1 Systems Software Research is Irrelevant Rob Pike Bell Labs Lucent Technologies Feb 21, 2000
2 A Polemic 1 This talk is a polemic that distills the pessimistic side of my feelings about systems research these days. I won t talk much about the optimistic side, since lots of others can do that for me; everyone s excited about the computer industry. I may therefore present a picture somewhat darker than reality. However, I think the situation is genuinely bad and requires action.
3 Thesis 2 Systems software research has become a sideline to the excitement in the computing industry. When did you last see an exciting non-commercial demo? Ironically, at a time when computing is almost the definition of innovation, research in both software and hardware at universities and much of industry is becoming insular, ossified, and irrelevant. There are many reasons, some avoidable, some endemic. There may be ways to improve the situation, but they will require a community-wide effort.
4 Definitions 3 Systems Software Research Is Irrelevant
5 A Field in Decline New Operating Systems at SOSP "Who needs new operating systems, anyway?" you ask. Maybe no one, but then that supports my thesis. "But now there are lots of papers in file systems, performance, security, web caching, etc.," you say. Yes, but is anyone outside the research field paying attention?
6 Systems Research s Contribution to the Boom 5 A high-end workstation: Hardware 33 MHz Mips R MHz Alpha or Pentium III 32 megabytes of RAM 512 megabytes of RAM 10 Mbps Ethernet 100 Mbps Ethernet Software Unix Unix X Windows X Windows Emacs Emacs TCP/IP TCP/IP Netscape Language C C C++ C++ Java Perl (a little) Hardware has changed dramatically; software is stagnant.
7 Where is the Innovation? 6 Microsoft, mostly. Exercise: Compare 1990 Microsoft software with If you claim that s not innovation, but copying, I reply that Java is to C++ as Windows is to the Macintosh: an industrial response to an interesting but technically flawed piece of systems software. If systems research was relevant, we d see new operating systems and new languages making inroads into the industry, the way we did in the 70s and 80s. Instead, we see a thriving software industry that largely ignores research, and a research community that writes papers rather than software.
8 Linux 7 Innovation? New? No, it s just another copy of the same old stuff. OLD stuff. Compare program development on Linux with Microsoft Visual Studio or one of the IBM Java/web toolkits. Linux s success may indeed be the single strongest argument for my thesis: The excitement generated by a clone of a decades-old operating system demonstrates the void that the systems software research community has failed to fill. Besides, Linux s cleverness is not in the software, but in the development model, hardly a triumph of academic CS (especially software engineering) by any measure.
9 What is Systems Research these days? 8 Web caches, web servers, file systems, network packet delays, all that stuff. Performance, peripherals, and applications, but not kernels or even user-level applications. Mostly, though, it s just a lot of measurement; a misinterpretation and misapplication of the scientific method. Too much phenomenology: invention has been replaced by observation. Today we see papers comparing interrupt latency on Linux vs. Windows. They may be interesting, they may even be relevant, but they aren t research. In a misguided attempt to seem scientific, there s too much measurement: performance minutiae and bad charts. By contrast, a new language or OS can make the machine feel different, give excitement, novelty. But today that s done by a cool web site or a higher CPU clock rate or some cute little device that should be a computer but isn t. The art is gone. But art is not science, and that s part of the point. Systems research cannot be just science; there must be engineering, design, and art.
10 What Happened? 9 A lot of things: PC Microsoft Web Standards Orthodoxy Change of scale Unix Linux Startups Grandma
11 PC 10 Hardware became cheap, and cheap hardware became good. Eventually, if it didn t run on a PC, it didn t matter because the average, mean, median, and mode computer was a PC. Even into the 1980s, much systems work revolved around new architectures (RISC, iapx/432, Lisp Machines). No more. A major source of interesting problems and, perhaps, interesting solutions is gone. Much systems work also revolved around making stuff work across architectures: portability. But when hardware s all the same, it s a non-issue. Plan 9 may be the most portable operating system in the world. We re about to do a new release, for the PC only. (For old time s sake, we ll include source for other architectures, but expect almost no one will use it.) And that s just the PC as hardware; as software, it s the same sort of story.
12 Microsoft 11 Enough has been said about this topic. (Although people will continue to say lots more.) Microsoft is an easy target, but it s a scapegoat, not the real source of difficulty. Details to follow.
13 Web 12 The web happened in the early 1990s and it surprised the computer science community as much as the commercial one. It then came to dominate much of the discussion, but not to much effect. Business controls it. (The web came from physicists and prospered in industry.) Bruce Lindsay of IBM: HDLC HTTP/HTML; 3270s have been replaced by web browsers. (Compare with Visicalc and PC.) Research has contributed little, despite a huge flow of papers on caches, proxies, server architectures, etc.
14 Standards 13 To be a viable computer system, one must honor a huge list of large, and often changing, standards: TCP/IP, HTTP, HTML, XML, CORBA, Unicode, POSIX, NFS, SMB, MIME, POP, IMAP, X,... A huge amount of work, but if you don t honor the standards you re marginalized. Estimate that 90-95% of the work in Plan 9 was directly or indirectly to honor externally imposed standards. At another level, instruction architectures, buses, etc. have the same influence. With so much externally imposed structure, there s little slop left for novelty. Plus, commercial companies that own standards, e.g. Microsoft, Cisco, deliberately make standards hard to comply with, to frustrate competition. Academia is a casualty.
15 Orthodoxy 14 Today s graduating PhDs use Unix, X, Emacs, and Tex. That s their world. It s often the only computing world they ve ever used for technical work. Twenty years ago, a student would have been exposed to a wide variety of operating systems, all with good and bad points. New employees in our lab now bring their world with them, or expect it to be there when they arrive. That s reasonable, but there was a time when joining a new lab was a chance to explore new ways of working. Narrowness of experience leads to narrowness of imagination. The situation with languages is a little better many curricula include exposure to functional languages, etc. but there is also a language orthodoxy: C++ and Java. In science, we reserve our highest honors for those who prove we were wrong. But in computer science...
16 Change of scale 15 With so many external constraints, and so many things already done, much of the interesting work requires effort on a large scale. Many person-years are required to write a modern, realistic system. That is beyond the scope of most university departments. Also, the time scale is long: from design to final version can be five years. Again, that s beyond the scope of most grad students. This means that industry tends to do the big, defining projects operating systems, infrastructure, etc. and small research groups must find smaller things to work on. Three trends result: 1. Don t build, measure. (Phenomenology, not new things.) 2. Don t go for breadth, go for depth. (Microspecialization, not systems work.) 3. Take an existing thing and tweak it. I believe this is the main explanation of the SOSP curve.
17 Unix 16 New operating systems today tend to be just ways of reimplementing Unix. If they have a novel architecture and some do the first thing to build is the Unix emulation layer. How can operating systems research be relevant when the resulting operating systems are all indistinguishable? There was a claim in the late 1970s and early 1980s that Unix had killed operating systems research because no one would try anything else. At the time, I didn t believe it. Today, I grudgingly accept that the claim may be true (Microsoft notwithstanding). A victim of its own success: portability led to ubiquity. That meant architecture didn t matter, so now there s only one. Linux is the hot new thing... but it s just another Unix.
18 Linux the Academic Microsoft Windows 17 The holy trinity: Linux, gcc, and Netscape. Of course, it s just another orthodoxy. These have become icons not because of what they are, but because of what they are not: Microsoft. But technically, they re not that hot. And Microsoft has been working hard, and I claim that on many (not all) dimensions, their corresponding products are superior technically. And they continue to improve. Linux may fall into the Macintosh trap: smug isolation leading to (near) obsolescence. Besides, systems research is doing little to advance the trinity.
19 Startups 18 Startups are the dominant competition for academia for ideas, funds, personnel, and students. (Others are Microsoft, big corporations, legions of free hackers, and the IETF.) In response, government-funded and especially corporate research is directed at very fast return on investment. This distorts the priorities: Research is bent towards what can make big money (IPO) in a year. Horizon is too short for long-term work. (There go infrastructure and the problems of scale.) Funding sources (government, industry) perceive the same pressures, so there is a vicious circle. The metric of merit is wrong. Stanford now encourages students to go to startups because successful CEOs give money to the campus. The new president of Stanford is a successful computer entrepreneur.
20 Grandma 19 Grandma s on line. This means that the industry is designing systems and services for ordinary people. The focus is on applications and devices, not on infrastructure and architecture, the domain of systems research. The cause is largely marketing, the result a proliferation of incompatible devices. You can t make money on software, only hardware, so design a niche gimmick, not a Big New Idea. Programmability once the Big Idea in computing has fallen by the wayside. Again, systems research loses out.
21 Things to Do 20 Startups are too focused on short time scale and practical results to try new things. Big corporations are too focused on existing priorities to try new things. Startups suck energy from research. But gold rushes leave ghost towns; be prepared to move in. Fiona s story: "Why do you use Plan 9?" Go back to thinking about and building systems. Narrowness is irrelevant; breadth is relevant: it s the essence of system. Work on how systems behave and work, not just how they compare. Concentrate on interfaces and architecture, not just engineering. Be courageous. Try different things; experiment. Try to give a cool demo. Funding bodies: fund more courageously, particularly longterm projects. Universities, in turn, should explore ways to let students contribute to long-term projects. Measure success by ideas, not just papers and money. Make the industry want your work.
22 Things to Build 21 There are lots of valid, useful, interesting things to do. I offer a small sample as evidence. If the field is moribund, it s not from a lack of possibilities. Only one GUI has ever been seriously tried, and its best ideas date from the 1970s. (In some ways, it s been getting worse; today the screen is covered with confusing little pictures.) Surely there are other possibilities. (Linux s interface isn t even as good as Windows!) There has been much talk about component architectures but only one true success: Unix pipes. It should be possible to build interactive and distributed applications from piece parts. The future is distributed computation, but the language community has done very little to address that possibility. The Web has dominated how systems present and use information: the model is forced interaction; the user must go get it. Let s go back to having the data come to the user instead. System administration remains a deeply difficult problem. Unglamorous, sure, but there s plenty of room to make a huge, even commercial, contribution.
23 Conclusions 22 The world has decided how it wants computers to be. The systems software research community influenced that decision somewhat, but very little, and now it is shut out of the discussion. It has reached the point where I doubt that a brilliant systems project would even be funded, and if funded, wouldn t find the bodies to do the work. The odds of success were always low; now they re essentially zero. The community universities, students, industry, funding bodies must change its priorities. The community must accept and explore unorthodox ideas. The community must separate research from market capitalization.
CS 147: Computer Systems Performance Analysis CS 147: Computer Systems Performance Analysis 1 / 39 Overview Overview Overview What is a Workload? Instruction Workloads Synthetic Workloads Exercisers and
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,
Five Phases The History of the Internet and World-Wide-Web Charles Severance Michigan State University Long Distance Networking 1966-1973 Network of Networks internet 1974-1985 internet becomes Internet
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
Computer Modelling & New Technologies, 2002, Volume 6, No.1, 62-68 Transport and Telecommunication Institute, Lomonosov Str.1, Riga, LV-1019, Latvia STATISTICS AND RELIABILITY PRODUCTIVITY ESTIMATION OF
Comparison of OS Level and Hypervisor Server Virtualization ABBAS ASOSHEH, MOHAMMAD HOSSEIN DANESH Information Technology Department Tarbiat Modares University & Amirkabir University of Technology Jalal
Virtualization Learning Objectives Explain how today s virtualization movement is actually a reinvention of the past. Explain how virtualization works. Discuss the technical challenges to virtualization.
Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of
CSC230 Getting Starting in C Tyler Bletsch What is C? The language of UNIX Procedural language (no classes) Low-level access to memory Easy to map to machine language Not much run-time stuff needed Surprisingly
CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational
VMware vsphere 5 Quick Start Guide This document is created to provide some basic information about VMware, and allow you, the customer, to determine when and how to engage us for support or other needs
Choosing the web s future Peter-Paul Koch http://quirksmode.org http://twitter.com/ppk Drupal Jam, 12 mei 2016 Opinion warning (throughout) Also: work in progress Four problems 1. Web developers want to
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get
Star System Apple Macintosh 1984 First commercial OS GUI Chapter 1 Introduction to Operating Systems Outline 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 Introduction What Is an Operating System?
CS 378: Computer Game Technology http://www.cs.utexas.edu/~fussell/courses/cs378/ Spring 2013 University of Texas at Austin CS 378 Game Technology Don Fussell Instructor and TAs! Instructor: Don Fussell!
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali firstname.lastname@example.org 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Ubuntu Linux Reza Ghaffaripour May 2008 Table of Contents What is Ubuntu... 3 How to get Ubuntu... 3 Ubuntu Features... 3 Linux Advantages... 4 Cost... 4 Security... 4 Choice... 4 Software... 4 Hardware...
THE CLOUD STORAGE ARGUMENT The argument over the right type of storage for data center applications is an ongoing battle. This argument gets amplified when discussing cloud architectures both private and
Massachusetts Institute of Technology Sloan School of Management System Dynamics II: Applications of System Dynamics Professor Jim Hines Guidelines for kickoff meeting and first breakout Group presentation:
CHAPTER 1 Evolution of the Data Center The need for consolidation in the data center didn't just occur overnight; we have been building up to it for a long time. In this chapter, we review the evolution
How to Perform Real-Time Processing on the Raspberry Pi Steven Doran SCALE 13X Outline What is Real-Time? What is the Raspberry Pi? Can the Raspberry Pi handle Real-Time (And why would you want to? Why
The Good, the Bad, and the Ugly: The Unix Legacy Rob Pike Bell Labs Lucent Technologies email@example.com labs.com Copenhagen Sept 8-9 2001 +1000000000s 1972 1 The number of UNIX installations has grown to
4 Jan, 2008 The Bus (PCI and PCI-Express) The CPU, memory, disks, and all the other devices in a computer have to be able to communicate and exchange data. The technology that connects them is called the
Copyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved. 1 In this special report, I ll be sharing with you the ten biggest mistakes that lawyers make when marketing their law
Microkernels, virtualization, exokernels Tutorial 1 CSC469 Monolithic kernel vs Microkernel Monolithic OS kernel Application VFS System call User mode What was the main idea? What were the problems? IPC,
Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15
Efficiency of Web Based SAX XML Distributed Processing R. Eggen Computer and Information Sciences Department University of North Florida Jacksonville, FL, USA A. Basic Computer and Information Sciences
Is Connectivity A Human Right? For almost ten years, Facebook has been on a mission to make the world more open and connected. For us, that means the entire world not just the richest, most developed countries.
10 Things Every Linux Programmer Should Know Linux Misconceptions in 30 Minutes Muli Ben-Yehuda firstname.lastname@example.org IBM Haifa Research Labs Linux Kernel Workshop, March 2004 p.1/14 TOC What this talk is about
What to base your Brand Portal on: SharePoint, custom build it or buy Brandworkz offthe shelf From time to time we hear variations on the following from potential clients: We already have Microsoft SharePoint
Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create
Technical Research Paper Performance tests with the Microsoft Internet Security and Acceleration (ISA) Server Author: Martin Eisermann Date: 2002-05-13 City: Bad Aibling, Germany Annotations: This research
The 5 P s in Problem Solving 1 How do other people solve problems? The 5 P s in Problem Solving *prob lem: a source of perplexity, distress, or vexation *solve: to find a solution, explanation, or answer
Design Issues in a Bare PC Web Server Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, and Gholam H. Khaksari Department of Computer & Information Sciences, Towson University, 78 York
4273?: a novel platform for bioinformatics education Gaining an understanding of bioinformatics is now par for the course when it comes to training undergraduate students in biology. However, facilitating
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
Internationalization and Web Services 25 th Internationalization and Unicode Conference Presented by Addison P. Phillips Director, Globalization Architecture webmethods, Inc. 25 th Internationalization
Virtual Routing: What s The Goal? And What s Beyond? Peter Christy, NetsEdge Research Group, August 2001 Virtual routing is a software design method used to provide multiple independent routers that share
CHAPTER 1 Before You Install In this chapter, we want to make sure that your computer (and you) is ready for the Red Hat Linux installation. Systems Requirements Red Hat Linux has a number of systems requirements
Parrot in a Nutshell Dan Sugalski email@example.com Parrot in a nutshell 1 What is Parrot The interpreter for perl 6 A multi-language virtual machine An April Fools joke gotten out of hand Parrot in a nutshell
is at the core of Primary Key Associates work Our approach to analytics In this paper Andrew Lea, our Technical Director in charge of, describes some of the paradigms, models, and techniques we have developed
12 January 2010 Virtualization Technologies Alex Landau (firstname.lastname@example.org) IBM Haifa Research Lab What is virtualization? Virtualization is way to run multiple operating systems and user applications on
The Best of Both Worlds Sharing Mac Files on Windows Servers March, 2008 1110 North Glebe Road Suite 450 Arlington, VA 22201 phone: 800.476.8781 or +1.703.528.1555 fax: +1.703.527.2567 or +1.703.528.3296
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
ADDENDUM #1 TO RFP #15-574655-cs Enterprise Secure Internet Content Filter Solution and Implementation DATE OF RELEASE OF ADDENDUM #1: 7/14/15 QUESTION 1: Please let us know how much traffic is going through
The Epic Data toolkit for developing pervasive applications. Connect Here. Go Anywhere. Wireless Solutions for Supply Chain Integration. Copyright 2000 Epic Data International, Inc. All rights reserved.
SERVER CLUSTERING TECHNOLOGY & CONCEPT M00383937, Computer Network, Middlesex University, E mail: email@example.com Abstract Server Cluster is one of the clustering technologies; it is use for
WHITEPAPER Author: Stuart James Cloud: It s not a nebulous concept Challenging and removing the complexities of truly understanding Cloud Removing the complexities to truly understand Cloud Author: Stuart
Building an Infrastructure for Synchronous and Asynchronous Video Streaming Degree Programs Stuart B. Gordon Multimedia Production Manager Norfolk, Virginia U.S.A. Copyright Stuart B. Gordon 2002. This
Stock Market Barometer The Most Influential Financial Newsletter Read By Over 500 Hedge Fund Managers and Thousands of Elite Investors ~ August 5, 2012 Investing in the Bottoming Process Mike Swanson Quote
Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among
Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
Resource Monitoring During Performance Testing Experience Report by Johann du Plessis Introduction During a recent review of performance testing projects I completed over the past 8 years, one of the goals
Critical analysis Be more critical! More analysis needed! That s what my tutors say about my essays. I m not really sure what they mean. I thought I had written a really good assignment this time. I did
Operating System Components and Services Tom Kelliher, CS 311 Feb. 6, 2012 Announcements: From last time: 1. System architecture issues. 2. I/O programming. 3. Memory hierarchy. 4. Hardware protection.
Computer Information & Recommendations Files stored in your "S" drive can be accessed from home ( Detailed instructions at the end of this document ): Type \\soet students.main.ad.rit.edu\students\(ritusername)
by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the
Risks with web programming technologies Steve Branigan Lucent Technologies Risks with web programming technologies Abstract Java applets and their kind are bringing new life to the World Wide Web. Through
How$Spotify$builds$products$ Henrik Kniberg Version 1.1 2013-01-18 Product development isn t easy. In fact, most product development efforts fail, and the most common reason for failure is building the
The Small Business Guide to Cloud Computing PRESENTED BY You ve undoubtedly heard the term cloud computing being used over the past couple of years, and you may be wondering what all of the buzz is about.
Slide 3-1 Operating System Organization Purpose of an OS Slide 3-2 es Coordinate Use of the Abstractions he Abstractions Create the Abstractions 1 OS Requirements Slide 3-3 Provide resource abstractions
res Software // Whitepaper The Importance of User Workspace Virtualization in Desktop Virtualization Whitepaper Transforming Desktops into Workspaces 2 Table of content: Abstract... 3 What is desktop virtualization?...4
Monitoring Databases on VMware Ensure Optimum Performance with the Correct Metrics By Dean Richards, Manager, Sales Engineering Confio Software 4772 Walnut Street, Suite 100 Boulder, CO 80301 www.confio.com
Efficiency Considerations of PERL and Python in Distributed Processing Roger Eggen (presenter) Computer and Information Sciences University of North Florida Jacksonville, FL 32224 firstname.lastname@example.org 904.620.1326
Relative and Absolute Change Percentages Ethan D. Bolker Maura M. Mast September 6, 2007 Plan Use the credit card solicitation data to address the question of measuring change. Subtraction comes naturally.
SETTING UP AN INSTANT MESSAGING SERVER I recently upgraded a Charlotte company from an NT 4 domain to Small Business 2003. While the employees seemed excited about the Exchange server, Outlook Web Access,
Network Neutrality and the IETF Mark Handley Why should the IETF care about Network Neutrality? An economic and legal issue. IETF doesn t do this well. Both sides of the debate present here. IETF can t
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Chapter 1: Operating System Models 1 2 Operating System Models 2.1 Introduction Over the past several years, a number of trends affecting operating system design are witnessed and foremost among them is
Asset Management With What All It s Worth, Why Don t You Have It? This document identifies four reasons why companies do not invest in asset management products, or why, if they have bought into one, they
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day email@example.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Blogger Tutorial While there are many, many blogging applications out there, I think that the easiest by far is Blogger. I personally use Blogger, in some form, for the 4 blogs that I currently run. Even
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
1of 6 An Informational Paper Integrating an Optical Archive System ~ Appliance Solution vs. Software Solution Once the decision has been made to utilize optical storage technology to meet today s stringent
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Club Accounts. 2011 Question 6. Anyone familiar with Farm Accounts or Service Firms (notes for both topics are back on the webpage you found this on), will have no trouble with Club Accounts. Essentially