June 2003 ;Login: 3 Microsoft: What’S Next?

Total Page:16

File Type:pdf, Size:1020Kb

June 2003 ;Login: 3 Microsoft: What’S Next? motd istrators, or some other sort of administrator who looks upon by Rob Kolstad “system administrators” as “someone else.”Sometimes, they view Rob Kolstad is cur- sysadmins as a sort of inferior species, which is also surprising to rently Executive Director of SAGE, the me. Apparently, specialization has some sort of value that I don’t System Administra- understand very well (and, since I don’t work in a large com- tors Guild. Rob has edited ;login: for pany, I’m going to have to work extra hard to learn more about over ten years. this particular phenomenon). At any rate, none of SAGE’s messages gets through to these other [email protected] administrators since they’re not tuned to “system administra- tion” information. One email conversation I had was very illu- minating in that my correspondent simply could not hear SAGE: Approaching the “generic administrator” when filling out a form. If a question did not specifically address “network administrator,”then he/she Crossroads simply could not answer it. This puzzled me greatly. I’ve now been in the SAGE directorship position for a year. Here I subsequently urged many in our community to create an are a few words on some of the interesting challenges I’ve umbrella term that could be used to refer to the collective of all encountered. sorts of system administrators. Many great suggestions have A summary of the job is in order, of course. SAGE’s goal is “To emerged, but none of them seems perfect, yet. Often, the prob- advance the profession of system administration.”To that end, lem I’m talking about is misunderstood or denied. This is very the professionalization of system administration is often cited as strange to me. a corollary. Paul Evans started the professionalization movement Another of the other biggest challenges I’m now facing is that many years ago when he pointed out that professions have com- joining SAGE isn’t very simple. To that end, I’ll be lobbying mon properties: strongly at the USENIX Board of Directors meeting in San Antonio to create a simple and extremely affordable fee struc- I A book of knowledge ture for joining SAGE. Wish me luck. My goal: a click on a web- I A university degree program site and a small amount of money gets you a shiny membership I A certification program of some sort card and all the rights and privileges of SAGE membership. I Conferences/gatherings I A code of ethics Our industry’s economic slowdown has resulted in reduced I Professional journals/publications SAGE staffing so my personal response time for many issues I Recognition programs for outstanding contributors continues to worsen. I have never been so far behind on email or on my to-do list as I am today. SAGE is moving down the road to creating all these various properties, which is good. Best of all, public recognition for the To that end, I am soliciting volunteers to assist with some spe- career of system administration is high and growing. It appears cific SAGE projects. Here’s the first three: that high school students all know of such things. I Completing the paradigm for creating and maintaining I think there are about 750,000 syadmins in the USA (and an SAGE-affiliated organizations both in the USA and around additional substantial fraction of that many throughout the rest the world. of the world). This means that the odds of having one as a I Submitting white papers for the SAGE Web site neighbor are fairly high. The profession’s recognition is making I Repairing and implementing various functions on the progress. SAGE site. Some barriers to organizational success, though, have come as a These positions are neither “advisory” nor “personnel manage- surprise to me. ment”.They are roll-your-sleeves-up and make results happen One of the most jarring recent events was the realization that positions. I’ll endeavor to insure that obstacles are removed – many of our prospective members have very committed ideas but the organization really needs a bit more manpower right about what a “system administrator” is (and thus what the audi- now. If you’re interested, please email me and let me know of ence for SAGE is) – and SAGE isn’t on their radar. your interest. Often, these people are network administrators, security admin- I think that the field of system administration (and all the sub- 2 Vol. 28, No. 3 ;login: fields that, in my mind, it contains: network admin, security admin, database admin, LAN admin, etc.) is not only technically fascinating but one of the highest-leverage fields of endeavor. I’d really like our organization to be the premier technical associa- tion for the hundreds of thousands of administrators (of all sorts of systems – SAGE is EDITORIAL STAFF not parochial about this). If you have suggestions or ideas, please do forward them to EDITOR: me. Finances and timing combine to make 2003 the year that we must all succeed on Rob Kolstad [email protected] this task. Any assistance is appreciated! CONTRIBUTING EDITOR: Tina Darmohray [email protected] MANAGING EDITOR: Alain Hénon [email protected] COPY EDITOR: Steve Gilmartin TYPESETTER: Festina Lente MEMBERSHIP, PUBLICATIONS, AND CONFERENCES USENIX Association ✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐ 2560 Ninth Street, Suite 215 Berkeley, CA 94710 Phone: 510 528 8649 First Haiku Contest FAX: 510 548 5738 Let’s write some Haiku. You’ve probably seen Haiku, little three line poems with five Email: [email protected] syllables in the first line, seven in the second line, and five more in the last line. Syllabic [email protected] [email protected] stresses (accents) are not important. Here’s a quick one: WWW: http://www.usenix.org Surfing excitement http://www.sage.org No response to any site Sadness rules the night The brief Haiku captures a thought, a moment, a scene, or a vision. The best Haiku amplify insight or even cause an “Aha!” or epiphany. Many Haiku traditionally describe the seasons of the year. Being a technical society, this doesn’t seem quite so germane to our mutual interests. This first Haiku contest solicits your entries describing some state of the Internet. Many entries will be posted on the web-site and potentially printed in these pages. The winning entry will be highlighted and rewarded: its author will be win a handsome polo shirt commemorating his/her vision and creative writing ability. Details: Please submit entries to [email protected] with the subject line “Haiku — internet”. Entry deadline: July 1, 2003. No limit on entries (other than pragmatism). Anonymous entries win no physical prizes. Void where prohibited by law. ✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐✐ June 2003 ;login: 3 Microsoft: what’s next? Microsoft just won their years-long antitrust lawsuit: they flouted the law, by Kragen Sitaker they perjured themselves with impunity, and they got off with a slap on the Kragen Sitaker is a multilingual hacker wrist. who's used UNIX since 1992, presently The time has come for those of us in the free-software community to think about consulting on server- what this means, because now Microsoft considers us Microsoft Enemy #1. What side Web software development in San should we expect in the next few years? Francisco. See http://pobox.com/ I don’t think my writing this will help Microsoft much – they’ve probably already ~kragen/ for more. thought this stuff through quite thoroughly – but perhaps it will help the rest of the world. [email protected] Well, we can probably kiss Microsoft Office on Linux goodbye. It works now – at least, up to Office 97 – but Microsoft will do everything in their power to ensure that future versions of Office don’t run on Linux, or, for that matter, on old versions of Microsoft Windows. In the past, they’ve licensed some products only for Microsoft operating systems. Antitrust law forbids this, but they might not care – they just laughed in the face of an antitrust case from the world’s most powerful government and won. In any case, they can certainly legally use technical means to make them difficult to run. For example, they can integrate big chunks of application code into the operating sys- tem; running the applications on another operating system would then require that the other operating system include re-implementations of all of this application func- tionality. Taken to the logical extreme, this would mean including all Microsoft appli- cations with every copy of the OS, only encrypted or disabled in some other way; the application CDs would merely contain activation keys. This would make it harder to upgrade the applications independently of the operating system, but it seems likely that Microsoft can use their “critical update notification tool” to distribute the neces- sary updates ahead of the application releases. Strategic GPL applications on Microsoft Windows could become technically very diffi- cult to run, especially when Microsoft can upgrade everybody’s operating system to break them on a daily basis. Microsoft, of course, has no legal obligation to verify that their software updates don’t break third-party applications. Along similar lines, Microsoft Windows licensing might forbid linking GPL applica- tions to system libraries, on the grounds that it might imperil Microsoft’s intellectual property. The Windows XP license forbids providing remote access to your desktop and, if I recall correctly, uses various technical means to make this difficult. These technical means won’t work when the Microsoft Windows OS runs inside a virtual machine like VMware. So Microsoft could “legitimately” break VMware compatibility, and probably will. (Microsoft can break VMware compatibility easily, especially when they can update their software on a monthly basis.) Microsoft has filed for a number of strategic patents on the .NET virtual machine.
Recommended publications
  • Flash Mx Actionscript Gratis Epub, Ebook
    FLASH MX ACTIONSCRIPT GRATIS Auteur: Bob van Duuren Aantal pagina's: 242 pagina's Verschijningsdatum: 2002-07-20 Uitgever: Duuren Media, Van EAN: 9789059400108 Taal: nl Link: Download hier Macromedia Flash MX & ActionScripting * Hoe worden beoordelingen berekend? Voor het berekenen van de totale sterrenbeoordeling en de procentuele verdeling per ster gebruiken we geen gewoon gemiddelde. In plaats daarvan houdt ons systeem rekening met zaken als hoe recent een recensie is en of de recensent het item op Amazon heeft gekocht. Verder worden recensies ook geanalyseerd om de betrouwbaarheid te verifiëren. Toprecensies Recentste Toprecensies. Beste recensies uit Nederland. Er zijn 0 recensies en 0 beoordelingen van Nederland. Beste recensies uit andere landen. Vertaal alle beoordelingen naar het Nederlands. Geverifieerde aankoop. This is different. Philip achieves this in his own weighty tome nearly pages! Ze kunnen namelijk niet zonder problemen worden vergroot of verkleind. De afbeelding is voor één schermresolutie opgeslagen. Vergroten kan wel, maar dit gaat ten koste van de scherpte van de afbeelding. Vectorafbeeldingen daarentegen kunnen zonder problemen worden aangepast, omdat de coördinaten wiskundig worden herberekend met als gevolg dat vectorafbeeldingen op alle verschillende media hetzelfde worden getoond. Dit garandeert een uniforme presentatie van de gegevens. Samen met de beperkte omvang van het bestand zorgt dit voor een aantal unieke eigenschappen van Flash. Adobe Flash beschikt over een eigen programmeertaal , ActionScript, waarmee men volwaardige websites en applicaties kan ontwikkelen. In nieuwere versies van Flash, vanaf Flash MX, is het door de toevoeging van het LoadVars-object mogelijk gemaakt gemakkelijker te communiceren met MySQL en PHP , waardoor er een wereld opengegaan is voor het gebruiken van dynamische gegevens.
    [Show full text]
  • Using Replicated Execution for a More Secure and Reliable Web Browser
    Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run.
    [Show full text]
  • Tvorba Interaktivního Animovaného Příběhu
    Středoškolská technika 2014 Setkání a prezentace prací středoškolských studentů na ČVUT Tvorba interaktivního animovaného příběhu Sami Salama Střední průmyslová škola na Proseku Novoborská 2, 190 00 Praha 9 1 Obsah 1 Obsah .................................................................................................................. 1 2 2D grafika (základní pojmy) ................................................................................. 3 2.1 Základní vysvětlení pojmu (počítačová) 2D grafika ....................................... 3 2.2 Rozdíl - 2D vs. 3D grafika .............................................................................. 3 2.3 Vektorová grafika ........................................................................................... 4 2.4 Rastrová grafika ............................................................................................ 6 2.5 Výhody a nevýhody rastrové grafiky .............................................................. 7 2.6 Rozlišení ........................................................................................................ 7 2.7 Barevná hloubka............................................................................................ 8 2.8 Základní grafické formáty .............................................................................. 8 2.9 Druhy komprese dat ...................................................................................... 9 2.10 Barevný model ..........................................................................................
    [Show full text]
  • Installation of Apache Openmeetings 3.3.2 on Macos Sierra 10.12.6 It Is
    Installation of Apache OpenMeetings 3.3.2 on macOS Sierra 10.12.6 It is tested with positive result. We will use the Apache's binary version OpenMeetings 3.3.2 stable, that is to say will suppress his compilation. It is done step by step. 22-9-2017 Starting.… 1) ------ Installation of Command line developer tools ------ We´ll install in first place the developer tools, that will help us to compile the sources. Run the shell as administrator, not as root, and install: xcode-select --install ...will open a window informing: Pag 1 clic Install button only, and will open other window. clic Agree button Pag 2 ...and will download and install the software ...telling when it finished ...clic Done. 2) ------ Installation of Homebrew ------ Homebrew install software. It is on Mac the same that apt-get on Debian or Ubuntu, yum on Centos or dnf on Fedora, for example. Install it: ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" Pag 3 brew doctor ...and update: brew update 3) ------ Installation of need it paquets ------ Will install wget to download files, and ghostscript. After the installation, will ask to run a commands. Attention!: brew install wget ghostscript nmap 4) ------ Installation of Oracle Java 1.8 ------ Java 1.8 is need it to work OpenMeetings 3.3.2. Will install Oracle Java 1.8. Please, visit: http://www.oracle.com/technetwork/java/javase/downloads/jdk8-downloads-2133251.html ...clic on: Agree and proceed ...check: Accept License Agreement ...and download the file called: jdk-8u144-macosx-x64.dmg Once unloaded the file, do clic on it and follow the installation process by default.
    [Show full text]
  • Cross Site Scripting Attacks Xss Exploits and Defense.Pdf
    436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 436_XSS_FM.qxd 4/20/07 1:18 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and deliv- ering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional mate- rials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assortment of value- added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our e-books onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Flash E Software Libero Stefano Sabatini
    Flash e software libero Stefano Sabatini GULCh Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 1 La tecnologia alla base di Flash ● Un file flash / SWF (Small Web Format / ShockWave Format) è interpretato da una macchina virtuale Flash ● I file SWF possono essere interpretati sia da un interprete standalone sia da un plugin inserito all'interno del browser. ● Il linguaggio della VM è orientato alla renderizzazione di animazioni ● Motore di rendering basato su grafica scalare ● Il linguaggio solitamente utilizzato per la programmazione degli SWF è un file Action Script (2 / 3), gli ambiente di sviluppo visuale generano automaticamente il codice (programmazione “visuale”). ● Esistono vari formati del linguaggio della VM (SWF 1– SWF 10). ● L'esecuzione di uno swiff è soggetto a delle restrizioni di sicurezza ● Con la tecnologia AIR (Adobe Integrate Realtime) è possibile utilizzare la stessa teconologia di sviluppo e renderizzazione per applicazioni desktop native (senza le limitazioni di sicurezza di Flash) ● A partire da Flash 10, supporto a un motore 3D Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 2 La tecnologia alla base di Flash ● Supporto a stream multimediali: ● Video: On2 VP6 (Flash 8), Sorenson Spark (Flash 6/7), H.264 (Flash 10) ● Audio: MP3, Nellymoser, Speex (Flash 10), ADPCM ● Tecnologia di comunicazione e streaming multimediale (RTMP, RTMPT, RTMPS, RTMPE) Cagliari, 2009-10-24 GULCh - Gruppo Utenti Linux Cagliari - www.gulch.it Stefano Sabatini, Flash e software libero 3 Ambiti di utilizzo di Flash ● Presentazione di elementi multimediali all'interno di pagine web (youtube / vimeo / facebook) ● Inclusione di animazioni all'interno di pagine web (e.g.
    [Show full text]
  • Tvpaint Animation 9 Pro Crack
    Tvpaint Animation 9 Pro Crack Tvpaint Animation 9 Pro Crack 1 / 4 2 / 4 Houdini is a 3D animation software application developed by Toronto-based SideFX, who ... 4 Rendering; 5 TouchDesigner; 6 Production; 7 See also; 8 References; 9 ... Ajax Animator · Animator Pro · TupiTube · SWFTools · Synfig · OpenToonz ... (Anime Studio) · ParticleIllusion · CrazyTalk · Toon Boom · Toonz · TVPaint. To download serial from the mac app store, you need a mac. Lets go through the ... The bundle identifier for tvp animation 9 pro for mac is fr. Thanks dann petty ... tvpaint animation tvpaint animation, tvpaint animation 11 pro, tvpaint animation free download, tvpaint animation 11 pro free, tvpaint animation 11, tvpaint animation 11 pro free download, tvpaint animation 11 pro crack, tvpaint animation 10 pro free download, tvpaint animation 10 pro crack, tvpaint animation tutorial TVPaint Animation 11 Professional Edition is now available free download fully Cracked, Download TVPaint Animation 11 Pro Crack which lets you animate .... Free Crack Software Download: TVPaint Animation 10 Pro v Cracked ... Tvpaint Animation Pro 10 0 9 torrent download and emule Â Ð ÐµÐ¶Ð¸Ñ 7 1 1 crack · .... Feb 14, 2021 — TVPaint 11 Crack is pro software in digital sketching, drawing, and ... Animation 11.0 Professional Edition Cracked is window 7, 8, 9, 10, Win XP .... Apr 2, 2021 — If I click on "Later" I can use TVPaint.. Sep 9, TVPAINT ANIMATION PRO V9 5 3 BILANGUAGE CRACK FOR XP XFORCE Pro 10 For Mac trail .... TVPAiNT. ANiMATiON 11, 4723 records found, first 100 of them are:Tvpaint Animation Pro 9 5 3 serial key genTvpaint Animation 8.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Berkeley DB from Wikipedia, the Free Encyclopedia
    Berkeley DB From Wikipedia, the free encyclopedia Berkeley DB Original author(s) Margo Seltzer and Keith Bostic of Sleepycat Software Developer(s) Sleepycat Software, later Oracle Corporation Initial release 1994 Stable release 6.1 / July 10, 2014 Development status production Written in C Operating system Unix, Linux, Windows, AIX, Sun Solaris, SCO Unix, Mac OS Size ~1244 kB compiled on Windows x86 Type Embedded database License AGPLv3 Website www.oracle.com/us/products/database/berkeley-db /index.html (http://www.oracle.com/us/products/database/berkeley- db/index.html) Berkeley DB (BDB) is a software library that provides a high-performance embedded database for key/value data. Berkeley DB is written in C with API bindings for C++, C#, PHP, Java, Perl, Python, Ruby, Tcl, Smalltalk, and many other programming languages. BDB stores arbitrary key/data pairs as byte arrays, and supports multiple data items for a single key. Berkeley DB is not a relational database.[1] BDB can support thousands of simultaneous threads of control or concurrent processes manipulating databases as large as 256 terabytes,[2] on a wide variety of operating systems including most Unix- like and Windows systems, and real-time operating systems. "Berkeley DB" is also used as the common brand name for three distinct products: Oracle Berkeley DB, Berkeley DB Java Edition, and Berkeley DB XML. These three products all share a common ancestry and are currently under active development at Oracle Corporation. Contents 1 Origin 2 Architecture 3 Editions 4 Programs that use Berkeley DB 5 Licensing 5.1 Sleepycat License 6 References 7 External links Origin Berkeley DB originated at the University of California, Berkeley as part of BSD, Berkeley's version of the Unix operating system.
    [Show full text]
  • A Detailed Look at Cairo's Opengl Spans Compositor Performance
    A Detailed Look at Cairo's OpenGL Spans Compositor Performance Bryce Harrington – Senior Open Source Developer Samsung Research America (Silicon Valley) [email protected] Open Source Group – Silicon Valley 1 © 2013 SAMSUNG Electronics Co. What is Cairo? 2D pen-based drawing model For both display and print Includes backends for acceleration and for vector output formats Open Source Group – Silicon Valley 2 © 2013 SAMSUNG Electronics Co. http://www.tortall.net/mu/wiki/CairoTutorialhttp://www.tortall.net/mu/wiki/CairoTutorial Open Source Group – Silicon Valley 3 © 2013 SAMSUNG Electronics Co. Where is Cairo Used on the Linux Desktop? GTK+/Pango GNOME, XFCE4 Gnuplot Gnucash $$ apt-cache apt-cache rdepends rdepends libcairo2 libcairo2 | |wc wc -l -l Mozilla 712712 Evince (xpdf) Scribus Inkscape : : : Open Source Group – Silicon Valley 4 © 2013 SAMSUNG Electronics Co. Cairo Backends Format backends Platform backends ps image pdf xlib svg xcb cairo-gl quartz win32 beos Open Source Group – Silicon Valley 5 © 2013 SAMSUNG Electronics Co. Cairo-gl on the Linux Desktop Cairo-gl is not enabled for some distros (e.g. Ubuntu): --enable-gl links cairo to libgl NVIDIA's libgl gets linked to every client app Enormous RAM increase per app running (300%) See Launchpad #725434 Several GL backends supported cairo-gl (OpenGL) - EGL, GLX, WGL glesv2 (OpenGL ES 2.0) - EGL glesv3 (OpenGL ES 3.0) - EGL vg (OpenVG) - EGL, GLX cogl - experimental Open Source Group – Silicon Valley 6 © 2013 SAMSUNG Electronics Co. Cairo-gl Compositors Compositing combines visual elements into a single scene The cairo-gl backend has multiple compositors: MSAA Spans Mask Traps cairo-gl heuristically selects best compositor for operation.
    [Show full text]
  • Fast Statistical Spam Filter by Approximate Classifications
    Fast Statistical Spam Filter by Approximate Classifications Kang Li Zhenyu Zhong Department of Computer Science Department of Computer Science University of Georgia University of Georgia Athens, Georgia, USA Athens, Georgia, USA [email protected] [email protected] ABSTRACT based on its contents, have found wide acceptance in tools Statistical-based Bayesian filters have become a popular and used to block spam. These filters can be continually trained important defense against spam. However, despite their ef- on updated corpora of spam and ham (good email), resulting fectiveness, their greater processing overhead can prevent in robust, adaptive, and highly accurate systems. them from scaling well for enterprise-level mail servers. For Bayesian filters usually perform a dictionary lookup on example, the dictionary lookups that are characteristic of each individual token and summarize the result in order to this approach are limited by the memory access rate, there- arrive at a decision. It is not unusual to accumulate over fore relatively insensitive to increases in CPU speed. We 100,000 tokens in a dictionary, depending on how training is address this scaling issue by proposing an acceleration tech- handled [23]. Unfortunately, the performance of these dic- nique that speeds up Bayesian filters based on approximate tionary lookups is limited by the memory access rate, there- classification. The approximation uses two methods: hash- fore relatively insensitive to increases in CPU speed. As a based lookup and lossy encoding. Lookup approximation is result of this lookup overhead, classification can be relatively based on the popular Bloom filter data structure with an ex- slow.
    [Show full text]