Changing the Game with Linux Linux Gets Down to Real Business
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Political History of X Or How I Stopped Worrying and Learned to Love the GPL
A Political History of X or How I Stopped Worrying and Learned to Love the GPL Keith Packard SiFive [email protected] Unix in !"# ● $SD Everywhere – $'t not actually BS% ● )*+* want, to make Sy,tem V real – S'rely they still matter ● .o Free So/tware Anywhere The 0rigins of 1 ● $rian Reid and Pa'l Asente at Stan/ord – - kernel → VGTS → W window system – Ported to VS100 at Stan/ord ● $o4 Scheifler started hacking W→ X – Working on Argus with Barbara Liskov at LCS – 7ade it more Unix friendly (async9, renamed X -AXstation 00 (aka v, 339 Unix Workstation Market ● Unix wa, closed source ● Most vendors ,hipped a proprietary 0S 4ased on $SD #.x ● S'n: HP: Digita(: )po((o: *ektronix: I$7 ● ;congratu(ation,: yo'<re not running &'nice=. – Stil(: so many gratuito', di/ference, -AXstation II S'n >?@3 Early Unix Window Systems ● S'n-iew dominated (act'al commercial app,A De,ktop widget,A9 ● %igital had -WS/UIS (V7S on(y9 ● )pollo had %omain ● *ektronix demon,trating Sma((*alk 1 B1@ ● .onB/ree so/tware ● U,ed internally at MIT ● Shared with friend, in/ormally 1 3 ● )(mo,t u,able ● %elivered by Digital on V)1,tation, ● %i,trib'tion was not all free ,o/tware – Sun port relied on Sun-iew kernel API – %igital provided binary rendering code – IB7 PC?2T support act'ally complete (C9 Why 1 C ● 1 0 had wart, – rendering model was pretty terrible ● ,adly, X1 wa,n't m'ch better... – External window management witho't borders ● Get everyone involved – Well, at lea,t every workstation vendor willing to write big checks X as Corporate *ool ● Dim Gettys and Smokey -
International Business Machines Corporation a New York Corporation 1016331 International Business Machines Corporation a New York Corporation
International Business Trademarks Matching '"International Bu...' by Owner. IPMonitorTrademarks www.ipmonitor.com.au Contents Alerts 3 "International Business" 3 Terms and Conditions 26 General 26 Disclaimer of warranty and limitation of liability 26 Copyright 26 Arbitration 26 www.ipmonitor.com.au Alerts "International Business" 479 results matching '"International B...' by Owner. Number Mark Owner 1033728 IBM POWER International Business Machines Corporation a New York corporation 1016331 International Business Machines Corporation a New York corporation 1016332 International Business Machines Corporation a New York corporation 1011021 OPENCHIP International Business Machines Corporation a New York corporation 1036316 SYMMETRY International Business Machines Corporation a New York corporation 617766 MQSeries International Business Machines Corporation 1015285 OMNIFIND International Business Machines Corporation a New York corporation 1023800 EXPRESS PORTFOLIO International Business Machines Corporation a New York corporation 1024020 THINK EXPRESS International Business Machines Corporation a New York corporation 619418 International Business Machines Corporation 1037390 CATENA International Business Machines Corporation a New York corporation 1037391 CERULEAN International Business Machines Corporation a New York corporation 1037536 GLOBAL INNOVATION OUTLOOK International Business Machines Corporation a New York corporation 1037256 UNICA INTERNATIONAL BUSINESS MACHINES CORPORATION 1020234 International Business Network Pty Ltd ACN/ARBN -
Start Something BIG!
Start Something BIG! Cool projects IBM offers a world of opportunity with Work on challenging unlimited challenges and endless projects in leading possibilities to start something BIG. If technology areas and hot business trends. you are creative, passionate, and Feature articles: willing to collaborate to transform the Innovative teams way customers do business, the IBM Extreme Blue alumni Intensity, passion, Extreme Blue internship experience comment on their challenge, fun, optimism is for you. Extreme Blue and no boundaries experience. characterize the Extreme The IBM Extreme Blue program is Blue diverse high designed to provide you - one of the Jason Jho performance team spirit. best students from around the world - 2001 Cambridge a memorable internship experience. Alumni Our program draws from the wealth Dynamic places of resources that only IBM can Desired laboratories Daniel Rabinovitz provide, combining challenging carefully selected in 2000 Extreme Blue projects with competitive hotbeds of technology and Alumni compensation, unparalleled technical innovation. expertise and a leading-edge work Royi Ronen and living environment. Recruiting status 2001 Haifa Alumni You will experience the fusion of European labs business and technology in this IBM’s mission challenging internship program. Now underway. You can still apply today if you are interested in applying for one of the European labs. At IBM, we strive to lead However, if you are attending school in the creation, The Netherlands in the United States, note that the development and European schedule starts and ends manufacture of the industry's most advanced New Extreme Blue Lab, Amsterdam several weeks later that may impact information technologies, / Uithoorn, Netherlands. -
CONNECTEDO Received a Second Place Award in ACM Competition
Kudos Matthew Vail and Qingfent (Frank) He received CISCO schol- ED arships. Also, Jack Frink received ECT an award for developing a new NN software tool, and Lucas Layman CCONNECTEDO received a second place award in ACM Competition. [See page 4.] Nader Moussa, a triple-major A NEWSLETTER FROM THE senior, was an IBM Extreme Blue DEPARTMENT OF COMPUTER SCIENCE intern last fall. MARCH 2005 Bensong Chen, doctoral stu- dent, was named an Outstanding Teaching Assistant by NC State’s Students' Wolfgrid tests strengths Graduate Student Association. Neha Jain, Tyler Johnson and of grid computing software Matthew Vail, all seniors, received CRA’s 2005 Outstanding Under- What if you had a bunch of graduate Award honorable men- computers all over the world, tions. hooked together? That’s a Senior Rich Killian is serving as the Microsoft Ambassador at question that Sammie Carter, NC State for the 2004-05 aca- computer science senior, and demic year. Jon Harris, graduate student Carol Allen, administrative as- in the College of Design, had sistant in the undergraduate advis- in mind when they began to ing offi ce, was recognized for 25 years of service at the university’s build the Wolfgrid across the staff recognition program last NC State community. August. She has been with the Using Apple’s new Xgrid computer science department for software, the two have been her entire NC State career. Dr. Peng Ning, assistant pro- hooking up personal com- Sammie Carter, computer science student, discusses the Wolfgrid with fessor, received an NSF CAREER puters across campus, creating Everette Allen, computing consultant. -
IBM Global Procurement Louis Ferretti Product Environmental Compliance & Supplier Chain Social Responsibility
What Every Procurement Professional Should Know About Supplier and Supply Chain Risk IBM Global Procurement Louis Ferretti Product Environmental Compliance & Supplier Chain Social Responsibility www.sig.org/eval What Every Procurement Professional Should Know About Supplier and Supply Chain Risk photo of the "Ital Florid by NASIM4248 photo of the "Ital Florid by NASIM4248 Louis Ferretti, IBM Global Procurement Project Executive, Product Environmental Compliance & Supplier Chain Social Responsibility [email protected] October 27-29, 2015 Abstract Businesses today are ever more depend on their supply chain partners for goods and services which make up a significant portion of the solutions they provide to their clients. Correspondingly globalization has introduced the opportunity to do business with suppliers the world over, allowing greater access to a host of untold products and services - that can provide a competitive advantage to the OEM, which enables them delivering increased value to their clients. Nevertheless, a global sourcing strategy has introduced a set of risks well beyond what was typical in the traditional suppler chain. The question is how does a company engage in global sourcing and yet gain the benefits while weighing and managing risks. Beyond assessing the risk of a supplier and their supply, there are opportunities to collaborate and assess a supplier's level of resiliency, and where appropriate engage in actions of remediation. 3 Business Continuity Planning & Supply Chain Risk – An Overview Managing Risk is an imperative for Business Continuity Planning RISK is one of the SIX mega-trends impacting IBM Chief Supply Chain Officer Study Identified The enterprises around the world Top Five Challenges Major factors affecting the enterprise today Risks, both operational and financial, is the #2 1. -
Securing Your Mobile Business with IBM Worklight
Front cover Securing Your Mobile Business with IBM Worklight Apply Worklight security features to your mobile applications Integrate Worklight with IBM Security Access Manager Learn by example with practical scenarios Scott Andrews Juarez Barbosa Junior Virginijus Kaminas Jia Lei Ma Dale Sue Ping Madlin Seidel ibm.com/redbooks International Technical Support Organization Securing Your Mobile Business with IBM Worklight October 2013 SG24-8179-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (October 2013) This edition applies to Version 6 of IBM Worklight. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xii Chapter 1. Overview of IBM MobileFirst and its security offerings . 1 1.1 Business value of mobile technologies . 2 1.2 IBM MobileFirst solution overview. 2 1.2.1 Mobile application development with IBM MobileFirst Platform . 3 1.2.2 Bring your own device with IBM MobileFirst Management . 4 1.2.3 Device and data protection with IBM MobileFirst Security . 5 1.2.4 Optimization of mobile experiences with IBM MobileFirst Analytics . 6 1.2.5 Putting it all together . 6 1.3 Mobile security threats . 9 1.3.1 Loss and theft . 10 1.3.2 Malware . 10 1.3.3 Spam. 10 1.3.4 Phishing . -
N-276 Prentice Computer Centre Newsletter 6-September-82.Pdf
PRENTICE COMPUTER CENTRE UNIVERSITY OF QUEENSLAND, ST. LUCIA, QUEENSLAND, AUSTRALIA. 4067. ~ I I . NEWSLETTER N-276 6-September-82 CONTENTS 1.0 Charge Rates. 2.0 Connections to Hosts on CSIRONET. 3.0 EUNICE - A Substitute for UNIX? 4.0 Postscript on EUNICE. 5.0 Introducing GENSTAT Version 4.03 - A New Library Package. 6.0 Information Concerning Courses. 7.0 RLO 1 Disc Pack Racks. 8.0 Expired PPN'S . I· . [, \ 1' Authorized by the Director of the Computer Centre Principle Service Centres Extensions Operations Manager 3471 Contract Programming & Feasibility Studies 3944 System Status Automatic Answering 3101 General Enquiries & Course Enrolments 3018 Training & Courses 3021 CONSULTING PROBLEM AREA ~1AIL BOX NAME AND EXTENSION OPERATIONS AND PROGRAMMING Accounts ACCOUNTS Carol Walker 2188 Cobol COBOL Betty Young 3020 Commands, system use and probs COMMANDS Peter Akers 2962 Ian Otto 2923 Database (VG, 1022) DATABASE Amelia Shanahan 2836 Fortran FORTRAN John Currie 2924 Richard Armstrong 2963 Graphics GRAPHICS Mark Williams 2835 Micros ~lICROS Brett Peterson 2836 Network NETWORK Bryan Claire 2960 Operations OPERATIONS Senior operator 3212 PDP-ll software PDPll Robert ~1orri son 3022 Program Library, Tapes LIBRARY Leonie Roberts 3943 Statistics STATISTICS Barry Maher 3021 Text processing, Typesetting TEXT Andrew Broughton 2837 Non-specific problems OPERATIONS Senior operator 3212 ENGINEERING AND MAINTENANCE Development and communications ENGIN Graham Rees 3288 Mini/Micro support ENGIN Colin Lythall 3942 Alan Langdon 2928 Mini and terminal maintenance MAINT Maralyn Kenley 3938 GRIFFITH UNIVERSITY: Consulti ng 7561 Computer Services 7560 1.0 CHARGE RATES Terminal use on Sunday and at other unattended times is charged at quarter rates. -
A Reactive Performance Monitoring Framework
A Reactive Performance Monitoring Framework Katherine ChengLi Directed By: Prof. Liam Peyton Thesis Submitted to the Faculty of Graduate and Postdoctoral Studies in partial fulfillment of the requirements for the degree of Master of Computer Science University of Ottawa Ottawa, Ontario, Canada June 2016 © Katherine ChengLi, Ottawa, Canada, 2016 Abstract With the ascendency of data and the rise of interest in analytics, organizations are becoming more interested in the use of data to make their business processes more intelligent and reactive. BI applications are a common way that organizations integrate analytics in their processes. However, it can be days, weeks or even months before a manual response is undertaken based on a human interpreting a report. Even when information technology supports automatic responses within an organization, it is often implemented in an ad hoc manner without following a systematic framework. In this thesis, we present a reactive performance monitoring (RPM) framework which aims at automating the link from the analytical (how well is the operational achieving the strategic) to the operational (the particular process steps implemented within an organization that determine its behavior) aspects of businesses to bypass the strategic (the high level and long term goals an organization is trying to achieve) as needed and reduce the latency between knowledge and action. Our RPM framework is composed of an architecture, a methodology, and a rule environment which permits the redaction of rules possessing relevant conditions and actions. In addition, we present an OLAP rule engine which is demonstrated to be effective in our framework where events are streamed in, reacted upon in real-time, and stored in an OLAP database. -
The Worker and the Job: Coping with Change. INSTITUTION American Assembly, New York, N.Y
DOCUMENT RESUME ED 105 137 CE 003 399 AUTHOR Rosow, Jerome M., Ed. TITLE The Worker and the Job: Coping with Change. INSTITUTION American Assembly, New York, N.Y. PUB DATE 74 NOTE 218p. AVAILABLE FROM Prentice-Hall, Inc., Egnlewood Cliffs, New Jersey 07632 ($2.45 paper cover, $6.95 cloth cover) EDRS PRICE MF-$0.76 HC Not Available from EDRS. PLUS POSTAGE DESCRIPTORS Cultural Factors; *Economic Change; Economic Factors; Essays; *Futures (of Society); *Job Satisfaction; *Labor Force; Labor Unions; Negroes; Organizational Change; Policy Formation; *Social Change; Vocational Adjustment; Won.:Attitudes; Work Environment IDENTIFIERS *Job Enrichment ABSTRACT The collection of essays presents the pros and cons of the assertation "improving the place, the organization, and the nature of work can lead to better work performance and a better quality of life in the society." In the overview section, Daniel Yankelovich discusses man and hiJ relationship to his family and society at large, with work as the traditional linchpin of these relationships. Cultural trends and their relationship to the work ethic are discussed, Eli Ginzberg reviews the employment-related dimensions of the American economy over the past several generations, focusing especially on blacks: women, and youth. The contemporary issues section focusses on worker satisfaction from three viewpoints: George Strauss concentrates on the workers themselves; Agis Salpukas considers the future role of the unions in improving the quality in working life; and Peter Henie examines the economic effects of worker satisfaction. The third section consists of two chapters focusing on change and future. Richard E. Walton presents the findings of research on innivative restructuring of work, while Sam Zagoria discusses policy implications and a future agenda for achieving job satisfaction. -
Tunnel Vision RECRUITERS INDUSTRY It’S the Last Train Home and I’M Scribbling Corrections on My Particle-Physics Paper
Naturejobs Career View GRADUATE JOURNAL Tunnel vision RECRUITERS INDUSTRY It’s the last train home and I’m scribbling corrections on my particle-physics paper. Building an intern the interns& at the cutting its employment pipeline. Out of the corner of my eye I notice the programme edge by assigning them to At the beginning of this man next to me looking over my shoulder projects that have a genuine year, the company at my work. It’s late, he’s probably bored, BM may be viewed by chance of reaching the announced plans to I tell myself. But does he really care what many as a giant in market-place. expand its workforce by I do? Should he care? Do I care whether Iinformation technology, Under the scheme, three some 15,000 people. Many he cares? but it hasn’t always been scientific and technical of these new jobs are likely Yes! If nothing else, his taxes the first choice for interns are teamed with to be based in China or contribute to the millions needed to build jobseekers. As the Internet an MBA student for the India, so it is no surprise the high-tech detectors used in my area boomed in the 1990s, commercial angle, and the that Extreme Blue has now of physics. They pay for me to go to young people who wanted group is then guided by an been implemented in both conferences, for my computer and for the to work at the frontiers of IBM mentor. The 12-week Beijing and Bangalore — hours I sit at the screen fixing broken code. -
Wesley J. Willett
WESLEY J. WILLETT 2374 Eunice St., Berkeley, CA 94708 [email protected] (303) 827-8666 www.wjwillett.net RESEARCH INTERESTS Information Visualization, Social Computing. Human-Computer Interaction, Citizen Sensing, New Media EDUCATION 2006-PRESENT UNIVERSITY OF CALIFORNIA, BERKELEY Ph.D. Candidate in Computer Science Advisor: Maneesh Agrawala 3.96 Cumulative GPA 2001-2006 UNIVERSITY OF COLORADO AT BOULDER BS in Computer Science (Summa Cum Laude) with a Technology Arts and Media (TAM) Certificate Computer Science department's Outstanding 2006 Graduate 2004/2005 academic year spent abroad at Lancaster University, Lancashire, UK Robert Byrd Scholarship, Thomas Eaton Scholarship, Lloyd Fosdick Scholarship, National Merit Scholarship Finalist Norlin Scholars Honor Program 3.962 Cumulative GPA - Dean’s List RESEARCH & PROJECT EXPERIENCE 2006-PRESENT ONGOING VISUALIZATION RESEARCH (UNIVERSITY OF CALIFORNIA EECS) Worked with Prof. Maneesh Agrawala and Jeffrey Heer to explore collaboration around information visualizations. Designed, built, and evaluated CommentSpace, a platform for collaborative data analysis on the web. 06/2009-12/2010 VISITING SCHOLAR (INTEL LABS BERKELEY) Worked with the Common Sense team to develop tools for community analysis of environmental quality data. Conducted and coordinated field evaluations, deployments, and interviews with community members. SUMMER 2007 RESEARCH INTERN (ADOBE SYSTEMS CREATIVE TECHNOLOGIES LAB - SEATTLE, WA) Worked with Prof. David Salesin to explore systems for delivering dynamic visual presentations of data. 8/2005-5/2006 SENIOR DESIGN PROJECT (ELECTRIC RAIN INC. / UNIVERSITY OF COLORADO) As part of a small team - researched, designed, and built a vector-based screen recording app for Windows Vista. Team received the Computer Science department's 2006 Lloyd Fosdick Award for best team project. -
How to Setup and Secure NFS
How to Setup and Secure NFS Motivation Depending on what you are trying to accomplish, sometimes the old methods are still the best. At work recently, we discovered that we needed to share data between several nodes. We could have used a web based service to do this, but it would have taken more time to write this than implementing Network File Share (NFS) and sharing out the local data to all the nodes. So this paper was written as a resource so I don’t have to figure out how to implement this solution again. Incidentally, NFS is really simple, so if you forget, it’s not hard to get all of the pieces right. One of the must haves with NFS is security, since it relies on IP addresses as its only method of protecting access to its services. History ‘Network File System is a distributed file system protocol originally developed by Sun Microsystems in 1984, allowing a user on a client computer to access files over a network much like local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File System is an open standard defined in RFCs, allowing anyone to implement the protocol. Versions and variations Sun used version 1 only for in-house experimental purposes. When the development team added substantial changes to NFS version 1 and released it outside of Sun, they decided to release the new version as v2, so that version interoperation and RPC version fallback could be tested.