scholarly journals ChaiTime: a system for rapid creation of portable next-generation telephony services using third-party software components

Author(s):  
F. Anjum ◽  
F. Caruso ◽  
R. Jain ◽  
P. Missier ◽  
A. Zordan
IEEE Software ◽  
1999 ◽  
Vol 16 (4) ◽  
pp. 55-57 ◽  
Author(s):  
W.T. Councill

2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Seth Carmody ◽  
Andrea Coravos ◽  
Ginny Fahs ◽  
Audra Hatch ◽  
Janine Medina ◽  
...  

AbstractAn exploited vulnerability in a single software component of healthcare technology can affect patient care. The risk of including third-party software components in healthcare technologies can be managed, in part, by leveraging a software bill of materials (SBOM). Analogous to an ingredients list on food packaging, an SBOM is a list of all included software components. SBOMs provide a transparency mechanism for securing software product supply chains by enabling faster identification and remediation of vulnerabilities, towards the goal of reducing the feasibility of attacks. SBOMs have the potential to benefit all supply chain stakeholders of medical technologies without significantly increasing software production costs. Increasing transparency unlocks and enables trustworthy, resilient, and safer healthcare technologies for all.


F1000Research ◽  
2015 ◽  
Vol 4 ◽  
pp. 50 ◽  
Author(s):  
Michael T. Wolfinger ◽  
Jörg Fallmann ◽  
Florian Eggenhofer ◽  
Fabian Amman

Recent achievements in next-generation sequencing (NGS) technologies lead to a high demand for reuseable software components to easily compile customized analysis workflows for big genomics data. We present ViennaNGS, an integrated collection of Perl modules focused on building efficient pipelines for NGS data processing. It comes with functionality for extracting and converting features from common NGS file formats, computation and evaluation of read mapping statistics, as well as normalization of RNA abundance. Moreover, ViennaNGS provides software components for identification and characterization of splice junctions from RNA-seq data, parsing and condensing sequence motif data, automated construction of Assembly and Track Hubs for the UCSC genome browser, as well as wrapper routines for a set of commonly used NGS command line tools.


F1000Research ◽  
2015 ◽  
Vol 4 ◽  
pp. 50 ◽  
Author(s):  
Michael T. Wolfinger ◽  
Jörg Fallmann ◽  
Florian Eggenhofer ◽  
Fabian Amman

Recent achievements in next-generation sequencing (NGS) technologies lead to a high demand for reuseable software components to easily compile customized analysis workflows for big genomics data. We present ViennaNGS, an integrated collection of Perl modules focused on building efficient pipelines for NGS data processing. It comes with functionality for extracting and converting features from common NGS file formats, computation and evaluation of read mapping statistics, as well as normalization of RNA abundance. Moreover, ViennaNGS provides software components for identification and characterization of splice junctions from RNA-seq data, parsing and condensing sequence motif data, automated construction of Assembly and Track Hubs for the UCSC genome browser, as well as wrapper routines for a set of commonly used NGS command line tools.


2006 ◽  
Author(s):  
Alexandre Alvaro ◽  
Silvio Lemos Meira

Component-based software development is becoming more generalized, representing a considerable market for the software industry. However, several technical issues remain unsolved before the software components industry reaches the maturity as other software industries. Problems such as component selection and the uncertain quality of third-party developed components bring new challenges to the software engineering community. In contrast, software component certification is still immature and much research is needed in order to create well-defined standards for certification. This paper introduces a component quality model, based upon consistent and well-defined quality characteristics, and describes a formal case study that was used in order to analyze the viability of the model usage.


1999 ◽  
Author(s):  
Louis A. Marchetti ◽  
Paul K. Wright

Abstract This paper reports the implementation of an open architecture controller on a 3-axis machining center. This new controller, called MOSAIC-PC, takes advantage of readily available, off the shelf components, and the flexibility and low cost of the personal computer. While commercial products have been used as the building blocks for MOSAIC-PC, the overall architecture is novel. Specifically, high level CAD curves and patches, such as NURBS, can be incorporated at the machine level and sensor based machining is integrated in real-time. A description of the hardware and software components is given and the ease of integrating third party components is described. Finally the functionality of MOSAIC-PC is demonstrated.


2020 ◽  
Vol 10 (11) ◽  
pp. 3770
Author(s):  
Hodong Kim ◽  
Hyundo Yoon ◽  
Youngjoo Shin ◽  
Junbeom Hur

Mail user agent (MUA) programs provide an integrated interface for email services. Many MUAs support email encryption functionality to ensure the confidentiality of emails. In practice, they encrypt the content of an email using email encryption standards such as OpenPGP or S/MIME, mostly implemented using GnuPG. Despite their widespread deployment, there has been insufficient research on their software structure and the security dependencies among the software components of MUA programs. In order to understand the security implications of the structures and analyze any possible vulnerabilities of MUA programs, we investigated a number of MUAs that support email encryption. As a result, we found severe vulnerabilities in a number of MUAs that allow cache side-channel attacks in virtualized desktop environments. Our analysis reveals that the root cause originates from the lack of verification and control over the third-party cryptographic libraries that they adopt. In order to demonstrate this, we implemented a cache side-channel attack on RSA in GnuPG and then conducted an evaluation of the vulnerability of 13 MUAs that support email encryption in Ubuntu 14.04, 16.04 and 18.04. Based on our experiment, we found that 10 of these MUA programs (representing approximately 77% of existing MUA programs) allow the installation of a vulnerable version of GnuPG, even when the latest version of GnuPG, which is secure against most cache side-channel attacks, is in use. In order to substantiate the importance of the vulnerability we discovered, we conducted a FLUSH+RELOAD attack on these MUA programs and demonstrated that the attack restored 92% of the bits of the 2048-bit RSA private key when the recipients read a single encrypted email.


2015 ◽  
pp. 1820-1834
Author(s):  
Tracy L. McPeck

This case study examines the user experience of six public library catalogs (OPACs) in terms of the next-generation characteristics identified by library literature. One open source Integrated Library System (ILS), Evergreen, was compared to one proprietary system, Polaris. One library used its respective ILS alone, while the other libraries' catalogs used a third-party discovery layer in conjunction with the ILS. The purpose of this study is to compare open source versus proprietary ILSs and discovery layers in terms of their next-generation characteristics with particular attention to electronic resources, namely e-books. Of the six libraries compared, the two libraries that used the proprietary add-on BiblioCommons featured the most advanced next-generation catalog characteristics. The two ILSs that did not use any added layers offered the fewest next-generation traits. The catalogs of public libraries vary greatly in their offerings, but add-ons, such as BiblioCommons, enhance the user experience and the retrievability of electronic resources.


Sign in / Sign up

Export Citation Format

Share Document