Topic Review
Macintosh Toolbox
The Macintosh Toolbox implements many of the high-level features of the Classic Mac OS, including a set of application programming interfaces for software development on the platform. The Toolbox consists of a number of "managers," software components such as QuickDraw, responsible for drawing onscreen graphics, and the Menu Manager, which maintain data structures describing the menu bar. As the original Macintosh was designed without virtual memory or memory protection, it was important to classify code according to when it should be loaded into memory or kept on disk, and how it should be accessed. The Toolbox consists of subroutines essential enough to be permanently kept in memory and accessible by a two-byte machine instruction; however it excludes core "kernel" functionality such as memory management and the file system. Note that the Toolbox does not draw the menu onscreen: menus were designed to have a customizable appearance, so the drawing code was stored in a resource, which could be on a disk.
  • 391
  • 14 Nov 2022
Topic Review
Monoculture (Computer Science)
In computer science, a monoculture is a community of computers that all run identical software. All the computer systems in the community thus have the same vulnerabilities, and, like agricultural monocultures, are subject to catastrophic failure in the event of a successful attack.
  • 390
  • 25 Nov 2022
Topic Review
Virtual and Physical Robot Arms Using Augmented Reality
The use of robot arms in various industrial settings has changed the way tasks are completed. However, safety concerns for both humans and robots in these collaborative environments remain a critical challenge. Traditional approaches to visualising safety zones, including physical barriers and warning signs, may not always be effective in dynamic environments or where multiple robots and humans are working simultaneously. Mixed reality technologies offer dynamic and intuitive visualisations of safety zones in real time, with the potential to overcome these limitations.
  • 389
  • 31 Oct 2023
Topic Review
Advanced Persistent Threats Detection for Mobile Devices
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-organized and skilled adversary to remain undetected while systematically and continuously exfiltrating sensitive data. Various APT attack vectors exist, including social engineering techniques such as spear phishing, watering holes, SQL injection, and application repackaging. Various sensors and services are essential for a smartphone to assist in user behavior that involves sensitive information. Resultantly, smartphones have become the main target of APT attacks.
  • 389
  • 12 Oct 2023
Topic Review
BMDFM
Binary Modular Dataflow Machine (BMDFM) is software that enables running an application in parallel on shared memory symmetric multiprocessing (SMP) computers using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static and mainly dynamic scheduling of the dataflow instruction sequences derived from the formerly sequential program. BMDFM dynamic scheduling subsystem performs a symmetric multiprocessing (SMP) emulation of a tagged-token dataflow machine to provide the transparent dataflow semantics for the applications. No directives for parallel execution are needed.
  • 388
  • 02 Dec 2022
Topic Review
GLIMMER
In bioinformatics, GLIMMER (Gene Locator and Interpolated Markov ModelER) is used to find genes in prokaryotic DNA. "It is effective at finding genes in bacteria, archea, viruses, typically finding 98-99% of all relatively long protein coding genes". GLIMMER was the first system that used the interpolated Markov model to identify coding regions. The GLIMMER software is open source and is maintained by Steven Salzberg, Art Delcher, and their colleagues at the Center for Computational Biology at Johns Hopkins University. The original GLIMMER algorithms and software were designed by Art Delcher, Simon Kasif and Steven Salzberg and applied to bacterial genome annotation in collaboration with Owen White.
  • 386
  • 11 Nov 2022
Topic Review
Multi-Environment Real-Time
Multi-Environment Real-Time (MERT), later renamed UNIX Real-Time (UNIX-RT), is a hybrid time-sharing and real-time operating system developed in the 1970s at Bell Labs for use in embedded minicomputers (especially PDP-11s). A version named Duplex Multi Environment Real Time (DMERT) was the operating system for the AT&T 3B20D telephone switching minicomputer, designed for high availability; DMERT was later renamed Unix RTR (Real-Time Reliable). A generalization of Bell Labs' time-sharing operating system Unix, MERT featured a redesigned, modular kernel that was able to run Unix programs and privileged real-time computing processes. These processes' data structures were isolated from other processes with message passing being the preferred form of interprocess communication (IPC), although shared memory was also implemented. MERT also had a custom file system with special support for large, contiguous, statically sized files, as used in real-time database applications. The design of MERT was influenced by Dijkstra's THE, Hansen's Monitor, and IBM's CP-67. The MERT operating system was a four-layer design, in decreasing order of protection: The standard supervisor was MERT/UNIX, a Unix emulator with an extended system call interface and shell that enabled the use of MERT's custom IPC mechanisms, although an RSX-11 emulator also existed.
  • 384
  • 27 Oct 2022
Topic Review
Numerical Partial Differential Equations
Numerical partial differential equations is the branch of numerical analysis that studies the numerical solution of partial differential equations (PDEs).
  • 384
  • 25 Nov 2022
Topic Review
Congruence (General Relativity)
In general relativity, a congruence (more properly, a congruence of curves) is the set of integral curves of a (nowhere vanishing) vector field in a four-dimensional Lorentzian manifold which is interpreted physically as a model of spacetime. Often this manifold will be taken to be an exact or approximate solution to the Einstein field equation.
  • 382
  • 04 Nov 2022
Topic Review
Predictive Modeling of Student Dropout in MOOCs
The features of massive open online courses (MOOCs), such as internet-based massiveness, openness, and flexible learning, create a unique blend of a large number of learners, making the prediction of learner success (as well as providing support based on these predictions) particularly challenging. 
  • 382
  • 20 Oct 2023
Topic Review
Efficient Fingerprinting Attack on Web Applications
Website fingerprinting is valuable for many security solutions as it provides insights into applications that are active on the network.
  • 380
  • 25 Jul 2023
Topic Review
News Server Operation
Among the operators and users of commercial Usenet news servers, common concerns are the continually increasing storage and network capacity requirements and their effects. Completion (the ability of a server to successfully receive all traffic), retention (the amount of time articles are made available to readers) and overall system performance are the topics of frequent discussion. With the increasing demands, it is common for the transit and reader server roles to be subdivided further into numbering, storage and front end systems. These server farms are continually monitored by both insiders and outsiders, and measurements of these characteristics are often used by consumers when choosing a commercial news service.
  • 379
  • 12 Oct 2022
Topic Review
AutoPatcher
AutoPatcher is an offline updater and alternative to Microsoft Update that can be used for installing software patches, service packs and other updates for certain Microsoft Windows systems. It allows these to be downloaded on a different machine or in advance, and then installed without an internet connection. By doing this, system updates can be automated and scripted, time and bandwidth required to download relevant updates is reduced, and exposure of unsecured systems online can be avoided. AutoPatcher also allows installation of some common additional software, registry settings, and patches for other Microsoft software, notably Microsoft Office. AutoPatcher currently exists for Windows 2000, XP, Vista, 7, 8, 10 and some server equivalents (Windows 2003 and 2008). For some years it did not provide support for Windows 7 or older systems, nor for some 64 bit operating systems; updates are now possible for some of these in the 2014 version of Autopatcher. Originally software patches were distributed with AutoPatcher but, following legal complaints the software was modified in 2007. It now downloads all patches to a local hard drive from Microsoft's servers (ensuring the files are original and unmodified) and then allows their offline use as before.
  • 378
  • 12 Oct 2022
Topic Review
Meiko Scientific
Meiko Scientific Ltd. was a British supercomputer company based in Bristol, founded by members of the design team working on the Inmos transputer microprocessor.
  • 377
  • 11 Oct 2022
Topic Review
Microsoft DoubleSpace FAT
DriveSpace (initially known as DoubleSpace) is a disk compression utility supplied with MS-DOS starting from version 6.0 in 1993 and ending in 2000 with the release of Windows Me. The purpose of DriveSpace is to increase the amount of data the user could store on disks by transparently compressing and decompressing data on-the-fly. It is primarily intended for use with hard drives, but use for floppy disks is also supported. This feature was removed in Windows XP and later.
  • 377
  • 16 Nov 2022
Topic Review
Spacetime Symmetries
Spacetime symmetries are features of spacetime that can be described as exhibiting some form of symmetry. The role of symmetry in physics is important in simplifying solutions to many problems. Spacetime symmetries are used in the study of exact solutions of Einstein's field equations of general relativity. Spacetime symmetries are distinguished from internal symmetries.
  • 377
  • 28 Nov 2022
Topic Review
Health Service Executive Cyberattack
On 14 May 2021, the Health Service Executive (HSE) of the Republic of Ireland suffered a major ransomware cyberattack that caused all of its IT systems nationwide to be shut down. It was the most significant cybercrime attack on an Irish state agency. Bloomberg News reported that the attackers used the Conti ransomware. The group responsible was identified as a criminal gang known as Wizard Spider, believed to be operating from Russia. The same group is believed to have attacked the Department of Health with a similar cyberattack. On 19 May, the Financial Times reviewed private data for twelve individuals which had appeared online as a result of the breach, with admission records and test results present in one case.
  • 375
  • 27 Oct 2022
Topic Review
FUJITSU Cloud IaaS Trusted Public S5
FUJITSU Cloud IaaS Trusted Public S5 is a Fujitsu cloud computing platform that aims to deliver standardized enterprise-class public cloud services globally. It offers Infrastructure-as-a-Service (IaaS) from Fujitsu's data centres to provide computing resources that can be employed on-demand and suited to customers' needs. The service ensures a high level of reliability that is sufficient for deployment in mission-critical systems. In Japan, the service was offered as the On-Demand Virtual System Service (OViSS) and was then launched globally as Fujitsu Global Cloud Platform/S5 (FGCP/S5). Since July 2013 the service has been called IaaS Trusted Public S5. Globally, the service is operated from Fujitsu data centers located in Australia , Singapore, the United States , the United Kingdom and Germany . Fujitsu has also launched a Windows Azure powered Global Cloud Platform in a partnership with Microsoft. This is a Platform-as-a-Service (PaaS) offering that was known as FGCP/A5 in Japan but has since been renamed FUJITSU Cloud PaaS A5 for Windows Azure. It is operated from a Fujitsu data center in Japan. It offers a set of application development frameworks, such as Microsoft .NET, Java and PHP, and data storage capabilities consistent with the Windows Azure platform provided by Microsoft. The basic service consists of compute, storage, Microsoft SQL Azure, and Windows Azure AppFabric technologies such as Service Bus and Access Control Service, with options for interoperating services covering implementation and migration of applications, system building, systems operation, and support. In 2015, Fujitsu launched its next generation Cloud Service K5 and was deployed globally. In October 2018, Fujitsu announced that it was discontinuing K5 in all regions except Japan. On October 16, 2018 the company stated that it will hire 10,000 employees and train them to use Microsoft Azure in order to "address what we see as an industry-wide shortage in cloud related skills, so that we can help clients address their execution gap in the provision of services which support operational efficiency, digital co-creation and multi-cloud management.”
  • 375
  • 04 Nov 2022
Topic Review
Furstenberg–Sárközy Theorem
The Furstenberg–Sárközy theorem is a result in additive number theory on sets of numbers no two of which differ by a square. It states that, if [math]\displaystyle{ S }[/math] is a set of natural numbers with the property that no two numbers in [math]\displaystyle{ S }[/math] differ by a square number, then the natural density of [math]\displaystyle{ S }[/math] is zero. That is, for every [math]\displaystyle{ \varepsilon \gt 0 }[/math], and for all sufficiently large [math]\displaystyle{ n }[/math], the fraction of the numbers up to [math]\displaystyle{ n }[/math] that are in [math]\displaystyle{ S }[/math] is less than [math]\displaystyle{ \varepsilon }[/math]. Equivalently, every set of natural numbers with positive upper density contains two numbers whose difference is a square (and more strongly infinitely many such pairs). The theorem is named after Hillel Furstenberg and András Sárközy, who proved it in the late 1970s.
  • 373
  • 10 Nov 2022
Topic Review
Network Computer
The Network Computer (or NC) was a diskless desktop computer device made by Oracle Corporation from about 1996 to 2000. The devices were designed and manufactured by an alliance, which included Sun Microsystems, IBM, and others. The devices were designed with minimum specifications, based on the Network Computer Reference Profile. The brand was also employed as a marketing term to try to popularize this design of computer within enterprise and among consumers. The NC brand was mainly intended to inspire a range of desktop computers from various suppliers that, by virtue of their diskless design and use of inexpensive components and software, were cheaper and easier to manage than standard fat client desktops. However, due to the commoditization of standard desktop components, and due to the increasing availability and popularity of various software options for using full desktops as diskless nodes, thin clients, and hybrid clients, the Network Computer brand never achieved the popularity hoped for by Oracle and was eventually mothballed. The term "network computer" is now used for any diskless desktop computer or a thin client.
  • 372
  • 11 Oct 2022
  • Page
  • of
  • 47
ScholarVision Creations