Open Source Development
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Technical and Legal Approaches to Unsolicited Electronic Mail, 35 USFL Rev
UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 1-1-2001 Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001) David E. Sorkin John Marshall Law School, [email protected] Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Computer Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001). https://repository.law.uic.edu/facpubs/160 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. Technical and Legal Approaches to Unsolicited Electronic Mailt By DAVID E. SORKIN* "Spamming" is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called "spain," 2 causes or contributes to a wide variety of problems for network administrators, t Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999-2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. -
IBM Websphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers to Build, Test, and Deploy J2EE-Based E-Business Applications
Software Announcement November 6, 2001 IBM WebSphere Studio Application Developer for Windows, Version 4.0 Helps Java Developers To Build, Test, and Deploy J2EE-based e-business Applications Overview flexible source control management, pluggable At a Glance Introducing IBM′s premier Java repositories, as well as adapters development environment for for Concurrent Versioning System WebSphere Studio Application professional developers, the first (CVS) and for Rational ClearCase Developer for Windows, V4.0 product in the WebSphere Studio LT (CCLT) (Application Developer) provides product suite, WebSphere Studio • A comprehensive visual XML an advanced development Application Developer for development environment, environment for J2EE application Windows , V4.0 (Application including components for building development. Developer). DTDs, XML Schemas, XML files, and XSL style sheets Application Developer offers the Application Developer is built on the • Built-in WebSphere test following key functions: WebSphere Studio Workbench, an environment • integrated platform designed to A powerful Java development provide a common set of services Application Developer is next environment, that includes and frameworks unparalleled generation technology for support for JDK 1.3, a development tool integration and VisualAge for Java Enterprise configurable runtime, tool construction. Edition. It combines many popular incremental compilation, features of VisualAge for Java scrapbook, dynamic debugging, Application Developer includes the Enterprise Edition and WebSphere and a Java text editor • following functions: Studio Advanced Edition integrated Advanced Web, Java, and XML development environments • on top of WebSphere Studio An advanced development Workbench. designed to J2SE and J2EE environment for J2EE application specifications development that meets J2SE and Application Developer is focused on • A Relational Schema Center J2EE specifications and EJB optimizing J2EE application (RSC) focused on relational development and deployment and development. -
HP 9100 a - First PC? 2 up in the Finished Spot
Volunteer Information Exchange Sharing what we know with those we know Volume 1 Number 14 September 4, 2011 Contribute To The VIE Questions These questions need your answers The 55 th anniversary of RAMAC, the first ever hard drive, is coming up Sept. 4, 13, Q: The Hollerith sorter has 26 slots. 24 of those are or 14, depending on your definition of under control of the tabulator. Two have manual announcement. So we'll feature that handles, and are not controlled by the tabulator. Tim game-changing device in this issue. Robinson asks, “Does anyone know what those two manually operated slots are for?” Do you have a favorite artifact, one that you know a great deal about? One that Q: I know that when Xerox PARC gave extensive you know a great story about? demos of the Alto computer, windows user interface, etc. to Xerox executives in Rochester, NY, the execs Help us ensure that all those stories are were not impressed, but (some of) their wives were. passed along. Contribute to the VIE. My question is: I heard that one of those wives later Jim Strickland [email protected] started a high tech company. Who, what company, was it successful, and did they use anything from PARC? Kim Harris This question was anwered by Al Kossow What if error messages were Q: A visitor told me that the speech given by the giant written in Haiku style? head in the Macintosh 1984 superbowl commercial was actually excerpted from a speech given by an IBM The Web site you seek executive. -
United States Securities and Exchange Commission Washington, D.C
UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 FORM 8-K CURRENT REPORT PURSUANT TO SECTION 13 OR 15 (d) OF THE SECURITIES EXCHANGE ACT OF 1934 Date of Report: April 20, 2015 (Date of earliest event reported) INTERNATIONAL BUSINESS MACHINES CORPORATION (Exact name of registrant as specified in its charter) New York 1-2360 13 -0871985 (State of Incorporation) (Commission File Number) (IRS employer Identification No.) ARMONK, NEW YORK 10504 (Address of principal executive offices) (Zip Code) 914-499-1900 (Registrant’s telephone number) Check the appropriate box below if the Form 8-K filing is intended to simultaneously satisfy the filing obligation of the registrant under any of the following provisions: § Written communications pursuant to Rule 425 under the Securities Act (17 CFR 230.425) § Soliciting material pursuant to Rule 14a-12 under the Exchange Act (17 CFR 240.14a-12) § Pre-commencement communications pursuant to Rule 14d-2(b) under the Exchange Act (17 CFR 240.14d-2(b)) § Pre-commencement communications pursuant to Rule 13e-4(c) under the Exchange Act (17 CFR 240.13e-4(c)) Item 2.02. Results of Operations and Financial Condition. Attachment I of this Form 8-K contains the prepared remarks for IBM’s Chief Financial Officer Martin Schroeter’s first quarter earnings presentation to investors on April 20, 2015, as well as certain comments made by Mr. Schroeter during the question and answer period, edited for clarity. Attachment II contains Slide 23 from Mr. Schroeter’s first quarter earnings presentation corrected for mislabeled rows. Certain reconciliation and other information (“Non-GAAP Supplemental Materials”) for this presentation was included in Attachment II to the Form 8-K that IBM submitted on April 20, 2015, which included IBM’s press release dated April 20, 2015. -
Embracing the Internet of Things in the New Era of Cognitive Buildings 2 Corporate Real Estate and Facilities Management
IBM Global Business Services Corporate Real Estate and Facilities Management White paper Embracing the Internet of Things in the new era of cognitive buildings 2 Corporate Real Estate and Facilities Management Contents 2 New possibilities 2 The journey to the era of cognitive buildings 4 The end state of cognitive buildings – Enabling buildings to think and respond cognitively 6 Getting ready for the cognitive buildings era 6 Three prerequisites for cognitive buildings 7 IBM client example - A new approach to facilities servicing in action for ISS 7 How can IBM help? 8 For more information The emerging challenge for organizations is how to take 8 IBM contacts advantage of these new possibilities. IBM believes that the Internet of Things and cognitive platforms, with artificial intelligence and cognitive learning, will create the possibility to develop innovative new services for engaging with building users, radically reduce costs through automation and New possibilities optimization of operations and improve end user satisfaction The number of Internet of Things (IoT) devices in buildings is from personalized, cognitive customer service. rapidly increasing along with new requirements for flexible operations. Cognitive buildings are able to autonomously The journey to the era of integrate IoT devices and learn system and user behavior to cognitive buildings optimize performance, thereby unleashing new levels of IBM believes that automated and smart buildings are productivity, increasing environmental efciency, enabling new increasingly giving way to cognitive buildings. In the 1980s business models and improving end user well-being. and 1990s, building automation allowed real estate and facility management teams to visualize their buildings’ key performance indexes through dashboards. -
Newscache – a High Performance Cache Implementation for Usenet News
THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities. -
Linux Network Administrators Guide
Chapter 21. C News One of the most popular software packages for Netnews is C News. It was designed for sites that carry news over UUCP links. This chapter will discuss the central concepts of C News, basic installation, and maintenance tasks. C News stores its configuration files in /etc/news, and most of its binaries are kept below the /usr/lib/news/ directory. Articles are kept below /var/spool/news. You should make sure that virtually all files in these directories are owned by user news or group news. Most problems arise from files being inaccessible to C News. Use su to become the user news before you touch anything in the directory. The only exception is the setnewsids command, which is used to set the real user ID of some news programs. It must be owned by root and have the setuid bit set. In this chapter, we describe all C News configuration files in detail and show you what you have to do to keep your site running. Chapter 21. C News 402 21.1. Delivering News Articles can be fed to C News in several ways. When a local user posts an article, the newsreader usually hands it to the inews command, which completes the header information. News from remote sites, be it a single article or a whole batch, is given to the rnews command, which stores it in the /var/spool/news/in.coming directory, from where it will be picked up at a later time by newsrun. With any of these two techniques, however, the article will eventually be handed to the relaynews command. -
Digital Reinvention in Action What to Do and How to Make It Happen IBM Institute for Business Value Executive Report Strategy
Digital Reinvention in action What to do and how to make it happen IBM Institute for Business Value Executive Report Strategy How IBM can help Digital ReinventionTM requires organizations from all industries to review their business, operations, and technology strategy while making a cultural change across the C-suite to embrace experimentation and iteration. IBM Global Business Services provides business transformation consulting at the forefront of the cognitive era. We can guide you in creating a holistic digital and cognitive strategy for your organization. For more information, visit: ibm.com/gbs. 1 Transcending disruption Executive summary Digital technologies have altered how people and In 2013, the IBM Institute for Business Value introduced the concept of Digital Reinvention in a businesses interact. Digital forces have created study of the same name.1 The study highlighted a profound economic shift over recent unprecedented levels of industry dislocation and are decades. Markets have evolved from organizational centricity, in which manufacturers and fundamentally changing business economics. To service providers largely define what to produce and market to customers; through individual succeed in this disruptive environment,organizations centricity, in which empowered consumers demand insight driven, customized experiences; will need to offer compelling new experiences, establish and into a radically different economic environment today, which the study defined as the new focus, build new expertise and devise new ways everyone-to-everyone (E2E) economy (see Figure 1). of working. Business leaders will face a stark choice: The E2E economy has four distinct characteristics, which have only grown in importance Either digitally reinvent their enterprises, or watch as since the original study was published. -
IBM®Cognos®10 Report Studio: Practical Examples
Related Books of Interest The Art of Enterprise Enterprise Master Information Architecture Data Management A Systems-Based Approach for Unlocking An SOA Approach to Managing Business Insight Core Information By Mario Godinez, Eberhard Hechler, Klaus Koenig, By Allen Dreibelbis, Eberhard Hechler, Ivan Steve Lockwood, Martin Oberhofer, and Michael Milman, Martin Oberhofer, Paul Van Run, and Dan Wolfson Schroeck ISBN: 0-13-236625-8 ISBN: 0-13-703571-3 The Only Complete Technical Primer for MDM Architecture for the Intelligent Enterprise: Powerful Planners, Architects, and Implementers New Ways to Maximize the Real-Time Value of Information Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: archi- In this book, a team of IBM’s leading information tects, technical analysts, consultants, solution management experts guide you on a journey that designers, and senior IT decision makers. will take you from where you are today toward Written by the IBM® data management in- becoming an “Intelligent Enterprise.” novators who are pioneering MDM, this book systematically introduces MDM’s key concepts Drawing on their extensive experience working and technical themes, explains its business with enterprise clients, the authors present a new, case, and illuminates how it interrelates with information-centric approach to architecture and and enables SOA. powerful new models that will benefit any organiza- Drawing on their experience with cutting-edge tion. Using these strategies and models, companies projects, the authors introduce MDM patterns, can systematically unlock the business value of blueprints, solutions, and best practices information by delivering actionable, real-time infor- published nowhere else—everything you mation in context to enable better decision-making need to establish a consistent, manageable throughout the enterprise—from the “shop floor” to set of master data, and use it for competitive the “top floor.” advantage. -
An Introduction to Linux and Open Source
IBM Systems and Technology Group An Introduction to Linux and Open Source Jim Elliott Consulting Sales Specialist – System z Product Manager – System z Operating Systems IBM Canada Ltd. 1 SHARE 109 - Session 9200 2007-08-13 © 2007 IBM Corporation IBM Systems and Technology Group 9200 – An Introduction to Linux and Open Source Linux and Open Source continue to see substantial growth around the world This session will provide an overview of Open Source and an introduction to Linux (including concepts and terminology) Jim will also provide an overview of Novell's SUSE Linux Enterprise (SLE) 10 and Red Hat Enterprise Linux (RHEL) 5 2 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Topics Introduction to Open Source Introduction to Linux Novell SUSE Linux Enterprise 10 Red Hat Enterprise Linux 5 Linux and Open Source on the Web at IBM 3 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Linux user presentations on Wednesday All sessions on the 3rd floor, Ford A&B Session Speaker Title 9215 Marcy Cortes – Penguins Board the Stagecoach 1:30pm Wells Fargo for the Linux Frontier: A User Experience with Linux on zSeries 9230 Alain Leclerc – How to Rise Above the Challenges 3:00pm CSPQ and of Deploying z/VM and Linux on David Kreuter – the Mainframe and Thrive VM Resources 9231 Alain Leclerc – Building a Strong z/VM and Linux 4:30pm CSPQ and Architecture on the Mainframe David Kreuter – VM Resources 4 SHARE 109 - Session 9200 2007-08-13 IBM Systems and Technology Group Linux user presentations on Thursday -
Usenet News HOWTO
Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6 -
Introducing... the IBM Toolbox for Javatm
Session Number: 403552 Introducing... The IBM Toolbox for Java TM Jeff Lee ([email protected]) © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java™ What is the Toolbox/JTOpen? A set of Java classes and utilities which provide access to IBM i® data and resources class { Integer id; String name; String address; BigDecimal balance; String ccnumber; String expdate; } 2 © 2010 IBM Corporation 1 IBM Power Systems IBM Toolbox for Java The big picture - Client/Server Your Java TM program IBM Toolbox for Java Java Virtual Machine TCP/IP IBM i Access for Windows is not required! TCP/IP IBM i Host Servers *PGM IFS IBM i data and resources DB2/400 *CMD 3 © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java The big picture - Toolbox and data on same IBM i Your JavaTM program IBM Toolbox for Java TCP/IP JNI IBM i Host Servers IFS *PGM IBM i data and resources DB2/400 *CMD 4 © 2010 IBM Corporation 2 IBM Power Systems IBM Toolbox for Java Using the Toolbox in client/server applications • Toolbox installed on client • Java application runs on client • IBM i Access for Windows is not required • The same Java application runs on any client with a Java-compatible JVM! TCP/IP • Server running IBM i • Uses existing IBM i host servers • IBM i Java Virtual Machine (JVM) is not required on the server 5 © 2010 IBM Corporation IBM Power Systems IBM Toolbox for Java Using the Toolbox in server applications • Toolbox installed on IBM i • Java application runs on IBM i • Use Toolbox instead of JNI • "Local" sockets used to communicate between Toolbox