Topic Review
Shibboleth
Shibboleth is a single sign-on log-in system for computer networks and the Internet. It allows people to sign in using just one identity to various systems run by federations of different organizations or institutions. The federations are often universities or public service organizations. The Shibboleth Internet2 middleware initiative created an architecture and open-source implementation for identity management and federated identity-based authentication and authorization (or access control) infrastructure based on Security Assertion Markup Language (SAML). Federated identity allows the sharing of information about users from one security domain to the other organizations in a federation. This allows for cross-domain single sign-on and removes the need for content providers to maintain user names and passwords. Identity providers (IdPs) supply user information, while service providers (SPs) consume this information and give access to secure content.
  • 500
  • 28 Nov 2022
Topic Review
Shellshock (Software Bug)
Shellshock, also known as Bashdoor, is a family of security bugs in the Unix Bash shell, the first of which was disclosed on 24 September 2014. Shellshock could enable an attacker to cause Bash to execute arbitrary commands and gain unauthorized access to many Internet-facing services, such as web servers, that use Bash to process requests. On 12 September 2014, Stéphane Chazelas informed Bash's maintainer Chet Ramey of his discovery of the original bug, which he called "Bashdoor". Working with security experts, Mr. Chazelas developed a patch (fix) for the issue, which by then had been assigned the vulnerability identifier CVE-2014-6271. The existence of the bug was announced to the public on 2014-09-24, when Bash updates with the fix were ready for distribution. The bug Chazelas discovered caused Bash to unintentionally execute commands when the commands are concatenated to the end of function definitions stored in the values of environment variables. Within days of its publication, a variety of related vulnerabilities were discovered (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186 and CVE-2014-7187). Ramey addressed these with a series of further patches. Attackers exploited Shellshock within hours of the initial disclosure by creating botnets of compromised computers to perform distributed denial-of-service attacks and vulnerability scanning. Security companies recorded millions of attacks and probes related to the bug in the days following the disclosure. Because of the potential to compromise millions of unpatched systems, Shellshock was compared to the Heartbleed bug in its severity.
  • 928
  • 18 Nov 2022
Topic Review
Shear Energy on Harvesting Tools
Smart and precise agriculture has increasingly been developed in the last decade, and with that, the idea of optimizing the tools commonly used in this field for harvesting tasks. One way to improve these devices, particularly cutting tools conceived for harvesting purposes, is to measure the shear energy consumption required for a particular plant. The proposed methodology aims to establish both a design criterion for cutting grippers and a quantifiable way to evaluate and classify a harvesting tool for a specific crop.
  • 658
  • 29 Apr 2021
Topic Review
Shaped-Charge Learning Architecture for the Human–Machine Teams
In spite of great progress in recent years, deep learning (DNN) and transformers have strong limitations for supporting human–machine teams due to a lack of explainability, information on what exactly was generalized, and machinery to be integrated with various reasoning techniques, and weak defense against possible adversarial attacks of opponent team members.
  • 236
  • 30 Jun 2023
Topic Review
Shape-Informed Dimensional Reduction in Airfoil/Hydrofoil Modeling Approachs
Parametric models have been widely used in pertinent literature for reconstructing, modifying and representing a wide range of airfoil and/or hydrofoil profile geometries. Design spaces corresponding to these models can be exploited for modeling and profile-shape optimization under various performance criteria. Accuracy requirements, along with the need for modeling local features, often lead to high-dimensional design spaces that hinder the process of shape optimization and design through analysis.
  • 171
  • 28 Sep 2023
Topic Review
Shadow of the Beast
Shadow of the Beast is a platform game developed by Reflections and published by Psygnosis in 1989. The original version was released for the Amiga, and was later ported to many other systems. The game was known for its graphics, with many colours on screen and up to twelve levels of parallax scrolling backdrops, and for its atmospheric score composed by David Whittaker that used high-quality instrument samples. It was followed by two sequels, Shadow of the Beast II in 1990 and Shadow of the Beast III in 1993. A remake was released for the PlayStation 4 in May 2016, and included the Amiga original.
  • 555
  • 14 Oct 2022
Topic Review
SGI Octane
Octane series of IRIX workstations was developed and sold by SGI in the 2000s. Octane and Octane2 are two-way multiprocessing-capable workstations, originally based on the MIPS Technologies R10000 microprocessor. Newer Octanes are based on the R12000 and R14000. The Octane2 has four improvements: a revised power supply, system board, and Xbow ASIC. The Octane2 has VPro graphics and supports all the VPro cards. Later revisions of the Octane include some of the improvements introduced in the Octane2. The codenames for the Octane and Octane2 are "Racer" and "Speedracer" respectively. The Octane is the direct successor to the Indigo2, and was succeeded by the Tezro, and its immediate sibling is the O2. SGI withdrew the Octane2 from the price book on May 26, 2004, and ceased Octane2 production on June 25, 2004. Support for the Octane2 ceased in June 2009. Octane III was introduced in early 2010 after SGI's bankruptcy reorganization. It is a series of Intel based deskside systems, as a Xeon-based workstation with 1 or 2 3U EATX trays, or as cluster servers with 10 system trays configured with up to 10 Twin Blade nodes or 20 Intel ATOM MINI-ITX nodes.
  • 369
  • 01 Nov 2022
Topic Review
Severity Identification of Parkinson’s Disease
Disease severity identification using computational intelligence-based approaches is gaining popularity nowadays. Movement disorders caused by PD may not remain the same in different patients. Thus, it is essential to develop an automated tool to evaluate a patient’s gait.
  • 260
  • 14 Apr 2023
Topic Review
Several Complex Variables
The theory of functions of several complex variables is the branch of mathematics dealing with complex-valued functions f(z1, z2, ... zn) on the space Cn of n-tuples of complex numbers. As in complex analysis, which is the case n = 1 but of a distinct character, these are not just any functions: they are supposed to be holomorphic or complex analytic, so that locally speaking they are power series in the variables zi. Equivalently, as it turns out, they are locally uniform limits of polynomials; or local solutions to the n-dimensional Cauchy–Riemann equations.
  • 414
  • 27 Oct 2022
Topic Review
Setspn
Kerberos (/ˈkɜːrbərɒs/) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Its designers aimed it primarily at a client–server model, and it provides mutual authentication—both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks. Kerberos builds on symmetric-key cryptography and requires a trusted third party, and optionally may use public-key cryptography during certain phases of authentication. Kerberos uses UDP port 88 by default. The protocol was named after the character Kerberos (or Cerberus) from Greek mythology, the ferocious three-headed guard dog of Hades.
  • 857
  • 25 Oct 2022
  • Page
  • of
  • 371
Video Production Service