title
stringlengths
1
105
content
stringlengths
5
58.1k
Daylight saving time
permanent daylight saving time move permanent daylight saving time staying summer hours year time shifts sometimes advocated currently implemented jurisdictions argentina belarus iceland kyrgyzstan morocco namibia saskatchewan singapore turkey turkmenistan uzbekistan yukon.although saskatchewan follows central standard time capital city regina experiences solar noon close effect permanent daylight time.similarly yukon cited mst though really yearround pdt align pacific zone summer.fact local solar noon capital whitehorse occurs near result doubledaylight time.advocates cite advantages normal dst without problems associated twice yearly time shifts.however many remain unconvinced benefits citing problems relatively late sunrises particularly winter yearround dst entails.russia switched permanent dst move proved unpopular late sunrises winter russia switched permanently back standard time partially.
Daylight saving time
united kingdom ireland also experimented yearround summer time put clocks forward extra hour world war ii.in united states florida washington california oregon legislatures passed bills enact permanent dst bills require congressional approval order take effect.maine massachusetts new hampshire rhode island also introduced proposals commissions effect.although states considered making dst permanent unless congress changes federal law states cannot implement permanent dst—states opt dst standard time.in september european commission proposed end seasonal clock changes .member states would option observing either daylight saving time year round standard time year round.march european parliament approved commissions proposal deferring implementation .
Daylight saving time
october decision confirmed council european union.council asked commission produce detailed impact assessment commission considers onus member states find common position council.result progress issue effectively blocked.experts circadian rhythms sleep caution permanent daylight saving time recommending yearround standard time preferred option public health safety.the experts include various chronobiology societies also published position papers adopting dst permanently.society research biological rhythmslocal national governments around world currently considering elimination annual switch daylight saving time dst.international organization scientists dedicated studying circadian biological rhythms society research biological rhythms srbr engaged experts field write position paper consequences choosing live dst standard time st. authors take position based comparisons large populations living dst st western versus eastern edges time zones advantages permanent st outweigh switching dst annually permanently.
Daylight saving time
four peer reviewers provided expert critiques initial submission srbr executive board approved revised manuscript position paper help educate public evaluation current legislative actions end dst.the world federation societies chronobiology stated scientific literature strongly argues switching dst standard time even adopting dst permanently.american academy sleep medicine position seasonal time changes abolished favor fixed national yearround standard time.eu european sleep research society stated scientific evidence presently available indicates installing permanent central european time cet standard time ‘wintertime’ best option public health.perceived problems permanent dst dst sun rises sets one hour later clock add additional daylight.thus already later sunrise times winter standard time move another hour later dst.
Daylight saving time
depending latitude longitude calendar date forces workers schoolchildren begin winter day darkness.enactment emergency daylight saving time act united states complaints children going school dark working people commuting starting work day pitch darkness winter months.complaints led repeal act october standard time restored february .united states returned schedule set uniform time act .yearround daylight time united kingdom abandoned threeyear experiment complaints winter sunrise times.
Memory hierarchy
complaints also led russia abandoning dst instituting standard time year round .country region daylight saving time africadaylight saving time asiasummer time europedaylight saving time americasdaylight saving time oceania see also winter time clock lag references sources reading external links daylight saving time congressional research serviceinformation current daylight saving time dst rules u.s. national institute standards technologylegal time telecommunications standardization bureau itusources time zone daylight saving time datasince response time complexity capacity related levels may also distinguished performance controlling technologies.memory hierarchy affects performance computer architectural design algorithm predictions lower level programming constructs involving locality reference.designing high performance requires considering restrictions memory hierarchy i.e.size capabilities component.various components viewed part hierarchy memories ... mn member mi typically smaller faster next highest member mi hierarchy.
Memory hierarchy
limit waiting higher levels lower level respond filling buffer signaling activating transfer.there four major storage levels.internal – processor registers cache.main – system ram controller cards.online mass storage – secondary storage.offline bulk storage – tertiary offline storage.this general memory hierarchy structuring.many structures useful.example paging algorithm may considered level virtual memory designing computer architecture one include level nearline storage online offline storage.properties technologies memory hierarchy adding complexity slows memory hierarchy.cmox memory technology stretches flash space memory hierarchyone main ways increase system performance minimising far memory hierarchy one go manipulate data.latency bandwidth two metrics associated caches.neither uniform specific particular component memory hierarchy.predicting memory hierarchy data resides difficult....the location memory hierarchy dictates time required prefetch occur.
Memory hierarchy
examples number levels memory hierarchy performance level increased time.type memory storage components also change historically.example memory hierarchy intel haswell mobile processor circa isprocessor registers – fastest possible access usually cpu cycle.thousand bytes sizecachelevel l micro operations cache – bytes kib sizelevel l instruction cache – kib sizelevel l data cache – kib size.best access speed around gbslevel l instruction data shared – mib size.
Memory hierarchy
best access speed around gbslevel l shared cache – mib size.best access speed around gbslevel l shared cache – mib size.best access speed around gbsmain memory primary storage – gib size.best access speed around gbs.case numa machine access times may uniformdisk storage secondary storage – terabytes size.
Memory hierarchy
best access speed consumer solid state drive mbsnearline storage tertiary storage – exabytes size.best access speed mbsoffline storagethe lower levels hierarchy – disks downwards – also known tiered storage.formal distinction online nearline offline storage isonline storage immediately available io.nearline storage immediately available made online quickly without human intervention.offline storage immediately available requires human intervention bring online.for example alwayson spinning disks online spinning disks spindown massive array idle disk maid nearline.removable media tape cartridges automatically loaded tape library nearline cartridges must manually loaded offline.most modern cpus fast program workloads bottleneck locality reference memory accesses efficiency caching memory transfer different levels hierarchy.result cpu spends much time idling waiting memory io complete.
Memory hierarchy
sometimes called space cost larger memory object likely overflow smallfast level require use largerslower level.resulting load memory use known pressure respectively register pressure cache pressure main memory pressure.terms data missing higher level needing fetched lower level respectively register spilling due register pressure register cache cache miss cache main memory hard page fault main memory disk.modern programming languages mainly assume two levels memory main memory disk storage though assembly language inline assemblers languages c registers directly accessed.taking optimal advantage memory hierarchy requires cooperation programmers hardware compilers well underlying support operating systemprogrammers responsible moving data disk memory file io.hardware responsible moving data memory caches.optimizing compilers responsible generating code executed cause hardware use caches registers efficiently.many programmers assume one level memory.works fine application hits performance wall.
Wireless
memory hierarchy assessed code refactoring.see also cache hierarchyuse spatial temporal locality hierarchical memorybuffer vs. cachecache hierarchy modern processormemory wallcomputer memoryhierarchical storage managementcloud storagememory access patterncommunicationavoiding algorithm referencescommon wireless technologies use radio waves.radio waves intended distances short meters bluetooth far millions kilometers deepspace radio communications.encompasses various types fixed mobile portable applications including twoway radios cellular telephones personal digital assistants pdas wireless networking.examples applications radio wireless technology include gps units garage door openers wireless computer mouse keyboards headsets headphones radio receivers satellite television broadcast television cordless telephones.somewhat less common methods achieving wireless communications include use electromagnetic wireless technologies light magnetic electric fields use sound.the term wireless used twice communications history slightly different meaning.
Wireless
initially used first radio transmitting receiving technology wireless telegraphy new word radio replaced around .radios uk portable continued referred wireless sets s. term revived mainly distinguish digital devices communicate without wires examples listed previous paragraph require wires cables.became primary usage due advent technologies mobile broadband wifi bluetooth.wireless operations permit services mobile interplanetary communications impossible impractical implement use wires.term commonly used telecommunications industry refer telecommunications systems e.g.radio transmitters receivers remote controls etc.
Wireless
use form energy e.g.radio waves acoustic energy transfer information without use wires.information transferred manner short long distances.history photophone first wireless telephone conversation occurred alexander graham bell charles sumner tainter invented photophone telephone sent audio beam light.photophone required sunlight operate clear line sight transmitter receiver.
Wireless
factors greatly decreased viability photophone practical use.would several decades photophones principles found first practical applications military communications later fiberoptic communications.electric wireless technology early wireless number wireless electrical signaling schemes including sending electric currents water ground using electrostatic electromagnetic induction investigated telegraphy late th century practical radio systems became available.included patented induction system thomas edison allowing telegraph running train connect telegraph wires running parallel tracks william preece induction telegraph system sending messages across bodies water several operational proposed telegraphy voice earth conduction systems.the edison system used stranded trains great blizzard earth conductive systems found limited use trenches world war systems never successful economically.radio waves guglielmo marconi began developing wireless telegraph system using radio waves known since proof existence heinrich hertz discounted communication format since seemed time short range phenomenon.
Wireless
marconi soon developed system transmitting signals way beyond distances anyone could predicted due part signals bouncing unknown ionosphere.marconi karl ferdinand braun awarded nobel prize physics contribution form wireless telegraphy.millimetre wave communication first investigated jagadish chandra bose – reached extremely high frequency ghz experiments.also introduced use semiconductor junctions detect radio waves patented radio crystal detector .wireless revolution wireless revolution began advent digital wireless networks leading social revolution paradigm shift wired wireless technology including proliferation commercial wireless technologies cell phones mobile telephony pagers wireless computer networks cellular networks wireless internet laptop handheld computers wireless connections.wireless revolution driven advances radio frequency rf microwave engineering transition analog digital rf technology enabled substantial increase voice traffic along delivery digital data text messaging images streaming media.
Wireless
modes wireless communications via radio radio microwave communication carry information modulating properties electromagnetic waves transmitted space.specifically transmitter generates artificial electromagnetic waves applying timevarying electric currents antenna.waves travel away antenna eventually reach antenna receiver induces electrical current receiving antenna.current detected demodulated recreate information sent transmitter.freespace optical freespace optical communication fso optical communication technology uses light propagating free space transmit wirelessly data telecommunications computer networking.
Wireless
free space means light beams travel open air outer space.contrasts communication technologies use light beams traveling transmission lines optical fiber dielectric light pipes.the technology useful physical connections impractical due high costs considerations.example free space optical links used cities office buildings wired networking cost running cable building street would prohibitive.another widely used example consumer ir devices remote controls irda infrared data association networking used alternative wifi networking allow laptops pdas printers digital cameras exchange data.sonic sonic especially ultrasonic short range communication involves transmission reception sound.
Wireless
electromagnetic induction electromagnetic induction allows shortrange communication power transmission.used biomedical situations pacemakers well shortrange rfid tags.services common examples wireless equipment includeinfrared ultrasonic remote control devicesprofessional lmr land mobile radio smr specialized mobile radio typically used business industrial public safety entities.consumer twoway radio including frs family radio service gmrs general mobile radio service citizens band cb radios.the amateur radio service ham radio.consumer professional marine vhf radios.airband radio navigation equipment used aviators air traffic controlcellular telephones pagers provide connectivity portable mobile applications personal business.global positioning system gps allows drivers cars trucks captains boats ships pilots aircraft ascertain location anywhere earth.cordless computer peripherals cordless mouse common example wireless headphones keyboards printers also linked computer via wireless using technology wireless usb bluetooth.cordless telephone sets limitedrange devices confused cell phones.satellite television broadcast satellites geostationary orbit.typical services use direct broadcast satellite provide multiple television channels viewers.electromagnetic spectrum fm radios electronic devices make use electromagnetic spectrum.
Wireless
frequencies radio spectrum available use communication treated public resource regulated organizations american federal communications commission ofcom united kingdom international itur european etsi.regulations determine frequency ranges used purpose whom.absence control alternative arrangements privatized electromagnetic spectrum chaos might result example airlines specific frequencies work amateur radio operator interfering pilots ability land aircraft.wireless communication spans spectrum khz ghz.applications mobile telephones one bestknown examples wireless technology mobile phone also known cellular phone .
Wireless
billion mobile cellular subscriptions worldwide end .wireless phones use radio waves signaltransmission towers enable users make phone calls many locations worldwide.used within range mobile telephone site used house equipment required transmit receive radio signals instruments.data communications wireless data communications allows wireless networking desktop computers laptops tablet computers cell phones related devices.various available technologies differ local availability coverage range performance circumstances users employ multiple connection types switch using connection manager software mobile vpn handle multiple connections secure single virtual network.
Wireless
supporting technologies includewifi wireless local area network enables portable computing devices connect easily devices peripherals internet.standardized ieee .b g n ac ax wifi link speeds similar older standards wired ethernet.wifi become de facto standard access private homes within offices public hotspots.businesses charge customers monthly fee service others begun offering free effort increase sales goods.cellular data service offers coverage within range miles nearest cell site.
Wireless
speeds increased technologies evolved earlier technologies gsm cdma gprs g g networks wcdma edge cdma.proposed next generation g.lowpower widearea networks lpwan bridge gap wifi cellular low bitrate internet things iot applications.mobilesatellite communications may used wireless connections unavailable largely rural areas remote locations.satellite communications especially important transportation aviation maritime military use.wireless sensor networks responsible sensing noise interference activity data collection networks.allows us detect relevant quantities monitor collect data formulate clear user displays perform decisionmaking functionswireless data communications used span distance beyond capabilities typical cabling pointtopoint communication pointtomultipoint communication provide backup communications link case normal network failure link portable temporary workstations overcome situations normal cabling difficult financially impractical remotely connect mobile users networks.peripherals peripheral devices computing also connected wirelessly part wifi network directly via optical radiofrequency rf peripheral interface.
Wireless
originally units used bulky highly local transceivers mediate computer keyboard mouse however recent generations used smaller higherperformance devices.radiofrequency interfaces bluetooth wireless usb provide greater ranges efficient use usually feet distance physical obstacles competing signals even human bodies degrade signal quality.concerns security wireless keyboards arose end revealed microsofts implementation encryption mhz models highly insecure.energy transfer wireless energy transfer process whereby electrical energy transmitted power source electrical load builtin power source without use interconnecting wires.two different fundamental methods wireless energy transfer.
Wireless
energy transferred using either farfield methods involve beaming powerlasers radio microwave transmissions nearfield using electromagnetic induction.wireless energy transfer may combined wireless information transmission known wireless powered communication.researchers university washington demonstrated farfield energy transfer using wifi signals power cameras.medical technologies new wireless technologies mobile body area networks mban capability monitor blood pressure heart rate oxygen level body temperature.mban works sending low powered wireless signals receivers feed nursing stations monitoring sites.
SyQuest Technology
technology helps intentional unintentional risk infection disconnection arise wired connections.categories implementations devices standards see also references reading external links nets webs information infrastructure wikibookswireless curliebibliography history wireless radio broadcastingsir jagadis chandra bose man almost invented radiocompany founded january syed iftikar founder seagate along ben alaimo bill krajewski anil nigam george toldi.earliest products sqr mb .mm cartridge disk drive associated qpak cartridge ibm xt compatibles.subsequently nonremovable medium version announced sqf.for many years syquest popular means transferring large desktop publisher documents advertisements professional printers.syquest marketed products able give personal computer users endless hard drive space dataintensive applications like desktop publishing internet information management prepress multimedia audio video digital photography fast backup data exchange archiving along confidential data security easy portability road.
SyQuest Technology
history company named partially founder syed iftikar company meeting wherein decided syquest ought shortened name sys quest.its earliest product family .mm cartridge disk drives associated qpak cartridges achieved limited success government markets removable media required security purposes.in syquest announced sq sq associated cartridge mb ¼inch removable cartridge hard disk drive using industry standard mm disk medium.double capacity versions sq sq introduced .generation products became de facto standard apple macintosh world store transfer backup large amounts data generated graphic artists musicians engineers.syquest went public nasdaq .bankruptcy early company cut workforce later year company namesake syed iftikar fired management shakeup.after syquest fare well market.
SyQuest Technology
core desktop publishing customers began increasingly use cdr media ftp transfer files iomegas zip drives dominated small officehome office soho market.period sales declined resulting series losses.first quarter losses reduced .million net revenues increasing .million.
SyQuest Technology
compares net loss .million .per share net revenues .million period year before.in august cut staff syquest subsequently filed bankruptcy portions company purchased iomega corp. january .syquest retained rights sell remaining inventory condition renaming syqt order continue operations.
SyQuest Technology
several subsequent years web site sold disk drives media provided software downloads support products.january web site ceased exist.domain available purchase chinese market.a website located http last updated july offers contact information product repair technical support.products syquests product line included devices followingfixed media drives unformatted capacitysqf fixeddisk hard drive..
SyQuest Technology
mb..mbitsec.msec tracktotrack.rpm.
SyQuest Technology
bpi.cyl heads disc.sqf fixeddisk hard drive..mb.sqf fixeddisk hard drive..
SyQuest Technology
mb using mfm encoding.specs cylinders heads wpc rwc fastest step rate.sqf fixeddisk hard drive..mb.supports mfm rll encoding.
SyQuest Technology
specs cylinders heads wpc rwc fastest step rate.removable media drives formatted capacitysqrd drivesq disk.mb using mfm encoding.sqrd drivesq disk syquest used sq model number desktop drive .mb using mfm encoding.sqrd drivesq disk.mb using rll encoding mb using mfm encoding.sq drivedisk – mb .iota series.sq drivesq disk – mb .. internal scsi.
SyQuest Technology
also used atari megafile review atari start magazine march sold part emu systems rm – removable media storage system.sq drivesq disk – mb .. internal scsi.compatible sq disk.sqc drivesq disk – mb .internal scsi.external desktop version sqc named sq confused earlier model sq mb disks.compatible sq sq disks.sq drivesq disk – mb.sq drivesq disk – mb.
SyQuest Technology
compatible sq disk.ez aka ezdrive ez disk – mb .removabledisk hard drive.competitor iomegas zip drive.available scsi ide parallel port versions.ezflyer aka ezflyer driveez disk – mb .removabledisk hard drive.
SyQuest Technology
ez compatible.positioned upgrade ez.syjet drivesq disk – .gb removabledisk hard drive.competitor iomegas jaz drive.sparq drivesparq disk – .gb .
SyQuest Technology
removabledisk hard drive.lower cost per mb syjet.quest drivequest disc – .gb removabledisk hard drive.pc magazine definition.available short time .the .
Rackspace Cloud
removabledisk hard drives mb mb mb capacities mostly used macintosh systems via scsi interface.see also jaz drive competing storage technology references external links syquest thefreedictionary.cominterview syed iftikar syquest member computerhistory.orgofferings include cloud storage cloud files virtual private server cloud servers load balancers databases backup monitoring.history rackspace cloud announced mosso llc march wholly owned subsidiary billed utility computing offering.mosso offered paas web hosting lamp iis infrastructure.predated mainstream adoption term cloud computing retooled relaunched february adopting tagline mosso hosting cloud.mosso branding including mosso.com domain dropped june favour rackspace cloud branding including rackspacecloud.com domain name.since customer contracts executed rackspace us inc. dba rackspace cloud rather mosso llc subsidiary.other companies emc corporation decho subsidiary also use alternative branding cloud computing offerings.in rackspace cloud brand merged rackspace.com.
Rackspace Cloud
rackspace rebranded rackspace open cloud company.rackspace rebranded rackspace managed cloud company.services cloud files cloud files cloud hosting service provides unlimited online storage cdn media examples given include backups video files user content utility computing basis.originally launched mosso cloudfs private beta release may similar amazon simple storage service.unlimited files gb uploaded managed via online control panel restful api optionally served via akamai technologies content delivery network.apiin addition online control panel service accessed restful api open source client code available c.net python php java ruby.
Rackspace Cloud
jungle disk previously also owned rackspace allows cloud files mounted local drive within supported operating systems linux mac os x windows.securityredundancy achieved replicating three full copies data across multiple computers multiple zones within data center zones physically though geographically separate supplied separate power internet services.uploaded files distributed via akamai technologies hundreds endpoints across world provides additional layer data redundancy.the control panel api protected ssl requests signed safely delivered untrusted clients.deleted data zeroed immediately.use casesuse cases considered well suited include backing archiving data serving images videos streamed directly users browsers serving content content delivery networks storing secondary static webaccessible data developing data storage applications storing fluctuating andor unpredictable amounts data reducing costs.caveatsthere native operating system support cloud files api yet possible map mount virtual drive without thirdparty software like jungledisk translates supported standard webdav.concepts appending locking data within cloud files may affect disk mirroring backup solutions support permissions transcoding.data organised containers possible create nested folders without translation layer.
Rackspace Cloud
cloud servers cloud servers cloud infrastructure service allows users deploy one hundreds cloud servers instantly create advanced high availability architectures similar amazon elastic compute cloud.cloud servers virtual machines running xen hypervisor linuxbased instances citrix xenserver windows linux instances.quad core hardware node gb ram allowing allocations mb gb.disk cpu allocations scale memory disk sizes ranging gb gb.various distributions linux supported including arch centos debian fedora gentoo red hat enterprise linux ubuntu.the technology behind service purchased rackspaces october acquisition slicehost servers formerly known slices.
Rackspace Cloud
much cheaper generally easier use traditional dedicated server though still necessary maintain operating system solution stack required cloud sites product.one main differentiators two services cloud servers includes full root access thus allows customisation cloud sites product less flexible requires less maintenance.on december rackspace began offering managed service level cloud servers product added additional support operating system common applications well patching routine services.additional support level come increased cost however.during rackspace ceased advertise first generation cloud servers standard next generation cloud servers main cloud servers product page opting disclose next generation performance performance products require minimum month service charge per account support service.first generation standard next generation platforms referred legacy infrastructure buried pricing page old products.minimum charge lowest product first generation platform .month mb instance minimum charge standard next generation platform .month mb instance.
Rackspace Cloud
performance platform minimum charge one server .gb instance minimum service charge total .month.rackspace quietly phasing older less expensive products transition managed platform mandatory support charges incorporated cost services.cloud tools applications infrastructure software built run rackspace cloud.applications listed include zend php stack cloudkick cloud performance testing services copperegg realtime cloud server application monitoring service xeround mysql cloud database mongolab cloud version popular nosql database mongodb.apithe cloud servers api launched july creative commons attribution .license allows clients create configure control virtual servers.
Rackspace Cloud
addition issuing basic management commands enables elastic scenarios whereby servers instantiated destroyed response fluctuating load one key characteristics cloud computing.rightscale among thirdparty providers announced support api.former services cloud sites cloud sites platform service offering owned liquid web similar traditional web hosting built horizontally scalable hardware infrastructure.fixed monthly credit card payment gives users access service allocation compute storage bandwidth resources.allocation exhausted subsequent usage billed utility computing basis.
Rackspace Cloud
allows unlimited number sites databases email accounts includes reseller options client billing support.touted fastest way put sites cloud runs windows linux applications across hundreds servers.cloud sites supports php perl python mysql .net .asp microsoft sql server application frameworks.in cloud sites division sold liquid web llc.compute cyclesthe service includes compute cycles per month roughly equivalent running server .ghz modern processor period time additional cycles priced us.. nonstandard unit measurement primarily reflects cpu processing time also includes io operations pages many database queries consume compute cycles.however difficult compare services providers without standard units measurement.caveatscloud sites support java tomcat coldfusion ssh rdp api access microsoft exchange custom serverside components time.
Rackspace Cloud
also possible set multiple top level domains point web root directory..net environment dropped support full trust favour modified medium trust despite previously announced blog able work directly microsoft engineer system could accommodate full trust without compromising security scalability performance users.locations cloud servers cloud products physically located six data centers chicago northern virginia dallas london sydney hong kong.separate uk account required access londonbased cloud products however single us rackspace cloud account access us data centers along sydney hong kong regions.cloud sites available dallas chicago data centers only.
Rackspace Cloud
control panel online control panel custom built rackspace cloud service opposed using control panel software like cpanel.the control panel includes management interfaces cloud sites cloud servers cloud files services.web based file manager removed undisclosed reasons.also allows users manage multiple clients plans products e.g.databases x support apply white label branding options messaging.clients access restricted version control panel allows conduct administrative tasks managing mail accounts.the control panel also home billing reporting functions provides access support materials including developer resources knowledge base forums live chat.
Stratus VOS
openstack rackspace contributed source code cloud files product openstack project apache license become openstack object storage component.in april rackspace announced would implement openstack compute underlying technology cloud servers product.change come new control panel well addon cloud services offering databases server monitoring block storage virtual networking.see also amazon web servicescloud computingoracle cloud references external links rackspace cloud computing official sitemanaging rackspace cloud servers—an unofficial guide rackspace cloud servers managementvos available stratuss ftserver continuum platforms.vos customers use support highvolume transaction processing applications require continuous availability.vos notable one operating systems run fully lockstepped hardware.during ibm version stratus vos existed called system operating system.history vos designed inception highsecurity transactionprocessing environment tailored faulttolerant hardware.incorporates much design experience came mitbelllaboratoriesgeneralelectric later honeywell multics project.in stratus added unix system v implementation called unix system facilities usf vos integrating unix vos kernel level.in recent years stratus added posixcompliance many open source packages run vos.like competing proprietary operating systems vos seen market share shrink steadily early s. development programming vos vos provides compilers pli cobol pascal fortran c vos c gcc compilers c also gcc.
Stratus VOS
programming languages make vos system calls e.g.sseqread read record file extensions support varyinglength strings pli style.developers typically code favourite vos text editor offline compiling system vos ide applications.in history stratus offered hardware platforms based motorola microprocessor family ft xa series intel microprocessor family xar series hp parisc processor family continuum series intel xeon x processor family v series.versions vos offer compilers targeted native instruction set versions vos offer crosscompilers.stratus added support posix api vos release .continuum added support gnu cc compiler gnu gdb debugger many posix commands vos release .. additional release vos added posix.
Stratus VOS
capabilities point many usermode opensource packages successfully built.reason beginning release .stratus renamed vos openvos.stratus offers supported ports samba openssl openssh gnu privacy guard openldap berkeley db mysql community server apache ibm websphere mq community edition java.numeric values vos always big endian regardless endianness underlying hardware platform.little endian servers x processors compilers byte swap reading writing values memory transform data native little endian format.command macro language vos fairly complete command macro language used create menu systems automate tasks etc.
Stratus VOS
vos command macros accept arguments commandline via user interface form.arguments defined beginning command macro parameters section.language supports range statements including ifthenelse boolean operations loops goto excellent error reporting.command macro language executed interactive noninteractive batch started process modes.used automate programs capturing prompts sending appropriate responses.
Stratus VOS
led stratus limit capabilities command macro language.the macro language lacks support userdefined functions easily support include files.string handling prone errors especially embedded control characters.overview vos coded mainly pli small amount assembly language migrated ftserver series.system written pli c assembly.its overall structure much common multics many systems features traced back multics varying degrees.system exposes number fundamental abstractions software designer programmer notable beingprocessesdeviceshard disksvarious ipc mechanismstasksa process scheduled entity vos process set attributes govern manipulated system.
Stratus VOS
example processes user name process name.former used vos determine processs access rights external devices items file system.fundamental significance processs privileged flag binary attribute.privileged processes may perform privileged operations.mechanism used restrict certain potentially powerful operations system wide consequences e.g.
Stratus VOS
shutting system dismounting hard disk etc.. distribution vos distributed stratus technologies.distribution media .mm dat tape continuum sdlt tape early v series platforms.openvos release .stratus offers support distributing openvos dvd downloading release file.
Stratus VOS
software installations may done stratus field engineer customers system administrator.interface commandline interface main powerful user interface vos system.users may locked form based subsystem command macro scripts required although skilled user would able break get commandline access.fact possible stratus system administrator set users account attempt break fms—the stratus forms management system—to command line results user logged out.command macros programs invoked argument display form listing available parameters user navigate using tab key.parameter generally restricted control user input.includes lists valid values numericonly textonly etc.
Stratus VOS
parameters also hidden using secret tag made mandatory.all commands vos defined full underbars separate words.example changecurrentdir changes working directory.vos help system uses convention assist users looking subset possible commands instance referring change found help match change.users may customize command interface means file contains abbreviations commands.command abbreviations conventionally named first letters command represent ccd may expanded changecurrentdir foodir.applications system applications vos used continuum ftserver systems designed highly faulttolerant.
Stratus VOS
systems typically used safetycritical missioncritical applications typically banks hospitals telecommunications transaction processing companies.communications vos supports following protocolstcpipx.snasdlcqllcasyncbisynclapbpollselectrjehaspalcslcvisa s.w.i.f.t.nasdaq fas chips amexmq seriesolder versions vos implemented nonosi standard tcpip known os tcpip operating system tcpip.vos since version .x implemented osicompliant streamstcp.older applications using os tcpip ported order use stcp.
Stratus VOS
mean loss functionality os tcpip supported several functions osicompliant therefore abandoned.ftserver hardware v series runs supports tcpip x. x. equipped optional nio.websphere mq .a.k.a.mq series tcpip based also supported ftserver hardware.
Stratus VOS
devices supporting legacy protocols run continuum hardware may accessed current hardware open stratalink network.fault tolerance fault tolerance built vos bottom up.hardware level major devices run lockstepped duplex mode meaning two identical devices performing action time.addition device board also duplexed order identify internal board failures hardware level stratus hardware defined lock stepped.boards actively monitored operating system correct minor inconsistencies bad diskwrites reads.
Stratus VOS
boards report unacceptable number faults removed service system duplexed board continue operation problem resolved via hotfix.includes cpus disk drives device logically duplexed definition excludes communications devices.system continue processing normal automatically raise fault ticket stratus customer service via rsn remote service network.stratus customer service dial system using rsn investigate problem dispatch replacement parts.the operating system designed avoid crashes due simplexed hardware failure.file system vos supports number unique file typesstream files stream binary data corresponding directly concept file operating systems.fixed files sequence records fixed size.relative files sequence records fixed file supporting random accesssequential files sequence records variable sizequeue files filesystem based backup message queuespipes named pipes interprocess communicationtransaction files provide support journal based rollbackthe vos api allows creation multiple indexes per file sorting according contents record external key internal key welldefined set multiple keys.
Stratus VOS
vos file one indexes used cisam database table.vos uses proprietary file naming syntax includes system name module name disk number directory components separated symbol.typically system disk housed module cpu system file vos cluster would referenced assystemmdsystemdevices.tablevos disk allocation memory organised blocks block bytes.memory takes form ram paging.vos systems support paging partitions paging files.modern versions vos paging files created dynamically sysadmin removed without reboot.
Stratus VOS
paging files theory consist one extent viewed kernel minipaging partition may may contiguous.however noncontiguous extents recommended greatly increase disk activity.admin create largest possible extent paging files early possible system booted.file system security vos supports write read execute null access files directories devices although directories files slightly different access lists.access assigned users groups world.
Stratus VOS
read access required run executable program provided user status access directory program resides.vos inherited access control lists multics also implements directory access control lists.file access control list containing directorys default access control list applies.access devices typically controlled creating file linked device administrator.may true openvos apply original operating system.access given file sets access device.open stratalink vos always networkaware operating system.
Stratus VOS
virtually every system call native api parameter determines computer operation affects.operation isnt local redirected target computer via remote subroutine call.example file names parsed indicate computer file resides on.the stratalink networking model two level hierarchy naming computers computer called module modules aggregated systems.system administered unit.words modules system aware disks hardware devices system.
Stratus VOS
result file name begins system name refers files computers opened without need special networking.true devices.system entities processes referenced using module names written systemmodule.vos system module names defined relationship ip addresses domain names—the vos api developed late —before internet widely adopted long urls even invented.historically stratalink proprietary mb csmacd ring network allowed high performance time low memory overhead cpu utilization.never developed beyond mb dropped favor using tcpip ethernet became dominant networking standard memory cpu processing got cheaper.open stratalink also use x. wide area communications.
Trusted Computing
using open stratalink protocols wide area communications also referred stratanet.see also comparison command shellstandem computers references external links official openvos websitecomp.sys.stratusstratus public ftp serverstratus documentation siteterm taken field trusted systems specialized meaning.core idea trusted computing give hardware manufacturers control software run system refusing run unsigned software.trusted computing computer consistently behave expected ways behaviors enforced computer hardware software.enforcing behavior achieved loading hardware unique encryption key inaccessible rest system owner.tc controversial hardware secured owner also secured owner.controversy led opponents trusted computing free software activist richard stallman refer instead treacherous computing even point scholarly articles begun place scare quotes around trusted computing.trusted computing proponents international data corporation enterprise strategy group endpoint technologies associates claim technology make computers safer less prone viruses malware thus reliable enduser perspective.
Trusted Computing
also claim trusted computing allow computers servers offer improved computer security currently available.opponents often claim technology used primarily enforce digital rights management policies imposed restrictions owner increase computer security.chip manufacturers intel amd hardware manufacturers hp dell operating system providers microsoft include trusted computing products enabled.u.s. army requires every new pc purchases comes trusted platform module tpm.july virtually entire united states department defense.in confidential computing consortium ccc established linux foundation mission improve security data use.
Trusted Computing
consortium members including microsoft intel baidu red hat meta.key concepts trusted computing encompasses six key technology concepts required fully trusted system system compliant tcg specificationsendorsement keysecure input outputmemory curtaining protected executionsealed storageremote attestationtrusted third party ttp endorsement key endorsement key bit rsa public private key pair created randomly chip manufacture time cannot changed.private key never leaves chip public key used attestation encryption sensitive data sent chip occurs tpmtakeownership command.this key used allow execution secure transactions every trusted platform module tpm required able sign random number order allow owner show genuine trusted computer using particular protocol created trusted computing group direct anonymous attestation protocol order ensure compliance tcg standard prove identity makes impossible software tpm emulator untrusted endorsement key example selfgenerated one start secure transaction trusted entity.tpm designed make extraction key hardware analysis hard tamper resistance strong requirement.memory curtaining memory curtaining extends common memory protection techniques provide full isolation sensitive areas memory—for example locations containing cryptographic keys.
Trusted Computing
even operating system full access curtained memory.exact implementation details vendor specific.sealed storage sealed storage protects private information binding platform configuration information including software hardware used.means data released particular combination software hardware.sealed storage used drm enforcing.
Trusted Computing
example users keep song computer licensed listened able play it.currently user locate song listen send someone else play software choice back cases use circumvention software decrypt it.alternatively user may use software modify operating systems drm routines leak song data say temporary license acquired.using sealed storage song securely encrypted using key bound trusted platform module unmodified untampered music player computer play it.drm architecture might also prevent people listening song buying new computer upgrading parts current one except explicit permission vendor song.
Trusted Computing
remote attestation remote attestation allows changes users computer detected authorized parties.example software companies identify unauthorized changes software including users tampering software circumvent commercial digital rights restrictions.works hardware generate certificate stating software currently running.computer presents certificate remote party show unaltered software currently executing.numerous remote attestation schemes proposed various computer architectures including intel riscv arm.remote attestation usually combined publickey encryption information sent read programs requested attestation eavesdropper.to take song example users music player software could send song machines could attest running authorized copy music player software.
Trusted Computing
combined technologies provides restricted path music encrypted io prevents user recording transmitted audio subsystem memory locking prevents dumped regular disk files worked sealed storage curtails unauthorized access saved hard drive remote attestation prevents unauthorized software accessing song even used computers.preserve privacy attestation responders direct anonymous attestation proposed solution uses group signature scheme prevent revealing identity individual signers.proof space pos proposed used malware detection determining whether l cache processor empty e.g.enough space evaluate pospace routine without cache misses contains routine resisted evicted.trusted third party one main obstacles overcome developers tcg technology maintain anonymity still providing “trusted platform”.main object obtaining “trusted mode” party bob computer alice may communicating trust alice running untampered hardware software.
Trusted Computing
assure bob alice able use malicious software compromise sensitive information computer.unfortunately order alice inform bob using registered “safe” software hardware thereby potentially uniquely identifying bob.this might problem one wishes identified party e.g.banking transactions internet.many types communicating activities people enjoy anonymity computer provides.tcg acknowledges allegedly developed process attaining anonymity time assuring party communicating trusted party.
Trusted Computing
done developing “trusted third party”.entity work intermediary user computer user users.essay focus latter process process referred remote attestation.when user requires aik attestation identity key user wants key certified ca certification authority.user tpm trusted platform module sends three credentials public key credential platform credential conformance credential.set certificates cryptographic keys short referred ek.
Trusted Computing
ek split two main parts private part ekpr public part ekpub.ekpr never leaves tpm.disclosure ekpub however necessary version .. ekpub uniquely identify endorser platform model kind software currently used platform details tpm platform pc complies tcg specifications.information communicated directly another party process getting trusted status would time impossible obtain anonymous identity.therefore information sent privacy certification authority trusted third party.c.a privacy certification authority receives ekpub sent tpm c.a verifies information.
Trusted Computing
information verified create certified secondary key pair aik sends credential back requestor.intended provide user anonymity.user certified aik use communicate trusted platforms.in version .tcg developed new method obtaining certified aik.process called daa direct anonymous attestation.
Trusted Computing
method require user disclose hisher ekpub ttp.unique new feature daa ability convince remote entity particular tpm trusted platform module valid tpm without disclosing ekpub unique identifier.tpm send certification request aik remote entity tpm generate set daa credentials.done interacting issuer.daa credentials created tpm sending tpmunique secret remains within tpm.
Trusted Computing
tpm secret similar analogous ek.tpm obtained set daa credentials send verifier.verifier receives daa credentials ttp verify send certified aik back user.user able communicate trusted parties using certified aik.verifier may may trusted third party ttp.
Trusted Computing
verifier determine whether daa credentials valid daa credentials contain unique information discloses tpm platform.example would user wants trusted status sends request issuer.issuer could manufacturer users platform e.g.compaq.compaq would check tpm produced valid one issues daa credentials.
Trusted Computing
next step daa credentials sent user verifier.mentioned might standard ttp could also different entity.verifier accepts daa supplied produce certified aik.certified aik used user communicate trusted platforms.summary new version introduces separate entity assist anonymous attestation process.
Trusted Computing
introducing issuer supplies daa one able sufficiently protect users anonymity towards verifierttp.issuer commonly platform manufacturer.without credentials probably difficult private customer small business organization convince others genuine trusted platform.known applications microsoft products windows vista windows windows windows rt make use trusted platform module facilitate bitlocker drive encryption.known applications runtime encryption use secure enclaves include signal messenger eprescription service erezept german government.
Trusted Computing
possible applications digital rights management trusted computing would allow companies create digital rights management drm system would hard circumvent though impossible.example downloading music file.sealed storage could used prevent user opening file unauthorized player computer.remote attestation could used authorize play music players enforce record companys rules.music would played curtained memory would prevent user making unrestricted copy file playing secure io would prevent capturing sent sound system.
Trusted Computing
circumventing system would require either manipulation computers hardware capturing analogue thus degraded signal using recording device microphone breaking security system.new business models use software services internet may boosted technology.strengthening drm system one could base business model renting programs specific time periods pay go models.instance one could download music file could played certain number times becomes unusable music file could used within certain time period.preventing cheating online games trusted computing could used combat cheating online games.players modify game copy order gain unfair advantages game remote attestation secure io memory curtaining could used determine players connected server running unmodified copy software.
Trusted Computing
verification remote computation grid computing trusted computing could used guarantee participants grid computing system returning results computations claim instead forging them.would allow large scale simulations run say climate simulation without expensive redundant computations guarantee malicious hosts undermining results achieve conclusion want.criticism trusted computing opponents electronic frontier foundation free software foundation claim trust underlying companies deserved technology puts much power control hands design systems software.also believe may cause consumers lose anonymity online interactions well mandating technologies trusted computing opponents say unnecessary.suggest trusted computing possible enabler future versions mandatory access control copy protection drm.some security experts alan cox bruce schneier spoken trusted computing believing provide computer manufacturers software authors increased control impose restrictions users able computers.
Trusted Computing
concerns trusted computing would anticompetitive effect market.there concern amongst critics always possible examine hardware components trusted computing relies trusted platform module ultimate hardware system core root trust platform reside.implemented correctly presents security risk overall platform integrity protected data.specifications published trusted computing group open available anyone review.however final implementations commercial vendors necessarily subjected review process.addition world cryptography often move quickly hardware implementations algorithms might create inadvertent obsolescence.
Trusted Computing
trusting networked computers controlling authorities rather individuals may create digital imprimaturs.cryptographer ross anderson university cambridge great concerns thattc support remote censorship ... general digital objects created using tc systems remain control creators rather control person owns machine happen stored ... someone writes paper court decides defamatory compelled censor — software company wrote word processor could ordered deletion refuses.given possibilities expect tc used suppress everything pornography writings criticize political leaders.he goes state that... software suppliers make much harder switch competitors products.simple level word could encrypt documents using keys microsoft products access would mean could read using microsoft products competing word processor....the ... important benefit microsoft tc dramatically increase costs switching away microsoft products office rival products openoffice.example law firm wants change office openoffice right merely install software train staff convert existing files.
Trusted Computing
five years time received tcprotected documents perhaps thousand different clients would get permission form signed digital certificates clients order migrate files new platform.law firm wont practice want much tightly locked enable microsoft hike prices.anderson summarizes case sayingthe fundamental issue whoever controls tc infrastructure acquire huge amount power.single point control like making everyone use bank accountant lawyer.many ways power could abused.digital rights management one early motivations behind trusted computing desire media software corporations stricter drm technology prevent users freely sharing using potentially copyrighted private files without explicit permission.an example could downloading music file band bands record company could come rules bands music used.
Trusted Computing
example might want user play file three times day without paying additional money.also could use remote attestation send music music player enforces rules sealed storage would prevent user opening file another player enforce restrictions.memory curtaining would prevent user making unrestricted copy file playing secure output would prevent capturing sent sound system.users unable modify software user wanted switch competing program might find would impossible new program read old data information would locked old program.could also make impossible user read modify data except specifically permitted software.remote attestation could cause problems.
Trusted Computing
currently web sites visited using number web browsers though certain websites may formatted browsers cannot decipher code.browsers found way get around problem emulating browsers.remote attestation website could check internet browser used refuse display browser specified one like internet explorer even emulating browser would work.users unable exercise legal rights law many countries allows users certain rights data whose copyright including text images media often headings fair use public interest.depending jurisdiction may cover issues whistleblowing production evidence court quoting smallscale usage backups owned media making copy owned material personal use owned devices systems.
Trusted Computing
steps implicit trusted computing practical effect preventing users exercising legal rights.users vulnerable vendor withdrawal service service requires external validation permission music file game requires connection vendor confirm permission play use vulnerable service withdrawn longer updated.number incidents already occurred users purchased music video media found ability watch listen suddenly stop due vendor policy cessation service server inaccessibility times compensation.alternatively cases vendor refuses provide services future leaves purchased material usable present increasingly obsolete hardware long lasts hardware may purchased future.users unable override opponents trusted computing advocate owner override allowing owner confirmed physically present allow computer bypass restrictions use secure io path.
Trusted Computing
override would allow remote attestation users specification e.g.create certificates say internet explorer running even different browser used.instead preventing software change remote attestation would indicate software changed without owners permission.trusted computing group members refused implement owner override.proponents trusted computing believe owner override defeats trust computers since remote attestation forged owner.owner override offers security enforcement benefits machine owner allow trust computers owners could waive rules restrictions computers.
Trusted Computing
scenario data sent someone elses computer whether diary drm music file joint project person controls security computer enforce copy data.potential undermine applications trusted computing enforce drm control cheating online games attest remote computations grid computing.loss anonymity trusted computing equipped computer able uniquely attest identity possible vendors others possess ability use attestation feature zero identity user tcenabled software high degree certainty.such capability contingent reasonable chance user time provides useridentifying information whether voluntarily indirectly simply inference many seemingly benign pieces data.e.g.search records shown simple study aol search records leak.
Trusted Computing
one common way information obtained linked user registers computer purchase.another common way user provides identifying information website affiliate vendor.while proponents tc point online purchases credit transactions could potentially secure result remote attestation capability may cause computer user lose expectations anonymity using internet.critics point could chilling effect political free speech ability journalists use anonymous sources whistle blowing political blogging areas public needs protection retaliation anonymity.the tpm specification offers features suggested implementations meant address anonymity requirement.using thirdparty privacy certification authority pca information identifies computer could held trusted third party.additionally use direct anonymous attestation daa introduced tpm v. allows client perform attestation revealing personally identifiable machine information.the kind data must supplied ttp order get trusted status present entirely clear tcg admits attestation important tpm function significant privacy implications.however clear static dynamic information user computer may supplied ekpubkey ttp v.b clear data supplied “verifier” v.. static information uniquely identify endorser platform model details tpm platform pc complies tcg specifications .
Trusted Computing
dynamic information described software running computer.program like windows registered users name turn uniquely identify user.another dimension privacy infringing capabilities might also introduced new technology often use programs might possible information provided ttp.exceptional however practical situation user purchases pornographic movie internet purchaser nowadays must accept fact provide credit card details provider thereby possibly risking identified.new technology purchaser might also risk someone finding watched pornographic movie times.
Trusted Computing
adds new dimension possible privacy infringement.extent data supplied ttpverifiers present exactly known technology implemented used able assess exact nature volume data transmitted.tcg specification interoperability problems trusted computing requests software hardware vendors follow technical specifications released trusted computing group order allow interoperability different trusted software stacks.however since least mid interoperability problems trousers trusted software stack released open source software ibm hewlettpackards stack.another problem technical specifications still changing unclear standard implementation trusted stack.
Trusted Computing
shutting competing products people voiced concerns trusted computing could used keep discourage users running software created companies outside small industry group.microsoft received great deal bad press surrounding palladium software architecture evoking comments pieces vaporware evoked higher level fear uncertainty microsofts palladium palladium plot take cyberspace palladium keep us running software personally approved bill gates.concerns trusted computing used shut competition exist within broader framework consumers concerned using bundling products obscure prices products engage anticompetitive practices.trusted computing seen harmful problematic independent open source software developers.trust widely used publickey cryptography creation keys done local computer creator complete control access consequentially security policies.
Trusted Computing
proposed encryptiondecryption chips privatepublic key permanently embedded hardware manufactured hardware manufacturers would opportunity record key without leaving evidence so.key would possible access data encrypted authenticate it.trivial manufacturer give copy key government software manufacturers platform must go steps works authenticated software.therefore trust anything authenticated encrypted tpm trusted computer end user trust company made chip company designed chip companies allowed make software chip ability interest companies compromise whole process.security breach breaking chain trust happened sim card manufacturer gemalto infiltrated us british spies resulting compromised security cellphone calls.it also critical one able trust hardware manufacturers software developers properly implement trusted computing standards.incorrect implementation could hidden users thus could undermine integrity whole system without users aware flaw.
Trusted Computing
hardware software support since major manufacturers shipped systems included trusted platform modules associated bios support.accordance tcg specifications user must enable trusted platform module used.the linux kernel included trusted computing support since version .. several projects implement trusted computing linux.january members gentoo linuxs crypto herd announced intention providing support tc—in particular support trusted platform module.also tcgcompliant software stack linux named trousers released open source license.some limited form trusted computing implemented current versions microsoft windows thirdparty software.with intel software guard extension sgx amd secure encrypted virtualization sev processors hardware available runtime memory encryption remote attestation features.major cloud providers microsoft azure aws google cloud platform virtual machines trusted computing features available.there several opensource projects facilitate use confidential computing technology.include ego edgelessdb marblerun edgeless systems well enarx originates security research red hat.the intel classmate pc competitor one laptop per child includes trusted platform module.privatecore vcage software used attest x servers tpm chips.mobile secure operating system simulates tpm functionality mobile devices using arm trustzone technology.samsung smartphones come equipped samsung knox depend features like secure boot tima mdm trustzone se linux see also references external links trusted computing group website
URL shortening
achieved using redirect links web page long url.example url httpsexample.comassetscategorybsubcategorycfoo shortened httpsexample.comfoo url httpsen.wikipedia.orgwikiurlshortening shortened httpsw.wikiu.often redirect domain name shorter original one.friendly url may desired messaging technologies limit number characters message example sms reducing amount typing required reader copying url print source making easier person remember intention permalink.november shortened links url shortening service bitly accessed .