FY 1999 Report on the Results of the Research Cooperative Project on The

Total Page:16

File Type:pdf, Size:1020Kb

FY 1999 Report on the Results of the Research Cooperative Project on The 3FJ$11* J$W£t6A Vl$12^5fl HECO 1 001 5426-9 1 9 9 U, ASEANSIS© ##&#©§#$Sit. LX, $$ 1 1¥S (1 9 9 9%) j:OSJESnfc„ ASSto W6l£i5ljZ>mffl±M ffl?£7)£$*EtiS»>TSSBP^TUfflfbHEML U 5lV>Ttt^©B©63ESS^I^©5$'fbCStf5rt§:Btohr5.„ J£<T-v5:IiU L%VX$©#@#1%#^ && g'T. lU^Sto ASEAN 5*BC;fo'XT, 8fr©/nyx? E&flJgU SlffllbCSg^S TTfBtt© 1 l^ll/Dyi^ hig ^Bi (7tfiB:7'i\ H #: 7-I-to© 51 (to ) H itibe J; 2>11T“fe:7 5 y 7 (*f«tB:7to (to ) (MM.a-.'Ob'Zi'T, #*#: E»(to) 7'y7^H%WebTM^ESSti'pji»7°7'ffx-^-y7>©Sfli (TtftB: 'f 7K*->7, !S^f: (to 73-;V) r> a Aia/i*S 77X7^ v 7$cD S>(Om% mns-.y^)^y, (to ) (^*B:7l/ —>7, (to ) (*faH:^h7A, (to) ^b7AgB$#*©#m{@m©^©©#a&#K#© (yf^B:-7b7A, #%#:*# (to) 11 (#%»:%*#©#* T — * * JK * ©mis y-IBACjoVT, rii^ssbJ ©SJStei: LTAS^irraEateSrpismt: LT*SbfflfflT6 i6TC, (9 A'9fc©* (#) ) ssttffl®ejWD*»)Wcov'T5ifSELfc»s, rc<j ©&am*m*x#ak^7^m&#t. geWbCfctStiia x b©<6T;6$eT$> 9. jD*»*»JS:»*^6*tfK:«IA-CBfSES:**l'tTV>S„ vVT, 7x7-( b 37S^8Bm%ife$1"afcit>©-b7 5 y 7 XSAKSCoVt, IK#%±& B*#^ S 7 4" L&tem, &»©7 4 seto±®S^-C<k 9, sesesai: tb-tTSfe© KV^®S,»SS (WfcJf'i's (%) ) 9Effl-(b©/c»©3.—f—yx b &6&ti>Tva„ -<y K^-yytrgScfca r^L%Rj SSaSSttR^ "Efflff5" CJ: 9«jt-taroefcfrofc m tern, ±a*©#{b#c#wx#a#mam©ma^x# aazm±, te4oe©a# (sm cm ) fln«l{b£jto L fc;: <b c & 9, tfc, "ES!F" 6©X, a*+'J'ife*x©x sbb^itBL, m^mmm*cmtfa^*&^©z^a. 7-77# H% Web -Ctg&WMX 4 y b-*->7©±EE*r$)5i®iBe*irtiVT, %#x#, «sx«, ^##&te^tm - GE*X@ #*#/ Wi-mr */h©Mis *~Mvhmt'tz>'('s9-%v b L tt @# c#mx #- & y x A A &;m L &. ( (#) 73-JI-) y^SfiW *S7vtf, 3tf-®©-y-xs*$jX7XT^ u kfy-ct$KU'j:snxtfcas, Xtt£® 0 Ahfc±$r 5^9? aE#xT^@G#&m9 m@cy amm&Misxa c t c«t 9, t cjs# l^. fi@S,©MIS Sfc, 7-f V kfy©n-*;uX7XT-f ^ X W©isEfflt)^lgj: L, &JSXmW5SMIS-tey7-Cft« (7-r vtfy&T (#) ) sevfc. 7 V —> 7 C *5 tt a vu—yrcfeV'-c, 9 #Aa a z k & B 7b—>7©tt tsis^gfii Lfcsmiisi'fb mca--,^#0'57;b <37• mmu, fa&%m*§i:#*mxLx, • ss CMXa#RIW%M# u y^L^tem, 2. 5©©itSl-fb^jiiS"?Sfc„ c©tem&tkc, 7v-yyS^tt cm ) Xti, 98Ei§©iiS*bbltH%itt©TVa„ mm^Amyx^x bR#m# Am:m^@^&a7X'<xb&A^')j.7XTf 4 b, t;i/o-X7 7 4/<-Xft#L, xv-bBE ©M% *w&#mxaw%&"< b7Ax y- bx#a#mxe3A:tem, M%s©siit-fi8»Lfc„ -^btAi oiiKf«« m)) %E«-by? -xSTiS^cESL/t tr-7*xt ut, %mfb&m©xv^a. %#777#B-\©#bb%i#6BKlk LT, -( b f A#B*#*0|k%%%X©(S&&#l:-7b\X#geL fflfc*©®fi»fg*© MIS 6 Item, *©***# &<§& L zfc $ $ a Ef=m# Sr mm L, (*$S (tt) ) * Wt’ 4M ■R rn: co K £1 l|IIQ •tti" # & OJ m & G m m fr # m # v # ■QS m «c V i t e m s * w LX N — B#:------- 1. Wft ..................................... 2 2. gW ........................................... 3 3. ............................................... 4 4. ............................................... 5 4-D 5 4-2) 13 4-3) 20 4-4) 35 %#(/)## 21 4-5) S<ia 31 T' h 22 5. ................................ -............. 24 - .................................................... 24 • ......................................................-—........................................................... 25 6. $ & A 26 ?. 27 8. m ^ 28 1 llStott;MillF k]to4ottX\ ”145 £ fc”©gij£fe i: ^(D±MM II^PbI 3, 000-5, 000 h>S$Tfc5„ ttT'tt, ®Etol4S*®i@f4'^SSl 4ii&Sn7k^SLr#ibiL5iSEr 5 ymig^#i4m*#^#i-5m*#t, L< i4#*m#k LT©$ijmmm^m# 5ii5„ litstoi4, ^4tt:rn45am&u%am*^«#stw9mA^6, m SiittEppp©mwfiwm5ii5S#®-otfc5 i s x.5„ 2 2. gift Sffitttiu ###-##% i 2%, 5%<o6R^y/<^»-e 6>5o Table-1 4 5 f£, It Btttt. ftSft’tftfett:? x^” 4 jgT?£>5 t£7 lx—> ttti? L *VS"Ct4, rro|§ZttT®:t y/^itiyfS. Itaf y/<4 tup izmykftM-tz T4)c4cT#W%6T$y Wffl/y-oiSHtMeffi-fti § ii/tlMS* fc4 LT5 4 k & S ft t Lfc0 Table-1. Comparison of Amino Acids Composition unit : weight % Mung Bean Flake Soy Bean Flake Wheat Gluten Asp 8.6 12.9 3.7 Thr 1.6 3.8 2.4 Ser 3.7 5.8 4.4 Glu 11.4 23.4 34.7 Pro 2.7 6.6 11.8 Gly 2.5 4.6 3.4 AI a 2.7 4.5 2.6 Cys — — 2.8 Va I 1.7 5.2 3.4 Met 0.7 1.3 1.3 I le 1.5 5.0 3.1 Leu 4.2 7.9 6.6 Tyr 1.7 4.6 2.8 Phe 3.6 5.9 4.8 Lys 3.7 5.7 1.9 His 1.4 2.8 1.9 Trp — 1.0 1.5 Arg 3.4 9.0 3.1 3 3 . y Mf4*^(The King Mongkut ’s University of Technology Thonburi, JUT KMUTT b B&T) © ufc0 TISSSSrISffl LfcBS^yuy ©i#X^xfW, & t>\ mu, #6i%UT s SLt, *©#Wl4, SlW«ifc±tLTjiau yy*©#(*J4T©#% B:$:U$©T VcJTfflJEllfl^jfiS LU0 —T, KMUTT TIT llfrt L< t4«Tlg*TioT#ibH5TU®fls£;? y y/<y ©#T#An7j<T#u©©-c©#M&#ai Lfc0 ■ ft, *©*(#)Ug< rlrU^oT, $?©*»)-9t©Stttk yy*©*M~KMUTT !%©#$g©&# • SiftTSSUTS J: 5S?©U„ 4 itsrt I? t t ©SS: t©o i' X U T in$B£'T 5 0 2) ^WHTgg 5i%5 HSir J: ZWkfim s) fd5k-y->7°/vdoiig$j 4) H=BtttroF{ffl 5) $^ia 3 7-. h Btfli 4-1) miEgIXSM Srfflv ^fcjJfl*^vlS <*ii> BSSB'ItT 4 SISrBty/4^©jmTkgSifett. yTroSASrX*^ LT4rv\ i)H*M^]wass, 2)siE^#©ftiiE. 3)gism©##^t4if gSto §r 5 %(w/v)©i$s4*345 t^®iSE(NaOH tt pH=8 lr|HS)$*|@ gL, F- ht v—7"tr J:5^S(120°C x 30 2 [all# *9 111© ###©## LfcHS8$aESrM$R*«-e2 0 #& 1 %)4*6 4 5 L, KJ£S.5 40oc(rTiD7k^tE)©&^$£L/t„ Ki$a#|igii i Lfc0 ixJ3^&Vg£S*TB|©Kf5Etiy iS-L'^ElTJ; ^•ErliSkztStitc^F, -t iitfi'i©E.SSIt&S!l£T3 4 144 *0 , A#i#i#$i4**74c 44© KlrTEtofitSm, Sat-tMi • wm ■ • 4f.@©€-xg&3ii£1- 544445 #■ b jafcSf*Sn nDtiWmF{ffiK# Lfc0 <s > *©5S(W©W"f 5iiB£®*0iiLSF4S<5©X\ * ©z^tiJPTk^fgfsff 4 LT 3 fiStorfflSUXStSISr^ikilS L/c„ 4il3©i#S:$r.ffl©T 1 0 B RR©ilP7K54 HIBSSiSliSU *9i^fcgt)S1-5 tSbti5SIS 1 88^8$ Lfcc Table-2 4lSSfi»L/t 3 f$8©HSE9JT:'tt , SSI bil-f, kX<0»£X9 0 6 irfcc ~S© Table-3 «CI4ilSSSE±S1t,roiSIIIT S /tmrfLim Lfc, ft SW*Mftt47 5 yE5tc-fe3t"/v77 5 L-/5 4 4 44 Umamizyme t Flavourzyme zt Amano M (TbhtS LTrSil'''SfCfE&zt L fee 5 Table-2. Amano M 90. 5 Umamizyme 93. 3 Flavourzyme 91.6 Table-3. 5 /BMM Amano M Umamizyme Flavourzyme mm* (%) 3. 770 2. 550 2. 570 Asp (%) 0. 671 0. 568 0. 598 Thr (%) 0. 648 0. 503 0. 501 Ser (%) 1. 230 0. 916 0. 939 Glu (%) 2. 530 2. 240 2. 340 Pro (%) 0. 330 0. 450 0. 360 Gly (%> 0. 390 0. 444 0. 439 A1 a (%) 0. 795 0. 605 0. 618 Cys (%) — — — Val (%) 1. 280 0. 879 0.911 Met (%) 0. 215 0. 157 0. 166 1 1 e (%) 0. 997 0. 797 0.813 Leu1 (%) 1.640 1. 300 1. 330 Tyr (%) — — — Phe (%) L 210 0. 865 0. 886 Lys (%) 1. 330 0. 896 0.926 His (%) 0. 428 0. 306 0. 465 Arg (%) 1. 280 0. 827 0. 885 G1 u/i&lIS 0. 671 0. 878 0. 911 im%n B Wii. iaft&#mnzK^#r 5 © b (© J: o xMfttt© h 5 i» r 5 yr t-tfcdo ©©r ©v^f $ ©#©##$ a. Sfe,ir5®iBDp©-fffifi:tT** < SS^-RlE'-to ©j%tb 3 ®S©;tm7.k 774Vl-##©#"###^^ t. $ i^/i SP^?N Umamizyme ^ tz.I'i. Flavourzyme Z5^0zK^##^Amano M Z % ItGO# 7h Flavourzyme §r{^^"t" 6 ^ (C LT^o t^cKs Flavourzyme L/Uo 1)£ 6 i) SS&VBSSStom SKSfc9©B$SiDSSrfmt-5r < W4-"f 5„ Fig. 1 ^T-e©SRziSi: S m ^©Bai^SriSI"(SZPSfrx*? : S 5 %) H«S l 0 %tVO$m-e TdiSttlg* ibfl&A^fcd'K SHSS 1 5 %©$#T}tg ssewtotiTzmissnfco setttT 5 /s6-efc5©>^ 5 lRlS©«|iaSriSLfc(Fig. 2)c Z©SHI J: 9 . y.T©^KT®$KilStt l 0% t Lfc0 (KJ5E^©ilS#Stt i %©* So USto^SKiSSil i 0 %lc##) Fig.1 Effect of Substrate Concentration on T-N Recovery Substrate (%) Fig.2 Effect of Substrate Concentration on T-N Recovery <D£ O> o cr Luo Substrate (%) 7 2)SJCS.&©tfcrt »;csc&s©##&m^s. sfisscic sa^frT-efTto^tttitf*^ -t\ m$?$(DRfcitmm5M}5it(DW,&frbtitiL<^\ *bxsbj ©$s S.SH4 o ~ 6 Ottfcsrti^, SCSS^iBKKC-fC© iCi '9MM tmffi^TibnZo #*©si±ssr #C/c$-a\ llftWy h©---5tfc6„ Fig. 3 CSCiS.lt iSsSfiKCwISfi^S-fo SCiSS^iiKKSI-Cr t tcj; ^SSEEWtiT-tMlfaSr/ISLfco c©S£SU:i9, SCiSS-IHtlC tOS/BiCE fi3»}©4 00ciLfco Fig.3 Effect of Reaction Temperature on T-N Recovery Temperature (°C) 3)S/C P H©#B ±ie 2) ltscp hc -ov © tSMLfc, Fig.
Recommended publications
  • Microsoft's Internet Exploration: Predatory Or Competitive?
    Cornell Journal of Law and Public Policy Volume 9 Article 3 Issue 1 Fall 1999 Microsoft’s Internet Exploration: Predatory or Competitive Thomas W. Hazlett Follow this and additional works at: http://scholarship.law.cornell.edu/cjlpp Part of the Law Commons Recommended Citation Hazlett, Thomas W. (1999) "Microsoft’s Internet Exploration: Predatory or Competitive," Cornell Journal of Law and Public Policy: Vol. 9: Iss. 1, Article 3. Available at: http://scholarship.law.cornell.edu/cjlpp/vol9/iss1/3 This Article is brought to you for free and open access by the Journals at Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell Journal of Law and Public Policy by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. MICROSOFT'S INTERNET EXPLORATION: PREDATORY OR COMPETITIVE? Thomas W. Hazlettt In May 1998 the U.S. Department of Justice ("DOJ") accused Microsoft of violatirig the Sherman Antitrust Act by vigorously compet- ing against Netscape's Navigator software with Microsoft's rival browser, Internet Explorer. The substance of the allegation revolves around defensive actions taken by Microsoft to protect the dominant po- sition enjoyed by Microsoft's Windows operating system. The DOJ's theory is that, were it not for Microsoft's overly aggressive reaction to Netscape, Navigator software would have been more broadly distributed, thus enabling competition to Windows. This competition would have come directly from Java, a computer language developed by Sun Microsystems and embedded in Netscape software, allowing applications to run on any underlying operating system.
    [Show full text]
  • Server: Apache
    Modern Trends in Network Fingerprinting SecTor [11.21.07] Jay Graver Ryan Poppa // Fingerprinting Topics Why, What, Who & How? Tools in action Why Tools Break Tools EOL New Approaches New Tool // Why Fingerprint? WhiteHat needs accurate identification of hosts in a PenTest report BlackHat reconnaissance SysAdmins track down and identify new services or hosts when they appear on their network // What is a Fingerprint? Looking at something common … 192.168.2.187:8004 192.168.2.187 [152] 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d HTTP/1.1 200 OK. 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f .Connection: clo 73 65 0d 0a 41 6c 6c 6f 77 3a 20 4f 50 54 49 4f se..Allow: OPTIO 4e 53 2c 20 47 45 54 2c 20 48 45 41 44 2c 20 50 NS, GET, HEAD, P 4f 53 54 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e OST..Content‐Len 67 74 68 3a 20 30 0d 0a 44 61 74 65 3a 20 46 72 gth: 0..Date: Fr 69 2c 20 30 32 20 4e 6f 76 20 32 30 30 37 20 32 i, 02 Nov 2007 2 32 3a 32 35 3a 31 38 20 47 4d 54 0d 0a 53 65 72 2:25:18 GMT..Ser 76 65 72 3a 20 6c 69 67 68 74 74 70 64 2f 31 2e ver: lighttpd/1. 34 2e 31 35 0d 0a 0d 0a 4.15...
    [Show full text]
  • Escuela T´Ecnica Superior De Ingeniería De
    ESCUELA TECNICA´ SUPERIOR DE INGENIER´IA DE TELECOMUNICACION´ Ingenier´ıa de Telecomunicacion´ PROYECTO FIN DE CARRERA Learning Analytics, Escalabilidad, Mejora de la Experiencia de Usuario e Internacionalizacion´ de la Herramienta de E-Learning FLEQ Autor: Cristina Lavado Arevalo´ Tutor: Gregorio Robles Mart´ınez Curso Acad´emico2013/2014 Proyecto Fin de Carrera LEARNING ANALYTICS, ESCALABILIDAD, MEJORA DE LA EXPERIENCIA DE USUARIO E INTERNACIONALIZACION´ DE LA HERRAMIENTA DE E-LEARNING FLEQ Autor Cristina Lavado Arevalo´ Tutor Gregorio Robles Mart´ınez La defensa del presente Proyecto Fin de Carrera se realiz´oel d´ıa de de , siendo calificada por el siguiente tribunal: PRESIDENTE: SECRETARIO: VOCAL: y habiendo obtenido la siguiente calificaci´on: CALIFICACION:´ Fuenlabrada, a de de . Copyright c 2014 Cristina Lavado Ar´evalo Este documento se publica bajo la licencia Creative Commons Reconocimiento-CompartirIgual 3.0 Espa~na http://creativecommons.org/licenses/by-sa/3.0/es (Ver Ap´endices) A mi familia Agradecimientos Esta´ es la culminaci´onde innumerables experiencias personales, que han dejado en m´ıgrandes recuerdos. Enumerar a todas las personas que me han apoyado e inspirado en estos ´ulti- mos a~noses una tarea incompleta y que voy a revelar ahora. Son muchas las personas a las que tengo que agradecer haber conseguido realizar el sue~node presentar este Proyecto y dar por finalizada una etapa de mi vida de la que me llevo grandes momentos. A los primeros que tengo que dar las gracias es a mi familia, y sobre todo a mis padres, sin vosotros no habr´ıa sido posible, gracias por vuestro apoyo incondicional y vuestro sacrificio durante estos a~nos.Sin la confianza que siempre hab´eisdepositado en m´ı,vuestra sinceridad y consejos este Proyecto y muchos logros personales no habr´ıanvisto la luz.
    [Show full text]
  • Web Server Administration - the Easy Way
    Chapter 1: What’s In Your Web Site? Get to Know Your Web Server Administrator Web server computer platforms UNIX Macintosh Windows NT Web server software NCSA, W3C/CERN, and Apache Windows NT WebSTAR and MacHTTPD How your Web site fits into the whole Administrator’s jargon and management tools Round Up the Usual Suspects! Inventory Web server resources Take stock of your Web site Lotsa docs (it’s not an M.D.’s convention) Graphics galore The supporting cast of applications… Marvelous miscellany “Organized Web site” is not an oxymoron Where does your site live? Picture your directory/file structure as a tree You can’t tell the territory without a map Understanding all the pieces and parts Using remote hyperlinks What’s the code situation like? Any imagemaps in the picture? Strategic Planning for Your Web Site Juggling large document collections Tooling Up for Web Site Management What tools do you really need? Tool search adventures Judge what you find How to get ’em when you find ’em Wheeling and dealing: what’s your budget? Chapter 2: Web Server Administration - the Easy Way Web Server Hosting Options Web server hosting services Local Web server hosts Web server space renters Web malls Your friendly neighborhood ISP Your organization’s LAN You!? How the Web Server Fits into the Whole The hardware: computer and telephone equipment Web server software and (briefly) how it works The basics Passing information into and out of the HTTP server Web Server Platforms UNIX and the Web Windows (NT and 95) are coming on strong The Macintosh alternative
    [Show full text]
  • Apache Web Server ______
    Apache Web Server _____________________________________________________________________________________________________ Original author(s) Robert McCool Developer(s) Apache Software Foundation Initial release 1995[1] 2.4.9 (March 17, 2014) [±] Stable release Development Active status Written in C, Forth, XML[2] Type Web server License Apache License 2.0 Website httpd.apache.org The Apache HTTP Server , commonly referred to as Apache , is a web server application notable for playing a key role in the initial growth of the World Wide Web.[3] Originally based on the NCSA HTTPd server, development of Apache began in early 1995 after work on the NCSA code stalled. Apache quickly overtook NCSA HTTPd as the dominant HTTP server, and has remained the most popular HTTP server in use since April 1996. In 2009, it became the first web server software to serve more than 100 million websites.[4] Apache is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation. Most commonly used on a Unix-like system,[5] the software is available for a wide variety of operating systems, including Unix, FreeBSD, Linux, Solaris, Novell NetWare, OS X, Microsoft Windows, OS/2, TPF, OpenVMS and eComStation. Released under the Apache License, Apache is open-source software. As of June 2013, Apache was estimated to serve 54.2% of all active websites and 53.3% of the top servers across all domains.[6][7][8][9][10] 1 Apache Web Server _____________________________________________________________________________________________________ Name According to the FAQ in the Apache project website, the name Apache was chosen out of respect to the Native American tribe Apache and its superior skills in warfare and strategy.
    [Show full text]
  • Status and Projections of the NAS Program Frank R
    https://ntrs.nasa.gov/search.jsp?R=19870015491 2020-03-20T10:46:12+00:00Z View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by NASA Technical Reports Server NASA Technical Memorandum 88339 . , Status and Projections of the NAS Program Frank R. Bailey EECGECTIOIS CP f Avail: NTlS P87-24924 CSCL 09B 63 Unclad 0080153 July 1986 National Aeronautics and Space Administration ~~ ~ NASA Technical Memorandum 88339 Status and Projections of the NAS Program Frank R. Bailey, Ames Research Center, Moffett Field, California July 1986 NASA National Aeronautics and Space Adminlstratlon Ames Research Center Moffett Field. California 94035 STATUS AND PROJECTIONS OF THE NAS PROGRAM by Dr. F. Ron Bailey to be presented at the SYMPOSIUM ON FUTURE DIRECTIONS OF COMPUTATIONAL MECHANICS ASME Winter Annual Meeting December 7-12, 1986 Anaheim, California ABSTRACT NASA's Numerical Aerodynamic Simulation (NASI Program has completed devel- opment of the initial operating configuration of the NAS Processing System Net- work (NPSN). This is the first milestone in the continuing and pathfinding effort to provide state-of-the-art supercomputing for aeronautics research and development. The NPSN, available to a nation-wide community of remote users, provides a uniform UNIX 1 environment over a network of host computers ranging from the new Cray-2 supercomputer to advanced scientific workstations. This system, coupled with a vendor-independent base of common user interface and network software, presents a new paradigm for supercomputing environments. Presented here is the background leading to the NAS Program, its programmatic goals and strategies, technical goals and objectives, and the development activ- ities leading to the current NPSN configuration.
    [Show full text]
  • Comparison of Web Server Software from Wikipedia, the Free Encyclopedia
    Create account Log in Article Talk Read Edit ViewM ohrisetory Search Comparison of web server software From Wikipedia, the free encyclopedia Main page This article is a comparison of web server software. Contents Featured content Contents [hide] Current events 1 Overview Random article 2 Features Donate to Wikipedia 3 Operating system support Wikimedia Shop 4 See also Interaction 5 References Help 6 External links About Wikipedia Community portal Recent changes Overview [edit] Contact page Tools Server Developed by Software license Last stable version Latest release date What links here AOLserver NaviSoft Mozilla 4.5.2 2012-09-19 Related changes Apache HTTP Server Apache Software Foundation Apache 2.4.10 2014-07-21 Upload file Special pages Apache Tomcat Apache Software Foundation Apache 7.0.53 2014-03-30 Permanent link Boa Paul Phillips GPL 0.94.13 2002-07-30 Page information Caudium The Caudium Group GPL 1.4.18 2012-02-24 Wikidata item Cite this page Cherokee HTTP Server Álvaro López Ortega GPL 1.2.103 2013-04-21 Hiawatha HTTP Server Hugo Leisink GPLv2 9.6 2014-06-01 Print/export Create a book HFS Rejetto GPL 2.2f 2009-02-17 Download as PDF IBM HTTP Server IBM Non-free proprietary 8.5.5 2013-06-14 Printable version Internet Information Services Microsoft Non-free proprietary 8.5 2013-09-09 Languages Jetty Eclipse Foundation Apache 9.1.4 2014-04-01 Čeština Jexus Bing Liu Non-free proprietary 5.5.2 2014-04-27 Galego Nederlands lighttpd Jan Kneschke (Incremental) BSD variant 1.4.35 2014-03-12 Português LiteSpeed Web Server LiteSpeed Technologies Non-free proprietary 4.2.3 2013-05-22 Русский Mongoose Cesanta Software GPLv2 / commercial 5.5 2014-10-28 中文 Edit links Monkey HTTP Server Monkey Software LGPLv2 1.5.1 2014-06-10 NaviServer Various Mozilla 1.1 4.99.6 2014-06-29 NCSA HTTPd Robert McCool Non-free proprietary 1.5.2a 1996 Nginx NGINX, Inc.
    [Show full text]
  • Einführung in Z/OS Und OS/390
    Einführung in z/OS und OS/390 Dr. rer. nat. Paul Herrmannn Prof. Dr.-Ing. Wilhelm G. Spruth WS 2006/2007 Teil 3 z/OS Betriebssystem es 0101 ww6 wgs 09-99 System z und S/390 Betriebssysteme z/OS IBM große Installationen (OS/390, MVS) z/VSE IBM mittelgroße Installationen z/VM IBM Virtualisierung, Software Entwicklung TPF IBM spezialisierte Transaktionsverarbeitung UTS 4 Amdahl based on System V, Release 4 (SVR4) OSF/1 Hitachi Open System Foundation Unix z/Linux Public Domain Alle System z bzw. S/390 Betriebssysteme sind Server Betriebssysteme, optimiert für den Multi-User Betrieb es 0521z ww6 wgs 09-99 Transaction Processing Facility TPF 13. Oktober 2006. Die Firma Worldspan, ein weltweiter Anbieter von Reise-Reservierungs- systemen, hat sich für den Einsatz von sechs IBM System z9 Enterprise Class (EC) Mainframe-Servern entschieden. Worldspan will damit sein Angebot an elektronischen Datendiensten erweitern, um circa 700 Anbietern von Reiseangeboten und Millionen von Reisenden weltweit eine gemeinsame Plattform anbieten zu können. Worldspan setzt die neuen IBM System z9 EC Server ein, um sowohl Reisebüros als auch Anbietern von Online-basierten Reisediensten die Möglichkeit zur Nutzung des weltweiten Global Distribution System (GDS) zu geben, über das zum Beispiel die Bestellung und Buchung von Reiseprodukten von Flugzeugtickets, Hotels, Mietwagen und andere Reisedienstleistungen durchgeführt wird. Durch die Nutzung der Software „IBM Transaction Processing Facility“ (TPF) ist Worldspan in der Lage, 17.000 Kundenanfragen pro Sekunde auf
    [Show full text]
  • Apache HTTP Server
    Apache HTTP Server The Apache HTTP Server, colloquially called Apache sive and kick some ass.” (/əˈpætʃiː/ ə-PA-chee), is the world’s most used web server software. Originally based on the NCSA HTTPd When Apache is running, its process name is sometimes server, development of Apache began in early 1995 af- httpd, which is short for “HTTP daemon.” ter work on the NCSA code stalled. Apache played a key role in the initial growth of the World Wide Web,[4] quickly overtaking NCSA HTTPd as the dominant HTTP server, and has remained most popular since April 1996. 2 Feature overview In 2009, it became the first web server software to serve more than 100 million websites.[5] Apache supports a variety of features, many implemented Apache is developed and maintained by an open com- as compiled modules which extend the core functional- munity of developers under the auspices of the Apache ity. These can range from server-side programming lan- Software Foundation. Most commonly used on a Unix- guage support to authentication schemes. Some common [6] like system (usually Linux), the software is available language interfaces support Perl, Python, Tcl, and PHP. for a wide variety of operating systems besides Unix, Popular authentication modules include mod_access, including eComStation, Microsoft Windows, NetWare, mod_auth, mod_digest, and mod_auth_digest, the suc- OpenVMS, OS/2, and TPF. Released under the Apache cessor to mod_digest. A sample of other features in- License, Apache is free and open-source software. clude Secure Sockets Layer and Transport Layer Secu- As of November 2015, Apache was estimated to serve rity support (mod_ssl), a proxy module (mod_proxy), a 50% of all active websites and 37% of the top servers URL rewriting module (mod_rewrite), custom log files across all domains.[7] (mod_log_config), and filtering support (mod_include and mod_ext_filter).
    [Show full text]
  • Microsoft's Internet Exploration: Predatory Or Competitive?
    MICROSOFT'S INTERNET EXPLORATION: PREDATORY OR COMPETITNE? Thomas W Hazlettt In May 1998 the U.S. Department of Justice ("DOJ") accused Microsoft of violatirtg the Sherman Antitrust Act by vigorously compet­ ing against Netscape's Navigator software with Microsoft's rival browser, Internet Explorer. The substance of the allegation revolves around defensive actions taken by Microsoft to protect the dominant po­ sition enjoyed by Microsoft's Windows operating system. The DOJ' s theory is that, were it not for Microsoft's overly aggressive reaction to Netscape, Navigator software would have been more broadly distributed, thus enabling competition to Windows. This competition would have come directly from Java, a computer language developed by Sun Microsystems and embedded in Netscape software, allowing applications to run on any underlying operating system. Fearing the spread of Java would render a Windows monopoly moot, the DOJ argues, Microsoft engaged in predatory behavior to pre-empt Netscape and, therefore, Java. This set of allegations can most usefully be analyzed under a four-part test for predation examining opportunity, intent, conduct, and effect. The analysis hereunder shows that while Microsoft's aggressive actions have likely injured specific competitors, the "browser jihad" featured as Ex­ hibit A in the DOJ' s antitrust case is a dramatic illustration of the pro­ consumer consequences of robust market rivalry. I. THE GOVERNMENT'S CASE: PREDATION "To protect its valuable Windows monopoly against such potential competitive threats [from Netscape and other new software products], and to extend its operating system monopoly into other software markets, Microsoft has engaged in a series of anticompetitive activities.
    [Show full text]
  • Joseph S. Mertz Jr. EDUCATION
    Jan 2020 Joseph S. Mertz Jr. H. John Heinz III College & Dietrich College of Humanities and Social Sciences Carnegie Mellon University Pittsburgh, PA 15213-3890 Phone: (412) 268-2540 Email: [email protected] EDUCATION: 1995 Carnegie Mellon University Ph.D. in Engineering and Public Policy 1983 University of Southern California M.S. in Computer Science 1982 Pennsylvania State University B.S. in Computer Science ACADEMIC APPOINTMENTS: Carnegie Mellon University 2018 – present: Director - Information Systems Program 2015 – present: Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2010 – 2015: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College Dietrich College of Humanities & Social Sciences Information Systems Program 2005 – 2010: Associate Teaching Professor Joint 50/50 appointment: H. John Heinz III College School of Computer Science Spring 2009: Associate Teaching Professor Carnegie Mellon Qatar Computer Science Spring 2008: Associate Teaching Professor Carnegie Mellon Qatar Computer Science 2002 – 2005: Associate Teaching Professor Joint 50/50 appointment: Mertz-CV H. John Heinz III School of Public Policy & Management School of Computer Science 1996 – 2002: Co-Director Center for University Outreach 1994 – 1996: Post Doctoral Fellow Center for Innovation in Learning 1988 – 1995: Graduate Research Assistant Department of Engineering & Public Policy University of Puerto Rico 1986 – 1987: Visiting Professor Department of Electrical & Computer Engineering Illinois Benedictine College 1984: Adjunct Instructor Computer Science AWARDS: Mark Gelfand Service Award for Educational Outreach – 2012 Annual University honor for sustained, effective community service with academic coursework to enhance learning, and teach social responsibility. Nominated for the Martcia Wade Teaching Award – 2012 H.
    [Show full text]
  • How Attackers Break Programs, and How to Write Programs More Securely
    How Attackers Break Programs, and How To Write Programs More Securely Matt Bishop Department of Computer Science University of California at Davis Davis, CA 95616-8562 United States of America email: [email protected] www: http://seclab.cs.ucdavis.edu/~bishop phone: +1 (530) 752-8060 © 2002 by Matt Bishop This page deliberately left blank. That is, this page would have been blank except that we had to put the notice "this page deliberately left blank" on it. Otherwise, you might have seen the blank page and worried that someone left a page out of your booklets. So, we put a note on the blank page to assure you that no-one forgot to put something on this page; indeed, we intended for it to be blank. But we could not live up to our intentions, for the reason stated above, so we couldn't put a blank page in here. We had to put a page with some writing on it. So we couldn't put the notice "this page deliberately left blank" because it's not true and, if we couldn't tell when a page is blank, you'd doubt the veracity of everything we did. So we wrote this paragraph to ... oh, heck, forget it. Table of Contents sections slides Overview..................................... 1— 13 Attacking Programs ........................... 14—123 Overview .......................14 — 20 Users and Privilege ...............21 — 29 Environment ....................30 — 48 Buffer Overflow ..................49 — 70 Numeric Overflow ................71 — 76 Validation and Verification .........77 — 92 Race Conditions..................93—112 Denial of Service ............... 113—121 Environment .................. 122—123 Writing Better Programs ......................124—379 Overview ....................
    [Show full text]