In Pursuit of Simplicity a Symposium Honoring Professor Edsger Wybe Dijkstra

Total Page:16

File Type:pdf, Size:1020Kb

In Pursuit of Simplicity a Symposium Honoring Professor Edsger Wybe Dijkstra Department of Computer Sciences The University of Texas at Austin presents InIn PursuitPursuit ofof SimplicitySimplicity A Symposium Honoring Professor Edsger Wybe Dijkstra May 12–13, 2000 This certificate shows that the student E. W. Dijkstra paid his university tuition for the academic year 1954-1955 and hence was entitled to follow lectures, visit the library, etc. Each student was required to be in possession of their certificate when in any university building and officials would sometimes spot check. Contents The Program .................................................................................................................................................. 2 E. W. Dijkstra — Background Information ................................................................................................ 4 Selected Citations........................................................................................................................................... 5 Insights to the Life and Times of Edsger W. Dijkstra ................................................................................ 7 In Edsger’s Words ......................................................................................................................................... 9 Blackboard Commentary ............................................................................................................................. 11 The Speakers .................................................................................................................................................. 13 Photos.............................................................................................................................................................. 22 Area Map ........................................................................................................................................................ 24 In Pursuit of Simplicity A Symposium Honoring Professor Edsger Wybe Dijkstra May 12-13, 2000 Department of Computer Sciences Symposium Committee: Taylor Hall, Room 2.124 Vicki L. Almstrum The University of Texas at Austin Stephen W. Keckler, Chair Austin, TX 78712-118 Jayadev Misra (512) 471-7316 Suzanne Kain Rhoads Fax (512) 471-8885 Hamilton Richards www.cs.utexas.edu The Program Friday, May 12th, Taylor Hall 2.106 8:00-8:30 Registration 8:30-8:45 Welcome William Livingston, Professor Emeritus, Department of Government, College of Liberal Arts, The University of Texas at Austin Benjamin J. Kuipers, Chairman, Department of Computer Sciences, The University of Texas at Austin Session 1 Chair: Vicki Almstrum, The University of Texas at Austin 8:45-9:15 A Real-time Application of Oberon-SA: Flight Control of Model Helicopters Niklaus Wirth, ETH Zurich 9:15-9:45 The Music of Streams M. Douglas McIlroy, Darmouth College 9:45-10:15 Panel Anish Arora, Ohio State University at Columbus and Microsoft Corporation Kenneth L. Calvert, University of Kentucky Joshyula R. Rao, IBM T. J. Watson Research Center Ambuj Singh, University of California at Santa Barbara 10:15-10:45 Break, Taylor Hall, Room 3.128 Session 2 Chair: Mohamad Gouda, The University of Texas at Austin 10:45-11:15 Model-Based Specification Lex Bijlsma, Utrecht University 11:15-11:45 The Alma Project or How First-Order Logic Can Help Us in Imperative Programming Krzysztof R. Apt, CWI Amsterdam and University of Amsterdam 11:45-12:15 Panel Jim Anderson, University of North Carolina at Chapel Hill K. Rustan M. Leino, Compaq Systems Research Center Natarajan Shankar, SRI Computer Science Laboratory, Menlo Park 12:15-2:00 Lunch, The University Texas Club Session 3 Chair: Jayadev Misra, The University of Texas at Austin 2:00-2:30 A Theory of Composition Motivated by wp K. Mani Chandy, California Institute of Technology 2:30-3:00 Are there Systems Principles or only Systems Principals? Fred B. Schneider, Cornell University 3:00-3:30 Panel Rajeev Joshi, Compaq Systems Research Center Markus Kaltenbach, Siemens Information and Communication Network, Inc., Munich Jacob Kornerup, National Instruments Corporation, Austin Panagiotis Manolios, The University of Texas at Austin 3:30-4:00 Break, Taylor Hall Room 3.128 2 Session 4 Chair: Stephen Keckler, The University of Texas at Austin 4:00-4:30 Formality Works Rob R. Hoogerwoord, Eindhoven University of Technology 4:30-5:00 Frolicking with Formulae W. H. J. Feijen, Eindhoven University of Technology Banquet Lila B. Etter Alumni Center 7:00-10:00 Banquet Speakers David Gries, University of Georgia at Athens Hamilton Richards, The University of Texas at Austin W. M. Turski, Warsaw University Saturday, May 13th, Taylor Hall 2.106 Session 1 Chair: J Strother Moore, The University of Texas at Austin 9:00-9:30 Structured Programming and Literate Programming Donald E. Knuth, Stanford University 9:30-10:15 Panel Don Braben, Venture Research International and University College London Anne Kaldewaij, University of Amsterdam Martin Rem, Eindhoven University of Technology Netty van Gasteren, Eindhoven University of Technology 10:15-10:45 Break, Taylor Hall, Room 3.128 Session 2 Chair: Hamilton Richards, The University of Texas at Austin 10:45-11:15 Drawing Lots for Sinterklaas Rutger M. Dijkstra, Eye-to-Eye, Groningen 11:15-11:45 What I learned from VLSI: An Imaginary Return to the Tuesday Afternoon Club Alain J. Martin, California Institute of Technology 11:45-12:15 Panel Ted Herman, University of Iowa Charanjit S. Jutla, IBM T. J. Watson Research Center David A. Naumann, Stevens Institute of Technology, New Jersey 12:15-1:30 Lunch, The University Texas Club Session 3 Chair: Robert Boyer, The University of Texas at Austin 1:30-2:00 Legacy C. A. R. Hoare, Microsoft Corporation, Cambridge 2:00-2:30 Juno-2, a Constraint-Based Graphics System Greg Nelson, Compaq Systems Research Center 2:30-3:00 Break, Taylor Hall Room 3.128 3:00-4:00 Farewell Lecture Edsger W. Dijkstra 4:00 Closing Remarks Jayadev Misra 3 E. W. Dijkstra Education Gymnasium Erasmianum in Rotterdam (with highest possible marks for mathematics, physics, chemistry, and biology), 1948 University of Leyden Candidaats Examen, Mathematics and Physics, 1951 Doctoraal Examen, Theoretical Physics, 1956 University of Amsterdam Ph.D. (Cum Laude), 1959 Professional Experience Mathematical Centre, Amsterdam Staff member, 1952-1962 Eindhoven University of Technology Full Professor of Mathematics, 1962-1973 Burroughs Research Fellow / Professor Extraordinarius, 1973-1984 The University of Texas at Austin Professor and Schlumberger Centennial Chair in Computer Sciences, 1984-1999 Honors and Awards • Member of the Bataafsch Genootschap de Proefondervindelijke Wijsbegeerte, Rotterdam, 1964 • Member of the Royal Netherlands Academy of Arts and Sciences, 1971 • Distinguished Fellow of the British Computer Society, 1971 • Programming Systems and Languages Paper Award, 1971 • ACM Turing Award, 1972 • AFIPS Harry Goode Memorial Award, 1974 • Foreign Honorary Member of the American Academy of Arts and Sciences, 1975 • Doctor of Science Honoris Causa, The Queen’s University of Belfast, 1976 • Computer Pioneer Award, IEEE Computer Society, 1982 • ACM/SIGCSE Award for Outstanding Contributions to Computer Science Education, 1989 • ACM Fellow, 1994 Written Works According to his Curriculum Vitae, E. W. Dijkstra is the author or co-author of nine books, twelve book chapters, forty journal articles, thirty-four contributions to conference proceedings, and twenty-two other publications. However, these statistics only scratch the surface of his writings. The EWD series comprises over 1000 manuscripts (with EWD 1294 the highest in the series at this moment) that include technical papers, trip reports, and essays. While many of these are included among the published works mentioned above, many more are not. The spread of these manuscripts represents a unique form of “publication” via an informal distribution tree. Each EWD manuscript goes to a small group of people, each of whom acts as a new distribution point to send copies to additional people — all over the world. At least one paper returned to him six generations later. The Department of Computer Sciences is currently organizing these writings into a web site, which will be located at “Edsger W. Dijkstra archives” under Publications on the UT CS home page at www.cs.utexas.edu. 4 Selected Citations Citation from the ACM Turing Award The working vocabulary of programmers is studded with words originated or forcefully promulgated by E. W. Dijkstra: display, deadly embrace, semaphore, go-to-less programming, structured programming. But his influence on programming is more pervasive than any glossary can possibly indicate. The precious gift that this Turing Award acknowledges is Dijkstra’s style: his approach to programming as a high, intellectual challenge; his eloquent insistence and practical demonstration that programs should be composed correctly, not just debugged into correctness; and his illuminating perception of problems at the foundations of program design. He has published about a dozen papers, both technical and reflective, among which are especially to be noted his philosophical address at IFIP, his already classic papers on cooperating sequential processes, and his memorable indictment of the go-to statement. An influential series of letters by Dijkstra have recently surfaced as a polished monograph on the art of composing programs. We have come to value good programs in much the same way as we value good literature. And at the center of this movement, creating
Recommended publications
  • Advice on Qualification Equivalencies 2018-2019 University of Cambridge – Graduate Admissions Office
    Advice on Qualification Equivalencies 2018-2019 University of Cambridge – Graduate Admissions Office This document is advisory only and is designed to give Departments a guide for the minimum entry requirements for each country. It is worth noting that there can be great variation in the education systems between countries, and Departments should, as always, consider each application on the strength of the references and other supporting materials in addition to the academic qualification. The document has been compiled from a variety of sources including: UK NARIC (National Academic Recognition Information Centre for the United Kingdom) www.naric.org.uk; The International Office; and views from individuals in several Faculties. Please note that this table lists the University’s minimum requirements. Departments and Degree Committees differ in how they regard qualifications, and may therefore require a higher grade or qualification than that specified below. An academic case will be considered with relevant supporting information for applicants who do not meet these guidelines. Comments and views from colleagues on this document are very welcome. Please contact Clare Impey at the Graduate Admissions Office if you wish to comment on or add to any advice – [email protected] . When requesting more information about a specific case, it is helpful if you can send copies of the applicant’s academic transcripts where possible. ****NOTE: Where multiple grading schemes are listed on one transcript, whichever requirement is the highest should be applied. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z COUNTRY QUALIFICATION REQUIRED 2:1 EQUIVALENT FIRST EQUIVALENT COMMENTS Afganistan Master’s 85% Last updated 21/09/2017 COUNTRY QUALIFICATION REQUIRED 2:1 EQUIVALENT FIRST EQUIVALENT COMMENTS Albania Kandidat I Shkencave (Candidate of Sciences), the 8/10 9/10 Note: University Diploma (post Master I nivelit te pare (First Level Master’s 2007) = Dip HE, not sufficient.
    [Show full text]
  • 1 Oral History Interview with Brian Randell January 7, 2021 Via Zoom
    Oral History Interview with Brian Randell January 7, 2021 Via Zoom Conducted by William Aspray Charles Babbage Institute 1 Abstract Brian Randell tells about his upbringing and his work at English Electric, IBM, and Newcastle University. The primary topic of the interview is his work in the history of computing. He discusses his discovery of the Irish computer pioneer Percy Ludgate, the preparation of his edited volume The Origins of Digital Computers, various lectures he has given on the history of computing, his PhD supervision of Martin Campbell-Kelly, the Computer History Museum, his contribution to the second edition of A Computer Perspective, and his involvement in making public the World War 2 Bletchley Park Colossus code- breaking machines, among other topics. This interview is part of a series of interviews on the early history of the history of computing. Keywords: English Electric, IBM, Newcastle University, Bletchley Park, Martin Campbell-Kelly, Computer History Museum, Jim Horning, Gwen Bell, Gordon Bell, Enigma machine, Curta (calculating device), Charles and Ray Eames, I. Bernard Cohen, Charles Babbage, Percy Ludgate. 2 Aspray: This is an interview on the 7th of January 2021 with Brian Randell. The interviewer is William Aspray. We’re doing this interview via Zoom. Brian, could you briefly talk about when and where you were born, a little bit about your growing up and your interests during that time, all the way through your formal education? Randell: Ok. I was born in 1936 in Cardiff, Wales. Went to school, high school, there. In retrospect, one of the things I missed out then was learning or being taught Welsh.
    [Show full text]
  • PL/I List Processing • PL/I Language Lacked FaciliEs for TreaNg Linked Lists HAROLD LAWSON,JR
    The Birth of the Pointer Variable Based upon: Experiences and Reflec;ons of a Computer Pioneer Harold “Bud” Lawson FELLOW FELLOW and LIFE MEMBER IEEE COMPUTER SOCIETY CHARLES BABBAGE COMPUTER PIONEER FELLOW Overlapping Phases • Phase 1 (1959-1974) – Computer Industry • Phase 2 (1974-1996) - Computer-Based Systems • Phase 3 (1996-Present) – Complex Systems • Dedicated to all the talented colleagues that I have worked with during my career. • We have had fun and learned from each other. • InteresMng ReflecMons and Happenings are indicated in Red. Computer Industry (1959 to 1974) • Summer 1958 - US Census Bureau • 1959 Temple University (Introduc;on to IBM 650 (Drum Machine)) • 1959-61 Employed at Remington-Rand Univac • 1961-67 Employed at IBM • 1967-69 Part Time Consultant (Professor) • 1969-70 Employed at Standard Computer Corporaon • 1971-73 Consultant to Datasaab, Linköping • 1973-… Consultant .. Expert Witness.. Rear Admiral Dr. Grace Murray Hopper (December 9, 1906 – January 1, 1992) Minted the word “BUG” – During her Mme as Programmer of the MARK I Computer at Harvard Minted the word “COMPILER” with A-0 in 1951 Developed Math-MaMc and FlowmaMc and inspired the Development of COBOL Grace loved US Navy Service – The oldest acMve officer, reMrement at 80. From Grace I learned that it is important to queson the status-quo, to seek deeper meaning and explore alterna5ve ways of doing things. 1980 – Honarary Doctor The USS Linköpings Universitet Hopper Univac Compiler Technology of the 1950’s Grace Hopper’s Early Programming Languages Math-MaMc
    [Show full text]
  • Edsger Dijkstra: the Man Who Carried Computer Science on His Shoulders
    INFERENCE / Vol. 5, No. 3 Edsger Dijkstra The Man Who Carried Computer Science on His Shoulders Krzysztof Apt s it turned out, the train I had taken from dsger dijkstra was born in Rotterdam in 1930. Nijmegen to Eindhoven arrived late. To make He described his father, at one time the president matters worse, I was then unable to find the right of the Dutch Chemical Society, as “an excellent Aoffice in the university building. When I eventually arrived Echemist,” and his mother as “a brilliant mathematician for my appointment, I was more than half an hour behind who had no job.”1 In 1948, Dijkstra achieved remarkable schedule. The professor completely ignored my profuse results when he completed secondary school at the famous apologies and proceeded to take a full hour for the meet- Erasmiaans Gymnasium in Rotterdam. His school diploma ing. It was the first time I met Edsger Wybe Dijkstra. shows that he earned the highest possible grade in no less At the time of our meeting in 1975, Dijkstra was 45 than six out of thirteen subjects. He then enrolled at the years old. The most prestigious award in computer sci- University of Leiden to study physics. ence, the ACM Turing Award, had been conferred on In September 1951, Dijkstra’s father suggested he attend him three years earlier. Almost twenty years his junior, I a three-week course on programming in Cambridge. It knew very little about the field—I had only learned what turned out to be an idea with far-reaching consequences. a flowchart was a couple of weeks earlier.
    [Show full text]
  • The Turing Approach Vs. Lovelace Approach
    Connecting the Humanities and the Sciences: Part 2. Two Schools of Thought: The Turing Approach vs. The Lovelace Approach* Walter Isaacson, The Jefferson Lecture, National Endowment for the Humanities, May 12, 2014 That brings us to another historical figure, not nearly as famous, but perhaps she should be: Ada Byron, the Countess of Lovelace, often credited with being, in the 1840s, the first computer programmer. The only legitimate child of the poet Lord Byron, Ada inherited her father’s romantic spirit, a trait that her mother tried to temper by having her tutored in math, as if it were an antidote to poetic imagination. When Ada, at age five, showed a preference for geography, Lady Byron ordered that the subject be replaced by additional arithmetic lessons, and her governess soon proudly reported, “she adds up sums of five or six rows of figures with accuracy.” Despite these efforts, Ada developed some of her father’s propensities. She had an affair as a young teenager with one of her tutors, and when they were caught and the tutor banished, Ada tried to run away from home to be with him. She was a romantic as well as a rationalist. The resulting combination produced in Ada a love for what she took to calling “poetical science,” which linked her rebellious imagination to an enchantment with numbers. For many people, including her father, the rarefied sensibilities of the Romantic Era clashed with the technological excitement of the Industrial Revolution. Lord Byron was a Luddite. Seriously. In his maiden and only speech to the House of Lords, he defended the followers of Nedd Ludd who were rampaging against mechanical weaving machines that were putting artisans out of work.
    [Show full text]
  • FUNDAMENTALS of COMPUTING (2019-20) COURSE CODE: 5023 502800CH (Grade 7 for ½ High School Credit) 502900CH (Grade 8 for ½ High School Credit)
    EXPLORING COMPUTER SCIENCE NEW NAME: FUNDAMENTALS OF COMPUTING (2019-20) COURSE CODE: 5023 502800CH (grade 7 for ½ high school credit) 502900CH (grade 8 for ½ high school credit) COURSE DESCRIPTION: Fundamentals of Computing is designed to introduce students to the field of computer science through an exploration of engaging and accessible topics. Through creativity and innovation, students will use critical thinking and problem solving skills to implement projects that are relevant to students’ lives. They will create a variety of computing artifacts while collaborating in teams. Students will gain a fundamental understanding of the history and operation of computers, programming, and web design. Students will also be introduced to computing careers and will examine societal and ethical issues of computing. OBJECTIVE: Given the necessary equipment, software, supplies, and facilities, the student will be able to successfully complete the following core standards for courses that grant one unit of credit. RECOMMENDED GRADE LEVELS: 9-12 (Preference 9-10) COURSE CREDIT: 1 unit (120 hours) COMPUTER REQUIREMENTS: One computer per student with Internet access RESOURCES: See attached Resource List A. SAFETY Effective professionals know the academic subject matter, including safety as required for proficiency within their area. They will use this knowledge as needed in their role. The following accountability criteria are considered essential for students in any program of study. 1. Review school safety policies and procedures. 2. Review classroom safety rules and procedures. 3. Review safety procedures for using equipment in the classroom. 4. Identify major causes of work-related accidents in office environments. 5. Demonstrate safety skills in an office/work environment.
    [Show full text]
  • About ILE C/C++ Compiler Reference
    IBM i 7.3 Programming IBM Rational Development Studio for i ILE C/C++ Compiler Reference IBM SC09-4816-07 Note Before using this information and the product it supports, read the information in “Notices” on page 121. This edition applies to IBM® Rational® Development Studio for i (product number 5770-WDS) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1993, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents ILE C/C++ Compiler Reference............................................................................... 1 What is new for IBM i 7.3.............................................................................................................................3 PDF file for ILE C/C++ Compiler Reference.................................................................................................5 About ILE C/C++ Compiler Reference......................................................................................................... 7 Prerequisite and Related Information..................................................................................................
    [Show full text]
  • Software Tools: a Building Block Approach
    SOFTWARE TOOLS: A BUILDING BLOCK APPROACH NBS Special Publication 500-14 U.S. DEPARTMENT OF COMMERCE National Bureau of Standards ] NATIONAL BUREAU OF STANDARDS The National Bureau of Standards^ was established by an act of Congress March 3, 1901. The Bureau's overall goal is to strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and technological services for industry and government, (3) a technical basis for equity in trade, and (4) technical services to pro- mote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute for Applied Technology, the Institute for Computer Sciences and Technology, the Office for Information Programs, and the ! Office of Experimental Technology Incentives Program. THE INSTITUTE FOR BASIC STANDARDS provides the central basis within the United States of a complete and consist- ent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essen- tial services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry, and commerce. The Institute consists of the Office of Measurement Services, and the following center and divisions: Applied Mathematics — Electricity — Mechanics — Heat — Optical Physics — Center for Radiation Research — Lab- oratory Astrophysics^ — Cryogenics^ — Electromagnetics^ — Time and Frequency*. THE INSTITUTE FOR MATERIALS RESEARCH conducts materials research leading to improved methods of measure- ment, standards, and data on the properties of well-characterized materials needed by industry, commerce, educational insti- tutions, and Government; provides advisory and research services to other Government agencies; and develops, produces, and distributes standard reference materials.
    [Show full text]
  • Compiler Error Messages Considered Unhelpful: the Landscape of Text-Based Programming Error Message Research
    Working Group Report ITiCSE-WGR ’19, July 15–17, 2019, Aberdeen, Scotland Uk Compiler Error Messages Considered Unhelpful: The Landscape of Text-Based Programming Error Message Research Brett A. Becker∗ Paul Denny∗ Raymond Pettit∗ University College Dublin University of Auckland University of Virginia Dublin, Ireland Auckland, New Zealand Charlottesville, Virginia, USA [email protected] [email protected] [email protected] Durell Bouchard Dennis J. Bouvier Brian Harrington Roanoke College Southern Illinois University Edwardsville University of Toronto Scarborough Roanoke, Virgina, USA Edwardsville, Illinois, USA Scarborough, Ontario, Canada [email protected] [email protected] [email protected] Amir Kamil Amey Karkare Chris McDonald University of Michigan Indian Institute of Technology Kanpur University of Western Australia Ann Arbor, Michigan, USA Kanpur, India Perth, Australia [email protected] [email protected] [email protected] Peter-Michael Osera Janice L. Pearce James Prather Grinnell College Berea College Abilene Christian University Grinnell, Iowa, USA Berea, Kentucky, USA Abilene, Texas, USA [email protected] [email protected] [email protected] ABSTRACT of evidence supporting each one (historical, anecdotal, and empiri- Diagnostic messages generated by compilers and interpreters such cal). This work can serve as a starting point for those who wish to as syntax error messages have been researched for over half of a conduct research on compiler error messages, runtime errors, and century. Unfortunately, these messages which include error, warn- warnings. We also make the bibtex file of our 300+ reference corpus ing, and run-time messages, present substantial difficulty and could publicly available.
    [Show full text]
  • Florida Course Code Directory Computer Science Course Information 2019-2020
    FLORIDA COURSE CODE DIRECTORY COMPUTER SCIENCE COURSE INFORMATION 2019-2020 Section 1007.2616, Florida Statutes, was amended by the Florida Legislature to include the definition of computer science and a requirement that computer science courses be identified in the Course Code Directory published on the Department of Education’s website. DEFINITION: The study of computers and algorithmic processes, including their principles, hardware and software designs, applications, and their impact on society, and includes computer coding and computer programming. SECONDARY COMPUTER SCIENCE COURSES Middle and high schools in each district, including combination schools in which any of grades 6-12 are taught, must provide an opportunity for students to enroll in a computer science course. If a school district does not offer an identified computer science course the district must provide students access to the course through the Florida Virtual School (FLVS) or through other means. COURSE NUMBER COURSE TITLE 0200000 M/J Computer Science Discoveries 0200010 M/J Computer Science Discoveries 1 0200020 M/J Computer Science Discoveries 2 0200305 Computer Science Discoveries 0200315 Computer Science Principles 0200320 AP Computer Science A 0200325 AP Computer Science A Innovation 0200335 AP Computer Science Principles 0200435 PRE-AICE Computer Studies IGCSE Level 0200480 AICE Computer Science 1 AS Level 0200485 AICE Computer Science 2 A Level 0200490 AICE Information Technology 1 AS Level 0200495 AICE Information Technology 2 A Level 0200800 IB Computer
    [Show full text]
  • Blockchain Database for a Cyber Security Learning System
    Session ETD 475 Blockchain Database for a Cyber Security Learning System Sophia Armstrong Department of Computer Science, College of Engineering and Technology East Carolina University Te-Shun Chou Department of Technology Systems, College of Engineering and Technology East Carolina University John Jones College of Engineering and Technology East Carolina University Abstract Our cyber security learning system involves an interactive environment for students to practice executing different attack and defense techniques relating to cyber security concepts. We intend to use a blockchain database to secure data from this learning system. The data being secured are students’ scores accumulated by successful attacks or defends from the other students’ implementations. As more professionals are departing from traditional relational databases, the enthusiasm around distributed ledger databases is growing, specifically blockchain. With many available platforms applying blockchain structures, it is important to understand how this emerging technology is being used, with the goal of utilizing this technology for our learning system. In order to successfully secure the data and ensure it is tamper resistant, an investigation of blockchain technology use cases must be conducted. In addition, this paper defined the primary characteristics of the emerging distributed ledgers or blockchain technology, to ensure we effectively harness this technology to secure our data. Moreover, we explored using a blockchain database for our data. 1. Introduction New buzz words are constantly surfacing in the ever evolving field of computer science, so it is critical to distinguish the difference between temporary fads and new evolutionary technology. Blockchain is one of the newest and most developmental technologies currently drawing interest.
    [Show full text]
  • An Introduction to Cloud Databases a Guide for Administrators
    Compliments of An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram & Sam Alapati REPORT Break free from old guard databases AWS provides the broadest selection of purpose-built databases allowing you to save, grow, and innovate faster Enterprise scale at 3-5x the performance 14+ database engines 1/10th the cost of vs popular alternatives - more than any other commercial databases provider Learn more: aws.amazon.com/databases An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Beijing Boston Farnham Sebastopol Tokyo An Introduction to Cloud Databases by Wendy A. Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Copyright © 2019 O’Reilly Media Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more infor‐ mation, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Development Editor: Jeff Bleiel Interior Designer: David Futato Acquisitions Editor: Jonathan Hassell Cover Designer: Karen Montgomery Production Editor: Katherine Tozer Illustrator: Rebecca Demarest Copyeditor: Octal Publishing, LLC September 2019: First Edition Revision History for the First Edition 2019-08-19: First Release The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. An Introduction to Cloud Databases, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. The views expressed in this work are those of the authors, and do not represent the publisher’s views.
    [Show full text]