text
stringlengths 6
1.88M
| source
stringclasses 13
values |
---|---|
new south wales heritage database new south wales heritage database state heritage inventory online database information historic sites new south wales australia statutory heritage listings holds information sites listed new south wales state heritage register 1,650 entries addition sites heritage lists managed new south wales local government authories statutory heritage registers important note online database holding information historic sites heritage register historic site multiple entries database listed multiple heritage registers example young railway station three heritage registers therefore three entries database database licensed cc-by except material identified copyright third parties
|
Databases
|
personal editor personal editor pe personal editor ii pe2 text editor developed ibm ibm pc dos ms-dos 1980s became popular easy fast programmable custom keyboard shortcuts user interface pe influenced successor text editors personal editor 32 modern 32-bit editor user interface based pe2/pe3 qe text editor linux systems asia-pacific region ibm japan released dbcs version personal editor ibm 5550 ps/55 available ibm lineup years although e editor came pc dos since version 6.1
|
Computer architecture
|
winn schwartau winn schwartau born july 1 1952 new york city expert security privacy infowar cyber-terrorism related topics known appearances defcon host popular game hacker jeopardy provocative original ideas written dozen works security topics 2002 honored “ power thinker ” one 50 powerful people networking network world 2008 voted one 25 influential people security industry security magazine first non-fiction book information warfare chaos electronic superhighway 1994 1996 1997 introduces concepts cyberterrorism public another books cybershock 2000 2001 non-technical look def con conference hackers general phreaking importance computer security wrote time based security outlining use time security metric pearl harbor dot com novel terrorist cyberattack united states 2001 winn labeled one network world major power thinkers network world 2007 sc magazine labeled one top 5 security thinkers called civilian architect information warfare identified one 25 influential people security industry schwartau author internet computer ethics kids parents teachers without clue 2001/2002 dr. fred cohen all.net described book “ best security book ever written ” latest work analogue network security released august 8th 2018 bsides las vegas schwartau chairman board mobile active defense specializing security compliance smartphones tablets president founder security awareness company formerly known interpact inc. develops security awareness programs private public organisations also founded infowarcon 1994 trusted learning 2003 co-founded scipp international 2007
|
Computer security
|
directory assistance service directory assistance service das obsolete protocol service accessing x.500 directory services das intended provide lightweight means clients access x.500 directory services via split-directory user agent model directory user agent dua directory client split directory assistance da client directory assistant directory user would interact da-client da-client would communicate directory assistant using da protocol directory assistant would communicate directory service using x.500 directory access protocol dap directory assistant directory assistance protocol dap gateway design allows da-client access directory without requiring support cumbersome open systems interconnection protocol stack directory assistance service created 1990 marshall rose performance systems international inc. formally specified rfc 1202 published 1991 evolution dish client/server interface quipu developed colin robbins university college london related efforts dixie lead development lightweight directory access protocol ldap replaced directory assistance service
|
Internet protocols
|
entity–relationship model entity–relationship model er model describes interrelated things interest specific domain knowledge basic er model composed entity types classify things interest specifies relationships exist entities instances entity types software engineering er model commonly formed represent things business needs remember order perform business processes consequently er model becomes abstract data model defines data information structure implemented database typically relational database entity–relationship modeling developed database design peter chen published 1976 paper however variants idea existed previously er models show super subtype entities connected generalization-specialization relationships er model used also specification domain-specific ontologies entity–relationship model usually result systematic analysis define describe important processes area business define business processes presents business data schema graphical form usually drawn graphical form boxes entities connected lines relationships express associations dependencies entities er model also expressed verbal form example one building may divided zero apartments one apartment located one building entities may characterized relationships also additional properties attributes include identifiers called primary keys diagrams created represent attributes well entities relationships may called entity-attribute-relationship diagrams rather entity–relationship models er model typically implemented database simple relational database implementation row table represents one instance entity type field table represents attribute type relational database relationship entities implemented storing primary key one entity pointer foreign key table another entity tradition er/data models built two three levels abstraction note conceptual-logical-physical hierarchy used kinds specification different three schema approach software engineering first stage information system design uses models requirements analysis describe information needs type information stored database data modeling technique used describe ontology i.e overview classifications used terms relationships certain area interest case design information system based database conceptual data model later stage usually called logical design mapped logical data model relational model turn mapped physical model physical design note sometimes phases referred physical design entity may defined thing capable independent existence uniquely identified entity abstraction complexities domain speak entity normally speak aspect real world distinguished aspects real world entity thing exists either physically logically entity may physical object house car exist physically event house sale car service concept customer transaction order exist logically—as concept although term entity one commonly used following chen really distinguish entity entity-type entity-type category entity strictly speaking instance given entity-type usually many instances entity-type term entity-type somewhat cumbersome people tend use term entity synonym term entities thought nouns examples computer employee song mathematical theorem etc relationship captures entities related one another relationships thought verbs linking two nouns examples owns relationship company computer supervises relationship employee department performs relationship artist song proves relationship mathematician conjecture etc model linguistic aspect described utilized declarative database query language errol mimics natural language constructs errol semantics implementation based reshaped relational algebra rra relational algebra adapted entity–relationship model captures linguistic aspect entities relationships attributes examples employee entity might social security number ssn attribute proved relationship may date attribute every entity unless weak entity must minimal set uniquely identifying attributes called entity primary key entity–relationship diagrams n't show single entities single instances relations rather show entity sets entities entity type relationship sets relationships relationship type examples particular song entity collection songs database entity set eaten relationship child lunch single relationship set child-lunch relationships database relationship set words relationship set corresponds relation mathematics relationship corresponds member relation certain cardinality constraints relationship sets may indicated well chen proposed following rules thumb mapping natural language descriptions er diagrams english chinese er diagrams peter chen physical view show data actually stored chen original paper gives example relationship roles describes relationship marriage two roles husband wife person plays role husband marriage relationship another person plays role wife marriage words nouns surprise naming things requires noun chen terminology also applied earlier ideas lines arrows crow's-feet diagrams owes earlier bachman diagrams chen relationship diagrams another common extension chen model name relationships roles verbs phrases also become prevalent name roles phrases owner owned correct nouns case owner possession thus person plays role owner car plays role possession rather person plays role owner etc use nouns direct benefit generating physical implementations semantic models person two relationships car possible generate names owner_person driver_person immediately meaningful modifications original specification beneficial chen described look-across cardinalities aside barker–ellis notation used oracle designer uses same-side minimum cardinality analogous optionality role look-across maximum cardinality crows foot merise elmasri navathe others preference same-side roles minimum maximum cardinalities recent researchers feinerer dullea et al shown coherent applied n-ary relationships order greater 2 dullea et al one reads 'look across notation used uml effectively represent semantics participation constraints imposed relationships degree higher binary feinerer says problems arise operate look-across semantics used uml associations hartmann investigates situation shows different transformations fail although reduction mentioned spurious two diagrams 3.4 3.5 fact also see next pages look-across interpretation introduces several difficulties prevent extension simple mechanisms binary n-ary associations attributes drawn ovals connected line exactly one entity relationship set cardinality constraints expressed follows attributes often omitted clutter diagram diagram techniques often list entity attributes within rectangles drawn entity sets related diagramming convention techniques crow foot notation beginning dates back article gordon everest 1976 used barker notation structured systems analysis design method ssadm information technology engineering crow foot diagrams represent entities boxes relationships lines boxes different shapes ends lines represent relative cardinality relationship crow foot notation used consultancy practice caci many consultants caci including richard barker subsequently moved oracle uk developed early versions oracle case tools introducing notation wider audience notation relationships attributes necessary relationships promoted entities right example necessary capture artist performed song new entity performance introduced attributes reflecting time place relationship artist song becomes indirect relationship via performance artist-performs-performance performance-features-song three symbols used represent cardinality symbols used pairs represent four types cardinality entity may relationship inner component notation represents minimum outer component represents maximum using modeled database users encounter two well known issues returned results mean something results assumed query author first 'fan trap occurs master table links multiple tables one-to-many relationship issue derives name way model looks drawn entity–relationship diagram linked tables 'fan master table type model looks similar star schema type model used data warehouses trying calculate sums aggregates using standard sql master table unexpected incorrect results solution either adjust model sql issue occurs mostly databases decision support systems software queries systems sometimes includes specific methods handling issue second issue 'chasm trap chasm trap occurs model suggests existence relationship entity types pathway exist certain entity occurrences example building one-or-more rooms hold zero-or-more computers one would expect able query model see computers building however computers currently assigned room repair somewhere else shown list another relation building computers needed capture computers building last modelling issue result failure capture relationships exist real world model see entity-relationship modelling 2 details semantic model model concepts sometimes called platform independent model intensional model latest since carnap well known extensional model one maps elements particular methodology technology thus platform specific model uml specification explicitly states associations class models extensional fact self-evident considering extensive array additional adornments provided specification provided prior candidate semantic modelling languages uml data modeling notation part 2 peter chen father er modeling said seminal paper original 1976 article chen explicitly contrasts entity–relationship diagrams record modelling techniques several authors also support chen program chen accord philosophic theoretical traditions time ancient greek philosophers socrates plato aristotle 428 bc modern epistemology semiotics logic peirce frege russell plato associates knowledge apprehension unchanging forms forms according socrates roughly speaking archetypes abstract representations many types things properties relationships one another
|
Databases
|
network redirector dos windows network redirector redirector operating system driver sends data receives data remote device network redirector provides mechanisms locate open read write delete files submit print jobs provides application services named pipes mailslots application needs send receive data remote device sends call redirector redirector provides functionality presentation layer osi model networks hosts communicate use client software shells redirectors requesters microsoft networking network redirectors implemented installable file system ifs drivers
|
Operating systems
|
dru lavigne dru lavigne network systems administrator instructor technical writer director freebsd foundation using freebsd since 1996 authored several bsd books spent 10 years developing training materials providing training administration freebsd systems prolific author written o'reilly techrepublic dnsstuff openlogic contributed linux hacks hacking linux exposed author bsd hacks best freebsd basics third latest book definitive guide pc-bsd released march 2010 decade experience administering teaching netware microsoft cisco checkpoint sco solaris linux bsd systems writes widely read technical blog year life bsd guru toolbox.com founder current chair bsd certification group inc. non-profit organization mission create standard certifying bsd system administrators also community manager pc-bsd freenas projects making responsible dealing issues relating community relations administration various forums also principal author executive editor documentation projects since 22 january 2013 committer category doc freebsd project
|
Operating systems
|
valis fantasm soldier also known either valis fantasm soldier video game developed wolf team published telenet japan 1986 originally pc-88 msx home computers ported remade re-released several systems years first video game valis series stars japanese teenager named yuko uses mystical sword called valis defend earth worlds critical reception varied depending version including critical acclaim 1992 pc engine remake original pc-88 msx version valis fantasm soldier side-scrolling platform game wielding game titular sword main character fights level enemies jumping across ledges confronts boss end level certain points game gameplay pauses cinematic cutscenes regarding game storyline play also gameplay-tweaked content-cut version fm-7 family computer famicom side-scrolling action role-playing game version valis differs considerably versions game basic plot remains gameplay moved linear stage design larger maze-style levels multiple paths often questionable design resulting high difficulty level especially since neither password save system mega drive/genesis remake features gameplay system similar later games series particular valis iii like side-scrolling games era four d-pad buttons move character three fire buttons perform three actions main character sliding jumping swinging sword upgraded three stages alternative firing modes player also use magic spells gaining defeating bosses pc engine remake features improvements gameplay system single high jumps instead two-phase jumps sliding move damaging enemies voiced cutscenes mobile remake added new stages alternate costumes voiced sumi shimamoto schoolgirl late 1980s japan fated protect three different realms – earth land spirits vecanti dream world – wielding mystical sword known valis demon lord voiced hideyuki tanaka extinguishes light vecanti functions source power live desperate plea salvation queen voiced yoshiko sakakibara reaches brave soul help time despair yuko earth one answers call summoned magical forces vecanti liberate evil rogles brainwashes yūko classmate girlfriend voiced yūko mita helping try put end valis warrior increasingly difficult odds yuko prevails although reiko killed process memory returns dies yuko arms original pc-88 msx developed wolf team published telenet japan tokuma shoten would later develop release almost completely redone version famicom 1987 japan 1991 telenet renovation united states released versions mega drive/genesis developed riot enhanced remake mega drive version also developed riot released telenet pc engine super cd-rom² add-on 1992 2005-2006 bandai namco released another remake game time mobile phone platforms japan project egg released various emulated versions game windows along compilation complete plus came soundtrack cd figure pc engine version released konami playstation store 2010 2014 given free japanese subscribers playstation network service short promotional anime sunrise directed hideaki anno katsuhiko nishijima featuring music kohei tanaka released 1987 vhd attached issue anime vision magazine artist pixel responsible game character design also published three doujinshi books orchestral arrangement game soundtrack released 2011 also one video games adapted kouta hirano manga titled published gamest comics collection april 1999 sam derboo hardcore gaming 101 wrote original versions might horrible unplayable mess call fame begin n't gameplay pioneering cinematic cutscenes two years even ninja gaiden ... left quite excellent chiptune music really part original valis worth remembered derboo described family computer version typical famicom action rpg competently executed super obfuscate endlessly frustrating nevertheless msx club highly recommended msx version excellent action game even arcades gave score 9/20 mega drive genesis remake received rather mediocre mostly positive review scores west including 65 sega visions 76 consoles+ 65 joystick 5/10 asm hardcore gaming 101 derboo opined valis genesis n't bad game definitely leagues original still particularly enjoyable slow boring sega force bashed dull repetitive gameplay declared high graphical content low playability level valis nutshell hand pc engine turbografx version valis acclaimed critics review scores included 81 consoles 78 génération 4 77 joypad 83 joystick according hardcore gaming 101 mechanics level design doubt well-executed game entire series still bit derivative pedestrian counted among genre greats like castlevania ninja gaiden least high second tier retro gamer highlighted arguable best entry great series lucas m. thomas ign included valis among top ten unreleased turbografx games 're kind gamer likes know exact color panties worn platforming hero girls valis want invest time game followed three sequels valis ii valis iii valis iv eroge spin-off valis x two manga series
|
Computer architecture
|
black hole networking networking black holes refer places network incoming outgoing traffic silently discarded dropped without informing source data reach intended recipient examining topology network black holes invisible detected monitoring lost traffic hence name common form black hole simply ip address specifies host machine running address host assigned even though tcp/ip provides means communicating delivery failure back sender via icmp traffic destined addresses often dropped note dead address undetectable protocols connectionless unreliable e.g. udp connection-oriented reliable protocols tcp rudp either fail connect dead address fail receive expected acknowledgements firewalls routers household use configured silently discard packets addressed forbidden hosts ports resulting small large black holes network personal firewalls respond icmp echo requests ping designated vendors stealth mode despite networks ip addresses hosts firewalls configured way easily distinguished invalid otherwise unreachable ip addresses encountering latter router generally respond icmp network rsp host unreachable error nat used home office routers generally effective way obscuring layout internal network null route black hole route network route routing table entry goes nowhere matching packets dropped ignored rather forwarded acting kind limited firewall act using null routes often called blackhole filtering rest article deals null routing internet protocol ip black hole filtering refers specifically dropping packets routing level usually using routing protocol implement filtering several routers often dynamically respond quickly distributed denial-of-service attacks remote triggered black hole filtering rtbh technique provides ability drop undesirable traffic enters protected network internet exchange ix provider usually acquires technology help members participants filter attack null routes typically configured special route flag also implemented forwarding packets illegal ip address 0.0.0.0 loopback address null routing advantage classic firewalls since available every potential network router including modern operating systems adds virtually performance impact due nature high-bandwidth routers null routing often sustain higher throughput conventional firewalls reason null routes often used high-performance core routers mitigate large-scale denial-of-service attacks packets reach bottleneck thus avoiding collateral damage ddos attacks — although target attack inaccessible anyone blackhole filtering also abused malicious attackers compromised routers filter traffic destined certain address routing typically works internet protocol layer limited packet classification bound stateless due nature ip routers typically classification limited destination ip address prefix source ip address incoming network interface dns-based blackhole list dnsbl real-time blackhole list rbl list ip addresses published internet domain name system dns either zone file used dns server software live dns zone queried real-time dnsbls often used publish addresses computers networks linked spamming mail server software configured reject flag messages sent site listed one lists term blackhole list sometimes interchanged term blacklist blocklist dnsbl software mechanism rather specific list policy dozens dnsbls existence use wide array criteria listing delisting addresses may include listing addresses zombie computers machines used send spam listing addresses isps willingly host spammers listing addresses sent spam honeypot system since creation first dnsbl 1997 operation policies lists frequently controversial internet advocacy occasionally lawsuits many email systems operators users consider dnsbls valuable tool share information sources spam others including prominent internet activists objected form censorship addition small number dnsbl operators target lawsuits filed spammers seeking lists shut altogether firewalls incorrectly discard icmp packets including ones needed path mtu discovery work correctly causes tcp connections from/to/through hosts lower mtu hang black hole e-mail address e-mail address valid messages sent generate errors messages sent automatically deleted never stored seen humans addresses often used return addresses automated e-mails
|
Computer security
|
yamaha v9938 yamaha v9938 video display processor vdp used msx2 home computer well geneve 9640 enhanced ti-99/4a clone yamaha v9938 also known msx-video vdp video display processor successor texas instruments tms9918 used msx1 various systems v9938 turn succeeded yamaha v9958 msx screen modes often referred assigned number msx-basic mapping follows v9938 programmer guide http //rs.gr8bit.ru/documentation/v9938-programmers-guide.pdf
|
Computer architecture
|
computersupport.com stratuspointit formerly known computersupport.com technology knowledge customer service based company located natick massachusetts since 2006 stratuspointit managed services systems management support firm provides platform cloud computing network monitoring outsourcing services across various locations united states stratuspointit serves industries legal financial manufacturing sectors computersupport.com founded 2006 immigrants united states kirill bensonoff alexandric ho founders professional consultants focused network planning design microsoft technologies prior founding stratuspointit founders met working insight enterprises company originally organized spirinet technology services llc renamed computersupport.com later stratuspointit 2013 conjunction citrix systems computersupport released next generation itanywhere cloud service october 2014 computersupport.com acquired vp solutions inc framingham massachusetts.the company noted market position cloud computingand desktop servicespaces 2015 computersupport.com influenced launch unigma application aimed helping csps cloud service providers companies monitor iaas clouds unigma acquired kaseya 2017 2016 computersupport.com launched noc solution — dubbed itanywhere noc — middle market enterprises noc offers around-the-clock network server cloud monitoring escalation remediation services computersupport.com organized following business units
|
Distributed computing architecture
|
superscan superscan free connect-based port scanning software designed detect open tcp udp ports target computer determine services running ports run queries whois ping icmp traceroute hostname lookups superscan 4 completely rewritten update superscan version 3 released 2000 features windows enumeration list variety important information dealing microsoft windows superscan tool used system administrators crackers script kiddies evaluate computer security system administrators use test possible unauthorized open ports computer networks whereas crackers use scan potentially insecure port order gain illegal access system
|
Computer security
|
enterprise archive solution enterprise archive solution eas enterprise file social media email archiving software program originally developed educom 2000 eas subsequently acquired zantaz autonomy hp currently owned capax discovery enterprise archive solution ability archive content various sources microsoft exchange microsoft sharepoint various file systems ntfs social media twitter facebook instant messaging microsoft skype enterprise archive solution eas previously called exchange archive solution originally developed educom ts inc. ottawa-based software development firm first release eas occurred march 15 2000 eas sold commercial software local installation eas designed archive content microsoft exchange help organizations comply legal requirements e-mail retention reduce storage load microsoft exchange improve backup .pst file management 2000 2004 educom released multiple new versions gained market share eventually acquired zantaz inc. 2004 next year zantaz added additional functionality released version 4.0 officially renamed product enterprise archive solution 2005 eas used 2 million users globally leading solution archiving market characterized analyst idc 2007 zantaz customers included 9 10 top global law firms 11 fortune 25 14 top 20 financial securities firms july 24 2007 eas acquired autonomy inc. cambridge uk shortly acquisition autonomy announced eas integrated autonomy ’ idol search technology analyst gartner repeatedly rated zantaz autonomy archiving solution one top three market october 3 2011 eas acquired hp inc. palo alto ca july 29 2014 eas acquired capax discovery inc. headquartered morristown nj website archiving solution windows file servers
|
Computer security
|
indexed database api indexed database api commonly referred indexeddb javascript application programming interface api provided web browsers managing nosql database json objects standard maintained world wide web consortium w3c alternative web storage standard indexeddb provide storage capacity web storage fixed limits per website indexeddb limits usually quite large exist use cases indexeddb include caching web application data offline availability browser modules devtools extensions may also use storage support indexeddb added firefox version 4 google chrome version 11 internet explorer version 10 safari eventually added support version 8 web sql database prior api developed apple firefox refused add support argued becoming standard would codify quirks sqlite thus deprecated favor indexeddb
|
Databases
|
open information extraction natural language processing open information extraction oie task generating structured machine-readable representation information text usually form triples n-ary propositions proposition understood truth-bearer textual expression potential fact e.g. dante wrote divine comedy represented amenable structure computers e.g. dante wrote divine comedy oie extraction normally consists relation set arguments instance dante passed away ravenna proposition formed relation passed away arguments dante ravenna first argument usually referred subject second considered object extraction said textual representation potential fact elements linked knowledge base furthermore factual nature proposition yet established example transforming extraction full fledged fact would first require linking possible relation arguments knowledge base second truth extraction would need determined computer science transforming oie extractions ontological facts known relation extraction fact oie seen first step wide range deeper text understanding tasks relation extraction knowledge-base construction question answering semantic role labeling extracted propositions also directly used end-user applications structured search e.g. retrieve propositions dante subject oie first introduced textrunner developed university washington turing center headed oren etzioni methods introduced later reverb ollie clausie csd helped shape oie task characterizing aspects high level approaches make use set patterns generate extractions depending particular approach patterns either hand-crafted learned reverb suggested necessity produce meaningful relations accurately capture information input text instance given sentence faust made pact devil would erroneous produce extraction faust made pact since would adequately informative precise extraction would faust made pact devil reverb also argued generation overspecific relations ollie stressed two important aspects oie first pointed lack factuality propositions instance sentence like john studies hard pass exam would inaccurate consider john pass exam fact additionally authors indicated oie system able extract non-verb mediated relations account significant portion information expressed natural language text instance sentence obama former us president born hawaii oie system able recognize proposition obama former us president clausie introduced connection grammatical clauses propositions oie extractions authors stated grammatical clause expresses proposition verb mediated proposition identified solely recognizing set clauses expressed sentence implies correctly recognize set propositions input sentence necessary understand grammatical structure authors studied case english language admits seven clause types meaning identification proposition requires defining seven grammatical patterns finding also established separation recognition propositions materialization first step proposition identified without consideration final form domain-independent unsupervised way mostly based linguistic principles second step information represented according requirements underlying application without conditioning identification phase consider sentence albert einstein born ulm died princeton first step recognize two propositions albert einstein born ulm albert einstein died princeton information correctly identified propositions take particular form required underlying application e.g. albert einstein born ulm albert einstein died princeton csd introduced idea minimality oie considers computers make better use extractions expressed compact way especially important sentences subordinate clauses cases csd suggests generation nested extractions example consider sentence embassy said 6,700 americans pakistan csd generates two extractions 6,700 americans pakistan ii embassy said usually known reification
|
Computational linguistics
|
vtun vtun networking application set virtual tunnels tcp/ip networks supports internet protocol ip point-to-point protocol ppp serial line internet protocol slip protocols exists reference implementation tun/tap user-space tunnel driver included linux kernel version 2.4 also originally developed maxim krasnyansky bishop clark current maintainer like applications nature vtun creates single connection two machines multiplexes traffic vtun connections initiated via tcp connection client server server initiates udp connection client udp protocol requested software allows creation tunnels routing traffic manner similar ppp well bridge-friendly ethertap connection vtun uses private shared key negotiate handshake via challenge response continual source concern target one strongly worded security assessment vtun server client binary applications completely built without encryption support binaries used encryption endpoints simple xor cipher completely trivial decode type build supported developers
|
Internet protocols
|
opera mobile opera mobile mobile web browser smartphones tablets pdas developed opera software first devices run mobile edition opera psion series 5 psion series 5mx psion series 7 psion netbook ran opera mobile 3.6 released 2000 opera mobile ported windows mobile operating system 2003 opera mobile used presto layout engine version 15 replaced webkit|webkit blink layout engine |blink supports many web standards well ajax programming |ajax version 9.7 use opera turbo compresses web pages via opera software turbo servers thus reducing download size web pages compressed page loading times improved bandwidth consumption reduced 80 browser dynamically reformat web page small screen using opera small screen rendering ssr technology word wrap|text-wrapping opera mobile 10 includes features opera web browser speed dial|speed dial feature allows user add links shown thumbnail images page displayed new tab opened set feature allows user easily navigate selected web pages tab gui |visual tabs allow browsing multiple web sites one time also includes password manager pop-up ad|pop-up handler supports copy paste autocomplete|address auto-complete page zooming|zooming history bookmark web |bookmarks removed opera mobile 15 browser used either using finger-touch stylus touchscreen keypad displayed portrait landscape mode category opera software|mobile category mobile web browsers category pocket pc software category symbian software category android web browsers category windows internet software de opera opera mobile opera browser opera mobile ro opera navigator web opera mobile pentru dispozitive mobile
|
Internet protocols
|
cross-domain solution cross-domain solution cds means information assurance provides ability manually automatically access transfer information two differing security domains integrated systems hardware software enable transfer information among incompatible security domains levels classification modern military intelligence law enforcement operations critically depend timely sharing information cds distinct rigorous approaches supports transfer would otherwise precluded established models computer network data security e.g. bell–lapadula model clark–wilson model cds development assessment deployment based risk management goal cds allow isolated critical network exchange information others without introducing security threat normally comes network connectivity three primary elements demanded cross domain solutions acceptance criteria information transfer across domains cross-domain interoperability may simple e.g antivirus scanning transfer low high security domains complex e.g multiple human reviewers must examine approve document release high security domain one-way data transfer systems one-way traffic systems data diodes often used move information low security domains secret enclaves assuring information escape cross-domain solutions often include high assurance guard get good foundation cross domain solution deployment visit disa mission partners website watch following instructional videos • cds 101 cbt 11 minutes • cds cap cbt 12 minutes • dsawg 101 cbt 17 minutes though cross-domain solutions 2019 historically typical military intelligence law enforcement environments also use case cross domain solutions industry many industrial settings control systems analytic systems different security domains one example flight control infotainment systems airliner given wide variety use cases industry different levels third party accreditation certification aspects cross-domain solution appropriate different applications found among different providers previous decades multilevel security mls technologies developed implemented enabled objective deterministic security left little wiggle room subjective discretionary interpretation enforced mandatory access control mac near certainty rigidity prevented simpler solutions would seem acceptable surface automated information systems enabled extensive information sharing sometimes contrary need avoid sharing secrets adversaries need information sharing led need depart rigidity mac favor balancing need protect need share ‘ balance ’ decided discretion users access control called discretionary access control dac tolerant actions manage risk mac requires risk avoidance allowing users systems manage risk sharing information way contrary original motivation mac unintended consequences sharing complex analyze necessarily left discretion users may narrow focus critical need documents provide standards guidance risk management unified cross domain management office ucdmo cross domain overlay 1 december 2011 ver 1.0 provides extensive security control guidance implement cds platform address security controls hardware software enforced advanced inspections
|
Computer security
|
record lodoss war record lodoss war created 1986 group sne dungeons dragons replay serialized japanese magazine comptiq 1986 1988 though also used setting systems tunnels trolls runequest replays novels transcripts rpg sessions meant hold interest readers convey events took place proven popular even play role-playing games fans fiction including fantasy fiction similar light novels many characters parties replays become popular characters anime example character female elf deedlit record lodoss war played science fiction novelist hiroshi yamamoto rpg sessions popularity record lodoss war replays dungeon master ryo mizuno started adapt story earliest japanese-language domestic high fantasy novels 1988 replay series went become trilogy group sne abandon dungeons dragons rules create game dubbed record lodoss war companion released 1989 three parts replay series eventually published paperbacks kadokawa shoten 1989 1991 mizuno novelizations published kadokawa shoten 1988 1993 followed two collections short stories 1995 illustrations done yutaka izubuchi first volume forms basis first eight episodes record lodoss war ova series well record lodoss war grey witch manga series second also adapted manga form four-cd radio drama final five episodes ova series loosely based story told across third fourth novels caught ongoing novelization point feature original ending record lodoss war chronicles heroic knight tv series faithful adaptation volumes three seven first collection short stories adapted record lodoss war deedlit tale manga series mizuno later went pen two series novels prequel titled 1994 2002 5 volumes sequels 1993 1996 4 volumes 1998 2006 6 volumes prequel forms basis record lodoss war lady pharis manga series legend crystania adapted manga anime film ova series record lodoss war recounts adventures youth name parn son dishonored knight part motivation adventuring find happened father restore family honor despite inexperience parn considered leader accompanied childhood best friend etoh friend sometimes advisor slayn later slayn lover leylia newfound mentor ghim accompanied parn romantic interest high elf deedlit comes forest return seeking answer people isolationism end sees slow march extinction thief named woodchuck throughout series parn comes contact friends foes alike allies include king kashue king fahn shiris orson enemies include emperor beld ashram evil necromancer wagnard manga adaption anime derivative chronicles heroic knight continues adventures parn first eight episodes focuses spark adventures complete quest tasked onto protect neese daughter slayn leylia accompanied cast friends form leaf garrack greevus aldo ryna television series shares similarities plot ova wagnard seeking kidnap neese order use reagent resurrection naneel priestess avatar kardis slain leylia mother high priestess neese short time battle demonic god leylia reincarnation naneel lost virginity longer capable doorway reagent needed unseal naneel third series legend crystania places former villain ashram seat would-be hero placed spell god beast crystania series focuses pirotess dark elven lover tries find way free clutches spell restore back living self original ova series tv series released north america central park media vhs dvd ova tv series slated blu-ray release media blasters dropped plans re-release series april 14 2017 funimation announced license ova series chronicles heroic knight tv series released ova blu-ray dvd tv series dvd one set july 18 2017 japanese online game company gameon announced acquired global license make online game computers mobile phones based record lodoss war fantasy franchise kadokawa production slowcurve ryo mizuno novelist co-creator franchise serve supervisor development online game gameon plans release game outside japan gameon also said new game browser-based game record lodoss war online released february 2016 first three original stories novel series sold 10 million copies japan
|
Computer architecture
|
erwin data modeler erwin data modeler stylized erwin formerly erwin computer software data modeling originally developed logic works erwin since acquired series companies spun-off private equity firm parallax capital partners acquired incorporated separate entity erwin inc. managed ceo adam famularo software ’ engine based idef1x method although also supports diagrams displayed variant information technology engineering notation well dimensional modeling notation erwin created logic works based princeton new jersey may 1993 logic works released erwin/erx version tool designed work conjunction powerbuilder database models created using erwin could translated software built powerbuilder integrated development environment ide may 1995 logic works erwin expanded include several ides adding sqlwindows gupta technologies visual basic microsoft 1996 erwin among several data modeling software solutions used facilitate wide move client–server model database management 1998 logic works acquired platinum technology later acquired may 1999 computer associates ca erwin initially made part ca ’ jasmine suite later added new allfusion suite name allfusion erwin data modeler tool later renamed ca erwin data modeler 2014 embarcadero technologies sought acquire product ca inc acquisition blocked department justice anti-competitive concerns april 2016 parallax capital partners private equity firm acquired software ca technologies appointed adam famularo ceo company operates new name stylized erwin inc september 2016 erwin announced acquired corso british enterprise architecture service provider december year erwin acquired business process modeling software casewise plan integrate two 2017 erwin released data modeler nosql enterprise-class data modeling solution mongodb april 2018 nosql data modeling support couchbase added also year erwin launched data governance solution impact analysis integrations business process enterprise architecture data modeling suites january 2018 company acquired data harvesting technology data governance consulting services company p consulting also developed erwin edge software platform edge acronym “ enterprise data governance experience ” intending use data governance data-driven insights help accomplish organizational objectives february 2018 erwin released first state data governance report ubm august 2018 erwin acquired metadata management data governance company analytix ds core erwin computer-aided software engineering tool case tool users utilize erwin data modeler way take conceptual data model create logical data model dependent specific database technology schematic model used create physical data model users forward engineer data definition language required instantiate schema range database-management systems software includes features graphically modify model including dialog boxes specifying number entity–relationships database constraints indexes data uniqueness erwin supports three data modeling languages idef1x variant information technology engineering developed james martin form dimensional modeling notation software also allows users generate data models reverse-engineering pre-existing databases based several different formats another included feature erwin ’ ability create reusable design standards “ including naming standards data type standards model templates more. ” software includes several features modifying data model displayed including options several colors fonts diagrams subject areas layouts erwin ’ complete compare feature allows user compare two versions model displays differences allows merging updates either direction march 2016 software bundle also includes report designer erwin dm 2018 update included netezza mysql 8.x postgresql 10.4 hive model counts reports pii support 2019 update included db2 z/os v12 sql server 2017 teradata v16.20 postgresql 11.2 addition reporting enhancements like user-defined properties filters beginning 1992 united nations development programme undp one larger organizations utilize erwin integrate many independent databases located 120 field offices undp used erwin develop “ corporate data model ” goal “ reducing redundant data entry ” create single database framework based “ future systems designed ” erwin used reverse-engineer existing data field offices also move data computer associates ’ idms sybase ’ unixrdbms 2001 insurance company aetna used erwin data modeler automate maintenance database table definitions aetna ’ database consisted 15,000 table definitions became difficult maintain manually 2002 erwin among products used new york power authority software also use utah state office education 2006
|
Databases
|
salvatore j. stolfo salvatore j. stolfo tenured professor computer science columbia university new york leading expert computer security known research machine learning applied computer security intrusion detection systems anomaly detection algorithms systems fraud detection parallel computing born brooklyn new york stolfo received bachelor science degree computer science mathematics brooklyn college 1974 received ph.d. nyu courant institute 1979 faculty columbia ever since ’ taught courses artificial intelligence intrusion anomaly detection systems introduction programming fundamental algorithms data structures knowledge-based expert systems columbia stolfo received close 50m funding research broadly focused security intrusion detection anomaly detection machine learning includes early work parallel computing artificial intelligence published co-authored 250 papers 21,000 citations h-index 67 pioneered research number areas within computer security widely use today 1996 proposed project darpa applies machine learning behavioral patterns detect fraud intrusion networks approach security recently emerged within industry user behavior analytics earlier research machine learning algorithms applied credit card fraud adopted throughout financial industry stolfo students dan miranker mike van biema alexander pasik steve taylor designed architecture software systems dado parallel computer example fifth generation computer sponsored darpa high performance parallel computing initiative mid-1980s dado research group designed built lab columbia university fully functional 1023-processor version machine first parallel machine providing large-scale commercial speech recognition services dado occupied 2 cubic feet cabinet space dado tested sea navy research vessel test capabilities related acoustic analyses detection capabilities parallel broadcast resolve/report function introduced dado machine apparently influenced part design ibm blue gene parallel computer dado technology first invention claimed columbia university ownership faculty member intellectual property 1980 bayh-dole act company called fifth generation computer formed columbia outside investors commercialize dado machine company subsequently developed commercially deployed speech recognition system operated qwest dispute small company large telecommunications provider columbia university caused six-year detour us court system ultimately stolfo prevailed dado introduced parallel computing primitive “ broadcast resolve report ” hardwire implemented mechanism today called mapreduce among earliest work stolfo along colleague greg vesonder bell labs developed large-scale expert data analysis system called ace automated cable expertise nation phone system bell labs distributed ace number telephone wire centers improve management scheduling repairs local loop ace likely first system combine rule-based inference ai expert system relational database management system cras system serves model deductive data base systems subject matter research many years database community ace first expert system kind commercialized widely distributed work related merge/purge problem sometimes referred “ record linkage ” “ data deduplication ” algorithm developed student mauricio hernandez used large-scale commercial systems data cleansing identifying purging duplicates large data sets important part large-scale data analysis systems especially commercial data analytics algorithms invented provided means scaling large data sets balancing requirement produce accurate results presence arbitrary noise error data base patented technology licensed informix company later acquired ibm darpa ids evaluation datasets constructed lincoln labs 1998 1999 darpa cyber panel program network trace data sets used evaluate performance different intrusion detection systems network trace data ground truth available open research community data however difficult use directly wider community data mining researchers stolfo associates ids lab including wenke lee created kdd cup dataset derived darpa ids datasets darpa network trace data converted connection records making data suitable data mining researchers test various machine learning algorithms data created community service extensively used ids research even today stolfo consulted cto citibank several years conducted research machine learning algorithms applied credit card fraud problem much work students phil chan andreas prodromidis published meta-learning based strategies demonstrated improve accuracy fraud detectors substantially reduce loss due fraud stolfo early proponent collaborative security distributed ids technology systems stolfo students ke wang janek parehk developed fully functional ids alert exchange system introduced new means sharing sensitive data privacy-preserving manner technique involved communicating network packet content found anomalous verified attack converting raw packet content statistical representation allowing accurate correlation common attacks across sites method invented stolfo students share correlate content across administrative domains without disclosing sensitive information introduced use bloom filters storing n-gram content network packet datagrams method extensively studied continues used several ongoing experiments method also formed basis recent project colleagues steve bellovin tal malkin secure querying encrypted document databases without requiring insecure decryption document searching relevant content stolfo coined term fog computing confused fog computing technology used “ launch disinformation attacks malicious insiders preventing distinguishing real sensitive customer data fake worthless data. ” stolfo ’ proposed approach confuse confound traitor leveraging uncertainty reduce knowledge ordinarily systems data gain access without authorization fog computing systems integrate bait information systems generate alerts decoy misused 2005 stolfo received funding army research office conduct workshop bring together group researchers help identify research program focus insider threats since ids group columbia working researchers i3p developed several demonstration systems evidence insider malfeasance work includes user profiling techniques especially masquerader detection ruu spoken acronym studied stolfo student malek ben salem number decoy generation facilities studied jointly co-pi angelos keromytis student brian bowen emt system sponsored darpa contracts among first machine learning system incorporate social network analyses important security problems including spam detection virus propagation extensive set analyses emt developed stolfo student shlomo herskhop others allowed analysts forensics experts students researchers opportunity explore large corpora bail messages discover wide range important derivative knowledge communication dynamics user organization among applications emt models user behavior identify uncharacteristic bail flows indicative spam bots viral propagations toolkit downloaded well 100 users elements analyses introduced emt serve model analytical systems entire body analyses demonstrated general description ids network communication analysis systems conveniently described acronym cv5 student ang cui working stolfo ids lab invented concept embed arbitrary code legacy embedded devices symbiotic embedded machine technology demonstrated provide direct means inject security features operational cisco ios routers situ without significant performance degradation without negative impact routers primary function symbiote technology explored use number different platforms devices arm mips x86 several interesting applications especially large set existing insecure embedded devices found internet line work supported darpa crash program brought together large number computer science researchers focused clean slate design new generation safe secure computer systems preliminary work performed cui stolfo ids lab performed wide area scan internet counting number vulnerable devices date 1.1 million found founded 2011 red balloon security rbs cyber security company founded dr sal stolfo dr ang cui spinout ids lab rbs developed symbiote technology called frak host defense embedded systems sponsorship darpa cyber fast track program frak system provides core capability automatically unpack modify repack embedded system firmware install symbiote defenses currently developing products services based upon software symbiote technology created based ids lab research darpa active authentication anomaly detection multiple scales program dr sal stolfo dr. angelos keromytis founded allure security technologies using active behavioral authentication decoy technology stolfo pioneered patented 1996 allure brought technologies together novo active user behavior analytics security solution protects devices data loss intrusion allure ’ research supported columbia university national science foundation darpa dhs others founded 2009 allure security technology created based work done darpa sponsorship columbia ’ ids lab based darpa prompts research detect hackers inside organization perimeter continuously authenticate user without password electronic digital documents stolfo ’ company electronic digital documents produced “ datablade ” technology informix marketed strategy acquisition development mid 80 ’ stolfo ’ patented merge/purge technology called edd datacleanser datablade licensed informix since acquisition ibm 2005 ibm informix one world ’ widely used database servers users ranging world ’ largest corporations startups system detection one companies founded prof. stolfo commercialize anomaly detection technology developed ids lab company ultimately reorganized rebranded trusted computer solutions company recently acquired raytheon 2013 washington post interviewed dr. stolfo technology uses decoy data mislead hackers product soon vended allure security technology 2013 new york times reported dr. stolfo advisee ang cui intercepted operating system cisco ’ voip phones order spy remotely enabling transcribe conversations using google ’ voice-to-text translation 2012 scientific american covered pair ’ new “ symbiote ” program would detect invasions firmware code without slowing computer ’ speed 2011 adviser ang cui staged intrusion university printers nbc news interviewed stolfo topic cyber security
|
Computer security
|
multimedia database multimedia database mmdb collection related multimedia data multimedia data include one primary media data types text images graphic objects including drawings sketches illustrations animation sequences audio video multimedia database management system mmdbms framework manages different types data potentially represented wide diversity formats wide array media sources provides support multimedia data types facilitate creation storage access query control multimedia database multimedia database mmdb hosts one multimedia data types i.e text images graphic objects audio video animation sequences data types broadly categorized three classes additionally multimedia database mmdb needs manage additional information pertaining actual multimedia data information following last three types called metadata describe several different aspects media data media keyword data media feature data used indices searching purpose media format data used present retrieved information like traditional databases multimedia databases address following requirements multimedia databases ability uniformly query data media data textual data represented different formats ability simultaneously query different media sources conduct classical database operations across query support ability retrieve media objects local storage device good manner storage support ability take response generated query develop presentation response terms audio-visual media ability deliver presentation presentation delivery support examples multimedia database application areas
|
Databases
|
stratego/xt stratego/xt language toolset constructing stand-alone program transformation systems combines stratego transformation language xt toolset transformation components providing framework constructing stand-alone program transformation systems stratego language based programming paradigm called strategic term rewriting provides rewrite rules expressing basic transformation steps application rules controlled using strategies form subroutines xt toolset provides reusable transformation components declarative languages deriving new components parsing grammars using modular syntax definition formalism sdf implementing pretty-printing program transformations often operate modifying abstract syntax tree ast stratego also possible specify transformations using concrete syntax allows programmers express transformation using familiar often concise syntax object programming language internally still operates ast rule desugar do-while statement java rule using concrete syntax theoretical framework stratego called system first described paper eelco visser zine-el-abidine benaissa
|
Programming language topics
|
international multilateral partnership cyber threats international multilateral partnership cyber threats impact first united nations-backed cybersecurity alliance since 2011 impact serves key partner united nations un specialised agency icts international telecommunication union itu first comprehensive public-private partnership cyber threats impact serves politically neutral global platform brings together governments world industry academia enhance global community capabilities dealing cyber threats total 152 countries formally part itu-impact coalition strong support industry giants partners academia international organizations impact largest cybersecurity alliance kind headquartered cyberjaya malaysia impact operational home itu global cybersecurity agenda gca impact offers itu member states access expertise facilities resources effectively address cyber threats well assisting united nations agencies protecting ict infrastructures impact initiative first announced fifth prime minister malaysia closing ceremony 15th world congress information technology wcit 2006 held austin texas united states initially impact known 'international multilateral partnership cyber-terrorism 2008 following feedback member governments also impact international advisory board iab impact official launch world cyber security summit 2008 wcss words 'cyber terrorism impact name changed 'cyber threats reflect wider cybersecurity role impact global headquarters inaugurated 20 may 2009 built 28,400 square metre site seven-acre site built-up area 5,400 square metres 58,000 square feet modelled centers disease control prevention cdc atlanta united states impact operates global response centre grc nerve centre impact grc fully equipped crisis room communications facilities fully functional security operations centre soc well-equipped data centre on-site broadcasting centre vip viewing gallery grc involved securing objectives itu global cybersecurity agenda gca placing technical measures combat newly evolved cyber threats inauguration impact global headquarters prime minister malaysia secretary-general international telecommunication union impact global headquarters officially declared open 20 may 2009 5th prime minister malaysia tun abdullah bin ahmad badawi witnessed prime minister malaysia dato sri mohd najib bin tun abdul razak secretary-general itu hamadoun touré impact chairman datuk mohd noor amin grc impact provides global community network early warnings system news expert locator team management remediation automated threat analysis system trend libraries visualisation global threats country-specific threats incident case management trend monitoring analysis knowledge base reporting resolution finder among others impact formally became key partner itu united nations ’ un specialised agency following cooperation agreement signed world summit information society 2011 wsis forum geneva may 2011 cooperation agreement impact tasked itu responsibility providing cybersecurity assistance support itu 193 member states also organisations within un system memorandum agreement officially signed hamadoun touré secretary-general itu datuk mohd noor amin chairman impact itu head office geneva founded 1865 itu oldest organisation within un system functions un specialised agency information communication technologies impact involvement itu began 2008 named physical home itu global cybersecurity agenda gca gca international cybersecurity framework formulated following deliberations 100 leading experts worldwide gca contains many recommendations adopted implemented intended provide improved global cybersecurity memorandum understanding inked bangkok back 2008 impact named physical operational home gca addition 2011 wsis forum memorandum understanding mou signed itu united nations office drugs crime unodc see impact supporting organisations collaboration assist un member states mitigate risks posed cybercrime partner countries itu-impact also given access host specialised services including monitoring analysis alerts cyber threats impact global response centre grc acts global cyber threat resource centre provides emergency responses facilitate identification cyber threats sharing resources assist itu-unodc member states impact global response centre grc collaborates industry academia hosts comprehensive database cyber threats impact electronically secure collaborative application platform experts escape designed connect responsible cybersecurity 140 countries also provides response mechanism itu-impact partner countries three divisions within impact centre policy international cooperation centre training skills development centre security assurance research divisions provide consulting training services scholarships reports expertise governments industry academia partner countries international advisory board iab members included past members include vinton g. cerf vice president chief internet evangelist google howard schmidt former white house cyber security coordinator obama bush administrations united states america mikko hyppönen chief research officer f-secure john w. thompson former chairman board symantec corporation ayman hariri chairman oger systems advisory board management team consists mohd noor amin chairman management board mohamed shihab advisor technical mohamed zaini bin mazlan advisor administration anuj singh chief operating officer coo phillip victor director policy international cooperation mohamad sazly musa director security assurance
|
Computer security
|
memory management controller multi-memory controllers memory management controllers mmc different kinds special chips designed various video game developers use nintendo entertainment system nes cartridges chips extend capabilities original console make possible create nes games features original console offer alone basic nes hardware supports 40k rom total 32k prg 8k chr thus single tile sprite table possible limit rapidly reached within famicom first two years market game developers began requesting way expand console capabilities chips also known mappers cnrom earliest banking hardware introduced famicom appearing early 1986 consists single 7400 series discrete logic chip cnrom supports single fixed prg bank eight chr banks 96k total rom third party variations supported additional capabilities many cnrom games store game level data chr rom blank screen reading early nes mappers composed 7400 series discrete logic chips unrom appeared late 1986 supports single fixed 16k prg bank rest prg switchable instead dedicated rom chip hold graphics data called chr nintendo games using unrom store graphics data program rom copy ram cartridge run time mmc1 nintendo first custom mmc integrated circuit incorporate support saved games multi-directional scrolling configurations chip comes least five different versions mmc1a mmc1b1 mmc1b2 mmc1b3 mmc1c differences different versions slight mostly owing savegame memory protection behavior mmc1 chip allows switching different memory banks program rom selected 16kb 32kb chunks character rom selected 4kb 8kb chunks unusual feature memory controller input serial rather parallel 5 sequential writes bit shifting needed send command circuit mmc2 used mike tyson punch-out later rerelease replaced mike tyson single 8kb bank program rom selected remaining 24kb locked character rom selected two pairs 4kb banks would automatically switched video hardware attempts load particular graphic tiles memory thus allowing larger amount graphics used screen without need game manually switch mmc3 introduced 1988 adds irq timer allow split screen scrolling without sacrifice sprite 0 along two selectable 8kb program rom banks two 2kb+four 1kb selectable character rom banks allows easy instant swapping sprite tile data 8k save game ram supported chip used three games released famicom japan developed intelligent systems functionally nearly identical mmc2 difference mmc4 switches program rom 16kb banks instead 8kb banks support battery-backed sram save game data mmc5 nintendo advanced mmc originally also expensive koei used chip regularly similar konami vrc6 interrupt handling works differently chip 1kb extra ram two extra square wave sound channels one extra pcm sound channel support vertical split screen scrolling improved graphics capabilities making 16,384 different tiles available per screen rather 256 allowing individual 8x8-pixel background tile color assignment instead restricted one color set per 2x2 tile group highly configurable program rom character rom bank switching scanline-based irq counter mmc5 supports 2mb total rom however commercially released game exceeded 1mb mmc6 similar mmc3 additional 1 kb ram saved battery backup famicom disk system asic extended audio chip supports one channel single-cycle 6-bit × 64 step wavetable-lookup synthesis built phase modulator pm sound generation similar frequency modulation synthesis a*rom mmc named amrom anrom aorom cartridge boards use developed chris stamper rare manufactured nintendo found games developed rare nintendo tradewest gametek acclaim milton bradley allows prg rom switched single 32k piece uses chr ram 256k total rom unlike chips uses one screen mirroring nintendo maintained tight control internationally-released cartridge hardware allow third parties use pcbs mappers remained case late nes commercial lifespan restrictions eased thus third party mappers found famicom unlicensed cartridges vrc2 chip konami allows program rom switched 8kb banks character rom switched 1kb banks mmc two known revisions vrc2a vrc2b exclusively used japanese version salamander vrc6 virtual rom controller advanced mmc chip konami supporting bank switching program code graphics well cpu cycle–based irq counter also act scanline counter chip also contains support three extra sound channels two square waves eight duty cycles one sawtooth wave used akumajō densetsu japanese version western version uses mmc5 nintendo since nintendo entertainment system allow cartridges add additional sound channels famicom version soundtrack reworked follow specifications thus soundtrack western version implemented five sound channels built stock nes vrc7 advanced mmc chip konami supporting bank switching irq counting equivalent vrc6 also containing ym2413 derivative providing 6 channels fm synthesis audio advanced audio used famicom game lagrange point japanese version tiny toon adventures 2 also used vrc7 make use extended audio 163 used games exclusive japan capabilities little better nintendo mmc3 variant contained extra sound hardware plays 4-bit wave samples supports 1 8 extra sound channels audible aliasing appears sufficiently large number channels enabled fme-7 memory mapping circuit developed sunsoft use nes famicom cartridges switches program rom 8kb banks switches character rom 1kb banks also contains hardware generate irq signals specified number cpu clock cycles thus achieving split-screen effects minimal use processing power special version mmc labeled sunsoft 5b rather fme-7 contains version widely used yamaha ym2149 sound generation hardware used one famicom title gimmick individual homebrew unlicensed developers made custom mmcs nes simply expand available memory 228 simple bank switching mmc developed use games action 52 cheetahmen ii nametable control bit action 52 multicart also contains small 16-bit register area contains old menu selection exiting game
|
Operating systems
|
konami ping pong konami ping pong sports arcade game created 1985 konami game notable first video game accurately reflect gameplay table tennis opposed earlier simplifications like pong konami titles time ported several 8-bit computer systems video game consoles konami ping pong played singleplayer multiplayer using 11 point scoring rules first player attain score 11 higher leading two points wins game maximum 14-14 point next point wins player must win best two three games order beat match playfield shown isometric perspective players shown disembodied hands players placed far-side table find hitting ball much difficult however player always positioned near side single player mode essential moves represented forehand backhand lob smash game features penguin protagonist konami earlier title antarctic adventure title screen member audience game penguin would later known penta introductory animation pingpong ball bounces along table finally hits penta head appears faint 1985 game released konami msx computers 1986 game ported amstrad cpc commodore 64 zx spectrum imagine software bernie duggs name ping pong apart scaled-down graphics sound due limited system capabilities ports perfectly replicate arcade gameplay 1987 game ported famicom disk system smash ping pong published nintendo nintendo character donkey kong jr. replaces konami penta crowd diskun famicom disk system mascot also replaces pentarou title screen later re-released wii virtual console japan pal region latter got import game title smash table tennis smash ping pong slated release nintendo 3ds may feature camera support 3d support analog support release featured amongst games nintendo entertainment system super nes released 3ds tech demo called classic games e3 2010 konami ping pong made available microsoft game room service xbox 360 console windows-based pcs june 2010
|
Computer architecture
|
argument mining argument mining argumentation mining research area within natural-language processing field goal argument mining automatic extraction identification argumentative structures natural language text aid computer programs argumentative structures include premise conclusions argument scheme relationship main subsidiary argument main counter-argument within discourse argument mining workshop series main research forum argument mining related research argument mining applied many different genres including qualitative assessment social media content e.g twitter facebook provides powerful tool policy-makers researchers social political sciences domains include legal documents product reviews scientific articles online debates newspaper articles dialogical domains given wide variety text genres different research perspectives approaches difficult reach common objective evaluation scheme many annotated data sets proposed gaining popularity consensual data set yet found annotating argumentative structures highly demanding task successful attempts delegate annotation tasks crowd process still requires lot effort carries significant cost initial attempts bypass hurdle made using weak supervision approach
|
Computational linguistics
|
adaptive redaction adaptive redaction intelligent version redaction whereby sensitive parts document automatically removed based policy primarily used next generation data loss prevention dlp solutions policy set rules based content context context include content 'visible information see screen also 'invisible information document properties revision history also 'active content embedded electronic document macro adaptive redaction designed alleviate false positive events created data loss prevention software dlp security solutions false positives occur dlp policy triggers prevents legitimate outgoing communication majority cases caused oversight sender sending unprotected credit card information outside organization breaches payment card industry data security standard pci dss regulations many organizations accept credit card information email however reply email containing information would send prohibited information would cause breach policy adaptive redaction used remove credit card number allow email sent 'invisible information found documents created embarrassment several governments
|
Computer security
|
grml grml operating system based debian designed run mainly live cd made run usb flash drive grml aims well-suited system administrators sysadmin users text tools includes x window system server minimalist window managers wmii fluxbox openbox use graphical programs like mozilla firefox included distribution addition sysadmin tools security network related software data recovery forensic tools editors shells many text tools included grml distribution focuses accessibility providing kernel support speakup software like brltty emacspeak flite another feature grml use z shell zsh default login shell customized zsh configuration used grml retrieved project repository since early 2009 grml isos come miros bsd4grml minimal miros bsd flavour release grml “ lackdose-allergie ” 2009.05 daily isos later releases grml “ hello-wien ” 2009.10 use manifold-boot technology provide isos written directly usb stick cf/sd card hard disc etc immediately bootable since grml 2010.12 isolinux loader used cases default providing consistent menu
|
Operating systems
|
dropmyemail dropmyemail cloud-based email backup software offered dropmysite offers cloud storage online backup software brief dropmyemail allows users automatically backup emails cloud option view migrate restore whenever required via web browser dropmyemail shown 1 march 2012 demo asia dropmysite dropmyemail concept conceived founder john fearon site launched 1 march 2012 demo asia launchpad emerging technology singapore dropmyemail 525,000 users growing rate faster twitter dropbox pininterest time launch dropmyemail moved away freemium business model free trial-based business model dropmyemail changed business model provide 15-day free trial followed paid account 10 per year 5gb account 20 10gb account 70 50gb account november 21 2012 dropmyemail launched business offering soho smb per email mailbox price plans provide 15-day free trial 100 seats followed paid account 5 seats 99.99 per year 20 seats 299.99 per year 100 seats 999.90 per year company launched affiliate program december 13 2012 meet demands various websites resell dropmyemail service dropmyemail web-based solution dropmyemail backend written ruby rails hosted amazon web services cloud infrastructure email platforms gmail hotmail yahoo etc supported dropmyemail users also backup email via imap pop settings dropmyemail uses amazon s3 storage system store files
|
Distributed computing architecture
|
red hook wi-fi red hook wi-fi free-to-use wi-fi mesh network provides free internet access red hook neighborhood brooklyn new york operated red hook initiative due location red hook brooklyn red hook channel buttermilk channel many residents face various challenges accessing broadband service.. survey found many people area accessed internet primarily mobile phones 30 population broadband access home beginning fall 2011 red hook initiative rhi brooklyn non-profit approached open technology institute collaborating community wireless network rhi wanted way communicate residents immediately around community center network initially launched support 150 simultaneous users ran open-software platform called commotion 2012 hurricane sandy struck area many internet communication systems throughout much city red hook remained connected mesh network headquarters red hook initiative became hub volunteer coordination donation collections food distribution residents came red hook initiative office charge devices connect internet shortly afterwards federal emergency management agency fema connected red hook wi-fi satellite system linking residents red cross communication matrix could used find emergency relief food banks well shelter locations relief efforts finished team led red hook initiative continued make improvements mesh network installing nano stations powered solar panels rooftops around red hook neighborhood though red hook wi-fi project already works hurricane sandy struck gained additional media attention storm 2015 red hook wi-fi selected part city resiliency initiative — group 27 finalists competing resiliency innovations stronger economy
|
Distributed computing architecture
|
pac418 socket pac418 418 pin microprocessor socket designed interface intel itanium processor rest computer usually via motherboard provides electrical interface well physical support socket designed support microprocessor module socket pac418 introduced intel first generation itanium 2001 supported bus speeds 133 mhz double-pumped socket pac418 processors reach speeds 800 mhz
|
Computer architecture
|
x-video bitstream acceleration x-video bitstream acceleration xvba designed amd graphics radeon gpu fusion apu arbitrary extension x video extension xv x window system linux operating-systems xvba api allows video programs offload portions video decoding process gpu video-hardware currently portions designed offloaded xvba onto gpu currently motion compensation mc inverse discrete cosine transform idct variable-length decoding vld mpeg-2 mpeg-4 asp mpeg-4 part 2 including xvid older divx nero digital mpeg-4 avc h.264 wmv3 vc-1 encoded video xvba direct competitor nvidia video decode presentation api unix vdpau intel video acceleration api va api november 2009 xvba backend video acceleration api va api released means software supports va api also support xvba 24 february 2011 official xvba sdk software development kit publicly released alongside suite open source tools amd hardware video gpu capable xvba video acceleration requires x11 software device driver enable features currently amd ati radeon graphics cards hardware support unified video decoder version 2.0 later primarily radeon hd 4000 series later supported proprietary ati catalyst device driver
|
Internet protocols
|
hping hping free packet generator analyzer tcp/ip protocol distributed salvatore sanfilippo also known antirez one type tester network security one de facto tools security auditing testing firewalls networks used exploit idle scan scanning technique also invented hping author implemented nmap security scanner new version hping hping3 scriptable using tcl language implements engine string based human readable description tcp/ip packets programmer write scripts related low level tcp/ip packet manipulation analysis short time like tools used computer security hping useful system administrators hackers
|
Computer security
|
hardware acceleration computing hardware acceleration use computer hardware specially made perform functions efficiently possible software running general-purpose transformation data routine computed calculated purely software running generic cpu purely custom-made hardware mix operation computed faster application-specific hardware designed programmed compute operation specified software performed general-purpose computer processor approach advantages disadvantages implementation computing tasks hardware decrease latency increase throughput known hardware acceleration typical advantages software include rapid development leading faster times market lower non-recurring engineering costs heightened portability ease updating features patching bugs cost overhead compute general operations advantages hardware include speedup reduced power consumption lower latency increased parallelism bandwidth better utilization area functional components available integrated circuit cost lower ability update designs etched onto silicon higher costs functional verification times market hierarchy digital computing systems ranging general-purpose processors fully customized hardware tradeoff flexibility efficiency efficiency increasing orders magnitude given application implemented higher hierarchy hierarchy includes general-purpose processors cpus specialized processors gpus fixed-function implemented field-programmable gate arrays fpgas fixed-function implemented application-specific integrated circuit asics hardware acceleration advantageous performance practical functions fixed updates needed software solutions advent reprogrammable logic devices fpgas restriction hardware acceleration fully fixed algorithms eased since 2010 allowing hardware acceleration applied problem domains requiring modification algorithms processing control flow integrated circuits created perform arbitrary operations analog digital signals often computing signals digital interpreted binary number data computer hardware software operate information binary representation perform computing accomplished calculating boolean functions bits input outputting result output device downstream storage processing either software hardware compute computable function custom hardware offers higher performance per watt functions specified software hardware description languages hdls verilog vhdl model semantics software synthesize design netlist programmed fpga composed logic gates application-specific integrated circuit vast majority software-based computing occurs machines implementing von neumann architecture collectively known stored-program computers computer programs stored data executed processors typically one cpu cores processors must fetch decode instructions well data operands memory part instruction cycle execute instructions constituting software program relying common cache code data leads von neumann bottleneck fundamental limitation throughput software processors implementing von neumann architecture even modified harvard architecture instructions data separate caches memory hierarchy overhead decoding instruction opcodes multiplexing available execution units microprocessor microcontroller leading low circuit utilization intel hyper-threading technology provides simultaneous multithreading exploiting under-utilization available processor functional units instruction level parallelism different hardware threads hardware execution units general rely von neumann modified harvard architectures need perform instruction fetch decode steps instruction cycle incur stages overhead needed calculations specified register transfer level rtl hardware design time circuit area costs would incurred instruction fetch decoding stages reclaimed put uses reclamation saves time power circuit area computation reclaimed resources used increased parallel computation functions communication memory well increased input/output capabilities comes opportunity cost less general-purpose utility greater rtl customization hardware designs allows emerging architectures in-memory computing transport triggered architectures tta networks-on-chip noc benefit increased locality data execution context thereby reducing computing communication latency modules functional units custom hardware limited parallel processing capability area logic blocks available integrated circuit die therefore hardware much free offer massive parallelism software general-purpose processors offering possibility implementing parallel random-access machine pram model common build multicore manycore processing units microprocessor ip core schematics single fpga asic similarly specialized functional units composed parallel digital signal processing without embedded processor ip core therefore hardware acceleration often employed repetitive fixed tasks involving little conditional branching especially large amounts data nvidia cuda line gpus implemented device mobility increased relative performance specific acceleration protocols required new metricizations considering characteristics physical hardware dimensions power consumption operations throughput summarized three categories task efficiency implementation efficiency flexibility appropriate metrics consider area hardware along corresponding operations throughput energy consumed suppose wish compute sum formula_1 integers assuming large integers available codice_1 large enough hold sum done software specifying c++ constexpr int n 20 constexpr int two_to_the_n 1 « n bignum array_sum const std :array int two_to_the_n ints algorithm runs linear time formula_2 big notation hardware sufficient area chip calculation parallelized take 20 time steps using prefix sum algorithm algorithm requires logarithmic time formula_3 formula_4 space in-place algorithm parameter int n 20 parameter int two_to_the_n 1 « n function int array_sum endfunction example takes advantage greater parallel resources available application-specific hardware software general-purpose computing paradigms architectures hardware acceleration applied stream processing examples hardware acceleration include bit blit acceleration functionality graphics processing units gpus use memristors accelerating neural networks regular expression hardware acceleration spam control server industry intended prevent regular expression denial service redos attacks hardware performs acceleration may part general-purpose cpu separate unit second case referred hardware accelerator often specifically 3d accelerator cryptographic accelerator etc traditionally processors sequential instructions executed one one designed run general purpose algorithms controlled instruction fetch example moving temporary results register file hardware accelerators improve execution specific algorithm allowing greater concurrency specific datapaths temporary variables reducing overhead instruction control fetch-decode-execute cycle modern processors multi-core often feature parallel single-instruction multiple data simd units even hardware acceleration still yields benefits hardware acceleration suitable computation-intensive algorithm executed frequently task program depending upon granularity hardware acceleration vary small functional unit large functional block like motion estimation mpeg-2
|
Computer architecture
|
list lisp-family programming languages functional programming language lisp second-oldest high-level programming language direct descendants closely related dialects still widespread use today language fortran older one year lisp like fortran changed lot since early days many dialects existed history today widely known general-purpose lisp dialects common lisp scheme
|
Programming language topics
|
tsx-plus tsx-plus multi-user operating system pdp-11/lsi-11 series computers developed h computer systems inc. based dec rt-11 single-user real-time operating system tsx-plus installs top rt-11 system highly configurable tunable due constraints memory management system pdp-11/lsi-11 entire operating system core must occupy 40 kibibytes memory maximum possible 4 mebibytes physical memory actually installed machines mandated 22-bit address space despite limitations tsx-plus actually able service 30 simultaneous users still maintaining decent response times although usually never used 8 simultaneous users software included wp package named lex-11 spreadsheet saturn software machine slowed considerably 8 students wanted use word-processing package time also decision-table language called ncc manchester worked well tsx plus system popular 1980s although major number clones latest version tsx-plus tcp/ip support system still use supported
|
Operating systems
|
programming language specification computing programming language specification standard definition documentation artifact defines programming language users implementors agree programs language mean specifications typically detailed formal primarily used implementors users referring case ambiguity c++ specification frequently cited users instance due complexity related documentation includes programming language reference intended expressly users programming language rationale explains specification written typically informal specification major programming languages specifications languages exist popular decades without specification language may one implementations whose behavior acts de facto standard without behavior documented specification perl perl 5 notable example language without specification php specified 2014 use 20 years language may implemented specified specified implemented may develop together usual practice today implementations specifications provide checks writing specification requires precisely stating behavior implementation implementation checks specification possible practical consistent writing specification implementation largely avoided since algol 68 1968 due unexpected difficulties implementation implementation deferred however languages still occasionally implemented gain popularity without formal specification implementation essential use specification desirable essential informally code talks programming language specification take several forms including following syntax programming language usually described using combination following two components formulating rigorous semantics large complex practical programming language daunting task even experienced specialists resulting specification difficult anyone experts understand following ways programming language semantics described languages use least one description methods languages combine one widely used languages specified using natural language descriptions semantics description usually takes form reference manual language manuals run hundreds pages e.g. print version java language specification 3rd ed 596 pages long imprecision natural language vehicle describing programming language semantics lead problems interpreting specification example semantics java threads specified english later discovered specification provide adequate guidance implementors formal semantics grounded mathematics result precise less ambiguous semantics given natural language however supplemental natural language descriptions semantics often included aid understanding formal definitions example iso standard modula-2 contains formal natural language definition opposing pages programming languages whose semantics described formally reap many benefits example automatic tool support help realize benefits example automated theorem prover theorem checker increase programmer language designer confidence correctness proofs programs language power scalability tools varies widely full formal verification computationally intensive rarely scales beyond programs containing hundred lines may require considerable manual assistance programmer lightweight tools model checkers require fewer resources used programs containing tens thousands lines many compilers apply static type checks program compile reference implementation single implementation programming language designated authoritative behavior implementation held define proper behavior program written language approach several attractive properties first precise requires human interpretation disputes meaning program settled simply executing program reference implementation provided implementation behaves deterministically program hand defining language semantics reference implementation also several potential drawbacks chief among conflates limitations reference implementation properties language example reference implementation bug bug must considered authoritative behavior another drawback programs written language may rely quirks reference implementation hindering portability across different implementations nevertheless several languages successfully used reference implementation approach example perl interpreter considered define authoritative behavior perl programs case perl open-source model software distribution contributed fact nobody ever produced another implementation language issues involved using reference implementation define language semantics moot defining semantics programming language terms test suite involves writing number example programs language describing programs ought behave — perhaps writing correct outputs programs plus outputs called test suite language correct language implementation must produce exactly correct outputs test suite programs chief advantage approach semantic description easy determine whether language implementation passes test suite user simply execute programs test suite compare outputs desired outputs however used test suite approach major drawbacks well example users want run programs part test suite indeed language implementation could run programs test suite would largely useless test suite describe language implementation behave program test suite determining behavior requires extrapolation implementor part different implementors may disagree addition difficult use test suite test behavior intended allowed nondeterministic therefore common practice test suites used combination one language specification techniques natural language description reference implementation examples official draft language specifications
|
Programming language topics
|
united nations multilingual terminology database united nations multilingual terminology database unterm linguistic tool translates terminology nomenclature used within united nations un six official languages un arabic chinese english french russian spanish database contains 85,000 words updated daily database maintained terminology reference section documentation division department general assembly conference management headquarters new york city database put internet order facilitate understanding work un public access intranet un secretariat
|
Computational linguistics
|
backuppc backuppc free disk-to-disk backup software suite web-based frontend cross-platform server run linux solaris unix-based server client necessary server client several protocols handled services native client os 2007 backuppc mentioned one three well known open-source backup software even though one tools amazing unfortunately one ever talks many folks never hear data deduplication reduces disk space needed store backups disk pool possible use d2d2t solution archive function backuppc used back disk pool tape backuppc block-level backup system like ghost4linux performs file-based backup restore thus suitable backup disk images raw disk partitions backuppc incorporates server message block smb client used back network shares computers running windows paradoxically setup backuppc server located behind nat 'd firewall windows machine operates public ip address may advisable smb traffic useful web servers running secure shell ssh gnu tar rsync available allows backuppc server stored subnet separate web server dmz published gnu general public license backuppc supports nfs ssh smb rsync back unix-like systems native ssh tar rsync support linux bsd os x well microsoft windows shares minimal configuration windows third party implementations tar rsync ssh cygwin required utilize protocols choice tar rsync dictated hardware bandwidth available client clients backed rsync use considerably cpu time client machines using tar smb clients using smb tar use considerably bandwidth clients using rsync trade-offs inherent differences protocols using tar smb transfers file entirety using little cpu maximum bandwidth rsync method calculates checksums file client server machines way enables transfer differences two files uses cpu resources minimizes bandwidth version 3.x backuppc uses combination hard links compression reduce total disk space used files first full backup files transferred backend optionally compressed compared files identical hard linked uses one additional directory entry upshot astute system administrator could potentially back ten windows xp laptops 10 gb data 8 gb repeated machine office windows binary files would look like 100 gb needed 28 gb 10 × 2 gb 8 gb would used compression data back-end reduce requirement browsing backups incremental backups automatically filled back previous full backup every backup appears full complete set data version 4.x still use v3.x repositories new backups use new format seamless upgrade overall performance higher v3.x version
|
Computer security
|
harmony compiler harmony compiler written peter samson massachusetts institute technology mit compiler designed encode music pdp-1 built earlier program samson wrote tx-0 computer jack dennis noticed mentioned samson sound state tx-0 speaker could enough play music succeeded building wysiwyg program one voice 1960 pdp-1 arrived mit september 1961 samson designed harmony compiler synthesizes four voices input text-based notation although created music many genres optimized baroque music pdp-1 music merged four channels played back stereo notes pitch undertone music stop errors mistakes greeted message typewriter red ribbon err human forgive divine samson joined pdp-1 restoration project computer history museum 2004 recreate music player
|
Programming language topics
|
idedos idedos rom-based disk operating system written 6502/65816 assembly language commodore 64 128 supercpu main purpose control ata pi devices connected ide64 cartridge present like normal commodore drives additionally supports networked drives pclink built-in machine code monitor file manager c64 kernal uses vector table page 3 allow redirection common kernal file handling basic functions feature used idedos hook c64 kernal operating system divided four pages 16 kib mapped required mapping temporarily switched interrupts running increased compatibility however causes ≈40 μs latency additional ram buffers internal data also mapped either ide64 cartridge 28 kib additional ram supercpu used standard kernal memory locations page zero page two handled kernal-compatible way temporarily used memory restored routines finished beyond kernal table idedos two new calls bulk data handling read/write allows much faster data transfer rates character-based i/o native file system non-cbm style low level allow partitions greater 16 mib high-level features like 16-character filenames filetypes retained due complexity memory requirements filesystem creation consistency check part operating system unlike cbm dos cmd dos additional filesystems like iso 9660 fat abstracted internally mostly use routines handling thereby little difference noticeable user programs except features fully implemented device handling done additional device numbers assigned new devices device numbers idedos devices configurable normally range 10–14 years many programs assumed device 8 allow selecting anything else worked around temporary changing used idedos device number 8 standard devices original kernal routines used idedos devices use custom routines closely imitate results behavior kernal calls floppy devices kernal calls going vector table notably iec bus-specific calls present incompatibility programs using special features like cd-rom audio handling implemented new channel 15 commands features found floppy drives follow cmd style commands allow programs easily support wider range devices unlike intelligent external devices separate processor like 1541 cbmdos idedos runs host computer thereby disk routines block finished rules use irq loaders commonly used speed operation serial bus peripherals interrupts generally allowed idedos running disabled rare time-critical operations however system written non-reentrant like original kernal 1996 idedos born need system run ide64 1.1 card created josef souček main code tomáš přibyl file manager final cartridge monitor adaptation additional code came jan vorlíček basic extension jan hlaváček duart pclink 2000 kajtár zsolt added cdrom support new setup code lot fixes due limitations design development completely rewritten version 0.90 started kajtár zsolt ready general use 2005 meanwhile old version reached 0.898b june 2004 2009 64 kib limit system started get tight idedos 0.91 beta started refactor code gain space internal flexibility last version old idedos series built fast loader supported devices fast load switched setup case incompatibility non-1541 device 8 minimum interleave 7 fast saver supported manager uses interleave 8 pal/ntsc compatible timing custom protocol sequential access supported devices includes clock calendar ability set drive numbers screen colours auto boot floppy fast loader basic clock ti power management write retry read-ahead write cache drive settings cdrom slow option basic extension includes disk handling commands limited idedos devices adds new error messages commands used navigate around directories start programs copy/rename/delete files create directories execute plugins operate files recursive file copy added 0.898b rare cases work monitor almost exactly final cartridge monitor idedos 0.89 standard 6502 opcodes available commands current stable latest version 20100509 patch 45 notable differences 0.89 supported devices device support automatically detected disabled manually needed pal/ntsc compatible timing fast saver file manager custom protocol sequential access supported devices mostly well known standard dos wedge commands basic extension adds disk handling commands used device use cmd style commands file managers inspiration comes 0.89 though rewritten scratch goal file manager supports idedos devices also works well cmd drives monitor rewritten scratch main inspiration ccs64 emulator monitor command ideas came fc3/ar7/vice monitors goal freezer style registers including i/o editable fast machine code monitor supports illegal 6502 supercpu emulation mode opcodes commands still development notable differences 0.90
|
Operating systems
|
daniel weinreb daniel l. weinreb january 6 1959 – september 7 2012 american computer scientist programmer significant work lisp environment weinreb born january 6 1959 brooklyn new york raised parents herbert phyllis weinreb two brothers bill david attended saint ann school weinreb graduated st. ann school brooklyn ny 1975 attended mit 1975–1979 starting age 16 graduating b.s computer science electrical engineering wrote eine text editor mit lisp machine eine made use window system lisp machine thus first emacs written graphical user interface second implementation emacs ever written first implementation emacs lisp notable subsequent emacs implementations used lisp including james gosling gosmacs bernard greenberg multics emacs richard stallman gnu emacs 1979–1980 weinreb worked lawrence livermore national laboratory amber operating system s-1 particularly file system multiprocess scheduler 1980 co-founded symbolics developing software symbolics lisp machine also participated significantly design common lisp programming language one five co-authors original common lisp specification common lisp language first edition worked statice object-oriented database published symbolics 1988 1988 co-founded object design one architects implementors objectstore leading commercial object-oriented database management system object database still commercially maintained available progress software bought object design excelon inc. 2002 joined bea systems operations administration management architect weblogic 2006 joined ita software working airline reservation system 2009 daniel weinreb gave google tech talk use common lisp one implementation languages airline reservation system 2009 chair international lisp conference 2009 cambridge/ma weinreb married cheryl moreau 1986 son adam 1991 dan weinreb died september 7 2012 year-long battle cancer
|
Programming language topics
|
system high mode system high mode simply system high security mode using automated information system ais pertains environment contains restricted data classified hierarchical scheme top secret secret unclassified system high pertains ia features information processed specifically strength trustworthiness system system high mode distinguished modes multilevel security lack need system contribute protection separation unequal security classifications particular precludes use features objects e.g content format produced exposed ais operating system high mode criteria securely downgrade objects result information system high ais treated classified highest security level data ais example unclassified information exist secret system high computer must treated secret therefore never shared unclassified destinations unless downgraded reliable human review risky lack omniscient humans known technology securely declassify system high information automated means reliable features data trusted potentially corrupted system high host unreliable means used including cross-domain solutions bypass guards serious risk system exploitation via bypass introduced nevertheless done resulting risk overlooked accepted
|
Computer security
|
setl setl set language high-level programming language based mathematical theory sets originally developed jack jacob t. schwartz new york university nyu courant institute mathematical sciences late 1960s setl provides two basic aggregate data types unordered sets sequences latter also called tuples elements sets tuples arbitrary type including sets tuples maps provided sets pairs i.e. tuples length 2 arbitrary domain range types primitive operations setl include set membership union intersection power set construction among others setl provides quantified boolean expressions constructed using universal existential quantifiers first-order predicate logic setl provides several iterators produce variety loops aggregate data structures print prime numbers 2 n notation similar list comprehension factorial procedure definition conventional setl expression factorial n 0 1970s setl ported besm-6 es evm russian computer systems setl used early implementation programming language ada named nyu ada/ed translator later became first validated ada implementation certified april 11 1983 according guido van rossum python predecessor abc inspired setl -- lambert meertens spent year setl group nyu coming final abc design set language 2 setl2 backward incompatible descendant setl created kirk snyder courant institute mathematical sciences new york university late 1980s like predecessor based theory notation finite sets also influenced syntax style ada language interactive set language isetl variant setl used discrete mathematics
|
Programming language topics
|
kernel-mode driver framework kernel-mode driver framework kmdf driver framework developed microsoft tool aid driver developers create maintain kernel mode device drivers windows 2000 later releases one frameworks included windows driver frameworks current version 1.27 general kmdf supports drivers written windows driver model runs wdm wdm driver model used since advent windows 98 whereas kmdf driver framework microsoft advocates uses windows 2000 beyond general since features like power management plug play handled framework kmdf driver less complicated less code equivalent driver kmdf object-based built top wdm provides object-based perspective wdm following architectural mandate superset wdf functionality contained different types objects kmdf implementation consists
|
Operating systems
|
intel bcd opcode intel bcd opcodes set x86 instructions operates bcd numbers radix used representation numbers x86 processors 2 called binary numeral system however x86 processors limited support decimal numeral system bcd instructions longer supported long mode bcd numbers represented two ways packed decimal unpacked decimal decimal numbers 0 99 added directly first numbers added usual using add adc need carry flag processor set adjust flag sum lower nibbles 16 higher carry flag sum bytes 256 higher result adjusted depending number representation decimal numbers 0 99 subtracted directly first numbers subtracted usual using sub sbb need carry flag processor set adjust flag borrow occurred least significant nibble carry flag borrow occurred significant nibble unpacked representation supported two single digit numbers multiplied first digits multiplied usual using mul result adjusted using aam ascii adjust multiplication processor divides result ten storing quotient integral part significant byte result remainder least significant byte result unpacked representation supported operands must fall range 0 99 first operands converted normal binary representation using aad ascii adjust division processor converts numbers multiplying significant byte 10 adding least significant byte quotient remainder division obtained usual using div present normal binary representation binary-coded decimal bcd numbers past used storing decimal numbers especially financial software opcodes mentioned give x86 rudimentary bcd support adding bcd numbers using opcodes complex task requires many instructions add even modest numbers also require large amount memory integer calculations integer calculations exact radix number representation important accuracy x86 processor calculations binary numbers usually lot faster calculations bcd numbers
|
Computer architecture
|
uw imap uw imap server reference server implementation imap protocol developed university washington mark crispin others uw-imap development began c.1988 2003 uw imap among three popular free software imap server packages two cyrus imap courier imap 2005 point codebase undergone extensive rewriting among top two cyrus imap may 2008 university washington terminated development uw imap 4 august 2008 staff university washington involved developing uw imap pine alpine announced would shift effort direct development consultation coordination role help integrate contributions community wake layoffs university washington technology division c. january august 2009 maintainers debian gnu/linux major downstream distributor uw imap began retire uw imap packages september 2009 mark crispin principal author uw imap announced fork called panda imap crispin passed away late 2012 least one uw imap enthusiast maintains public source code repository containing uw imap panda imap commit history start project crispin final release much 2000s uw imap considered good choice due ready availability inclusion major linux distributions support pop imap ease installation also received praise ease administration compatibility longstanding mailbox formats small size simplicity unlike later imap servers uw imap coupled imap user accounts user accounts server underlying operating system feature together uw imap default use monolithic mailbox files intended ensure compatibility legacy operating systems email management practices drew criticism commentators particular sam varshavchik developer competing courier imap server suggested crispin decision add support maildir popular non-monolithic mailbox format uw imap may stemmed lingering resentment earlier disagreement crispin maildir designer daniel j. bernstein crispin insistence upon retaining uw imap support flat files mail stores criticised maintainers competing citadel imap server causing otherwise unnecessary complexity imap protocol additionally varshavchik noted despite crispin insistence imap servers comply imap specifications uw imap server imap client counterpart pine used private imap extension documented specification uw imap also criticised susceptibility buffer overflows lack privilege separation relative competitors cyrus courier 2007 computer programs existed capable exploiting security vulnerabilities un-patched improperly-configured uw imap installations unreliable ssl support uw imap designed compatible existing legacy mail stores systems plug-and-play installable without requiring site-specific configuration uw imap uses c-client mail engine also used alpine pine e-mail clients c-client supports multiple mail store formats including usenet news spools mix mbox mbx mx mh tenex mtx mmdf phile c-client also includes support imap pop3 nntp smtp internet protocols also bundled uw imap pop2 pop3 servers mailutil utility program dmail tmail mail delivery agents 2005 uw imap codebase consisted 135,000 lines code imap server comprised 4,000 lines c-client comprised rest uw imap officially support maildir format however uw imap patched support formats maildir gluelogic offers patch support maildirs pine patched pine instance used compile uw imap nominal maildir support however yields buggy server correctly distinguish unseen recent messages patch available alpine used similarly fewer drawbacks
|
Internet protocols
|
sprite operating system sprite experimental unix-like distributed operating system developed university california berkeley john ousterhout research group 1984 1992 notable features include support single system image computer clusters introduction log-structured filesystem tcl scripting language also originated project early work sprite based idea making operating system network aware thereby time make invisible user primary area work building new network file system made heavy use local client-side caching order improve performance opening file initial reads network used on-demand user actions occur cache similar utilities allow remote devices mapped local computer space allowing network printing similar duties many key unix files based network including things like password file machines network share root directory well common unix utilities codice_1 re-written make network aware well listing people logged across network makes sprite network appear single large time-sharing system single-system image another key addition sprite process migration allows programs moved machines time system maintains list machines state automatically moves processes idle machines improve local performance processes also evicted machines improve performance causing original starter move another machine network take control locally long tasks like compiling sprite system appear fast work early sprite outlined ended around 1987 improved next year starting 1990 sprite used basis development first log-structured file system lfs development continued 1992 lfs dramatically increases performance file writes expense read performance sprite tradeoff particularly useful read access cached anyway—that sprite systems typically perform fewer reads normal unix system lfs-like systems also allow much easier crash recovery became major focus project period additional experimentation striped file systems striped across different machines well clusters drives continued 1994 sprite microkernel system suffers sort problems unixes terms development complexity becoming increasingly difficult develop functionality added 1990s suffering small team supporting project simply able keep rapid changes unix taking place time project slowly shut 1994
|
Operating systems
|
bastion host bastion host special-purpose computer network specifically designed configured withstand attacks computer generally hosts single application example proxy server services removed limited reduce threat computer hardened manner primarily due location purpose either outside firewall demilitarized zone dmz usually involves access untrusted networks computers term generally attributed 1990 article discussing firewalls marcus j. ranum ranum defined bastion host krutz vines described bastion host computer fully exposed attack public side dmz unprotected firewall filtering router firewalls routers anything provides perimeter access control security considered bastion hosts types bastion hosts include web mail dns ftp servers ... due exposure great deal effort must put designing configuring bastion hosts minimize chances penetration amazon web services aws context bastion host defined server whose purpose provide access private network external network internet exposure potential attack bastion host must minimize chances penetration. aws related definition bastion hosts instances sit within public subnet typically accessed using ssh rdp remote connectivity established bastion host acts ‘ jump ’ server allowing use ssh rdp log instances within private subnets deeper within vpc properly configured use security groups network acls nacls bastion essentially acts bridge private instances via internet two common network configurations include bastion hosts placement first requires two firewalls bastion hosts sitting first outside world firewall inside firewall dmz often smaller networks multiple firewalls one firewall exists network bastion hosts commonly placed outside firewall bastion hosts related multi-homed hosts screened hosts dual-homed host often contains firewall also used host services well screened host dual-homed host dedicated running firewall bastion server also set using proxycommand openssh several examples bastion host systems/services
|
Computer security
|
pagespinner pagespinner semi-wysiwyg html editor os x developed optima systems released shareware pagespinner worldscript compliant uses waste text engine carbon library originally released classic mac os ported os x shortly operating system release used jeffrey zeldman 13 years switched textmate version 4.0 released 2002 introduced multiple undo double-byte input support scroll wheel support mac os x version 4.6.3 deemed quirky erratic 2006 reviewer particular macintosh version 5 released 2010 reviewed macworld uk faulted appearance dated found price high features provided reviewer impressed multiple site support integration apache os x standard web server june 2019 optima systems website offline current status pagespinner unknown
|
Internet protocols
|
nimsoft nimsoft independent company software vendor offered information technology monitoring service desk products services acquired ca inc. 2010 since october 2012 products integrated business nimsoft brand still used ca nimsoft products monitor manage business services specific systems within infrastructure including network components servers databases applications virtualized environments nimsoft products customers monitor systems hosted internal data centers well externally hosted environments including software service saas cloud computing environments nimbus software founded oslo norway 1998 confused nimbus data converse software exclusive us distributor nimbus software founded silicon valley 2002 nimbus software converse software merged 2004 form nimsoft gary read founder us distributor appointed ceo new company headquarters established silicon valley 2007 10.3 million series round funding jmi equity northzone ventures closed nimsoft acquired indicative software april 2008 offer business service management established new research development base fort collins colorado nimsoft received san francisco business times 2008 best place work award nimsoft closed 12 million funding round led goldman sachs october 2008 may 2009 nimsoft acquired intellectual property assets cittio product capabilities included network discovery topology mapping root cause analysis rca utilizing graph theory october nimsoft announced unified monitoring architecture monitor externally hosted systems services including saas cloud computing based infrastructures march 2010 ca inc. announced would acquire nimsoft 350 million nimsoft one hottest silicon valley companies lead411 september 2010 nimsoft extended software support vblock products vce company april 2011 nimsoft announced unified manager software combining monitoring service management enhanced management support netapp storage announced june ca acquired netherlands-based watchmouse july software integrated nimsoft nimsoft ceased exist independent operating unit within ca 2012 although products still offered brand name
|
Computer security
|
fortify software fortify software later known fortify inc. california-based software security vendor founded 2003 acquired hewlett-packard 2010 become part hp enterprise security products fortify offerings included static application security testing dynamic application security testing products well products services support software security assurance february 2011 fortify sells fortify ondemand static dynamic application testing service september 7 2016 hpe ceo meg whitman announced software assets hewlett packard enterprise including fortify would merged micro focus create independent company hp enterprise shareholders would retain majority ownership micro focus ceo kevin loosemore called transaction entirely consistent established acquisition strategy focus efficient management mature infrastructure products indicated micro focus intended bring core earnings margin mature assets deal 80 percent total 21 percent today micro focus existing 46 percent level within three years merge concluded september 1 2017 fortify technical advisory board composed avi rubin bill joy david a. wagner fred schneider gary mcgraw greg morrisett li gong marcus ranum matt bishop william pugh john viega fortify created security research group maintained java open review project vulncat taxonomy security vulnerabilities addition security rules fortify analysis software members group wrote book secure coding static analysis published research including javascript hijacking attacking build cross build injection watch write preventing cross-site scripting observing program output dynamic taint propagation finding vulnerabilities without attacking
|
Databases
|
dtrace dtrace comprehensive dynamic tracing framework created sun microsystems troubleshooting kernel application problems production systems real time originally developed solaris since released free common development distribution license cddl opensolaris descendant illumos ported several unix-like systems dtrace used get global overview running system amount memory cpu time filesystem network resources used active processes also provide much fine-grained information log arguments specific function called list processes accessing specific file 2010 oracle corporation acquired sun microsystems announced discontinuing opensolaris community effort core solaris engineers create truly open source solaris illumos operating system announced via webinar thursday 3 august 2010. fork opensolaris os/net consolidation including dtrace technology october 2011 oracle announced porting dtrace linux several years unofficial dtrace port linux available changes licensing terms august 2017 oracle released dtrace kernel code gplv2+ license user space code gplv2 upl licensing september 2018 microsoft announced ported dtrace freebsd windows september 2016 opendtrace effort began github code comprehensive documentation system internals opendtrace effort maintains original cddl licensing code opensolaris additional code contributions coming bsd 2 clause license goal opendtrace provide os agnostic portable implementation dtrace acceptable consumers including macos freebsd openbsd netbsd linux well embedded systems sun microsystems designed dtrace give operational insights allow users tune troubleshoot applications os testers write tracing programs also referred scripts using programming language confused programming languages named language inspired c includes added functions variables specific tracing programs resemble awk programs structure consist list one probes instrumentation points probe associated action probes comparable pointcut aspect-oriented programming whenever condition probe met associated action executed probe fires typical probe might fire certain file opened process started certain line code executed probe fires may analyze run-time situation accessing call stack context variables evaluating expressions print log information record database modify context variables reading writing context variables allows probes pass information allowing cooperatively analyze correlation different events special consideration taken make dtrace safe use production environment example minimal probe effect tracing underway performance impact associated disabled probe important since tens thousands dtrace probes enabled new probes also created dynamically dtrace scripts invoked directly command line providing one probes actions arguments examples dtrace -n 'proc exec-success trace curpsinfo- pr_psargs dtrace -n 'syscall :open* entry printf execname copyinstr arg0 dtrace -n 'syscall entry num execname count dtrace -n 'syscall entry num probefunc count dtrace -n 'syscall entry num pid execname count dtrace -n 'io start printf pid execname args 0 b_bcount dtrace -n 'vminfo pgpgin pg execname sum arg0 scripts also written reach hundreds lines length although typically tens lines needed advanced troubleshooting analysis 200 examples open source dtrace scripts found dtracetoolkit created brendan gregg author dtrace book also provides documentation demonstrations dtrace first became available use november 2003 formally released part sun solaris 10 january 2005 dtrace first component opensolaris project source code released common development distribution license cddl dtrace integral part illumos illumos distributions opensolaris continuation dtrace standard part freebsd netbsd apple added dtrace support mac os x 10.5 leopard including gui called instruments 40 dtrace scripts dtracetoolkit included /usr/bin including tools examine disk i/o iosnoop process execution execsnoop unlike platforms dtrace supported mac os x flag p_lnoattach program may set disallows tracing process debugging utilities dtrace gdb original mac os x dtrace implementation could affect tracing system information unrelated probes fire program flag set running would fail os x 10.5.3 update addressed issue months later however since el capitan system integrity protection prevents user dtracing protected binary default linux port dtrace available since 2008 work continues actively enhance fix issues also active implementation github standard core providers available fbt syscall profile plus special instr provider solaris providers yet available linux dtrace implementation loadable kernel module means kernel requires modification thus allows dtrace avoid cddl vs. gpl licensing conflicts source form least however dtrace loaded kernel instance marked tainted 2007 developer qnx software systems announced blog colleague working incorporating dtrace qnx operating system oracle corporation added beta dtrace support oracle linux 2011 technology preview unbreakable enterprise kernel release 2 gplv2 dtrace linux kernel module originally released cddl general availability announced december 2012 march 11th 2019 microsoft released build dtrace windows 10 insider builds supported language provider dtrace retrieve context code including function source file line number location dynamic memory allocation garbage collection made available supported language supported language providers include assembly language c c++ java erlang javascript perl php python ruby shell script tcl application providers allow dtrace follow operation applications system calls kernel applications offer dtrace application providers include mysql postgresql oracle database oracle grid engine firefox dtrace designed implemented bryan cantrill mike shapiro adam leventhal authors received recognition 2005 innovations dtrace infoworld technology review dtrace top prize wall street journal 2006 technology innovation awards competition authors recognized usenix software tools user group stug award 2008
|
Operating systems
|
separation duties separation duties sod also known segregation duties concept one person required complete task business separation sharing one individual one single task internal control intended prevent fraud error concept alternatively called segregation duties political realm separation powers democracies separation legislation administration serves similar purpose concept addressed technical systems information technology equivalently generally addressed redundancy separation duties key concept internal controls increased protection fraud errors must balanced increased cost/effort required essence sod implements appropriate level checks balances upon activities individuals r. a. botha j. h. p. eloff ibm systems journal describe sod follows separation duty security principle primary objective prevention fraud errors objective achieved disseminating tasks associated privileges specific business process among multiple users principle demonstrated traditional example separation duty found requirement two signatures cheque actual job titles organizational structure may vary greatly one organization another depending size nature business accordingly rank hierarchy less important skillset capabilities individuals involved concept sod business critical duties categorized four types functions authorization custody record keeping reconciliation perfect system one person handle one type function principally several approaches optionally viable partially entirely different paradigms person multiple functional roles opportunity abuse powers pattern minimize risk general categories functions separated primarily individual separation addressed selection term sod already well known financial accounting systems companies sizes understand combine roles receiving cheques payment account approving write-offs depositing cash reconciling bank statements approving time cards custody pay cheques etc sod fairly new information technology departments high percentage sarbanes-oxley internal audit issues come information systems segregation duties helps reduce potential damage actions one person end-user department organized way achieve adequate separation duties according isaca segregation duties control matrix duties combined one position matrix industry standard general guideline suggesting positions separated require compensating controls combined depending company size functions designations may vary duties separated compensating controls place compensating controls internal controls intended reduce risk existing potential control weakness single person carry conceal errors and/or irregularities course performing day-to-day activities assigned sod incompatible duties several control mechanisms help enforce segregation duties accounting profession invested significantly separation duties understood risks accumulated hundreds years accounting practice contrast many corporations united states found unexpectedly high proportion sarbanes-oxley internal control issues came separation duties commonly used large organizations single person position introduce fraudulent malicious code data without detection role-based access control frequently used systems sod required strict control software data changes require person organizations performs one following roles exhaustive presentation software development life cycle list critical development functions applicable separation duties successfully implement separation duties information systems number concerns need addressed
|
Computer security
|
pisces pisces personal identification secure comparison evaluation system border control database system largely based biometrics developed booz allen hamilton inc.. pisces-project initiated department state terrorist interdiction program tip 1997 initially system countries improving watchlisting capabilities providing mainframe computer system facilitate immigration processing half dozen countries foreign authorities used technology watchlist exchange information united states department state suspected terrorists appearing borders information used track apprehend individual terrorists wide-ranging analysis terrorist travel methods according us-government reports matches passengers inbound united states facial images fingerprints biographical information airports high-risk countries high-speed data network permits u.s. authorities informed problems inbound passengers pisces workstations installed throughout country linked wide area network participating nation ’ immigration police intelligence headquarters headquarters provided automated capability monitor activities immigration points evaluate traveler information conduct real time data analysis currently pisces-project falls terrorist interdiction program tip ongoing programme united states department state tip provides necessary software hardware mostly commercial off-the-shelf cameras passport scanners full installation operator training system sustainment additionally tip assists immigration business process improvement ports entry chosen pisces installation fy 2007 funds used support enhancements existing watch listing system software order provide fraudulent document detection capability biometrics search capability improved name-searching effectiveness starting fy 2010 onward fy 2011 pisces funding increased united states department state considers high risk countries afghanistan iraq pakistan project verify us visas via limited access us government database go trial select outposts although pisces operational months prior september 11 2001 apparently failed detect terrorists involved attack according us department state 2003 currently deployed five countries scheduled deployment 12 countries calendar year arrests detentions occurred five countries system deployed 2005 since 2001 twenty nations provided capability expected 2011 31 27 march 2018 country us government signed memorandum intention donation system personal identification secure comparison evaluation pisces cooperation bosnia council ministers us government aims install maintain hardware software required pisces system operate starting international airport sarajevo later expanding airports border crossings country
|
Databases
|
dict dict dictionary network protocol created dict development group described rfc 2229 published 1997 goal surpass webster protocol allow clients access dictionaries use dict servers clients use tcp port 2628 standard dictd server made dict development group uses special dict file format although dictd servers gnu dico may optionally use file formats dictionaries standard dict file format made two files .index file .dict file .dict.dz compressed files usually written manually compiled program called dictfmt example unix command compile unicode-compatible dict file called mydict heading dictionary mydict.txt jargon file format i.e dictionary file produced installing server normally matter typing something like dictd server used telnet example connect dict server localhost unix system one normally type enter command help see available commands standard dictd package also provides dict command command-line use sophisticated dict clients include also programs read dict file format directly example s60dict dictionary program symbian series 60 uses dict dictionaries additionally dict clients fantasdic also capable reading dict format directly order efficiently store dictionary data dictzip extension gzip compression format also name utility used compress .dict file dictzip compresses file chunks stores chunk index gzip file header thus allowing random access data
|
Internet protocols
|
korea internet neutral exchange korea internet neutral exchange kinx inc. carrier-neutral internet exchange ix south korea b2b company specializes internet infrastructure kinx provides internet data center idc content delivery network cdn cloud computing services customers headquarters seoul south korea june 2019 kinx 116 employees kinx operates layer 2-based internet exchange south korea data center carrier-neutral means domestic international internet service providers isp well content providers cps independent network providers could freely select peering partners kinx expanding international coverage establishing point presence pop hong kong tokyo japan kinx currently operating four idcs – carrier-neutral – near seoul area ix participants include daum-kakao whose popular messenger service kakaotalk boasts 140 million users kinx cdn solution based peering domestic international isps delivers contents fast stable manner provides streaming cache downloading services main customers kinx ’ solution gaming companies com2us neowiz games need deliver contents end-users media outlets korea economic daily financial news provide real-time news updates audience 2012 kinx introduced 'ixcloud becoming first korean company provide public cloud service utilizes openstack also provides support public private companies efforts establish private cloud service since 2011 kinx partnership appcenter provided cloud service mobile web developers free-of-charge 2014 kinx signed mou neoply program managed neowiz games support startups provide infrastructure cloud service early days internet south korea domestic internet traffic go via overseas internet exchange points demand internet rose dramatically government find way address network ’ low quality rising costs furthermore particularly concerned rapid rise volume internet traffic issues mind nca national computerization agency established korea internet exchange kix first ix south korea due various circumstances however nca privatized kix december 1996 korea telecom kt corporation began operating korea telecom internet exchange ktix dacom lg uplus founded dacom internet exchange dix rather solving problems ktix dix brought challenges rising service charges ix customers pay 1998 address issues 16 isps excluding kt dacom hosted 'korea internet interconnection conference led establishment korea internet neutral exchange kinx june 2000
|
Distributed computing architecture
|
wicked rose wicked rose pseudonym chinese hacker responsible developing ginwui rootkit used internet attacks summer 2006 suggested works chinese army tan dailin graduate student sichuan university noticed attacking japanese site people ’ liberation army pla summer 2005 invited participate pla-sponsored hacking contest subsequently participated one-month 16-hour-per-day training program students simulated various cyber invasion methods built dozens hacking exploits developed various hacking tactics strategies chosen sichuan regional team compete teams yunnan guizhou tibet chongqing military district team ranked number one cash prize 20,000 rmb pseudonym wicked rose formed network crack program hacker group ncph group recruited talented hackers school found funding source unknown benefactor started attacking us sites initial round successful attacks funding tripled 2006 ncph built sophisticated rootkits launched barrage attacks multiple us government agencies end july 2006 ncph created 35 different attack variants one ms office vulnerability testing phase ncph used word document vulnerabilities switched excel later powerpoint vulnerabilities result activity ncph group siphoned thousands millions unclassified us government documents back china
|
Computer security
|
archives hub archives hub jisc service freely available provides cross-search descriptions archives held across uk 320 institutions including universities colleges specialist repositories charities businesses institutions includes 1,000,000 descriptions archive materials manner subjects represents 30,000 archive collections also describes content available topic based websites often created result digitisation projects hub hold archives rather maintains finding aids help researchers locate archives enabling search across descriptions description provides direct email link contact details repository holds archive enables researchers search filter various criteria including keyword title creator person organisation subject date order bring together archives held country relate topic includes images links digital content enables filtering digital non-digital content descriptions navigated via table contents 'search within function contributors provide new updated descriptions regularly service constantly updated descriptions archives newly catalogued made available research archives hub supporting information researchers including introductory guide publishes monthly features created contributors manner subjects people organisations showcase variety archival content described archives hub ethos based open access ‘ making data work harder ’ hub recently developed 'micro sites repository interfaces available higher education institutions wanting search application descriptions stored hub also provides data archives portal europe descriptions hub standards-based using isad g international archival standard standards data languages dates index terms standards takes provides ead encoded archival description xml archives site provides information archivists cataloguers online discovery data creation use standards metadata protocols interoperability facilitate cross-searching
|
Databases
|
star trek project star trek code name given secret prototype project running port mac os 7 applications intel-compatible x86 personal computers project starting february 1992 conceived collaboration apple computer provided majority engineers novell time one leaders cross-platform file-servers plan novell would market resulting os challenge microsoft windows project discontinued 1993 never released although components reused projects project named star trek science fiction franchise slogan boldly go mac gone impetus creation star trek project began novell desire increase competition monopoly microsoft dos-based windows products microsoft eventually convicted many years later illegal monopoly status novell called microsoft presence predatory us department justice called exclusionary unlawful novell first idea extend desktop presence graphical computing environment adapt digital research gem desktop environment novell legal department rejected due apprehension possible legal response apple company went directly apple shared concerns anti-competitive marketplace intel ceo andy grove supported two companies launching joint project star trek february 14 1992 valentine day apple set deadline october 31 1992 halloween day promising engineering team members performance bonus large cash award vacation cancun mexico project team member fred monroe later reflected worked like dogs fun ’ working achieving deadline goal receiving bonuses developers eventually reached point could boot intel 486 pc specific hardware system 7.1 on-screen appearance indistinguishable mac however every program would need ported new x86 architecture run supposed programs could ported little effort apple developed equivalent headers x86 tagline project boldly go mac gone computerworld mocked comment os boldly goes everyone else however project canceled mid-1993 political infighting personnel issues questionable marketability project apple side project seen exit supportive ceo john sculley favor new ceo michael spindler spindler interested project instead reallocating software engineering resources toward company total migration competing powerpc architecture macintosh operating system launched natively intel hardware official transition mac os x 2006 star trek designed hybrid apple macintosh operating system made run operating system gui shell application upon novell next in-development version dr dos operating system designed user could think standalone application platform general computing environment concept similar microsoft competing windows 3.1x running top dos radical tedious departure technologically culturally time mac os ever officially run apple computers based motorola 68000 architecture system built successor digital research dr dos 6.0 bdos level 6.7 7.1 netware palmdos 1.0 code named merlin bdos level 7.0 novell dr dos panther fully pc dos compatible 16-bit disk operating system genuinely dos compatible internal data structures bootstrapping media access device drivers file system support system would utilize dr dos new vladivar extended dos component flat memory support development since 1991 vladivar codice_1 aka codice_2 codice_3 dynamically loadable 32-bit protected mode system core advanced memory management hardware virtualization scheduling domain management pre-emptive multithreading within applications well multitasking independent applications running different virtual dos machines comparable windows 386 enhanced mode without gui thereby previously loaded dos environment including device drivers became part system domain multitasker unless specific protected mode virtual device drivers loaded hardware access got tunneled 16-bit sub-system default maximum speed minimum resource footprint dr dos bios bdos kernel device drivers memory managers multitasker written pure x86 assembly language apple port system 7.1 would run top high-performance yet light-weight hybrid 32-bit/16-bit protected mode multitasking environment graphical system shell user space macintosh resource forks long filenames mapped onto fat12 fat16 file systems though joint effort canceled novell published long-awaited dr dos 7.0 novell dos 7 bdos 7.2 1994 besides many additions areas advanced memory disk management networking novell dos 7 provided novell underlying stdos components dr dos panther vladivar projects except graphical star trek component jointly developed apple novell instead taskmgr provided text mode interface underlying multitasker emm386 system also provided api allow third-party guis take control microsoft windows viewmax 2 3 pc/geos newdeal known utilize interface run novell dos 7 successors opendos 7.01 dr-dos 7.02 higher star trek would yet another one fact additional hooks implemented specifically star trek gui frame buffer access hooks never stripped emm386 left undocumented apple reused platform abstraction technology developed star trek incorporating concurrently developed—and consider competing—migration powerpc architecture abstraction technology included capability loading mac os rom data file instead rom chip former star trek team members fred monroe fred huxham formed company fredlabs inc january 1997 company released virtualmac mac os application compatibility virtual machine beos apple first quickly aborted concept porting flagship operating system intel systems 1985 following exit steve jobs apple reattempt effort star trek n't launch product 2006 apple actually shipped products based upon concept hybridizing mac os 7 shell application platform accomplished form codice_4 process hybridized applications launched atop unix-based a/ux system also accomplished form macintosh application environment mae functional equivalent star trek plus embedded 68k emulator case system 7 power macintosh running application solaris hp/ux apple also delivered dos compatible models macs hybridized mac concurrently functional intel coprocessor card inside mac os 7 later always dos filesystem compatibility although direct x86 port classic mac os never released public determined users could make apple retail os run upon non-mac computers emulation development emulation environments said inspired initiative shown star trek project two popular 68k macintosh emulators vmac basilisk ii powerpc macintosh emulator sheepshaver written third parties ten years project star trek became possible natively run darwin unix-based core mac os x x86 platform virtue nextstep foundation port widely available darwin open source apple public source license however mac os x graphical user interface named aqua proprietary included darwin depended window managers running x11 graphical interfaces thus commercial mac os applications run natively darwin alone apple ran similar project star trek mac os x called marklar later referred steve jobs secret double life publicly power pc-only mac os project retain openstep x86 port keeping mac os x supporting applications including ilife xcode running x86 architecture well powerpc marklar publicly revealed apple ceo steve jobs june 2005 announced macintosh transition intel processors starting 2006 comparing contrasting apple efforts ibm long since attempted different strategy provide essential goal innovating new software platform upon commodity hardware nondestructively preserving existing legacy installations ms-dos heritage however strategy based upon os/2 operating system long since achieved seamless backward compatibility ms-dos applications 1992 roughly coinciding timeframe star trek project ibm devised new fundamentally integral subsystem backward compatibility windows 3.0 windows 3.1 applications new subsystem os/2 called win-os/2 integrated beginning os/2 2.0 although conceived different legacy business requirements cultures win-os/2 designed similar software engineering objectives virtualization techniques star trek coincidentally ibm also code-named os/2 releases star trek themes would eventually make references integral os/2 public brand beginning os/2 warp apple ibm attempted several proprietary cross-platform collaborations including unreleased port quicktime os/2 significant traction opendoc software framework aim alliance kaleida labs taligent companies utilized actual personnel star trek television movie franchise promotional purposes corporation formerly known ardi developed product called executor run compatible selection 68k macintosh applications hosted upon either dos linux operating systems intel cpu executor cleanroom reimplementation macintosh toolbox versions 6 7 operating system integrated 68k cpu emulator called syn68k liken andataco sun hp workstations emulates macintosh hardware environment including 68k cpu upon user must install system 6.0.7 quorum software systems made two apps targeting unix workstations equal provides binary compatibility emulating mac apis 68k cpu put precertified mac app x window sun sgi workstations latitude provides source code porting layer display postscript driver
|
Operating systems
|
security protocols open repository spore security protocols open repository online library security protocols comments links papers protocol downloadable variety formats including rules use automatic protocol verification tools protocols described using ban logic style used clark jacob goals database includes details formal proofs known attacks references comments analysis papers large number protocols listed including many shown insecure continuation seminal work john clark jeremy jacob seek contributions new protocols links comments
|
Computer security
|
flow software computing flow middleware software allows data-integration specialists connect disparate systems whether on-premises hosted cloud transforming restructuring data required environments flow functionality utilised data integration projects edi data-conversion activities developed flow software ltd new zealand flow available variety partner companies directly flow software new zealand australia integration software allows organisations continue using existing applications overcoming need customize upgrade requirements change using integration software many businesses benefit reduced dependence manual keying data avoidance costs delays caused keying errors flow enables data management flow accesses generates data structured formats files databases flow access read write databases using either sql89 sql92 specification informix provides support extended sql use flow access read write various file types visual mapping engine used configure data transformation data sets data restructured transformed thus allowing dissimilar data structures source destination flow data access operates independently mapping layer applied mapping logic uses events containing object pascal code flow transports generated data files using following formats flow user interface allows users create processes activate processes view activity logs email notifications flow process activity also configured flow uses predefined processing events executed either schedule event driven actions results logged available via user interface actions include flow includes report writer based software report builder report writer create custom notification reports providing users details related transactions reports created xml pdf jpeg xls reports embedded email messages required
|
Distributed computing architecture
|
unparser computing unparser system constructs set characters image components given parse tree unparser effect reverse traditional parser takes set string characters produces parse tree unparsing generally involves application specific set rules parse tree tree walk takes place given tree may involve textual graphic elements unparser may two separate modules handles relevant components cases master unparser looks master unparse table determine given nested structure handled one module
|
Programming language topics
|
cray time sharing system cray time sharing system also known cray user community ctss developed operating system cray-1 cray x-mp line supercomputers ctss developed los alamos scientific laboratory lasl lanl conjunction lawrence livermore laboratory lll llnl ctss popular cray sites united states department energy doe used several cray sites san diego supercomputing center predecessor ctss livermore time sharing system ltss ran control data cdc 7600 line supercomputers first compiler known lrltran lawrence radiation laboratory fortran fortran-66 language dynamic memory features cray version including automatic vectorization known cvc pronounced civic like honda car period cray vector compiler controversy existed lasl first attempt develop operating system cray-1 named deimos message-passing unix-like operating system forrest basket deimos initial teething problems common performance early operating systems left bad taste unix-like systems national laboratories manufacturer cray research inc. hardware went develop batch oriented operating system cos cray operating system vectorizing fortran compiler named cft cray fortran written cray assembly language cal ctss misfortune certain constants structures lacking certain networking facilities tcp/ip optimized cray-1 architecture-dependent without extensive rework larger memory supercomputers like cray-2 cray y-mp came use ctss final breaths running cray instruction-set-compatible hardware developed scientific computer systems scs-40 scs-30 supertek s-1 save software ctss embodied certain unique ideas market-driven priorities working/running processes attempt succeed ctss started llnl named nltss new livermore time sharing system embody advanced concepts operating systems better integrate communication using new network protocol named lincs also keeping best features ctss nltss followed development fate many operating systems briefly ran period cray hardware late 1980s user-level ctss overview 1982 provides chapter 2 brief list ctss features references likely found proceedings cray user group cug acm sosp symp operating systems proceedings however owing fact lanl llnl nuclear weapons facilities aspects security likely doom finding greater detail many pieces software
|
Operating systems
|
finders keepers 1985 video game finders keepers computer game written david jones first game magic knight series published mastertronic label zx spectrum amstrad cpc msx commodore 64 commodore 16 1985 published united kingdom budget price £1.99 zx spectrum sold 117,000 copies across 8-bit formats 330,000 copies making mastertronic second best-selling original game bmx racers magic knight sent castle spriteland king ibsisima order find special present princess germintrude magic knight successful quest may proved worthy joining famous polygon table reference mythical round table legends king arthur gameplay finders keepers markedly different magic knight games essentially graphic adventures platform elements finders keepers basically platform game maze sections hero starts king throne room transported via teleporter castle castle made two types playing area flick-screen rooms manner platform game two large scrolling mazes zx spectrum amstrad cpc msx cold upper maze slimey lower maze commodore 64 consist castle gardens castle dungeons additional part gameplay ability collect objects found rooms mazes scattered around castle sell money objects combine react create object higher value example 'bar lead 'philosophers stone react create 'bar gold amount money magic knight carrying market value inventory displayed on-screen buying selling objects done various traders live castle castle spriteland full dangerous creatures inhabit many rooms well mazes collision saps magic knight strength loses strength loses one four lives zzap 64 impressed game described little masterpiece another quality product mastertronic given 90 overall rating finders keepers followed-up three magic knight games spellbound published 1985 knight tyme published 1986 stormbringer published 1987
|
Computer architecture
|
task view task view task switcher virtual desktop system introduced windows 10 among first features new windows 10 task view allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops clicking task view button taskbar swiping left side screen displays open windows allows users switch switch multiple workspaces first previewed september 30 2014 windows 10 press event downtown san francisco similar effects used operating systems windows 3.0 first introduced window switcher 1990 using users could see flattened view open windows every version windows since also provided window switching functionality windows vista windows 7 provide additional feature called windows flip 3d broadly similar purpose flip 3d allows user flip open windows 3d perspective downside method front window covers significant portion windows unlike mission control macos hand allows user see contents front window difficult mission control especially user large number windows open vista desktop window manager exposes public api allows application access thumbnail representations flip3d uses number third party add-ons able provide mission control-like functionality vista third party applications emcee desktop organizer provide mission control like organization similar windows visual stacks support windows 8 immersive apps microsoft intellipoint software microsoft mice feature similar mission control also works live images windows rather static representations additionally several freeware windows applications exist emulate functionality mission control compiz kwin compositing window managers systems using x window system include plugins similar mission control scale plugin compiz present windows effect kwin skippy also performs similar functions mission control starting version 3.0 gnome desktop environment gained new mode called overview used launch applications manage workspaces mode windows scaled arranged mission control-like fashion quick switching chrome os window overview mode shows thumbnail open windows available pressing 'window switcher key swiping 3 fingers trackpad windows overview mode closed clicking associated close button selected clicking window thumbnail also closes overview mode brings selected window foreground classic legacy macintosh systems free finder workspaces offers functionality similar spaces mission control macos allows user quickly locate open window quickly hide windows show desktop manage windows across multiple monitors virtual desktops activated f3 key f9 older keyboards apple magic mouse multi-touch trackpads activated pulling trackpad three four fingers mission control redesigned feature extensively show running desktops
|
Operating systems
|
openca openca officially openca pki research labs formerly openca project pki collaborative effort develop robust full-featured open-source out-of-the-box certification authority implementing used protocols full-strength cryptography openca based many open-source projects among openldap openssl apache projects project development divided 2 main tasks studying refining security scheme guarantees best model used certificate authority developing software easily set manage ca software development side project divided following sub-projects problem public key infrastructures pkis applications secured certificates keys difficult sometimes expensive set pkis flexible trustcenter software expensive openca started 1999 first idea consisted three major parts perl web interface openssl backend cryptographic operation database simple concept still developers motto today nearly operations performed via web interface six preconfigured interfaces many created depending need cryptographic backend openssl way disadvantage openca aimed build organizational infrastructure pki openca databases store needed information users cryptographic objects like certificate signing requests csrs certificates certificate revocation requests crrs certificate revocation lists crls today openca supports following elements incomplete list give impression complex subject matter openca designed distributed infrastructure handle offline ca online ra using build whole hierarchy three levels openca small solution small medium research facilities goal support maximum flexibility big organizations like universities grids global companies
|
Computer security
|
remote install mac os x remote install mac os x remote installer use macbook air laptops network works run macintosh windows-based pc optical drive connecting network client macbook air lacking optical drive perform system software installs remote install mac os x released part mac os x 10.5.2 february 12 2008 starting march 2009 version mac mini also supports remote install allowing dvd drive replaced second hard drive launch mac os x lion apple omitted remote install workaround enable target disk mode
|
Operating systems
|
galaga development led shigeru yokoyama small team initial planning took two months finish originally developed namco galaxian arcade board instead shifted new system suggested namco research development division inspiration duel fighter mechanic taken film yokoyama seen prior development ship captured using large circular beam project became immensely popular around company namco president masaya nakamura even taking interest although early location tests proved unsuccessful galaga received critical acclaim widely regarded classic golden age arcade video games one greatest video games time critics applauded gameplay innovation addictive nature improvements made predecessor several home ports released multitude platforms including msx atari 7800 nintendo entertainment system alongside releases digital distribution platforms xbox live arcade galaga also included many namco compilations followed sequel 1984 gaplus galaga fixed shooter video game player mans lone starfighter bottom screen must prevent galaga forces destroying mankind objective stage defeat galaga aliens fly formation top sides screen similar galaxian aliens dive towards player shooting projectiles colliding either result life lost atop enemy formation four large aliens known “ boss galaga ” take two shots destroy aliens ability release tractor beam capture player ship returning top formation costing player life additional lives remain player opportunity shoot boss galaga holding captured ship shooting dives towards player result captured ship rescued join player ship transforming duel fighter additional firepower larger hitbox however destroying boss galaga captured ship formation instead fighter turn player diving towards ship shooting projectiles third stage every fourth thereafter “ challenging stage ” aliens fly pre-set formation without firing player shooting alien stages award player 10,000 point bonus enemies ability morph new enemy types different attack patterns one even taking form galaxian flagship stages indicated emblems located bottom-right screen enemies become aggressive game progresses increasing number projectiles diving faster rate galaga created japanese developer shigeru yokoyama long-time veteran namco worked many company earlier games namco first big hit arcades galaxian 1979 credited one first video games utilize rgb color graphics success lead namco produce large amount namco galaxian arcade boards order keep demand however early 1980s game becoming harder sell help clear inventory yokoyama tasked creating two new games could run namco galaxian board first king balloon 1980 fixed shooter cited first video game incorporate speech second game instead made newer hardware suggested namco research development division new arcade board named namco galaga used several future games including bosconian 1981 dig dug 1982 although yokoyama given explicit instructions make shooting game management expressed desire make game similar galaxian initial planning project took two months idea dual fighter stemmed yokoyama wanting create enemies different attack styles tractor beam emitted boss galaga inspired film yokoyama seen prior development character ship captured circling laser taking interest idea yokoyama decided incorporate game enemy could capture player ship beam ship would need rescued originally rescuing captured ship would award player extra life soon changed fight alongside player idea proved problem first due hardware limitations game could display limited number sprites resulting duel fighter unable shoot missiles workaround yokoyama made 16x16 sprite ship 16x16 sprite bullets reducing total sprite count two inspired intermissions pac-man 1980 bonus stages rally-x 1980 yokoyama decided add special bonus level game planning lead programmer tetsu ogawa informed software bug found game enemies would simply fly screen instead moving formation ogawa expressed interest incorporating idea game leading inclusion challenging stages.enemies originally flew one type pattern added increase replay value graphic designer hiroshi ono designed many game sprites including player ship boss galaga alien prior location testing team focused designing instruction card sheet paper showed game played text done planners actual design handled graphic artist card originally showed control layout basics game stripped early boring yokoyama suggested card instead show dual fighter mechanic means draw players team kept bringing designs namco president masaya nakamura continued reject ordered team simply make front team allowed set deadlines due namco then-laidback corporate structure feedback project given nakamura employees including pac-man creator toru iwatani despite game immense popularity around company early location tests failed meet expectations due players able get far game one coin thus generating low income although yokoyama stated game popularity could still generate income namco executives instructed team strengthen difficulty level galaga released japan september 1981 released north america midway games october year sega-galaga first home conversion galaga published sega sg-1000 1983 msx version followed year later 1984 conversion family computer released 1985 japan later released internationally bandai nintendo entertainment system subtitled demons death atari inc. published atari 7800 version one console thirteen launch games namco published game boy version japan 1995 bundled galaxian titled galaxian galaga nintendo published game outside japan arcade classic brand two mobile phone versions released confined japan first i-mode 2001 second ezweb 2006 original arcade version released xbox live arcade service 2006 featuring online leaderboards achievements nes release ported wii virtual console 2007 followed arcade version 2009 roku port published 2011 2013 nes version released 3ds wii u virtual console galaga one four games released arcade game series brand published xbox one playstation 4 pc 2016 galaga included namco compilations including namco museum vol 1 1995 namco museum 64 1996 namco museum 50th anniversary 2005 namco museum virtual arcade 2008 namco museum essentials 2009 namco museum megamix 2010 2010 wii game pac-man party 2011 nintendo 3ds version include galaga extra alongside arcade versions dig dug pac-man celebration game 30th anniversary 2011 high-definition remake released ios devices part galaga 30th collection also included remakes galaxian gaplus galaga '88 alongside xbox 360 playstation 3 sequel galaga legions ported nintendo 3ds 2011 part pac-man galaga dimensions original version also added ios namco arcade compilation 2012 nes release one 30 games included nes classic edition galaga met widespread critical acclaim upon release many applauding game addictive nature gameplay structure innovation improvements predecessor popular game golden age arcade video games arcade express selected honorable mention 1983 arcade awards allgame praised game strategy making stand amongst games type labeling gameplay perfectly balanced shooting action reviewing nes home version gamespy called galaga must play arcade freaks praising port accurate representation arcade version terms graphics sound effects gameplay ign also praised nes port element strategy within duel fighter mechanic addictive gameplay gamespot review xbox 360 digital release stated gameplay tricky ever praising inclusion online leaderboards faithful arcade conversion eurogamer agreed citing leaderboards add game addictiveness ports galaga received praise faithfulness arcade original nintendo life praised 3ds virtual console port nes version remaining accurate original stating aged surprisingly well worth revisiting games magazine praised improvements games space invaders galaxian commenting galaga still holds years later joystick magazine praised nes version accurate portrayal arcade original notably graphics gameplay structure famicom tsūshin commended game boy version faithful conversion alongside support super game boy peripheral electric playground stated near top game boy next purchase list publications expressed disappointment towards home releases lacking extra features gamespot disliked lack online multiplayer xbox 360 release well lack updated graphics setting saying port awfully bare bones compared xbla releases eurogamer expressed distaste towards xbox 360 port high price point well achievements insultingly easy obtain eurogamer also agreed gamespot lack online multiplayer galaga listed numerous publications among greatest video games time flux magazine ranked 57 top 100 video games 1995 game informer listed 23 top 200 games time 2010 next generation ranked 96 top 100 games time innovation shoot 'em games whole game informer labeled 19th greatest video game ever made 2001 calling best game fixed-shooter genre electronic gaming monthly listed 20 100 best games time 1997 top 100 games time 2001 28 greatest 200 videogames time 2006 gamefaqs users voted 15th greatest game ever made 2004 10th 2009 gamespy staff voted eighth best arcade game time 2011 ranked 93 ign top 100 games time addictive gameplay long-standing appeal killer list videogames listed 27 top 100 video games list well 4th collected arcade game 2nd popular website electronic gaming monthly listed ms. pac-man/galaga class 1981 second best arcade game time inclusion games shortly game release namco produced miniature galaga cabinets buses airplanes housed small 17-inch crt monitors 2000 namco released arcade cabinet celebrate game 20th anniversary bundled ms. pac-man titled ms. pac-man galaga class 1981 similar cabinet released 2005 also included original pac-man made celebrate latter 25th anniversary galaga also included pac-man ’ arcade party 2010 pac-man ’ pixel bash 2019 galaga made cameo appearances several films including wargames 1983 karate kid 1984 planes trains automobiles 1987 avengers 2012 pixels 2015 submarine named game appears throughout abc television series lost hallmark cards released galaga arcade cabinet ornament 2009 played sound effects game 2019 researchers north carolina state university named extinct species shark galagadon nordquistae due shark teeth baring resemblance aliens found game galaga also subject several high score-based tournaments — 2019 world record held armando gonzales score 9,525,700 points galaga used loading screen minigame playstation version tekken tie-in anime series space dandy ios remake space galaga released 2015 featuring characters starships space dandy intermixed galaga gameplay similar crossover game galaga tekken edition released year replacing enemies characters tekken franchise galaga -themed costume also available downloadable-content littlebigplanet 3 boss galaga appears item super smash bros. nintendo 3ds wii u followup super smash bros ultimate capture opponent carry screen ultimate also features remix galaga soundtrack animated television adaptation galaga chronicles confirmed development
|
Computer architecture
|
groovle groovle web search site offered customers ability customise home page underlying service provided google company owned operated entirely independently december 2009 google lost court case claimed groovle domain similar control passed zak muscovitch attorney groovle stated case people use google people appreciate google people love google ... think people appreciate little guy takes giant wins
|
Web technology
|
surface hub surface hub brand interactive whiteboard developed marketed microsoft part microsoft surface family surface hub wall-mounted roller-stand-mounted device either 55-inch 140 cm 1080p 84-inch 210 cm 4k 120 hz touchscreen multi-touch multi-pen capabilities running windows 10 operating system devices targeted businesses use collaborating videoconferencing may 15 2018 microsoft announced second-generation surface hub 2 would released 2019 2012 microsoft acquired jeff han perceptive pixel previously developed large-screen multi-touch displays cnn magic wall microsoft indicated 2014 intended mass-produce devices part effort bring cost microsoft first announced surface hub windows 10 devices event january 21 2015 device use throughout majority keynote microsoft began taking surface hub pre-orders july 1 2015 55-inch model 84-inch model stating would begin shipping september 2015 however july 13 2015 announced microsoft surface blog pre-order demands greatly exceeded predictions shipments would delayed details regarding delays coming mid-august confirmed microsoft delayed shipment january 1 2016 december 2015 microsoft announced another delay would raising prices 2,000 though would honor price agreements pre-orders placed surface hub began shipping business customers march 25 2016 surface hub models use 4th-generation intel core haswell processors core i5 55-inch core i7 84-inch run 64-bit version windows 10 main differences two variants screen size resolution graphics adapters 55-inch model supports 1920 × 1080 full hd contains intel hd graphics 4600 controller integrated cpu more-expensive 84-inch model 3840 × 2160 4k resolution powered nvidia quadro k2200 discrete graphics adapter screen models high-definition display 120 hz refresh rate though intended use film tv screening screen capable achieving high levels brightness 424.38 cd/m reach minimum 1.58 cd/m screen touch sensor allows detect whether stylus used surface hub models wide-angle hd camera either side device cameras produce video 1080p 30 fps enabled four-element microphone array cameras sensors ambient light infrared presence allowing hub react light levels heat room e.g activating presentation program someone enters room used videoconferencing cameras intended automatically track person moving one side display according microsoft four-element microphone array detect whisper away pc magazine tests hub realistic estimation surface hub runs windows 10 team customized version windows 10 enterprise software product jt2go developed siemens allows users surface hub interact 3d model models displayed angle enlarged reduced real time application used windows 10 devices particularly useful surface hub skype business video conferencing included surface hub microsoft office applications also used including word powerpoint excel microsoft onenote allows users draw screen hub welcome screen three buttons – call whiteboard connect – corresponding promoted themes talking drawing sharing functions used individually simultaneously surface hub originally manufactured plant wilsonville oregon july 2017 however microsoft announced would moving production china closing plant following months resulting loss jobs 124 workers microsoft surface hub keyboard insufficient protection replay attacks attacker could control surface hub remotely certain scenarios
|
Operating systems
|
swaret swaret program slackware linux distribution resolves dependencies swaret stands slackware tool program created luc cottyn originally called autopkg however conflict another project name renamed swaret active maintainer swaret currently runs stux http //swaret.org
|
Operating systems
|
internet security awareness training internet security awareness training isat consists training members organization regarding protection various information assets organization organizations need comply government regulations i.e glba pci hipaa sarbox normally require formal isat employees usually twice year many small medium enterprises sme require isat regulatory compliance train employees prevent cyberheist internet security awareness training point time usually provided via online courses isat subset general security awareness training topics covered isat include internet security aware means understand people actively trying steal data stored within organization computers often focuses user names passwords criminal elements ultimately get access bank accounts high-value assets important protect assets organization stop happening according microsoft focus isat achieve immediate lasting change attitude employees towards internet security making clear security policies acceptable use policies vital survival organization rules restrict employee efficient work security awareness training employees one effective means reducing potential costly errors handling sensitive information protecting company information systems training conducted number means certain approaches effective others security awareness training ensure personnel solid understanding employer ’ security practices policies contrast uninformed employee susceptible malware phishing attacks forms social engineering substantial harm organization ’ systems place data risk key aspects awareness training program include following
|
Computer security
|
exile 1988 video game series exile series centers sadler syrian assassin main character game original computer versions notorious featuring various references religious historical figures modern political leaders iconography drugs time-traveling assassins although aspects considerably toned omitted later console games english versions rewriting historical religious organizations fictional groups first game series originally released nec pc-8801 july 1988 subsequently released msx2 nec pc-9801 august x1 turbo september gameplay included action-platform elements switching overhead perspective side-scrolling sections plot original xzr compared later assassin creed video game series soundtrack pc-8801 version composed yujiroh shinobu ogawa tenpei sato game centers sadler syrian assassin shia islamic sect journey kill caliph intro sequence briefly covers history middle east 622 ce first year islamic calendar including brief description hijra 1104 ce year sadler birth game starts baghdad sadler rescues rumi follows sadler persia babylon must defend euphrates river pollution oil magnate encounter assyrian queen semiramis babylonian goddess ishtar visit tower babel search unicorns heading alexandria becoming baptised jewish village searching ouroboros eventually sadler makes way back baghdad murders caliph revealed caliph father separated sadler kidnapped baby assassins game switches focus enters subplot mongol invasion sadler warped 20th century must assassinate russia general secretary america president ending game likely controversial ending telenet choose port original xzr decided bring series home consoles three years later opting remake sequel instead released december 17 1988 nec pc-8801 nec pc-9801 msx2 soundtrack pc-8801 version composed shinobu ogawa tenpei sato xzr ii depicts adventures sadler events previous game living time christian crusades sadler makes attempt unite world one god achieve world peace along way performs masonic ritual attempt revive mani slaughters many hindu buddhist deities sadler meets head knights templar hugues de payens helps search holimax holy artefact sadler travels several different countries including france rumi kidnapped india cambodia japan cambodian temple sadler resurrects manichaean prophet mani japan sadler rescues ninkan real life head japanese sex cult tachikawa-ryu afterwards sadler travels back time eden meets bacchus sadler also murders hiram abiff masonic figure defeating jubelum three ruffians sadler receives holimax first console installment series first released pc engine cd-rom² system march 29 1991 mega drive version released year december 6 versions game released north america following year genesis version published renovation products turbografx-cd version published working designs exile remake xzr ii rewrites story cutting one portion final act sadler time travels present day referenced ending original xzr removes character sufrawaldhi sadler fourth traveling companion genesis version removed scenes deemed inappropriate burning village instances naked women later areas working designs asked nec change names turbografx-cd version concerned religious drug-related elements hence christian crusaders became klispin crusaders given rules nec pretty sensitive subject direct references changed explained vic ireland worked closely game localization town crucified heretics burned alive left turbografx cd release removed genesis version final game series released japan super cd-rom² add-on september 22 1992 released north america july 31 1993 published working designs previous games featured heavy religious elements sadler striving defeat chaos solve mystery ancient tower game cover art featured photograph rarity north america game final boss handcrafted vic ireland commented saying exile 2 cover polarizing people love hate basically aping style diorama really popular advertise games japan ncs/masaya quite bit wanted bring us well chose exile 2 game try practical effects guy little models set ad done fx work movies like tremors since done work weta australia smoke time exposure give thickness glow ran ad egm gamepro ca n't remember sent us survey months later readers ad listed 'most remembered ad whole magazine think justified experiment tried vasteel results n't great used part one space scenes back cover jewel case protagonist series sadler voiced kaneto shiozawa japanese cd-rom version blake dorsey english young warrior village assassi excels swordsmanship martial arts companions include rumi voiced yūko minaguchi japanese rhonda gibson english female fellow warrior assassi skilled acrobatics espionage fakhyle voiced kōji yada japanese keith lack english elderly magician lends powers sadler kindhy voiced hirohiko kakegawa japanese unknown actor english silent giant unmatched superhuman strength xzr exile series action role-playing games consisting three types play modes hideout screens rpg screens action screens hideout screen consists menu player plan sadler next course actions viewing current companions belongings stats choosing next location visit game switches rpg mode player visits town consists overhead map player must explore order gather clues proceed story usually consists talking supporting characters fulfill tasks give order gain access new locations player also visit various types shops buy new equipment items player enters dungeon game switches side-scrolling action stage sadler must fight way enemies finding treasure chests along way achieving objective finding exit sadler fights primarily sword also use magic spells acquires ability like action rpgs sadler gains certain amount cash experience points every enemy kills addition hp hit points mp magic points two statistics represented screen ap attack power player offensive capabilities ac armor class player defensive capabilities determined sadler current level equipment one notable aspect original computer versions presence illicit drugs addition conventional items potions medical herbs sadler also uses narcotics hashish coca opiates lsd marijuana peyote heal increase attributes player ap ac statistics represented heart-rate graph computer versions green bars console version affected drugs sadlers uses overusing certain drugs would result side-effects including death exile console version xrz ii replaced illicit drugs fictionalized equivalents e.g opiates became heartpoisons lack negative side-effects original counterparts exile wicked phenomenon revamps several aspects previous games ditching hideout screens adding option switch sadler companions rumi kindi fakhyle action segments using unique abilities wicked phenomenon also brings back illicit narcotics missing original exile english version game using altered spellings names e.g cannabis became cananavis ap ac gauges longer present hud instead shows player health experience points cash player still use drugs temporarily enhance offensive defensive stats exile named one renovation top 10 games ign levi buchanan ign stated translation genesis edition pretty bad little effect breadth adventure game also featured positive light book 8-bit book – 1981 199x jerry ellis exile wicked phenomenon given decent review john huxley defunctgames.com wrote exile solid game successfully marries action role-playing said deep adventure ys ii also mentioned voiceovers terrific complaining graphics cutscenes little thin
|
Computer architecture
|
qizx qizx proprietary xml database provides native storage xml data qizx initially developed xavier franc axyana purchased qualcomm 2013 qizx re-released qualcomm late 2014 amazon web services qizx database configured run embedded application hosted client-server environment software service hosted amazon web services client-server version supports database clustering load balancing data redundancy qizx bundled multi-platform gui client also accessed restful api includes embedded online documentation qizx includes bindings java python c c well native xpath xquery support qizx also provides number extensions xquery language updating documents accessing document metadata various tasks
|
Databases
|
universal networking language universal networking language unl declarative formal language specifically designed represent semantic data extracted natural language texts used pivot language interlingual machine translation systems knowledge representation language information retrieval applications unl designed establish simple foundation representing central aspects information meaning machine- human-language-independent form language-independent formalism unl aims code store disseminate retrieve information independently original language expressed sense unl seeks provide tools overcoming language barrier systematic way first glance unl seems kind interlingua source texts converted translated target languages fact used purpose efficiently however real strength knowledge representation primary objective provide infrastructure handling knowledge already exists exist given language nevertheless important note present would foolish claim represent “ full ” meaning word sentence text language subtleties intention interpretation make “ full meaning ” however might conceive variable subjective systematic treatment thus unl avoids pitfalls trying represent “ full meaning ” sentences texts targeting instead “ core ” “ consensual ” meaning often attributed sense much subtlety poetry metaphor figurative language innuendo complex indirect communicative behaviors beyond current scope goals unl instead unl targets direct communicative behavior literal meaning tangible concrete basis human communication practical day-to-day settings unl approach information conveyed natural language represented sentence sentence hypergraph composed set directed binary labeled links referred relations nodes hypernodes universal words simply uws stand concepts uws also annotated attributes representing context information example english sentence ‘ sky blue ’ represented unl follows example sky icl natural world blue icl color represent individual concepts uws aoj attribute object directed binary semantic relation linking two uws def interrogative past exclamation entry attributes modifying uws uws intended represent universal concepts expressed english words natural language order humanly readable consist headword uw root constraint list uw suffix parentheses constraints used disambiguate general concept conveyed headword set uws organized unl ontology high-level concepts related lower-level ones relations icl kind iof instance equ equal relations intended represent semantic links words every existing language ontological icl iof referred logical thematic agt agent ins instrument tim time plc place etc. currently 46 relations unl specs jointly define unl syntax attributes represent information conveyed uws relations normally represent information concerning time past future etc reference def indef etc modality must etc focus topic focus etc within unl program process representing natural language sentences unl graphs called unlization process generating natural language sentences unl graphs called nlization unlization involves natural language analysis understanding intended carried semi-automatically i.e. humans computer aids nlization intended carried fully automatically unl programme started 1996 initiative institute advanced studies united nations university tokyo japan january 2001 united nations university set autonomous organization undl foundation responsible development management unl programme foundation non-profit international organisation independent identity united nations university although special links un inherited unu/ias mandate implementing unl programme fulfil mission programme already crossed important milestones overall architecture unl system developed set basic software tools necessary functioning tested improved vast amount linguistic resources various native languages already development well unl expression accumulated last years moreover technical infrastructure expanding resources already place thus facilitating participation many languages unl system growing number scientific papers academic dissertations unl published every year visible accomplishment far recognition patent co-operation treaty pct innovative character industrial applicability unl obtained may 2002 world intellectual property organisation wipo acquiring patents us patents 6,704,700 7,107,206 unl completely novel achievement within united nations
|
Computational linguistics
|
sqream db sqream db relational database management system rdbms uses graphics processing units gpus nvidia sqream db designed big data analytics using structured query language sql sqream db first product sqream technologies ltd founded 2010 ami gal kostya varakin tel aviv israel sqream db first released 2014 partnership orange s.a. silicon valley company claimed orange s.a. saved 6 million using sqream 2014 sqream db aimed budget multi-terabyte analytics market due modest hardware requirements use compression sqream db also basis product named genomestack querying many dna sequences simultaneously us 7.4m investment venture capital announced june 2015 example general-purpose computing graphics processing units competitors omnisci kinetica company applied patents encompassing parallel execution queries multi-core processors speeding parallel execution vector processors february 2018 sqream technologies partnered alibaba group alibaba cloud deliver gpu database solution alibaba cloud column-oriented database sqream db designed manage large fast-growing volumes data compute-intensive queries product claims improve query performance large datasets traditional relational database systems sqream db designed run premise cloud
|
Databases
|
generative lexicon generative lexicon gl theory linguistic semantics focuses distributed nature compositionality natural language first major work outlining framework james pustejovsky generative lexicon 1991 subsequent important developments presented pustejovsky boguraev 1993 bouillon 1997 busa 1996 first unified treatment gl given pustejovsky 1995 unlike purely verb-based approaches compositionality generative lexicon attempts spread semantic load across constituents utterance central philosophical perspective gl two major lines inquiry 1 able deploy finite number words language unbounded number contexts 2 lexical information representations used composing meanings separable commonsense knowledge gl initially developed theoretical framework encoding selectional knowledge natural language turn required making changes formal rules representation composition perhaps controversial aspect gl manner lexically encoded knowledge exploited construction interpretations linguistic utterances computational resources available lexical item within theory consist following four levels qualia structure inspired moravcsik 1975 interpretation aitia aristotle defined pustejovsky modes explanation associated word phrase language defined follows
|
Computational linguistics
|
network voice protocol network voice protocol nvp pioneering computer network protocol transporting human speech packetized communications networks early example voice internet protocol technology nvp first implemented december 1973 computer networking researcher danny cohen information sciences institute isi university southern california funding arpa network secure communications nsc program project stated goals develop demonstrate feasibility secure high-quality low-bandwidth real-time full-duplex two-way digital voice communications packet-switched computer communications networks ... supply digitized speech secured existing encryption devices major goal research demonstrate digital high-quality low-bandwidth secure voice handling capability part general military requirement worldwide secure voice communication nvp used send speech distributed sites arpanet using several different voice-encoding techniques including linear predictive coding lpc continuously variable slope delta modulation cvsd cooperating researchers included steve casner randy cole paul raveling isi jim forgie lincoln laboratory mike mccammon culler-harrison john markel speech communications research laboratory john makhoul bolt beranek newman protocol consisted two distinct parts control protocols data transport protocol control protocols included relatively rudimentary telephony features indicating wants talk ring tones negotiation voice encoding call termination data messages contained encoded speech encoding scheme vocoder frame defined packet containing negotiated transmission interval number digitized voice samples nvp used experimental voice funnel equipment circa february 1981 based bbn butterfly computers part ongoing arpa research packetized audio arpa staff contractors used voice funnel related video facilities three-way four-way video conferencing among handful us east west coast sites nvp transported internet stream protocol st later version called stream protocol version 2 st-ii connection-oriented versions internet protocol ip carried ip protocol version 5 protocols may viewed early experiments quality service connection-oriented network protocols asynchronous transfer mode atm
|
Internet protocols
|
fault technology document iso 10303-226 fault defined abnormal condition defect component equipment sub-system level may lead failure telecommunications according federal standard 1037c united states term fault following meanings random fault fault occurs result wear deterioration whereas time particular occurrence fault determined rate faults occur within equipment population average predicted accuracy manufacturers often accept random faults risk chances virtually negligible fault happen virtually object appliance common electronics machinery example xbox 360 console deteriorate time due dust buildup fans cause xbox overheat cause error shut console systematic faults often result error specification equipment therefore affect examples type faults remain undetected years conditions conduce create failure given circumstances every example equipment would fail identically time failures hardware caused random faults systematic faults failures software always systematic
|
Computer security
|
waste electrical electronic equipment directive waste electrical electronic equipment directive weee directive european community directive 2012/19/eu waste electrical electronic equipment weee together rohs directive 2011/65/eu became european law february 2003 weee directive set collection recycling recovery targets types electrical goods minimum rate 4 kilograms per head population per annum recovered recycling 2009 rohs directive set restrictions upon european manufacturers material content new electronic equipment placed market symbol adopted european council represent waste electrical electronic equipment comprises crossed-out wheelie bin without single black line underneath symbol black line indicates goods placed market 2005 directive came force goods without black line manufactured 2002 2005 instances treated historic weee fall outside reimbursement via producer compliance schemes directive undergone number minor revisions since inception 2002 directive 2002/96/ec european parliament council 27 january 2003 include updates 2006 2009 nine years directive seen failing achieve goals hence legislation amended 20 december 2011 european parliament european council agreed amendments directive subject second-reading vote taken 19 january 2012 changes affect method calculating collection rates previously four kg per inhabitant per year provide transitional period seven years introduce revised method calculation present method retained first four years time amended directive comes force next three years commencing fifth year amendment calculation collection rates revised 45 weight e e products entering market seven years transitional period eu member states individually select actual collection options wish use overall aim eu recycle least 85 electrical electronics waste equipment 2016 directive imposes responsibility disposal waste electrical electronic equipment manufacturers distributors equipment requires companies establish infrastructure collecting weee way users electrical electronic equipment private households possibility returning weee least free charge directive saw formation national producer compliance schemes manufacturers distributors paid annual fee collection recycling associated waste electronics household waste recycling centres weee directive obliged twenty-five eu member states transpose provisions national law 13 august 2004 cyprus met deadline 13 august 2005 one year deadline member states except uk transposed least framework regulations weee directive transposed uk law 2006 active following year directive places weee numerous categories first tier historic non-historic historic weee implies equipment placed market prior 2005 weee directive places onus upon owner equipment make provisions recycling equipment placed market 2005 known non-historic weee denoted bar underneath crossed-out wheeled bin symbol responsibility producer/distributor make provisions collection recycling weee directive sets total 10 categories weee reporting purposes prior implementation weee directive uk waste electronic electrical equipment disposed household municipal waste stream post introduction hazardous waste regulations exclusions apply electrical electronic equipment deemed hazardous hazardous wastes derived issued universal eu descriptor european waste catalogue known uk list wastes denotes wastes six digit number three sets two hazardous wastes denoted asterisk end number hazardous electronic wastes comprise weee delivered household waste recycling centres hwrc also known designated collection facilities dcfs collected delivered approved authorised treatment facilities aatfs waste electrical electronic equipment weighed categorised accordance directive post re-processing recycling total volumes category reported producer compliance scheme reprocessor reimbursed accordingly totals obligated weee aatfs collated environment agency quarterly basis reported eu historically problems implementation producer compliance schemes due double counting reporting reprocessed weee producer compliance schemes arose obligated weee partially treated first aatf receive waste prior passed onto second aatf treatment first second aatf would claim waste electronics resulting net debt wastes treated additional legislation applies management weee applied via waste hierarchy particular emphasis upon reduction waste arising re-use equipment recycling recovery materials reduce reuse recycle january 2012 proposals debated european parliament recast weee directive proposals included increasing recycling rates adopted member states re-drafted directive requires higher recovery rates 20 kg per capita per annum opposed previous figures 4 kg per capita april 2005 royal society arts uk conjunction canon unveiled 7 metre tall sculpture titled weee man london south bank made 3.3 tonnes electrical goods—the average amount electrical waste one uk individual creates lifetime designed paul bonomini fabricated stage one creative services giant figure subsequently moved eden project cornwall part uk tour
|
Computer security
|
sector/sphere sector/sphere open source software suite high-performance distributed data storage processing broadly compared google gfs mapreduce technology sector distributed file system targeting data storage large number commodity computers sphere programming architecture framework supports in-storage parallel data processing data stored sector sector/sphere operates wide area network wan setting system created yunhong gu author udp-based data transfer protocol 2006 maintained group developers sector/sphere consists four components security server maintains system security policies user accounts ip access control list one master servers control operations overall system addition responding various user requests slave nodes store data files process upon request clients users computers system access data processing requests issued also sector/sphere written c++ claimed achieve architecture two four times better performance competitor hadoop written java statement supported aster data systems benchmark winning bandwidth challenge supercomputing conference 2006 2008 2009 sector user space file system relies local/native file system node storing uploaded files sector provides file system-level fault tolerance replication thus require hardware fault tolerance raid usually expensive sector split user files blocks instead user file stored intact local file system one slave nodes means sector file size limitation application specific advantages however sector file system simple leads better performance sphere parallel data processing due reduced data transfer nodes also allows uploaded data accessible outside sector system sector provides many unique features compared traditional file systems sector topology aware users define rules files located replicated system according network topology example data certain user located specific cluster replicated racks another example files replicas others rules applied per-file level topology awareness use udt data transfer protocol allows sector support high performance data io across geographically distributed locations file systems deployed within local area network reason sector often deployed content distribution network large datasets sector integrates data storage processing one system every storage node also used process data thus support massive in-storage parallel data processing see sphere sector application aware meaning provide data location information applications also allow applications specify data location whenever necessary simple example benefits sphere sector return results commands grep md5sum without reading data file system moreover compute results multiple files parallel sector client provides api application development allows user applications interact directly sector software also comes prepackaged set command-line tools accessing file system finally sector supports fuse interface presenting mountable file system accessible via standard command-line tools sphere parallel data processing engine integrated sector used process data stored sector parallel broadly compared mapreduce uses generic user defined functions udfs instead map reduce functions udf either map function reduce function even others sphere manipulate locality input data output data thus effectively support multiple input datasets combinative iterative operations even legacy application executable sector split user files sphere simply wrap many existing applications accepts files directories input without rewriting thus provide greater compatibility legacy applications
|
Computer file systems
|
aurora protocol aurora protocol link layer communications protocol use point-to-point serial links developed xilinx intended use high-speed gigabits/second connections internally computer embedded system uses either 8b/10b encoding 64b/66b encoding
|
Internet protocols
|
heap spraying computer security heap spraying technique used exploits facilitate arbitrary code execution part source code exploit implements technique called heap spray general code sprays heap attempts put certain sequence bytes predetermined location memory target process allocate large blocks process heap fill bytes blocks right values heap spray actually exploit security issues used make vulnerability easier exploit heap spray used break security boundaries separate security issue needed exploiting security issues often hard various factors influence process chance alignments memory timing introduce lot randomness attacker point view heap spray used introduce large amount order compensate increase chances successful exploitation heap sprays take advantage fact architectures operating systems start location large heap allocations predictable consecutive allocations roughly sequential means sprayed heap roughly location every time heap spray run exploits often use specific bytes spray heap data stored heap serves multiple roles exploitation security issue application code often made read address arbitrary location memory address used code address function execute exploit force application read address sprayed heap control flow execution code uses address function pointer redirects sprayed heap exploit succeeds redirecting control flow sprayed heap bytes executed allowing exploit perform whatever actions attacker wants therefore bytes heap restricted represent valid addresses within heap spray holding valid instructions target architecture application crash therefore common spray single byte translates valid address nop nop-like instruction target architecture allows heap spray function large nop sled example 0x0c0c0c0c often used non-canonical nop heap sprays used occasionally exploits since least 2001 technique started see widespread use exploits web browsers summer 2005 release several exploits used technique wide range bugs internet explorer heap sprays used exploits similar showed versatility technique ease use without need major modifications exploits proved simple enough understand use allow novice hackers quickly write reliable exploits many types vulnerabilities web browsers web browser plug-ins many web browser exploits use heap spraying consist heap spray copy-pasted previous exploit combined small piece script html triggers vulnerability heap sprays web browsers commonly implemented javascript spray heap creating large strings common technique used start string one character concatenate way length string grow exponentially maximum length allowed scripting engine depending browser implements strings either ascii unicode characters used string heap spraying code makes copies long string shellcode stores array point enough memory sprayed ensure exploit works occasionally vbscript used internet explorer create strings using string function july 2009 exploits found using actionscript spray heap adobe flash though proven heap-spraying done means instance loading image files process seen widespread use august 2008 september 2012 new technique presented eusecwest 2012 two core researchers federico muttis anibal sacco showed heap sprayed high allocation granularity use technologies introduced html5 specifically used low-level bitmap interface offered canvas api web workers quickly
|
Computer security
|
question answering question answering qa computer science discipline within fields information retrieval natural language processing nlp concerned building systems automatically answer questions posed humans natural language question answering implementation usually computer program may construct answers querying structured database knowledge information usually knowledge base commonly question answering systems pull answers unstructured collection natural language documents examples natural language document collections used question answering systems include question answering research attempts deal wide range question types including fact list definition hypothetical semantically constrained cross-lingual questions two early question answering systems baseball lunar baseball answered questions us baseball league period one year lunar turn answered questions geological analysis rocks returned apollo moon missions question answering systems effective chosen domains fact lunar demonstrated lunar science convention 1971 able answer 90 questions domain posed people untrained system restricted-domain question answering systems developed following years common feature systems core database knowledge system hand-written experts chosen domain language abilities baseball lunar used techniques similar eliza doctor first chatterbot programs shrdlu highly successful question-answering program developed terry winograd late 1960s early 1970s simulated operation robot toy world blocks world offered possibility asking robot questions state world strength system choice specific domain simple world rules physics easy encode computer program 1970s knowledge bases developed targeted narrower domains knowledge question answering systems developed interface expert systems produced repeatable valid responses questions within area knowledge expert systems closely resembled modern question answering systems except internal architecture expert systems rely heavily expert-constructed organized knowledge bases whereas many modern question answering systems rely statistical processing large unstructured natural language text corpus 1970s 1980s saw development comprehensive theories computational linguistics led development ambitious projects text comprehension question answering one example system unix consultant uc developed robert wilensky u.c berkeley late 1980s system answered questions pertaining unix operating system comprehensive hand-crafted knowledge base domain aimed phrasing answer accommodate various types users another project lilog text-understanding system operated domain tourism information german city systems developed uc lilog projects never went past stage simple demonstrations helped development theories computational linguistics reasoning recently specialized natural language question answering systems developed eagli health life scientists wolfram alpha online computational knowledge engine answers factual queries directly computing answer externally sourced curated data 2001 question answering systems typically included question classifier module determines type question type answer multiagent question-answering architecture proposed domain represented agent tries answer questions taking account specific knowledge meta–agent controls cooperation question answering agents chooses relevant answer question answering dependent good search corpus without documents containing answer little question answering system thus makes sense larger collection sizes generally lend well better question answering performance unless question domain orthogonal collection notion data redundancy massive collections web means nuggets information likely phrased many different ways differing contexts documents leading two benefits question answering systems rely heavily automated reasoning number question answering systems designed prolog logic programming language associated artificial intelligence information retrieval open domain question answering system aims returning answer response user question returned answer form short texts rather list relevant documents system uses combination techniques computational linguistics information retrieval knowledge representation finding answers system takes natural language question input rather set keywords example national day china sentence transformed query logical form input form natural language question makes system user-friendly harder implement various question types system identify correct one order give sensible answer assigning question type question crucial task entire answer extraction process relies finding correct question type hence correct answer type keyword extraction first step identifying input question type cases clear words indicate question type directly i.e many words tell system answers type person location number respectively example word indicates answer type date pos part-of-speech tagging syntactic parsing techniques also used determine answer type case subject chinese national day predicate adverbial modifier therefore answer type date unfortunately interrogative words like give clear answer types words represent one type situations like words question need considered first thing find words indicate meaning question lexical dictionary wordnet used understanding context question type identified information retrieval system used find set documents containing correct key words tagger np/verb group chunker used verify whether correct entities relations mentioned found documents questions named-entity recogniser used find relevant person location names retrieved documents relevant paragraphs selected ranking vector space model used strategy classifying candidate answers check answer correct type determined question type analysis stage inference technique also used validate candidate answers score given candidates according number question words contains close words candidate closer better answer translated compact meaningful representation parsing previous example expected output answer 1st oct. recently open source math-aware question answering system based ask platypus wikidata published system takes english hindi natural language question input returns mathematical formula retrieved wikidata succinct answer resulting formula translated computable form allowing user insert values variables names values variables common constants retrieved wikidata available claimed system outperforms commercial computational mathematical knowledge engine test set question answering systems extended recent years encompass additional domains knowledge example systems developed automatically answer temporal geospatial questions questions definition terminology biographical questions multilingual questions questions content audio images video current question answering research topics include ibm question answering system watson defeated two greatest jeopardy champions brad rutter ken jennings significant margin facebook research made drqa system available open source license system used open domain question answering using wikipedia knowledge source
|
Computational linguistics
|
virtual memory computing virtual memory also virtual storage memory management technique provides idealized abstraction storage resources actually available given machine creates illusion users large main memory computer operating system using combination hardware software maps memory addresses used program called virtual addresses physical addresses computer memory main storage seen process task appears contiguous address space collection contiguous segments operating system manages virtual address spaces assignment real memory virtual memory address translation hardware cpu often referred memory management unit mmu automatically translates virtual addresses physical addresses software within operating system may extend capabilities provide virtual address space exceed capacity real memory thus reference memory physically present computer primary benefits virtual memory include freeing applications manage shared memory space increased security due memory isolation able conceptually use memory might physically available using technique paging virtual memory makes application programming easier hiding fragmentation physical memory delegating kernel burden managing memory hierarchy eliminating need program handle overlays explicitly process run dedicated address space obviating need relocate program code access memory relative addressing memory virtualization considered generalization concept virtual memory virtual memory integral part modern computer architecture implementations usually require hardware support typically form memory management unit built cpu necessary emulators virtual machines employ hardware support increase performance virtual memory implementations consequently older operating systems mainframes 1960s personal computers early mid-1980s e.g. dos generally virtual memory functionality though notable exceptions mainframes 1960s include operating system apple lisa example personal computer operating system 1980s features virtual memory 1960s early 70s computer memory expensive introduction virtual memory provided ability software systems large memory demands run computers less real memory savings provided strong incentive switch virtual memory systems additional capability providing virtual address spaces added another level security reliability thus making virtual memory even attractive market place modern operating systems support virtual memory also run process dedicated address space program thus appears sole access virtual memory however older operating systems os/vs1 os/vs2 svs even modern ones ibm single address space operating systems run processes single address space composed virtualized memory embedded systems special-purpose computer systems require fast and/or consistent response times may opt use virtual memory due decreased determinism virtual memory systems trigger unpredictable traps may produce unwanted unpredictable delays response input especially trap requires data read main memory secondary memory hardware translate virtual addresses physical addresses typically requires significant chip area implement chips used embedded systems include hardware another reason systems n't use virtual memory 1940s 1950s larger programs contain logic managing primary secondary storage overlaying virtual memory therefore introduced extend primary memory make extension easy possible programmers use allow multiprogramming multitasking many early systems divided memory multiple programs without virtual memory early models pdp-10 via registers concept virtual memory first developed german physicist fritz-rudolf güntsch technische universität berlin 1956 doctoral thesis logical design digital computer multiple asynchronous rotating drums automatic high speed memory operation described machine 6 100-word blocks primary core memory address space 1,000 100-word blocks hardware automatically moving blocks primary memory secondary drum memory paging first implemented university manchester way extend atlas computer working memory combining 16,384 words primary core memory additional 98,304 words secondary drum memory first atlas commissioned 1962 working prototypes paging developed 1959 1961 burroughs corporation independently released first commercial computer virtual memory b5000 segmentation rather paging virtual memory could implemented mainstream operating systems many problems addressed dynamic address translation required expensive difficult-to-build specialized hardware initial implementations slowed access memory slightly worries new system-wide algorithms utilizing secondary storage would less effective previously used application-specific algorithms 1969 debate virtual memory commercial computers ibm research team led david sayre showed virtual memory overlay system consistently worked better best manually controlled systems throughout 1970s ibm 370 series running virtual-storage based operating systems provided means business users migrate multiple older systems fewer powerful mainframes improved price/performance first minicomputer introduce virtual memory norwegian nord-1 1970s minicomputers implemented virtual memory notably vax models running vms virtual memory introduced x86 architecture protected mode intel 80286 processor segment swapping technique scaled poorly larger segment sizes intel 80386 introduced paging support underneath existing segmentation layer enabling page fault exception chain exceptions without double fault however loading segment descriptors expensive operation causing operating system designers rely strictly paging rather combination paging segmentation nearly current implementations virtual memory divide virtual address space pages blocks contiguous virtual memory addresses pages contemporary systems usually least 4 kilobytes size systems large virtual address ranges amounts real memory generally use larger page sizes page tables used translate virtual addresses seen application physical addresses used hardware process instructions hardware handles specific translation often known memory management unit entry page table holds flag indicating whether corresponding page real memory real memory page table entry contain real memory address page stored reference made page hardware page table entry page indicates currently real memory hardware raises page fault exception invoking paging supervisor component operating system systems one page table whole system separate page tables application segment tree page tables large segments combination one page table different applications running time use different parts single range virtual addresses multiple page segment tables multiple virtual address spaces concurrent applications separate page tables redirect different real addresses earlier systems smaller real memory sizes sds 940 used page registers instead page tables memory address translation part operating system creates manages page tables hardware raises page fault exception paging supervisor accesses secondary storage returns page virtual address resulted page fault updates page tables reflect physical location virtual address tells translation mechanism restart request physical memory already use paging supervisor must free page primary storage hold swapped-in page supervisor uses one variety page replacement algorithms least recently used determine page free operating systems memory areas pinned never swapped secondary storage terms used locked fixed wired pages example interrupt mechanisms rely array pointers handlers i/o completion page fault pages containing pointers code invoke pageable interrupt-handling would become far complex time-consuming particularly case page fault interruptions hence part page table structures pageable pages may pinned short periods time others may pinned long periods time still others may need permanently pinned example ibm operating systems system/370 successor systems term fixed pages may long-term fixed may short-term fixed may unfixed i.e. pageable system control structures often long-term fixed measured wall-clock time i.e. time measured seconds rather time measured fractions one second whereas i/o buffers usually short-term fixed usually measured significantly less wall-clock time possibly tens milliseconds indeed os special facility fast fixing short-term fixed data buffers fixing performed without resorting time-consuming supervisor call instruction multics used term wired openvms windows refer pages temporarily made nonpageable i/o buffers locked simply nonpageable never pageable os/vs1 similar oses parts systems memory managed virtual-real mode called v=r mode every virtual address corresponds real address mode used interrupt mechanisms paging supervisor page tables older systems application programs using non-standard i/o management example ibm z/os 3 modes virtual-virtual virtual-real virtual-fixed paging page stealing used problem called thrashing occur computer spends unsuitably large amount time transferring pages backing store hence slowing useful work task working set minimum set pages memory order make useful progress thrashing occurs insufficient memory available store working sets active programs adding real memory simplest response improving application design scheduling memory usage help another solution reduce number active tasks system reduces demand real memory swapping entire working set one processes systems burroughs b5500 use segmentation instead paging dividing virtual address spaces variable-length segments virtual address consists segment number offset within segment intel 80286 supports similar segmentation scheme option rarely used segmentation paging used together dividing segment pages systems memory structure multics ibm system/38 usually paging-predominant segmentation providing memory protection intel 80386 later ia-32 processors segments reside 32-bit linear paged address space segments moved space pages page main memory providing two levels virtual memory operating systems instead using paging early non-hardware-assisted x86 virtualization solutions combined paging segmentation x86 paging offers two protection domains whereas vmm guest os guest applications stack needs three difference paging segmentation systems memory division segmentation visible user processes part memory model semantics hence instead memory looks like single large space structured multiple spaces difference important consequences segment page variable length simple way lengthen address space segmentation provide single-level memory model differentiation process memory file system consists list segments files mapped process potential address space mechanisms provided calls mmap win32 mapviewoffile inter-file pointers work mapping files semi-arbitrary places multics file segment multi-segment file mapped segment address space files always mapped segment boundary file linkage section contain pointers attempt load pointer register make indirect reference causes trap unresolved pointer contains indication name segment pointer refers offset within segment handler trap maps segment address space puts segment number pointer changes tag field pointer longer causes trap returns code trap occurred re-executing instruction caused trap eliminates need linker completely works different processes map file different places private address spaces operating systems provide swapping entire address spaces addition whatever facilities paging segmentation occurs os writes pages segments currently real memory swap files swap-in os reads back data swap files automatically read back pages paged time swap operation ibm mvs os/vs2 release 2 z/os provides marking address space unswappable pin pages address space done duration job entering name eligible main program program properties table unswappable flag addition privileged code temporarily make address space unswappable using sysevent supervisor call instruction svc certain changes address space properties require os swap swap back using sysevent transwap
|
Operating systems
|
sarvega sarvega intel-owned company provided xml appliances intel purchase announced aug. 17th 2005 company brought intel software services group ssg global 1000 organizations using sarvega xpe switches include fujitsu health care supplier mt sinai hospital systems reactivity westbridge technology sarvega also trying establish security appliances product developing maintaining safety policy settings xml appliance
|
Web technology
|
prova prova open source programming language combines prolog java prova rule-based scripting system used middleware language combines imperative declarative programming using prolog syntax allows calls java functions way strong java code base combined prolog features backtracking prova derived mandarax java-based inference system developed jens dietrich prova extends mandarax providing proper language syntax native syntax integration java agent messaging reaction rules development language supported grant provided within eu projects genestream biogrid project language used rule-based backbone distributed web applications biomedical data integration particular gopubmed system design goals prova prova aims provide support data integration tasks following important prova used key service integration engine xcalia product used computing efficient global execution plans across multiple data sources web services tp monitors transactions like cics ims messages mom like mq-series packaged applications jca connector legacy data sources mainframes jca connector remote ejb java objects considered data providers even local java objects prova allows deliver innovative software platform service-oriented architecture implementations
|
Distributed computing architecture
|
sumo logic sumo logic cloud-based machine data analytics company focusing security operations bi usecases provides log management analytics services leverage machine-generated big data deliver real-time insights headquartered redwood city california sumo logic founded april 2010 arcsight veterans kumar saurabh christian beedgen received funding accel partners dfj growth greylock partners institutional venture partners sequoia capital sapphire ventures sutter hill ventures angel investor shlomo kramer battery ventures tiger global management franklin templeton may 2019 company collected vc funding totaling 345 million sumo logic architecture features elastic petabyte scale platform collects manages analyzes enterprise log data reducing millions log lines operational security insights real time cloud-based approach overcomes inherent problems premises-based solutions including limits scalability inefficient haphazard analysis uncontrolled costs sumo logic built around globally distributed data retention architecture keeps log data available instant analysis eliminating need enterprise manage cost complexity data archiving backups restoration service entirely cloud-based maintenance free instead inelastic security information event management systems sumo logic employs elastic processing collect manage analyze log data regardless type volume location sumo logic modeled approach google according christian beedgen company cto one co-founders using advanced machine-learning algorithms whittle mountains log file data common groupings sumo logic platform mirrors google news categorization news stories distributed across web sumo logic able ease process administrators synthesize analyze data june 2012 sumo logic announced sumo logic free freemium full functionality edition analytical solution deployed amazon web services august 2012 company announced sumo logic vmware allows enterprises search visualize analyze vmware logs real time monitor detect events within vmware virtual environments 2016 sumo logic launched data analytics platform unifies logs metrics analyze structured metrics data unstructured log data real-time graphical interactive dashboards aws 2017 conference sumo logic presented machine data analytics service combines analytics docker kubernetes service streamlines data ingestion sumo logic machine data analytics service hosted amazon web services 2018 sumo logic announced expansion integrations google cloud platform releasing integrations gcp applications integration tensorflow september 2018 sumo logic announced addition cloud siem solution machine data analytics platform sumo logic works pokémon company provide analytics pokémon go including threats security vulnerabilities log aggregation security analytics april 2019 sumo logic launched bidirectional integration atlassian ’ opsgenie incident alert service integration gives users ability create analyze alerts incident data sumo logic remained stealth mode two years unveiled cloud-based log management platform series b funding 15 million january 2012 round series e funding announced june 2015 brings company total venture capital backing 160.5 million june 27 company closed series f round 75 million path ipo may 2019 sumo logic announced 110 million series g investment indicated valuation north billion dollars sumo logic founded 2010 technical leadership team expertise log management scalable systems big data security including ramin sayar formerly vmware sumo logic ceo since december 2014 previously vance loiselle formerly bladelogic ceo may 2012 december 2014 april 2012 sumo logic formed new advisory board bringing three silicon valley veterans dj patil greylock partners gerhard eschelbeck sophos nir zuk palo alto networks sumo logic service powered patent-pending elastic log processing logreduce push analytics technologies january 2012 rsa named sumo logic one top 10 finalists innovative company rsa april 2012 radar conference sumo logic received judge choice audience choice awards performance monitoring may 2012 sumo logic named red herring americas 2012 top 100 winner may 7 2014 sumo logic named cool vendor gartner application performance monitoring apm operations analytics itoa categories
|
Computer security
|
allway sync allway sync backup file synchronization software allows backing synchronizing files different drives different media cd dvd flash zip remote server various versions users freeware version requested buy pro version use software commercial purpose synchronize 40,000 files 30-day period pro version exactly functionality free version
|
Computer security
|
jack dunlap jack edward dunlap november 14 1927 – july 23 1963 united states army sergeant stationed national security agency later became spy soviet union early 1960s army sergeant assigned nsa subject polygraph examination retired army soviet handlers told apply civilian position given polygraph examination nsa friday passed examination examiner told fbi something made uneasy told dunlap come back monday dunlap committed suicide weekend carbon monoxide poisoning director security nsa told fbi agents assistant paid visit dunlap widow offer condolences said probably want papers showing classified material nsa realized dunlap spy dunlap personable individual roamed around within nsa one secretary told fbi stopped desk chat would see papers box tell headed direction take papers would stop xerox machine way make copy soviets
|
Computer security
|
nokia e7-00 nokia e7-00 also known nokia e7 business-oriented qwerty smartphone nokia nokia eseries announced nokia world september 2010 together nokia c6-01 nokia c7 started shipping february 2011 second phone nokia n8 running symbian^3 operating system compared nokia n8 fixed mass storage 16gb without memory card slot fm transmitter less advanced camera extended depth field instead autofocus n8 e90 like nokia n8 comes hdmi-out connector non-user-replaceable battery smaller e90 keyboard spring mechanism nokia n97 mini like n8 anodized aluminium casing different bulkier heavier e90 compared nokia n97 mini e90 e7-00 multitouch capacitive touchscreen unlike n8 n97 mini e90 e7-00 active-matrix oled amoled clearblack technology slightly lower resolution e90 vlasta berka general manager nokia singapore malaysia brunei talked trend users using smartphones business parliament finland bought 200 e7s spring 2011 late april 2012 50 phones serviced warranty fixed os update e7 battery user-removable although unofficial online tutorials replace battery exist
|
Operating systems
|
windows mixed reality windows mixed reality mixed reality platform introduced part windows 10 operating system provides holographic mixed reality experiences compatible head-mounted displays flagship device microsoft hololens announced windows 10 next chapter press event january 21 2015 provides mixed reality experience live presentation physical real-world elements incorporated virtual elements referred holograms microsoft perceived exist together shared environment variant windows augmented reality computers augment real-world physical environment virtual elements windows mixed reality features augmented-reality operating environment universal windows platform app run platform also used virtual reality headsets designed use windows 10 fall creators update built specifications implemented part windows mixed reality lack support holographic experiences premier device windows mixed reality microsoft hololens smart-glasses headset cordless self-contained windows 10 computer running windows 10 holographic uses various sensors high-definition stereoscopic 3d optical head-mounted display spatial sound allow augmented reality applications natural user interface user interacts gaze voice hand gestures codenamed project baraboo hololens development five years announcement 2015 conceived earlier original pitch made late 2007 would become kinect technology platform microsoft targeted hololens release windows 10 timeframe microsoft hololens development edition begin shipping march 30 2016 available application developers united states canada list price us 3000 although development edition considered consumer-ready hardware february 2016 microsoft set time frame consumer availability hololens hololens chief inventor alex kipman stating hololens consumer release market ready companies samsung electronics asus expressed interest working microsoft produce mixed-reality products based hololens intel made direct competitor called project alloy system called merged reality however cancelled september 22 2017 october 2016 hardware event microsoft announced multiple oems would release virtual reality headsets windows holographic platform based microsoft reference designs enabling room-scale virtual reality without external sensors components january 2017 prototypes presented consumer electronics show release later year microsoft later announced planned release development kits headsets game developers conference devices would supported windows 10 creators update game developers conference 2017 microsoft stated intended support windows mixed reality headsets xbox one 2018 specifically noting capabilities then-upcoming xbox one x hardware revision company later stated initially focusing pc platforms first wanted focus wireless vr solutions consoles october 2017 microsoft officially launched windows mixed reality lineup third-party headsets use windows 10 fall creators update including launch lineup headsets acer dell hp lenovo future products asus samsung officially referred windows mixed reality immersive headsets unlike hololens devices compatible virtual reality software underlying ecosystem referred windows mixed reality regardless experience immersive headsets feature integrated motion tracking eschewing standalone sensors contain cameras used track handheld motion controller accessories may bundled headset distributed optional accessories immersive headsets currently compatible mixed reality software obtained microsoft store universal apps software using steam virtual reality platform used htc vive ability run desktop software added windows 10 may 2019 update microsoft classifies minimum recommended system requirements windows mixed reality windows mixed reality pcs 60 fps windows mixed reality ultra pcs 90 fps minimum requirements specify intel core i5-7200u better laptops 8 gb ram intel hd graphics 620 better directx 12 support usb 3.0 hdmi displayport connections bluetooth 4.0 support controllers verge noted users wo n't need high-end gaming pc meet recommendations mixed reality portal universal windows platform app serves front-end windows mixed reality features 3d environment users explore customize application shortcuts virtual desktops feature originally launched one environment cliff house second skyloft added april 2018 update
|
Operating systems
|
360 web browser 360 web browser web browser created digital poke ios operating system launched october 2010 360 offers tabbed browsing downloading firefox sync themes file manager unrar/unzip capabilities major competitors 360 web browser safari google chrome atomic mercury
|
Operating systems
|
niosh power tools database niosh power tools database contains sound power levels sound pressure levels vibrations data variety common power tools tested researchers data collected unloaded loaded use power tools database created national institute occupational safety health niosh database created order provide information general public sound vibrations generated power tools use many tools produce sound levels high enough damage hearing precautions taken since information readily available cases niosh created power tools database ran tests power tools provide information according niosh power tools database particularly helpful determining 'real-world noise level power tools used job database part much larger hearing loss prevention research program conducted niosh hearing loss prevention research program designed reduce occupational hearing loss research application research real-world situations database advances goal informing buyers users power tools dangerous levels noise vibrations exposed using tools making people aware loud power tools actually niosh attempting encourage design production quieter power tools proper use hearing protectors using tools database also part larger niosh prevention initiative called buy quiet recent years buy quiet programs initiatives arisen effort combat occupational noise exposures programs promote purchase quieter tools equipment noise-induced hearing loss nihl increasingly common disorder often caused work-related activities construction manufacturing mining susceptible occupations nihl since many workers fields exposed high levels noise daily basis substantial part noise results use power tools produce dangerous levels noise although loudness power tools may quite apparent using actual level noise produced mostly unreported available easily online reference database provides detailed information noise levels appropriate action may taken protect workers information database originates testing done power tools niosh researchers testing conducted accordance iso 3744 ansi s12.15 calibration testing equipment performed tests begin tests conducted semi-anechoic chamber test setup includes ten-microphone array accelerometer case testing power tools unloaded condition tool suspended cables set operate full speed loaded condition tool used researcher perform task designed another researcher runs data acquisition programs data collected verified analyzed entered niosh power tools database currently niosh power tools database contains sound vibrations data 166 power tools including 11 different types tools 18 manufacturers testing additional power tools progress database updated reflect new data acquired database part niosh buy quiet efforts aimed helping companies buy less noisy equipment result less hearing loss online resources include practical guide noise meter showing length time exposure various everyday noises becomes hazardous employee training videos
|
Databases
|
microsoft hololens microsoft hololens known development project baraboo pair mixed reality smartglasses developed manufactured microsoft hololens first head-mounted display running windows mixed reality platform windows 10 computer operating system tracking technology used hololens trace lineage kinect add-on microsoft xbox gaming console introduced 2010 pre-production version hololens development edition shipped march 30 2016 targeted developers united states canada list price 3000 samsung asus extended offer microsoft help produce mixed-reality products collaboration microsoft based around concept hardware hololens october 12 2016 microsoft announced global expansion hololens publicized hololens would available preorder australia ireland france germany new zealand united kingdom also commercial suite similar pro edition windows enterprise features bitlocker security may 2017 suite sells 5,000 microsoft decided rent hololens without clients making full investment microsoft partner company called abcomrents give service hololens rental hololens 2 announced mobile world congress barcelona spain february 24 2019 available preorder 3500 hololens head-mounted display unit connected adjustable cushioned inner headband tilt hololens well forward backward wear unit user fits hololens head using adjustment wheel back headband secure around crown supporting distributing weight unit equally comfort tilting visor towards front eyes front unit houses many sensors related hardware including processors cameras projection lenses visor tinted enclosed visor piece pair transparent combiner lenses projected images displayed lower half hololens must calibrated interpupillary distance ipd accustomed vision user along bottom edges side located near user ears pair small red 3d audio speakers speakers competing typical sound systems obstruct external sounds allowing user hear virtual sounds along environment using head-related transfer functions hololens generates binaural audio simulate spatial effects meaning user virtually perceive locate sound though coming virtual pinpoint location top edge two pairs buttons display brightness buttons left ear volume buttons right ear adjacent buttons shaped differently—one concave one convex—so user distinguish touch end left arm power button row five small individual led nodes used indicate system status well power management indicating battery level setting power/standby mode usb 2.0 micro-b receptacle located along bottom edge 3.5 mm audio jack located along bottom edge right arm hololens features inertial measurement unit imu includes accelerometer gyroscope magnetometer four environment understanding sensors two side energy-efficient depth camera 120°×120° angle view 2.4-megapixel photographic video camera four-microphone array ambient light sensor addition intel cherry trail soc containing cpu gpu hololens features custom-made microsoft holographic processing unit hpu coprocessor manufactured specifically hololens microsoft soc hpu 1gb lpddr3 share 8mb sram soc also controlling 64gb emmc running windows 10 operating system hpu uses 28 custom dsps tensilica process integrate data sensors well handling tasks spatial mapping gesture recognition voice speech recognition according alex kipman hpu processes terabytes information one attendee estimated display field view demonstration units 30°×17.5° interview 2015 electronic entertainment expo june microsoft vice-president next-gen experiences kudo tsunoda indicated field view unlikely significantly different release current version hololens contains internal rechargeable battery average life rated 2–3 hours active use 2 weeks standby time hololens operated charging hololens features ieee 802.11ac wi-fi bluetooth 4.1 low energy le wireless connectivity headset uses bluetooth le pair included clicker thumb-sized finger-operating input device used interface scrolling selecting clicker features clickable surface selecting orientation sensor provides scrolling functions via tilting panning unit clicker features elastic finger loop holding device usb 2.0 micro-b receptacle charging internal battery 2016 number augmented-reality applications announced showcased microsoft hololens collection applications provided free developers purchasing microsoft hololens developer edition applications available launch include applications announced showcased hololens include developed collaboration jpl onsight integrates data curiosity rover 3d simulation martian environment scientists around world visualize interact collaborate together using hololens devices onsight used mission planning users able program rover activities looking target within simulation using gestures pull select menu commands jpl plans deploy onsight curiosity mission operations using control rover activities july 2015 hololens use hpu uses sensual natural interface commands—gaze gesture voice—sometimes referred ggv inputs gaze commands head-tracking allows user bring application focus whatever user perceiving elements —or virtual application button—are selected using air tap method similar clicking imaginary computer mouse tap held drag simulation move element well voice commands certain commands actions hololens shell carries adapts many elements windows desktop environment bloom gesture accessing shell performing similar function pressing windows key windows keyboard tablet xbox button xbox one controller performed opening one hand fingers spread palm facing windows dragged particular position well resized virtual elements windows menus pinned locations physical structures objects within environment carried fixed relation user following user move around title bars application windows title left buttons window management functions right april 2016 microsoft created microsoft hololens app windows 10 pc windows 10 mobile devices allows developers run apps use phone pc keyboard type text view live stream hololens user point view remotely capture mixed reality photos videos microsoft visual studio ide used develop applications 2d 3d hololens applications tested using hololens emulator included visual studio 2015 ide hololens development edition hololens run almost universal windows platform apps apps appear 2d projections windows 10 apis currently supported hololens cases app able run across windows 10 devices including hololens tools used develop applications windows pc windows phone used develop hololens app 3d applications holographic applications use windows holographic apis microsoft recommends unity engine vuforia create 3d apps hololens also possible developer build engine using directx windows apis
|
Operating systems
|
loadall loadall common name two different undocumented machine instructions intel 80286 intel 80386 processors allow access areas internal processor state normally outside ia-32 api scope like descriptor cache registers loadall 286 processors encoded 0fh 05h loadall 386 processors 0fh 07h variants – name implies – load cpu internal registers one operation loadall unique ability set visible part segment registers selector independently corresponding cached part allowing programmer bring cpu states otherwise allowed official programming model example usefulness techniques loadall set cpu allow access memory real mode without switch unreal mode requires switching protected mode accessing memory finally switching back real mode programs pre-xms versions ramdrive.sys 1985 smartdrv.sys 1986 well himem.sys 2.03 1988-08-04 2.04 1988-08-17 drivers ms-dos uniform software systems extender 1985 connector 1985 lotus 1-2-3 disk 1986 limulator software formerly tele-ware west aka los angeles securities group converted hard disk space extended memory expanded memory os/2 1.0 1.1 used 286 loadall instruction dos 3.3 4.0 reserved 102-byte buffer 0070:0100h normally occupied dos bios data need save restore loadall examination virtual-machine monitor code windows/386 2.10 shows uses 286 even less known 386 variant microsoft himem.sys version 2.06 also used loadall quickly copy extended memory 286 systems another interesting usage loadall laid book design os/2 would allow running former real-mode programs 16-bit protected mode utilized digital research concurrent dos 286 since 1985 well flexos 286 ibm 4680 os since 1986 marking descriptor caches gdt ldts present would allow operating system trap segment-register reloads well attempts performing real-mode–specific segment arithmetic emulate desired behavior updating segment descriptors loadall virtual 8086 mode 80286 however slow practical idea mostly discarded furthermore due errata early intel 80286 processors e-2 stepping result os/2 1.x – windows standard mode well – run dos programs real mode nevertheless idea lost led intel introduce virtual mode 80386 allowing implementation dos boxes last relatively efficient documented way loadall perform checks validity data loaded processor registers possible load processor state could normally entered using real mode pe=0 together paging pg=1 386-class cpus two loadall instructions never documented exist later processors opcodes reused amd64 architecture opcode 286 loadall instruction 0f05 became amd64 instruction syscall 386 loadall instruction 0f07 became sysret instruction definitions cemented even intel cpus introduction intel 64 implementation amd64 in-circuit emulator ice tool used low-level debugging intel 80386 asserting undocumented pin location b6 causes microprocessor halt execution enter ice mode microprocessor saves entire state area memory isolated normal system memory layout area suitable loadall instruction instruction used ice code return normal execution later processors evolved system management mode smm mode rsm instruction used load full cpu state memory area layout memory area similar one used loadall instruction 386-style loadall instruction executed 486 smm mode later processors rsm instruction different encoding took role opcode 0f05 instruction reads data addresses 00800–00866 whatever content segment registers 80286 loadall instruction used switch protected back real mode ca n't clear pe bit msw however use loadall instruction avoid need switch protected mode altogether opcode 0f07 instruction loads data address es edi actually uses es es descriptor
|
Computer architecture
|
dual table dual table special one-row one-column table present default oracle database installations oracle table single varchar2 1 column called dummy value x suitable use selecting pseudo column sysdate user oracle sql syntax requires clause queries n't require tables dual readily used cases charles weiss explains created dual created dual table underlying object oracle data dictionary never meant seen instead used inside view expected queried idea could join dual table create two rows result every one row table using group resulting join could summarized show amount storage data extent index extent name dual seemed apt process creating pair rows one beginning 10g release 1 oracle longer performs physical logical i/o dual table though table still exists dual readily available users database several databases including microsoft sql server mysql postgresql sqlite teradata enable one omit clause entirely table needed avoids need dummy table oracle equivalent “ dual ” table sqlserver
|
Databases
|
cubrid cubrid cube-rid open-source sql-based relational database management system rdbms object extensions developed naver corporation web applications name cubrid combination two words cube bridge cube standing sealed box provides security contents bridge standing data bridge cubrid separate license server engine interfaces server engine adopts gpl v2.0 later license allows distribution modification acquisition source code cubrid apis gui tools berkeley software distribution license obligation opening derivative works reason adopting two separate license systems provide complete freedom independent software vendors isv develop distribute cubrid-based applications feature distinguishes cubrid database relational database systems 3-tier client-server architecture consists database server connection broker application layer database server component cubrid database management system responsible storage operations statement execution cubrid database server instance mount use single database making inter-database queries impossible however one instance run machine unlike solutions database server compile queries executes queries precompiled custom access specification language cubrid connection broker main roles also local object pool enables parts execution deferred database server e.g tuple insertion deletion ddl statements thus lowering database server load since connection broker bound machine database server cubrid take advantage hardware resources several machines processing queries single database applications use one available apis connect cubrid connection broker cubrid high availability provides load-balanced fault-tolerant continuous service availability shared-nothing clustering fail-over fail-back automated mechanisms cubrid 3-tier architecture allows native support high-availability two-level auto failover broker failover server failover connecting broker via client api users specify connection url list alternative hosts brokers listening incoming requests case hardware network operating system software failure one hosts underlying client api automatically fails next host user provided high availability environment built 1 n master-slave server nodes slave node communicates master via cubrid heartbeat protocol master node unresponsive first slave nodes get promoted master role replication nodes achieved one three modes synchronous semi-synchronous asynchronous administrators specify list server hosts broker connect event failure master node another used cubrid provides built-in support database sharding sharding interface implemented special broker called cubrid shard communicating cubrid shard identical communicating normal broker client apis used features normal broker failover load balancing also apply cubrid shard storage implemented separate independent physical databases located separate cubrid server hosts shard fully configured high availability environment data distribution logic among shards lies cubrid shard determines shard use storage retrieval data based hash user defined algorithm cubrid supports online offline incremental backup connection broker configured four different modes read-write read-only slave-only preferred host read list alternative hosts user provided via connection url used method balance load load balancing used client api randomly choose host among specified connection url except one used connect last time chosen host available selection continue hosts determined unavailable case driver report error query execution plan cache implemented broker order skip compilation steps often used queries queries parametrized parsing two queries differ values literal constants share cache entry cubrid support b+-tree indexes single-column multi-column following types indexes created query optimizer use indexes produce faster execution plans using methods cubrid supports horizontal partitioning range hash value lists maximum 1024 partitions per table partitions accessed independently support operations valid normal table version 9.0 cubrid implements execution-time partition pruning cubrid implements large subset ansi standard extended features later sql standards custom features cubrid provides support window functions defined standard implemented functions row_number count min max sum avg stddev_pop stddev_samp var_pop var_samp rank dense_rank lead lag ntile hierarchical queries using non-standard start ... connect oracle syntax supported cubrid number specialized pseudocolumns operators provided controlling behavior query execution cubrid optimizes common scenario web applications database fields need incremented certain events e.g page views contrast usual approach using select/update statement combination cubrid increment fields within select statement execution bypassing expensive compiling execution locking overhead associated update statement stored procedure language supported cubrid java requiring java virtual machine installed system virtual machine started managed server used code execution stored procedure code requires database access must use jdbc driver either using parent transaction issuing new one addition like operator cubrid provides regexp operator regular expression pattern matching default operator case insensitive matching input string modifier binary used case sensitive scenarios optional alias regexp rlike currently cubrid support regexp unicode strings variety data types supported cubrid cubrid available microsoft windows linux distributions 32- 64-bit architectures partial support os x implemented cubrid comes built-in command-line interface named csql used execute sql statements cubrid server tool used one two modes cubrid csql also implements internal commands related schema information plan generation debugging transaction control query timing cubrid provides number language-specific application programming interfaces c driver also called cci cubrid native driver jdbc php/pdo driver odbc oledb ado.net ruby driver python driver node.js driver tcl perl driver several graphical user interface tools developed cubrid applications websites added cubrid support powered cubrid
|
Databases
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.