Найденные страницы с тегом knuth-morris-pratt string-searching algorithm всего 178348

San Francisco hunts for mystery device on city network | Network World

With costs related to a rogue network administrator's hijacking of the city's network now estimated at $1 million, city officials say they are searching for a mysterious networking device hidden somewhere on the network.

Microsoft offers credits for ‘Leap Day’ Azure outage | Network World

To make up for a string of outages that were caused by a software bug in its Azure cloud services Microsoft is granting affected customers a 33% credit for the time they were left stranded during the Feb. 29 failure.

Firefox plug-in takes address book up a notch | Network World

Sxip, which develops the free single sign-on plug-in for Firefox called Sxipper, is working to revolutionize the use of address books by helping Web surfers link their contacts to information they are searching for on the Web.

AES proved vulnerable by Microsoft researchers | Network World

Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications.

TSMC chairman predicts tough victory over GlobalFoundries | Network World

Taiwan Semiconductor Manufacturing (TSMC) Chairman Morris Chang predicted a long fight and ultimate victory against new contract chip rival GlobalFoundries, a joint venture between AMD and an investment fund from Abu Dhabi.

Motorola to lay off 800 more workers | Network World

Motorola Mobility will lay off 800 people, the latest in a string of worker reductions at the handset maker, as it prepares to become part of Google.

Computer incident detection, response and forensics | Network World

2008 is a special year for the digital security community. Twenty years have passed since the Morris Worm brought computer security to the attention of the wider public, followed by the formation of the Computer Emergency Team/Coordination Center (CERT/CC) to help organizations detect, prevent and respond to security incidents. Ten years have passed since members of the L0pht security research group told Congress they could disable the Internet in 30 minutes. Five years have passed since the SQL Slammer wo

Adobe admits new PDF password protection is weaker | Network World

Adobe made a critical change to the algorithm used to password-protect PDF documents in Acrobat 9, making it much easier to recover a password and raising concern over the safety of documents, according to Russian security firm Elcomsoft.

Tagging, no longer fun and easy | Network World

Most people think that tagging on the Web is pretty easy and fun. Give 'em a blog or a Web page and a field named "tags," and they'll start stuffing in text with wild abandon in the hopes that their content will be easily found by people who are desperately searching for information and opinion on feline hairball cures or cycling in the Ozarks or whatever their particular hobby is. Alas, all these folks are doing is polluting the Web.

Management tools reviewed, AT&T teams with Microsoft, and more | Network World

RSA '07: Cisco's transformation still work in progress, 02/06/07 Cisco used the RSA Security Conference in San Francisco to trumpet its transformation from "packet pusher" to "infrastructure" company, unveiling a string of product updates that unify its diverse security portfolio on Monday.

Samsung eases search for movies, shows on TVs, mobile devices | Network World

Samsung has announced a new service that will make searching for movies and shows easier on TV, smartphones and tablets.

How phishers succeed by using numeric IP addressing | Network World

Last week we discussed “ping” and “tracert” and how the usefulness of these commands has been diminished because they could be exploited for illegitimate purposes. We ended by talking about how “ping” could still be useful for determining IP addresses as a first level of diagnostics in some cases, for checking on the status of a Web site. Nevertheless, we only wrote about the direct use of an IP address in a URL as http://[the_IP_address] instead of substituting the string of numbers.

Fear driving retailers to adopt security controls | Network World

The massive data breach at The TJX Companies made public earlier this year -- and a string of similar smaller breaches at various other firms since then -- appears to be goading merchants to accelerate their adoption of the Payment Card Industry (PCI) data security standard.

The presidential portrait goes digital | Network World

Barack Obama's election to U.S. president has already brought a string of firsts, and on Wednesday there came another. The official presidential portrait was shot on a digital camera for the first time.

Softbank driven by investments, acquisitions | Network World

In 2001, Nippon Telegraph and Telephone, Japan's dominant telecom provider, got a shock. It had just started DSL broadband Internet service and was taking its first steps toward reaping the benefits of an ambitious and costly plan to string fiber-optic cable along every street in the country when along came Softbank.

Identity management education opportunities | Network World

A three-day Identity Mashup Conference took place last week hosted by the Berkman Center for Internet and Society at Harvard Law School. This was another in a long string of individual, or as it's being called "user-centric" identity meetings this year.

Why is it so hard to compare training providers? | Network World

Is there an independent company that provides ratings of training providers – a sort of Consumer Reports of the IT training industry? That was a question that I recently received from a reader who is an IT manager with a construction company. I thought it would be an easy enough question to answer but after asking a number of training providers and a recruiter, I couldn’t pinpoint a company that provided just that. Even the reader couldn’t find anything after a couple of hours searching the Web.

How safe are your files from government inspection? | Network World

The U.S. government believes it can freely search the contents of your laptop or other mobile device upon entering the United States, since it views this practice as conceptually identical to searching your luggage at the airport, which it can do without any sort of probable cause. A federal appeals court agrees with the government’s position and few judges seem to disagree with the practice. The good that comes from this practice is that child pornographers can be thwarted, but the quite serious downsid

Consortium releases authentication algorithm | Network World

Businesses have to facilitate sharing of data over the network, while preventing theft or unauthorized access of that data in an increasingly hostile environment. Organizations must be able to establish the identity of the remote entity with a high degree of certainty. The Initiative for Open Authentication (OATH) is developing technology to enable strong authentication of all users on all devices, across all networks, such as its algorithm for one-time passwords.

Salesforce.com – A ‘don’t worry, be happy’ attitude is no substitute for an SLA | Network World

Salesforce.com is the leading on-demand CRM tool, providing all the benefits of a Web based application and a great user interface. The user interface has been based on the popular and effective Miller-Heiman sales model since 2002. However, a string of outages in December, January and again in March show that the company is struggling under the weight of its own success.

Algorithm predicts Celtics will beat Lakers in NBA Finals | Network World

A points analysis metric developed by NBA statisticians and Lenovo engineers predicts that the Boston Celtics will beat the Los Angeles Lakers in the NBA Finals based on the statistical superior play of Boston's five top players when they have shared the court in the playoffs. The Finals started Thursday night, with Boston winning the first game, 98-88.

RSA ’07: Cisco’s transformation still work in progress | Network World

Cisco used the RSA Security Conference in San Francisco to trumpet its transformation from "packet pusher" to "infrastructure" company, unveiling a string of product updates that unify its diverse security portfolio on Monday.

NIST announces competition for new cryptographic hash algorithm | Network World

The National Institute of Standards and Technology today announced a public competition to pick a new cryptographic hash algorithm that would become the new federal information processing standard. This evaluation process is expected to run a minimum of three years.

Chat app Line releases safety guide for girl teens after string of incidents | Network World

Line, the chat app that is exploding in popularity in Japan and other Asian countries, has published an online safety guide for teens after a string of incidents in which it was used to maliciously target young women.

Take care of your tapes and they will take care of you (and your job) | Network World

Last week's rant about tracking off-site tapes kicked off a string of e-mails from several of you. John, Indiana's resident Storage Wise Guy, has dealt with this issue for years, and offers a simple guideline: