The Zephyr Notification Service

Total Page:16

File Type:pdf, Size:1020Kb

The Zephyr Notification Service The Zephyr Notification Service C. Anthony DellaFera Digital Equipment Corporation Project Athena Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] Mark W. Eichin Robert S. French David C. Jedlinsky John T. Kohl William E. Sommerfeld Project Athena Massachusetts Institute of Technology Cambridge, MA 02139 {eichin,rfrench,opus,jtkohl,wesommer}@ATHENA.MIT.EDU ABSTRACT Zephyr is a notice transport and delivery system under development at Project Athena.1 Zephyr is for use by network-based services and applications with a need for immediate, reliable and rapid communication with their clients. Zephyr meets the high- throughput, high fan-out communications requirements of large-scale workstation environments. It is designed as a suite of ‘‘layered services’’ based on a reliable, authen- ticated notice protocol. Multiple, redundant Zephyr servers provide basic routing, queue- ing, and dispatching services to clients that communicate via the Zephyr Client Library. More advanced communication services are built upon this base. Introduction g Design constraints. This paper is a brief introduction to the g Services provided for users by a notification concept of a notification service in general and to service. the design of the Zephyr Notification Service in g Unsolved problems and topics for future particular. A notification service provides development. network-based services and their clients with immediate, reliable, and rapid communication for While this paper is about Zephyr, Project small quantities of time-sensitive information. Athena’s Notification Service, it is our belief that The sections which follow address the following the concepts presented here can be generalized to issues: fit a broad range of notification services and sys- tems. A good understanding of a notification ser- g Motivation for developing a notification ser- vice can be acquired by comparing the Zephyr vice. Notification Service and a more traditional g Role of a notification service in networked method of workstation message delivery, elec- workstation environments. tronic mail (specifically, sendmail). Table 1 makes this comparison. -2- Table 1. iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii c c iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiA Comparison Between Zephyr And Mail c c c c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiMetric c Zephyr c Electronic Mail c c c Addressingc Implicit/Dynamic: All addressing is c Explicit/Static: Sender must know c c c c c c determined dynamically; an explicit c and explicitly provide the name and c c c ‘‘address’’ is not required. One-to- c address (except for ‘‘local’’ mail) of c c c one addressing is supported by expli- c each recipient. Static mailing list c c c citly specifying of recipient ZID. c support is provided. Only recipients c c c c The notice subscription layered ser- c explicitly named receive messages. c c c c c c vice allows for self-selection by the c c ciiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic recipient. c c c Delivery Methodc Notices are delivered via dynami- c Mail is delivered using a point-to- c c c c cally routed reliable datagrams. No c point TCP/IP connection. Ack- c c c c c c connections need be established or c nowledgments are not supported, per c c c maintained. Multiple levels of c se. Return receipts may be requested c c c notice acknowledgment are sup- c but are not guaranteed to work. c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic ported. c c c c c c c Delivery Actionc Asynchronous/Active: Notices arrive c Synchronous/Passive: Mail must be c c c without user intervention. Notices to c sent and read manually by the user. c c c a particular user are delivered c Mail, in general, is delivered to one c c c automatically and immediately to all c particular place (a ‘‘post office’’ or c c c c of his or her current login sessions. c ‘‘mail drop’’) for each user; s/he c c c c ciiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic c must then actively retrieve it. c c Message Lengthc Short, fixed, notice length with a c Long, typically unfixed, message c c c maximum of approximately 10 lines c length. Mail messages may be and c c c c of 80 characters each. c often are extremely large, on the c c c c c c c order of many pages. When mes- c c c c sage length is fixed it is usually done c c c c so by unpredictable rules that vary c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic c from site to site. c c c c c c Message Persistencec Notices are considered time- c Long time-to-live. Messages typi- c c c sensitive; no queuing is provided. If c cally remain in a mail drop until c c c the client recipient is not logged in, c read. c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic then the notice is flushed. c c c c c c c Message Fan-outc High fan-out: Sending to large lists is c Low fan-out. Sending to large lists c c c efficient. Each client generates one c can consume a great deal of the com- c c c copy of a notice regardless of the c puting resource. If a message is sent c c c number of recipients. Each server c to n users, n copies are generated by c c c c receives one copy of a notice being c the sender, each of which is retained c c c c c c routed regardless of the number of c indefinitely by its recipient. c ciiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic recipients. c c c Traffic Performancec High volume/High throughput: c Medium volume/Low throughput: c c c c Notices may be transmitted in large c Large mail messages can send a rea- c c c c c c numbers due to the low overhead of c sonable volume of data, but slowly c c c dynamically-routed reliable c (as connections need to be esta- c c c datagrams. c blished and routes determined). c c c c c c c c c c c c c c c c c c c c c c c c c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic c c -3- iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii c c iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiA Comparison Between Zephyr And Mail c c c c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiMetric c Zephyr c Electronic Mail c c c System Configurabilityc Dynamically reconfigurable: c Statically reconfigurable: Reconfi- c c c c c c Dynamic resource allocation and c guration of Unix mail systems is c c c configuration within the base notifi- c wizard-level work and has signifi- c c c cation services allows for automatic c cant global impact. No utilities are c c c and simple user-level reconfigura- c provided for dynamic system modifi- c c c c tion of layered services. c cation or reconfiguration. All c c c c c c c changes must be made centrally and c ciiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic c atomically. c c System Maintenancec Low maintenance: Layered services c High maintenance: Mail requires a c c c c dynamically recover unused c post office staff to maintain post c c c c c c resources through time-outs and c office boxes (mail drops), mailing c c c reference counting. c lists, the routing system, and to c ic iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiic c manually reroute ‘‘dead letters.’’ c -4- A Solution To Communication Needs Electronic meeting services (conferencing When services designed for use in a time- systems) can notify interested users of new sharing environment are used for a very large sys- transactions, using the notice subscription tem of networked workstations, certain communi- layered service. cation services begin to fail.† They predom- Print Service inantly fail from to their inability to cope with Print servers (and queuing services in gen- large increases in network scale (i.e., an increase eral) can send job status information back in both the number of workstations and the to the job’s submitter. number of interconnected local area networks). MOTD Service After examining how certain of these services Message-of-the-day information (system communicate with their clients, we have identi- wide, service-specific, or local) can be sent fied two primary failure modes. These are the to users, such as when they begin using a inability of a service to cope with increasing particular service in the case of a service- server-to-client fanout and the inability of clients specific MOTD. to deal by the replacement of a local service with On-Line Consulting a remote, distributed service. The Zephyr project The notification service can be used as the was begun to provide a solution to these two underpinning of a dynamic on-line consult- failure modes in the context of time-sensitive ing service. The notice subscription lay- communications. Zephyr has grown into a more ered service can be used to provide topic powerful tool than was originally anticipated; based information routing, user location, what began as the development of a ‘‘desirable’’ and consultant-to-client rendezvous. service soon turned into the development of a ‘‘required’’ service. Host Status Service Broadcast-based host status systems (e.g., The following services are candidate clients ruptime) do not scale to a large
Recommended publications
  • Graduationl Speakers
    Graduationl speakers ~~~~~~~~*L-- --- I - I -· P 8-·1111~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ stress public service By Andrew L. Fish san P. Thomas, MIT's Lutheran MIT President Paul E. Gray chaplain, who delivered the inlvo- '54 told graduating students that cation. "Grant that we may use their education is "more than a the privilege of this MIT educa- meal ticket" and should be used tion and degree wisely - not as to serve "the public interest and an entitlement to power or re- the common good." His remarks gard, but as a means to serve," were made at MIT's 122nd com- Thomas said. "May the technol- mencement on May 27. A total ogy that we use and develop be of 1733 students received 1899 humane, and the world we create degrees at the ceremony, which with it one in which people can was held in Killian Court under live more fully human lives rather sunny skies, than less, a world where clean air The importance of public ser- and water, adequate food and vice was also emphasized by Su- shelter, and freedom from fear and want are commonplace rath- Prof. IVMurman er than exceptional." named to Proj. Text of CGray's commencement address. Page 2. Athena post In his commencement address, By Irene Kuo baseball's National League Presi- Professor Earll Murman of the dent A. Bartlett Giamatti urged Department of Aeronautics and graduates to "have the courage to Astronautics was recently named connect" with people of all ideo- the new director of Project Athe- logies. Equality will come only ~~~~~~~~~~~~~~~~~,,4. na by Gerald L.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • Section 1: MIT Facts and History
    1 MIT Facts and History Economic Information 9 Technology Licensing Office 9 People 9 Students 10 Undergraduate Students 11 Graduate Students 12 Degrees 13 Alumni 13 Postdoctoral Appointments 14 Faculty and Staff 15 Awards and Honors of Current Faculty and Staff 16 Awards Highlights 17 Fields of Study 18 Research Laboratories, Centers, and Programs 19 Academic and Research Affiliations 20 Education Highlights 23 Research Highlights 26 7 MIT Facts and History The Massachusetts Institute of Technology is one nologies for artificial limbs, and the magnetic core of the world’s preeminent research universities, memory that enabled the development of digital dedicated to advancing knowledge and educating computers. Exciting areas of research and education students in science, technology, and other areas of today include neuroscience and the study of the scholarship that will best serve the nation and the brain and mind, bioengineering, energy, the envi- world. It is known for rigorous academic programs, ronment and sustainable development, informa- cutting-edge research, a diverse campus commu- tion sciences and technology, new media, financial nity, and its long-standing commitment to working technology, and entrepreneurship. with the public and private sectors to bring new knowledge to bear on the world’s great challenges. University research is one of the mainsprings of growth in an economy that is increasingly defined William Barton Rogers, the Institute’s founding pres- by technology. A study released in February 2009 ident, believed that education should be both broad by the Kauffman Foundation estimates that MIT and useful, enabling students to participate in “the graduates had founded 25,800 active companies.
    [Show full text]
  • Viral Triggers
    Viral Triggers Instant Messaging Ilia Mirkin [email protected] January 26, 2005 Instant Messaging ! Talk: Communications between terminals ! Zephyr: Developed at MIT; little use outside ! ICQ: First popular IM service ! AIM: At first for AOL members only, later free service to all, but with ads for non-AOL members ! Jabber: Open IM architecture, though similar to AIM in most respects ! MSN/Yahoo/etc: Proprietary but free services similar to AIM ! Rendezvous: Can be used for messaging in LANs ! Skype: Peer-to-peer application for both voice and text Talk ! Originally developed for Multics, in 1973 ! Became a standard UNIX command with 4.2BSD ! Further enhancements to connect terminals over a network, and later, to be able to connect more than 2 parties (Ytalk - 1990) ! Was popular amongst UNIX users since its existence, though no concrete usage statistics are available ! Has become marginalized by other IM systems that do not require people to be logged in on terminals Zephyr Developed at MIT under Project Athena Designed to run under Unix, there are few clients available, as well as few users outside universities Started in the 1980's, has not gained widespread acceptance. However it does provide various security enhancements, such as interoperability with Kerberos Protocol specifications available freely, open source clients ICQ (“I Seek You”) Created by Mirabilis, Inc., in 1996 First IM service to gain wide acceptance, mostly via member- driven advertising Used numbers to identify members (much like Compuserve) Allowed messages to be stored on server and delivered them when the target user would log on Overtaken in popularity by AIM, which allowed people to pick any username Currently accepts new users, but the service has become very similar to AIM, and uses the same servers AOL IM AOL bought up Mirabilis, and recreated ICQ as AIM Two protocols: OSCAR and TOC OSCAR included all the features of AIM, but was closed.
    [Show full text]
  • Omnisense™ Analysis Help
    Zephyr Technology OmniSense Analysis Help © 2016 Zephyr Technology OmniSense Help This is the printed version of the OmniSense Help file. Content has been optimised for screen display. In the printed version, page breaks may interrupt continuity. © 2016 Zephyr Technology All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Printed: April 2016 4 Table of Contents Foreword 9 Section 1 Getting Started 10 1 Conta..c.t. .Z..e..p..h..y..r.................................................................................................................... 11 2 New F..e..a..t.u..r..e..s...................................................................................................................... 11 3 Using. .T..h..i.s.. .G..u..i.d..e.................................................................................................................. 16 Section 2 Overview 18 1 Toolb.a..r.. .B..u..t.t.o..n..s................................................................................................................... 20 2 Prefe.r.e..n..c..e..s........................................................................................................................
    [Show full text]
  • Forensic Artefacts Left by Pidgin Messenger 2.0
    digital investigation 4 (2007) 138–145 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin Forensic artefacts left by Pidgin Messenger 2.0 Wouter S. van Dongen Fox-IT Forensic IT Experts, Olof Palmestraat 6, 2616 LM Delft, The Netherlands article info abstract Article history: Pidgin, formerly known as Gaim, is a multi-protocol instant messaging (IM) client that sup- Received 23 July 2007 ports communication on most of the popular IM networks. Pidgin is chiefly popular under Revised 23 November 2007 Linux, and is available for Windows, BSD and other UNIX versions. This article presents Accepted 21 January 2008 a number of traces that are left behind after the use of Pidgin on Linux, enabling digital in- vestigators to search for and interpret instant messaging activities, including online con- Keywords: versations and file transfers. Specifically, the contents and structures of user settings, log Pidgin files, contact files and the swap partition are discussed. In addition looking for such infor- Gaim mation in active files on a computer, forensic examiners can recover deleted items by Instant messenger searching a hard drive for file signatures and known file structures detailed in this article. Internet chat ª 2008 Elsevier Ltd. All rights reserved. Linux messenger MSN ICQ Yahoo! IRC 1. Introduction Gaim would become Pidgin, libgaim would become libpurple, and gaim-text would become finch. The name Pidgin was cho- This article is a continuation of the series of articles dealing sen as a reference to the term ‘Pidgin’, which describes com- with artefacts left by popular instant messaging clients.
    [Show full text]
  • American Indian Health Commission for Washington State “Improving Indian Health Through Tribal-State Collaboration”
    Administrations and Divisions: Home & Community Services (HCS), Residential Community Services (RCS), Behavioral Health Administration (BHA), Developmental Disabilities Administration (DDA), Division of Behavioral Health and Recovery (DBHR), Office of the Deaf & Hard of Hearing (ODHH May 12, 2020 from 9 a.m. – noon No In-Person Locations available. Please register for IPAC Subcommittee ALTSA/BHA/DDA on May 12, 2020 starting at 9:00 AM PST at: https://attendee.gotowebinar.com/register/7982740694599152141 After registering, you will receive a confirmation email containing information about joining the webinar. Welcome and Introductions – Office of Indian Policy Dr. Marie Natrall/Brenda Francis-Thomas • Welcoming • Invocation • Announcements • Roll Call Aging and Long-Term Services Administration – Marietta Bobba; Ann Dahl • Covid-19 check-in and sharing- Alec Graham, ALTSA HCS; • Tribal Initiative Updates o Squaxin Island Tribe o Nisqually Tribe o Makah Tribe o Lummi Nation o American Indian Community Center • Aging & Disability Resource Center Outreach – American Indian Health Commission • Health Homes • Adult Protective Services Check-In – APS staff • Traumatic Brain Injury Council opening Developmental Disabilities Administration – Justin Chan • 2020 Community Summit Update • DDA clients with tribal affiliation (self-identified) and receiving DDA services • Community residential providers are contracted statewide with the DDA to provide residential services to adult clients. Services include: o Supported Living o State Operated Living Alternatives o Group Training Homes or Group Homes o Alternative Living o Companion Homes To receive services an individual must be: o At least 18 year of age o Eligible and enrolled in DDA services and Medicaid o On or approved for the CORE Waiver or the Community Protection Waiver o Assessed by DDA as needing services in a supported living setting • Group Training Homes and Group Homes: Community-based, residential facilities who typically serve 5-12 adults.
    [Show full text]
  • A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems
    A Static Analysis Framework for Security Properties in Mobile and Cryptographic Systems Benyamin Y. Y. Aziz, M.Sc. School of Computing, Dublin City University A thesis presented in fulfillment of the requirements for the degree of Doctor of Philosophy Supervisor: Dr Geoff Hamilton September 2003 “Start by doing what’s necessary; then do what’s possible; and suddenly you are doing the impossible” St. Francis of Assisi To Yowell, Olivia and Clotilde Declaration I hereby certify that this material, which I now submit for assessment on the programme of study leading to the award of the degree of Doctor of Philosophy (Ph.D.) is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work. Signed: I.D. No.: Date: Acknowledgements I would like to thank all those people who were true sources of inspiration, knowledge, guidance and help to myself throughout the period of my doctoral research. In particular, I would like to thank my supervisor, Dr. Geoff Hamilton, without whom this work would not have seen the light. I would also like to thank Dr. David Gray, with whom I had many informative conversations, and my colleagues, Thomas Hack and Fr´ed´ericOehl, for their advice and guidance. Finally, I would like to mention that the work of this thesis was partially funded by project IMPROVE (Enterprise Ireland Strategic Grant ST/2000/94). Benyamin Aziz Abstract We introduce a static analysis framework for detecting instances of security breaches in infinite mobile and cryptographic systems specified using the languages of the π-calculus and its cryptographic extension, the spi calculus.
    [Show full text]
  • Zephyr: Hiding Metadata in a Messaging System
    Zephyr: Hiding Metadata in a Messaging System Friedrich Doku Irondale High School Email: [email protected] Abstract—Private messaging over internet related services is To communicate with other users Zephyr utilizes identity- difficult to implement. Regular end-to-end encryption messaging based encryption. Users only need to know the email address systems are prone to man in the middle attacks and only hide of the other user they wish to talk to. The public key of messages but not the identity of its users. For example, WhatsApp offers a strong privacy guarantee but does not hide much the recipient is computed with the recipients email address Metadata because it uses end-to-end encryption. Other messaging and a master public key [3]. Identity-based encryption allows systems such as Skype can be monitored by government agencies Zephyr to compute a recipient’s public key without revealing and have backdoors implemented into its software. the recipient’s identity. Zephyr is an anonymous messaging system that protects the Zephyr is a synchronous algorithm and at the end of privacy of message contents and message metadata. Users that every round of exchanging messages the users messages are use Zephyr do not reveal who they are talking to or the contents of their messages. The goal of Zephyr is to decrease the amount uploaded to mailbox servers. These mailboxes can be shared of information being sent by the user and hide as much metadata by many different users. Each user will download all the as possible. contents of her mailbox and attempt to decrypt every single message until the intended message is found.
    [Show full text]
  • Caad Futures Digital Proceedings 1987 179
    CAAD FUTURES DIGITAL PROCEEDINGS 1987 179 The role of media technology in the design studio P.Purcell Massachusetts Institute of Technology (U.S.A.) ABSTRACT: This paper refers to a program of work, which aims to integrate a range of computer-based multi-media technologies which has the overall goal of enhancing the processes of education in the design studio. The individual projects describe the development of visual information systems and intelligent design systems. The framework of support for much of the work is Project Athena, a campus wide initiative to apply new technology towards enhancing the educational process project. 1. INTRODUCTION The origins of the work, described in this paper lie in the awareness amongst university circles that the increasing pervasiveness of computers on the campus was not being matched by a concomitant thrust to use this facility in support of the processes of university education on the computer intensive campus. The emergence in the early eighties of a number of similar initiatives to investigate the potential of computers and associated media technologies as a support facility to enhance the processes of university education was a direct response to a general awareness that the potential was simply not being exploited. In the case of Massachusetts Institute of Technology, this initiative emerged as Project Athena. Athena provides the umbrella support for most of the developments described in this paper. Its focus is the potential of computers and media technology in the design studio and in design education generally, (especially referring to architectural design & graphic design). Design process and the visual image are key aspects of these disciplines and the work described here revolves around both of these elements.
    [Show full text]
  • Questions and Answers About Project Athena
    DRAFT October 31, 1986 QUESTIONS AND ANSWERS ABOUT PROJECT ATHENA by Steven R. Lerman Director Preface Project Athena is the largest university-wide educational program MIT has ever undertaken. Over time, Athena will influence the academic and social environment at the Institute in diverse ways. As with most ambitious programs, Athena raises a broad range of questions. This document tries to answer the most commonly-asked questions. It is in- tended primarily for students who are unfamiliar with Athena, its goals, its progress and its future directions. It also provides pointers on how to obtain more detailed information about various subjects. If you can't find answers to questions you have, follow the usual approach at MIT—ask someone else. Find someone on the Athena staff, and he or she will try to help. Athena will probably change your educational experience at MIT. Oc- casionally, you may experience some of the frustration that always is as- sociated with being on the leading edge of a new technology. At times, the changes seem to occur far too slowly; at other times, they happen too quickly. Just remember that part of the reason you came to MIT was to be part of the excitement associated with the forefront of technology and science! , What is Project Athena? In May 1983, MIT announced the establishment of a five-year program to ex- plore new, innovative uses of computing in the MIT curriculum. The MIT faculty was concerned that too little was being done to integrate the new com- putational technology into the undergraduate educational experience.
    [Show full text]
  • RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.1 | June 2016 UFED LOGICAL ANALYZER
    NOW SUPPORTING 19,776 DEVICE PROFILES +1,729 APP VERSIONS UFED TOUCH, UFED 4PC, RELEASE NOTES UFED PHYSICAL ANALYZER, Version 5.1 | June 2016 UFED LOGICAL ANALYZER HIGHLIGHTS Known for its breakthroughs in mobile data technology, Cellebrite is the industry’s leader – delivering comprehensive and innovative solutions for mobile forensics. Staying true to our DEVICE SUPPORT vision, UFED 5.1 introduces unique and exclusive capabilities, ◼ Cellebrite introduces physical extraction while bypassing providing unmatched access to case-critical evidence. user lock for 22 Samsung Galaxy devices including Galaxy S6, S6 Edge and Note 5 – with forensic recovery partition. Cellebrite introduces physical extraction ◼ A unique lock-bypassing method that allows physical while bypassing user lock for Samsung extraction of more than 140 LG models, including 22 Galaxy S6, S6 Edge and Note 5. previously-unsupported models, such as the MS330 and VS880. This method additionally allows the removal and restoration of the user screen lock. EXCLUSIVE - ONLY AT CELLEBRITE: ◼ A unique user screen lock removal method supporting A unique lock-bypassing method that 137 Samsung device (for some devices, there is more allows physical extraction of more than than 1 method).* 140 LG models, including 22 previously- ◼ First in Industry – Physical extraction while bypassing unsupported models, such as the MS330 lock and decoding support for 19 Huawei devices. and VS880. ◼ A unique user screen lock removal method supporting 17 selected LG devices, including the G5. A user screen lock removal method ◼ Cellebrite introduces physical extraction while bypassing supporting 137 Samsung devices. user lock as well as decoding support for 3 Nokia 105 devices: RM-1133, RM-1134 and RM-1135.
    [Show full text]