Desarrollo De Herramientas Didácticas Para El Aprendizaje De Symbian OS

Total Page:16

File Type:pdf, Size:1020Kb

Desarrollo De Herramientas Didácticas Para El Aprendizaje De Symbian OS ESCUELA TÉCNICA SUPERIOR DE INGENIERÍA DE TELECOMUNICACIÓN UNIVERSIDAD POLITÉCNICA DE CARTAGENA Proyecto Fin de Carrera Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS AUTOR: Carlos José Piñera Sánchez DIRECTOR: Javier Vales Alonso Octubre / 2007 Autor Carlos José Piñera Sánchez E-mail del Autor [email protected] Director(es) Javier Vales Alonso E-mail del Director [email protected] Codirector(es) - Título del PFC Desarrollo de herramientas didácticas para el aprendizaje de Symbian OS Descriptores Symbian, Sony Ericsson P800, J2ME, C++, Carbide C++, Netbeans Resumen Debido al gran interés que suscitan en la sociedad de hoy en dia los dispositivos móviles, estos, han sufrido una gran evolución en los últimos años. Se han producido una gran cantidad de cambios, tanto en el hardware como en el software ampliando sus capacidades hasta unos límites inimaginables hace algunos años. Este desarrollo ha producido la necesidad de nuevos entornos para los mismos, produciendo el desarrollo de nuevos sistemas operativos encargados de gestionar los dispositivos. Entre todos estos sistemas operativos destaca Symbian OS, ya que nació de un consorcio entre las grandes marcas de desarrollo de tecnología móvil (Nokia, Sony Ericsson, LG, Samsung, etc.) y por tanto ha sido apoyado e incluido en todos sus terminales mas avanzados. Symbian OS es hoy en dia el sistema operativo para sistemas móviles mas expandido. Posee una gran cantidad de peculiaridades que lo hace atractivo para la gestión y desarrollo sobre smartphones. Por todo ello surge la necesidad de aprender a utilizar este sistema operativo. En este proyecto se han desarrollado un completo tutorial de aprendizaje de Symbian/OS, que reúne y explica todas las herramientas que proporciona. Se han explicado pormenorizadamente cada uno de los componentes, con el fin de servir como base para el aprendizaje escalonada en el aprendizaje de las tecnologías involucradas. El conjunto de prácticas propuestas se desarrolla mediante herramientas de emulación, y a través de pruebas directas en el Smartphone de Sony Ericsson P800. Finalmente, se ha completado el proyecto con una discusión de las ventajas y posibles inconvenientes sobre cada uno de los componentes explicados. Titulación Ingeniería Técnica de Telecomunicaciones, Especialidad Telemática Intensificación - Departamento Tecnologías de la información y las comunicaciones Fecha de Presentación Octubre - 2007 Índice General Índice General 1 Introducción . 1 1.1 Planteamiento . 1 1.2 Sistemas Operativos . 1 1.2.1 Funciones básicas . 2 1.2.2 Perspectiva Histórica . 2 1.2.2.1 Problemas de explotación y soluciones iniciales . 3 1.2.2.2 Monitores Residentes . 3 1.2.2.3 Sistemas con almacenamiento temporal de E/S . 4 1.2.2.4 Spoolers . 4 1.2.2.5 Sistemas Operativos Multiprogramados . 4 1.2.3 Llamadas al Sistema Operativo . 5 1.2.3.1 Modos de ejecución en un CPU . 5 1.2.3.2 Llamadas al Sistema . 5 1.2.3.3 Bibliotecas de Interfaz de llamadas al Sistema . 6 1.2.4 Interrupciones y Excepciones . 6 1.2.4.1 Tratamiento de las interrupciones . 6 1.2.4.2 Importancia de las interrupciones . 7 1.2.4.3 Excepciones . 7 1.2.4.4 Clases de Excepciones . 7 1.2.4.5 Importancia de las Excepciones . 7 1.2.5 Componentes de un Sistema Operativo . 8 1.2.5.1 Gestión de procesos . 8 1.2.5.2 Gestión de la memoria principal . 8 1.2.5.3 Gestión de almacenamiento secundario . 8 1.2.5.4 El sistema de E/S . 9 1.2.5.5 Sistema de archivos . 9 1.2.5.6 Sistemas de protección . 10 1.2.5.7 Sistema de comunicaciones . 10 1.2.5.8 Interprete de órdenes . 10 1.2.5.9 Programas de sistema . 10 1.2.5.10 Gestor de recursos . 11 1.2.5.11 Componentes . 11 1.2.5.12 Características . 12 1.2.6 Evolución histórica desde las computadoras hasta los actuales Sistemas Operativos . 12 1.2.6.1 Años 40 . 12 1.2.6.2 Años 50 . 13 1.2.6.3 Años 60 . 13 1.2.6.4 Años 70 . 15 1.2.6.5 Años 80 . 17 Índice General 1.2.6.6 Años 90 . 18 1.3 El Teléfono Móvil . 19 1.3.1 Historia . 19 1.3.2 Generaciones . 21 1.3.2.1 1ª Generación . 21 1.3.2.2 2ª Generación . 21 1.3.2.3 2’5 Generación . 22 1.3.2.4 3ª Generación . 23 1.4 Sistemas Operativos para móviles . 24 1.4.1 Blackberry . 24 1.4.2 Linux . 25 1.4.3 Mac OS X . 25 1.4.4 Windows Mobile . 26 1.4.5 Palm OS . 27 1.4.6 Symbian . 28 1.5 Sony Ericsson P800 . 28 1.6 Objetivos del Proyecto . 29 2 Symbian OS . 31 2.1 Symbian OS . 31 2.2 Principales características de Symbian OS . 33 2.3 Evolución del Sistema Operativo Symbian . 35 2.3.1 Versiones Symbian OS . 36 2.4 Plataformas Subyacentes . 38 2.4.1 Versiones Series “XX” . 40 2.4.2 Versiones UIQ . 41 2.4.3 Similitudes y diferencias entre Series 60 y UIQ . 43 2.5 Symbian OS y Sony Ericsson P800 . 48 2.5.1 Unidad C: . 49 2.5.2 Estructura del Directorio . 49 3 Java . 53 3.1 Java . 53 3.1.1 Historia del lenguaje Java . 54 3.1.2 Futuro de Java . 56 3.1.3 Java e Internet . 57 3.1.4 Historial de versiones . 58 3.1.5 Filosofia . 62 3.1.6 Recursos de Java . 67 3.2 J2ME (Java 2 Micro Edition) . 70 3.2.1 Perfiles, configuraciones y máquinas virtuales . 71 Índice General 3.2.2 Máquinas virtuales de J2ME . 72 3.2.3 Configuraciones . 74 3.2.4 Perfiles en J2ME . 79 3.3 Desarrollo de aplicaciones y uso de herramientas . 83 3.3.1 Introducción a herramientas y entorno Symbian . 83 3.3.1.1 Desarrollo en línea de comandos . 83 3.3.1.2 Desarrollo en entornos visuales (IDE) . 88 3.3.1.3 Creación y codificación de la aplicación Hola Mundo 97 3.3.1.4 Manejo del emulador de Netbeans (Wireless Toolkit) 103 3.3.1.5 Manejo del debugador de Netbeans . 105 3.3.1.6 Ventajas de uso de Netbeans para el desarrollo de aplicaciones en J2ME . 105 3.3.2 Entrada/Salida de datos en J2ME . 108 3.3.2.1 Introducción . 108 3.3.2.2 RMS (Record Management System) . 108 3.3.2.3 Codificación de una aplicación en Modo Agenda 117 3.3.3 Comunicaciones e Intercambio con Symbian OS . 127 3.3.3.1 Introducción . 127 3.3.3.2 WIFI . 127 3.3.3.3 Infrared Data Asociation (IrDA) . 130 3.3.3.4 Bluetooth . 133 3.3.3.5 Codificación de una aplicación que haga uso de la API de Bluetooth . 143 3.3.4 Principales APIs de J2ME . 151 3.3.4.1 Introducción . 151 3.3.4.2 Clases heredadas de J2SE . 152 3.3.4.3 Clases propias de J2ME . 154 3.3.4.4 Interfaz de usuario . 155 3.3.4.5 Display . 156 3.3.4.6 Comandos . 160 3.3.4.7 List . 163 3.3.4.8 TextBox . 167 3.3.4.9 Form . 168 3.3.4.10 Alerts . 171 3.3.4.11 Timers . 175 3.3.4.12 Canvas . 179 3.3.4.13 Coordenadas . 182 3.3.4.14 Font . 183 3.3.4.15 Animaciones . 186 3.3.4.16 Eventos . 190 3.3.5 J2ME y Redes . 196 3.3.5.1 Introducción . 196 3.3.5.2 Diferencias y semejanzas entre J2ME y J2SE . 196 3.3.5.3 Clase Connector . 198 Índice General 3.3.5.4 Comunicaciones HTTP . 203 3.3.5.5 Desarrollo de una aplicación final a modo de ejemplo 210 3.3.5.6 Emulación de la aplicación HogarServlet . 244 4 C++ . 254 4.1 Introducción a C++ . 254 4.2 Conceptos generales de la programación orientada a objetos . 254 4.2.1 Principios . 255 4.2.2 El concepto de Clase . 255 4.2.3 Constructores . 255 4.2.4 Destructores . 256 4.2.5 Funciones Miembro . 256 4.2.6 Plantillas . 256 4.2.7 Clases Abstractas . 257 4.2.8 Espacios de nombres . 257 4.2.9 Excepciones . 258 4.2.10 Herencia . 258 4.2.10.1 Herencia Simple . 258 4.2.10.2 Herencia Múltiple . 260 4.2.11 Sobrecarga de operadores . 260 4.2.12 Biblioteca estandar de plantillas (STL) . 261 4.2.13 Contenedores . 262 4.2.14 Iteradores . 262 4.2.15 Algoritmos . 262 4.3 C++ en Symbian . 264 4.4 Desarrollo de aplicaciones y uso de herramientas . 265 4.4.1 Introducción a herramientas y entorno Symbian . 265 4.4.1.1 Introducción . 265 4.4.1.2 Descarga e instalación de las herramientas necesarias 265 4.4.1.3 Creación de un proyecto con Carbide C++ . 267 4.4.1.4 Implementación de la aplicación Hola Mundo . 272 4.4.1.5 El archivo de especificación del proyecto (mmp). 274 4.4.1.6 Compilación de una aplicación . 276 4.4.1.7 Emulador . 280 4.4.1.8 Debugador . 281 4.4.2 Entrada/Salida de datos en C++ . 282 4.4.2.1 Introducción . 282 4.4.2.2 RFile . 283 4.4.2.3 Implementación de ejemplo con RFile . 288 4.4.3 Principales Apis de C++ para Symbian OS . 290 4.4.3.1 Introducción . 290 4.4.3.2 Manejo de gráficos en pantalla . 290 4.4.3.3 Interacción con los gráficos .
Recommended publications
  • The Profession of IT Multitasking Without Thrashing Lessons from Operating Systems Teach How to Do Multitasking Without Thrashing
    viewpoints VDOI:10.1145/3126494 Peter J. Denning The Profession of IT Multitasking Without Thrashing Lessons from operating systems teach how to do multitasking without thrashing. UR INDIVIDUAL ABILITY to The first four destinations basi- mercial world with its OS 360 in 1965. be productive has been cally remove incoming tasks from your Operating systems implement mul- hard stressed by the sheer workspace, the fifth closes quick loops, titasking by cycling a CPU through a load of task requests we and the sixth holds your incomplete list of all incomplete tasks, giving each receive via the Internet. In loops. GTD helps you keep track of one a time slice on the CPU. If the task 2001, David Allen published Getting these unfinished loops. does not complete by the end of its O 1 Things Done, a best-selling book about The idea of tasks being closed loops time slice, the OS interrupts it and puts a system for managing all our tasks to of a conversation between a requester it on the end of the list. To switch the eliminate stress and increase produc- and a perform was first proposed in CPU context, the OS saves all the CPU tivity. Allen claims that a considerable 1979 by Fernando Flores.5 The “condi- registers of the current task and loads amount of stress comes our way when tions of satisfaction” that are produced the registers of the new task. The de- we have too many incomplete tasks. by the performer define loop comple- signers set the time slice length long He views tasks as loops connecting tion and allow tracking the movement enough to keep the total context switch someone making a request and you of the conversation toward completion.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 1/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions What is the password? There is no password! The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 2/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Literature My slide sets were the basis for these books The two-column layout (English/German) of the bilingual book is quite useful for this course You can download both books for free via the FRA-UAS library from the intranet Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS2021 3/24 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Learning Objectives of this Slide Set At the end of this slide set You know/understand.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Virtualization and Security Aspects: an Overview
    Rui Filipe Pereira, Rui Miguel Silva & João Pedro Orvalho Virtualization and Security Aspects: An Overview Rui Filipe Pereira [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Rui Miguel Silva [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal João Pedro Orvalho [email protected] Lab UbiNET – Computer Science Security and Cybercrime Polytechnic Institute Of Beja Beja, Portugal Abstract Virtualization allows a single system to concurrently run multiple isolated virtual machines, operating systems (OSes) or multiple instances of a single OS. It helps organizations to improve operational efficiency, reduce costs, improve the use of hardware, and to allocate resources on- demand. Nevertheless, like most technologies, it has vulnerabilities and threats. Research about security issues related to virtualization has been conducted for several years. However, there are still open challenges related to security in virtualization. This paper looks into some of the differences, issues, challenges, and risks caused by virtualization and aims to classify the various virtualization approaches, along with their goals, advantages and drawbacks from a security perspective. Such classification is expected to help in the identification of virtualization technologies that might be applied in a virtualized infrastructure. This work is intended to be an introduction to the security considerations, concerns, and implications arising from use of virtualized systems. Keywords: Virtualization, Cybersecurity, Hypervisor, Virtual Machine, Virtual Machine Monitor. 1. INTRODUCTION Virtualization is a technology that uses a logical environment to overcome the physical limitations of hardware. Due to its characteristics of encapsulation and isolation, virtualization is the basis for cloud computing paradigm.
    [Show full text]
  • Sistemas Operativos Moviles: Funcionalidades, Efectividad Y Aplicaciones Utiles En Colombia. Sanly Aponte Gomez Carlos Davila Ra
    SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 SISTEMAS OPERATIVOS MOVILES: FUNCIONALIDADES, EFECTIVIDAD Y APLICACIONES UTILES EN COLOMBIA. SANLY APONTE GOMEZ CARLOS DAVILA RAMIREZ Proyecto de Grado Tekhlar II como requisito para optar al título de Ingeniero en Sistemas Asesor ING. JAVIER DUARTE UNIVERSIDAD EAN FACULTAD DE INGENIERIA DE SISTEMAS TEKHLAR BOGOTA 2011 DEDICATORIA SANLY APONTE GOMEZ MIS ESFUERZOS SE LOS DEDICO: A DIOS. Por ser mí guía, fortaleza y protección en cada momento de mi vida, pasando cada día los obstáculos presentados en mis estudios hasta alcanzar mis metas profesionales. A MIS PADRES. Carmen Lucy Gómez Penna y Jaime Aponte Rivillas. Con todo mi amor, les agradezco por confiar en mí, por darme la vida y guiarme por el camino correcto. Es por eso que pude lograr la culminación de mis estudios profesionales, porque sin ustedes no los hubiera finalizado. A MIS HERMANOS. Luis Enrique Aponte y José Alfredo Aponte. Gracias por apoyarme y darme valor en los momentos más difíciles de mis estudios ya que soy un punto de referencia para ustedes. A MI TIA. Yolima Aponte Por ofrecerme todo su apoyo incondicional guiándome en mi vida personal y estudio profesional. A MI COMPAÑERO DE PROYECTO. Carlos Dávila Ramírez. Por su apoyo y acompañamiento en el desarrollo de este Proyecto de Grado que hoy entregamos finalmente. AGRADECIMIENTOS. Agradezco a la UNIVERSIDAD EAN por su buena educación a nivel personal y profesional, dándome buenas prácticas de aprendizaje y oportunidades de desarrollarme como Ingeniera de Sistemas.
    [Show full text]
  • 1St Slide Set Operating Systems
    Organizational Information Operating Systems Generations of Computer Systems and Operating Systems 1st Slide Set Operating Systems Prof. Dr. Christian Baun Frankfurt University of Applied Sciences (1971–2014: Fachhochschule Frankfurt am Main) Faculty of Computer Science and Engineering [email protected] Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 1/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Organizational Information E-Mail: [email protected] !!! Tell me when problems problems exist at an early stage !!! Homepage: http://www.christianbaun.de !!! Check the course page regularly !!! The homepage contains among others the lecture notes Presentation slides in English and German language Exercise sheets in English and German language Sample solutions of the exercise sheers Old exams and their sample solutions Participating in the exercises is not a precondition for exam participation But it is recommended to participate the exercises The content of the English and German slides is identical, but please use the English slides for the exam preparation to become familiar with the technical terms Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 2/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems The Way a good Course works. Image Source: Google Mr. Miyagi says: „Not only the student learns from his master, also the master learns from his student.“ Active participation please! Prof. Dr. Christian Baun – 1st Slide Set Operating Systems – Frankfurt University of Applied Sciences – WS1920 3/31 Organizational Information Operating Systems Generations of Computer Systems and Operating Systems Things, which are bad during a Course.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? Operating System is a software, which makes a computer to actually work. It is the software the enables all the programs we use. The OS organizes and controls the hardware. OS acts as an interface between the application programs and the machine hardware. Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking and managing file systems. Structure of Operating System: Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…): The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…): 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS: The evolution of operating systems went through seven major phases. Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..): Major Technical Operating Phases Innovations Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Tape batching, BKS system (1961) First-in, first-out Processing scheduling.
    [Show full text]
  • Operating Systems What Is OS?
    Operating Systems What is OS? • Operating System is a software, which makes a computer to actually work. • It is the software the enables all the programs we use. • The OS organizes and controls the hardware. • OS acts as an interface between the application programs and the machine hardware. • Examples: Windows, Linux, Unix and Mac OS, etc., What OS does? An operating system performs basic tasks such as, • controlling and allocating memory, • prioritizing system requests, • controlling input and output devices, • facilitating networking and • managing file systems. Structure of Operating System Application Programs System Programs Software (Operating System) HARDWARE (Contd…) Structure of Operating System (Contd…) The structure of OS consists of 4 layers: 1. Hardware Hardware consists of CPU, Main memory, I/O Devices, etc, 2. Software (Operating System) Software includes process management routines, memory management routines, I/O control routines, file management routines. (Contd…) Structure of Operating System (Contd…) 3. System programs This layer consists of compilers, Assemblers, linker etc. 4. Application programs This is dependent on users need. Ex. Railway reservation system, Bank database management etc., Evolution of OS • The evolution of operating systems went through seven major phases. • Six of them significantly changed the ways in which users accessed computers through the open shop, batch processing, multiprogramming, timesharing, personal computing, and distributed systems. • In the seventh phase the foundations of concurrent programming were developed and demonstrated in model operating systems. (Contd…) Evolution of OS (contd..) Major Phases Technical Innovations Operating Systems Open Shop The idea of OS IBM 701 open shop (1954) Batch Processing Tape batching, BKS system (1961) First-in, first-out scheduling.
    [Show full text]
  • Operating Systems
    Operating Systems Introduction, Processes, Threads Daniel Gruss October 2, 2020 Table of contents www.tugraz.at 1. Basics 2. History 3. Booting 4. Process and Thread Fundamentals 5. Context Switches 6. Process and Thread Organization 1 Basics What is an Operating System www.tugraz.at 2 What is an Operating System www.tugraz.at 3 What is an Operating System www.tugraz.at 4 What is an Operating System www.tugraz.at Run on all sorts of devices: Servers, Desktops, Notebooks Tablets, Smartphones Routers, Switches, Displays Door Locks, Washing Machines, Toasters Cars, Airplanes .... We focus on general purpose operating systems 5 Operating System Roles www.tugraz.at Referee Illusionist Glue 6 Operating System Roles: Referee www.tugraz.at Referee Manage resource allocation among users and applications Isolation of different users, applications from each other Isolation of applications and operating system Communication between users, application 7 Operating System Roles: Illusionist www.tugraz.at Illusionist Abstraction of hardware and other things Makes application design simpler Each application appears to have the entire machine to itself Illusion of Infinite number of processors (near) infinite amount of memory reliable storage reliable network transport 8 Operating System Roles: Glue www.tugraz.at Glue Libraries, user interface widgets, . 9 Example: File Systems www.tugraz.at Referee Prevent users from accessing each other's files without permission Even after a file is deleted and its space re-used Illusionist Files can grow (nearly) arbitrarily large Files persist even when the machine crashes in the middle of a save 10 Example: File Systems www.tugraz.at Glue Nam ed directories, printf, .
    [Show full text]
  • IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor
    RC 24111 (W0611-124), 27 November 2006 Computer Science IBM Research Report Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Research Division Thomas J. Watson Research Center P. O. Box 704 Yorktown Heights, NY 10598, USA Research Division IBM Almaden – Austin – Beijing – Delhi – Haifa – T.J. Watson – Tokyo – Zurich Limited Distribution Notice: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). Some reports are available at http://www.research.ibm.com/resources/paper_search.html. Copies may requested from IBM T.J. Watson Research Center, 16-220, P.O. Box 218, Yorktown Heights, NY 10598 or send email to [email protected]. This paper has been submitted to the 27th International Symposium on Computer Architecture (ISCA 2007). Performance and Security Lessons Learned from Virtualizing the Alpha Processor Paul A. Karger IBM Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598 [email protected] ABSTRACT Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isolation between those workloads. The most widely used chip architecture, the Intel and AMD x86 processors, have begun to support virtualization, but the initial implementations show many problem areas.
    [Show full text]
  • Chilton Atlas Hardware at the National Museums Scotland
    Chilton Atlas hardware at the National Museums Scotland. Simon Lavington. November 2013. [email protected] Contents. Summary 2 1. Origins: Atlas in its historical context. 3 2. Atlas in the market-place. 4 3. Relative performance, then and now. 5 4. The Atlas Computer Laboratory at Chilton, Berkshire. 6 5. Technical details of the Chilton Atlas. 9 6. Physical details of equipment layout at Chilton. 10 7. The Atlas artefacts in store at the National Museums Scotland. 14 8. Condition of the units in the NMS Granton store. 19 9. The historical significance of Atlas. 21 Appendix A: Surviving Atlas hardware at other museums. 23 Appendix B: Bibliography and other sources of Atlas information 27 Acknowledgements. Several former Atlas people have helped with technical details. Particular mention should be made of Bob Hopgood, Ted Doubtfire and Yao Chen, all of whom worked on the Chilton Atlas. Picture credits to copyright holders. National Museums Scotland Figures 1(a) and 4. Museum of Science & Industry, Manchester Figure 2. STFC Rutherford Appleton Laboratory Figures 3, 5, 6, 7 and 8 Simon Lavington Figures 1(b), 9 to 16(a), 17(a), Table A2 Science Museum, London Figure 16(b), Table A1 D B G Edwards Figure 17 (b) Computer History Museum, California Table A3. 1 Chilton Atlas hardware at the National Museums Scotland. Summary. In 1962 the British-designed Ferranti Atlas supercomputer was, briefly, the world’s most powerful computing system. In 1973 Dr A G Thomson, Keeper of the Department of Technology at the Royal Scottish Museum, asked the Science Research Council to donate some representative sections of a redundant Atlas for preservation and eventual display.
    [Show full text]
  • CYBERSECURITY When Will You Be Hacked?
    SUFFOLK ACADEMY OF LAW The Educational Arm of the Suffolk County Bar Association 560 Wheeler Road, Hauppauge, NY 11788 (631) 234-5588 CYBERSECURITY When Will You Be Hacked? FACULTY Victor John Yannacone, Jr., Esq. April 26, 2017 Suffolk County Bar Center, NY Cybersecurity Part I 12 May 2017 COURSE MATERIALS 1. A cybersecurity primer 3 – 1.1. Cybersecurity practices for law firms 5 – 1.2. Cybersecurity and the future of law firms 11 – 2. Information Security 14 – 2.1. An information security policy 33 – 2.2. Data Privacy & Cloud Computing 39 – 2.3. Encryption 47 – 3. Computer security 51 – 3.1. NIST Cybersecurity Framework 77 – 4. Cybersecurity chain of trust; third party vendors 113 – 5. Ransomware 117 – 5.1. Exploit kits 132 – 6. Botnets 137 – 7. BIOS 139 – 7.1. Universal Extensible Firmware Interface (UEFI) 154– 8. Operating Systems 172 – 8.1. Microsoft Windows 197 – 8.2. macOS 236– 8.3. Open source operating system comparison 263 – 9. Firmware 273 – 10. Endpoint Security Buyers Guide 278 – 11. Glossaries & Acronym Dictionaries 11.1. Common Computer Abbreviations 282 – 11.2. BABEL 285 – 11.3. Information Technology Acronymns 291 – 11.4. Glossary of Operating System Terms 372 – 2 Cyber Security Primer Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
    [Show full text]