram handshaking dialogues thus exposes user program unreliability underlying network guarantee delivery ordering duplicate protection error-correction facilities needed network interface level application may use transmission control protocol tcp stream control transmission protocol sctp designed purpose udp suitable purposes error checking correction either necessary performed application udp avoids overhead processing protocol stack time-sensitive applications often use udp dropping packets preferable waiting packets delayed due retransmission may option real-time system udp simple message-oriented transport layer protocol documented although udp provides integrity verification via checksum header payload provides guarantees upper layer protocol message delivery udp layer retains state udp messages sent reason udp sometimes referred unreliable datagram protocol transmission reliability desired must implemented user application number udp attributes make especially suited certain applications applications use datagram sockets establish host-to-host communications application binds socket endpoint data transmission combination ip address port way udp provides application multiplexing port software structure identified port number 16 bit integer value allowing port numbers 0 65535 port 0 reserved permissible source port value sending process expect messages response internet assigned numbers authority iana divided port numbers three ranges port numbers 0 1023 used common well-known services unix-like operating systems using one ports requires superuser operating permission port numbers 1024 49151 registered ports used iana-registered services ports 49152 65535 dynamic ports officially designated specific service may used purpose may also used ephemeral ports software running host may use dynamically create communications endpoints needed udp header consists 4 fields 2 bytes 16 bits use checksum source port fields optional ipv4 pink background table ipv6 source port field optional method used compute checksum defined words 16-bit words summed using one complement arithmetic add 16-bit values addition carry-out 17th bit produced swing 17th carry bit around add least significant bit running total finally sum one complemented yield value udp checksum field checksum calculation results value zero 16 bits 0 sent one complement 1s zero-value checksum indicates checksum calculated difference ipv4 ipv6 pseudo header used compute checksum checksum optional ipv6 udp runs ipv4 checksum computed using pseudo header contains information real ipv4 header pseudo header real ipv4 header used send ip packet used checksum calculation source destination addresses ipv4 header protocol udp see list ip protocol numbers 17 0x11 udp length field length udp header data field data stands transmitted data udp checksum computation optional ipv4 checksum used set value zero udp runs ipv6 checksum mandatory method used compute changed documented computing checksum pseudo header used mimics real ipv6 header source address one ipv6 header destination address final destination ipv6 packet contain routing header destination address ipv6 header otherwise originating node address last element routing header receiving node destination address ipv6 header value next header field protocol value udp 17 udp length field length udp header data lacking reliability udp applications must generally willing accept loss errors duplication applications tftp may add rudimentary reliability mechanisms application layer needed often udp applications employ reliability mechanisms may even hindered streaming media real-time multiplayer games voice ip voip examples applications often use udp particular applications loss packets usually fatal problem application requires high degree reliability protocol transmission control protocol may used instead voip example latency jitter primary concerns use tcp would cause jitter packets lost tcp provide subsequent data application requesting re-sending missing data using udp end user applications must provide necessary handshaking real time confirmation message received numerous key internet applications use udp including domain name system dns queries must fast consist single request followed single reply packet simple network management protocol snmp routing information protocol rip dynamic host configuration protocol dhcp voice video traffic generally transmitted using udp real-time video audio streaming protocols designed handle occasional lost packets slight degradation quality occurs rather large delays lost packets retransmitted tcp udp run network many businesses finding recent increase udp traffic real-time applications hindering performance applications using tcp point sale accounting database systems tcp detects packet loss throttle back data rate usage since real-time business applications important businesses developing quality service solutions seen crucial vpn systems openvpn may use udp implementing reliable connections error checking application level transmission control protocol connection-oriented protocol means requires handshaking set end-to-end communications connection set user data may sent bi-directionally connection user datagram protocol simpler message-based connectionless protocol connectionless protocols set dedicated end-to-end connection communication achieved transmitting information one direction source destination without verifying readiness state receiver
Internet protocols
sql server notification services sql server notification services platform developed microsoft development deployment notification applications based sql server technology microsoft .net framework notification services offers scalable server engine run notification applications multi-server capability-providing flexibility scalability deploying applications notification services designed ease pain developing deploying notification applications generate personalized timely information subscribers design code test components make robust notification services application-such notification scheduling failure detection retry logic time zone management notification grouping queue management adding notification services software applications daunting task years term notification applications superseded term complex event processing cep idea user defines set rules queries advance push data rules data fit criteria rules action fired example rule may state car speed sensor 100 km/h take photo record otherwise data discarded approach much faster traditional oltp design insert row database constantly polling data see something relevant happened especially suited situations high speed inputs fixed set fairly simple queries may need keep data e.g industries measure voltage current attributes hundreds electric motors conveyor belts 100 times second compare measurement average plant operators alerted sudden change occur sql server notification services one many components comprised microsoft sql server first released microsoft sql server 2000 service pack 2 2003 enhanced release shipped sql server 2005 discontinued removed sql server 2008 although sql server 2005 sp3 allows notification services components run sql server 2008 database engine replaced streaminsight first shipped component sql 2008 r2 streaminsight separate install visible part regular sql server setup programming framework based transact-sql xml provides declarative programming model lends quick prototyping deployment robust notification applications api creating subscription management applications provided plus standard components collecting event data files sql server databases formatting notifications using xslt sending notifications via simple mail transfer protocol smtp writing notifications file standard components meet needs application notification services extendable building custom components using .net family programming languages microsoft visual c .net microsoft visual basic .net finally notification services communicate wide variety microsoft third-party custom-built event providers delivery protocols enabling notification services communicate existing systems heterogeneous environments
Databases
soluto soluto device protection service offered identically named company integrates mobile app web portal proactive communications remote device management one service part premium service soluto enabled users contact premier support technicians soluto offered access via web part soluto pc management platform soluto founded 2008 received 1.6m seed funding proxima ventures followed-up 6.2 million second round financing led bessemer venture partners joined giza venture capital march 2009 2013 soluto acquired asurion llc soluto ceased operation soluto pc management platform april 1 2016 soluto funded index ventures bessemer venture partners giza venture capital proxima ventures crunchfund innovation endeavors initial capital angel investors including chris dixon yuval neeman saar gillai nadav zohar soluto purchased asurion november 12 2013 reported 130 million soluto techcrunch disrupt 2010 soluto named one 2010 alwayson global top private companies lifehacker named soluto one popular free windows downloads 2010 original soluto features listed soluto dashboard 6 sections divided categories technical information user see remote actions user initiate soluto uses downloaded agent transmit data receive data soluto back-end servers data transmitted soluto includes apps running boot enabled browser toolbars add-ons hardware specs specialized form crash reports servers send back agent information solutions recent crashes remote actions initiated user need occur
Distributed computing architecture
job stream non-interactive computer system particularly ibm mainframes job stream jobstream simply job sequence job control language statements jcl data called instream data comprise single unit work operating system term job traditionally means one-off piece work contrasted batch executing steps many inputs non-interactive computation come called batch processing thus unit batch processing often called job oxymoronic term batch job see job details performing job consists executing one programs program execution called job step jobstep step usually related way others job steps job executed sequentially possibly depending results previous steps particularly batch processing term job stream particularly associated mainframes ibm z/os operating system job initiated codice_1 terminated next codice_1 codice_3 statement job step consists one codice_4 statement indicating program executed usually multiple codice_5 statements defining files devices used simple example job stream system print payroll checks might consist following steps performed batch inputs step depends successful completion previous step example incorrect data input first step job might terminate without executing subsequent steps allow payroll department correct data rerun edit errors job run completion manual intervention
Operating systems
lga 1156 lga 1156 also known socket h h1 intel desktop cpu socket lga stands land grid array incompatible successor lga 1155 last processors supporting ceased production 2011 lga 1156 along lga 1366 designed replace lga 775 whereas lga 775 processors connect northbridge using front side bus lga 1156 processors integrate features traditionally located northbridge within processor lga 1156 socket allows following connections made processor rest system lga 1156 lga 1366 sockets processors discontinued sometime 2012 superseded lga 1155 lga 2011 respectively lga 1156 4 holes fastening heatsink motherboard placed square lateral length 75 mm configuration retained later lga 1155 lga 1150 lga 1151 sockets meaning cooling solutions generally interchangeable lga 1156 processors motherboards made date interoperable making possible switch celeron pentium core i3 core i5 integrated graphics core i5 core i7 without graphics however using chip integrated graphics p55 motherboard addition likely requiring bios update allow use on-board graphics processor likewise using chip without integrated graphics h55 h57 q57 motherboard allow use motherboard graphics ports desktop chipsets support lga 1156 intel h55 h57 p55 q57 server chipsets supporting socket intel 3400 3420 3450
Computer architecture
mozilla thunderbird mozilla thunderbird free open-source cross-platform email client news client rss chat client developed mozilla foundation project strategy modeled mozilla firefox web browser installed default ubuntu desktop systems december 7 2004 version 1.0 released received 500,000 downloads first three days release 1,000,000 10 days july 6 2012 mozilla announced company dropping priority thunderbird development continuous effort extend thunderbird feature set mostly fruitless new development model shifted mozilla offering extended support releases deliver security maintenance updates allowing community take development new features december 1 2015 mozilla executive chair mitchell baker announced company-wide memo thunderbird development needs uncoupled firefox referred thunderbird developers spending large efforts responding changes mozilla technologies firefox paying tax support thunderbird development also said believe thunderbird potential industry-wide impact firefox time announced mozilla foundation provide least temporary legal financial home thunderbird project since memo 2015 mozilla brought thunderbird back in-house announcement may 9 2017 continues support development thunderbird development team also expanded adding several new members undergone overhaul security user-interface thunderbird email newsgroup news feed chat xmpp irc twitter client vanilla version originally personal information manager pim although mozilla lightning extension installed default adds pim functionality additional features needed often available via extensions thunderbird manage multiple email newsgroup news feed accounts supports multiple identities within accounts features quick search saved search folders virtual folders advanced message filtering message grouping labels help manage find messages linux-based systems system mail movemail accounts supported thunderbird provides basic support system-specific new email notifications extended advanced notification support using add-on thunderbird incorporates bayesian spam filter whitelist based included address book also understand classifications server-based filters spamassassin extensions allow addition features installation xpinstall modules known xpi zippy installation via add-ons website also features update functionality update extensions thunderbird supports variety themes changing overall look feel packages css image files downloaded via add-ons website mozilla add-ons thunderbird follows industry standards email web feeds e.g news aggregators atom rss thunderbird follows internet protocols evolve example ircv3.1 n't support ircv3.2 usenet news groups offer latest nntps see thunderbird provides mailbox format support using plugins feature yet enabled due related work progress mailbox formats supported thunderbird also uses mork since version 3 mozstorage based sqlite internal database mork due replaced mozstorage thunderbird 3.0 8.0 release still uses mork file format current version seamonkey version 2.14.1 also still uses mork indexes pop imap mail folders least since version 38 thunderbird integrated support automatic linking large files instead attaching directly mail message insert menu provides ability include html code thus one insert subscripts degree symbol ° etc. message composed software may limitations number sizes files objects represented example pop3 folders subject filesystem design limitations maximum file sizes filesystems large file support well possible limitations long filenames issues thunderbird runs variety platforms releases available primary distribution site support following operating systems unofficial ports available old ports may available os/2 ecomstation source code freely available compiled run variety architectures operating systems contributors world client translated 50 different languages although email addresses currently limited ascii local parts thunderbird yet support smtputf8 rfc 6531 email address internationalization thunderbird provides enterprise government-grade security features tls/ssl connections imap smtp servers also offers native support s/mime secure email digital signing message encryption using certificates security features take advantage smartcards installation additional extensions security features may added extensions instance enigmail offers pgp signing encryption decryption optional security protections also include disabling loading remote images within messages enabling specific media types sanitizer disabling javascript french military uses thunderbird contributes security features claimed match requirements nato closed messaging system originally launched minotaur shortly phoenix original name mozilla firefox project failed gain momentum success latter however demand increased mail client go work minotaur revived new name thunderbird migrated new toolkit developed firefox team significant work thunderbird restarted announcement version 1.5 onward main mozilla suite would designed around separate applications using new toolkit contrasts previous all-in-one approach allowing users mix match mozilla applications alternatives original mozilla suite continues developed seamonkey december 23 2004 project lightning announced tightly integrated calendar functionality scheduling tasks etc thunderbird lightning support full range calendar mechanisms protocols supported mozilla calendar infrastructure modern post-0.2 sunbird october 11 2006 qualcomm mozilla foundation announced future versions eudora based upon technology platform open source mozilla thunderbird email program project code-named penelope late 2006 debian rebranded thunderbird icedove due trademark copyright reasons second product rebranded july 26 2007 mozilla foundation announced thunderbird would developed independent organization mozilla corporation subsidiary foundation focusing mozilla firefox development september 17 2007 mozilla foundation announced funding new internet communications initiative dr. david ascher activestate purpose initiative develop internet communications software based thunderbird product code brand february 19 2008 mozilla messaging started operations subsidiary mozilla foundation responsible development email similar communications initial focus upcoming version thunderbird 3 alpha preview releases thunderbird 3 codenamed shredder april 4 2011 mozilla messaging merged mozilla labs group mozilla foundation july 6 2012 confidential memo jb piacentino thunderbird managing director mozilla leaked published techcrunch memo indicated mozilla would moving team project development new features would left community memo slated release july 9 2012 subsequent article executive chair mozilla mitchell baker stated mozilla decision make transition thunderbird new release governance model november 25 2014 kent james volunteer-led thunderbird council announced thunderbird blog active contributors thunderbird gathered mozilla office toronto discussed future application decided staff required working full-time thunderbird thunderbird team release stable reliable product make progress features frequently requested community december 1 2015 mitchell baker suggested company-wide memo thunderbird uncoupled firefox infrastructure referred thunderbird tax firefox said believe thunderbird potential industry-wide impact firefox mozilla remains interested role thunderbird seeking assistance help development may 9 2017 philipp kewisch announced mozilla foundation continue serve legal fiscal home thunderbird project thunderbird migrate mozilla corporation infrastructure separating operational aspects project interim/beta versions thunderbird 57 58 released late 2017 began make changes influenced firefox quantum including new photon user interface despite removal firefox quantum support xul-based legacy add-ons favor webextensions stable/esr release thunderbird 60 mid-2018 continued support although require updates support webextensions except themes 2018 according mozilla work underway planned support thunderbird 63 webextensions continue somewhat support legacy addons thunderbird development releases occur three stages called beta earlybird daily correspond firefox beta aurora nightly stages release dates gecko versions exactly firefox example firefox 7 thunderbird 7 released september 27 2011 based gecko 7.0
Internet protocols
rational multiversion file system computing multiversion file system mvfs virtual file system displays specific versions data stored clearcase particular supports dynamic views show arbitrary combination local remote files
Computer file systems
next megapixel display next megapixel display range crt-based computer monitors manufactured sold next nextcube nextstation workstations designed hartmut esslinger/frog design inc original megapixel display monochrome 17 monitor displaying 4 brightness levels black dark gray light gray white fixed resolution 1120 x 832 92 dpi shy true megapixel 931,840 total pixels 68 hz integrated mono microphone mono speaker stereo rca sockets 3.5mm headphone socket socket keyboard turn provided socket mouse unique feature monitor connected computer single 6 foot cable provided power video signals aforementioned signals severe problem setup monitor could switched completely computer powered screen could switched black cathode heater always remained led extreme screen dimming years use especially computer turned overnight server setup busy software lab problem later rectified ultra rare 4000a model rated 10,000 hours ~14 months display stand allows tilted stand also features two rollers used move monitor back forth despite heavy weight stand also provides place keyboard use freeing real desktop front nextstation color nextdimension board released next sold rebranded color monitors megapixel color display either 17 21 connections provided separate box next soundbox next user reference
Operating systems
international karate international karate fighting game developed published system 3 various home computers 1985 epyx licensed released game united states world karate championship 1986 international karate successor expanded gameplay released 1987 followed unauthorized release international karate gold 2001 core game two-dimensional one-on-one versus fighting game players take roles martial artists competing kumite tournament rather wearing opponent health goal instead score single solid hits hit combat stops combatants returned starting positions depending well players hit opponent score either half-point full point matches quite brief two full points required win point quickly scored seconds round begins single player mode successive opponents increase difficulty novice white belts master black belts play continues long player continues win matches fights bonus mini-games focusing rhythm timing appear including one player must break number stacked boards using fighter head newer games genre starting specifically street fighter fights take place variety backdrops eight total representing different locations world mount fuji tokyo japan sydney harbour sydney australia statue liberty new york usa forbidden city beijing china christ redeemer rio de janeiro brazil palace westminster london england parthenon athens greece great pyramid giza cairo egypt title utilises standard one-button joystick allowing players execute variety karate techniques unlike modern 2d fighting games players turn around opponent behind must instead execute one three turn-around manoeuvres change direction spectrum version used starting point amstrad cpc port another port exists msx platform version atari st home computer created andromeda software released 1986 version featured advanced graphics versions 16 bit hardware supported colors larger sprites port pc published year used 4-color cga graphics release world karate championship us late april 1986 epyx sued competing video game publisher data east infringement copyright trademark trade dress dispute similarities 1984 arcade game karate champ home computer adaptations published 1985 international karate used coloured fighters points system initial trial district court northern district california began 28 october 1986 decision 28 january 1987 court dismissed allegations trademark trade dress infringement found epyx guilty infringing upon data east usa copyright karate champ data east obtained permanent injunction epyx inc. impoundment restrained epyx sale distribution world karate championship epyx required recall customers distributors copies infringing work decision appealed united states court appeals ninth circuit november 1988 reversed decision stating game similar identical one game company monopolise one entire sport result melbourne house sue system 3 epyx game way exploding fist also similar games though game also borrowed heavily data east karate champ computer gaming world called game original karate champ clone best one available ... great scenery adds ambience 2000 game boy color version created without input archer maclean released international karate 2000 sported enhancements basis international karate advanced released 2001 game boy advance c64 version saw re-releases 2004 title c64 direct-to-tv 2008 wii virtual console
Computer architecture
superbase database superbase end-user desktop database program started commodore 64 ported various operating systems course 20 years also generally included programming language automate database-oriented tasks later versions included wysiwyg form report designers well sophisticated programming capabilities originally created 1983 precision software commodore 64 128 later amiga atari st 1989 first database management system run windows computer precision software uk-based company original creator product superbase superbase still used large number people various platforms often used end-user database large number applications built throughout industry government academia often significant complexity applications continue use current day mostly small businesses initial versions text mode release amiga version superbase became first product use common vcr control panel browsing records also supported number different media formats including images sounds video superbase often referred multimedia database early years features uncommon amiga version also featured internal language capability generate front end masks queries reports years microsoft access version huge success resulted version created number platforms using approach eventually microsoft windows version released couple years later company sold founders software publishing corporation spc sold non-windows versions product releasing version 2 late alpha stages version 3 sold product company called computer concepts corporation relatively unknown company created subsidiary called superbase inc. finishing late stage alpha version 3 launching superbase 95 eventually appeared lost interest product point bought small group former customers brought back uk company suderbase developers plc continued extend support product superbase classic.the amiga version sold mr. hardware computers joe rothman developed renamed program sbase pro 4 mr hardware computers sbase pro 4 sold russ norrby put version 1.36n newest version new next-generation rewrite product initially called superbase next generation sbng included new object oriented programming language called simpol begun 1999-2000 primarily alpha product although billed beta release 2005 promises true release would around corner 2006 simpol sold realbasics ltd later renamed simpol ltd www.simpol.com april 2009 company launched simpol professional next generation product cross-platform language database tool set february 2009 announced superbase developers plc liquidation march 2010 papatuo holdings ltd. purchased superbase family products official receivers superbase developers plc 2015 papatuo holdings company purchased superbase intellectual property superbase developers plc liquidated also purchased simpol intellectual property upon liquidation simpol limited following versions 1.83 2.06 version 2.10 released july 2017 superbase used basic end-user tasks real strength lies ability relatively untrained programmers create complex applications typically built time need arises types applications run gamut accounting systems erp/mrp packages business information systems production control systems similar complex products basic membership list contact management systems contains high-speed versatile isam database engine powerful dialect basic well sophisticated forms report engines also includes powerful support acting front-end one sql databases biggest drawback fact written 16-bit windows api easily portable 32-bit version rewritten version intended cure make package even easier use powerful casual programmer perspective fact database based sql significant advantage since level complexity far less easier user grasp concepts manage traverse database numerous powerful features product ahoy 1984 stated superbase numerous advanced features seldom seen database manager c-64 including database programming language concluded anyone planning harnessing c-64 office business environment ca n't go wrong superbase
Databases
nokia dx 200 dx 200 digital switching platform currently developed nokia networks dx 200 versatile fault-tolerant modular highly scalable telephone exchange general purpose server platform designed high performance high availability applications hardware built loosely coupled redundant computer units backed distributed software architecture architecture dx 200 allows live migration well software update live operation unlike many switching platforms dx 200 performs live software update without code patching therefore running code polluted unnecessary jump instructions furthermore opposed integration guessing various software patches dx 200 architecture makes proper integration testing software components possible live software update requires two computer units one executing old code working new software loaded otherwise idle spare process called warming memory areas e.g dynamically allocated memory exception stack procedures moved old new computer unit implies handling data structures must compatible old new software versions copying data require programming effort long allocation data done using tnsdl language developing software dx 200 platform rather straightforward well educated software developer tnsdl language plays vital role producing asynchronously communicating fault-tolerant software modules easy learn software architecture dx 200 fine combination highly efficient traditional solutions well modern actor model based highly concurrent design dx 200 products famous availability exceeding 99.999 five nines well unrivaled performance dx 200 generic architecture suitable versatile computing applications applications include traditional mobile switching centers msc lte mobile packet switching gateways well voip application servers generic operating system ported dx 200 relatively easily linux chorusos dmx frequent operating systems used dx 200 dmx 'native os dx 200 dmx microkernel architecture advanced functions like tcp/ip stack live migration components implemented separate libraries dx 200 several hardware flavors nokia networks shifted focus hardware products software services highly valuable business logic kept products used running dx 200 hardware variants available cloud solutions working generic multi-purpose hardware various vendors development system started televa finnish state owned telecom equipment producer early 1970s leadership keijo olkkola first order received 1973 100 subscriber local exchange small remote island community houtskär delivered 1979 first installation 1982 dx 200 captured 50 share finnish fixed line exchange market exchange modular design development microprocessors technology enabled gradual increase system capacity 1987 installation base grown 400,000 subscriber lines early export markets included china nepal united arab emirates sri lanka sweden turkey soviet union 1984 development version exchange nordic mobile telephone network started 1991 world first gsm call made using nokia devices core network components based dx 200 platform 2005 dx 200 based voip server provided finnish operator saunalahti providing state art fixed-mobile convergence solution prime example well dx 200 suitable internet server development overall flexibility whole dx 200 platform 2009 world ’ first voice calls lte networks using commercial 3gpp-standardized user network equipment 2013 nsn showed truly operational telco cloud solution actually marks end traditional dx200 hardware product line
Operating systems
oprofile computing oprofile system-wide statistical profiling tool linux john levon wrote 2001 linux kernel version 2.4 m.sc project consists kernel module user-space daemon several user-space tools oprofile profile entire system parts interrupt routines drivers user-space processes low overhead widely supported kernel mode oprofile uses system timer see gathering profiling events however mode unable measure kernel functions interrupts disabled newer cpu models support hardware performance counter mode uses hardware logic record events without active code needed linux 2.2/2.4 32-bit x86 ia64 supported linux 2.6 wider support x86 32 64 bit dec alpha mips arm sparc64 ppc64 avr32 call graphs supported x86 arm 2012 two ibm engineers recognized oprofile one two commonly used performance counter monitor profiling tools linux alongside perf tool example
Operating systems
attempto controlled english attempto controlled english ace controlled natural language i.e subset standard english restricted syntax restricted semantics described small set construction interpretation rules development university zurich since 1995 2013 ace version 6.7 announced ace serve knowledge representation specification query language intended professionals want use formal notations formal methods may familiar though ace appears perfectly natural – read understood speaker english – fact formal language ace related tools used fields software specifications theorem proving text summaries ontologies rules querying medical documentation planning simple examples ace construction rules require noun introduced determiner every least 5 ... ace interpretation rules decide 1 interpreted universally quantified 2 interpreted existentially quantified sentences like women human follow ace syntax consequently valid interpretation rules resolve anaphoric references 3 tie second sentence refer new tie first sentence man second sentence refer man first sentence thus ace text coherent entity anaphorically linked sentences attempto parsing engine ape translates ace texts unambiguously discourse representation structures drs use variant language first-order logic drs translated formal languages instance acerules various semantics owl swrl translating ace text fragment first-order logic allows users reason text instance verify validate query overview current version 6.6 ace section vocabulary ace comprises grammar ace defines constrains form meaning ace sentences texts ace grammar expressed set construction rules meaning sentences described small set interpretation rules troubleshooting guide describes use ace avoid pitfalls ace text sequence declarative sentences anaphorically interrelated furthermore ace supports questions commands simple sentence asserts something case — fact event state simple ace sentences following general structure every sentence subject verb complements direct indirect objects necessary transitive verbs insert something ditransitive verbs give something somebody whereas adjuncts adverbs prepositional phrases optional elements simple sentence elaborated upon describe situation detail specify nouns customer card could add adjectives possessive nouns -prepositional phrases variables appositions modifications nouns possible relative sentences described since make sentence composite also detail insertion event e.g adding adverb equivalently adding prepositional phrases combine elaborations arrive composite sentences recursively built simpler sentences coordination subordination quantification negation note ace composite sentences overlap linguists call compound sentences complex sentences coordination possible sentences phrases syntactic type note coordination noun phrases card code represents plural object coordination possible sentences verb phrases relative clauses coordination governed standard binding order logic i.e binds stronger commas used override standard binding order thus sentence means customer inserts visacard code alternatively mastercard code four constructs subordination relative sentences if-then sentences modality sentence subordination relative sentences starting allow add detail nouns help if-then sentences specify conditional hypothetical situations note anaphoric reference via pronoun -part noun phrase card -part modality allows us express possibility necessity sentence subordination comes various forms quantification allows us speak objects certain class universal quantification denote explicitly existence least one object class existential quantification textual occurrence universal existential quantifier opens scope extends end sentence coordinations end respective coordinated sentence express involved customers insert cards write sentence means customer inserts card may may one inserted another customer specify customers insert card — however unrealistic situation seems — write equivalently state every card inserted customer write somewhat indirectly negation allows us express something case negate something objects certain class one uses negate complete statement one uses sentence negation forms negation logical negations i.e state something provably case negation failure states state affairs proved i.e information whether state affairs case ace supports two forms queries yes/no -queries wh -queries yes/no -queries ask existence non-existence specified situation specified ask get positive answer note interrogative sentences always end question mark help wh -queries i.e queries query words interrogate text details specified situation specified ask element sentence exception verb queries also constructed sequence declarative sentences followed one interrogative sentence example ace also supports commands examples command always consists noun phrase addressee followed comma followed uncoordinated verb phrase furthermore command end exclamation mark constrain ambiguity full natural language ace employs three simple means natural language relative sentences combined coordinations introduce ambiguity ace sentence unequivocal meaning customer opens account reflected paraphrase express alternative — though realistic — meaning card opens account relative pronoun must repeated thus yielding coordination relative sentences sentence unambiguously equivalent meaning paraphrase ambiguities safely removed ace without rendering artificial deterministically interpret otherwise syntactically correct ace sentences use small set interpretation rules example write code attaches verb inserts card however probably meant say express code associated card employ interpretation rule relative sentence always modifies immediately preceding noun phrase rephrase input yielding paraphrase — specify customer inserts card code — usually ace texts consist one sentence express occurrences card code mean card code ace provides anaphoric references via definite article processing ace text anaphoric references replaced recent specific accessible noun phrase agrees gender number example recent specific suppose ace parser given sentence refers second card refers first card noun phrases within if-then sentences universally quantified sentences negations modality subordinated sentences referred anaphorically subsequent sentences i.e noun phrases accessible following text thus sentences refer card anaphoric references also possible via personal pronouns via variables anaphoric references via definite articles variables combined note proper names like simplemat always refer object
Computational linguistics
sparcstation 10 sparcstation 10 codenamed campus-2 workstation computer made sun microsystems announced may 1992 sun first desktop multiprocessor housed pizza box form factor case later replaced sparcstation 20 40 mhz sparcstation 10 without external cache reference spec cpu95 benchmark sparcstation 10 ss10 contains two mbus slots running either 36 mhz 33 mhz earliest models 40 mhz set via motherboard jumper mbus slot contain single dual sparc cpu modules permitting expansion four cpus supersparc hypersparc cpu modules available single supersparc modules without external cache sold sun ran clock speed mbus uniprocessor models 20 30 40 dual processor model 402 single dual supersparc modules 1 mb external cache also sold independently clocked ran higher rate mbus commonly 40.3 mhz 50 mhz uniprocessor models 41 51 multiprocessor models 412 512 514 sun dual 50 mhz supersparc modules dual mbus modules supported sun system double-width physically occupying one sbus slot per module addition mbus slot supersparc modules without external cache could mixed supersparc modules external cache could mixed even different clock speeds sun-supported configuration ross hypersparc modules also available third party vendors ss10 reasonable cooling capacity given cramped pizzabox case designed higher-speed hypersparc modules heat issues common modules used particularly four cpu configurations ss10 hold maximum 512 mb ram eight slots ss10 enclosure hold two 50-pin scsi hard drives floppy disk drive scsi devices attached via external scsi port ata disk support one onboard ethernet interface accessed built-in 10base-t jack via special 26-pin port provides aui audio connections one network ports active time special cable adapter needed convert latter port standard da-15 connector also two basic rate interface bri isdn connectors system shipped plastic blocking plugs inserted connectors additional sbus network cards also added sparcstation 10 systems lack integrated graphics referred sparcstation 10sx include sx cg14 framebuffer used sparcstation 20 requiring 4mb 8mb vsimm operate sparcstation 10s seem vsimm slots cutout case solder pads sx 13w3 connector options include cg6 gx gx+ turbo gx tgx+ 8-bit sbus framebuffers capable 1280×1024 resolution 8-bit color zx leo zx 24-bit card hardware-accelerated 3d operations offering high speeds resolutions however poorly supported takes two sbus slots runs extremely hot faster cousin turbo zx requires fan card taking four sbus slots full support available solaris 2.4 2.6 though 2.6 drivers made work solaris 7 8 9 linux includes accelerated driver supports 2d acceleration features 3d netbsd openbsd support without acceleration nextstep openstep support whatsoever ss10 holds system information mac address serial number nvram battery chip dies system able boot
Computer architecture
softvol softvol advanced linux sound architecture alsa plugin adds software based volume control alsa audio mixer alsamixer helpful sound card hardware volume control softvol plugin built alsa require separate installation another use case softvol hardware volume control unable amplify sound beyond certain threshold thus renders audio file quiet case software amplifiers created order boost volume level price sacrificing quality many modern software pieces able play audio files alsa sound system -independent softvol controls
Operating systems
linux-ha linux-ha high-availability linux project provides high-availability clustering solution linux freebsd openbsd solaris mac os x promotes reliability availability serviceability ras project main software product heartbeat gpl-licensed portable cluster management program high-availability clustering important features project originated mailing list started november 1997 eventually harald milz wrote odd sort linux-ha howto unlike howtos configure use existing software collection ha techniques one could use one write ha software linux alan robertson inspired description thought could perhaps write software project act sort initial seed crystal help jump start project got initial software running 18 march 1998 created first web site project 19 october 1998 first version software released 15 november 1998 first production customer software rudy pawul iso-ne iso-ne web site went production second half 1999 point project limited two nodes simple takeover semantics resource monitoring cured version 2 software added n-node clusters resource monitoring dependencies policies version 2.0.0 came 29 july 2005 release represented another important milestone first version large contributions terms code size made linux-ha community large series releases brought project level feature parity-or-superiority respect commercial ha software version 2.1.4 cluster resource manager component responsible starting stopping resources monitoring resource node failure split separate project called pacemaker resource agents glue infrastructure moved separate packages thus version 3 series name heartbeat used cluster messaging layer
Computer architecture
splunk splunk inc. american public multinational corporation based san francisco california produces software searching monitoring analyzing machine-generated big data via web-style interface splunk product captures indexes correlates real-time data searchable repository generate graphs reports alerts dashboards visualizations splunk mission make machine data accessible across organization identifying data patterns providing metrics diagnosing problems providing intelligence business operations splunk horizontal technology used application management security compliance well business web analytics early 2016 splunk 10,000 customers worldwide splunk based san francisco regional operations across europe middle east africa asia australia michael baum rob das erik swan co-founded splunk inc 2003 venture firms august capital seven rosen ignition partners jk b capital backed company 2007 splunk raised became profitable 2009 2012 splunk initial public offering trading nasdaq symbol splk september 2013 company acquired bugsense mobile-device data-analytics company bugsense provides mobile analytics platform used developers improve app performance improve quality supplied software developer kit give developers access data analytics mobile devices managed scalable cloud platform acquisition amount undisclosed july 2015 splunk acquired caspida cybersecurity startup october 2015 splunk sealed cybersecurity alliance u.s. government security contractor booz allen hamilton inc. offer combined cyberthreat detection intelligence-analysis technology 2016 splunk pledged donate 100 million software support nonprofits schools 10-year period according glassdoor fourth highest-paying company employees united states april 2017 october 2017 splunk acquired certain technology intellectual property assets smaller rival rocana april 9 2018 splunk acquired phantom cyber corporation approximately us 350 million june 11 2018 splunk announced acquisition victorops devops incident management startup us 120 million splunk core offering collects analyzes high volumes machine-generated data uses standard api connect directly applications devices developed response demand comprehensible actionable data reporting executives outside company department splunk enterprise security es security information event management siem solution provides insight machine data generated security technologies network endpoint access malware vulnerability identity information premium application licensed independently splunk core 2011 splunk released splunk storm cloud-based version core splunk product splunk storm offered turnkey managed hosted service machine data 2013 splunk announced splunk storm would become completely free service expanded cloud offering splunk cloud 2015 splunk shut splunk storm 2013 splunk announced product called hunk splunk analytics hadoop supports accessing searching reporting external data sets located hadoop splunk interface 2015 splunk announced light version core splunk product aimed smaller it-environments mid-sized enterprises splunk debuted splunk service intelligence itsi september 2015 itsi leverages splunk data provide visibility performance software analytics detect unusual behavior determine causes areas affects 2016 google announced cloud platform integrate splunk expand areas like ops security compliance company also announced additional machine learning capabilities several major product offerings installed top platform 2017 splunk introduced splunk insights ransomware analytics tool assessing investigating potential threats ingesting event logs multiple sources software targeted toward smaller organizations like universities company also launched splunk insights aws cloud monitoring service facilitate enterprises migration amazon web services cloud 2018 splunk introduced splunk industrial asset intelligence extracts information iiot industrial internet things data various resources presents users critical alerts splunkbase community hosted splunk users go find apps add-ons splunk improve functionality usefulness splunk well provide quick easy interface specific use-cases and/or vendor products integrations splunkbase include splunk app new relic forescout extended module splunk splunk app aws splunk architectures
Computer security
ios 6 ios 6 sixth major release ios mobile operating system developed apple inc successor ios 5 announced company worldwide developers conference june 11 2012 released september 19 2012 succeeded ios 7 september 18 2013. ios 6 added new apple maps app replacing google maps default mapping service operating system dedicated podcasts app central location podcasts passbook app managing different types tickets boarding passes coupons loyalty cards app store received visual overhaul bringing card-based app layout well tweaks search algorithms facebook integrated operating system incorporating status messages like buttons contact event synchronization several apple apps new privacy controls allow users fine-grained app permissions well option prevent targeted advertising siri added devices updated functionality including ability make restaurant reservations launch apps retrieve movie reviews sports statistics read items notification center reception ios 6 positive critics noted operating system offer significant speed improvements major redesigned elements instead focused refinements general consensus apple n't overhauling things sake ios 6 n't completely change way use device tweaks ... make many daily smartphone actions easier across board critics noted refinement something already works extremely well something companies would well emulate release apple maps however attracted significant criticism due inaccurate incomplete data issues prompted open letter apology apple ceo tim cook played contributing role dismissal scott forstall company supervised ios development since inception ios 6 seen updates since march 2014 two subversions ios 6 still 'signed apple software update 6.1.3 certain models ipad 2 iphone 4s 6.1.6 iphone 3gs ipod touch 4th generation meaning verified installed mentioned devices provided user necessary ipsw file ios 6 introduced apple worldwide developers conference june 11 2012. ios 6 officially released september 19 2012. ios 6.0.1 released november 1 2012 first update ios 6 included bug fixes ios 6.0.2 released exclusively iphone 5 ipad mini december 18 2012 fix wi-fi issues ios 6.1 released january 28 2013 update included lte compatibility carriers around world siri fandango integration allow users purchase movie tickets voice u.s. reset advertising identifier setting settings allowing users greater control apps track usage ios 6.1.1 released february 11 2013 specifically iphone 4s fixes issues could impact cellular performance stability ios 6.1.2 released february 19 2013 fix exchange calendar bug could impact network activity battery life ios 6.1.3 released march 19 2013 bug fixes including patching potential lock screen bypass method various improvements ios 6.1.4 released may 2 2013 specifically iphone 5 updated audio profile speakerphone ios 6.1.5 released november 14 2013 specifically 4th generation ipod touch fix facetime calls failing ios 6.1.6 released february 21 2014 specifically 4th generation ipod touch iphone 3gs fixes ssl connection verification also last version ios supported devices apple siri intelligent personal assistant introduced ios 5 release iphone 4s updated include ability make restaurant reservations launch apps read items notification center dictate facebook twitter updates retrieve movie reviews detailed sports statistics siri received language support italian korean cantonese device support iphone 5 fifth-generation ipod touch third-generation ipad ios 6.1 siri integrated fandango allowing users buy film tickets voice feature available united states launch facebook came integrated several apple native apps ios 6 facebook features could directly accessed within native apps calendar could synchronize facebook events contacts could show facebook friend information app store game center featured facebook like button well widget notification center allowed users post status updates social network settings app received multiple changes ios 6 icon revised match system preferences icon used then-named os x computer operating system developed apple disturb mode added allows users disable phone sounds additional options disturb mode include able allow phone calls specific group contacts allowing sound second call someone calls repeatedly crescent moon icon appear status bar disturb mode enabled new privacy settings became available users addition location services following menus added ios 6 contacts calendars reminders photos updated privacy menus allow users fine-grained privacy permission controls app new notifications apps want access information categories ios 6 also came limit ad tracking user control setting allow users option prevent targeted advertising apple advertising identifier described apple nonpermanent nonpersonal device identifier advertising networks use give control advertisers ability use tracking methods choose limit ad tracking advertising networks using advertising identifier may longer gather information serve targeted ads ios 6.1 reset advertising identifier setting added allow users reset identifier used advertising companies ios 6 added twitter widget notification center users could tweet without going app saved resources share sheet interface updated display grid icons opposed list different apps users could share content new apple maps app replaced google maps default mapping app operating system apple maps used apple vector-based engine making smoother zooming new maps turn-by-turn navigation spoken directions 3d views certain countries flyover views major cities real-time traffic launch turn-by-turn navigation available iphone 4s later ipad 2 cellular capability required later flyover view available iphone 4s later fifth-generation ipod touch ipad 2 later new passbook app added retrieve documents boarding passes admission tickets coupons loyalty cards ios device passbook replace physical card scanned process mobile payment participating locations app context-aware features notifications relevant coupons immediate vicinity given store automatic visibility boarding passes user airport notifications gate changes camera app updated include new panorama mode allowed users take 240-degree panoramic photos photos app received updates photo stream functionality letting users remove images well share custom photo streams people public app store ios 6 brand new user interface removed categories tab replaced genius apple search recommendation engine also made use cards rather lists present apps also tweaks app store search algorithm resulting trend favor newer companies sparked developer concerns praise app store also updated apps without requiring itunes password installing updating app users longer automatically returned home screen upon receiving calls ios 6 enabled users swipe lock screen reveal reply message remind later reply message feature shows several pre-determined messages option custom message remind later feature offers several options hour later user gets home user leaves current location enable reminder podcast functionality separated itunes app received podcasts app ios 6 order centralize promote podcast listening downloading users safari web browser updated full-screen landscape view iphone ipod touch users reading list feature introduced ios 5 received offline support text images layout saved articles get stored user device facetime video calling updated work cellular connection addition wi-fi clock app iphone ipod touch since original release became available ipad clock design looked similar swiss railway clock apple formed agreement swiss federal railways license design use youtube app default app ios developed apple removed apple told verge reason removal due expired license youtube users could still view videos safari web browser company also confirmed google owns youtube developing app then-upcoming release app store apple-developed youtube app remained ios 5 previous ios versions june 2017 former youtube employee hunter walk tweeted apple contacted youtube make default app original iphone ensure mass market mobile launch video-sharing service required handling development efforts 2012 youtube made gutsy move discontinue license effort take back control app developing reception ios 6 positive dan seifert verge wrote ios 6 looks nearly identical ios 5 subtle tweaks ... every small change look ios details ten things remain praising iphone 4s snappy performer noted comes speed ios 6 n't feel terribly different ios 5 craig grannell techradar wrote ios 6 rather like iphone 5 os x mountain lion refinement something already works extremely well apple n't overhauling things sake main making ios experience gradually better something companies would well emulate jason parker cnet wrote ios 6 welcome upgrade ios user going completely change way use device instead tweaks make many daily smartphone actions easier across board offer relief waiting certain features sending images e-mail call controls example ios 6 apple replaced google maps apple maps default mapping service operating system immediately faced criticism inaccurate incomplete data including museum river missing towns satellite images obscured clouds missing local places apple ceo tim cook issued letter apple website apologizing frustration caused maps application recommended downloading alternative map apps app store scott forstall then-vp ios software engineering involuntarily dismissed role apple october 2012 refused sign name letter apologizing shortcomings apple new mapping service september 2012 sarah downey privacy expert software company abine expressed concern spite new advertising identifier apple n't disclose details identifier actually based stated need tell identifying 've seen lot non-identifying pieces data identify quite easily 're using opt-out apple may longer gather information serve targeted ads says may still collect information things serve targeted ads like build databases send marketing sell third parties many users reported higher-than-normal data usage upgrading ios 6 causing heavily billed data largely exceeding data plan steve rosenbaum huffington post wrote bug result ios 6 problem connects phone cellular data network whenever phone connected wifi signal also stated apple released patch april 2014 users still running ios 6 could connect facetime due expiration certificate apple released support document explaining problem adding devices capable upgrading ios 7 must fix issue devices stuck ios 6 would receive ios 6.1.6 update release apple dropped support older devices specifically third-generation ipod touch first-generation ipad
Operating systems
ce linux forum ce linux forum otherwise known consumer electronics linux forum celf non-profit organization works advance linux open source platform consumer electronics ce devices primarily technical focus working specifications implementations conferences testing help linux developers improve linux use ce products celf several key initiatives including forum outgrowth joint project sony corporation matsushita electric industrial co. ltd. also known panasonic celf founded june 2003 several large consumer electronics companies including matsushita electric industrial co. ltd. sony corporation hitachi ltd. nec corporation royal philips electronics samsung electronics co. ltd. sharp corporation toshiba corporation 2009 celf 30 members consisting consumer electronics manufacturers semiconductor vendors linux software companies arm ltd. axe inc. broadcom canon inc. etri fujitsu limited fuji-xerox hewlett-packard hitachi ltd. ibm intel corporation justsystems corporation lg electronics lineo solutions inc panasonic corporation mips technologies nec corporation nxp semiconductors renesas royal philips electronics samsung electronics selenic consulting sharp corporation snapgear sony corporation toshiba corporation yamaha corporation 2007 celf following technical working groups working groups collect improvements linux linux-related software celf members help members coordinate projects enhance linux respective technical areas forum encourages members submit technical output directly back relevant open source project example sending enhancements linux kernel directly linux kernel mailing list appropriate technology- architecture-specific mailing list collected information forum output primarily located forum wiki embedded developers ce linux forum also sponsorships bring embedded projects fruition thanks grants celf amongst others linuxtiny patches logfs squashfs flash file systems pushed mainline linux celf hosts elinux.org wiki wiki dedicated embedded linux forum driving force behind embedded linux conference since 2005 originally started conference us spring also yearly elc europe autumn time frame conferences developer-focused usually attract 150-200 linux engineers elc english-language conference several parallel tracks lasts 2 3 days european conference always co-hosted 2007 hosted real-time linux workshop linz austria 2008 nluug ede netherlands 2009 embedded systems week grenoble 2009 2010 spring conferences americas co-organized linux foundation celf sponsored linux symposium 2004 2008 hosting bofs sessions specific embedded use linux development linux capabilities embedded use japan korea celf organizes technical jamborees every two months jamborees smaller single track held local language
Operating systems
fips 140 140 series federal information processing standards fips u.s. government computer security standards specify requirements cryptography modules current version standard fips 140-2 issued 25 may 2001 successor fips 140-3 approved march 22 2019 become effective september 22 2019 fips 140-3 testing begin september 22 2020 fips 140-3 testing begins fips 140-2 testing continue least year making two standards coexist time national institute standards technology nist issues 140 publication series coordinate requirements standards cryptographic modules include hardware software components use departments agencies united states federal government fips 140 purport provide sufficient conditions guarantee module conforming requirements secure still less system built using modules secure requirements cover cryptographic modules also documentation highest security level aspects comments contained source code user agencies desiring implement cryptographic modules confirm module using covered existing validation certificate fips 140-1 fips 140-2 validation certificates specify exact module name hardware software firmware and/or applet version numbers levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations cryptographic module validation program cmvp operated jointly united states government national institute standards technology nist computer security division communications security establishment cse government canada use validated cryptographic modules required united states government unclassified uses cryptography government canada also recommends use fips 140 validated cryptographic modules unclassified applications departments fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application addition specified levels section 4.1.1 specification describes additional attacks may require mitigation differential power analysis product contains countermeasures attacks must documented tested protections required achieve given level thus criticism fips 140-2 standard gives false sense security levels 2 standard implies modules tamper-evident and/or tamper-resistant yet modules permitted side channel vulnerabilities allow simple extraction keys fips 140 imposes requirements eleven different areas fips 140-1 issued 11 january 1994 developed government industry working group composed vendors users cryptographic equipment group identified four security levels eleven requirement areas listed specified requirements area level fips 140-2 issued 25 may 2001 takes account changes available technology official standards since 1994 comments received vendor tester user communities main input document international standard iso/iec 19790:2006 security requirements cryptographic modules issued 1 march 2006 nist issued special publication 800-29 outlining significant changes fips 140-1 fips 140-2 fips 140-3 new version standard currently development first draft version fips 140-3 standard nist introduced new software security section one additional level assurance level 5 new simple power analysis spa differential power analysis dpa requirements draft issued 11 sep 2009 however reverted four security levels limits security levels software levels 1 2 due way validation process set software vendor required re-validate fips-140-validated module every change matter small software re-validation required even obvious bug security fixes since validation expensive process gives software vendors incentive postpone changes software result software receive security updates next validation result may validated software less safe non-validated equivalent
Computer security
andromeda trojan andromeda modular trojan first spotted 2011 behavior malware capability checking whether executed debugged virtual environment using anti-virtual machine techniques downloads malware control servers often order steal information infected computers affected countries india 24 vietnam 12 iran 7
Computer security
packetfence packetfence open-source network access control nac system provides following features registration detection abnormal network activities proactive vulnerability scans isolation problematic devices remediation captive portal 802.1x wireless integration user-agent dhcp fingerprinting
Computer security
michael schearer michael schearer born november 28 1975 american lawyer writer computer security researcher known research presentations technology improvised explosive devices wireless security cryptography privacy related legal issues contributing author multiple books computer security currently lawyer dla piper computer hacker community known theprez98 originally reading pennsylvania schearer used live glen burnie maryland lives spring grove pennsylvania schearer law degree university maryland francis king carey school law master degree national security studies georgetown university bachelor arts degree political science bloomsburg university previously worked booz allen hamilton united states navy june 1999 february 2008 schearer served naval flight officer electronic countermeasures officer ecmo ea-6b prowler aircraft 2003 2004 schearer flew combat missions vaq-139 uss abraham lincoln afghanistan operation enduring freedom iraq operation southern watch iraq initial phase operation iraqi freedom may 2005 february 2008 schearer assistant professor naval science nrotc unit located pennsylvania state university time deployed iraq nine months electronic warfare officer tasked train military forces use counter-ied equipment returning iraq schearer gave several public presentations concerning technology improvised explosive devices schearer written several articles published naval safety center publications sea shore approach also maintains weblog mikeblog focuses interests sports politics computer technology projects reading also previously wrote popular plain english series summaries supreme court opinions appellate cases easy-to-read format schearer founding member reformed church wifi wireless security research group church hosts member-contributed projects related wireless security issues presented research def con h.o.p.e. penn state security day shmoocon schearer also founding member former keyholder central maryland hackerspace unallocated space schearer presented research number conferences including def con shmoocon penn state security day
Computer security
runt linux runt linux acronym resnet usb network tester one many linux distros designed run usb flash drive runt based slackware bare kernel originally designed network tool students north carolina state university consists boot floppy image zip file similar zipslack intended fairly complete linux installation use testing tool capable booting x86 computer usb port bootable floppy
Operating systems
protected computer protected computers term used title 18 section 1030 united states code computer fraud abuse act prohibits number different kinds conduct generally involving unauthorized access damage data stored protected computers statute amended national information infrastructure protection act 1996 defines protected computers formerly known federal interest computers computer— exclusively use financial institution united states government case computer exclusively use used financial institution united states government conduct constituting offense affects use financial institution government b used interstate foreign commerce communication including computer located outside united states used manner affects interstate foreign commerce communication united states law prohibits unauthorized obtaining information protected computer conduct involved interstate foreign communication makes felony intentionally transmit malware protected computer 5000 damage integrity data result u. s. justice department explains 1994 amendments national information infrastructure act reach subsection e. subsection 1030 5 broadened replacing term federal interest computer term computer used interstate commerce communications latter term broader old definition federal interest computer 18 u.s.c § 1030 e 2 b covered computer one two computers used committing offense located state meant hacker attacked computers state subject federal jurisdiction even actions may severely affected interstate foreign commerce example individuals attack telephone switches may disrupt interstate foreign calls 1994 change remedied defect however definition federal interest computer actually covered simply interstate activity specifically 18 u.s.c § 1030 e 2 covered generically computers belonging united states government financial institutions used entities non-exclusive basis conduct constituting offense affected government operation financial institution operation computer changing § 1030 5 federal interest computer computer used interstate commerce communications congress may inadvertently eliminated federal protection government financial institution computers used interstate communications example integrity availability classified information contained intrastate local area network may protected 1994 version 18 u.s.c § 1030 5 although confidentiality continued protected 18 u.s.c § 1030 1 remedy situation 1996 act 18 u.s.c § 1030 5 redrafted cover protected computer new term defined § 1030 e 2 used throughout new statute -- § 1030 5 well §§ 1030 2 4 new 7 definition protected computer includes government computers financial institution computers computer used interstate foreign commerce communications broad definition addresses original concerns regarding intrastate phone phreakers i.e. hackers penetrate telecommunications computers also specifically includes computers used foreign communications continually expanding global information infrastructure numerous instances international hacking growing possibility increased global industrial espionage important united states jurisdiction international computer crime cases arguably old definition federal interest computer contained 18 u.s.c § 1030 e 2 conferred jurisdiction requirement computers used committing offense located state might satisfied one computer located overseas general rule however congress laws presumed domestic scope absent specific grant extraterritorial jurisdiction e.e.o.c v. arabian american oil co. 499 u.s. 244 1991 ensure clarity statute amended reference international communications explicitly
Computer security
ibm thinkpad butterfly keyboard trackwrite also known butterfly keyboard foldout laptop computer keyboard designed john karidis ibm part thinkpad 701 series released 1995 allowed 701 series compact closed comfortable use open despite 24.6 cm 9.7 wide 26.4 cm 10.4 vga lcd 701 top selling laptop 1995 however later laptop models featured progressively larger screens need folding keyboard eliminated consequently model 701 used butterfly keyboard butterfly keyboard split two roughly triangular pieces slide laptop lid opened closed lid opened pieces slide sides followed one piece sliding downward two halves mesh form keyboard 29.2 cm 11.5 wide overhangs sides laptop body conversely lid closed one piece slides back slide inward keyboard covered lid movement keyboard driven cam lid hinge motions keyboard parts always synchronized movement lid unusual design displayed design collection museum modern art manhattan new york die neue sammlung
Computer architecture
puma web server puma http web server derived mongrel written evan phoenix stresses speed efficient use memory puma web server shipped mastodon recommended heroku hosting provider replacement unicorn deliveroo published benchmark comparing two servers concluded “ puma performs better unicorn tests either heavily io-bound interleaved io cpu work ” unicorn still slightly better performing situations cpu load limiting factor
Web technology
sparcstation 5 sparcstation 5 ss5 code-named aurora workstation introduced sun microsystems march 1994 based sun4m architecture enclosed pizza-box chassis simplified cheaper version ss5 released 1996 sparcstation 4 sun also marketed machines netra brand without framebuffers keyboards preconfigured requisite software used web servers sparcstation 5 may incorporate one following processors 70 85 110 mhz sun microsystems microsparc-ii 170 mhz fujitsu microelectronics inc. fmi turbosparc fujitsu also provided 160 mhz turbosparc cpu upgrade kit upgrading 70 85 110 mhz microsparc-ii models sparcstation 5 mbus thus limited use single-processor machine sparcstation 5 eight dsimm slots memory expansion slots filled individually either 8mb 32mb modules giving maximum 256mb memory memory used identical sparcstation 4 sparcstation 5 hold two internal 80-pin sca single ended fast-narrow scsi drives scsi cd-rom drive floppy also supports external scsi devices ide/atapi support sparcstation 5 comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver 10/100mbit/s hme happy meal nic added faster connections openboot rom able boot network using rarp tftp like sparcstation systems ss5 holds system information mac address serial number nvram battery chip dies system able boot sparcstation 5 three sbus expansion slots typical sun computer equipment era third shared expansion backplate physical space special afx connector unique sparcstation 5 one card released slot known s24 tcx framebuffer allowed use 24-bit colour graphics instead eight bit colour sbus cg6 card also known lego low end graphics option tcx also used on-board framebuffer sparcstation 4 version less advanced supported eight bit colour sparcstation 4 introduced 1995 provide lower price point sparcstation 5 although offered 110 mhz microsparc-ii processor sparcstation 5 one sbus expansion slot instead three single 1.05 gb hard drive maximum memory capacity 160 mb instead 256 mb instead built-in audio sparcstation 5 sparcstation 4 requires optional module installed dedicated slot system includes built-in 8-bit pixel-accelerated graphics adapter new lower-cost 17 monitor introduced option afx graphics port sparcstation 4 standard aui ethernet connector unlike sparcstation 5 requires special cable mate non-standard connector sun used enclosure sparcstation 4 sparc xterminal 1 name implies marketed x terminal local storage unlike earlier sparcclassic x use motherboard workstation derived instead using lower-powered 50 mhz microsparc processor expansion base memory 8 mb 128 mb rather 160 mb rather running solaris sparc xterminal 1 sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included swap sparcstation 4 motherboard hard drive additional memory following operating systems run sparcstation 5
Computer architecture
lex de haan lex de haan 11 august 1954 – 1 february 2006 independent author lecturer researcher consultant specializing relational database technology lex teacher mathematics/informatics secondary school level years 1976 1985 1985 1989 lex employed one year research department dutch independent system vendor minihouse/multihouse moved education department developed delivered courses following areas relational databases sql oracle system development database administration oracle versions 4/5/6 unix system users unix system administration vax/vms system users vax/vms system administration teaching skills workshops lex de haan also responsible hiring mentoring new instructors 1988 1990 lex developed courseware independent contractor de haan consultancy advised organizations education needs delivered classes important customers dutch ministry health culture dutch government education institute roi also worked regular basis frans remmen dutch rdbms sql guru time senior consultant courseware developer instructor pao courses well-known dutch post-academic education organization 1999 lex de haan joined dutch national body iso standardization committee sql language work sql:1999 sql:2003 standards 2002 lex involved oaktable network oracle experts beginning see http //www.oaktable.net march 2004 lex independent 14 years employment oracle lex taught seminars courses natural join b.v. data server internals oracle database 10g new features sql belgium france denmark slovakia sweden turkey united kingdom ireland saudi arabia bahrain another year lot teaching traveling like 2004 lex de haan also delivered well-received presentations hotsos symposium dallas texas ukoug conference birmingham lex de haan also started writing new book together toon koppelaars exciting tentative title applied mathematics database professionals appear mid-2006 last least started organizing seminar events february 2005 lex de haan invited tom kyte us come netherlands teach three-day seminar utrecht first event became great success october 2005 invited steve adams sydney australia second seminar successful seminar series born several events oracle gurus world scheduled 2006 lex de haan author following books oracleekspert magazine published article april 2004 lex de haan entitled 'lex sql server land oracle magazine published article july/august 2005 issue lex de haan jonathan gennick entitled 'nulls nothing worry november 2003 lex de haan held presentation 'the oracle database past present future conference university aalborg denmark
Databases
unix shell unix shell command-line interpreter shell provides command line user interface unix-like operating systems shell interactive command language scripting language used operating system control execution system using shell scripts users typically interact unix shell using terminal emulator however direct operation via serial hardware connections secure shell common server systems unix shells provide filename wildcarding piping documents command substitution variables control structures condition-testing iteration generic sense term shell means program users employ type commands shell hides details underlying operating system manages technical details operating system kernel interface lowest-level inner-most component operating systems unix-like operating systems users typically many choices command-line interpreters interactive sessions user logs system interactively shell program automatically executed duration session type shell may customized user typically stored user profile example local passwd file distributed configuration system nis ldap however user may execute available shell interactively hosts windowing system like macos users may never use shell directly unix systems shell historically implementation language system startup scripts including program starts windowing system configures networking many essential functions however system vendors replaced traditional shell-based startup system init different approaches systemd first unix shell thompson shell sh written ken thompson bell labs distributed versions 1 6 unix 1971 1975 though rudimentary modern standards introduced many basic features common later unix shells including piping simple control structures using codice_1 codice_2 filename wildcarding though current use still available part ancient unix systems modeled multics shell developed 1965 american software engineer glenda schroeder schroeder multics shell modeled runcom program louis pouzin showed multics team rc suffix unix configuration files example .vimrc remnant runcom ancestry unix shells pwb shell mashey shell sh upward-compatible version thompson shell augmented john mashey others distributed programmer workbench unix circa 1975-1977 focused making shell programming practical especially large shared computing centers added shell variables precursors environment variables including search path mechanism evolved path user-executable shell scripts interrupt-handling control structures extended if/goto if/then/else/endif switch/breaksw/endsw while/end/break/continue shell programming became widespread external commands incorporated shell performance widely distributed influential early unix shells bourne shell c shell shells used coding base model many derivative work-alike shells extended feature sets bourne shell sh new unix shell stephen bourne bell labs distributed shell unix version 7 1979 introduced rest basic features considered common unix shells including documents command substitution generic variables extensive builtin control structures language including use reversed keyword mark end block influenced algol 68 traditionally bourne shell program name sh path unix file system hierarchy /bin/sh number compatible work-alikes also available various improvements additional features many systems sh may symbolic link hard link one alternatives posix standard specifies standard shell strict subset korn shell enhanced version bourne shell user perspective bourne shell immediately recognized active characteristic default command line prompt character dollar sign c shell csh modeled c programming language including control structures expression grammar written bill joy graduate student university california berkeley widely distributed bsd unix c shell also introduced many features interactive work including history editing mechanisms aliases directory stacks tilde notation cdpath job control path hashing many systems csh may symbolic link hard link tenex c shell tcsh improved version joy original version although interactive features csh copied shells language structure widely copied work-alike hamilton c shell written nicole hamilton first distributed os/2 1988 windows since 1992 shells read configuration files various circumstances files usually contain commands shell executed loaded usually used set important variables used find executables like path others control behavior appearance shell table section shows configuration files popular shells explanation variations unix shell concept n't derive bourne shell c shell include following
Operating systems
xanadu video game also known xanadu dragon slayer ii action role-playing game developed nihon falcom released 1985 pc-8801 x1 pc-8001 pc-9801 fm-7 msx computers enhanced remakes later released sega saturn pc-9801 windows platforms second dragon slayer series preceded dragon slayer followed games dragon slayer series little relation xanadu set sales record computer games japan 400,000 copies sold 1985 one foundations role-playing genre particularly action role-playing subgenre featuring real-time action combat combined full-fledged character statistics innovative gameplay systems karma meter individual experience equipped items platform game elements combined dungeon crawl gameplay predecessor also towns explore introduced equipment change player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance following year saw release xanadu scenario ii early example expansion pack game begins player directly control protagonist little introduction progress one must speak king gives player bare essentials small amount cash train selecting attributes raise player must find way city vast underground complex finding exit first many puzzles player encounter though game puzzle game role-playing video game puzzle game adventure game elements protagonist move left right climb ladders jump cast equipped spells enter doors use equipped items similar falcom later ys series damage done walking directly enemy unlike ys xanadu n't matter part target body player character runs main view xanadu side-scrolling platformer view though line sorcerian typical platformer super mario bros. engaging battle entering building view changed top-down perspective layer stratum complex network buildings caves tunnels acquire level player must visit temples minister grant level protagonist provided enough experience points otherwise minister let player know much needed go level two types levels fighting magic fighting experience raised combat magic though spell use two systems go hand hand used time enemy killed either good bad even though enemies attack player character player kills many good enemies karma statistic rise point temples refuse level player remedied drinking black poison bottle however carried bought must found within dungeons remove half protagonist hit points equipable items swords armor experience levels raised simply using item example swords attacking armor hit magic casting spell sense highly developed dagger effective brand new longsword however highly developed sword far useful maxed dagger vital upgrade equipment xanadu limited number enemies area deter powerleveling requires player think ahead handles enemies get experience keep karma getting high factor must juggled weapon experience player defeats enemies using dagger upgrades sword proceeds fight area boss player disadvantage either kept highly developed dagger bought sword early level finite number encounters area every area generally least one boss though always required fight enemies drop various items commonly drop money food money used upgrading equipment buying items protagonist slowly eats supply food time passes game slowly heals hit points well food runs hit points begin dropping rapid pace food found bought protagonist dies addition purchasing items found chests dungeon areas entering secret code name character creation area outset game autosaves right boss fight leaving building player manually save costs 100 gold sega saturn remake away adding save command status menu xanadu large set followups despite technically sequel dragon slayer xanadu ova released 1987 conjunction msx version game manga titled xanadu legend dragon slayer plot expanded altered main character name fieg フィーグ several new cast members new plot elements included several science fiction themes example fieg 21st-century soldier near future dropped xanadu bloody ambush soundtrack movie released record cassette compact disc shortly thereafter manga follows plot movie drawn tsuzuki kazuhiko 都築和彦 also work falcom ys sorcerian titles republished 17 part serial webcomic falcom release revival xanadu falcom website accompanying music english translation original pc-8801 release xanadu features music composed toshiya takahashi promote release game japanese heavy metal band anthem released lp two image songs titled xanadu msx versions game released 1987 different score xanadu scenario ii expansion pack features much larger set songs soundtrack composed takahito abe yuzo koshiro would compose music many falcom later titles koshiro compositions opening theme several dungeons taken demo tape first sent falcom age 18 revival xanadu revival xanadu ii two loose remakes made falcom 1990s feature unique soundtracks well also composed koshiro abe aside xanadu next legend xanadu xanadu titles received full independent original soundtrack compact disc however soundtrack released xanadu xanadu scenario ii 12 vinyl record album titled xanadu anthem selections xanadu music heard various falcom albums 1987 xanadu released featuring arranged versions xanadu scenario ii soundtrack played rock band combined live orchestra synthesizers main theme xanadu franchise la valse pour xanadu featured pc-88 pc-98 versions xanadu remixed several audio tracks xanadu next french magazine joypad reviewed pc-e version gave 97 xanadu pioneer game industry received critical praise japanese gaming magazines large fan base 2005 according falcom 1985 sales record 400,000 copies sold japan yet broken role-playing personal computer game released country however tokihiro naito e soft said first hydlide action-rpg like xanadu sold one-million copies across computer formats combining sales matching famicom sales also one-million copies japan influence xanadu felt many games developed falcom even development houses copied look feel ys featured similar quicker complex bump system combat used ys ys ii ys iv later dragon slayer games dragon slayer iv sorcerian similar side-scrolling viewpoints however bump system start xanadu predecessor original dragon slayer several smaller companies copied bump system mostly obscure pc-8801 titles dragon slayer laid foundations action role-playing game genre influencing future series like ys legend zelda xanadu early real-time action rpg full-fledged character statistics introduced several innovative gameplay mechanics karma morality system individual experience equipped items heavy emphasis puzzle-solving equipment changes player character visible appearance food consumed slowly time essential keeping player character alive magic used attack enemies distance training facilities improve various statistics also introduced platformer-style side-scrolling view including ability jump side-scrolling view used exploration switches overhead view predecessor battle certain rooms also use overhead view game influence also extended beyond action rpgs way game reworked entire game system considered influence final fantasy would installments developer square previously publisher msx version original dragon slayer xanadu also considered proto-metroidvania game due rpg turned side allowed players run jump collect explore laying foundations open-ended metroidvania games faxanadu legacy wizard xanadu scenario ii released 1986 early example expansion pack also non-linear allowing levels explored order xanadu title falcom given complete commemorative re-release original 1980s packaging though various degrees success older titles xanadu falcom breakthrough brought spotlight origin systems founder ultima series creator richard garriott flew tokyo meeting nihon falcom origin release xanadu us well falcom help releasing port japan however xanadu contained artwork directly lifted manuals role-playing game presentation game several digitized pictures manual ultima iii appeared various shops game upon seeing garriott origin ended meeting decided sue falcom lawsuit settled court artwork game changed appears
Computer architecture
memory memory oom often undesired state computer operation additional memory allocated use programs operating system system unable load additional programs since many programs may load additional data memory execution cease function correctly usually occurs available memory including disk swap space allocated historically memory condition common since early computers operating systems limited small amounts physical random-access memory ram due inability early processors address large amounts memory well cost considerations since advent virtual memory opened door usage swap space condition less frequent almost modern programs expect able allocate deallocate memory freely run-time tend fail uncontrolled ways crash expectation met older ones often allocated memory checked whether got enough work expected forthcoming therefore would either fail immediately memory error message work expected early operating systems ms-dos lacked support multitasking programs allocated physical memory could use needed physical memory often scarce resource exhausted applications terminate stay resident functionality applications could started running applications closed modern operating systems provide virtual memory processes given range memory memory directly correspond actual physical ram virtual memory backed physical ram disk file via mmap swap space operating system move virtual memory pages around needs virtual memory need backed physical memory exhaustion rare usually limits imposed operating system resource consumption predicted moore law amount physical memory computers grown almost exponentially although offset degree programs files becoming larger cases computer virtual memory support majority loaded data resides hard disk may run physical memory virtual memory thus causing excessive paging condition known thrashing usually renders computer unusable programs closed machine rebooted due reasons memory message rarely encountered applications modern computers however still possible encounter oom condition modern computer typical oom case modern computers happens operating system unable create virtual memory potential backing devices filled end-user disabled kernels operating systems linux attempt recover type oom condition terminating one processes mechanism known oom killer linux 4.6 released may 2016 introduced changes oom situations improving detection reliability. cgroup awareness oom killer implemented linux kernel 4.19 released october 2018 adds ability kill cgroup single unit apart system-wide physical memory limits systems limit amount memory process use usually matter policy limitation also happen os larger address space available process level high-end 32-bit systems physical address extension enabled come 8 gigabytes system memory even though single process access 4gb 32-bit flat memory model process exceeds per-process limit attempts allocate memory encounter error condition example c standard function allocating memory codice_1 return null well-behaved application handle situation
Operating systems
application networks application networks inc. appnet palo alto-based company provider jrisk packaged financial risk management software use on-premises part cloud computing environments customers included global banks banks used jrisk risk management portfolio securities otc contracts financial derivative transactions application networks inc. acquired reuters june 2006
Distributed computing architecture
parasoft c/c++test parasoft c/c++test integrated set tools testing c c++ source code software developers use analyze test find defects measure quality security applications supports software development practices part development testing including static code analysis dynamic code analysis unit test case generation execution code coverage analysis regression testing runtime error detection requirements traceability code review commercial tool supports operation linux windows solaris platforms well support on-target embedded testing cross compilers parasoft c/c++test combined set tools helps developers test software delivered standalone application runs command line plug-in eclipse microsoft visual studio various modules set assist software developers performing static dynamic analysis creating executing maintaining unit tests measuring code coverage software metrics executing regression tests errors c/c++test discovers include uninitialized invalid memory null pointer dereferencing array buffer overflow division zero memory resource leaks duplicate code various types dead unreachable code c/c++test customers include samsung electronics wipro nec selex sistemi integrati also used lockheed martin f-35 joint strike fighter program jsf inomed uses achieve iec 62304 certification medical device software testing software code coverage measure parts code executed test many different methods measuring coverage different criteria calculated depending needs choose best fit application c/c++test includes options line coverage meaning line executed block coverage statement coverage path coverage decision coverage branch coverage simple condition coverage also supports modified condition/decision coverage mcdc projects require safe reliable software aircraft cars tend required form coverage believed better measure whether code thoroughly exercised regression testing verifies software continues operate correctly even changes made new versions released c/c++test automatically generates tests capture current state applications behavior recording happens application running later test runs compared stored results earlier runs help determine problems changes code may introduced robust regression test suite especially critical areas short release cycles high degrees test automation agile software development extreme programming help insure changes n't introducing bugs software c/c++test includes lightweight form runtime error detection suitable use embedded systems including running target board host helps find serious runtime defects memory leaks null pointers uninitialized memory buffer overflows software metrics used help assess improve software quality metrics used help determine bug-prone code might others help understand maintainability proper construction c/c++test provides variety software metrics including traditional counting metrics lines files comments methods etc well industry standards like fan cyclomatic complexity cohesion various halstead metrics users configure metrics want run applicable set thresholds acceptable value particular metric allows users flag code outside expected range error reviewed fixed graphic reports provided show values trends metrics static code analysis process analyzing source code without executing software helps developers find bugs early well code according best practices helps create code less susceptible bugs avoiding potentially dangerous code styles constructs industries software performance critical often requirements run static analysis tools even particular static analysis rules static analysis c/c++test includes different types analysis including pattern-based abstract interpretation flow analysis metrics helps detect code responsible memory leaks erratic behavior crashes deadlocks security vulnerabilities c/c++test comes pre-configured templates assist enforcing static analysis rules variety industry standards working industries strict coding requirements regulatory standards necessary able prove application developed according required steps traceability information necessary prove software audit 've done proper process commonly means able prove code belongs particular requirement well reviewed outcome review also encompasses tests analysis performed code done tests failed c/c++test keeps track testing links back requirement system source control system bug tracking systems provides full traceability step software development process purpose unit testing make sure individual pieces software application work properly integration programming languages like c c++ usually consists single file small number files perform related function unit testing encompasses creation tests execution tests see results maintenance tests long term use unit testing often associated code coverage shows exactly lines code executed test functionalities included c/c++test c++test helps create unit tests compatible xunit testing frameworks also provides tracing functionality lets monitor system test generate test cases based actual paths data used execution also provides functionality handle isolating code necessary allow function without rest application also called stubbing well object repository store share reuse software objects initialized necessary test data stubs allow remove dependent parts full application database api still run application component still c/c++test allows create necessary stubs run code isolation capability alter extend test data provided variety means data source interface allows read test inputs files spreadsheets databases tests also run simultaneous runtime error detection turned find serious programming flaw wo n't necessarily cause assertion failures testing likely cause software instability deployed execution embedded systems support whether host target simulator including cross-compilation loading tests target loading results remote execution back gui parasoft c/c++test originally introduced 1995 static analysis tool based guidelines found book effective c++ scott meyers later unit test creation execution added product renamed c++test eventually product name modified include c c++ reflect languages actually covered parasoft c/c++test software test performances ’ 2008 testers choice award best embedded/mobile test/performance category selected vdc software embeddy best show award winner 2012 parasoft received tuv certification automotive functional safety tool 2011 according iec 61508 iso 26262 standards
Computer security
motorola 68000 series motorola 68000 series also termed 680x0 m68000 m68k 68k family 32-bit cisc microprocessors 1980s early 1990s popular personal computers workstations primary competitors intel x86 microprocessors well known processors powering early apple macintosh commodore amiga sinclair ql atari st sega genesis mega drive several others although modern desktop computers based processors 68000 series derivative processors still widely used embedded systems motorola ceased development 68000 series architecture 1994 replacing powerpc architecture developed conjunction ibm apple computer part aim alliance 68010 68020 68030 68040 68060 68000 line processors used variety systems modern high-end texas instruments calculators ti-89 ti-92 voyage 200 lines members palm pilot series run palm os 1.x 4.x os 5.x arm-based even radiation-hardened versions critical control systems space shuttle however became well known processors powering desktop computers apple macintosh commodore amiga sinclair ql atari st several others 68000 also processor choice 1980s unix workstations servers firms sun microsystems next silicon graphics sgi 68000 version cp/m called cp/m-68k initially proposed atari st operating system atari chose atari tos instead also perhaps significantly first several versions adobe postscript interpreters 68000-based 68000 apple laserwriter laserwriter plus clocked faster version used macintosh computers fast 68030 later postscript interpreters including standard resolution laserwriter iintx iif iig also 300 dpi higher resolution laserwriter pro 600 series usually 600 dpi limited 300 dpi minimum ram installed high resolution linotronic imagesetters 200ps 1500+ dpi 300ps 2500+ dpi thereafter adobe generally preferred risc processor competitors postscript clones already gone riscs often amd 29000-series early 68000-based adobe postscript interpreters hardware named cold war-era u.s. rockets missiles atlas redstone etc today systems either end-of-line case atari using different processors case macintosh amiga sun sgi since platforms peak market share 1980s original manufacturers either longer support operating system hardware business however gnu/linux netbsd openbsd operating systems still include support 68000 processors 68000 processors also used sega genesis mega drive snk neo geo consoles main cpu consoles sega saturn used 68000 audio processing i/o tasks atari jaguar included 68000 intended basic system control input processing due jaguar unusual assortment heterogeneous processors also frequently used running game logic many arcade boards also used 68000 processors including boards capcom snk sega microcontrollers derived 68000 family used huge variety applications example cpu32 coldfire microcontrollers manufactured millions automotive engine controllers many proprietary video editing systems used 68000 processors category name macrosystem casablanca black box easy use graphic interface 1997 intended amateur hobby videographer market also worth noting earlier bigger professional counterpart called draco 1995 groundbreaking quantel paintbox series early based 24-bit paint effects system originally released 1981 lifetime used nearly entire range 68000 family processors sole exception 68060 never implemented design another contender video arena abekas 8150 dve system used 680ec30 trinity play later renamed globecaster uses several 68030s bosch fgs-4000/4500 video graphics system manufactured robert bosch corporation later bts 1983 used 68000 main processor drove several others perform 3d animation computer could easily apply gouraud phong shading run modified motorola versados operating system people familiar pdp-11 vax usually feel comfortable 68000 exception split general-purpose registers specialized data address registers 68000 architecture many ways 32-bit pdp-11 orthogonal instruction set many processors came e.g. 8080 e.g. x86 typically possible combine operations freely operands rather restricted using certain addressing modes certain instructions property made programming relatively easy humans also made easier write code generators compilers 68000 instruction set divided following broad categories 68050 though one point project within motorola odd-numbered releases always reactions issues raised within prior even numbered part hence generally expected 68050 would reduced 68040 power consumption thus heat dissipation improved exception handling fpu used smaller feature size optimized microcode line program use instructions many optimizations included 68060 part design goals number reasons likely 68060 development intel 80486 progressing quickly motorola assumed would 68060 demanding project 68050 cancelled early development also revision 68060 motorola process shifting away 68000 88k processor lines new powerpc business 68070 never developed would revised 68060 likely superior fpu pipelining widely speculated upon usenet motorola mainly used even numbers major revisions cpu core 68000 68020 68040 68060 68010 revised version 68000 minor modifications core likewise 68030 revised 68020 powerful features none significant enough classify major upgrade core cpu 68070 designation licensed somewhat slower version 16/32-bit 68000 basic dma controller i²c host on-chip serial port 68070 used main cpu philips cd-i cpu however produced philips officially part motorola 680x0 lineup 4th-generation 68060 shared features intel p5 microarchitecture personal computers xt/370 at/370 pc-based ibm-compatible mainframes included two modified motorola 68000 processors custom microcode emulate s/370 mainframe instructions mainline 68000 processors demise 68000 family used extent microcontroller embedded microprocessor versions chips include ones listed i.e cpu32 aka 68330 coldfire quicc dragonball advent fpga technology international team hardware developers re-created 68000 many enhancements fpga core core known 68080 used vampire-branded amiga accelerators 1980s early 1990s 68000 widely used desktop computers mainly competed intel x86 architecture used ibm pc compatibles generation 1 68000 cpus primarily competed 16-bit 8086 8088 80286 generation 2 competed 80386 first 32-bit x86 processor generation 3 80486 fourth generation competed p5 pentium line nearly widely used predecessors since much old 68000 marketplace either defunct nearly case atari next converting newer architectures powerpc macintosh amiga sparc sun mips silicon graphics sgi dozens processor architectures currently successful embedded systems microcontrollers much simpler smaller cheaper 68000 others relatively sophisticated capable running complex software embedded versions 68000 often compete processors derived powerpc arm mips superh architectures among others
Computer architecture
herzog video game herzog german duke strategy video game released technosoft japan msx nec pc-88 computers 1988 real-time tactics tactical shooter game real-time strategy elements game served prototype sequel herzog zwei released 1989 sega mega drive often considered first true real-time strategy game game centered around fictional war countries mercies blue side game ruth red side game single player mode game player takes control mercies army whose goal reach capture headquarters ruth army gameplay takes place among nine battlegrounds beginning capital mercies vaxan victory player brings player army next battleground closer remerje capital ruth game ends either player defeated vaxan computer controlled army defeated remerje game also end player loses last land-armor stock see units player loses battleground vaxan player move backwards complete previous stage ten years prior game events president hughes head republic mercies assassinated ruth liberian army terrorist organisation lead roger tense takes responsibility act previously friendly relations mercies ruth deteriorate war breaks major powers intervene conflict sides war spreads engulf world decade later ruth army gates vaxan capital mercies war begins draw close player successful captures remerje capital ruth war ends two countries sign peace treaty five years later battleground linear path player base located one side enemy base located side side land-armor fly air travel ground pick drop friendly units attack units including friendly ones side must use funding automatically replenished rate ten money units every half-second approximately build various units travel length battlefield battle opposing units unit successfully manages reach opposing end battlefield unit cause certain amount damage enemy base battle side manages damage opposing base enough destroy visual aspect gameplay represented vertically aligned graphical area units controlled real-time small horizontal radar top screen units represented colored dots scroll across screen according position bottom screen side gauges show percentage damage taken respective land-armors bases either reaches 100 percent damage destroyed gameplay two-player mode essentially single player game graphical area split two sides player player one blue player two red major difference first battle takes place location middle two capitals progress forward backward depending wins one capital defeated combat deployable units available follows land-armor land-armor important unit game one land-armor time active battleground directly controlled player units move independently land-armor travel ground hover air attack enemy ground air units land-armor also pick units drop different locations land-armor health displayed screen replaced another land-armor destroyed computer controlled army infinite number land-armors player must buy extras needed destruction player last land-armor results automatic game soldier soldiers fairly slow moving ground units fire single shots ground enemies soldiers weak take one hit destroyed cheap create land-armor picks one repair land-armor rate 1 percentage point per second way repair land-armor land-armor carry five soldiers time tank tanks main attack unit army fairly expensive make slow moving take lot hits destroyed lot damage bases tank rate fire soldier land-armor carry one tank time aam anti aircraft missile -carrier aam-carriers medium speed moving units equipped attack ground units instead armed finite number homing missiles seek attack enemy land-armor ground air unit attack land-armor air besides another land-armor land-armor carry one aam-carrier time upon pressing fire button land-armor unleash entire payload homing missiles aam-carrier holding side car side cars lightweight inexpensive motorcycle units fast reach enemy base quickly also higher rate fire units damage little faster downside low tolerance damage land-armor carry one side car time antitank-gun antitank-guns ground turrets must first placed land-armor attack enemies position although expensive unable move without assistance durable high rate fire making ideal take tanks name suggests defend bases land-armor carry one antitank-gun time grand-slam expensive unit next land-armor grand-slam missile powerful travels across battleground slowly successfully reaches opposing base automatically destroys 100 percent damage grand-slam ca n't seen interacted graphical area seen blip radar game flash warning grand-slam launched way destroy grand-slam send another grand-slam collide opposite end path final note player maximum 50 units battleground time herzog served prototype well known 1989 sega mega drive sequel herzog zwei considered first real time strategy game first feature set falls contemporary definition genre predating genre-popularizing dune ii 1992
Computer architecture
tenfourfox tenfourfox web browser power macintosh computers based mozilla gecko layout engine port mozilla firefox powerpc-based macintosh computers running mac os x retain compatibility older architecture older versions operating system add powerpc-specific optimizations improved performance project started mozilla announced would release firefox 4 powerpc versions os x like firefox includes compatibility wide range addons acid2 acid3 compliance html 5 css 3 features however also includes javascript just-in-time compilation custom builds specific powerpc processor families altivec acceleration key media codecs primary maintainer cameron kaiser project shares administration classilla fork mozilla application suite mac os 9 mac os 8.6 2010 mozilla mike beltzner announced forthcoming firefox 4 would released power macintosh computers compatibility mac os x tiger already removed making firefox 3.6 last supported release firefox older architecture platform mozilla stopped making powerpc-compatible universal builds firefox 4 beta 7 response developer cameron kaiser created test build firefox 4 could run power mac g5 time support withdrawn beta 7 released users separate builds altivec macs g3 macs november 8 2010 aligning precedent modified builds firefox source could use firefox trademarks without permission project forked named tenfourfox full complement builds g3 7400 7450 g4 families g5 released beta 8 december 15 2010 javascript acceleration using completed powerpc version tracemonkey released beta 9 january 12 2011 enabled fully beta 11 february 2 2011 finalized first release version 4.0s incorporated security update fix javascript performance released march 24 2011 version 5.0 switched current mozilla rapid release framework based firefox 5 including additional altivec scaling color features released june 16 2011 mozilla announced extended support release esr firefox cameron kaiser stated starting version 10 tenfourfox stable releases tenfourfox based firefox esr reduce maintenance burden major esr versions developers tracked changes firefox 6-week rapid release cycle test builds determine whether would still able build software next esr version released minor esr updates advertised suitable general consumption december 2015 kaiser declared tenfourfox would move away directly firefox source code 45 esr citing inability port later versions due operating system rust compiler limitations first feature parity releases fprs major later firefox features backported tenfourfox modified firefox esr 45 base released official end firefox esr 45 support june 13 2017 tenfourfox fpr series releases include additional later features well backported security patches current supported firefox esr tenfourfox shares main feature set firefox along optimizations powerpc platform similar optimized build projects pale moon swiftfox tenfourfox includes specific compiler optimizations improve overall performance issues specific builds tuned specific processor families however also includes custom new features particular javascript just-in-time compilation backend altivec acceleration adds glue code enable interface features firefox 4 later still work mac os x tiger led favorable reviews speed performance older macintosh computers due compatibility older operating system browser lacks entire feature set modern firefox versions particular fully support core text understand apple advanced typography features certain international fonts support graphics acceleration compositing support webgl powerpc tiger support opengl 2 furthermore security maintainability reasons npapi plugins support deprecated subsequently removed
Internet protocols
ibm cross system product ibm cross system product csp application generator intended create online systems ibm mainframe platforms introduced 1981 csp consisted set source code generators allowed developers interactively define test generate execute application programs csp composed two products csp version 3 released 1986 extended functions 1987 saa announcement cast doubt ibm commitment csp – n't silent csp dismembered it. last version csp version 4.1 went support end 2001 1994 ibm released successor product called visualgen incorporated ability develop client/server applications particularly addition graphical user interfaces guis applications ability access data non-ibm vendors ’ data stores ability execute application operating environments beyond mainframe 1996 product renamed visualage generator visualage generator withdrawn service 2009 succeeded rational business developer
Programming language topics
fallacies distributed computing fallacies distributed computing set assertions made l peter deutsch others sun microsystems describing false assumptions programmers new distributed applications invariably make fallacies list fallacies generally came sun microsystems l. peter deutsch one original sun fellows credited penning first seven fallacies 1994 however bill joy tom lyon already identified first four fallacies networked computing article claims dave lyon mistake around 1997 james gosling another sun fellow inventor java added eighth fallacy
Distributed computing architecture
champion boxing yu suzuki described champion boxing minor project little staff said allowed learn process games development little pressure game understaffed designers suzuki actually contributed drawings various punching animations according suzuki game developed sg-1000 first arcade version created simply installing sg-1000 arcade cabinet pengo makes cameo ko
Computer architecture