LISA '13 Proceedings Interior (PDF, Best for Mobile Devices)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mary Beth Chrissis, Mike Konrad, Sandra
ptg Process Areas by Category Process Management OPD Organizational Process Definition OPF Organizational Process Focus OPM Organizational Performance Management OPP Organizational Process Performance OT Organizational Training Project Management IPM Integrated Project Management PMC Project Monitoring and Control PP Project Planning QPM Quantitative Project Management REQM Requirements Management RSKM Risk Management SAM Supplier Agreement Management Engineering PI Product Integration RD Requirements Development TS Technical Solution ptg VAL Validation VER Verification Support CAR Causal Analysis and Resolution CM Configuration Management DAR Decision Analysis and Resolution MA Measurement and Analysis PPQA Process and Product Quality Assurance Generic Goals and Practices GG1 Achieve Specific Goals GP 1.1 Perform Specific Practices GG2 Institutionalize a Managed Process GP2.1 Establish an Organizational Policy GP 2.2 Plan the Process GP 2.3 Provide Resources GP 2.4 Assign Responsibility GP 2.5 Train People GP 2.6 Control Work Products GP 2.7 Identify and Involve Relevant Stakeholders GP 2.8 Monitor and Control the Process GP 2.9 Objectively Evaluate Adherence GP 2.10 Review Status with Higher Level Management GG3 Institutionalize a Defined Process GP 3.1 Establish a Defined Process GP 3.2 Collect Process Related Experiences ptg CMMI® for Development Third Edition ptg Wow! eBook <WoweBook.Com> The SEI Series in Software Engineering Visit informit.com/sei for a complete list of available products. ptg he SEI Series in Software Engineering represents is a collaborative Tundertaking of the Carnegie Mellon Software Engineering Institute (SEI) and Addison-Wesley to develop and publish books on software engineering and related topics. The common goal of the SEI and Addison-Wesley is to provide the most current information on these topics in a form that is easily usable by practitioners and students. -
Apache Sentry
Apache Sentry Prasad Mujumdar [email protected] [email protected] Agenda ● Various aspects of data security ● Apache Sentry for authorization ● Key concepts of Apache Sentry ● Sentry features ● Sentry architecture ● Integration with Hadoop ecosystem ● Sentry administration ● Future plans ● Demo ● Questions Who am I • Software engineer at Cloudera • Committer and PPMC member of Apache Sentry • also for Apache Hive and Apache Flume • Part of the the original team that started Sentry work Aspects of security Perimeter Access Visibility Data Authentication Authorization Audit, Lineage Encryption, what user can do data origin, usage Kerberos, LDAP/AD Masking with data Data access Access ● Provide user access to data Authorization ● Manage access policies what user can do ● Provide role based access with data Agenda ● Various aspects of data security ● Apache Sentry for authorization ● Key concepts of Apache Sentry ● Sentry features ● Sentry architecture ● Integration with Hadoop ecosystem ● Sentry administration ● Future plans ● Demo ● Questions Apache Sentry (Incubating) Unified Authorization module for Hadoop Unlocks Key RBAC Requirements Secure, fine-grained, role-based authorization Multi-tenant administration Enforce a common set of policies across multiple data access path in Hadoop. Key Capabilities of Sentry Fine-Grained Authorization Permissions on object hierarchie. Eg, Database, Table, Columns Role-Based Authorization Support for role templetes to manage authorization for a large set of users and data objects Multi Tanent Administration -
Cómo Citar El Artículo Número Completo Más Información Del
DYNA ISSN: 0012-7353 Universidad Nacional de Colombia Iván-Herrera-Herrera, Nelson; Luján-Mora, Sergio; Gómez-Torres, Estevan Ricardo Integración de herramientas para la toma de decisiones en la congestión vehicular DYNA, vol. 85, núm. 205, 2018, Abril-Junio, pp. 363-370 Universidad Nacional de Colombia DOI: https://doi.org/10.15446/dyna.v85n205.67745 Disponible en: https://www.redalyc.org/articulo.oa?id=49657889045 Cómo citar el artículo Número completo Sistema de Información Científica Redalyc Más información del artículo Red de Revistas Científicas de América Latina y el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Integration of tools for decision making in vehicular congestion• Nelson Iván-Herrera-Herreraa, Sergio Luján-Morab & Estevan Ricardo Gómez-Torres a a Facultad de Ciencias de la Ingeniería e Industrias, Universidad Tecnológica Equinoccial, Quito, Ecuador. [email protected], [email protected] b Departamento de Lenguajes y Sistemas Informáticos, Universidad de Alicante, Alicante, España. [email protected] Received: September 15th, 2017. Received in revised form: March 15th, 2018. Accepted: March 21th, 2018. Abstract The purpose of this study is to present an analysis of the use and integration of technological tools that help decision making in situations of vehicular congestion. The city of Quito-Ecuador is considered as a case study for the done work. The research is presented according to the development of an application, using Big Data tools (Apache Flume, Apache Hadoop, Apache Pig), favoring the processing of a lot of information that is required to collect, store and process. -
1000Plus Fischbeck Honored As Elite Educator Nair to Retire After Decades of Teaching Innovations Census 2010: Making Sure You C
PIPER4/10 Issue 2 Q&A With Dan Barnett: Spring Carnival To Have a Twist 3 University Celebrates Campaign 1000plus in Singapore and India U NIVERSITY COMMUNITY CELEBRATES DAY OF SERVICE 9 Ken Chu Takes Center Stage in CFA’s Costume Shop 10 Staff See Development Day as Opportunity To Learn Fischbeck Honored As Elite Educator ■ Bruce Gerson For Professor Paul Fischbeck, an expert in decision analysis and determining chance and probability, being named this year’s recipient of the university-wide William H. and Frances S. Ryan Award for Meritorious Teaching was a decision PHOTOS BY GLENN BROOKES whose time had come. He will receive M ORE THAN 1,000 VOLUNTEERS PARTICIPATED IN THE “1000PLUS” ANNUAL DAY the award at the Celebration of Teach- OF SERVICE AT TWO DOZEN PITTSBURGH SITES ON SATURDAY, MARCH 27. AMONG ing at 4:30 p.m., Wednesday, April 21 in THE WORKERS AT HOSANNA HOUSE SHERWOOD CAMP IN WILKINSBURG WERE Rangos 1 & 2. SOPHOMORES FORREST GRINSTEAD (ABOVE, FROM LEFT), DAVID SOAMCHAND AND AMY ADETORO “TORO” ADEYEMI. SUZANNE LAURICH-MC I NTYRE (AT RIGHT), It’s a fi tting award for Fischbeck, an out- ASSISTANT VICE PROVOST FOR GRADUATE EDUCATION, JOINED THE STUDENTS AND standing teacher in two departments and OTHER FACULTY AND STAFF DURING THE DAY. “IT IS EXTREMELY AFFIRMING TO SEE two colleges who is praised by his peers SO MANY PEOPLE FROM CARNEGIE MELLON ENGAGE IN SERVICE AND SHOW THE and pupils for his mastery of the class- CITY OF PITTSBURGH HOW MUCH WE APPRECIATE BEING PART OF ITS COMMUNITY,” room and his astute expertise in leading SAID LUCAS CHRISTAIN, COORDINATOR OF STUDENT DEVELOPMENT. -
Database Licensing Information User Manual
Oracle® Database Database Licensing Information User Manual 19c E94254-04 April 2019 Oracle Database Database Licensing Information User Manual, 19c E94254-04 Copyright © 2004, 2019, Oracle and/or its affiliates. All rights reserved. Contributors: Penny Avril, Prabhaker Gongloor, Mughees Minhas, Anu Natarajan, Jill Robinson This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. -
Flume 1.8.0 Developer Guide
Apache ™ Flume™ Flume 1.8.0 Developer Guide Introduction Overview Apache Flume is a distributed, reliable, and available system for efficiently collecting, aggregating and moving large amounts of log data from many different sources to a centralized data store. Apache Flume is a top-level project at the Apache Software Foundation. There are currently two release code lines available, versions 0.9.x and 1.x. This documentation applies to the 1.x codeline. For the 0.9.x codeline, please see the Flume 0.9.x Developer Guide. Architecture Data flow model An Event is a unit of data that flows through a Flume agent. The Event flows from Source to Channel to Sink, and is represented by an implementation of the Event interface. An Event carries a payload (byte array) that is accompanied by an optional set of headers (string attributes). A Flume agent is a process (JVM) that hosts the components that allow Events to flow from an external source to a external destination. A Source consumes Events having a specific format, and those Events are delivered to the Source by an external source like a web server. For example, an AvroSource can be used to receive Avro Events from clients or from other Flume agents in the flow. When a Source receives an Event, it stores it into one or more Channels. The Channel is a passive store that holds the Event until that Event is consumed by a Sink. One type of Channel available in Flume is the FileChannel which uses the local filesystem as its backing store. -
Full-Graph-Limited-Mvn-Deps.Pdf
org.jboss.cl.jboss-cl-2.0.9.GA org.jboss.cl.jboss-cl-parent-2.2.1.GA org.jboss.cl.jboss-classloader-N/A org.jboss.cl.jboss-classloading-vfs-N/A org.jboss.cl.jboss-classloading-N/A org.primefaces.extensions.master-pom-1.0.0 org.sonatype.mercury.mercury-mp3-1.0-alpha-1 org.primefaces.themes.overcast-${primefaces.theme.version} org.primefaces.themes.dark-hive-${primefaces.theme.version}org.primefaces.themes.humanity-${primefaces.theme.version}org.primefaces.themes.le-frog-${primefaces.theme.version} org.primefaces.themes.south-street-${primefaces.theme.version}org.primefaces.themes.sunny-${primefaces.theme.version}org.primefaces.themes.hot-sneaks-${primefaces.theme.version}org.primefaces.themes.cupertino-${primefaces.theme.version} org.primefaces.themes.trontastic-${primefaces.theme.version}org.primefaces.themes.excite-bike-${primefaces.theme.version} org.apache.maven.mercury.mercury-external-N/A org.primefaces.themes.redmond-${primefaces.theme.version}org.primefaces.themes.afterwork-${primefaces.theme.version}org.primefaces.themes.glass-x-${primefaces.theme.version}org.primefaces.themes.home-${primefaces.theme.version} org.primefaces.themes.black-tie-${primefaces.theme.version}org.primefaces.themes.eggplant-${primefaces.theme.version} org.apache.maven.mercury.mercury-repo-remote-m2-N/Aorg.apache.maven.mercury.mercury-md-sat-N/A org.primefaces.themes.ui-lightness-${primefaces.theme.version}org.primefaces.themes.midnight-${primefaces.theme.version}org.primefaces.themes.mint-choc-${primefaces.theme.version}org.primefaces.themes.afternoon-${primefaces.theme.version}org.primefaces.themes.dot-luv-${primefaces.theme.version}org.primefaces.themes.smoothness-${primefaces.theme.version}org.primefaces.themes.swanky-purse-${primefaces.theme.version} -
Carnegie Mellon University 1
Carnegie Mellon University 1 School of Computer Science Andrew Moore, Dean 15-453 Formal Languages, Automata, and Computability 9 Klaus Sutner, Associate Dean for Undergraduate Education 15-455 Undergraduate Complexity Theory 9 Thomas Cortina, Assistant Dean for Undergraduate Education Undergraduate Office: GHC 4115 15-456 Computational Geometry 9 https://www.csd.cs.cmu.edu/academics/undergraduate/overview 21-301 Combinatorics 9 21-484 Graph Theory 9 Carnegie Mellon founded one of the first Computer Science departments in the world in 1965. Today, the Computer Science Department forms the others as designated by the CS Undergraduate Program centerpiece of the School of Computer Science, and is joined by the Human- Computer Interaction Institute, the Institute for Software Research, the One Logics/Languages elective (min. 9 units): Computational Biology Department, the Language Technologies Institute, 15-312 Foundations of Programming Languages 12 the Machine Learning Department, and the Robotics Institute. Together, 15-317 Constructive Logic 9 these units make the School of Computer Science a world leader in research 15-414 Bug Catching: Automated Program Verification 9 and education. and Testing The B.S. program in Computer Science combines a solid core of Computer 15-424 Foundations of Cyber-Physical Systems 12 Science courses with the ability to gain substantial depth in another area 21-300 Basic Logic 9 through a required minor in a second subject. In addition, the curriculum 80-310 Formal Logic 9 provides numerous choices for science, engineering, humanities and fine arts courses. As computing is a discipline with strong links to many 80-311 Undecidability and Incompleteness 9 fields, this provides students with unparalleled flexibility to pursue allied others as designated by the CS Undergraduate Program (or non-allied) interests. -
Linux on Z Platform ISV Strategy Summary
Linux on IBM Z / LinuxONE Open Source Ecosystem Status and Strategy for NY/NJ Linux Council Meeting on March 1, 2019 Enyu Wang Program Director, Ecosystem Strategy and Business Development [email protected] As an enterprise platform WHY ARE WE INVESTING IN OPEN SOURCE ECOSYSTEM? IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 2 TREND: Enterprise Going Open Source • 83% hiring managers surveyed for the 2018 Open Source Jobs report said hiring open source talent was a priority this year • Some of the biggest trends in enterprise IT, such as containers and hybrid cloud, rely on open source technologies including Linux and Kubernetes IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 3 OPEN SOURCE Building Blocks for Enterprise Digital Transformation IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 4 OUR MISSION Provide a Rich and Robust Ecosystem to Clients. Help Accelerate their Digital Transformation IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 5 Rich Open Source Ecosystem on Linux on Z/LinuxONE Analytics/ Distributions Hypervisors PaaS / IaaS Languages Runtimes Management Database ML LPA R IBM Cloud Private Community Versions LLVM vRealize LXD (Ubuntu) Apache Tomcat DPM Db2 IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 6 Building an Open Ecosystem Isn’t Just Porting… IBM Z / Open Source Ecosystem / Mar 1, 2019 / © 2019 IBM Corporation 7 Composition of Open Source Ecosystem on Z – a combination of community based projects and vendor -
2010 CERT Research Report
The CERT® Program’s research mission is to leverage our operational experience and access to state-of-the-art research to fill gaps for our customers, collaborate with the cyber security research community, and provide longer-range perspectives on cyber-security research, technology, and policy. Table of Contents CERT Research Vision .................................................... 2 Executive Summary ..................................................... 3 2010 Research Report Abstracts . 4 CERT in the News ....................................................... 7 Special Project: Recommending Cyber Security Research Topics ................. 9 Critical Code ............................................................11 Insider Threat .......................................................... 14 Insider Threat Vulnerability Assessment Measurement . 17 Modeling and Analysis of Insider Fraud . 19 Insider Threat Lab . 21 Insider Threat in the Financial Services Sector . 22 Preventing the Federal Government from Being the Victim of Identity Theft . 24 Secure Coding ......................................................... 25 Secure Coding Initiative . 28 Software Security Assurance ............................................. 34 Building Assured Systems Framework (BASF) . 37 Supply Chain Assurance . 39 Measuring Software Security Assurance . 42 Security Requirements Engineering . 45 Using Trusted Hardware as a Foundation for Cyber Security . 47 Analysis of Catastrophic Failures . 50 Complexity Modeling and Analysis . 52 Science of Cyber -
Program and Guidelines
PROGRAM AND GUIDELINES Friday-Saturday, October 5-6, 2018 The Tepper Quad, Carnegie Mellon University Pittsburgh, Pennsylvania PRESENTED BY: EVENT SCHEDULE FRIDAY 4:00 p.m. Check-In & Registration October 5 6:00 p.m. Opening Ceremony featuring Thomas Tull, founder and CEO of Tulco Simmons Auditorium 6:40 p.m. Pain Points Presentation 7:00 p.m. Hacking Teams form Mentor Shift 1 begins 7:30 p.m. Hackers begin! 8:00 p.m. Dinner Level 1, Outside Simmons Auditorium Genius Session Sign-ups open 9:00 p.m. Team Registration deadline 10:00 p.m. Mentor Shift 1 concludes 12:00 a.m. Snack SATURDAY Level 1, Outside Simmons Auditorium October 6 8:00 a.m. Mentor Shift 2 begins 9:00 a.m. Breakfast Level 1, Outside Simmons Auditorium 10:00 a.m. Genius Sessions (by appointment) 11:00 a.m. Mentor Shift 2 concludes 11:30 a.m. Mentor Shift 3 begins 12:00 p.m. “The Power of Connection” Presentation by Nick Adkins Level 3, Inside Swartz Center for Entrepreneurship 1:00 p.m. Lunch Level 1, Outside Simmons Auditorium 2:00 p.m. Mentor Shift 3 concludes 3:00 p.m. Hacking ends, submissions due! 4:00 p.m. Semi-final Presentations 6:00 p.m. Final Presentations Simmons Auditorium 7:35 p.m. Awards Announced 8:00 p.m. Networking/Winners’ Circle Photos event updates to be provided at hackthishelpkids.com & via text notifications OUR GENEROUS SPONSORS WELCOME Thank you for putting your skills to the test for the benefit of children’s health. -
School of Computer Science 1
School of Computer Science 1 School of Computer Science Martial Hebert, Dean also available within the Mellon College of Science, the Dietrich College of Humanities and Social Sciences, the College of Engineering and the College Thomas Cortina, Associate Dean for Undergraduate Programs of Fine Arts. Veronica Peet, Assistant Dean for Undergraduate Experience Location: GHC 4115 www.cs.cmu.edu/undergraduate-programs (http://www.cs.cmu.edu/ Policies & Procedures undergraduate-programs/) Carnegie Mellon founded one of the first Computer Science departments Academic Standards and Actions in the world in 1965. As research and teaching in computing grew at a tremendous pace at Carnegie Mellon, the university formed the School Grading Practices of Computer Science (SCS) at the end of 1988. Carnegie Mellon was one of the first universities to elevate Computer Science into its own Grades given to record academic performance in SCS are academic college at the same level as the Mellon College of Science and detailed under Grading Practices at Undergraduate Academic the College of Engineering. Today, SCS consists of seven departments Regulations (http://coursecatalog.web.cmu.edu/servicesandoptions/ and institutes, including the Computer Science Department that started it undergraduateacademicregulations/). all, along with the Human-Computer Interaction Institute, the Institute for Software Research, the Computational Biology Department, the Language Dean's List WITH HIGH HONORS Technologies Institute, the Machine Learning Department, and the Robotics SCS recognizes each semester those undergraduates who have earned Institute. Together, these units make SCS a world leader in research and outstanding academic records by naming them to the Dean's List with education. A few years ago, SCS launched two new undergraduate majors High Honors.