text
stringlengths
6
1.88M
source
stringclasses
13 values
entrust entrust inc. 130 million privately owned software company 350 employees originally spin-off nortel secure networks division provides identity management security software services areas public key infrastructure pki multifactor authentication secure socket layer ssl certificates fraud detection digital certificates mobile authentication prior acquired datacard entrust headquartered dallas-fort worth metroplex also offices ottawa london tokyo washington d.c. cities internationally entrust reports customers public private organizations 60 countries 125 patents either granted pending areas authentication physical/logical access certificates e-content delivery citizen identities previously publicly traded company july 2009 entrust acquired thoma bravo u.s.-based private equity firm 124 million december 2013 datacard group announced acquisition entrust inc. subsequently rebranded entrust datacard datacard group finalized acquisition entrust december 2013 private equity firm thoma bravo chertoff capital wholly owned subsidiary chertoff group centerview partners acted financial advisors entrust september 2008 entrust participated epassports eac conformity interoperability tests prague czech republic facilitated consortium european commission brussels interoperability group big european commission joint research centre prague tests allowed european countries verify conformance second-generation epassports containing fingerprint biometric data protected extended access control functions commonly referred eac additional testing included verification crossover interoperability eac inspection systems epassports different countries prior becoming private-equity company entrust included russell 3000 index july 2008 july 2007 entrust contributed pki technology open-source community sun microsystems inc. mozilla foundation specifically entrust supplied certificate revocation list distribution points crl-dp patent 5,699,431 sun royalty-free license incorporation capability mozilla open-source libraries july 2006 entrust acquired business signatures corporation supplier non-invasive fraud detection solutions 50 million usd gaap accounting perspective total purchase price approximately 55.0 million including assumed stock options transaction expenses net asset value business signatures founded 2001 redwood city california former executives oracle hp cisco originally funded texas pacific group walden international ram shriram google dave roux silver lake partners company 40 employees acquisition entrust acquired orion security solutions supplier public key infrastructure services june 2006 mid-2004 entrust acquired amikanow corporation content scanning analysis compliance technology technology designed automatically analyze categorize email message document content based contextual meaning rather pre-defined word lists policies customized suit corporate environment automatically enforced boundary aimed compliance privacy securities laws including hipaa gramm-leach-bliley act personal information protection electronic documents act various u.s. securities exchange commission sec regulations april 2002 entrust pki technology served foundation prototype united states federal bridge certification authority fbca federal bridge certificate authority fundamental element trust infrastructure provides basis intergovernmental cross-governmental secure communications entrust pki interoperable major fbca vendors may 2000 entrust acquired encommerce provider authentication authorization technologies 1994 entrust built sold first commercially available pki
Computer security
matt lee artist matt lee born july 21 1981 british artist comedian director software freedom activist hacker writer free software developer previously gitlab formerly technical lead creative commons 2014-2016 speaker webmaster gnu project also founded gnu social gnu fm projects 2008 2012 lee main contact behind free software foundation defective design play ogg campaigns also served chief-webmaster gnu project 2007 lee wrote produced happy birthday gnu starring stephen fry short film commemorate 25th anniversary gnu project final product released creative commons license 2015 co-wrote directed first feature orang-u ape goes college lee currently delivers speeches following topics english
Operating systems
nokia n95 nokia n95 smartphone produced nokia part nseries line portable devices announced september 2006 released market march 2007 n95 ran s60 3rd edition symbian os v9.2 two-way sliding mechanism used access either media playback buttons numeric keypad first released silver later black limited edition quantities gold purple launch price n95 around n95 high-end model marketed multimedia computer much like nseries devices featured then-high 5 megapixel resolution digital camera carl zeiss optics flash well then-large display measuring 2.6 inches also nokia first device built-in global positioning system gps receiver used maps turn-by-turn navigation first accelerometer also one earliest devices market supporting hsdpa 3.5g signals introduction original model technically named n95-1 several updated versions released notably n95 8gb 8 gigabytes internal storage larger display improved battery 'classic n95 upgraded variant n95 8gb widely considered breakthrough technologies time well noted camera gps mapping capabilities innovative dual-slider hailed one best mobile devices released phone unveiled 26 september 2006 nokia open studio 2006 event new york city considered turning point mobile industry due various capabilities however device took long finally released almost 6 months 8 march 2007 nokia shipping n95 key european asian middle eastern markets sale many countries week 11 march n95 still available limited quantities early stage therefore price briefly raised 800 euros 7 april 2007 n95 went sale united states nokia flagship stores new york chicago nokia nseries.com website us carriers expected offer phone u.s. version started retailing without carrier branding discounts nokia flagship stores new york chicago 26 september 2007 29 august 2007 two updated versions n95 announced press event london first n95-2 n95 8 gb updated version european/asian markets 8 gigabytes internal storage larger screen secondly n95-3 n95 nam replacing original 2100 mhz w-cdma air interface support 850 mhz 1900 mhz frequencies used 3g networks gsm-compatible mobile carriers americas including mobility finally later 7 january 2008 nokia introduced n95-4 us 8 gb version n95-3 phone got fcc approval 30 january launched 18 march first carrier utilise approval rogers wireless may 2009 also ces 2008 red-coloured limited edition nokia n95 announced released year n95 main competitors lifetime lg prada apple iphone sony ericsson w950i k850 n95 managed outsell rivals despite apple much-hyped iphone multi-touch technology thin design advanced web capabilities n95 several key features iphone camera flash video camera bluetooth file sharing 3g 3.5g connectivity gps third-party applications several features even release later nseries phones n95 retail price still around early 2010 despite three-year old age n95 contained integrated gps receiver located 0 key keypad phone ships nokia maps navigation software box n95 supported audio mp3 wma realaudio sp-midi aac+ eaac+ midi amr m4a formats two-way slide opened towards keypad allowed access media playback buttons standard 3.5 mm jack located left side phone allowed user connect standard headphones unit ad-43 headset adapter n95 introduced support multiple remote control buttons headset users also use bluetooth audio output using a2dp use built-in stereo speakers n95 also capable playing video 3gp mpeg4 realvideo newer firmware flash video formats phone video output could also played tv-out feature tv-out feature offered phones omap processor allowed users connect smartphone using supplied cable tv composite video input main purpose allow users show photos videos large screen n95 built upnp capabilities also allowed user share phones media wlan network provides easy access photos music videos stored phone upnp capable devices network enabling watched downloaded air n95 built-in wi-fi could access internet 802.11b/g wireless network n95 could also connect internet carrier packet data network umts hsdpa edge webkit-based browser displayed full web pages opposed simplified pages phones web pages may viewed portrait landscape mode automatic zooming supported n95 also built-in bluetooth works wireless earpieces use bluetooth 2.0 technology file transfer original n95 support us based versions umts/hsdpa umts features versions phone disabled default furthermore later n95 us versions support 850/1900 mhz umts/hsdpa bands neither 1700 mhz t-mobile usa 2100 mhz bands supported internationally phone could also act wan access point allowing tethered pc access carrier packet data network voip software functionality also included phone though carriers opted remove feature n95 included built-in accelerometer originally used video stabilization photo orientation keep landscape portrait shots oriented taken nokia research center allowed application interface directly accelerometer allowing software use data nokia released step counter application demonstrate another nokia-created application taking advantage accelerometer nokia sports tracker third-party programs created including software automatically change screen orientation phone tilted program simulates sounds star wars lightsaber phone waved air program allowing user mute phone turning face-down etc n95 compatible n-gage mobile gaming service n95 much talked announcement initially viewed niche feature-packed device however became huge sales success nokia released regions 7 million nokia n95 units sold end 2007 q1 2008 report nokia claimed 3 million n95 including 8gb variant units shipped quarter bringing total least 10 million managed outsell rivals lg viewty iphone camera capabilities put competition phones sony ericsson k850i december 2007 mobile gazette called best phone 2007 6 november 2007 allaboutsymbian declared n95 8gb best smartphone ever years later 24 january 2013 pc magazine described nokia n95 one best smartphones history platform slightly improved model candybar form called nokia n82 released late 2007 next year saw introduction nokia n96 revision n95 called n95 8 gb n95-2 internally known rm-320 announced 21 august 2007 put market october 2007 released black color instead silver like n95-1 new model original n95 often referred n95 classic changes compared original n95 nokia n95-3 revision n95 internally designated rm-160 designed specifically north american market also available australian south american market following changed original version main differences n95-2 n95-3 n95-4 also additional changes removal sliding lens cover camera improved battery life doubling ram 64 128 mb featuring internal name rm-245 n95-5 targeted chinese market main difference regular n95 lack 3g connectivity support yet adopted china time release absence wlan connectivity due chinese regulations n95-6 internally coded rm-321 chinese market-targeted version n95-2 lacking 3g wlan support like n95-5 table lists specifications differ versions n95 models
Operating systems
input/output supervisor input/output supervisor ios ios 11 portion control program ibm mainframe os/360 successors operating systems issues privileged i/o instructions supervises resulting i/o interruptions program requests i/o device operations normal abnormal conclusion operations ios two purposes facilitate handling i/o requests interruptions ios divided two primary program sections csects primary sections resident main storage provide control program support normal execution channel programs secondary program sections also csects termed error recovery procedures erps one exception located external storage brought main storage recovery abnormal execution channel programs early instances os sections brought input/output supervisor transient area unlike os/360 control program supervisor call transient areas post-mvt instances os sections located pageable linkpack area plpa demand-paged sole exception course erp direct access storage devices must always remain resident order recover possible i/o errors ipl volume volumes contain datasets may concatenated certain system datasets ios designed around multi-programming concept whereby operations different i/o channels control units devices may managed concurrently apparently simultaneously concurrency apparent simultaneity present even basic version os pcp otherwise supports one user task underlying hardware architecture one set i/o instructions one i/o interruption accessing devices accessing resulting device status respectively available support attached i/o devices hence i/o device operations must synchronously multiplexed half-dozen privileged i/o instructions asynchronously de-multiplexed single i/o interruption ios yet entire process start finish made appear synchronous application essentially ios hypervising operating system built top os entirely within separable function specialized hypervisor sure hypervisation restricted several i/o instructions one i/o interruption mvs/370 later instances os ios also designed around multi-processing concept whereby available processors many two mvs/370 many sixteen later instances os twelve supported ibm sixteen supported amdahl effectively efficiently utilized best utilize multi-processing capability ios multi-programming implementation partitioned smaller executable units particular may executed control srb ios invoked directly programmer rather ios invoked branch entries start i/o requests interrupt handlers complete i/o requests
Operating systems
toshiba t1000 toshiba t1000 laptop computer manufactured toshiba corporation 1987 similar specification ibm pc convertible 4.77 mhz 80c88 processor 512 kb ram monochrome cga-compatible lcd unlike convertible includes standard serial port parallel port connectors external monitor real-time clock unusually ibm compatible pc t1000 contained 256 kb rom copy ms-dos 2.11 acted small read-only hard drive alternative operating systems could still loaded floppy drive present ramdisk along earlier t1100 t1200 systems toshiba t1000 one early computers feature laptop form factor battery-powered operation pc magazine 1988 named toshiba t1000 editor choice among 12 tested portable computers one reviewer called first real dos laptop plausible replacement tandy 200 another praised durability 60,000 miles traveling incredible bargain 800 street price byte 1989 listed t1000 among excellence winners byte awards stating takes portability limit ... self-contained get still real computer handle real-world workloads noting available little 850 magazine reported many us love one issue jerry pournelle praised little gem acknowledging cost trs-80 model 100 nec pc-8201 believed get quite lot added weight price reported many writers swear t1000 david drake loves compatible software written ibm pc/xt using color graphics adapter cga display laptop battery pack must charged working laptop power
Computer architecture
nordugrid nordugrid collaboration aiming development maintenance support free grid middleware known advanced resource connector arc name nordugrid first became known 2001 short project called nordic testbed wide area computing data handling funded nordic council ministers via nordunet2 programme project main goal set prototype distributed computing infrastructure testbed aiming primarily needs high energy physics researchers atlas experiment following evaluation existing grid technology solutions nordugrid developers came alternative software architecture implemented demonstrated may 2002 soon became known nordugrid middleware 2004 middleware solution given proper name advanced resource connector arc may 2003 nordugrid headquarters niels bohr institute 5th nordugrid workshop decided move oslo university present-day formal collaboration established 2005 five nordic academic institutes niels bohr institute copenhagen denmark helsinki institute physics finland oslo university norway lund uppsala universities sweden goal develop support maintain popularize arc deployment support nordic grid infrastructure became responsibility ndgf project launched june 2006 marked clear separation grid middleware providers infrastructure services providers support arc development nordugrid several interested partners secured dedicated funding eu fp6 project knowarc nordugrid collaboration based upon non-binding memorandum understanding open new members nordugrid collaboration consortium behind arc middleware key goal ensure arc developed maintained supported widely deployed remaining free open-source software suitable wide variety high-throughput grid computational tasks ultimate goal provide reliable scalable portable full-featured solution grid infrastructures conformant open standards primarily developed framework open grid forum arc software development may often take place outside nordugrid collaboration coordinates contributions code maintains code software repositories well build system issue tracking system necessary software development services nordugrid defines strategical directions development arc ensures financial support term arc community used refer various groups people willing share computational resources via arc tit-for-tat user group formalized virtual organisation vo allowing mutual use community resources contrary popular belief nordugrid members required provide computing storage resources neither offering resources grants automatic membership still arc community whole owns substantial amount computing storage resources voluntarily basis purpose open-source development process community members may donate cpu cycles storage space developers testers resources constitute testbed arc middleware donated community resources nordugrid provide allocate computational resources coordinate worldwide deployment arc actual deployment usage arc-based distributed computing infrastructures coordinated respective infrastructure projects e.g ndgf swegrid sweden material sciences national grid infrastructure m-grid finland norgrid norway etc.. apart contributing computational resources many groups develop higher-level software tools top arc e.g. kind development coordinated nordugrid assistance provided collaboration upon request nordugrid certification authority ca currently major infrastructure service provided nordugrid authority issues electronic certificates users services work grid environments present day grid implementations require x.509 certificates validate identity grid participants nordugrid ca provides certificates individuals machines associated research and/or academic institutions denmark finland norway sweden nordugrid certification authority member european policy management authority grid authentication eugridpma
Distributed computing architecture
aaron swartz aaron hillel swartz november 8 1986january 11 2013 american computer programmer entrepreneur writer political organizer internet hacktivist involved development web feed format rss markdown publishing format organization creative commons website framework web.py co-founder social news site reddit given title co-founder combinator owner paul graham formation bug inc. merger swartz project infogami company run alexis ohanian steve huffman swartz work also focused civic awareness activism helped launch progressive change campaign committee 2009 learn effective online activism 2010 became research fellow harvard university safra research lab institutional corruption directed lawrence lessig founded online group demand progress known campaign stop online piracy act 2011 swartz arrested massachusetts institute technology mit police state breaking-and-entering charges connecting computer mit network unmarked unlocked closet setting download academic journal articles systematically jstor using guest user account issued mit federal prosecutors later charged two counts wire fraud eleven violations computer fraud abuse act carrying cumulative maximum penalty 1 million fines 35 years prison asset forfeiture restitution supervised release swartz declined plea bargain would served six months federal prison two days prosecution rejected counter-offer swartz found dead brooklyn apartment hanged 2013 swartz inducted posthumously internet hall fame swartz born highland park illinois suburb chicago eldest son jewish parents susan robert swartz brother noah benjamin father founded software firm mark williams company swartz immersed study computers programming internet internet culture attended north shore country day school small private school near chicago 9th grade swartz left high school 10th grade enrolled courses chicago area college 1999 13 years old created website theinfo.org collaborative online library theinfo.org made swartz winner arsdigita prize given young people create useful educational collaborative noncommercial websites age 14 became member working group authored rss 1.0 web syndication specification swartz attended stanford university dropped first year swartz first year stanford applied combinator first summer founders program proposing work startup called infogami designed flexible content management system allow creation rich visually interesting websites form wiki structured data working infogami co-founder simon carstensen summer 2005 aaron opted return stanford choosing instead continue develop seek funding infogami part work infogami swartz created web.py web application framework unhappy available systems python programming language early fall 2005 swartz worked fellow co-founders another nascent y-combinator firm reddit rewrite reddit lisp codebase using python web.py although infogami platform abandoned bug acquired infogami software used support internet archive open library project web.py web framework used basis many projects swartz many others infogami failed find funding y-combinator organizers suggested infogami merge reddit november 2005 resulting formation new firm bug devoted promoting products result merger swartz given title co-founder reddit although projects initially struggled gain traction reddit began make large gains popularity 2005 2006 october 2006 based largely success reddit bug acquired condé nast publications owner wired magazine swartz moved company san francisco work wired swartz found office life uncongenial ultimately left company september 2007 swartz joined infogami co-founder simon carstensen launch new firm jottit another attempt create another markdown driven content management system python 2008 swartz founded watchdog.net good government site teeth aggregate visualize data politicians year wrote widely circulated guerilla open access manifesto december 27 2010 swartz filed freedom information act foia request learn treatment chelsea manning alleged source wikileaks 2008 swartz downloaded 2.7 million federal court documents stored pacer public access court electronic records database managed administrative office united states courts huffington post characterized actions way swartz downloaded public court documents pacer system effort make available outside expensive service move drew attention fbi ultimately decided press charges documents fact public pacer charging 8 cents per page information carl malamud founded nonprofit group public.resource.org contended free federal documents covered copyright fees plowed back courts finance technology system ran budget surplus 150 million according court reports reported new york times pacer used technology designed bygone days screechy telephone modems ... putting nation legal system behind wall cash kludge malamud appealed fellow activists urging visit one 17 libraries conducting free trial pacer system download court documents send public distribution reading malamud call action swartz used perl computer script running amazon cloud servers download documents using credentials belonging sacramento library september 4 20 2008 accessed documents uploaded cloud computing service released documents malamud organization september 29 2008 gpo suspended free trial pending evaluation program swartz actions subsequently investigated fbi case closed two months charges filed swartz learned details investigation result filing foia request fbi described response usual mess confusions shows fbi lack sense humor pacer still charges per page customers using firefox option saving documents free public access plug-in called recap 2013 memorial swartz malamud recalled work pacer brought millions u.s. district court records behind pacer pay wall said found full privacy violations including medical records names minor children confidential informants malamud penned detailed account collaboration swartz pacer project essay appears website writing ars technica timothy lee later made use documents obtained swartz co-creator recap offered insight discrepancies reporting much data swartz downloaded back-of-the-envelope calculation days offsite crawl shut swartz guessed got around 25 percent documents pacer new york times similarly reported swartz downloaded estimated 20 percent entire database based facts swartz downloaded 2.7 million documents pacer time contained 500 million lee concluded swartz downloaded less one percent database 2009 wanting learn effective activism swartz helped launch progressive change campaign committee wrote blog spend days experimenting new ways get progressive policies enacted progressive politicians elected swartz led first activism event career progressive change campaign committee delivering thousands honor kennedy petition signatures massachusetts legislators asking fulfill former senator ted kennedy last wish appointing senator vote health care reform 2010 swartz co-founded demand progress political advocacy group organizes people online take action contacting congress leaders funding pressure tactics spreading word civil liberties government reform issues academic year 2010–11 swartz conducted research studies political corruption lab fellow harvard university edmond j. safra research lab institutional corruption author cory doctorow novel homeland drew advice swartz setting protagonist could use information available voters create grass-roots anti-establishment political campaign afterword novel swartz wrote political hacktivist tools used anyone motivated talented enough ... change system ... let know help swartz involved campaign prevent passage stop online piracy act sopa sought combat internet copyright violations criticized basis would made easier u.s. government shut web sites accused violating copyright would placed intolerable burdens internet providers following defeat bill swartz keynote speaker f2c freedom connect 2012 event washington d.c. may 21 2012 speech titled stopped sopa informed audience added fight everyone made hero story everyone took job save crucial freedom referring series protests bill numerous websites described electronic frontier foundation biggest internet history 115,000 sites altering webpages swartz also presented topic event organized thoughtworks swartz participated wikipedia august 2003 2006 ran unsuccessfully wikimedia foundation board trustees 2006 swartz wrote analysis wikipedia articles written concluded bulk actual content comes tens thousands occasional contributors outsiders made contributions site core group 500 1,000 regular editors tend correct spelling formatting errors according swartz formatters aid contributors way around conclusions based analysis edit histories several randomly selected articles contradicted opinion wikipedia co-founder jimmy wales believed core group regular editors providing content thousands others contributed formatting issues swartz came conclusions counting total number characters added editor particular article wales counted total number edits aaron swartz noted knowledge produced public universities financed us government graduate students released free public instead copyrighted benefits given authors privatized locked for-profit corporations invest public works instead earned billions us dollars year private publishers since publications repackaged academic databases university libraries pay thousands dollars subscribe students access content swartz used full text scholarly online databases jstor accessed mit network order download books journals etc produced thanks public funds paid money collected taxpayers according state federal authorities swartz used jstor digital repository download large number academic journal articles mit computer network course weeks late 2010 early 2011 time swartz research fellow harvard university provided jstor account visitors mit open campus authorized access jstor network authorities said swartz downloaded documents laptop connected networking switch controlled-access wiring closet mit door closet kept unlocked according press reports discovered video camera placed room film swartz swartz computer left untouched video captured swartz download stopped swartz identified rather pursue civil lawsuit june 2011 reached settlement wherein surrendered downloaded data september 25 2010 ip address 18.55.6.215 part mit network began sending hundreds pdf download requests per minute affecting performance entire jstor site prompted block ip address morning another ip address also within mit network began sending jstor pdf download requests resulting temporary full block firewall level mit servers entire 18.0.0.0/8 range email sent mit describing situation email sent september 29 2010 one jstor employee wrote mit july 30 2013 jstor released 300 partially redacted documents provided incriminating evidence aaron swartz documents originally sent united states attorney office response subpoenas case united states v. aaron swartz following images excerpts 3,461-page pdf document night january 6 2011 swartz arrested near harvard campus mit police united states secret service agent arraigned cambridge district court two state charges breaking entering intent commit felony july 11 2011 swartz indicted federal grand jury charges wire fraud computer fraud unlawfully obtaining information protected computer recklessly damaging protected computer november 17 2011 swartz indicted middlesex county superior court grand jury state charges breaking entering intent grand larceny unauthorized access computer network december 16 2011 state prosecutors filed notice dropping two original charges charges listed november 17 2011 indictment dropped march 8 2012 according spokesperson middlesex county prosecutor state charges dropped permit federal prosecution headed stephen p. heymann supported evidence provided secret service agent michael s. pickett proceed unimpeded september 12 2012 federal prosecutors filed superseding indictment adding nine felony counts increased swartz maximum criminal exposure 50 years imprisonment 1 million fines plea negotiations swartz attorneys prosecutors offered recommend sentence six months low-security prison swartz would plead guilty 13 federal crimes swartz lead attorney rejected deal opting instead trial prosecutors would forced justify pursuit swartz federal prosecution involved characterized numerous critics former nixon white house counsel john dean overcharging 13-count indictment overzealous prosecution alleged computer crimes brought former u.s. attorney massachusetts carmen ortiz swartz died suicide january 11 2013 death federal prosecutors dropped charges december 4 2013 due freedom information act suit investigations editor wired magazine several documents related case released secret service including video swartz entering mit network closet evening january 11 2013 swartz found dead brooklyn apartment partner taren stinebrickner-kauffman spokeswoman new york medical examiner reported hanged suicide note found swartz family partner created memorial website issued statement saying used prodigious skills programmer technologist enrich make internet world fairer better place days swartz funeral lawrence lessig eulogized friend sometime-client essay prosecutor bully decried disproportionality swartz prosecution said question government needs answer necessary aaron swartz labeled 'felon 18 months negotiations willing accept cory doctorow wrote aaron unbeatable combination political insight technical skill intelligence people issues think could revolutionized american worldwide politics legacy may still yet swartz funeral services held january 15 2013 central avenue synagogue highland park illinois tim berners-lee creator world wide web delivered eulogy day wall street journal published story based part interview stinebrickner-kauffman told journal swartz lacked money pay trial hard ... make part life go public asking help also distressed said two friends subpoenaed longer believed mit would try stop prosecution several memorials followed soon afterward january 19 hundreds attended memorial cooper union speakers included stinebrickner-kauffman open source advocate doc searls creative commons glenn otis brown journalist quinn norton roy singham thoughtworks david segal demand progress january 24 memorial internet archive speakers including stinebrickner-kauffman alex stamos brewster kahle carl malamud february 4 memorial held cannon house office building capitol hill speakers memorial included senator ron wyden representatives darrell issa alan grayson jared polis lawmakers attendance included senator elizabeth warren representatives zoe lofgren jan schakowsky memorial also took place march 12 mit media lab swartz family recommended givewell donations memory organization swartz admired collaborated sole beneficiary january 12 2013 swartz family partner issued statement criticizing prosecutors mit speaking son funeral january 15 robert swartz said aaron killed government mit betrayed basic principles tom dolan husband u.s. attorney massachusetts carmen ortiz whose office prosecuted swartz case replied criticism swartz family truly incredible son obit blame others death make mention 6-month offer comment triggered criticism esquire writer charlie pierce replied glibness husband defenders toss 'mere six months federal prison low-security indication something seriously whack way prosecutors think days mit maintains open-campus policy along open network two days swartz death mit president l. rafael reif commissioned professor hal abelson lead analysis mit options decisions relating swartz legal struggles help guide fact-finding stage review mit created website community members could suggest questions issues review address swartz attorneys requested pretrial discovery documents made public move mit opposed swartz allies criticized mit opposition releasing evidence without redactions july 26 2013 abelson panel submitted 182-page report mit president l. rafael reif authorized public release july 30 panel reported mit supported charges swartz cleared institution wrongdoing however report also noted despite mit advocacy open access culture institutional level beyond university never extended support swartz report revealed example mit considered possibility issuing public statement position case statement never materialized huffington post reported ortiz faced significant backlash pursuing case swartz including petition white house fired news outlets reported similarly reuters news agency called swartz online icon help ed make virtual mountain information freely available public including estimated 19 million pages federal court documents associated press ap reported swartz case highlights society uncertain evolving view treat people break computer systems share data enrich make available others jstor lawyer former u.s. attorney southern district new york mary jo white asked lead prosecutor drop charges discussed editor hrag vartanian hyperallergic brooklyn new york muralist bamn means necessary created mural swartz swartz amazing human fought tirelessly right free open internet artist explained much 'reddit guy speaking april 17 2013 yuval noah harari described swartz first martyr freedom information movement aaron swartz legacy reported strengthening open access scholarship movement illinois home state swartz influence led state university faculties adopt policies favor open access january 13 2013 members anonymous hacked two websites mit domain replacing tributes swartz called members internet community use death rallying point open access movement banner included list demands improvements u.s. copyright system along swartz guerilla open access manifesto night january 18 2013 mit e-mail system taken offline ten hours january 22 e-mail sent mit redirected hackers aush0k tibitximer korea advanced institute science technology traffic mit redirected computer harvard university publishing statement headed r.i.p aaron swartz text 2009 posting swartz accompanied chiptunes version star-spangled banner mit regained full control seven hours early hours january 26 2013 u.s sentencing commission website ussc.gov hacked anonymous home page replaced embedded youtube video anonymous operation last resort video statement said swartz faced impossible choice hacker downloaded hundreds thousands scientific-journal articles swiss publisher website republished open web swartz honor week first anniversary death swartz death 50,000 people signed online petition white house calling removal ortiz overreach case aaron swartz similar petition submitted calling prosecutor stephen heymann firing january 2015 two years swartz death white house declined petitions august 3 2013 swartz posthumously inducted internet hall fame hackathon held swartz memory around date birthday 2013 weekend november 8–10 2013 inspired swartz work life second annual hackathon held least 16 cities around world preliminary topics worked 2013 aaron swartz hackathon privacy software tools transparency activism access legal fixes low-cost book scanner january 2014 lawrence lessig led walk across new hampshire honor swartz rallying campaign finance reform 2017 turkish-dutch artist ahmet öğüt commemorated swartz work entitled information power people depicting bust long-time supporter open access swartz wrote guerilla open access manifesto supporters swartz responded news death effort called pdftribute promote open access january 12 eva vivalt development economist world bank began posting academic articles online using hashtag pdftribute tribute swartz scholars posted links works story aaron swartz exposed topic open access scientific publications wider audiences wake aaron swartz many institutions personalities campaigned open access scientific knowledge swartz death prompted calls open access scholarly data e.g. open science data think computer foundation center information technology policy citp princeton university announced scholarships awarded memory aaron swartz 2013 swartz posthumously awarded american library association james madison award outspoken advocate public participation government unrestricted access peer-reviewed scholarly articles march editor editorial board journal library administration resigned en masse citing dispute journal publisher routledge one board member wrote crisis conscience publishing journal open access death aaron swartz 2002 swartz stated died wanted contents hard drives made publicly available coalition consortium launched european research council continues fight aaron swartz make available 2020 scientific publications financed member states coalition several members u.s. house representatives – republican darrell issa democrats jared polis zoe lofgren – house judiciary committee raised questions regarding government handling case calling charges ridiculous trumped polis said swartz martyr whose death illustrated need congress limit discretion federal prosecutors speaking memorial swartz capitol hill issa said massachusetts democratic senator elizabeth warren issued statement saying aaron advocacy internet freedom social justice wall street reform demonstrated ... power ideas ... letter attorney general eric holder texas republican senator john cornyn asked basis u.s. attorney district massachusetts conclude office conduct 'appropriate prosecution mr. swartz way retaliation exercise rights citizen freedom information act issa chairs house committee oversight government reform announced would investigate justice department actions prosecuting swartz statement huffington post praised swartz work toward open government free access people issa investigation garnered bipartisan support january 28 2013 issa ranking committee member elijah cummings published letter u.s. attorney general holder questioning federal prosecutors filed superseding indictment february 20 wbur reported ortiz expected testify upcoming oversight committee hearing office handling swartz case february 22 associate deputy attorney general steven reich conducted briefing congressional staffers involved investigation told swartz guerilla open access manifesto played role prosecutorial decision-making congressional staffers left briefing believing prosecutors thought swartz convicted felony carrying least short prison sentence order justify filed case first place excoriating department justice department vengeance stinebrickner-kauffman told guardian doj erred relying swartz guerilla open access manifesto accurate indication beliefs 2010 longer single issue activist said lots things healthcare climate change money politics march 6 holder testified senate judiciary committee case good use prosecutorial discretion stinebrickner-kauffman issued statement reply repeating amplifying claims prosecutorial misconduct public documents wrote reveal prosecutor stephen heymann instructed secret service seize hold evidence without warrant ... lied judge fact written briefs ... withheld exculpatory evidence ... year violating legal ethical obligations turn evidence defense march 22 senator al franken wrote holder letter expressing concerns writing charging young man like mr. swartz federal offenses punishable 35 years federal imprisonment seems remarkably aggressive – particularly appears one principal aggrieved parties ... support criminal prosecution 2013 rep. zoe lofgren d-calif. introduced bill aaron law exclude terms service violations 1986 computer fraud abuse act wire fraud statute lawrence lessig wrote bill critically important change ... cfaa hook government bullying ... law would remove hook single line longer would felony breach contract professor orin kerr specialist nexus computer law criminal law wrote arguing precisely sort reform act years aclu called reform cfaa remove dangerously broad criminalization online activity eff mounted campaign reforms lessig inaugural chair lecture furman professor law leadership entitled aaron laws law justice digital age dedicated lecture swartz aaron law bill stalled committee brian knappenberger alleges due oracle corporation financial interest maintaining status quo fair access science technology research act fastr bill would mandate earlier public release taxpayer-funded research fastr described aaron law senator ron wyden d-ore. senator john cornyn r-tex introduced senate version 2013 2015 bill introduced house reps. zoe lofgren d-calif. mike doyle d-pa. kevin yoder r-kans. senator wyden wrote bill fastr act provides access taxpayer funded research never hidden behind paywall legislation passed helped prompt motion toward open access part us administration shortly bill original introduction office science technology policy directed federal agency 100 million annual conduct research development expenditures develop plan support increased public access results research funded federal government swartz featured received dedications numerous art work 2013 kenneth goldsmith dedicated printing internet exhibition swartz fate aaron swartz also featured conservative filmmaker dinesh d'souza 2014 documentary wherein d'souza compares swartz prosecution conviction violating campaign finance laws alleges cases exemplify selective overzealous prosecution also dedicated biographical films aaron january 11 2014 marking first anniversary death preview released internet boy story aaron swartz documentary swartz nsa sopa film officially released january 2014 sundance film festival democracy covered release documentary well swartz life legal case sprawling interview director brian knappenberger swartz father brother attorney documentary released creative commons license debuted theaters on-demand june 2014 mashable called documentary powerful homage aaron swartz debut sundance received standing ovation mashable printed help experts internet boy makes clear argument swartz unjustly became victim rights freedoms stood hollywood reporter described heartbreaking story tech wunderkind persecuted us government must-see anyone knows enough care way laws govern information transfer digital age october 2014 killswitch film featuring aaron swartz well lawrence lessig tim wu edward snowden received world premiere woodstock film festival award best editing film focuses swartz role advocating internet freedoms february 2015 killswitch invited screen capitol visitor center washington d.c. congressman alan grayson event held eve federal communications commission historic decision net neutrality congressman grayson lawrence lessig free press ceo craig aaron spoke swartz fight behalf free open internet event congressman grayson states killswitch one honest accounts battle control internet – access information richard von busack metro silicon valley writes killswitch lapidary use found footage side atomic café fred swegles orange county register remarks anyone values unfettered access online information apt captivated killswitch gripping fast-paced documentary kathy gill geekwire asserts killswitch much dry recitation technical history director ali akbarzadeh producer jeff horn writer chris dollar created human-centered story large part connection comes lessig relationship swartz patriot web independent biographical film aaron swartz written directed darius burke set released august 2019 amazon film limited video demand release december 2017 reelhouse january 2018 pivotshare another biographical film swartz think aaron developed hbo films swartz identified cofounder reddit title source controversy merger infogami reddit swartz became co-owner director parent company bug inc. along reddit cofounders steve huffman alexis ohanian swartz referred cofounder press investor paul graham recommended merger ohanian describes co-owner
Computer security
cybertrust cybertrust security services company formed virginia november 2004 merger trusecure betrusted cybertrust acquired large stake ubizen european security services firm based belgium become one largest information security firms world acquired verizon business 2007 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services cybertrust founded subsidiary gte corporation government systems information security directorate focused security services electronic commerce included authentication privacy integrity non-repudiation using public key encryption technology 2000 gte sold cybertrust ireland-based security company baltimore technologies 150 million 2003 baltimore technologies divested operating companies including digital certificate operations betrusted holdings inc. year later september 2004 betrusted announced intention merge former competitor trusecure corporation november resulting company incorporated virginia cybertrust verizon business acquired cybertrust 2007 reuniting former parent verizon created merger gte bell atlantic financial terms disclosed 2015 cybertrust root certificates acquired digicert inc. leading global certificate authority ca provider trusted identity authentication services financial terms disclosed cybertrust used majority shareholding dilute remaining ubizen shares forcing acquire remaining shares delist ubizen 2005 betrusted originally created pwc sold one equity partners division bank 1 one equity partners also purchased 90 east securenet bought pki component baltimore gateway operations isecure acquisition cybertrust root certificates makes digicert second-largest certificate authority ca high-assurance ssl certificates part deal digicert assume management cybertrust/verizon trusted roots intermediate certificates verizon continue offer ssl certificates reseller digicert pursuant digicert ’ acquiring verizon enterprise ssl business digicert announce partnership cybertrust japan expand market presence asia new partnership digicert cybertrust japan also announce cyber secure asia wholly owned subsidiary cybertrust japan market digicert ’ certificate technology southeast asia regional headquarters singapore
Computer security
babel middleware babel open source middleware system serving scientific computing community language interoperability tool babel enables arbitrary mixing software libraries written c/c++ fortran python java distributed computing platform babel provides language-neutral remote method invocation rmi scheme similar java rmi allows third-party plug-ins specify custom data encodings network protocols babel requires developers use interface description language specify platform language neutral interface code babel uses custom dialect called sidl scientific interface definition language adaptations specific computational science engineering applications babel tool parses sidl specification generate source code provides glue programming languages babel works known posix unix variants including linux mac os x aix irix solaris tru64 cray xt4 ibm blue gene many commodity clusters babel require special compiler linker technology works gnu intel ibm pathscale pgi many compilers babel distributed lgpl license babel r 100 award 2006 used diverse computational applications accelerator beam dynamics cell biology chemistry climate electron effects fusion geomagnetics materials nuclear power plants radio astronomy subsurface transport well infrastructure frameworks meshing solvers sparse linear algebra sourcecode refactoring babel also redistributed customer applications cca framework debian linux babel started internal research project software components lawrence livermore national laboratory 1999 first public alpha release babel 2001 also 2001 secured funding scidac scientific discovery advanced computing along collaborators cca forum common component architecture forum babel development maintenance currently funded united states department energy relies heavily open source community contributors hail sandia national laboratories argonne national laboratory oak ridge national laboratory tech-x corp mit university utah babel development team maintain open software repositories mailing lists issue trackers
Programming language topics
industroyer industroyer also referred crashoverride malware framework considered used cyberattack ukraine ’ power grid december 17 2016 attack cut fifth kiev capital power one hour considered large-scale test time fourth malware publicly revealed target industrial control systems stuxnet havex blackenergy malware discovered slovak internet security company eset eset cybersecurity companies detect name “ industroyer ” cybersecurity firm dragos named malware “ crashoverride ” detailed analysis industroyer revealed malware designed disrupt working processes industrial control systems specifically used electrical substations industroyer modular malware main components following
Computer security
dsw command codice_1 unix command enabled deletion files non-typeable characters replaced functionality implemented codice_2 namely codice_3
Computer file systems
mcafee change control mcafee change control commercial file integrity monitoring solution windows- linux-based systems developed mcafee
Computer security
capsl capsl printer command language/page description language used early canon printers including lbp-8iii series supported least lbp-8iv printers language discontinued later canon printers implementing pcl also called lips lips4 windows spool file could contain raw capsl data
Programming language topics
zork zork great underground empire part later known zork interactive fiction video game written marc blank dave lebling bruce daniels tim anderson published infocom 1980 first game zork trilogy released wide range computer systems followed zork ii zork iii infocom first game sold 378,000 copies 1986 game takes place zork calendar year 948 gue although passage time notable gameplay player steps deliberately vague role adventurer game begins near white house small self-contained area although player given little instruction house provides obvious point interest player enters house yields number intriguing objects including brass battery-powered lantern empty trophy case elvish sword great antiquity beneath rug trap door leads dark cellar revealed one several entrances vast subterranean land known great underground empire player soon encounters colorful host dangerous enemies including deadly grues prey victims dark axe-wielding troll giant cyclops flees terror mention odysseus vampire bat drop player anywhere mine encountered evil spirits guarding entrance hades nimble-fingered thief armed stiletto makes mapping maze difficult removing scattering items player might drop leave trail ultimate goal zork collect twenty treasures zork install trophy case finding treasures requires solving variety puzzles navigation two complex mazes intricate manipulations flood control dam 3 placing treasures trophy case scores player 350 points grants rank master adventurer ancient map instructions magically appears trophy case instructions provide access stone barrow entrance barrow end zork beginning zork ii 28 ways player die possible score 350 points 223 moves win game completely 228 moves exploiting bug infocom begin tradition including feelies extra items related game 1982 release deadline later re-releases game however packaged although back zork grey box depicted zorkmid coin included feelies production difficulties led coins omission packages zorkmid coins included feelies release zork trilogy boxed set original version zork published personal software simply called zork distributed clear plastic bags containing game disk 36-page booklet infocom first self-published version zork so-called folio format included single piece paper describing run game feelies noted introduced zork re-released grey box format opening text zork among notable descriptions video games quite simplistic compared infocom later games many started screens full introductory text several game situations descriptions become iconic within field interactive fiction brass lantern elvish sword great antiquity zork also introduced notable grue sinister lurking presence kills adventurers go exploring dark grues appeared least mentioned many subsequent infocom adventures right 1997 graphic adventure zork grand inquisitor published activision zork sales surprised infocom rising falling time many dealers sold game essential accessory purchasing new computers including dec rainbow ti professional others people see game machines best-selling game 1982 32,000 copies sold first half year almost 100,000 copies 1983 — inc. reported game best seller four years—more 150,000 copies 1984 comprising 20 infocom sales year total 378,987 copies 1986 infoworld reported april 1984 zork returned top sales charts two years release based sales market-share data video listed fifth magazine list best selling video games february march 1985 ii computing listed zork fourth magazine overall list top apple ii software october–november 1985 first games list byte declared 1981 single advance science adventure bold exciting zork magazine praised sophisticated parser quality writing stating program entertaining eloquent witty precisely written almost beside point ... zork felt touched— experienced will—through care attention detail authors rendered concluded somebody please let know sequel done jerry pournelle wrote magazine 1983 played game sons stating liked adventure wanted solved colossal cave guarantee 'll love zork jon mishcon reviewed zork space gamer 40 mishcon commented absence graphics game weak points find although price expensive believe first rate game well worth every penny 80 micro called zork complicated sophisticated ... joy play praised documentation take rank amateur instructions clear easy follow wondered game could solved program lets pretty much want even consequences much less desirable leaves open marvelous opportunities magazine concluded hoping expect second part sometime soon addison-wesley book atari software 1984 gave game overall a+ rating calling definitive adventure game 1992 computer gaming world added zork hall fame waiving normal criteria favor honoring venerable classic 1996 magazine listed zork 13 among top 150 best games all-time editors wrote seminal infocom text adventure combined challenging puzzles wonderful descriptive prose touch humor create rich universe existed svga graphics within head march 12 2007 new york times reported named list ten important video games time so-called game canon library congress took video game preservation proposal began games list including zork zork one five infocom games re-released solid gold format in-game hints infocom allowed distribution early fortran version therefore source code available various public domain software ports available various repositories also abridged version called mini-zork dated november 24 1987 mini-zork released free charge promotion german language version developed never released unfinished version story file dated january 13 1988 made way public circulation german evidently non-native containing many spelling grammar errors known jeff o'neill worked version remastered version first released japanese software development company systemsoft nec pc-9801 march 1991 differences enhanced remake game recognizes verb commands typed kana japanese syllable system latin alphabet convenience common verb commands look take etc accessed pressing corresponding button player still type name object remake also helps player interact environment displaying list objects player typed command also unlike original remake contains enhanced graphics especially list objects text super-imposed another remastered version released activision shoeisha japan sega saturn playstation 1996 version also includes graphics interfaces lucasfilm legend early entries particular sound effects auto-mapping music yuzo koshiro neither version ever released outside japan game playable code zork mason main character needs get chair playstation 3 xbox 360 users need pull l2 r2 lt rt xbox 360 rapidly windows players need press space bar rapidly wii players must shake controls wiimote nunchuck control scheme mason gets chair must walk left use old computer behind chair play zork type zork command prompt achievement/trophy also awarded putting code
Computer architecture
defragmentation maintenance file systems defragmentation process reduces degree fragmentation physically organizing contents mass storage device used store files smallest number contiguous regions fragments also attempts create larger regions free space using compaction impede return fragmentation defragmentation utilities try keep smaller files within single directory together often accessed sequence defragmentation advantageous relevant file systems electromechanical disk drives hard disk drives floppy disk drives optical disk media movement hard drive read/write heads different areas disk accessing fragmented files slower compared accessing entire contents non-fragmented file sequentially without moving read/write heads seek fragments fragmentation occurs file system allocate enough contiguous space store complete file unit instead puts parts gaps existing files usually gaps exist formerly held file file system subsequently deleted file system allocated excess space file first place files often appended log files well frequent adding deleting files emails web browser cache larger files videos greater numbers files contribute fragmentation consequent performance loss defragmentation attempts alleviate problems consider following scenario shown image right otherwise blank disk five files e using 10 blocks space section block allocation unit filesystem block size set disk formatted size supported filesystem blank disk files would allocated one see example 1 image file b deleted would two options mark space file b empty used later move files b empty space end since moving files could time consuming many files needed moved usually empty space simply left marked table available new files see example 2 image new file f allocated requiring 6 blocks space could placed first 6 blocks space formerly held file b 4 blocks following remain available see example 3 image another new file g added needs 4 blocks could occupy space f c example 4 image however file f needs expanded three options since space immediately following longer available additionally concept “ fragmentation ” limited individual files multiple extents disk instance group files normally read particular sequence like files accessed program loading include certain dlls various resource files audio/visual media files game considered fragmented sequential load-order disk even individual files fragmented read/write heads seek non-fragmented files randomly access sequence groups files may originally installed correct sequence drift apart time certain files within group deleted updates common cause order update file updaters usually delete old file first write new updated one place however filesystems write new file physical place disk allows unrelated files fill empty spaces left behind defragment disk defragmentation software also known defragmenter move files around within free space available intensive operation performed filesystem little free space defragmentation system performance degraded best leave computer alone process defragmenter get confused unexpected changes filesystem depending algorithm used may may advantageous perform multiple passes reorganization involved defragmentation change logical location files defined location within directory structure besides defragmenting program files defragmenting tool also reduce time takes load programs open files example windows 9x defragmenter included intel application launch accelerator optimized programs disk placing defragmented program files dependencies next order program loads load programs faster windows good defragmenter read prefetch files identify many file groups possible place files within access sequence beginning hard drive outer tracks higher data transfer rate inner tracks placing frequently accessed files onto outer tracks increases performance third party defragmenters mydefrag move frequently accessed files onto outer tracks defragment files improvements modern hard drives ram cache faster platter rotation speed command queuing scsi/ata tcq sata ncq greater data density reduce negative impact fragmentation system performance degree though increases commonly used data quantities offset benefits however modern systems profit enormously huge disk capacities currently available since partially filled disks fragment much less full disks high-capacity hdd partition occupies smaller range cylinders resulting faster seeks however average access time never lower half rotation platters platter rotation measured rpm speed characteristic hdds experienced slowest growth decades compared data transfer rate seek time minimizing number seeks remains beneficial storage-heavy applications defragmentation ensuring one seek per file counting seeks non-adjacent tracks common strategy optimize defragmentation reduce impact fragmentation partition hard disk way separates partitions file system experience many reads writes volatile zones files created deleted frequently directories contain users profiles modified constantly especially temp directory web browser cache creating thousands files deleted days files user profiles held dedicated partition commonly done unix recommended files systems typically stored /var partition defragmenter runs better since need deal static files directories partitions relatively little write activity defragmentation time greatly improves first defragmentation since defragmenter need defragment small number new files future presence immovable system files especially swap file impede defragmentation files safely moved operating system use example ntfsresize moves files resize ntfs partition tool pagedefrag could defragment windows system files swap file files store windows registry running boot time gui loaded since windows vista feature fully supported updated ntfs files added disk master file table mft must grow store information new files every time mft extended due file way mft gain fragment early versions windows could safely defragmented partition mounted microsoft wrote hardblock defragmenting api however since windows xp increasing number defragmenters able defragment mft windows defragmentation api improved supports move operation even improvements first four clusters mft remain unmovable windows defragmentation api resulting fact defragmenters store mft two fragments first four clusters wherever placed disk formatted rest mft beginning disk wherever defragmenter strategy deems best place reading data conventional electromechanical hard disk drive disk controller must first position head relatively slowly track given fragment resides wait disk platter rotates fragment reaches head solid-state drive ssd based flash memory moving parts random access file fragment flash memory suffer delay making defragmentation optimize access speed unnecessary furthermore since flash memory written limited number times fails defragmentation actually detrimental except mitigation catastrophic failure however windows still defragments ssd automatically albeit less vigorously prevent file system reaching maximum fragmentation tolerance maximum fragmentation limit reached subsequent attempts write disk fail 2010 discovered operation mydefrag utility old backup copies created system restore known checkpoints deleted mydefrag developer jeroen kessels blamed windows api shadow copy shadow copy service system restore uses tracks changes disks remembers according kessels shadow copy sees defragmentation operation data changes opposed blocks moved tries record resulting increased size shadow copy images result windows faces low disk space issue tries resolve deleting old checkpoints microsoft later provided details issue shadow copy provider operates 16-kb block level hence file system allocation units smaller 16 kb shadow copy properly discern defragmentation ordinary i/o operation needs recorded volumes 16 kb larger allocation units unaffected
Computer file systems
mod ssl mod_ssl optional module apache http server provides strong cryptography apache v1.3 v2 webserver via secure sockets layer ssl v2/v3 transport layer security tls v1 cryptographic protocols help open source ssl/tls toolkit openssl original version created apache v1.3 initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 version bsd-style license version v2.0 later contrast maintained apache software foundation licensed apache license 2.0 possible provide http https single server machine http https use different server ports direct conflict either maintainer would run two separate apache server instances one binds port 80 port 443 use apache virtual hosting facility maintainer create two virtual servers apache dispatches one responding port 80 speaking http one responding port 443 speaking https original mod_ssl apache 1.3 available www.modssl.org third-party add-on package requiring additional steps compilation configuration process also maintainer server needs resolve additional system apache dependencies apache 2 contrast built-in module maintained apache software foundation mod_ssl easily activated compilation configuration options mod_ssl v1 package initially created april 1998 ralf s. engelschall via porting ben laurie apache-ssl 1.17 source patches apache 1.2.6 apache 1.3b6 conflicts ben laurie development cycle re-assembled scratch apache 1.3.0 merging old mod_ssl 1.x newer apache-ssl 1.18 point mod_ssl lived life mod_ssl v2 first publicly released version mod_ssl 2.0.0 august 10 1998 us export restrictions cryptographic software loosened mod_ssl became part apache http server release apache httpd 2 october 10 2009 latest version released mod_ssl apache 1.3 mod_ssl v2.8.31-1.3.41 february 8 2008
Web technology
molinux molinux operating system based ubuntu sponsored autonomous community castilla-la mancha fundación ínsula barataria name molinux derives spanish word molino meaning mill windmill version molinux named character classic spanish novel quixote miguel de cervantes molinux initiative begun 2005 government castilla-la mancha introduce castile-la mancha community forefront information society molinux project intended attack digital divide reducing cost software offering easy-to-use operating system sponsoring regional government commitment open source philosophy committed impose use molinux advantage software free compete anyone user choose using software molinux 6.2 codename merlín launched 2010-12-24 based ubuntu 10.10
Operating systems
da vinci machine da vinci machine also called multi language virtual machine sun microsystems project aiming prototype extension java virtual machine jvm add support dynamic languages already possible run dynamic languages top jvm goal ease new dynamic language implementations increase performance project reference implementation jsr 292 supporting dynamically typed languages java platform prior java 7 java virtual machine built-in support dynamically typed languages jsr 292 supporting dynamically typed languages java platform proposes following success jruby java implementation da vinci project started end january 2008 capabilities experimented da vinci planned added java 7 aims prototype jsr also lower-priority extensions first working prototype developed patch openjdk announced made available end august 2008 since jruby team successfully wired dynamic invocation codebase dynamic invocation shipped 1.1.5 release disabled jvms without codice_1 capabilities since project integrated jdk 7 codebase integrated java 7 release dynamic invocation built fact even java strongly static language language level type information much less prevalent bytecode level however dynamic languages implementations need able use just-in-time compilation rather reflection achieve good performance compile scripts bytecode runtime allowed run java virtual machine bytecodes must verified prior execution verifier check types static throughout code leads implementations create many different bytecodes different contexts method call time signature arguments change uses lot memory also fills memory area called metaspace permanent generation prior java 8 part heap used jvm store information classes memory used area almost never garbage collected stores immutable data context java programs dynamic languages implementations compile small part scripts jsr 292 proposes
Programming language topics
voip vulnerabilities voip vulnerable similar types attacks web connection emails prone voip attractiveness low fixed cost numerous features come risks well known developers constantly addressed risks usually mentioned business common target voip also allows use fraud shady practices people aware practices restricted providers possibility someone using gain still exists unencrypted connections lead communication security breaches hackers/trackers eavesdrops important private conversations extract valuable data overheard conversations might sold used competing businesses gathered intelligence also used blackmail personal gain attacks user network internet provider disrupt even cut connection since voip highly dependent internet connection direct attacks internet connection provider highly effective way attack kind attacks targeting office telephony since mobile internet harder interrupt also mobile applications relying internet connection make voip calls immune attacks hardphones a.k.a voip phone smart devices computer phone need well configured chinese manufacturers cases using default passwords manufactured devices leading vulnerabilities voip even voip relatively secure 2017 still needs source internet cases wifi network home/office wifi relatively secure using public shared networks compromise connection voip spam called spit spam internet telephony using unlimited extensions provided voip pbx capabilities spammer constantly harass target different numbers process hard automate fill targets voice mail notifications caller make calls often enough block target getting important incoming calls practices cost lot caller rarely used marketing needs voip users change caller id a.k.a caller id spoofing allowing caller represent relative colleague part family order extract information money benefits form target
Computer security
window class computer programming window class structure fundamental microsoft windows win16 win32 win64 operating systems application programming interface api structure provides template windows may created specifying window icons menu background color features also holds pointer procedure controls window behaves response user interaction finally tells operating system much additional storage space needed class window created two versions window classes non-technical addition brought second one small additional icon window first version present windows 3.x series second version appeared windows 95 windows nt 3.1
Operating systems
vse operating system z/vse virtual storage extended operating system ibm mainframe computers latest one dos/360 lineage originated 1965 announced feb. 1 2005 ibm successor vsa/esa 2.7 then-new z/vsewas named reflect new system z branding ibm mainframe product line dos/vse introduced 1979 successor dos/vs turn dos/vse succeeded vse/sp version 1 1983 vse/sp version 2 1985 less common prominent z/os mostly used smaller machines late 1980s widespread perception among vse customers ibm planning discontinue vse migrate customers mvs instead although ibm relented agreed continue produce new versions vse dos/360 originally supported 24-bit addressing underlying hardware evolved vse/esa acquired support 31-bit addressing ibm released z/vse version 4 requires 64-bit z/architecture hardware supports 64-bit real mode addressing 2007 z/vse 5.1 available since 2011 z/vse introduced 64 bit virtual addressing memory objects chunks virtual storage allocated 2 gb latest shipping release z/vse 6.2.0 available since december 2017 includes new cics transaction server z/vse 2.2 job control language jcl continues positional-parameter orientation earlier dos systems z/vse batch processing primary user interface also another special interface system console operators z/vse like z/os systems traditionally supported 3270 terminal user interfaces however z/vse installations least begun add web browser access z/vse applications z/vse tcp/ip separately priced option historic reasons available two different versions two vendors vendors provide full function tcp/ip stack applications telnet ftp one tcp/ip stack provides ipv4 communication ipv4 ipv6 communication addition commercially available tcp/ip stacks z/vse ibm also provides linux fastpath method uses iucv socket hipersockets connections communicate linux guest also running mainframe using method z/vse system able fully exploit native linux tcp/ip stack ibm recommends z/vse customers run linux z systems alongside physical system provide another 64-bit application environment access extend z/vse applications data via hipersockets using wide variety middleware cics one popular enterprise transaction processing systems extremely popular among z/vse users supports recent innovations web services db2 also available popular z/vse supports eckd well scsi devices fibre channel access scsi storage devices initially supported z/vse 3.1 limited basis including ibm enterprise storage server ess ibm system storage ds8000 ds6000 series limitations disappeared 4.2 thus including ibm storwize v7000 v5000 v3700 v9000 last vse/esa release vse/esa 2.7 longer supported since february 28 2007. z/vse 3.1 last release compatible 31-bit mainframes opposed z/vse version 4 5 6. z/vse 3.1 supported 2009. z/vse version 4 longer supported since october 2014 end service z/vse 4.3 vse/esa dos/vse vse/sp see history ibm mainframe operating systems dos/vs
Operating systems
reference computer science computer science reference value enables program indirectly access particular datum variable value record computer memory storage device reference said refer datum accessing datum called dereferencing reference reference distinct datum typically references data stored memory given system reference implemented physical address data stored memory storage device reason reference often erroneously confused pointer address said point data however reference may also implemented ways offset difference datum address fixed base address index array abstractly handle broadly networking references may network addresses urls concept reference must confused values keys identifiers uniquely identify data item give access non-trivial lookup operation table data structure references widely used programming especially efficiently pass large mutable data arguments procedures share data among various uses particular reference may point variable record contains references data idea basis indirect addressing many linked data structures linked lists references cause significant complexity program partially due possibility dangling wild references partially topology data references directed graph whose analysis quite complicated references increase flexibility objects stored allocated passed areas code long one access reference data one access data data need moved also make sharing data different code areas easier keeps reference mechanism references varying implementation fundamental programming language feature common nearly modern programming languages even languages support direct use references internal implicit use example call reference calling convention implemented either explicit implicit use references pointers primitive due intimate relationship underlying hardware one powerful efficient types references however also due relationship pointers require strong understanding programmer details memory architecture pointers store memory location address instead value directly inappropriate use pointers lead undefined behavior program particularly due dangling pointers wild pointers smart pointers opaque data structures act like pointers accessed particular methods handle abstract reference may represented various ways common example file handles file data structure c standard i/o library used abstract file content usually represents file requesting lock file specific position within file content reading file distributed computing reference may contain address identifier may also include embedded specification network protocols used locate access referenced object way information encoded serialized thus example wsdl description remote web service viewed form reference includes complete specification locate bind particular web service reference live distributed object another example complete specification construct small software component called proxy subsequently engage peer-to-peer interaction local machine may gain access data replicated exists weakly consistent message stream cases reference includes full set instructions recipe access data sense serves purpose identifier address memory generally reference considered piece data allows unique retrieval another piece data includes primary keys databases keys associative array set keys k set data objects well-defined single-valued function k ∪ null defines type reference null image key referring anything meaningful alternative representation function directed graph called reachability graph datum represented vertex edge u v datum u refers datum v maximum out-degree one graphs valuable garbage collection used separate accessible inaccessible objects many data structures large complex objects composed smaller objects objects typically stored one two ways internal storage usually efficient space cost references dynamic allocation metadata time cost associated dereferencing reference allocating memory smaller objects internal storage also enhances locality reference keeping different parts large object close together memory however variety situations external storage preferred languages java smalltalk python scheme support internal storage languages objects uniformly accessed references assembly languages first languages used typical express references using either raw memory addresses indexes tables work somewhat tricky use address tells nothing value points even large interpret information encoded program logic result misinterpretations occur incorrect programs causing bewildering errors one earliest opaque references lisp language cons cell simply record containing two references lisp objects including possibly cons cells simple structure commonly used build singly linked lists also used build simple binary trees so-called dotted lists terminate null reference value another early language fortran explicit representation references use implicitly call-by-reference calling semantics pointer still one popular types references today similar assembly representation raw address except carries static datatype used compile-time ensure data refers misinterpreted however c weak type system violated using casts explicit conversions various pointer types pointer types integers misinterpretation still possible difficult successor c++ tried increase type safety pointers new cast operators smart pointers standard library still retained ability circumvent safety mechanisms compatibility number popular mainstream languages today eiffel java c visual basic adopted much opaque type reference usually referred simply reference references types like c pointers indicating interpret data reference typesafe interpreted raw address unsafe conversions permitted fortran reference best thought alias another object scalar variable row column array syntax dereference reference manipulate contents referent directly fortran references null languages references facilitate processing dynamic structures linked lists queues trees settings concept mutable variables data modified often makes implicit use references standard ml ocaml many functional languages values persistent modified assignment assignable reference cells serve unavoidable purposes mutable references imperative languages make capability modified explicit reference cells hold value given polymorphic type codice_1 codice_2 replaced type value pointed mutable references pointed different objects lifetime example permits building circular data structures reference cell functionally equivalent array length 1 preserve safety efficient implementations references type-cast ml pointer arithmetic performed important note functional paradigm many structures would represented using pointers language like c represented using facilities powerful algebraic datatype mechanism programmer able enjoy certain properties guarantee immutability programming even though compiler often uses machine pointers hood languages like perl support symbolic references string values contain names variables value regular reference dereferenced perl considers symbolic reference gives variable name given value php similar feature form codice_3 syntax many object oriented languages make extensive use references may use references access assign objects references also used function/method calls message passing reference counts frequently used perform garbage collection unused objects
Programming language topics
synthetic file system computer science synthetic file system pseudo file system hierarchical interface non-file objects appear regular files tree disk-based long-term-storage file system non-file objects may accessed system calls utility programs regular files directories common term regular files non-file objects node benefit synthetic file systems well known file system semantics reused universal easily implementable approach interprocess communication clients use file system perform simple file operations nodes implement complex message encoding passing methods aspects protocol engineering operations common file utilities used even scripting quite easy commonly known everything file generally regarded originated unix unix-world commonly special filesystem mounted /proc filesystem implemented within kernel publishes information processes process directory named process id containing detailed information process status open files memory maps mounts etc /proc first appeared unix 8th edition functionality greatly expanded plan 9 bell labs /sys filesystem linux complements /proc providing lot non-process related detailed information in-kernel status userspace traditional unix systems locate information sysctl calls obexfs fuse-based filesystem provides access obex objects via filesystem applications work remote objects via obex protocol simply local files plan 9 bell labs operating system family concept 9p synthetic filesystem used generic ipc method contrary operating systems plan 9 design heavily distributed os worlds many often large libraries frameworks common things plan 9 encapsulates fileservers important benefit applications much simpler services run network platform agnostic reside virtually host platform network virtually kind network long fileserver mounted application plan 9 drives concept expansively operating system services e.g hardware access networking stack presented fileservers way trivial use resources remotely e.g one host directly accessing another host block devices network interfaces without need additional protocols implementations 9p file system protocol also exists many systems environments debugging embedded systems even system-on-chip soc devices widely known difficult several protocols implemented provide direct access in-chip devices tend proprietary complex hard handle based 9p plan 9 network filesystem studies suggest using synthetic filesystems universal access scheme information major benefit 9p simple quite easy implement hardware easily used virtually kind network serial link internet major argument using synthetic filesystems might flexibility easy access service-oriented architectures noticeable number applications use scheme overall overhead code resource consumption maintenance work reduced significantly many general arguments soas also apply arguments synthetic filesystems include fact filesytem semantics may fit application scenarios example complex remote procedure calls many parameters tend hard map filesystem schemes may require application redesign
Computer file systems
axfs axfs advanced xip filesystem compressed read-only file system linux initially developed intel maintained numonyx designed use execute place xip alongside compression aiming reduce boot program load times retaining small memory footprint embedded devices achieved mixing compressed uncompressed pages executable file axfs free software licensed gpl cramfs another read-only compressed file system supports xip patches however uses strategy decompressing entire files whereas axfs supports xip page granularity
Computer file systems
purble place purble place suite three computer games children teenagers developed oberon games microsoft introduced windows vista also included windows 7 publicly introduced windows vista build 5219 along chess titans mahjong titans collection single home screen offers three packs games purble pairs comfy cakes purble shop purble pairs pattern recognition memory game similar pelmanism object clear tableau fewest turns skill level progresses game becomes timed grid size increases similar pictures used beginner level one 5x5 grid intermediate two 6x6 grids advanced four 8x8 grids solve per game addition joker automatically finds another match exposed card numerous special pairs present higher levels card batter machine comfy cakes shuffles board paired clock adds time timer master chef automatically finds matches pairs cards containing cakes sneak peek coin bonus allows player expose remaining cards couple seconds every card exposed way counted turn comfy cakes hand-eye coordination game object fill orders bakery assembling cake match given specification controlling conveyor belt brings cake various stations elements cake include shapes square circular heart-shaped flavor batter strawberry chocolate vanilla optional icing flavors used batter decorations e.g sugar may sprinkled top cake rarer cases flames applied iced cakes create smooth glaze cake match specification player penalized cake gets thrown trash player sends three incorrect orders game certain number correct orders shipped player wins game score tabulated final score depends upon number cakes baked number incorrect orders sent efficiency player baking higher levels specifications become complex multiple cakes must manufactured parallel single conveyor belt player makes 5 6 cakes one difficulty levels purble shop code-breaker game computer decides color five features hat eyes nose mouth clothes concealed player color may used feature color used several times used player attempts deduce guess correct feature colors limited number moves three difficulty levels beginner three features three possible colors 3 27 different possible solutions intermediate 4 256 solutions advanced 5 3125 solutions beginner intermediate levels guessing games move computer tells player items correct little scope deduction advanced level computer n't tell player specific items correct reporting count picks correct color position count picks correct color wrong position level similar colored peg game mastermind success requires logical reasoning although small chance succeeding lucky guesses
Operating systems
crypto api linux crypto api cryptography framework linux kernel various parts kernel deal cryptography ipsec dm-crypt introduced kernel version 2.5.45 since expanded include essentially popular block ciphers hash functions many platforms provide hardware acceleration aes encryption expose programs extension instruction set architecture isa various chipsets e.g aes instruction set x86 sort implementation program kernel-mode user-space may utilize features directly platforms arm kirkwood sheevaplug amd geode processors however implemented isa extensions accessible kernel-mode drivers order user-mode applications utilize encryption openssl gnutls take advantage acceleration must interface kernel
Operating systems
peter wegner peter a. wegner august 20 1932 – july 27 2017 computer scientist made significant contributions theory object-oriented programming 1980s relevance church–turing thesis empirical aspects computer science 1990s present 2016 wegner wrote brief autobiography conduit annual brown university computer science department magazine wegner educated university cambridge received post-graduate diploma numerical analysis automatic computing 1954 time phd programs computer science awarded phd university london 1968 book programming languages information structures machine organization maurice wilkes listed supervisor seminal work previous occupation understanding types co-authored luca cardelli latter undertaking co-authored several papers co-edited book interactive computation new paradigm published 2006 wegner inducted fellow association computing machinery acm 1995 received acm distinguished service award 2000 1999 awarded austrian cross honor science art 1st class österreichisches ehrenkreuz für wissenschaft u. kunst i. klasse hit bus sustained serious brain injuries trip london receive award recovered lengthy coma editor-in-chief acm computing surveys brown faculty bulletin professor brown university
Programming language topics
userland technologies userland technologies free open-source ad-free compatibility layer mobile app allows linux distributions computer programs computer games numerical computing programs run mobile devices without requiring root account userland also provides program library popular free open-source linux-based programs additional programs different versions programs added unlike linux compatibility layer mobile apps userland require root account userland ability function without root directories also known rooting avoids bricking non-functionality mobile device linux program use addition making mobile device non-functional may void device warranty furthermore requirement programs userland root mobile device proven formidable challenge inexperienced linux users prior application gnuroot debian attempted similarly run linux programs mobile devices ceased maintained therefore longer operational userland allows mobile device run linux programs many n't available mobile apps even linux applications e.g firefox mobile versions available people often find user experience mobile versions pales comparison desktop userland allows users recreate desktop experience mobile device userland currently operates android mobile devices userland available download google play f-droid use userland one must first download-typically google play store-the application install installed user selects app open program selected user prompted enter login information select connection type following user gains access selected program userland pre-loaded distributions alpine arch debian kali ubuntu web browser firefox desktop environments lxde xfce deployment environments git idle text-based games colossal cave adventure zork numerical computing programs gnuplot gnu octave r office suite libreoffice graphics editors gimp inkscape program library linux programs different versions programs may added review slant.co listed userland pro support vnc x sessions rooting required easy setup free open-source con lack support lollipop difficulty use non-technical users contrary os journal found lack need root mobile device made using userland considerably easier linux compatibility layer applications position shared slashgear review userland os journal went state userland one could almost anything ’ limited insanity respect application linux journal stated userland offers quick easy way run entire linux distribution even linux application game pocket slashgear stated userland absolutely super simple use requires little technical knowledge get ground running
Operating systems
brendan hannigan brendan hannigan former head international business machines ibm security systems division helped develop industry first intelligent cloud computing security portfolio also entrepreneur investor focuses security cloud software service saas startups hannigan born ireland finished bsc computer science university college dublin 1987 school became interested fortran programming vax computer architecture immigrated united states early 1990s first lived boston massachusetts secured employment motorola hannigan started working dublin worked digital equipment job irish company involved writing terminal server routing codes relocated u.s. joined motorola wellfleet communications also worked forrester research 1996 2000 director network research implemented successful practices areas enterprise networks security technology product management hannigan however known founding startup q1 labs acquired ibm 2011 company co-founded sandy bird provided security software analyze monitor events interview said ideas based simple realization perimeter protection paradigm companies relied n't work world bad actors sophisticated built upon foundation intelligence must bring security closer data person transaction. ” q1 labs security features seen compatible ibm analytic capability hence acquisition ibm acquired q1 labs company created new division focused helping clients address security challenges q1 labs formed basis security division hannigan tapped lead according gartner division established third largest security software company idc lists hannigan ’ group world leader security services ibm would later acquire startups reinforced division range security services hannigan retired ibm 2016 four years working company november 2016 hannigan joined polaris partners venture partner involved identifying tech startups funding founding experience ibm also focuses cloud infrastructure cybersecurity hannigan maintains business world shifting traditional data center towards multiple cloud services 2019 co-founded sonrai security startup offers organizations better data security across multicloud deployments software-as-a-service product offering aside investor also serves ceo startup able raise 18.5 million going public
Computer security
naviserver naviserver high performance web server written c tcl easily extended either language create web sites services 35 modules available project active development hosted sourceforge licensed terms mozilla public license mpl recent new features include naviserver based aolserver version 4.10 aol open-source web server naviserver project started fork aolserver project different supporting multiple protocols providing higher scalability asynchronous i/o aims less conservative new feature development historically naviserver original name server closed-source product company called navisoft early 1990s bought aol 1995 released open-source 1999 aolserver released mozilla friendly-fork takes code back original name
Web technology
vbscript vbscript microsoft visual basic scripting edition active scripting language developed microsoft modeled visual basic allows microsoft windows system administrators generate powerful tools managing computers error handling subroutines advanced programming constructs give user complete control many aspects computing environment vbscript uses component object model access elements environment within running example filesystemobject fso used create read update delete files vbscript installed default every desktop release microsoft windows since windows 98 windows server since windows nt 4.0 option pack optionally windows ce depending device installed vbscript script must executed within host environment several provided microsoft windows including windows script host wsh internet explorer ie internet information services iis additionally vbscript hosting environment embeddable programs technologies microsoft script control vbscript began part microsoft windows script technologies launched 1996 technology also included jscript initially targeted web developers period two years vbscript advanced version 1.0 2.0 time gained support windows system administrators seeking automation tool powerful batch language first developed early 1980s march 6 1988 alan cooper showed bill gates shell prototype allowed widgets added dynamically march 20 1991 microsoft adopted quick basic allowed users create windows apps quickly easily gui finally august 1 1996 internet explorer made features included vbscript version 5.0 functionality vbscript increased new features including regular expressions classes statement eval execute executeglobal functions evaluate execute script commands built execution another script function-pointer system via getref distributed com dcom support version 5.5 submatches added regular expression class vbscript finally allow script authors capture text within expression groups capability already available jscript advent .net framework scripting team took decision implement future support vbscript within asp.net web development therefore new versions vbscript engine would developed would henceforth supported microsoft sustaining engineering team responsible bug fixes security enhancements windows system administrators microsoft suggests migrating windows powershell however scripting engine continue shipped future releases microsoft windows iis employed client-side web development microsoft internet explorer vbscript similar function javascript used write executable functions embedded included html pages interact document object model dom page perform tasks possible html alone however web browsers firefox opera built-in support vbscript means client-side scripting cross-browser compatibility required developers usually choose javascript vbscript vbscript also used server-side processing web pages notably microsoft active server pages asp asp engine type library invokes run vbscript scripts vbscript embedded asp page contained within context switches following example asp page vbscript displays current time 24-hour format also used default script error messages windows operating systems vbscript also used create applications run directly workstation running microsoft windows simplest example script makes use windows script host wsh environment script usually stand-alone file file extension codice_1 script invoked two ways used display output receive input gui dialog input boxes used command line environment vbscript included two types scripting files windows script files html applications windows script file wsf styled xml wsf file include multiple vbs files result wsf files provide means code reuse library classes functions stored one codice_1 files included codice_3 files functionality reused modular way files extension codice_3 executed using codice_1 file html application hta styled html html file used generate user interface scripting language vbscript used program logic files extension codice_6 executed using vbscript jscript also used windows script component activex-enabled script class invoked com-enabled applications files extension vbscript simple create coded using easy use text editor like notepad simple vbscript saved codice_1 extension run windows system double clicking language vbscript modeled visual basic therefore reviewed using similar categories procedures control structures constants variables user interaction array handling date/time functions error handling mathematical functions objects regular expressions string manipulation following key points introduction vbscript language microsoft procedure main construct vbscript separating code smaller modules vbscript distinguishes function return result assignment statement subroutine parameters positional passed value reference control structures include usual iterative conditional loops if-then-else statements case statements complex variants elseif nested control structures memory aid coding certainly readability large number constants true false logical values vbokcancel vbyesno msgbox codes vbblack vbyellow color values vbcr carriage return character many others variables variant type default possible sometimes necessary force particular type integer date etc using conversion functions cint cdate etc user interaction provided functions codice_8 codice_9 provide simple dialogue box format messages input functions display prompting messages former returning standard response latter returning one user-supplied text numeric value elaborate gui interaction controls vbscript used combination html example html application event-driven forms supported visual basic visual basic applications names case-sensitive however considered best practice vbscript style consistent capitalize judiciously hosted windows script host vbscript provides numerous features common scripting languages available visual basic 6.0 features include direct easy access cscript command line runner provides options file system management file modification streaming text operations implemented scripting runtime library codice_10 provides objects filesystemobject file textstream expose windows file system programmer binary file memory i/o provided adodb.stream class also used string builders avoid excessive string concatenation costly interconvert byte arrays strings database access made possible activex data objects ado iis metabase manipulated using getobject function sufficient permissions useful creating destroying sites virtual directories xml files schemas manipulated microsoft xml library application programming interfaces also used retrieve content world wide web via xmlhttp serverxmlhttp objects class strings msxml2.xmlhttp.6.0 msxml2.serverxmlhttp.6.0 respectively functionality also added activex technologies security concerns led many activex controls blacklisted internet explorer process microsoft deploys killbit via monthly windows security updates disable vulnerable microsoft third party code programmers utilize extensibility via com activex modules specifically equip script host vbscript required desired functions vtool component instance adds number dialog windows binary file access functionality microsoft routinely make available ide integrated development environment vbscript although microsoft script editor bundled certain versions microsoft office debugging purposes microsoft script debugger still used current windows versions even though tool updated years allows user set break points vbscript code user interface clumsy vbscript debuggers available third-party sources many text editors offer syntax highlighting language execution error occurs script host issues message stating type error number offending line although vbscript general-purpose scripting language several particular areas use noteworthy first widely used among system administrators microsoft environment situation may change promotion increased use windows powershell second vbscript scripting language quick test professional test automation tool third area note adoption vbscript internal scripting language embedded applications industrial operator interfaces human machine interfaces hierarchical dbms intersystems caché roots language mumps also supports implementation vbscript cache basic programming stored code vbscript omits several useful features full visual basic strong typing extended error trapping ability pass variable number parameters subroutine however use relatively widespread easy learn implement code language need pay royalties microsoft long vbscript trade mark acknowledged organization licenses visual basic applications vba microsoft companies autodesk statsoft great plains accounting visio subsequently acquired microsoft done allowed redistribute full vba code-writing debugging environment product vbscript used place vba macro language outlook 97 vbscript effectively used automating day day office tasks well monitoring windows-based environment first choice tool server administrators ms office users tech contributors also used collaboration adodb activex data objects adodb effective database connectivity
Programming language topics
trusted timestamping trusted timestamping process securely keeping track creation modification time document security means one—not even owner document—should able change recorded provided timestamper integrity never compromised administrative aspect involves setting publicly available trusted timestamp management infrastructure collect process renew timestamps idea timestamping information centuries old example robert hooke discovered hooke law 1660 want publish yet wanted able claim priority published anagram ceiiinosssttuv later published translation ut tensio sic vis latin extension force similarly galileo first published discovery phases venus anagram form sir isaac newton responding questions leibniz letter 1677 concealed details fluxional technique anagram many timestamping schemes different security goals coverage standards systematic classification evaluation timestamping schemes see works masashi une according nowiki rfc 3161 /nowiki standard trusted timestamp timestamp issued trusted third party ttp acting time stamping authority tsa used prove existence certain data certain point e.g contracts research data medical records ... without possibility owner backdate timestamps multiple tsas used increase reliability reduce vulnerability newer ansi asc x9.95 standard trusted timestamps augments nowiki rfc 3161 /nowiki standard data-level security requirements ensure data integrity reliable time source provable third party standard applied authenticating digitally signed data regulatory compliance financial transactions legal evidence technique based digital signatures hash functions first hash calculated data hash sort digital fingerprint original data string bits practically impossible duplicate set data original data changed result completely different hash hash sent tsa tsa concatenates timestamp hash calculates hash concatenation hash turn digitally signed private key tsa signed hash timestamp sent back requester timestamp stores original data see diagram since original data calculated hash hash function one way function tsa never gets see original data allows use method confidential data anyone trusting timestamper verify document created date timestamper vouches also longer repudiated requester timestamp possession original data time given timestamp prove see diagram hash original data calculated timestamp given tsa appended hash result concatenation calculated call hash digital signature tsa needs validated done checking signed hash provided tsa indeed signed private key digital signature verification hash compared hash b inside signed tsa message confirm equal proving timestamp message unaltered issued tsa either timestamp altered timestamp issued tsa advent cryptocurrencies like bitcoin become possible securely timestamp information decentralized tamper-proof manner digital data hashed hash incorporated transaction stored blockchain serves secure proof exact time data existed proof due tremendous amount computational effort performed hash submitted blockchain tampering timestamp would require computational resources rest network combined done unnoticed decentralized timestamping approach using blockchain also found applications areas dashboard cameras secure integrity video files time recording prove priority creative content ideas shared social media platforms
Computer security
anti-spam appliances anti-spam appliances software hardware devices integrated on-board software implement spam filtering and/or anti-spam instant messaging also called spim deployed gateway front mail server normally driven operating system optimized spam filtering generally used larger networks companies corporations isps universities etc reasons hardware anti-spam appliances might selected instead software could include
Computer security
polar modulation polar modulation analogous quadrature modulation way polar coordinates analogous cartesian coordinates quadrature modulation makes use cartesian coordinates x considering quadrature modulation x axis called in-phase axis axis called q quadrature axis polar modulation makes use polar coordinates r amplitude θ phase quadrature modulator approach digital radio transmission requires linear rf power amplifier creates design conflict improving power efficiency maintaining amplifier linearity compromising linearity causes degraded signal quality usually adjacent channel degradation fundamental factor limiting network performance capacity additional problems linear rf power amplifiers including device parametric restrictions temperature instability power control accuracy wideband noise production yields also common hand compromising power efficiency increases power consumption reduces battery life handheld devices generates heat issue linearity power amplifier theoretically mitigated requiring input signal power amplifier constant envelope i.e contain amplitude variations polar modulation system power amplifier input signal may vary phase amplitude modulation accomplished directly controlling gain power amplifier changing modulating supply voltage thus polar modulation system allows use highly non-linear power amplifier architectures class e class f. order create polar signal phase transfer amplifier must known least 17 db amplitude range phase transitions one another amplitude perturbation calculated transition n number samples q sufficiently large allow accurate tracing signal one hundred samples per symbol would lowest number workable amplitude change signal known phase error introduced amplifier amplitude change used pre-distort signal one simply subtracts phase error amplitude modulating q signals polar modulation originally developed thomas edison 1874 quadruplex telegraph – allowed 4 signals sent along pair lines 2 direction sending signal direction already accomplished earlier edison found combining amplitude phase modulation i.e. polar modulation could double 4 signals – hence quadruplex
Internet protocols
coresystems coresystems ag software developing company headquartered switzerland provider field service management solutions technicians coresystems founded 2006 windisch aargau november 2013 company raised 15.5 million first round funding consortium private investors including german tech investor peter zencke former sap executive board member head research development coresystems recently begun exploring products internet things iot appointing iot expert professor elgar fleisch board fleisch holds double appointment eth zürich university st. gallen hsg advises siemens bosch developing iot products june 5 2018 sap announced acquisition coresystems 2013 manuel grenacher founder coresystems awarded 2013 swiss ict award outstanding personality swiss computer science 2014 company nominated 2014 export award category success according 2016 published market research report field service management market global forecast 2020 published marketsandmarkets coresystems identified key innovator market
Distributed computing architecture
lasso programming language lasso application server server management interface used develop internet applications general-purpose high-level programming language originally web datasource connection tool filemaker later included apple computer filemaker 4.0 claris homepage cdml since evolved complex language used develop serve large-scale internet applications web pages lasso includes simple template system allowing code control generation html content types lasso object-oriented every value object also supports procedural programming unbound methods language uses traits multiple dispatch extensively lasso dynamic type system objects loaded augmented runtime automatic memory management comprehensive standard library three compiling methodologies dynamic comparable php-python just-in-time compilation comparable java .net framework pre-compiled comparable c lasso also supports query expressions allowing elements within arrays types sequences iterated filtered manipulated using natural language syntax similar sql lasso includes full unicode character support standard string object allowing serve support multi-byte characters japanese swedish supports transparent utf-8 conversion writing string data network file system lasso often used scripting language also used wide range non-scripting contexts lasso code packaged standalone executable programs called lassoapps folder structures compiled single files lasso server application server runs system service receives requests web server fastcgi hands request appropriate lasso instance formulates response multiple individual instances supported allowing one server handle multiple sites separate processes server uses high performance io-based green threading system designed multi-core systems lasso compared server-side scripting languages php python coldfusion ruby etc free development lasso allows partial access source code allowing developers add change major components language example ke carlton ds implementation lasso inline licensing comes sas stand-alone versions lasso began mid-1990s early web developers attempting connect apple filemaker pro database world wide web mac platform two solutions eric bickford web-fm russell owens filemaker cgi rofm built applescript requiring use filemaker pro calculation fields formatting web-fm subsequently rewritten c fall 1995 developer vince bonafonti wrote new cgi based rofm using c/c++ improved performance using notion html-based templates instead relying calculation fields proved popular filemaker community brought attention bill doerrfeld owner blue world communications inc. print website development firm based issaquah washington bought source code time blue world experimented improvements cgi frontier scripting environment inspired name lasso need improvement drove creation c-based cgi later released lasso 1.0 point lasso worked filemaker pro 3.x webstar ran apple mac os 8 lasso popularity grew notably reviews print publications blue world hosting participation many email discussion lists many specifically pertained filemaker pro blue world also made frequent appearances known leading company macworld conferences following release lasso 1.2 lineup january 1997 blue world bonfantis entered private talks claris software division apple computer owner filemaker pro claris eventually licensed post-version-1.2 lasso source code help vince paul bonfanti released filemaker web companion component filemaker pro 4.0 filemaker web companion language cdml claris dynamic markup language differed lasso 1.2 ldml lasso dynamic markup language close enough offer easy transition developers looking serve filemaker pro third-party servers offered compelling features including lasso-like web companion filemaker 4.0 helped grow popularity lasso fast-growing macintosh web development community blue world continued developing lasso kyle jessup becoming lasso lead programmer lasso 2.0 released july 1997 introducing fundamental shifts lasso could used february 26 2002 blue world released lasso 5 radical departure filemaker-centric language date never lasso 4 release version number skipped 3 5 lasso 5 included among many updates completely rewritten architecture os x windows linux embedded mysql database though lasso 5 still spoke filemaker database filemaker server filemaker data source remained relatively slow compared sql engine prohibitively expensive since v2.0 lasso fully multithreaded allowing many connections succumbed filemaker latency lag certain operations way get around reliably make major changes data source lasso 5 also added support apache http server natively os x windows linux joining webstar 5 appleshare ip replaced os x server itools tenon mac os 9 lasso used many years unsupported drove closer ties classic lamp server architecture blue world communications released series plug-ins popular web development packages macromedia adobe lasso studio 1.5 dreamweaver runner macworld magazine editors choice awards internet development 2001 losing adobe dreamweaver 3 lasso studio dreamweaver 1.5 also reviewed favorably macworld magazine earning 4 half mice later version lasso studio supported macromedia dreamweaver adobe golive including lasso studio 7 dreamweaver golive march 26 2004 release filemaker server filemaker server advanced version 7 2004 filemaker signaled major change strategy serving data web sites emphasized xml-xslt odbc jdbc connectivity expensive filemaker server advanced product blue world began distance lasso language filemaker apple 2005 lasso pro received mysql network certification demonstrating importance popular open source database future lasso august 1 2004 bill doerrfeld officially sold lasso product line omnipilot software inc. ft. lauderdale florida lasso 7.0.3 last version lasso released blue world october 25 2004 omnipilot officially announced release lasso 8 version including sandboxing multiple sites server connectivity many new datasources also included first free version lasso limited ip addresses omnipilot followed release number complementary products including lasso studio 8 dreamweaver golive march 28 2005 lasso studio eclipse chartfx integration number free lasso-based solutions 2007 three omnipilot employees kyle jessup original developer lasso 1.0 fletcher sandbeck early employee blue world known regular tips tricks kerry adams employee omnipilot created new company lassosoft llc purchase intellectual property lasso omnipilot continue development recognizing need competitive much popular languages php asp radical changes architecture syntax structure made released lasso 9.0 technical challenges caused changes coupled limited marketing resources led significant community decline company struggled release documentation support new language december 2010 new canadian company formed lassosoft inc. bought invested heavily lasso 9.0 language marketing documentation kyle jessup agreed stay lasso lead developer benevolent dictator life several releases 9.1 9.2 released developments recent years three ways say hello world lasso page square brackets reserved lasso html entities must used show square brackets lasso pages purposes marking lasso tags alternatively printing square brackets lasso disabled including no_square_brackets file top inlines basic lasso tool database actions database commands issued lasso db-independent metalanguage case search code works mysql filemaker pro database backend lasso connect needed sql statement course embedded inline using database server supports sql example dashes commands denote optional parameters specified order generated dynamically last duplicate parameters take precedence inline command supports large range parameters allowing developers interact databases may intimate knowledge custom database connectors created allows leveraging abstracted nature inline command next procedural example prints lyrics song 99 bottles beer next example uses oop approach print lyrics object represented string
Programming language topics
nextbsd nextbsd operating system initially based trunk version freebsd august 2015 fork freebsd implements new features developed branches yet implemented freebsd 2019 website seems defunct later commits github date july 2016 basic features launchd notifyd asld libdispatch work installed cloning nextbsd repository github building generic machtest kernels installing new world existing 10.x current system following instructions readme launchd start initial jobs part repo project refers installer first planned milestone website future plans include convert rc tying notifyd potential consumers nextbsd announced jordan hubbard kip macy august 2015 bay area freebsd users group bafug nextbsd based freebsd-current kernel adding mach ipc libdispatch notifyd asld launchd components derived darwin apple open-source code macos units resource ownership task consists virtual address space port right namespace one threads implemented extension process units cpu execution within task simple extension kthreads conjunction memory managers mach implements notion sparse virtual address space shared memory modifications internal units memory management memory objects include named entries regions representations potentially persistent data may mapped address spaces unsupported secure simplex communication channels accessible via send receive capabilities known port rights message queues remote procedure calls notifications semaphores lock sets mach semaphores lock sets supported clocks timers waiting rudimentary shims current bsd operating system variants support many common ieee ansi iso posix standards retaining traditional bsd behavior like unix bsd kernel monolithic meaning device drivers kernel run privileged mode part core operating system selection significant unix versions unix-like operating systems descend bsd includes
Operating systems
wec le mans wec le mans racing simulation arcade game released 1986 konami first racing video game depict 24 hours le mans lap le mans split three sections time day changes day dusk dusk night night dawn game attempted realistically simulate car driving car jumping turning back forth spinning 180 degrees emphasis acceleration braking gear shifting along need counter-steering avoid spin-outs also featured accurately simulated courses approved automobile club de l'ouest used force feedback simulate road vibration form vibrating steering wheel reacts driver acceleration off-road bumps game known difficult complete tracks width remains constant 3 lanes racing slight contact opposing race car result either spin spectacular flip air going course running wide corner also end spin konami released three different video game arcade cabinet versions video arcade game upright machine 'mini spin driver sat sit-down cockpit 'big spin version deluxe arcade version would actually spin gamer around 360° spinning base turning left right depending corner front 'big spin arcade machine looked like real prototype c race car arcade cabinet expensive time high price £7000 1986 equivalent £ game several ports imagine software imagine studios amstrad cpc commodore 64 msx zx spectrum rumored 16-bit port amiga atari st mentioned never came fruition original arcade game played home systems via mame though arcade cabinet simulated arcade version critically acclaimed upon release following debut preview '87 show september 1986 computer video games gave positive review january 1987 issue clare edgeley declaring favourite game show describing fast realistic racing simulation praising rotating cockpit cabinet concluding game played months gave edge run mainly better movement noted many seem prefer run atei amusement trades exhibition international show january 1987 run wec le mans stole january show according computer video games clare edgeley reviewed february 1987 issue sinclair user stating far way sophisticated certainly thrilling game 've ever played describing like hang-on racing car actually sit inside movement system entirely different anything experienced really get thrown around simulates action even spinning shakes whole car going track skidding marked border lines stated hazards avoid cars bombing past great graphics high speed also commercially successful arcades coinslot dedicated arcade game chart number-three behind street fighter continental circus spectrum version game also earned critical acclaim spectrum version also commercially successful reaching 4th place uk spectrum chart may 1989 konami tanaka fumihaki cited wec le mans chief inspiration konami 1995 game speed king spanish magazine microhobby valued game following scores originality 30 graphics 70 motion 80 sound 50 difficulty 80 addiction 80
Computer architecture
backup express catalogic dpx formerly bex backup express enterprise-level data protection solution backs restores data applications variety operating systems data protection disaster recovery business continuity planning capabilities catalogic dpx protects physical virtual servers including vmware supports many database applications including oracle sql sharepoint exchange dpx supports agent-based agent less backups users map use backed version database something goes wrong primary version dpx managed single console catalog allows centralized control tape-based disk-based data protection jobs across heterogeneous operating systems dpx protect data centers remote sites supports recovery dr. dpx protect data disk tape cloud used various recovery use cases including file application bmr vm dr. dpx spin vms backup images recover physical servers bring applications online snapshot based backups used recover ransomware according dpx interface guide dpx contains interfaces following software database management systems db2 lotus notes microsoft exchange novell groupwise micro focus open enterprise services oes oracle sap sharepoint sql-backtrack sql server sybase oracle dpx provides cloning capabilities microsoft exchange sql server oracle dpx provides read/write access recovery points sql log truncation rollback time point time recovery sql granular recovery exchange sharepoint sql available dpx uses tape tape library jukebox virtual tape library vtl disk local compellent netapp dell emc hp data domain disk-to-disk-to-tape cloud backup target dpx back disk vstor netapp fas storage dpx infrastructure 3 types components following among capabilities dpx october 2013 syncsort sold data protection business investor group led bedford venture partners windcrest partners spun data protection business called catalogic software company produces catalogic dpx june 4 2018 reported catalogic software taken equity stake european data protection company storware
Computer security
oracle cloud platform oracle cloud platform ocp platform service paas offered oracle corporation part oracle cloud platform used build deploy integrate extend applications cloud platform supports variety programming languages databases tools frameworks including oracle-specific open source third-party software systems oracle cloud platform offerings include data management application development integration content experience business analytics systems management security oracle cloud platform currently 12 regions oracle cloud platform offers public private hybrid cloud deployment models oracle cloud platform provides infrastructure service iaas platform service paas infrastructure offered global network oracle managed data centers oracle deploys cloud regions inside region least three fault-independent availability domains availability domains contains independent data center power thermal network isolation oracle cloud generally available north america emea apac japan announced south america us govt regions coming soon
Distributed computing architecture
server name indication server name indication sni extension transport layer security tls computer networking protocol client indicates hostname attempting connect start handshaking process allows server present multiple certificates ip address tcp port number hence allows multiple secure https websites service tls served ip address without requiring sites use certificate conceptual equivalent http/1.1 name-based virtual hosting https desired hostname encrypted original sni extension eavesdropper see site requested making tls connection client requests digital certificate web server server sends certificate client examines compares name trying connect name included certificate match occurs connection proceeds normal match found user may warned discrepancy connection may abort mismatch may indicate attempted man-in-the-middle attack however applications allow user bypass warning proceed connection user taking responsibility trusting certificate extension connection however may difficult — even impossible due lack full list names advance — obtain single certificate covers names server responsible server responsible multiple hostnames likely need present different certificate name small group names since 2005 cacert run experiments different methods using tls virtual servers experiments unsatisfactory impractical example possible use subjectaltname contain multiple domains controlled one person single certificate unified communications certificates must reissued every time list domains changes name-based virtual hosting allows multiple dns hostnames hosted single server usually web server ip address achieve server uses hostname presented client part protocol http name presented host header however using https tls handshake happens server sees http headers therefore possible server use information http host header decide certificate present names covered certificate served ip address practice means https server serve one domain small group domains per ip address secured efficient browsing assigning separate ip address site increases cost hosting since requests ip addresses must justified regional internet registry ipv4 addresses exhausted result many websites effectively constrained using secure communications ipv4 ipv6 address space exhausted websites served using ipv6 unaffected issue sni addresses issue client send name virtual domain part tls negotiation enables server select correct virtual domain early present browser certificate containing correct name therefore clients servers implement sni server single ip address serve group domain names impractical get common certificate sni added ietf internet rfcs june 2003 rfc 3546 transport layer security tls extensions latest version standard rfc 6066 desired hostname encrypted eavesdropper see site requested helps security companies provide filtering feature governments implement censorship domain fronting used workaround google aws taken action disallow therefore becoming less alternative mid 2018 upgrade called encrypted sni esni rolled experimental phase address risk domain eavesdropping march 1 2019 daniel stenberg stated mozilla firefox supports esni 2004 patch adding tls/sni openssl created edelkey project 2006 patch ported development branch openssl 2007 back-ported openssl 0.9.8 first released 0.9.8f application program implement sni tls library uses must implement application must pass hostname tls library complicating matters tls library may either included application program component underlying operating system browsers implement sni running operating system others implement running certain operating systems
Internet protocols
printer job language printer job language pjl method developed hewlett-packard switching printer languages job level status readback printer host computer pjl adds job level controls printer language switching job separation environment status readback device attendance file system commands pjl conceived extension printer command language pcl supported postscript printers many printer vendors extended pjl include commands proprietary products pjl commands documented hp implemented hp vendor products pjl resides printer languages parses commands first syntax mainly uses plain english words
Programming language topics
sanitization classified information sanitization process removing sensitive information document message sometimes encrypting document may distributed broader audience intent secrecy protection dealing classified information sanitization attempts reduce document classification level possibly yielding unclassified document intent privacy protection often called data anonymization originally term sanitization applied printed documents since extended apply computer media problem data remanence well redaction sanitization sense distinguished editing sense blacking deletion text document result effort intended allow selective disclosure information document keeping parts document secret typically result document suitable publication dissemination others intended audience original document example document subpoenaed court case information specifically relevant case hand often redacted context government documents redaction also called sanitization generally refers specifically process removing sensitive classified information document prior publication declassification traditional technique redacting confidential material paper document public release involves overwriting portions text wide black pen followed photocopying result—the obscured text may recoverable original alternatively opaque cover tape redaction tape opaque removable adhesive tape various widths may applied photocopying simple process minor security risks example black pen tape wide enough careful examination resulting photocopy may still reveal partial information text difference short tall letters exact length removed text also remains recognizable may help guessing plausible wordings shorter redacted sections computer-generated proportional fonts used even information leak redacted section form exact position nearby visible characters uk national archives published document redaction toolkit guidelines editing exempt information documents prior release provide guidance editing exempt material information held public bodies secure redacting far complicated problem computer files word processing formats may save revision history edited text still contains redacted text file formats unused portions memory saved may still contain fragments previous versions text text redacted portable document format pdf word processor formats overlaying graphical elements usually black rectangles text original text remains file uncovered simply deleting overlaying graphics effective redaction electronic documents requires removal relevant text image data document file either requires detailed understanding internal operation document processing software file formats used computer users lack software tools designed sanitizing electronic documents see external links redaction usually requires marking redacted area reason content restricted us government documents released freedom information act marked exemption codes denote reason content withheld us national security agency nsa published guidance document provides instructions redacting pdf files printed documents contain classified sensitive information frequently contain great deal information less sensitive may need release less sensitive portions uncleared personnel printed document consequently sanitized obscure remove sensitive information maps also redacted reason highly sensitive areas covered slip white paper cases sanitizing classified document removes enough information reduce classification higher level lower one example raw intelligence reports may contain highly classified information identities spies removed reports distributed outside intelligence agency initial report may classified top secret sanitized report may classified secret cases like nsa report uss liberty incident right report may sanitized remove sensitive data report may released general public seen uss liberty report paper documents generally sanitized covering classified sensitive portions photocopying document resulting sanitized document suitable distribution computer electronic digital documents difficult sanitize many cases information information system modified erased data remains storage may accident design underlying storage mechanism disk ram etc still allows information read despite nominal erasure general term problem data remanence contexts notably us nsa dod related organizations sanitization typically refers countering data remanence problem redaction used sense article however retention may deliberate feature form undo buffer revision history trash backups like example word processing programs like microsoft word sometimes used edit sensitive information unfortunately products always show user information stored file possible file may still contain sensitive information cases inexperienced users use ineffective methods fail sanitize document metadata removal tools designed effectively sanitize documents removing potentially sensitive information may 2005 us military published report death nicola calipari italian secret agent us military checkpoint iraq published version report pdf format incorrectly redacted using commercial software tools shortly thereafter readers discovered blocked-out portions could retrieved copying pasting word processor similarly may 24 2006 lawyers communications service provider filed legal brief regarding cooperation domestic wiretapping nsa text pages 12 14 pdf document incorrectly redacted covered text could retrieved using cut paste end 2005 nsa released report giving recommendations safely sanitize microsoft word document issues make difficult reliably implement multilevel security systems computer users differing security clearances may share documents challenge multilevel security gives example sanitization failure caused unexpected behavior microsoft word change tracking feature two common mistakes incorrectly redacting document adding image layer sensitive text without removing underlying text setting background color match text color cases redacted material still exists document underneath visible appearance subject searching even simple copy paste extraction proper redaction tools procedures must used permanently remove sensitive information often accomplished multi-user workflow one group people mark sections document proposals redacted another group verifies redaction proposals correct final group operates redaction tool permanently remove proposed items
Computer security
firetide firetide american international provider wireless mesh network technology based silicon valley firetide designs sells hardware software wireless networks firetide products used 2000 installations 40 countries firetide provider hardware software wireless infrastructure mesh networks firetide founded 2001 name landmark networks 2003 name changed firetide would better reflect company mission culture one year later considerable investments american investors company moved hawaii los gatos ca firetide inc. currently headquartered campbell ca ca r office bangalore india hotport 7000 series indoor outdoor wireless mesh node equipped dual 802.11n mimo radios radios able operate 2.4 4.9 5.0 ghz allows throughput 400 mbit/s fwb-200 series indoor outdoor wireless point-to-point bridges equipped dual 802.11n mimo radios point-to-point bridges used connect distant wireless networks hotpoint 5000 series indoor outdoor wireless access points equipped dual 802.11n mimo radios access points allow wireless wi-fi network connected mesh software development stopped 2015 hotclient 2000 series indoor outdoor wireless customer premises equipment product extends range wi-fi network thanks powerful radio compared standard consumer laptop radios firetide fwc 2050 wlan controller product control 50 access points ease configuration access points central management controlled web-interface firetide ivs 100 integrated video solution combined ip-camera mesh node hotview pro software centrally manages mesh nodes firetide hardware connected mesh network firetide mobility controller software enables firetide mesh compatible mobile units connecting moving subway train firetide use proprietary automesh routing protocol control data flow mesh 2006 firetide announced going supply technology singapore wireless sg project project goal install nationwide network enable public wi-fi well video voice traffic 2007 firetide installed technology construction site burj khalifa burj dubai construction workers experienced problems communication equipment tower grew taller firetide could provide wireless mesh network voip radios could use allowed coverage walkie-talkies could 2009 firetide got assignment install wireless mesh network seoul metropolitan subway request south korean subway operator live camera coverage came fatal arson 2003 compared competitors firetide one could deliver reliable wireless connection station moving trains systems included cameras train stations trains design aimed avoid fatal accidents distributing real-time video feed train drivers operators command central installation included 1000 mesh nodes well 650 cameras january 2009 firetide installed system california state university long beach may 2010 firetide announced original equipment manufacturer oem agreement netgear license agreement enabled netgear use firetide wlan controller software new portfolio wlan controllers firetide inc. announced acquired unicom systems inc. division unicom global may 19 2014 details acquisition disclosed
Distributed computing architecture
tera computer company tera computer company manufacturer high-performance computing software hardware founded 1987 washington d.c. moved 1988 seattle washington james rottsolk burton smith company first supercomputer product named mta featured interleaved multi-threading i.e barrel processor also data cache relying instead switching threads latency tolerance used deeply pipelined memory system handle many simultaneous requests address randomization avoid memory hot spots upon acquiring cray research division silicon graphics 2000 company renamed cray inc
Computer architecture
altq altq alternate queueing network scheduler berkeley software distribution altq provides queueing disciplines quality service qos related components required realize resource sharing commonly implemented bsd-based routers altq included base distribution freebsd netbsd dragonfly bsd integrated pf packet filter openbsd later replaced new queueing subsystem deprecated openbsd 5.5 release completely removed 5.6 2014 altq packets assigned queues purpose bandwidth control scheduler defines algorithm used decide packets get delayed dropped sent immediately five schedulers currently supported freebsd implementation altq
Operating systems
systat protocol systat active users simple internet protocol ostensibly useful debugging measurement connection port 11 either tcp udp elicits list users currently logged system though remains official internet protocol use considered security vulnerability
Internet protocols
imuse imuse interactive music streaming engine interactive music system used number lucasarts video games idea behind imuse synchronize music visual action video game audio continuously matches on-screen events transitions one musical theme another done seamlessly imuse developed early 1990s composers michael land peter mcconnell working lucasarts imuse system patented lucasarts added fifth version scumm game engine 1991. imuse developed michael land frustration audio system used lucasarts composing secret monkey island goal create system would enable composer set mood via music according events game project much daring imagined brought old friend peter mcconnell collaborate creating system later patented together imuse also found useful account differences processing speed personal computers time direct means synchronizing sound gameplay rendering account imuse system acts pit orchestra according mcconnell playing back shorter longer sections music waiting key events occur within game drawing engine first game use imuse system used lucasarts adventure games since also used non-adventure lucasarts titles dos version one often cited example imuse system beginning guybrush finds woodtick small town scabb island whenever guybrush walks building variation woodtick theme plays different instrument guybrush walks music closing flourish leads back basic woodtick theme
Distributed computing architecture