WP-MIRROR 0.7.4 Reference Manual

Total Page:16

File Type:pdf, Size:1020Kb

WP-MIRROR 0.7.4 Reference Manual WP-MIRROR 0.7.4 Reference Manual Dr. Kent L. Miller November 22, 2014 DRAFT 1 DRAFT 2 To Tylery DRAFT i WP-MIRROR 0.7.4 Reference Manual Legal Notices Copyright (C) 2012–2014 Dr. Kent L. Miller. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. THIS PUBLICATION AND THE INFORMATION HEREIN ARE FURNISHED AS IS, ARE FURNISHED FOR INFORMATIONAL USE ONLY, ARE SUBJECT TO CHANGE WITH- OUT NOTICE, AND SHOULD NOT BE CONSTRUED AS A COMMITMENT BY THE AU- THOR. THE AUTHOR ASSUMES NO RESPONSIBILITY OR LIABILITY FOR ANY ER- RORS OR INACCURACIES THAT MAY APPEAR IN THE INFORMATIONAL CONTENT CONTAINED IN THIS MANUAL, MAKES NO WARRANTY OF ANY KIND (EXPRESS, IMPLIED, OR STATUTORY) WITH RESPECT TO THIS PUBLICATION,AND EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR PAR- TICULAR PURPOSES, AND NONINFRINGEMENT OF THIRD-PARTY RIGHTS. The WP-MIRROR logotype (see margin) was released by the author into the public domain on 2014-Apr-10. See https://www.mediawiki.org/wiki/File:Wp-mirror.png. This logotype fea- tures a sunflower that is derived from 119px-Mediawiki logo sunflower Tournesol 5x rev2.png, which is also in the public domain. See https://en.wikipedia.org/wiki/File:Mediawiki_logo_sunflower_Tournesol_5x.png. Debian is a registered United States trademark of Software in the Public Interest, Inc., man- aged by the Debian project. Linux is a trademark of Linus Torvalds. InnoDB and MySQL are trademarks of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Abstract The Wikimedia Foundation offers wikipedias in nearly 300 languages. In addition, the WMF has several other projects (e.g. wikibooks, wiktionary, etc.) for a total of around 1000 wikis. WP-MIRROR is a free utility for mirroring any desired set of these wikis. That is, it builds a wiki farm that the user can browse locally. Many users need such off-line access, often for reasons of mobility, availability, and privacy. WP-MIRROR builds a complete mirror with original size media files. WP-MIRROR is robust and uses check-pointing to resume after interruption. By default, WP-MIRROR mirrors the simple wikipedia, the simple wiktionary (Simple En- glish means shorter sentences), and the wikidata wiki (a centralized collection of facts us- able by all other wikis). The default should work ‘out-of-the-box’ with no user configura- tion. It should build in 200ks (two days), occupy 150G of disk space, be served locally by virtualDRAFT hosts https://simple.wikipedia.site/, https://simple.wiktionary.site/, and https://www.wikidata.site/, and update automatically every week. The default should be suitable for anyone who learned English as a second language (ESL). The top ten wikis are the en wikipedia, followed by the de, nl, fr, it, ru, es, sv, pl, and ja wikipedias. Because WP-MIRROR uses original size media files, these wikis are too large to fit on a laptop with a single 500G disk. When higher capacity hard disk drives reach the market, ii this list may be shortened. But for now, a desktop PC with ample disk space and main memory is required for any of the top ten, unless the user does not need the media files (and this is configurable). The en wikipedia is the most demanding case. It should build in 1Ms (twelve days), occupy 3T of disk space, be served locally by a virtual host https://en.wikipedia.site/, and update automatically every month. This project’s current Web home page is http://www.nongnu.org/wp-mirror/. This document was generated on November 22, 2014. Features WP-MIRROR has been designed for robustness. WP-MIRROR asserts hardware and software prerequisites, skips over unparsable articles and bad file names, waits for Internet access when needed, retries interrupted downloads, uses check-pointing to resume after interruption, and offers concurrency to accelerate mirroring of the largest wikis. WP-MIRROR issues a warning if MySQL is insecure (e.g. has a root account with no password), or if a caching web proxy is detected. WP-MIRROR warns if disk space may be inadequate for the default (a mirror of the simple wikipedia, the simple wiktionary, and the wikidata wiki), and gracefully exits if disk space runs too low. WP-MIRROR normally runs in background as a weekly cron job, updating the mirror when- ever the Wikimedia Foundation posts new dump files. Most features are configurable, either through command-line options, or via the configuration file /etc/wp-mirror/local.conf. Wikis can be added to the mirror, or dropped from it. If an user makes an hash of things, and wants to start over, just execute root-shell# wp-mirror --restore-default which drops all WP-MIRROR related databases and files (except media files). This option is used regularly during software development and debugging. An user who wishes also to delete the media files, may execute: root-shell# cd /var/lib/wp-mirror-mediawiki/images/ root-shell# rm --recursive --force * That said, a good network citizen would try to avoid burdening the Internet by downloading the same files, over and over. Troubleshooting If WP-MIRROR fails or hangs, please take a look at the log files /var/log/wp-mirror.log. Alternatively, try running root-shell# wp-mirror --debug root-shell# tail -n 1000 /var/log/wp-mirror.log The last few lines in the log file should provide a clue. Developers should select some of the smaller wikis (e.g. the cho, xh, and zu wikipedias) to speed up the test cycle. WP-MIRRORDRAFT was written and is maintained by Dr. Kent L. Miller. Please see §1.8, Credits for a list of contributors. Please report bugs in WP-MIRROR to <[email protected]>. iii Contents WP-MIRROR 0.7.4 Reference Manual ii Contents iv List of Figures xix List of Tables xx 1 General Information 1 1.1 About This Manual ................................... 1 1.2 Typographical and Syntax Conventions ........................ 2 1.3 Overview of WP-MIRROR ............................... 2 1.3.1 What is WP-MIRROR? ............................ 2 1.3.2 History of WP-MIRROR ............................ 3 1.3.3 The Main Features of WP-MIRROR ..................... 4 1.4 WP-MIRROR Development History .......................... 5 1.5 What Is New in WP-MIRROR ............................. 7 1.5.1 What Is New in WP-MIRROR 0.7 ....................... 7 1.5.2 What Is New in WP-MIRROR 0.6 ....................... 7 1.5.3 What Is New in WP-MIRROR 0.5 ....................... 8 1.5.4 What Is New in WP-MIRROR 0.4 ....................... 9 1.5.5 What Is New in WP-MIRROR 0.3 ....................... 10 1.5.6 What Is New in WP-MIRROR 0.2 ....................... 11 1.5.7 What Is New in WP-MIRROR 0.1 ....................... 11 1.6 WP-MIRROR Information Sources .......................... 12 1.6.1 Project Home Page for WP-MIRROR ..................... 12 1.6.2 Downloading WP-MIRROR .......................... 12 1.6.3 Documentation for WP-MIRROR ....................... 13 1.6.4 Mailing Lists for WP-MIRROR ........................ 13 1.7 How to Report Bugs or Problems ........................... 13 1.8 Credits .......................................... 13 1.8.1 Contributors to WP-MIRROR ......................... 13 1.8.2 Documenters and Translators ......................... 14 2 Installing and Upgrading WP-MIRROR 15 2.1 General Installation Guidance ............................. 15 2.1.1 Operating Systems Supported by WP-MIRROR ............... 15 2.1.2 GNU/Linux Distributions Supported by WP-MIRROR ........... 15 DRAFT2.1.3 How to Get WP-MIRROR ........................... 16 2.1.4 Choosing Which WP-MIRROR Distribution to Install ........... 16 2.1.4.1 Choosing Which Version of WP-MIRROR to Install ....... 16 2.1.4.2 Choosing a Distribution Format ................... 16 2.1.4.3 Choosing When to Upgrade ..................... 16 2.1.5 Verifying Package Integrity Using Checksums or GnuPG ........... 16 iv Contents 2.1.5.1 How to Get the Author’s Public Build Key ............ 16 2.1.5.1.1 Download the Public Key from Public Keyserver . 17 2.1.5.1.2 Cut and Paste the Public Key from Public Keyserver . 18 2.1.5.1.3 Import Public Key into apt Trusted Keyring ...... 20 2.1.5.2 Checksums for a DEB Package .................... 21 2.1.5.3 Checksums for a RPM Package .................... 21 2.1.5.4 Signature Checking for a Tarball .................. 21 2.2 Installing WP-MIRROR on Linux ........................... 22 2.2.1 Installing from a Debian Repository ...................... 22 2.2.2 Installing from a DEB Package ......................... 23 2.2.3 Installing from a RPM Package ......................... 24 2.3 Installing WP-MIRROR from Source ......................... 24 2.3.1 Installing Dependencies ............................. 24 2.3.1.1 Installing Build Dependencies .................... 24 2.3.1.2 Verifying clisp Version ....................... 24 2.3.1.3 Configuring common-lisp-controller ............... 25 2.3.1.4 Configuring cl-asdf ......................... 25 2.3.1.5 Installing Binary Dependencies ................... 26 2.3.2 Installing WP-MIRROR from a Standard Source Distribution ....... 26 2.3.3 WP-MIRROR Build Options .......................... 26 2.4 Postinstallation Configuration and Testing ...................... 27 2.4.1 Default Configuration .............................. 27 2.4.2 Working with X ................................. 28 2.4.3 Configuration of a Wiki Farm ......................... 28 3 System Planning and Configuration 30 3.1 General Information ................................... 30 3.1.1 Storage at the Wikimedia Foundation ..................... 30 3.1.1.1 XML dump files ............................. 30 3.1.1.2 SQL dump files ............................
Recommended publications
  • Security Analytics 8.1.X Reference Guide
    Security Analytics 8.1.x Reference Guide Updated: Friday, November 15, 2019 Security Analytics Reference Guide Security Analytics 8.1 Copyrights, Trademarks, and Intellectual Property Copyright © 2019 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks or registered trademarks of Symantec Corp. or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. SYMANTEC CORPORATION PRODUCTS, TECHNICAL SERVICES, AND ANY OTHER TECHNICAL DATA REFERENCED IN THIS DOCUMENT ARE SUBJECT TO U.S. EXPORT CONTROL AND SANCTIONS LAWS, REGULATIONS AND REQUIREMENTS, AND MAY BE SUBJECT TO EXPORT OR IMPORT REGULATIONS IN OTHER COUNTRIES. YOU AGREE TO COMPLY STRICTLY WITH THESE LAWS, REGULATIONS AND REQUIREMENTS, AND ACKNOWLEDGE THAT YOU HAVE THE RESPONSIBILITY TO OBTAIN ANY LICENSES, PERMITS OR OTHER APPROVALS THAT MAY BE REQUIRED IN ORDER TO EXPORT, RE-EXPORT, TRANSFER IN COUNTRY OR IMPORT AFTER DELIVERY TO YOU.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Arxiv:1907.07120V1 [Cs.CY] 16 Jul 2019 1 Introduction That China Hindered Access to I2P by Poisoning DNS Resolu- Tions of the I2P Homepage and Three Reseed Servers
    Measuring I2P Censorship at a Global Scale Nguyen Phong Hoang Sadie Doreen Michalis Polychronakis Stony Brook University The Invisible Internet Project Stony Brook University Abstract required flexibility for conducting fine-grained measurements on demand. We demonstrate these benefits by conducting an The prevalence of Internet censorship has prompted the in-depth investigation of the extent to which the I2P (invis- creation of several measurement platforms for monitoring ible Internet project) anonymity network is blocked across filtering activities. An important challenge faced by these different countries. platforms revolves around the trade-off between depth of mea- Due to the prevalence of Internet censorship and online surement and breadth of coverage. In this paper, we present surveillance in recent years [7, 34, 62], many pro-privacy and an opportunistic censorship measurement infrastructure built censorship circumvention tools, such as proxy servers, virtual on top of a network of distributed VPN servers run by vol- private networks (VPN), and anonymity networks have been unteers, which we used to measure the extent to which the developed. Among these tools, Tor [23] (based on onion rout- I2P anonymity network is blocked around the world. This ing [39,71]) and I2P [85] (based on garlic routing [24,25,33]) infrastructure provides us with not only numerous and ge- are widely used by privacy-conscious and censored users, as ographically diverse vantage points, but also the ability to they provide a higher level of privacy and anonymity [42]. conduct in-depth measurements across all levels of the net- In response, censors often hinder access to these services work stack.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Test-Beds and Guidelines for Securing Iot Products and for Secure Set-Up Production Environments
    IoT4CPS – Trustworthy IoT for CPS FFG - ICT of the Future Project No. 863129 Deliverable D7.4 Test-beds and guidelines for securing IoT products and for secure set-up production environments The IoT4CPS Consortium: AIT – Austrian Institute of Technology GmbH AVL – AVL List GmbH DUK – Donau-Universit t Krems I!AT – In"neon Technologies Austria AG #KU – JK Universit t Lin$ / Institute for &ervasive 'om(uting #) – Joanneum )esearch !orschungsgesellschaft mbH *+KIA – No,ia -olutions an. Net/or,s 0sterreich GmbH *1& – *1& -emicon.uctors Austria GmbH -2A – -2A )esearch GmbH -)!G – -al$burg )esearch !orschungsgesellschaft -''H – -oft/are 'om(etence 'enter Hagenberg GmbH -AG0 – -iemens AG 0sterreich TTTech – TTTech 'om(utertechni, AG IAIK – TU Gra$ / Institute for A((lie. Information &rocessing an. 'ommunications ITI – TU Gra$ / Institute for Technical Informatics TU3 – TU 3ien / Institute of 'om(uter 4ngineering 1*4T – 1-Net -ervices GmbH © Copyright 2020, the Members of the IoT4CPS Consortium !or more information on this .ocument or the IoT5'&- (ro6ect, (lease contact8 9ario Drobics7 AIT Austrian Institute of Technology7 mario:.robics@ait:ac:at IoT4C&- – <=>?@A Test-be.s an. guidelines for securing IoT (ro.ucts an. for secure set-up (ro.uction environments Dissemination level8 &U2LI' Document Control Title8 Test-be.s an. gui.elines for securing IoT (ro.ucts an. for secure set-u( (ro.uction environments Ty(e8 &ublic 4.itorBsC8 Katharina Kloiber 4-mail8 ,,;D-net:at AuthorBsC8 Katharina Kloiber, Ni,olaus DEr,, -ilvio -tern )evie/erBsC8 -te(hanie von )E.en, Violeta Dam6anovic, Leo Ha((-2otler Doc ID8 DF:5 Amendment History Version Date Author Description/Comments VG:? ?>:G?:@G@G -ilvio -tern Technology Analysis VG:@ ?G:G>:@G@G -ilvio -tern &ossible )esearch !iel.s for the -2I--ystem VG:> >?:G<:@G@G Katharina Kloiber Initial version (re(are.
    [Show full text]
  • TFG Borrador 1 último
    Trabajo Final de Grado Facultad de Ingeniería en Telecomunicaciones Tema: IMPLEMENTACIÓN DE UN SISTEMA AUTÓNOMO Y REDISEÑO DE LA RED DE DATOS Matias E. Lauretta Saad Tutor: Enrique G. Banchio Ignacio Segura 1 Año 2018 Dedicatoria A la paciencia y confianza en mí de mujer y mi familia. Matias E. Lauretta Saad 2 Agradecimientos A mi mujer por su confianza y apoyo. A mi familia que siempre me alentó a terminar mis estudios. A mis amigos y compañeros de la facultad que me acompañaron todos estos años. Matias E. Lauretta Saad 3 Resumen El auge de las tecnologías de internet conlleva a un incremento del uso de recursos de red lo que llevó al Instituto a tramitar la asignación de un número de sistema autónomo con el pool de direcciones IP asociadas. Siendo responsable de la propagación de estas direcciones y sus reglas de ruteo. Por consiguiente, resulta necesario un replanteo de la red del instituto que satisfaga las necesidades de los usuarios actuales y se provea de herramientas de administración de red que facilite la gestión de tráfico para los servicios relevados y la seguridad de la red. Con el presente trabajo se hace un relevamiento de las herramientas disponibles, servicios que brinda la red, necesidades futuras y se realiza un re-diseño lógico de la red y una propuesta de configuración para la herramienta de gestión y seguridad 4 Glosario ISP: Proveedor de Servicios de Internet o ISP (del inglés Internet Service Provider) AS: Sistema Autónomo o AS (del inglés Autonomous System) ASN: Número de Sistema Autónomo o ASN (del inglés Autonomous System Number) LACNIC: Registro de Direcciones de Internet para América Latina y Caribe (del inglés Latin American and Caribbean Internet Addresses Registry) MAN: Metropolitan Área Network, Red de Área Metropolitana WAN: Wide Area Network, Red de Área Amplia LAN: Local Area Network.
    [Show full text]
  • NFV Decouples the Network Functions Such As NAT, Firewall, DPI, IPS/IDS, WAAS, SBC, RR Etc
    Virtualizing Enterprise Network Functions • BRKCRS-3447 Matt Falkner, Distinguished Engineer, Technical Marketing Agenda BRKCRS-3447 • Introduction & Motivation • Deployment Models and Characteristics • The Building Blocks of Virtualization (today) • Virtualization Trade-offs and Research Topics • Conclusion Abstract Network Function Virtualization (NfV) is gaining increasing traction in the industry based on the promise of reducing both CAPEX and OPEX using COTS hardware. This session introduces the use-cases for virtualizing Enterprise network architectures, such as virtualizing branch routers, LISP nodes, IWAN deployments, or enabling enterprise hybrid cloud deployments. The sessions also discusses the technology of Virtualization from both a system architecture as well as a network architecture perspective. Particular focus is given on understanding the impact of running routing functions on top of hypervisors, as well as the placement and chaining of network functions. Performance of virtualized functions is also discussed. BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Introduction and Motivation Network Functions Virtualization (NFV) Announced at SDN World Congress, Oct 2012 • AT&T • BT • CenturyLink • China Mobile • Colt • Deutsche Telekom • KDDI • NTT • Orange • Telecom Italia • Telstra • Verizon • Others TBA… BRKCRS-3447 © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 What is NfV? A Definition … NFV decouples the network functions such as NAT, Firewall, DPI, IPS/IDS,
    [Show full text]
  • Lessons from the Music Industry
    Broadband technologies transforming business models and challenging regulatory frameworks – lessons from the music industry MusicLessons - Deliverable 1 Report on technology versus usage and effects Ulf Blomqvist Lars-Erik Eriksson Olle Findahl Håkan Selg Roger Wallis Technology versus usage and effects 2 Technology versus usage and effects Key observations from the report In order to defend established business models for the distribution of music, the major record companies have done their utmost to hinder the development of P2P networks, by means of ! Having activities of firms offering P2P services or technology declared illegal, on the grounds that their major purpose is to encourage people to ignore copyright laws. Napster was closed. At the time of writing, April 2005, the jury is still out as regards the case of Kazaa /Altnet (Australia) and Grokster (USA). ! Investing heavily in lobbying politicians and legislators in support of their claim that file- sharing is stealing, and that there is a direct causal link to falling CD sales and lay-offs. ! Commissioning companies to pollute the Internet with "spoof" files, but at the same time, becoming more and more dependent on eavesdropping in P2P networks ("sniffing") for planning marketing strategies based on P2P users' preferences. ! Mounting legal attacks on individual file-sharers and demanding considerable sums of money in out of court settlements. Smaller record companies and creators, on the other hand, see these new forms of customer interaction as a marketing opportunity for the unknown creator, developing business models that use the unregulated Internet to create a fan base amongst potential future consumers. Available data does not support a direct link between file sharing and diminishing music sales.
    [Show full text]
  • SSGRR-2002S - Papers
    General Chairman Deputy General Chairman Veljko Milutinovic, Frédéric Patricelli, School of Electrical Engineering, Telecom Italia Learning Services University of Belgrade (Head of International Education) Conference organization staff: Conference Managers: Miodrag Stefanovic Cesira Verticchio Conference Staff Renato Ciampa Veronica Ferrucci Maria Rosaria Fiori Maria Grazia Guidone Natasa Kukulj Bratislav Milic Zaharije Radivojevic Milan Savic These pages are optimized for Internet Explorer 4+ or Netscape Navigator v4+ and resolution of 1024x768 pixels in high color. Designed by SSGRR SSGRR-2002s - Papers 1. .NET All New? Jürgen Sellentin, Jochen Rütschlin 2. A center for Knowledge Factory Network Services (KoFNet) as a support to e-business Giuseppe Visaggio, Piernicola Fiore 3. A concept-oriented math teaching and diagnosis system Wei-Chang Shann, Peng-Chang Chen 4. A contradiction-free proof procedure with visualization for extended logic programs Susumu Yamasaki, Mariko Sasakura 5. A Framework For Developing Emerging Information Technologies Strategic Plan Amran Rasli 6. A Generic Approach to the Design of Linear Output Feedback Controllers Yazdan Bavafa-Toosi, Ali Khaki-Sedigh 7. A Knowledge Management Framework for Integrated design Niek du Preez, Bernard Katz 8. A Method Component Programming Tool with Object Databases Masayoshi Aritsugi, Hidehisa Takamizawa, Yusuke Yoshida and Yoshinari Kanamori 9. A Model for Business Process Supporting Web Applications Niko Kleiner, Joachim Herbst 10. A Natural Language Processor for Querying Cindi Niculae Stratica, Leila Kosseim, Bipin C. Desai 11. A New Approach to the Construction of Parallel File Systems for Clusters Felix Garcia, Alejandro Calderón, Jesús Carretero, Javier Fernández, Jose M. Perez 12. A New model of On-Line Learning file:///F¦/papers.html (1/15)2004/03/22 13:16:33 SSGRR-2002s - Papers Marjan Gusev, Ljupco N.
    [Show full text]
  • Appendix a the Ten Commandments for Websites
    Appendix A The Ten Commandments for Websites Welcome to the appendixes! At this stage in your learning, you should have all the basic skills you require to build a high-quality website with insightful consideration given to aspects such as accessibility, search engine optimization, usability, and all the other concepts that web designers and developers think about on a daily basis. Hopefully with all the different elements covered in this book, you now have a solid understanding as to what goes into building a website (much more than code!). The main thing you should take from this book is that you don’t need to be an expert at everything but ensuring that you take the time to notice what’s out there and deciding what will best help your site are among the most important elements of the process. As you leave this book and go on to updating your website over time and perhaps learning new skills, always remember to be brave, take risks (through trial and error), and never feel that things are getting too hard. If you choose to learn skills that were only briefly mentioned in this book, like scripting, or to get involved in using content management systems and web software, go at a pace that you feel comfortable with. With that in mind, let’s go over the 10 most important messages I would personally recommend. After that, I’ll give you some useful resources like important websites for people learning to create for the Internet and handy software. Advice is something many professional designers and developers give out in spades after learning some harsh lessons from what their own bitter experiences.
    [Show full text]
  • An Analysis of Selection of Mirror Sites for Parallel Processing
    IJSART - Volume 5 Issue 4 – APRIL 2019 ISSN [ONLINE]: 2395-1052 An Analysis of Selection of Mirror Sites for Parallel Processing Pallavi Vishwakarma1, Neha Khare2 1, 2 Dept of Computer Science 1, 2 Takshshila Institute of Engineering & Technology, Jabalpur MP, India Abstract- With the recent development of internet, we are able that describes and gives information about other data. The to retrieve documents from multiple server sites, like the package metadata is usually just a copy of the embedded mirror sites, to increase the downloading speed, make better package metadata for all packages on the repository. Package use of available network bandwidth and parallel processing managers download the package metadata from a repository speed of servers. Recent work by Rodriguez, Kirpal, and so that they know which packages are available from that Biersack [1] studied how to use the existing HTTP protocol repository. for retrieving documents from mirror sites in parallel to reduce the download time and to improve the reliability. The proposed approach utilizes to retrieve specific data in a mirror server site, which requires no changes on existing server and client settings. In this Work, we present a mathematical model that describes the problem of parallel download from multiple mirror sites. Based on the model, we present algorithms for selecting the best subset of mirror sites for parallel download. The proposed algorithm is implemented. Keywords- Server selection, Parallel download, HTTP, Protocol, mirror site, HTTP, FTP, Meta data, NSGA-II, AMOSA. Fig-1 Application of Meta data I. INTRODUCTION This also provides the package manager with dependency information needed to perform dependency A mirror website is a site that is a reproduction of an resolution.
    [Show full text]
  • Staying Without Power a Case Study of the Drupal Content Management System by Qi Zhang
    Staying without Power A Case Study of the Drupal Content Management System By Qi Zhang Bachelor of Science in Engineering, Jiangxi Science and Technology Normal University (1999) Interfaculty initiative in information studies program, University of Tokyo (2006) Master of international studies, University of Tokyo (2008) Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the degree of Master of Science In EngIneerIng and Management ARCHNES At the A/SSACHUSETTS INS fW E OF TECHNOLOGY Massachusetts Institute of Technology AUG 20 2013 May 2012 y2012 RRARIES C 2012 Massachusetts Institute of Technology Signature of Author Qi Zhang Certified by -. Michael A. Cusumano SMR Distinguished Professor of Management T( esis Supervisor Certified by_ Patrick Hale Director System Design and Management Program THIS PAGE IS INTENTIONALLY LEFT BLANK Acknowledgements I run the knowledge that I learned from M.I.T the most wisdom school of the world. It works AMAZING! I would also like to thank Michael, Imran and Pat who staying with me when I am without power. Love in M.I.T; Love in USA XlApq, M31 THIS PAGE IS INTENTIONALLY LEFT BLANK Staying without Power By Qi Zhang Submitted to the System Design and Management Program in Partial Fulfillment of the Requirements for the degree of Master of Science In Engineering and Management ABSTRACT This main focus of this thesis is not to describe the inner workings of the Ecosystem or software; it is to help young entrepreneurs with limited resources to not just survive, but thrive in a competitive business environment. Thesis Supervisor: Michael A.
    [Show full text]