Rabu, 11 Februari 2009

Benjamin Sisko

[edit] Early life and career
Born in 2332 in New Orleans, Benjamin is the son of Joseph Sisko, the chef and owner of the restaurant "Sisko's Creole Kitchen", "Sisko's" for short. His birth mother was a human woman named Sarah. However, Sarah was actually possessed by one of the Bajoran Prophets (the lifeforms that exist inside the Bajoran wormhole), who manipulated her into marrying Joseph and conceiving Benjamin. Sarah and Joseph were happily married until Sarah disappeared two days after Ben's first birthday, when the lifeform left her body. She died in an accident several years later.
Joseph eventually met and married another woman who went on to raise Benjamin as her own son. Benjamin remained unaware of these events until well into his adulthood and long after he had otherwise made contact with the Bajoran Prophets.[1] Ben has a sister named Judith and at least two brothers.
Sisko entered Starfleet Academy in 2350. During his sophomore year, he was in a field-study assignment on Starbase 137. He met a woman named Jennifer in Babylon, New York on Gilgo Beach, shortly after graduating from the Academy. The two eventually wed and had a son, Jake.[2]
As a Starfleet officer coming up through the ranks, Sisko was mentored by Curzon Dax, a joined Trill serving as Federation ambassador to the Klingon Empire, when the two were stationed aboard the USS Livingston early in Sisko's career. The symbiotic nature of the joined Trill becomes a significant aspect to Sisko's later relationships with his DS9 science officer Jadzia Dax, who inherited the Dax symbiont from Curzon, and DS9 counselor Ezri Dax, who inherits Dax upon Jadzia's untimely death.
Sisko served aboard the USS Okinawa under Captain Leyton, who saw command potential in the young officer. Leyton promoted Sisko to lieutenant commander and made him his executive officer. It was during this assignment that Sisko and Leyton fought in the war between the Federation and the Tzenkethi.[3]
Sisko eventually transferred to the USS Saratoga as its first officer. In early 2367, the Saratoga was one of the Starfleet vessels involved in the Battle of Wolf 359 against the Borg. Locutus, a Borg drone created from the assimilation of Captain Jean-Luc Picard, uses Picard's knowledge of Starfleet tactics to annihilate the Starfleet force; Jennifer Sisko is among the 11,000 casualties.[4]
Afterward, Sisko took a position at the Utopia Planitia Fleet Yards on Mars, overseeing the development of new ships, including the USS Defiant, which was created specifically to contend with the Borg threat.[5]

Debis Systemhaus GmbH, Telekomunikation Services and Cisco Work Together to Offer End-to-End Networking Solutions

With a Cisco Powered Network, Debis Systemhaus offers customers reliable, secure and high-performance Internet services. The relationship highlights Debis Systemhaus' and Cisco's focus on using intelligent broadband IP networking to deliver enhanced connectivity and network-based applications.
"Cisco shares our vision that the IP network is the foundation for delivering intelligent business solutions, providing our customers with strategic competitive advantages," said Dr. Ansgar Grndler, Sales & Marketing Manager of Debis Systemhaus. "By working with a leader such as Cisco, we can bring advanced, differentiated networking solutions to market quickly."
Internet Access, Intranets and Extranets, Corporate Networks, Frame Relay, ATM, Campus Services and Voice Services can be provided by Debis Systemhaus using the internetworking industry's de-facto standard operating platform Cisco IOS. software. They also have AS-Services, Stratacom products including the IGX. 8410 and 8420 and the Catalyst 5000 products from the Cisco Catalyst. family in their network.
"Cisco's high-performance, reliable networking solutions enable service providers to offer consistent services," said Peter Lomas, vice president of Cisco's Service Provider Line of Business in Europe, Middle East & Africa. "Debis Systemhaus' relationship with Cisco will enable Debis Systemhaus customers to be confident that their service provider will deliver a high level of network interoperability and performance, as well as new, advanced, and differentiated services."
In the Cisco Powered Network Program, Debis Systemhaus will provide services based predominantly on Cisco equipment and software. Debis Systemhaus' participation in the program - including use of the Cisco Powered Network logo to brand its services and marketing support materials - demonstrates Debis Systemhaus' ability to provide innovative services and industry-leading technology solutions.
About Debis Systemhaus GmbHDebis Systemhaus is a manufacturer- and carrier independent provider of information and technology services. They help their customers concentrate on developing their core competencies. Debis Systemhaus' multinational services spectrum ranges from operating computer centers, decentralized systems and networks to the provision of desktop services, software maintenance and redundancy systems. As a full service provider, they combine applications, computers and networks into business solutions that draw on advanced information and communications technologies to ensure optimum support for all the business processes required by their customers. Their product-lines include Managed Network Services, Value-Added Services, Campus Services, Internet Services and Telecommunication Consulting.

[edit] What is Software Security Assurance

Software Security Assurance (SSA) is the process of ensuring that software is designed to operate at a level of security that is consistent with the potential harm that could result from the loss, inaccuracy, alteration, unavailability, or misuse of the data and resources that it uses, controls, and protects.
The Software Security Assurance process begins by identifying and categorizing the information that is to be contained in, or used by, the software. The information should be categorized according to its sensitivity. For example, in the lowest category, the impact of a security violation is minimal (i.e. the impact on the software owner's mission, functions, or reputation is negligible). For a top category, however, the impact may pose a threat to human life; may have an irreparable impact on software owner's missions, functions, image, or reputation; or may result in the loss of significant assets or resources.
Once the information is categorized, security requirements can be developed. The security requirements should address access control, including network access and physical access; data management and data access; environmental controls (power, air conditioning, etc.) and off-line storage; human resource security; and audit trails and usage records. kabseung.

[edit] What Causes Software Security Problems?
All security vulnerabilities in software are the result of Security bugs, or defects, within the software. In most cases, these defects are created by two primary causes:
Non-conformance, or a failure to satisfy requirements
An error or omission in the software requirements

[edit] Non-conformance, or Failure to Satisfy Requirements
A non-conformance may be simple; the most common is a coding error or defect, or more complex (i.e., a subtle timing error or input validation error). The important point about non-conformances is that verification and validation techniques are designed to detect them and security assurance techniques are designed to prevent them. Improvements in these methods through a software security assurance program can improve the security of software.

[edit] Errors or Omissions in Requirements
The most serious security problems with software-based systems are those that develop when the software requirements are incorrect, inappropriate, or incomplete for the system situation. Unfortunately, errors or omissions in requirements are more difficult to identify. For example, the software may perform exactly as required, but the requirements do not correctly deal with some system state. When the system enters the undefined state, unexpected and undesirable behavior may result. This type of problem cannot be handled within the software discipline; it results from a failure of the system and software engineering processes which developed and allocated the system requirements to the software.

Senin, 09 Februari 2009

Google Software Goes Offline

Google Software Goes Offline

1 comments

offline gmail.jpgWhile companies like Microsoft, Adobe and Apple have been evolving their desktop software so that it can extend onto the web, Google has been striving to make it’s web-based software available when a user doesn’t have web access. Users have been able to sync their Google Docs software for a while now - allowing their wordprocessing, spreadsheet and presentation software to be used offline through a browser. Now Google have announced that their popular email system can be used offline too. Like desktop software, users can access the latest sync of their emails through a browser, work on them and then schedule them to be sent when the user next logs online.

A recent post on the Gmail blog says:

Today we’re starting to roll out an experimental feature in Gmail Labs that should help fill in those gaps: offline Gmail. So even if you’re offline, you can open your web browser, go to gmail.com, and get to your mail just like you’re used to.

Once you turn on this feature, Gmail uses Gears to download a local cache of your mail. As long as you’re connected to the network, that cache is synchronized with Gmail’s servers. When you lose your connection, Gmail automatically switches to offline mode, and uses the data stored on your computer’s hard drive instead of the information sent across the network. You can read messages, star and label them, and do all of the things you’re used to doing while reading your webmail online. Any messages you send while offline will be placed in your outbox and automatically sent the next time Gmail detects a connection. And if you’re on an unreliable or slow connection (like when you’re “borrowing” your neighbor’s wireless), you can choose to use “flaky connection mode,” which is somewhere in between: it uses the local cache as if you were disconnected, but still synchronizes your mail with the server in the background. Our goal is to provide nearly the same browser-based Gmail experience whether you’re using the data cached on your computer or talking directly to the server.



Computer software

Software" redirects here. For other uses, see Software (disambiguation).

Computer software, or just software is a general term used to describe a collection of computer programs, procedures and documentation that perform some tasks on a computer system.[1]

The term includes:

Software includes websites, programs, video games etc. that are coded by programming languages like C, C++, etc.

"Software" is sometimes used in a broader context to mean anything which is not hardware but which is used with hardware, such as film, tapes and records.[2]