|I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer Et Al

Total Page:16

File Type:pdf, Size:1020Kb

|I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer Et Al |I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer et al. (45) Date of Patent: Apr. 8, 1997 54 EXECUTING NETWORK LAYERED Hartig et al., "Operating System(s) on Top of Persistent COMMUNICATIONS OF A FIRST SYSTEM Object Systems-The Birlix Approach”, Jan. 1992, pp. ON A SECOND SYSTEM USINGA COMMUNICATION BRIDGE TRANSPARENT 790-799, IEEE. TO THE DIFFERENT COMMUNICATION LAYERS Primary Examiner-Thomas C. Lee 75 Inventors: Bruce D. Mayer, Arlington; Martin Assistant Examiner-Sang Hui Kim Berkowitz, Newton; Sudershan K. Attorney, Agent, or Firm-Gary D. Clapp, Faith F. Driscoll; Sharma, Brookline, all of Mass. John S. Solakian 73) Assignee: Bull HN Information Systems Inc., Billerica, Mass. (57) ABSTRACT 21 Appl. No.: 127,925 A layered communications bridge mechanism connected 22 Filed: Sep. 28, 1993 between an upper communications layer of a first commu (51) int. Cl. ..................... G06F 3/00 nications layer mechanism executing in a user level process 52 U.S. Cl. ................... 395/500; 364/264.3; 364/2809; and a layered communication kernel process of a second - 364/280; 364/DIG. 1 system corresponding to the next lower layers of the first 58) Field of Search .................................... 395/500, 2.86, communications layer mechanism. The bridge includes an 395/700, 650, 882, 892 upper bridge mechanism operating to appear to the lowest (56 References Cited layer or the layers of the first communications layer mecha U.S. PATENT DOCUMENTS nism to be the next lower layer of the first layered commu nications mechanism and a lower bridge mechanism oper 4,727,480 2/1988 Albright et al.. 4,812,975 3/1989 Adachi et al. .......................... 395/500 ating to appear to the upper communications layer of the 5,136,709 8/1992 Shirakake et al... ... 395/700 second system kernel process to be the next higher layer of 5,179,666 1/1993 Rimmer et al...... ... 395/882 the communications layers of the second system and the 5,210,832 5/1993 Maier et al. ........ ... 395/375 5,265,252 11/1993 Rawson, III et al. ... 395/700 upper and lower bridge mechanisms operate to map between 5,416,917 5/1995 Adair et al. ............................. 395/500 the operations of the lower layer of the first communications FOREIGN PATENT DOCUMENTS layer mechanism and the upper layer of the layered com munications layers of the second system. The upper bridge 0.1244935 8/1991 Japan. mechanism executes in the second system user process and OTHER PUBLICATIONS the lower communications layer bridge mechanism executes "Bull repond a ses utilisateurs', 01 Informatique, Jun. 12, in an emulator executive level. 1992. “HP 3000 Emulation on HP Precision Architecture Com puters', by Arndt B. Bergh, et al., Dec., 1987, Hewlett-Packard Journal, pp. 87-89. 7 Claims, 6 Drawing Sheets FOSL U.S. Patent Apr. 8, 1997 Sheet 1 of 6 5,619,682 "OIHI 0!WELSAS1SHI-H ||]-z?TEMAET?72LavsBEST! 91 U.S. Patent Apr. 8, 1997 Sheet 4 of 6 5,619,682 100 SEMAPHORE FIG. 4 5,619,682 1. 2 EXECUTING NETWORK LAYERED the specific operations desired by the user to perform the COMMUNICATIONS OF A FRST SYSTEM user's work, such as word processing, spread sheets, and so ON A SECONO SYSTEM USING A forth. The hardware is comprised of the central processing COMMUNICATION BRIDGE TRANSPARENT unit, the memory and the input/output devices, such as TO THE DEFERENT COMMUNICATION 5 displays, printers, disk drives and communications devices, LAYERS which actually perform the required operations at the detailed level. CROSS REFERENCES TO RELATED The operating system is functionally located "between' APPLICATIONS the user programs and the hardware and is comprised of a set The present patent application is related to: 10 of programs and routines that control the overall operations of the system and a set of routines that control the detailed U.S. patent application Ser. No. 08/128,456, filed Sep. 28, operations of the hardware as necessary to manage and 1993, for Executing Programs Of A First System. On A execute the operations directed by the applications pro Second System by Richard S. Bianchi et al. pending; grams. In this regard, the operating system is frequently U.S. patent application Ser. No. 08/127,397, filed Sep. 28, 15 comprised of two functional layers. One layer, frequently 1993, for Emulation of Disk Drivers of AOf A First System referred to, for example, as the "executive' level, interfaces On A Second System by Richard S. Bianchi et al. now U.S. with the applications programs and is comprised of a set of Pat. No. 5,373,984; and programs and routines and data structures which create U.S. patent application Ser. No. 08/128,391, filed Sep. 28, operations referred to as "processes' or “tasks" which 1993, for Emulation Of The Memory Functions Of A First 20 execute, at a high level, the operations required by the user System On A Second System by Marek Grynberg et al. programs. The "executive' level also includes a set of which issued as U.S. Pat. No. 5,515,525. programs, routines and data structures that are used to manage and execute the operations required by the applica FIELD OF THE INVENTION tion programs and which generate requests to the lower level 25 The present invention relates to a method and apparatus of the operation system. for executing programs of a first system on a second system The lower level of the operating system, frequently and, more particularly, to a method and apparatus for emu referred to as the "kernel', interfaces with the hardware lating a first operating system and hardware platform on a elements of the system and is comprised of a set of routines, second operating system and hardware platform. frequently referred to as "drivers' or "servers', for detailed 30 control of the operations of the system hardware. The kernel BACKGROUND OF THE INVENTION routines receive the requests for operations from the execu tive level and in turn direct the detailed operations of the A recurring problem in computer systems is that of system hardware elements. executing, or running, programs written for a first computer The basic problem in moving an application program system having a first hardware platform, that is, processor, 35 from a first system to a second system arises because, memory and input/output devices, on a second computer although the system is comprised of separate functional system having a second and different hardware platform. layers, the characteristics of each functional layer and of the The problem is compounded when the second computer functions and operations performed by each functional layer system, as is frequently the case, uses a second operating are affected by the characteristics and functions of at least system which may be substantially different from the oper the next lower layer. That is, the application programs are ating system of the first system. written to take maximum advantage of the characteristics This problem usually occurs when a user or a manufac and features of the executive level of the operating system. turer of computer systems is attempting to move application The executive level of the operating system, in turn, is programs from a first system to a second system to upgrade 45 designed to take maximum advantage of the characteristics or update the computer system while, at the same time, and features of the kernel level of the operating system while preserving the user's investment in application programs the kernel level is similarly designed not only to carry out and data created through the application programs. This the operations and functions required by the executive level situation may arise, for example, when moving application but is influenced by the characteristics and functional fea programs from one proprietary system, that is, a system 50 tures of the system hardware devices. having an operating system and hardware platform which is It is apparent, therefore, that the characteristics of a particular to one manufacturer, to another proprietary system system as viewed by an application program are influenced OR when moving application programs from a proprietary by features and functions of the system from the executive system to a "commodity' system, that is, a system having a level of the operating system down to the actual hardware hardware platform and operating system which is used by 55 elements of the system. As a consequence, and even though many manufacturers. systems are designed to maintain the maximum clear sepa The problems arising from moving application programs ration and independence between functional layers, a func from a first system to a second system arise from the tional layer created for one system, such as an application fundamental functional structure of the systems and from the program or an operating system, will rarely be compatible interactions and interrelationships of the functional elements with or function with a functional layer from another system. of the systems. The two primary approaches taken in the prior art for Computer systems are constructed as layered levels of moving an application program from a first system to a functionality wherein the three principal layers in any sys second system are the recompilation of the application tem are, from top to bottom, the user programs, the operating program to run on the second system directly and the system and the hardware "platform'. The user programs 65 emulation of the first system on the second system so that the provide the primary interface to the users and provide the application program can be run unchanged on the second functions and operations to control the system in performing system.
Recommended publications
  • Dwarf's Guide to Debian GNU/Linux
    Dwarf’s Guide to Debian GNU/Linux 2001 Dale Scheetz Dwarf’s Guide to Debian GNU/Linux Copyright c 2001 Dale Scheetz Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being Chapter 1 Introduction, with no Front-Cover Texts, and with the Back-Cover Texts being “The early development of the material in this work was produced with the financial support of Planet Linux. This support was intrumental in bringing this project to completion.” A copy of the license is included in the section entitled “Appendix 9: GNU Free Documentation License” which can be found on page 271. Trademark Acknowledgements All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. The publisher cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Apple and Macintosh are registered trademarks of Apple Computer, Inc. CP/M is a registered trademark of Caldera, Inc. IBM is a registered trademark of International Business Machines, Inc. MS is a trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. X Window System is a registered trademark of X Consortium, Inc. ii dedicated to Linux users everywhere iii CREDITS First I want to thank Ian Murdock for writing the History section. His per- spectives on those early years have helped latecomers like Dwarf understand the founding principles upon which Debian is based.
    [Show full text]
  • Open Source Watershed: Studying the Relationship Between Linux Package and Distribution Releases
    Open Source Watershed: Studying the Relationship Between Linux Package and Distribution Releases by Scott Shawcroft A senior thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science With Departmental Honors Computer Science & Engineering University of Washington June 2009 Presentation of work given on June 4 2009_ Thesis and presentation approved by Date Contents 1 Introduction 3 2 Background 3 3 Procedure 4 3.1 Gathering Data . 4 3.1.1 Filename Processing . 5 3.1.2 Distributions . 5 3.1.3 Packages . 7 3.2 Normalization . 8 3.2.1 Naming . 8 3.2.2 Version Ordering . 9 3.2.3 Gauging Data Quality . 10 4 Results 10 4.1 Analysis . 11 4.1.1 Upstream Releases Count . 11 4.1.2 Obsolete Packages . 12 4.1.3 Versions Behind . 13 4.1.4 Lag . 14 4.1.5 Fixed Versus Rolling Release Cycles . 15 4.2 Website . 16 4.2.1 Packages . 16 4.2.2 Distributions . 17 5 Conclusion 17 6 Future Work 18 7 Acknowledgments 19 1 Abstract Open Source Watershed is a research project aimed at gathering data to study the relationship between individual software projects, also known as upstream, and GNU/Linux distributions, also known as downstream. This is done by tracking package names, versions and release dates both upstream and downstream. Data is collected, or crawled, through a num- ber of Python scripts. Upstream sources are commonly crawled by listing http or ftp directories or RSS feeds. Eight different distributions are crawled. They were chosen because of their unique release and package management styles.
    [Show full text]
  • Software Libre Vs Software Propietario Ventajas Y Desventajas
    Software libre vs software propietario Ventajas y desventajas Culebro Ju´arez, Montserrat. G´omezHerrera, Wendy Guadalupe. Torres S´anchez, Susana. M´exico,Mayo 2006. ii ´Indice general Agradecimientos. VII Pr´ologo. IX Introducci´on. 1 1. Conceptos fundamentales sobre software. 3 1.1. Definici´onde software. 3 1.2. Definici´onde software libre. 3 1.3. Definici´onde software propietario. 4 1.3.1. Software propietario. 4 1.3.2. Objeciones al t´ermino “propietario”. 5 1.3.3. Software privativo. 5 1.3.4. Objeciones al t´ermino “privativo”. 5 1.3.5. Software no libre. 5 1.3.6. Objeciones al t´ermino “no libre”. 5 1.3.7. Software privado. 5 1.3.8. Objeciones al t´ermino “privado”. 6 1.3.9. Software con propietario. 6 1.3.10. Objeciones al t´ermino “con propietario”. 6 1.4. Software semilibre. 6 1.5. Freeware. 6 1.6. Shareware. 7 1.7. Abandonware. 7 1.8. Warez. 7 2. Visi´onhist´oricadel software. 9 2.1. La importancia del software. 9 2.2. Incursi´onde los hackers. 10 2.3. La cultura Unix. 10 2.4. GNU. 11 2.5. Libertad y costo. 12 2.6. Linux. 12 2.7. Open Source (c´odigoabierto). 14 2.8. El papel del software libre en el crecimiento de Internet. 14 2.9. Formatos abiertos. 15 2.10. Visi´onhist´oricadel Software propietario (Microsoft). 15 iii 3. Copyright, copyleft y patentes. 17 3.1. Copyright. 17 3.1.1. Derecho de autor y Copyright. 17 3.1.2. El contrato de copyright.
    [Show full text]
  • Open Source Software – Breaking the Commercial Myths Abstract Where
    Open Source Software – Breaking the IJoAT Commercial Myths Volume 3, No 1 International Journal of Advancements in Technology - ISSN : 0976-4860 (Online) Guest Editorial Article Atul Sharma, Ph. D. Abstract Open source technologies need no formal introduction. In a technological era where major giants like Microsoft are coming up with new versions of their software in each quarter, there are open source players like Ubuntu, which are gaining popularity at amazingly crazy rates. Global community consisting of thousands of best brains in this world are coming up together to build up robust Open Source technologies which are in no way lesser in features when compared to their commercial counterparts. In fact if we go out and ask Open Source enthusiast, we find that they are far more efficient, reliable, and over all customizable. From IBM to Google, Firefox to Wikipedia – some of today's best software is based on an open-source model [1]. Open Source communities like Ubuntu share the principle of “Shared efforts. Shared principles. No cost.”, that’s why what we get is a world class “free” software. Where do we find Open Source Look into any technological field, and we find a reliable Open source available at our disposal. Talk about Web-Servers, and we have a big name of Apache HTTP Server [3] probably outshining [4] its commercial counterpart “Microsoft IIS”. For ecommerce, initiating a new branch of the economy, even in small company is nowadays not so hard, all credited to OSS like osCommerece, Magento and OpenCart [5]. We have OSS in internet browsers like Mozilla Firefox [6], VoIP applications like Asterisk (PBX) [7], and office suite of inter-related desktop applications in form of OpenOffice [8].
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • Version : 2009K Vendor: Centos Release : 1.El5 Build Date
    Name : tzdata Relocations: (not relocatable) Version : 2009k Vendor: CentOS Release : 1.el5 Build Date: Mon 17 Aug 2009 06:43:09 PM EDT Install Date: Mon 19 Dec 2011 12:32:58 PM EST Build Host: builder16.centos.org Group : System Environment/Base Source RPM: tzdata-2009k- 1.el5.src.rpm Size : 1855860 License: GPL Signature : DSA/SHA1, Mon 17 Aug 2009 06:48:07 PM EDT, Key ID a8a447dce8562897 Summary : Timezone data Description : This package contains data files with rules for various timezones around the world. Name : nash Relocations: (not relocatable) Version : 5.1.19.6 Vendor: CentOS Release : 54 Build Date: Thu 03 Sep 2009 07:58:31 PM EDT Install Date: Mon 19 Dec 2011 12:33:05 PM EST Build Host: builder16.centos.org Group : System Environment/Base Source RPM: mkinitrd-5.1.19.6- 54.src.rpm Size : 2400549 License: GPL Signature : DSA/SHA1, Sat 19 Sep 2009 11:53:57 PM EDT, Key ID a8a447dce8562897 Summary : nash shell Description : nash shell used by initrd Name : kudzu-devel Relocations: (not relocatable) Version : 1.2.57.1.21 Vendor: CentOS Release : 1.el5.centos Build Date: Thu 22 Jan 2009 05:36:39 AM EST Install Date: Mon 19 Dec 2011 12:33:06 PM EST Build Host: builder10.centos.org Group : Development/Libraries Source RPM: kudzu-1.2.57.1.21- 1.el5.centos.src.rpm Size : 268256 License: GPL Signature : DSA/SHA1, Sun 08 Mar 2009 09:46:41 PM EDT, Key ID a8a447dce8562897 URL : http://fedora.redhat.com/projects/additional-projects/kudzu/ Summary : Development files needed for hardware probing using kudzu.
    [Show full text]
  • Quick&Easy Configuration HOWTO
    Quick&Easy Configuration HOWTO Antonio Fragola Quick&Easy Configuration HOWTO Antonio Fragola Copyright © 2000 - 2001 Antonio Fragola Configurazione rapida e facile di una LinuxBox domestica. Diario delle revisioni Revisione 2.7 - 27 Agosto 2001 ampliamento della sezione Mutt (GPG e Hooks), e mini-sezione su grepmail Revisione 2.6 - 20 Agosto 2001 ampliamento della sezione Procmail (antispam e trucchetti) Revisione 2.5 - 5 Agosto 2001 nuova sezione Xinetd, modifiche sezioni Bash e Slrn (0.9.7.1) Revisione 2.4 - 4 Agosto 2001 nuova sezione sul Chroot del DNS Revisione 2.3 - 3 Agosto 2001 nuova sezione sui Wheelmouse Revisione 2.2 - 2 Agosto 2001 Firewall completamente modulare e modifiche Leafnode (filterfile e xinetd) Revisione 2.1 - 1 Agosto 2001 piccole modifiche sezioni Partizioni e Masterizzazione Revisione 2.0 - 1 Febbraio 2001 modularizzazione della sezione Firewall Revisione 1.9 - 29 Gennaio 2001 aggiunta la nuova sezione Masterizzazione Revisione 1.8 - 11 Gennaio 2001 revisione della sezione Dns Revisione 1.7 - 23 Novembre 2000 aggiunta la nuova sezione Servizi Revisione 1.6 - 31 Ottobre 2000 passaggio dal DTD Linuxdoc a Docbook Revisione 1.5 - 1 Ottobre 2000 ampliata le sezioni Postfix e Leafnode Revisione 1.4 - 14 Luglio 2000 corretti alcuni errori e aggiunta l’introduzione a Slrn Revisione 1.3 - 7 Luglio 2000 aggiunte le sottosezioni filesystem (Partizioni) e l’introduzione del Firewall Revisione 1.2 - 1 Luglio 2000 primo rilascio ufficiale su Sourceforge Revisione 1.1 - 23 Giugno 2000 aggiunta la breve sezione Varie Revisione 1.0 - 7 Giugno 2000 completata la sezione di Procmail Revisione 0.9 - 23 Maggio 2000 completato lo script di Firewall Revisione 0.8 - 5 Maggio 2000 inserimento della sezione Partizioni, estratta da un lavoro precedente Revisione 0.7 - 30 Aprile 2000 aggiunta la sezione Kernel Revisione 0.6 - 21 Aprile 2000 aggiunte le sezioni Mutt e Slrn Revisione 0.5 - 17 Marzo 2000 inizio stesura (bel modo di passare il giorno del proprio compleanno..
    [Show full text]
  • Software Libre Vs Software Propietario Ventajas Y Desventajas
    Software libre vs software propietario Ventajas y desventajas Culebro Ju´arez, Montserrat. G´omezHerrera, Wendy Guadalupe. Torres S´anchez, Susana. M´exico,Mayo 2006. ii ´Indice general Agradecimientos. VII Pr´ologo. IX Introducci´on. 1 1. Conceptos fundamentales sobre software. 3 1.1. Definici´onde software. 3 1.2. Definici´onde software libre. 3 1.3. Definici´onde software propietario. 4 1.3.1. Software propietario. 4 1.3.2. Objeciones al t´ermino “propietario”. 5 1.3.3. Software privativo. 5 1.3.4. Objeciones al t´ermino “privativo”. 5 1.3.5. Software no libre. 5 1.3.6. Objeciones al t´ermino “no libre”. 5 1.3.7. Software privado. 5 1.3.8. Objeciones al t´ermino “privado”. 6 1.3.9. Software con propietario. 6 1.3.10. Objeciones al t´ermino “con propietario”. 6 1.4. Software semilibre. 6 1.5. Freeware. 6 1.6. Shareware. 7 1.7. Abandonware. 7 1.8. Warez. 7 2. Visi´onhist´oricadel software. 9 2.1. La importancia del software. 9 2.2. Incursi´onde los hackers. 10 2.3. La cultura Unix. 10 2.4. GNU. 11 2.5. Libertad y costo. 12 2.6. Linux. 12 2.7. Open Source (c´odigoabierto). 14 2.8. El papel del software libre en el crecimiento de Internet. 14 2.9. Formatos abiertos. 15 2.10. Visi´onhist´oricadel Software propietario (Microsoft). 15 iii 3. Copyright, copyleft y patentes. 17 3.1. Copyright. 17 3.1.1. Derecho de autor y Copyright. 17 3.1.2. El contrato de copyright.
    [Show full text]
  • Heal Th Care Services
    ALAMEDA COUNTY HEALTH CARE SERVICES AGENCY REBECCA GEBHART, Interim Director AGENDA ITEM NO March21, 2017 ADMINISTRATION & INDIGENT HEAL TH 1000 San Leandro Boulevard, Suite 300 San Leandro, CA 94577 TEL: (510) 618-3452 FAX: (510) 351-1367 February 14, 2017 The Honorable Board of Supervisors County of Alameda 1221 Oak Street Oakland, CA 94612 SUBJECT: APPROVE THE STANDARD SERVICES AGREEMENT WITH YELLOWFINBI NORTH AMERICA IN THE AMOUNT OF $234,416 TO PROVIDE DASHBOARD AND REPORT GENERATION WEB BASED SOFTWARE FOR THE PERIOD OF FEBRUARY 1, 2017 THROUGH JUNE 30, 2019 Dear Board Members, RECOMMENDATION: Approve and authorize the President of the Board of Supervisors to sign the standard services agreement with Yellowfinbi North America Inc. (Principal: Bryan Reece, Director; Location: Ketchum, ID; Procurement Contract: 14638) to provide web-based dashboard reporting system services in an amount not to exceed $234,416 for the term of 2/1117-6/30/19 (29 months). DISCUSSION/SUMMARY: Your approval of the Standard Services Agreement will allow Behavioral Health Care Services (BHCS) to continue to provide Yellowfins' licensed software and support to generate dashboard reports which provide program analysis of BHCS delivery system to our community. The dashboards will provide BHCS staff with real-time access to service utilization and performance metric data. This software will be deployed across all of Health Care Services Agency and will serve to reinforce and facilitate a culture of data-driven decision-making. On May 2, 2012, the Board of Supervisors approved a contract agreement (procurement contract 7601) with Emanio Inc. to develop and install a web-based dashboard and report generation system that was based on the software owned and developed by Y ellowfin International Pty.
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]
  • Leafnode FAQ Dr
    Leafnode FAQ Dr. Cornelius Krasel Matthias Andree Copyright © 2002 Cornelius Krasel Copyright © 2002, 2003, 2004, 2005, 2006, 2009 Matthias Andree $Date: 2006/04/09 17:19:32 $ Table of Contents Leafnode frequently asked questions, with answers. .............................................................................. 1 Installation-related problems, including relocations ...................................................................... 1 Configuration problems ........................................................................................................... 2 Problems at run time ............................................................................................................... 3 Problems with particular newsreaders ........................................................................................ 5 Obtaining a stack backtrace .............................................................................................................. 6 From a core file. .................................................................................................................... 6 Running a program under gdb supervision. ................................................................................. 6 From a running/hanging leafnode program. ................................................................................. 7 Red Hat and the inetd vs. xinetd issue. ............................................................................................... 7 Leafnode frequently asked questions, with an-
    [Show full text]
  • Open Source Freeware : 400+ Free Applications and Utilities
    Open Source Freeware : 400+ free applications and utilities Anti-Spyware/Anti-Virus/Anti-Rootkit Freeware Utilities : I want to ... 1. protect the computer against viruses : ClamWin Free Antivirus 2. protect the computer against viruses : The OpenAntivirus Project 3. protect the computer with a firewall : PktFilter 4. Check out more free software : I want a Freeware Utility to ... 450+ common problems solved. 5. Suggestions/corrections : eConsultant : Blog Archive : I want Open Source Freeware Audio/Music/MP3/Real/Wav Freeware Utilities : I want to ... 1. adjust sound volume of mp3 files : MP3Gain 2. burn an audio CD : Easy Burning 3. burn an audio CD : cdrtfe 4. burn an audio CD : jCDWriter 5. copy an audio CD : CDRDAO 6. correct/edit tags of mp3 files : Mp3 Tag Tools 7. correct/edit tags of mp3 files : MP3 Book Helper 8. correct/edit tags of mp3 files : MusicBrainz Tagger! 9. correct/edit tags of mp3 files : MP3-Info Extension 10. cut/edit/mix/record/remix sound files : Audacity 11. manage CD collection : Ant Movie Catalog 12. mix audio files : Mixere 13. play an audio file : Coolplayer 14. play an audio file : LongPlayer 15. play an audio file : SnackAmp 16. play an audio file : NotifyCD 17. play an audio file : musikCube 18. play an audio file : Delphamp 19. play an audio file : Zinf 20. record save/ audio/video from screen : Krut Computer Recorder 21. record/save an internet audio broadcast : Juice 22. record/save streaming music : ASFRecorder 23. record/save streaming music : Streamripper for Winamp 24. record/save streaming music : StationRipper 25. rip music from a CD : MediaCoder 26.
    [Show full text]