Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The amount of computer viruses has grown significantly and antivirus software becomes inefficient when analyzing new threats. At the same time, artificial intelligence has become more cost effective to implement in projects due to the low amount of hardware costs. This paper is intended to document the process of modelling data gathered from the programs that are running on a computer with a Windows...
Significant benefits, like an IT cost savings, security, customability, knowledge sharing, can be achieved through the introduction and use of Free/Libre and Open Source Software (FLOSS) in high schools. By using FLOSS, level of students' innovation, computer literacy, knowledge and creativity could be increased. That benefit could be important for developing countries as a chance for strengthen local...
The Unix operating system stands out as a major engineering achievement due to its exemplary design, technical contributions, impact, development model, and widespread use. Its evolution is made available as a revision management repository, covering the period from its inception in 1970 until today. The data set is being used for empirical research in the evolution of code, programming practices,...
The questions of further implementation of the operating system software means for the FPGA-based self-configurable computer systems support discussed in the paper. An approach for the FPGA-based self-configurable computer systems support using Unix-like OS presented. According proposed approach in the self-configurable computer systems (SCCS) the labor-intensive and time-consuming works of tasks...
This article observes the possibility of protection network resources from malicious attacks using traps that simulate SSH service. There are overviewed main types of attacks, analyzed existing software solutions, its basic working principles and opportunities for further improvement. In addition, there is described author's solution, which can increase the attractiveness of SSH honeypot working under...
Apple claims that iPhone 6, which is equipped with iOS 8.0 and later version, is secure enough to prevent a user's private data from law enforcement or malicious intruders. In pre-iOS 8.0 operating systems, a user's data were only encrypted by hardware-based keys, which can be obtained by Apple. But in iOS 8.0 and later version, the private data on the iPhone are protected by a secret key that is...
A process-scheduling algorithm is a fundamental operating system function that manages the assignment of CPU (Central Processing Unit) processes. It aims to make the system efficient, fast, and fair, allowing as many processes as possible to make the best use of the CPU at any given time. Understanding scheduling algorithms and their impact in practice is a challenging and time-consuming task for...
In this research we are presenting a system which addresses the energy wastage arising from carelessness and negligence by a person when he leaves his house without turning off all the unnecessary appliances. The proposed system uses the Bluetooth communication in the user's phone to determine whether the user is at home or not. It is not necessary for the user's phone to be in discoverable mode for...
Virtual memory concept has been used for a long time in computer systems. Memory Management Unit (MMU) in microprocessor is an essential part of the application of VM concept. As part of modern MMU designs, small but fast cache memory for address mappings called Translation Lookaside Buffer (TLB) is often utilized. TLB is crucial for MMU performance. It can be completely realized in hardware or combine...
During the development of the security subsystem of modern information systems, a problem of the joint implementation of several access control models arises quite often. Traditionally, a request for the user's access to resources is granted in case of simultaneous access permission by all active security policies. When there is a conflict between the decisions of the security policies, the issue...
Virtual memory concept has been used for a long time in computer systems. Memory Management Unit (MMU) in microprocessor is an essential part of the application of VM concept. As part of modern MMU designs, small but fast cache memory for address mappings called Translation Lookaside Buffer (TLB) is often utilized. TLB is crucial for MMU performance. It can be completely realized in hardware or combine...
Hadoop is a popular open-source MapReduce implementation and has been widely used in many large scale systems. For improving I/O performance of Hadoop, a method which controlled file storing location based on sequential I/O speed of the storage device was proposed. However, the method did not take account of virtualized environment. In this paper, we focus on virtualized environment with a fixed number...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
as the deceleration of processor scaling due to Moore's law accelerates research in new types of computing structures, the need arises for rethinking operating systems paradigms. Traditionally, an operating system is a layer between hardware and applications and its primary function is in managing hardware resources and providing a common abstraction to applications. How does this function apply,...
The spread of scientific knowledge was most marked in recent decades with the advent of distance education. It was possible because advances like the Internet and the development of Learning Management Systems (LMS) were improved increasingly. However, the large amount of information available is not sufficient to ensure the development of future learners in technical disciplines, such as Computer...
In a computer system, the fastest storage component is the CPU cache, followed by the system memory. I/O to disk is thousands of times slower than an access to memory. This fact is the key for why you try to make effective use of memory whenever possible and defer I/Os whenever you can. The majority of the user response time is actually spent waiting for a disk I/O to occur. By making good use of...
On-board computer (OBC) is a very important component in any On-Board Control System to perform guidance and control along with critical operations during the mission, should be designed to execute several tasks that need to be executed in deterministic precise order and for accurate periods of time. Real-time control systems require instantaneous execution of commands either through hardware or software...
This paper discusses the design, development and implementation of an cross-platform program, called ENDS (Easy Network Designer Software), which allows to perform network virtualization and remote configuration of MikroTik equipment basic parameters through a graphical interface. The software was written in Java and it uses a MySQL database where the projects are saved. The program was tested by...
Moving Target Defense (MTD) has received significant focus in technical publications. The publications describe MTD approaches that periodically change some attribute of the computer network system. The attribute that is changed, in most cases, is one that an adversary attempts to gain knowledge of through reconnaissance and may use its knowledge of the attribute to exploit the system. The fundamental...
As the Internet of Things evolves, many devices that were not previously considered suitable for this trend can now be used as a part of smart interconnected systems. This paper describes the process of adapting a Cisco IR829GW router to be used as both a Cisco IOS platform (for complex networking needs) and an embedded device running Yocto Linux distribution for Internet of Things application deployment...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.