PC Vs. Thin Client Performance in Typical Office Application Scenarios
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Access Control
Security Engineering: A Guide to Building Dependable Distributed Systems CHAPTER 4 Access Control Going all the way back to early time-sharing systems, we systems people regarded the users, and any code they wrote, as the mortal enemies of us and each other. We were like the police force in a violent slum. —ROGER NEEDHAM Microsoft could have incorporated effective security measures as standard, but good sense prevailed. Security systems have a nasty habit of backfiring, and there is no doubt they would cause enormous problems. —RICK MAYBURY 4.1 Introduction Access control is the traditional center of gravity of computer security. It is where se- curity engineering meets computer science. Its function is to control which principals (persons, processes, machines, . .) have access to which resources in the sys- tem—which files they can read, which programs they can execute, how they share data with other principals, and so on. NOTE This chapter necessarily assumes more computer science background than previous chapters, but I try to keep it to a minimum. 51 Chapter 4: Access Controls Figure 4.1 Access controls at different levels in a system. Access control works at a number of levels, as shown in Figure 4.1, and described in the following: 1. The access control mechanisms, which the user sees at the application level, may express a very rich and complex security policy. A modern online busi- ness could assign staff to one of dozens of different roles, each of which could initiate some subset of several hundred possible transactions in the system. Some of these (such as credit card transactions with customers) might require online authorization from a third party while others (such as refunds) might require dual control. -
Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris)
Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris) April 2011 Sun Ray Server Software 4.2 Installation and Configuration Guide (Solaris) Copyright © 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). -
Openoffice.Org News Highlights Table of Contents Octo Ber 2004
OpenOffice.org News Highlights Table of Contents Octo ber 2004 ................................................................................................ R eplacing FrameMaker with OOo Writer ............................................................................................. Ger mans claim Linux lowers costs ......................................................................................................... Ope n approach offers Mindef more choice ............................................................................................ Ball mer calls for horse-based attack on Star Office ............................................................................... Ope n for Business - The 2004 OfB Choice Awards .............................................................................. Sep tember 2004 ............................................................................................ Ope nOffice.org reveals marketing ambitions ......................................................................................... No nprofit brings Linux and open source to Hawaii ............................................................................... UK charity builds Linux network on a shoestring .................................................................................. N SW opens door to Linux offers ............................................................................................................ L eading Edge Forum Report 2004 - Open Source: Open for Business ................................................. -
Sun Microsystems Solaris 10 What's
Solaris 10 What’s New Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 817–0547–15 January 2005 Copyright 2005 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, SunVTS, Java, J2SE, J2EE, JavaServer, JumpStart, Sun Fire, StarOffice, Sun Blade, Sun Ray, Solstice Enterprise Agents, CacheFS, Sun StorEdge, and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. FireWire is a trademark of Apple Computer, Inc., used under license. Netscape and Netscape Navigator are trademarks or registered trademarks of Netscape Communications Corporation. Mozilla is a trademark or registered trademark of Netscape Communications Corporation in the United States and other countries. -
Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux)
Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux) April 2011 Sun Ray Server Software 4.2 Installation and Configuration Guide (Linux) Copyright © 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). -
1 Establishment of the First Java 3DTM Enabled CAVE a Whitepaper
Establishment of the first Java 3DTM enabled CAVEÒ1 A Whitepaper Christoph W. Sensen, University of Calgary, Sun Center of Excellence for Visual Genomics Jeff Brum, Fakespace Systems, Kitchener, Ontario Paul Gordon, University of Calgary, Sun Center of Excellence for Visual Genomics Mark Hood, Sun Microsystems, Palo Alto, CA Gary Lindahl, Fakespace Systems, Kitchener, Ontario Michael Schulman, Sun Microsystems, Palo Alto, CA Chris Spindler, Sun Microsystems of Canada, Calgary, Alberta Megan Stuart, Sun Microsystems of Canada, Calgary, Alberta Stefan Unger, Sun Microsystems, Palo Alto, CA 1 Ò CAVE is a registered trademark of the University of Illinois Board of Trustees 1 Introduction The name "CAVE" is a recursive acronym (CAVE Automatic Virtual Environment). The CAVE was researched and developed by the Electronic Visualization Laboratory, at the University of Illinois at Chicago2 as a tool for scientific visualization. Since it's premiere at the 1992 SIGGRAPH conference, the CAVE has achieved international recognition as the pinnacle of immersive virtual reality system technology, providing a compelling display environment for science, engineering, and art. The intent of the CAVE is to facilitate “suspension of disbelief” by making the virtual environment as realistic as possible. The quality of the graphical images is of paramount importance to realism. Depending upon the model or environment being explored, the speed of the computer’s graphic system will affect the speed of image update. The layout of the physical CAVE structure itself (typically at least three walls with a 270 degree angle and a floor display) will also affect the sense of virtual presence. Today, the CAVE technology has been commercialized and is marketed by Fakespace Systems Inc. -
Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods. -
The Basic Economics of Internet Infrastructure
Journal of Economic Perspectives—Volume 34, Number 2—Spring 2020—Pages 192–214 The Basic Economics of Internet Infrastructure Shane Greenstein his internet barely existed in a commercial sense 25 years ago. In the mid- 1990s, when the data packets travelled to users over dial-up, the main internet T traffic consisted of email, file transfer, and a few web applications. For such content, users typically could tolerate delays. Of course, the internet today is a vast and interconnected system of software applications and computing devices, which society uses to exchange information and services to support business, shopping, and leisure. Not only does data traffic for streaming, video, and gaming applications comprise the majority of traffic for internet service providers and reach users primarily through broadband lines, but typically those users would not tolerate delays in these applica- tions (for usage statistics, see Nevo, Turner, and Williams 2016; McManus et al. 2018; Huston 2017). In recent years, the rise of smartphones and Wi-Fi access has supported growth of an enormous range of new businesses in the “sharing economy” (like, Uber, Lyft, and Airbnb), in mobile information services (like, social media, ticketing, and messaging), and in many other applications. More than 80 percent of US households own at least one smartphone, rising from virtually zero in 2007 (available at the Pew Research Center 2019 Mobile Fact Sheet). More than 86 percent of homes with access to broadband internet employ some form of Wi-Fi for accessing applications (Internet and Television Association 2018). It seems likely that standard procedures for GDP accounting underestimate the output of the internet, including the output affiliated with “free” goods and the restructuring of economic activity wrought by changes in the composition of firms who use advertising (for discussion, see Nakamura, Samuels, and Soloveichik ■ Shane Greenstein is the Martin Marshall Professor of Business Administration, Harvard Business School, Boston, Massachusetts. -
ORACLE MAGAZINE Jonathan Vincenzo, Dan Vlamis Is PROVIDED on an “As Is” Basis
JULY/AUGUST 2010 Oracle Enterprise Manager 11g New release delivers business-driven IT management / 21 Deriving and Sharing BI Metadata Integrate Oracle Warehouse Builder 11g Release 2 information with Oracle Business Intelligence Enterprise Edition / 59 Automating Parallelism Take the guesswork out of setting the degree of parallelism for queries / 63 On Connecting, Pivoting, and Learning New Things Our technologist bypasses TNSNAMES.ORA, turns rows to columns, and ORACLE.COM/ORACLEMAGAZINE meets the NO_DATA_FOUND exception / 69 THE VIRTUAL ENTERPRISE From desktop to datacenter, Oracle o ers a complete virtualization solution Strategize. Plan. Execute. Gain more insight with Oracle’s enhanced enterprise performance management solution Java Hits the Road Learn the latest from Java luminaries as the Java Bus goes from code to coast One City, One Week, Three Conferences Oracle OpenWorld, JavaOne, and Oracle Develop converge on San Francisco September 19–23 JA10_cover_R1.indd 2 5/25/10 2:30:41 PM Untitled-2 1 3/22/10 8:42 PM Untitled-2 2 3/22/10 8:42 PM Oracle development PL/SQL Developer by Allround Automations. everywhere... PL/SQL Developer is the Oracle development tool that gives you maximum productivity, ease of use and all the features you need, for a reasonable price. Visit our website for additional details: www.allroundautomations.com/plsqldev 4 FEATURED CONTENT VOLUME XXIV - ISSUE 4 CONTENTS THE VIRTUAL ENTERPRISE /36 Virtualization—of desktop, server, or storage resources—requires a reliable infrastructure, solid plan, and strategic management. The payoffs include IT flexibility and efficiency, as well as server consolidation and lower energy costs. Learn how Oracle’s desktop-to-datacenter solutions can virtualize your enterprise. -
Oracle 1Z0-559 Exam
Oracle 1Z0-559 Exam Volume: 76 Questions Question No : 1 Which three platforms are supported for the Oracle Virtual Desktop client? A. Windows 7 B. Wyse OS C. iPad iOS D. Solaris 10 E. Apple Mac OS X Answer: A,C,E Question No : 2 Identify the Desktop state where the desktop isassigned,butisnot currently in use or the userhaslogged off. A. Available B. Used C. Idle D. Reserved E. Unresponsive Answer: C Question No : 3 Which two hypervisor options do notsupport template revision management from theOracleVDIadmin GUI? A. OracleVirtualBox B. Microsoft Windows2008 Hyper-V Leading the way in IT testing and certification tools, www.examkiller.net Oracle 1Z0-559 Exam C. VMware vSphere D. Citrix XenDesktop Answer: B,C Question No : 4 Users cannot login to their desktops and after investigation it seems to have started right after the primary LDAP server went offline. What settings need to be the same on the primary LDAP server and backup LDAP server so that VDI will continue to operate? A. The same security level, TCP port, base dim, and credentials B. The same hostname,LDAP server, MAC address, and baseDN C. The same DNSname, baseDN, SSLcertificates,andversion ofLDAP D. The same toot password, base DN, SSI certificates, and forest configuration Answer: D Question No : 5 Which two guest operating systemsare supported when deploying a VMware vSphere Desktop Provider within OracleVDI? A. Oracle Linux 5.6 B. Windows 2000 SP4 C. Windows 7 D. Oracle Solaris 10 E. Windows XP Answer: B,E Question No : 6 A customer has an IT group that needs to be able to plug in USB 2.0 devices. -
Sun Ray Software Release Notes Versions 5.3 and 5.3.X
Sun Ray Software Release Notes Versions 5.3 and 5.3.x E25743-05 June 2013 Sun Ray Software Release Notes: Versions 5.3 and 5.3.x Copyright © 2012, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. -
Sun Fire X4170, X4270, and X4275 Server Architectures
SUN FIRE™ X4170, X4270, AND X4275 SERVER ARCHITECTURE Optimizing Performance, Density, and Expandability to Maximize Datacenter Value White Paper April 2009 Abstract In compact 1U and 2U form factors, the Sun Fire X4170, X4270, and X4275 servers combine the power of a new generation of Intel Xeon processors with Sun’s system engineering expertise. Based on Sun’s Open Network System design approach, these servers offer the needed performance, density, and expandability to satisfy demanding datacenter applications, especially for virtualization and consolidation initiatives. This white paper describes the architecture of the Sun Fire X4170, X4270, and X4275 servers, including the processor technology, I/O subsystem, built-in system management features, and range of supported operating systems. Sun Microsystems, Inc. This Page Intentionally Left Blank Sun Microsystems, Inc. Table of Contents Executive Summary . 1 Managing Capacity and Complexity . 2 Introducing the Sun Fire™ X4170, X4270, and X4275 servers . 2 Comparing the Sun Fire X4170, X4270, and X4275 servers . 4 A choice of operating systems . 6 The Intel Advantage . 7 New Intel Core Microarchitecture. 7 Modular architecture . 10 Power management technologies . 10 Intel Xeon Processor 5500 platform . 11 Sun Fire X4170, X4270, and X4275 Server Architectures . 12 Sun Fire X4170 system-level architecture . 12 Sun Fire X4170 server overview. 13 Sun Fire X4170 server enclosure . 14 Sun Fire X4170 server front and rear perspectives . 14 Sun Fire X4270 system-level architecture . 16 Sun Fire X4270 server overview. 17 Sun Fire X4270 server enclosure . 17 Sun Fire X4270 server front and rear perspectives . 18 Sun Fire X4275 system-level architecture . 19 Sun Fire X4275 server overview.