Trident Development Framework

Total Page:16

File Type:pdf, Size:1020Kb

Trident Development Framework Trident Development Framework Tom MacAdam Jim Covill Kathleen Svendsen Martec Limited Prepared By: Martec Limited 1800 Brunswick Street, Suite 400 Halifax, Nova Scotia B3J 3J8 Canada Contractor's Document Number: TR-14-85 (Control Number: 14.28008.1110) Contract Project Manager: David Whitehouse, 902-425-5101 PWGSC Contract Number: W7707-145679/001/HAL CSA: Malcolm Smith, Warship Performance, 902-426-3100 x383 The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of the Department of National Defence of Canada. Contract Report DRDC-RDDC-2014-C328 December 2014 © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2014 Working together for a safer world Trident Development Framework Martec Technical Report # TR-14-85 Control Number: 14.28008.1110 December 2014 Prepared for: DRDC Atlantic 9 Grove Street Dartmouth, Nova Scotia B2Y 3Z7 Martec Limited tel. 902.425.5101 1888 Brunswick Street, Suite 400 fax. 902.421.1923 Halifax, Nova Scotia B3J 3J8 Canada email. [email protected] www.martec.com REVISION CONTROL REVISION REVISION DATE Draft Release 0.1 10 Nov 2014 Draft Release 0.2 2 Dec 2014 Final Release 10 Dec 2014 PROPRIETARY NOTICE This report was prepared under Contract W7707-145679/001/HAL, Defence R&D Canada (DRDC) Atlantic and contains information proprietary to Martec Limited. The information contained herein may be used and/or further developed by DRDC Atlantic for their purposes only. Complete use and disclosure limitations are contained in Contract W7707-145679/001/HAL, DRDC Atlantic. EXECUTIVE SUMMARY This report details work undertaken to develop the Next Generation Trident (NGT) skeleton application. The work included an evaluation of alternatives for the graphics and user interface components of the application, from which the Visualization Toolkit (VTK) and Microsoft’s PRISM were chosen, respectively. The technologies were then integrated to form the skeleton NGT application, which demonstrated the layout of the application as well as its performance in loading and visualizing an AVAST model, as well as other stress-test models. Finally, the complete list of features for the NGT was determined and presented as a series of related feature sets which can be used to carry out the remaining phases of the NGT implementation. TABLE OF CONTENTS 1.0 INTRODUCTION .........................................................................................................................................1 2.0 THE NGT GRAPHICS ENGINE.................................................................................................................2 2.1 DESIGN CONSIDERATIONS ...........................................................................................................................2 2.2 VTK OVER OPENGL/DIRECT3D .................................................................................................................4 2.3 VTK OVER TRIDENT VISUALIZER ...............................................................................................................4 2.4 VTK VS.COMMERCIAL GRAPHICS ENGINES................................................................................................5 2.5 LIMITATIONS ...............................................................................................................................................5 3.0 THE NGT USER INTERFACE FRAMEWORK.......................................................................................6 3.1 DESIGN CONSIDERATIONS ...........................................................................................................................6 3.2 WPF OVER WINDOWS FORMS OR MFC.......................................................................................................7 3.3 WPF OVER QT ............................................................................................................................................8 3.4 LIMITATIONS ...............................................................................................................................................8 4.0 THE NGT 1.0 SKELETON APPLICATION............................................................................................10 4.1 CHARACTERISTICS .....................................................................................................................................10 4.2 LIMITATIONS .............................................................................................................................................12 5.0 PRIORITIZED IMPLEMENTATION ORDER FOR NGT V1.0 ..........................................................13 5.1 FEATURE SET 1-‘FILES’ AND ‘LINKS’MODULES......................................................................................13 5.2 FEATURE SET 2–GENERATE/MODIFY MODULE........................................................................................13 5.3 FEATURE SET 3–BASIC ANALYSIS GENERATION AND VERIFICATION ......................................................14 5.4 FEATURE SET 4–RESULTS MODULE .........................................................................................................15 5.5 FEATURE SET 5–VERIFY MODULE ...........................................................................................................15 5.6 FEATURE SET 6–OPTIONS MODULE .........................................................................................................15 5.7 FEATURE SET 7–INQUIRE MODULE ..........................................................................................................16 5.8 FEATURE SET 8–ERASE/RESTORE MODULE .............................................................................................16 5.9 FEATURE SET 9– DISPLAY MODULE ..........................................................................................................17 6.0 CONCLUSIONS AND RECOMMENDATIONS.....................................................................................18 7.0 REFERENCES ............................................................................................................................................19 LIST OF FIGURES FIGURE 2-1: RESULTS OF VTK PERFORMANCE TESTS...............................................................................................3 FIGURE 4-1: THE NGT V1.0 SKELETON APPLICATION. ..........................................................................................10 LIST OF TABLES TABLE 4-1: THE FIVE MODULES OF THE NGT V1.0 SKELETON APPLICATION..........................................................11 Trident Development Framework 1 1.0 INTRODUCTION Previous work, undertaken under Task 5 – “Next Generation Trident Roadmap” of contract W7707-145679/001/HAL, documented the need to improve user interaction and/or usability shortcomings with the Trident software suite of applications [1]. The work identified, through user surveys, two main areas of focus – Trident’s graphical rendering capability, and its user interface (UI) framework. The Trident derived code PVAST, contained within the main Trident application, exhibits the same issues and is addressed as part of the Next Generation Trident (NGT) upgrade. In addition, the AVAST UI/front end application, currently independent of Trident, can also significantly benefit via incorporation of the new Trident and PVAST architecture, should it undergo future enhancements to address usability concerns. This task details the design and development of the skeleton framework for the NGT V1.0 application based on informed technology choices from a thorough evaluation of alternatives. This skeleton framework serves as the basis for all subsequent development tasks that will constitute the final NGT V1.0 application. This report also details the design considerations and decisions that underpinned the development of this framework as well as gives an overview of the framework deliverable. Finally, this task defined the scope and extent of the feature set that will be carried from the Current Generation Trident (CGT) to the NGT. These features were chosen based on priority towards yielding a version 1.0 release that provides the most functionality to an end user within a reasonable development timeframe. TR-14-85 Trident Development Framework 2 2.0 THE NGT GRAPHICS ENGINE The graphics engine of the NGT application refers to the subsystem responsible for rendering the finite element model graphically on the screen and allowing the user to interact with it for purposes of pre-processing and post-processing their analysis. The graphics engine chosen for the NGT application is the Visualization Toolkit (VTK, see [2]), an open source, freely available library developed and commercially supported by Kitware Inc. [3]. The various design considerations leading to this choice over the alternatives are given in the following sections. 2.1 DESIGN CONSIDERATIONS Results of the Trident user survey undertaken in Task 5 of this contract indicated that model rendering and interactivity were the leading concerns for users of the current-generation application. Specifically, the graphics subsystem was slow to render large models, and the lack of dynamic interaction with the model viewport made it more difficult to establish context when navigating the model and isolating features of interest.
Recommended publications
  • Understanding the Attack Surface and Attack Resilience of Project Spartan’S (Edge) New Edgehtml Rendering Engine
    Understanding the Attack Surface and Attack Resilience of Project Spartan’s (Edge) New EdgeHTML Rendering Engine Mark Vincent Yason IBM X-Force Advanced Research yasonm[at]ph[dot]ibm[dot]com @MarkYason [v2] © 2015 IBM Corporation Agenda . Overview . Attack Surface . Exploit Mitigations . Conclusion © 2015 IBM Corporation 2 Notes . Detailed whitepaper is available . All information is based on Microsoft Edge running on 64-bit Windows 10 build 10240 (edgehtml.dll version 11.0.10240.16384) © 2015 IBM Corporation 3 Overview © 2015 IBM Corporation Overview > EdgeHTML Rendering Engine © 2015 IBM Corporation 5 Overview > EdgeHTML Attack Surface Map & Exploit Mitigations © 2015 IBM Corporation 6 Overview > Initial Recon: MSHTML and EdgeHTML . EdgeHTML is forked from Trident (MSHTML) . Problem: Quickly identify major code changes (features/functionalities) from MSHTML to EdgeHTML . One option: Diff class names and namespaces © 2015 IBM Corporation 7 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Method) © 2015 IBM Corporation 8 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Examples) . Suggests change in image support: . Suggests new DOM object types: © 2015 IBM Corporation 9 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Examples) . Suggests ported code from another rendering engine (Blink) for Web Audio support: © 2015 IBM Corporation 10 Overview > Initial Recon: Diffing MSHTML and EdgeHTML (Notes) . Further analysis needed –Renamed class/namespace results into a new namespace plus a deleted namespace . Requires availability
    [Show full text]
  • Nessus 8.3 User Guide
    Nessus 8.3.x User Guide Last Updated: September 24, 2021 Table of Contents Welcome to Nessus 8.3.x 12 Get Started with Nessus 15 Navigate Nessus 16 System Requirements 17 Hardware Requirements 18 Software Requirements 22 Customize SELinux Enforcing Mode Policies 25 Licensing Requirements 26 Deployment Considerations 27 Host-Based Firewalls 28 IPv6 Support 29 Virtual Machines 30 Antivirus Software 31 Security Warnings 32 Certificates and Certificate Authorities 33 Custom SSL Server Certificates 35 Create a New Server Certificate and CA Certificate 37 Upload a Custom Server Certificate and CA Certificate 39 Trust a Custom CA 41 Create SSL Client Certificates for Login 43 Nessus Manager Certificates and Nessus Agent 46 Install Nessus 48 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Download Nessus 49 Install Nessus 51 Install Nessus on Linux 52 Install Nessus on Windows 54 Install Nessus on Mac OS X 56 Install Nessus Agents 58 Retrieve the Linking Key 59 Install a Nessus Agent on Linux 60 Install a Nessus Agent on Windows 64 Install a Nessus Agent on Mac OS X 70 Upgrade Nessus and Nessus Agents 74 Upgrade Nessus 75 Upgrade from Evaluation 76 Upgrade Nessus on Linux 77 Upgrade Nessus on Windows 78 Upgrade Nessus on Mac OS X 79 Upgrade a Nessus Agent 80 Configure Nessus 86 Install Nessus Home, Professional, or Manager 87 Link to Tenable.io 88 Link to Industrial Security 89 Link to Nessus Manager 90 Managed by Tenable.sc 92 Manage Activation Code 93 Copyright © 2021 Tenable, Inc.
    [Show full text]
  • Sample2.Js Malware Summary
    Threat Analysis Report Summary Threat Malicious Level File Name sample2.js MD5 Hash 580E637B97B16698CC750B445223D5C0 Identifier SHA-1 Hash 07E507426F72522DABFECF91181D7F64DC3B8D23 Identifier SHA-256 Hash 790999F47B2FA4396FF6B0A6916E295D832A12B3495A87590C859A1FE9D73245 Identifier File Size 3586 bytes File Type ASCII text File 2015-11-06 09:26:23 Submitted Duration 38 seconds Sandbox 27 seconds Replication Engine Analysis Engine Threat Name Severity GTI File Reputation --- Unverified Gateway Anti-Malware JS/Downloader.gen.f Very High Anti-Malware JS/Downloader.gen.f Very High YARA Custom Rules Sandbox Malware.Dynamic Very High Final Very High Sample is malicious: f inal severit y level 5 Behavior Classif icat ion Networking Very High Exploiting, Shellcode High Security Solution / Mechanism bypass, termination and removal, Anti Unverified Debugging, VM Detection Spreading Unverified Persistence, Installation Boot Survival Unverified Hiding, Camouflage, Stealthiness, Detection and Removal Protection Unverified Data spying, Sniffing, Keylogging, Ebanking Fraud Unverified Dynamic Analysis Action Severity Malware behavior: networking activities from non-executable file Very High ATTENTION: connection made to a malicious website (see Web/URL Very High reputation for details) Detected suspicious Java Script content High Downloaded data from a webserver Low Modified INTERNET_OPTION_CONNECT_RETRIES: number of times that Low WinInet attempts to resolve and connect to a host Connected to a specific service provider Low Cracks a URL into its component
    [Show full text]
  • Msbridge: Opensees Pushover and Earthquake Analysis of Multi-Span Bridges - User Manual
    STRUCTURAL SYSTEMS RESEARCH PROJECT Report No. SSRP–14/04 MSBRIDGE: OPENSEES PUSHOVER AND EARTHQUAKE ANALYSIS OF MULTI-SPAN BRIDGES - USER MANUAL by AHMED ELGAMAL JINCHI LU KEVIN MACKIE Final Report Submitted to the California Department of Transportation (Caltrans) under Contract No. 65A0445. Department of Structural Engineering May 2014 University of California, San Diego La Jolla, California 92093-0085 University of California, San Diego Department of Structural Engineering Structural Systems Research Project Report No. SSRP-14/03 MSBridge: OpenSees Pushover and Earthquake Analysis of Multi-span Bridges - User Manual by Ahmed Elgamal Professor of Geotechnical Engineering Jinchi Lu Assistant Project Scientist Kevin Mackie Associate Professor of Structural Engineering at University of Central Florida Final Report Submitted to the California Department of Transportation under Contract No. 65A0445 Department of Structural Engineering University of California, San Diego La Jolla, California 92093-0085 May 2014 ii Technical Report Documentation Page 1. Report No. 2. Government Accession No. 3. Recipient’s Catalog No. 4. Title and Subtitle 5. Report Date MSBridge: OpenSees Pushover and Earthquake Analysis May 2014 of Multi-span Bridges - User Manual 6. Performing Organization Code 7. Author(s) 8. Performing Organization Report No. Ahmed Elgamal and Jinchi Lu UCSD / SSRP-14/04 9. Performing Organization Name and Address 10. Work Unit No. (TRAIS) Department of Structural Engineering School of Engineering University of California, San Diego 11. Contract or Grant No. La Jolla, California 92093-0085 65A0445 12. Sponsoring Agency Name and Address 13. Type of Report and Period Covered Final Report California Department of Transportation Division of Engineering Services 14. Sponsoring Agency Code th 1801 30 St., MS-9-2/5i Sacramento, California 95816 15.
    [Show full text]
  • Automated Malware Analysis Report For
    ID: 310931 Sample Name: 44S5D444F55G8222Y55UU44S4S.vbs Cookbook: default.jbs Time: 07:32:12 Date: 07/11/2020 Version: 31.0.0 Red Diamond Table of Contents Table of Contents 2 Analysis Report 44S5D444F55G8222Y55UU44S4S.vbs 4 Overview 4 General Information 4 Detection 4 Signatures 4 Classification 4 Startup 4 Malware Configuration 4 Yara Overview 4 Sigma Overview 4 Signature Overview 4 AV Detection: 5 Data Obfuscation: 5 Persistence and Installation Behavior: 5 Malware Analysis System Evasion: 5 HIPS / PFW / Operating System Protection Evasion: 5 Mitre Att&ck Matrix 5 Behavior Graph 6 Screenshots 6 Thumbnails 6 Antivirus, Machine Learning and Genetic Malware Detection 7 Initial Sample 7 Dropped Files 7 Unpacked PE Files 7 Domains 7 URLs 7 Domains and IPs 8 Contacted Domains 8 Contacted URLs 8 URLs from Memory and Binaries 8 Contacted IPs 8 Public 9 General Information 9 Simulations 10 Behavior and APIs 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 11 Dropped Files 11 Created / dropped Files 11 Static File Info 11 General 11 File Icon 12 Network Behavior 12 TCP Packets 12 HTTP Request Dependency Graph 12 HTTP Packets 12 Code Manipulations 13 Statistics 13 Behavior 13 System Behavior 14 Analysis Process: wscript.exe PID: 6124 Parent PID: 3388 14 Copyright null 2020 Page 2 of 15 General 14 File Activities 14 File Created 14 File Written 14 Registry Activities 15 Analysis Process: wscript.exe PID: 5560 Parent PID: 6124 15 General 15 File Activities 15 Disassembly 15 Code Analysis 15 Copyright null 2020 Page 3 of
    [Show full text]
  • Pro Opengl for C# Developers High-Performance 2D and 3D Graphics for Desktop, Web, Ios and Android
    F. Ramos Pro OpenGL for C# Developers High-Performance 2D and 3D Graphics for Desktop, Web, iOS and Android ▶ Access the hugely popular OpenGL graphics API in C#, without the need to use C++.Build your own game engine with 2D and 3D support.Target multiple platforms with your next game. OpenGL is widely considered the industry standard in high performance graphics for gaming, virtual reality and visualization. Unlike DirectX, OpenGL can be used on a wide range of platforms beyond Windows, from Linux to iOS and PlayStation Vita. Pro OpenGL for C# Developers shows you how to harness this powerful API from your language of choice, C#, and start creating professional-quality games and interactive graphics applications. 1st ed. 2014, 450 p. The book starts with an introduction to the OpenGL API and a guide to the process A product of Apress involved in rendering graphics, known as the graphics pipeline. You'll also meet OpenTK, the fully managed wrapper that makes it easy and painless to work with OpenGL in C# (or any other .NET language). Chapters 2 and 3 take you through the process of building your Printed book game engine, covering topics like architecture, object-oriented design and test-driven development in the context of game development. You'll begin to discover the power of Softcover OpenGL, build your first rendering demo, and learn techniques for rendering 2D in 3D, and ISBN 978-1-4842-0050-6 3D in 2D! (That is, a 2D world in a 3D game engine, and a 3D scene on a 2D display.) ▶ 44,95 € | £35.50 ▶ *48,10 € (D) | 49,45 € (A) | CHF 60.00 Further chapters dive deep into specific areas of graphic programming: shaders, particle systems, animation and path finding.
    [Show full text]
  • Download “The Spy Who Encrypted Me” Case Study
    April, 2020 APT41 The Spy Who Encrypted Me Contents APT41 – A spy who steals or a thief who spies ......................................................... 3 The investigation .................................................................................................. 3 The base .......................................................................................................... 4 The toolkit ........................................................................................................ 5 The point of entry .............................................................................................. 6 The initial vector of compromise .......................................................................... 8 Indicators of Compromise .................................................................................... 10 References ......................................................................................................... 11 244 Fifth Avenue, Suite 2035, New York, NY 10001 LIFARS.com (212) 222-7061 [email protected] APT41 – A SPY WHO STEALS OR A THIEF WHO SPIES An advanced persistent threat (“APT”) is, typically, either a nation-state actor and aims at benefiting its state through sabotage, espionage, or industrial espionage; or a cybercriminal and its aims are to steal money through theft, fraud, ransom or blackmail. The Chinese-based threat actor APT41 blurs the lines: known to have run financially- motivated operations against the videogame industry as early as 2012, it got its notoriety in 2013 when
    [Show full text]
  • Protobuild Documentation Release Latest
    Protobuild Documentation Release latest June Rhodes Aug 24, 2017 General Information 1 User Documentation 3 1.1 Frequently Asked Questions.......................................3 1.2 GitHub..................................................6 1.3 Twitter..................................................6 1.4 Contributing...............................................6 1.5 Getting Started..............................................8 1.6 Getting Started..............................................8 1.7 Defining Application Projects...................................... 11 1.8 Defining Console Projects........................................ 14 1.9 Defining Library Projects........................................ 15 1.10 Defining Content Projects........................................ 16 1.11 Defining Include Projects........................................ 18 1.12 Defining External Projects........................................ 20 1.13 Migrating Existing C# Projects..................................... 24 1.14 Customizing Projects with Properties.................................. 25 1.15 Changing Module Properties....................................... 34 1.16 Including Submodules.......................................... 36 1.17 Package Management with Protobuild.................................. 37 1.18 Package Management with NuGet.................................... 40 1.19 Creating Packages for Protobuild.................................... 42 1.20 Code Signing for iOS.......................................... 46 1.21 Targeting the Web
    [Show full text]
  • Third Party Version
    Third Party Name Third Party Version Manufacturer License Type Comments Merge Product Merge Product Versions License details Software source autofac 3.5.2 Autofac Contributors MIT Merge Cardio 10.2 SOUP repository https://www.nuget.org/packages/Autofac/3.5 .2 Gibraltar Loupe Agent 2.5.2.815 eSymmetrix Gibraltor EULA Gibraltar Merge Cardio 10.2 SOUP repository https://my.gibraltarsoftware.com/Support/Gi Loupe Agent braltar_2_5_2_815_Download will be used within the Cardio Application to view events and metrics so you can resolve support issues quickly and easily. Modernizr 2.8.3 Modernizr MIT Merge Cadio 6.0 http://modernizr.com/license/ http://modernizr.com/download/ drools 2.1 Red Hat Apache License 2.0 it is a very old Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/drools/dro version of 2.0 ols-spring/2.1 drools. Current version is 6.2 and license type is changed too drools 6.3 Red Hat Apache License 2.0 Merge PACS 7.1 http://www.apache.org/licenses/LICENSE- https://github.com/droolsjbpm/drools/releases/ta 2.0 g/6.3.0.Final HornetQ 2.2.13 v2.2..13 JBOSS Apache License 2.0 part of JBOSS Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/org.hornet 2.0 q/hornetq-core/2.2.13.Final jcalendar 1.0 toedter.com LGPL v2.1 MergePacs Merge PACS 7.0 GNU LESSER GENERAL PUBLIC http://toedter.com/jcalendar/ server uses LICENSE Version 2. v1, and viewer uses v1.3.
    [Show full text]
  • Resume.Js Malware Summary
    Threat Analysis Report Summary Threat Malicious Level File Name resume.js MD5 Hash 3823D4BFB62D6D25A2D1101B23129B5A Identifier SHA-1 Hash BF981E3F4D820F7A9C0767DCC09241A301E813B6 Identifier SHA-256 Hash EE2CBF07FA62C05DF732CBD6E53A3E86602EE510EFD01670979008FE61F9A078 Identifier File Size 1163 bytes File Type ASCII text File 2015-11-06 09:25:54 Submitted Duration 43 seconds Sandbox 28 seconds Replication Engine Analysis Engine Threat Name Severity GTI File Reputation --- Unverified Gateway Anti-Malware --- Unverified Anti-Malware --- Unverified YARA Custom Rules Sandbox Malware.Dynamic Very High Final Very High Sample is malicious: f inal severit y level 5 Behavior Classif icat ion Networking Very High Exploiting, Shellcode High Spreading Informational Persistence, Installation Boot Survival Unverified Hiding, Camouflage, Stealthiness, Detection and Removal Unverified Protection Security Solution / Mechanism bypass, termination and removal, Unverified Anti Debugging, VM Detection Data spying, Sniffing, Keylogging, Ebanking Fraud Unverified Dynamic Analysis Action Severity Malware behavior: networking activities from non-executable file Very High ATTENTION: connection made to a malicious website (see Web/URL Very High reputation for details) Detected suspicious Java Script content High Attempted to download an active content from the internet High Connected to a specific service provider Low Modified INTERNET_OPTION_CONNECT_RETRIES: number of times that Low WinInet attempts to resolve and connect to a host Cracks a URL into its component
    [Show full text]
  • April 17, 2018 Minutes
    MINUTES CITY COUNCIL MEETING APRIL 17, 2018 CALL TO ORDER – Roll Call and Determination of a Quorum The Parker City Council met in a regular meeting on the above date at Parker City Hall, 5700 E. Parker Road, Parker, Texas, 75002. Mayor Z Marshall called the meeting to order at 7:00 p.m. Councilmembers Scott Levine, Cindy Meyer, Lee Pettle, Cleburne Raney, and Ed Standridge were present. Staff Present: City Administrator Jeff Flanigan, Finance/H.R. Manager Johnna Boyd, City Secretary Patti Scott Grey, City Attorney Brandon Shelby, Fire Chief Mike Sheff, and Police Chief Richard Brooks PLEDGE OF ALLEGIANCE AMERICAN PLEDGE: Terry Lynch led the pledge. TEXAS PLEDGE: Elvis Nelson led the pledge. PUBLIC COMMENTS The City Council invites any person with business before the Council to speak. No formal action may be taken on these items at this meeting. Please keep comments to 3 minutes. None PROCLAMATION Mayor Marshall presented a proclamation, recognizing Southfork Ranch in Parker, Texas, for the 40th year reunion of the TV Show DALLAS and their many outstanding achievements and events, to Forever Resorts Regional Director of Sales and Marketing Janna Timm. The Mayor, City Council, City Staff, and audience applauded. Ms. Timm accepted the proclamation and thanked everyone for their support. CONSENT AGENDA Routine Council business. Consent Agenda is approved by a single majority vote. Items may be removed for open discussion by a request from a Councilmember or member of staff. 1. APPROVAL OF MEETING MINUTES FOR APRIL 3, 2018. [SCOTT GREY] 2. CITY INVESTMENT QUARTERLY REPORT. [MARSHALL] 3. CONSIDERATION AND/OR ANY APPROPRIATE ACTION ON ADVERTISING REQUEST FOR QUALIFICATIONS (RFQs) FOR AUDITOR SERVICES.
    [Show full text]
  • Internet Explorer and Firefox: Web Browser Features Comparision and Their Future
    https://doi.org/10.48009/2_iis_2007_478-483 INTERNET EXPLORER AND FIREFOX: WEB BROWSER FEATURES COMPARISION AND THEIR FUTURE Siwat Saibua, Texas A&M University-Kingsville, [email protected] Joon-Yeoul Oh, Texas A&M University-Kingsville, [email protected] Richard A. Aukerman, Texas A&M University-Kingsville, [email protected] ABSTRACT Next to Netscape, which was introduced to the Internet technology is one of the utmost inventions of market in 1998, Mozilla Firefox was released in 2004 our era and has contributed significantly in to compete with IE. The software codes of Firefox distributing and collecting data and information. are in the open source format, and any software Effectiveness and efficiency of the process depends developers around the world can put their own ideas on the performance of the web browser. Internet into this browser. As a result, Firefox’s performance Explorer is the leader of the competitive browser effectiveness and efficiency improved every day and market with Mozzilla Fox as its strongest rival, which gained popularity rapidly. has been and is gaining a substantial level of popularity among internet users. Choosing the 100.00% superlative web browser is a difficult task due to the considerably large selection of browser programs and lack of tangible comparison data. This paper 90.00% describes and compares vital features of Internet Firefox Explorer and Mozzilla Firefox, which represent over 90% of the browser market. The performance of each 80.00% IE browser is evaluated based on the general features, operating system support, browser features, protocol 70.00% support and language support.
    [Show full text]