scholarly journals USE OF THE LINUX OPERATING SYSTEM AUDIT SYSTEM WHEN CONDUCTING CERTIFICATION TESTS OF SOFTWARE PRODUCTS

Author(s):  
V. V. Samarov ◽  
◽  
Author(s):  
Kevin Brock

The increasing prominence and variety of open source software (OSS) threaten to upset conventional approaches to software development and marketing. While a tremendous amount of scholarship has been published on the differences between proprietary and OSS development, little has been discussed regarding the effect of rhetorical appeals used to promote either type of software. This chapter offers just such an examination, focusing its scrutiny on the websites for three pairs of competitors (operating system, Web browser, and image manipulation program). The means by which the OSS websites promote their programs provide a significant set of insights into the potential trajectory of OSS development and its widespread public acceptance, in terms of both its initial philosophy and its perceived alternative nature to traditional software products and models.


2021 ◽  
Vol 2134 (1) ◽  
pp. 012012
Author(s):  
Gcinizwe Dlamini ◽  
Artem Kruglov ◽  
Xavier Vasquez ◽  
Vyacheslav Pavlov

Abstract The recent trends in the ICT industry are related to the development and implementation of green software products and practices. The way to seek for energy efcient solutions starts from the proper and precise assessment of the current state of the system in hand. In this paper we present the software-based approach to the energy efciency assessment. We propose machine learning based approach to estimate energy consumed by a computer system. We evaluated our approach on datasets extracted from systems running on Linux and Windows operating system. Using MSE, MAE and R2 our energy consumption estimation model reached 0.0007, 0.0104, 0.9214, respectively.


2021 ◽  
pp. 36-44
Author(s):  
Vitaly Varenitsa ◽  
◽  
Alexey Markov ◽  
Vladislav Savchenko ◽  
Valentin Tsirlov ◽  
...  

Purpose: analysis of various techniques and techniques for identifying defects and vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about the relevance and priority of the study of open-source web applications. The study is given and the shortcomings of directive methods for identifying vulnerabilities and undeclared capabilities in software products are shown. The author’s statistics of the identified vulnerabilities are given with detailing by classes of computer attacks, manufacturers of information security tools, programming environments and methods for identifying vulnerabilities. A comparative analysis of author’s methods with known directive testing methods is given. The relevance of the implementation of the concept of developing secure software is shown. Recommendations on improving the security of software tools for information protection are given.


Author(s):  
Kevin Brock

The increasing prominence and variety of open source software (OSS) threaten to upset conventional approaches to software development and marketing. While a tremendous amount of scholarship has been published on the differences between proprietary and OSS development, little has been discussed regarding the effect of rhetorical appeals used to promote either type of software. This chapter offers just such an examination, focusing its scrutiny on the websites for three pairs of competitors (operating system, Web browser, and image manipulation program). The means by which the OSS websites promote their programs provide a significant set of insights into the potential trajectory of OSS development and its widespread public acceptance, in terms of both its initial philosophy and its perceived alternative nature to traditional software products and models.


2013 ◽  
Vol 380-384 ◽  
pp. 2200-2203
Author(s):  
Hong Wang

Linux is a comparatively safe operating system. This paper makes a research about the security policy for Linux, analyzing the principle and design idea of its identification and authentication mechanism, access control mechanism, Capability mechanism and security audit system. In this paper, the disadvantages of Linux system are pointed out and an improvement program is indicated so that the security performance of this system can be more effectively strengthened.


Author(s):  
E. Wisse ◽  
A. Geerts ◽  
R.B. De Zanger

The slowscan and TV signal of the Philips SEM 505 and the signal of a TV camera attached to a Leitz fluorescent microscope, were digitized by the data acquisition processor of a Masscomp 5520S computer, which is based on a 16.7 MHz 68020 CPU with 10 Mb RAM memory, a graphics processor with two frame buffers for images with 8 bit / 256 grey values, a high definition (HD) monitor (910 × 1150), two hard disks (70 and 663 Mb) and a 60 Mb tape drive. The system is equipped with Imaging Technology video digitizing boards: analog I/O, an ALU, and two memory mapped frame buffers for TV images of the IP 512 series. The Masscomp computer has an ethernet connection to other computers, such as a Vax PDP 11/785, and a Sun 368i with a 327 Mb hard disk and a SCSI interface to an Exabyte 2.3 Gb helical scan tape drive. The operating system for these computers is based on different versions of Unix, such as RTU 4.1 (including NFS) on the acquisition computer, bsd 4.3 for the Vax, and Sun OS 4.0.1 for the Sun (with NFS).


2002 ◽  
Author(s):  
Jeremy D. Heider ◽  
Brad J. Sagarin ◽  
M. Anne Britt ◽  
Sarah E. Wood ◽  
Joel E. Lynch

2020 ◽  
Vol 158 (04) ◽  
pp. 345-350
Author(s):  
Christian Juhra ◽  
Jörg Ansorg ◽  
David Alexander Back ◽  
Dominik John ◽  
Andrea Kuckuck-Winkelmann ◽  
...  

AbstractNew communication technologies allow patients to communicate with their physicians from anywhere using computer or smartphone. Adding video to the mere phone call optimizes the personal contact between patient and physicians regardless of distance. Legal and reimbursements requirements must be taken into account, especially only certified software products must be used. In addition, patient consent is needed and confidentiality must be assured. The video patient consultation can be reimbursed by the health insurance companies. As with all new technologies, the introduction of these video consultations faced some challenges. Although patients and physicians have expressed great interest in this technology, it has been rarely used so far. The current COVID crisis increased the need for video consultations resulting in an increasing use of video patient consultation. It can be expected that this demand will still exists after the COVID crisis.


Sign in / Sign up

Export Citation Format

Share Document