You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Topic Review
Atari Assembler Editor
Atari Assembler Editor (sometimes written as Atari Assembler/Editor) is a ROM cartridge-based development system released by Atari, Inc. in 1981. It is used to edit, assemble, and debug 6502 programs for the Atari 8-bit family of home computers. It was programmed by Kathleen O'Brien of Shepardson Microsystems, the company which wrote Atari BASIC, and Assembler Editor shares many design concepts with that language. Assembly times are slow, making the cartridge challenging to use for larger programs. In the manual, Atari recommended the Assembler Editor as a tool for writing subroutines to speed up Atari BASIC, which would be much smaller than full applications. The Atari Macro Assembler was offered as an alternative with better performance and more features, such as macros, but it was disk-based, copy-protected, and did not include an editor or debugger. Despite the recommendation, commercial software was written using the Assembler Editor, such as the games Eastern Front (1941), Caverns of Mars, Galahad and the Holy Grail, and Kid Grid. The source code to the original Assembler Editor was licensed to Optimized Systems Software who shipped EASMD based on it.
  • 756
  • 21 Nov 2022
Topic Review
Power Soccer (Browser-based Game)
Power Soccer, also known as Power Challenge and PS, was a massively multiplayer online browser-based sports game, developed by the Swedish developer Power Challenge, the same company that develops ManagerZone (but PS focuses in the sports gameplay instead of management simulation). This game was a browser-based soccer simulator in which users could create a team and play against other users from all around the globe. Additional benefits were offered to those that purchased the Club Membership. Following a decline in interest from users in the game, it was announced that on May 16, 2016 Power Soccer would come to an end, encouraging users to join their sister game ManagerZone. The announcement was made months before the closure date, which led to many posts in the forums where some users even wanted to donate to keep the game afloat but to no avail, and in the early hours of May 16, 2016, the game closed.
  • 754
  • 27 Sep 2022
Topic Review
SHIFT (DOS Command)
This research presents a list of commands used by DOS operating systems, especially as used on x86-based IBM PC compatibles (PCs). Other DOS operating systems are not part of the scope of this list. In DOS, many standard system commands were provided for common tasks such as listing files on a disk or moving files. Some commands were built into the command interpreter, others existed as external commands on disk. Over the several generations of DOS, commands were added for the additional functions of the operating system. In the current Microsoft Windows operating system, a text-mode command prompt window, cmd.exe, can still be used.
  • 753
  • 19 Oct 2022
Topic Review
BitFAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 753
  • 01 Dec 2022
Topic Review
Bunyakovsky Conjecture
The Bunyakovsky conjecture (or Bouniakowsky conjecture) gives a criterion for a polynomial [math]\displaystyle{ f(x) }[/math] in one variable with integer coefficients to give infinitely many prime values in the sequence[math]\displaystyle{ f(1), f(2), f(3),\ldots. }[/math] It was stated in 1857 by the Russian mathematician Viktor Bunyakovsky. The following three conditions are necessary for [math]\displaystyle{ f(x) }[/math] to have the desired prime-producing property: Bunyakovsky's conjecture is that these conditions are sufficient: if [math]\displaystyle{ f(x) }[/math] satisfies (1)-(3), then [math]\displaystyle{ f(n) }[/math] is prime for infinitely many positive integers [math]\displaystyle{ n }[/math].
  • 752
  • 31 Oct 2022
Topic Review
Blockchain Technology Used for Smart Drone Swarms
Intelligent drone technology is rapidly expanding, particularly in the defense industry. A swarm of drones can communicate, share data, and make the best decisions on their own. Drone swarms can swiftly and effectively carry out missions like surveillance, reconnaissance, and rescue operations, without exposing military troops to hostile conditions. The concept of leveraging blockchain technology to address problems with identification, security, and storage in UAV clusters is not new. There have been many approaches that have used novel methods to examine how we can use the benefits of blockchain technology to lessen these issues.
  • 749
  • 14 Nov 2023
Topic Review
Chinese Cyberwarfare
China is both the world's second-largest economy and a nuclear weapons state with the world's second-largest defense budget. Chinese Information Operations and Information Warfare includes the concept of “network warfare”, which is roughly analogous to the United States concept of cyber-warfare. Foreign Policy magazine provided an estimated range for China's "hacker army" personnel, anywhere from 50,000 to 100,000 individuals. Western countries have long accused China of aggressive espionage, and while investigations have traced various attacks on corporate and infrastructure computer systems to have originated in China , "it is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace." China has denied these accusations of cyber-warfare and has, in turn, accused the United States of engaging in cyber-warfare against China - a claim the US government denies.
  • 747
  • 11 Oct 2022
Topic Review
NcRNAs in Human Diseases
The mammalian genome comprehends a small minority of genes that encode for proteins (barely 2% of the total genome in humans) and an immense majority of genes that are transcribed into RNA but not encoded for proteins (ncRNAs). These non-coding genes are intimately related to the expression regulation of protein-coding genes. The ncRNAs subtypes differ in their size, so there are long non-coding genes (lncRNAs) and other smaller ones, like microRNAs (miRNAs) and piwi-interacting RNAs (piRNAs). Due to their important role in the maintenance of cellular functioning, any deregulation of the expression profiles of these ncRNAs can dissemble in the development of different types of diseases, such as cancer, neurodegenerative, or cardiovascular disorders.
  • 744
  • 16 Mar 2021
Topic Review
Scientific Workflow System
A scientific workflow system is a specialized form of a workflow management system designed specifically to compose and execute a series of computational or data manipulation steps, or workflow, in a scientific application.
  • 739
  • 24 Oct 2022
Topic Review
July 2009 Cyberattacks
The July 2009 cyberattacks were a series of coordinated cyberattacks against major government, news media, and financial websites in South Korea and the United States . The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec's Security Technology Response group, and more than 166,000 according to a Vietnamese computer security researcher who analyzed the log files of the two servers the attackers controlled. An investigation revealed that at least 39 websites were targets in the attacks based on files stored on compromised systems. The targeting and timing of the attacks—which started the same day as a North Korean short-range ballistic missile test—have led to suggestions that they may be from North Korea, although these suggestions have not been substantiated. Researchers would later find links between these cyberattacks, the DarkSeoul attacks in 2013, and other attacks attributed to the Lazarus Group. This attack is considered by some to be the beginning of a series of DDoS attacks carried about by Lazarus dubbed "Operation Troy."
  • 738
  • 11 Nov 2022
Topic Review
How Not to Be Wrong
How Not to Be Wrong: The Power of Mathematical Thinking, written by Jordan Ellenberg, is a New York Times Best Selling book that connects various economic and societal philosophies with basic mathematics and statistical principles.
  • 737
  • 09 Nov 2022
Topic Review
Service Virtualisation
Continuous delivery is an industry software development approach that aims to reduce the delivery time of software and increase the quality assurance within a short development cycle. The fast delivery and improved quality require continuous testing of the developed software service. Testing services are complicated and costly and postponed to the end of development due to unavailability of the requisite services. Therefore, an empirical approach that has been utilised to overcome these challenges is to automate software testing by virtualising the requisite services’ behaviour for the system being tested. Service virtualisation involves analysing the behaviour of software services to uncover their external behaviour in order to generate a light-weight executable model of the requisite services. There are different research areas which can be used to create such a virtual model of services from network interactions or service execution logs, including message format extraction, inferring control model, data model and multi-service dependencies.
  • 734
  • 07 Apr 2021
Topic Review
Heuristic (Computer Science)
In mathematical optimization and computer science, heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for solving a problem more quickly when classic methods are too slow, or for finding an approximate solution when classic methods fail to find any exact solution. This is achieved by trading optimality, completeness, accuracy, or precision for speed. In a way, it can be considered a shortcut. A heuristic function, also simply called a heuristic, is a function that ranks alternatives in search algorithms at each branching step based on available information to decide which branch to follow. For example, it may approximate the exact solution.
  • 733
  • 14 Oct 2022
Topic Review
Loco2
Loco2, now rebranded as Rail Europe, is an online booking service for train travel in the United Kingdom and Europe. It sells tickets through its website and via its smartphone app which is available on iOS and Android platforms. It was founded in 2006 by brother and sister Jamie and Kate Andrews, and started trading in 2012 from its headquarters in London. Loco2 website and apps were rebranded Rail Europe in November 2019.
  • 733
  • 19 Oct 2022
Topic Review
Satisfaction Equilibrium
In game theory, a satisfaction equilibrium is a solution concept for a class of non-cooperative games, namely games in satisfaction form. Games in satisfaction form model situations in which players aim at satisfying a given individual constraint, e.g., a performance metric must be smaller or bigger than a given threshold. When a player satisfies its own constraint, the player is said to be satisfied. A satisfaction equilibrium, if it exists, arises when all players in the game are satisfied.
  • 729
  • 07 Nov 2022
Topic Review
Stoned (Computer Virus)
Stoned is a boot sector computer virus created in 1987. It is one of the first viruses and is thought to have been written by a student in Wellington, New Zealand. By 1989 it had spread widely in New Zealand and Australia, and variants became very common worldwide in the early 1990s. A computer infected with the original version had a one in eight probability that the screen would declare: "Your PC is now Stoned!", a phrase found in infected boot sectors of infected floppy disks and master boot records of infected hard disks, along with the phrase "Legalise Marijuana". Later variants produced a range of other messages.
  • 727
  • 03 Nov 2022
Topic Review
Glossary of Graph Theory Terms
This is a glossary of graph theory terms. Graph theory is the study of graphs, systems of nodes or vertices connected in pairs by edges.
  • 727
  • 16 Nov 2022
Topic Review
MediaMax CD-3
MediaMax CD-3 is a software package created by SunnComm which was sold as a form of copy protection for compact discs. It was used by the record label RCA Records/BMG, and targets both Microsoft Windows and Mac OS X. Elected officials and computer security experts regard the software as a form of malware since its purpose is to intercept and inhibit normal computer operation without the user's authorization. MediaMax received media attention in late 2005 in fallout from the Sony XCP copy protection scandal. MediaMax is a second-generation system meant to address the problems of earlier copy-preventing schemes, where many types of playback devices had difficulty reading discs in normal use. MediaMax was first used on Anthony Hamilton's Comin' From Where I'm From in the United States ; the first US No. 1 CD to use it was Velvet Revolver's Contraband. (The European release of the Velvet Revolver album used Macrovision CDS-200 and the Japan ese is without copy protection.)
  • 726
  • 20 Oct 2022
Topic Review
Security of Transport Layer Security
This article discusses the security of the Transport Layer Security (TLS) internet protocol.
  • 722
  • 17 Oct 2022
Topic Review
MediaWiki Extension
MediaWiki extensions allow MediaWiki to be made more advanced and useful for various purposes. These extensions vary greatly in complexity. The Wikimedia Foundation operates a Git server where many extensions are hosted, and a directory of them can be found on the MediaWiki website. Some other sites also are known for development of—or support for—extensions are MediaWiki.org, which maintains an extension matrix; and Google Code. MediaWiki code review is itself facilitated through a Gerrit instance. Since version 1.16 MediaWiki also used the jQuery library.
  • 719
  • 09 Nov 2022
  • Page
  • of
  • 47
Academic Video Service