cxcv: acm*

5 bookmark(s) - Sort by: Date ↑ / Title / - Bookmarks from other users for this tag

  1. I cannot link directly because their html ist totally broken.
  2. The experience of the Lawrence Berkeley Laboratory in tracking an intruder suggests that any operating system is insecure when obvious security rules are ignored. How a site should respond to an intrusion, whether it is possible to trace an intruder trying to evade detection, what can be learned from tracking an intruder, what methods the intruder used, and the responsiveness of the law-enforcement community are also discussed.
  3. Vortragsabend der GI/ACM-Regionalgruppe Karlsruhe
  4. As part of implementing the many products and services offered by Google, we have built a collection of systems and tools that simplify the storing and processing of large-scale data sets, and the construction of heavily-used public services based on these data sets. These systems are intended to work well in Google's computational environment, which consists of large numbers of commodity machines connected by commodity networking hardware. Our systems handle issues like storage reliability and availability in the face of machine failures, and our processing tools make it relatively easy to write robust computations that run reliably and efficiently on thousands of machines. In this talk I'll highlight some of the systems we have built, and discuss some challenges and future directions for new systems.

Top of the page

First / Previous / Next / Last / Page 1 of 1 Bookmarks: Tags: acm

About - Propulsed by SemanticScuttle