10,617 research outputs found
Spartan Daily, November 6, 1989
Volume 93, Issue 45https://scholarworks.sjsu.edu/spartandaily/7905/thumbnail.jp
Spartan Daily, March 31, 1987
Volume 88, Issue 44https://scholarworks.sjsu.edu/spartandaily/7570/thumbnail.jp
Spartan Daily, March 8, 1991
Volume 96, Issue 28https://scholarworks.sjsu.edu/spartandaily/8096/thumbnail.jp
Recommended from our members
Semantic technologies to support the user-centric analysis of activity data
There is currently a trend in giving access to users of on-line services to their own data. In this paper, we consider in particular the data which is generated from the interaction between a user and an organisation online: activity data as held in websites and Web applications logs. We show how we use semantic technologies including RDF integration of log data, SPARQL and lightweight ontology reasoning to aggregate, integrate and analyse activity data from a user-centric point of view
FSOS: a tool for recommending suitable operating systems to computer users
© 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Operating system is essential to operate computers. Normally, computers come with preloaded operating systems. However, often the preloaded operating systems are not able to fulfill all requirements of users. The users sometimes need to change the operating system based on their needs. Although some comparative studies and tools are available on operating systems, there is still a lack of tools that provide independent and objective review and recommendation to help the users understand and select from all major operating systems. This paper propose a tool called FSOS, which analyses well-known operating systems used at domestic, commercial and industrial level and suggest suitable operating systems to the users as per their requirements
Recommended from our members
CamGrid: Experiences in constructing a university-wide, Condor-based grid at the University of Cambridge
Proceedings of the 2004 UK e-Science All Hands Meeting, 31st August - 3rd September, Nottingham UKIn this article we describe recent work done in building a university-wide grid at the University of Cambridge based on the Condor middleware [1]. Once the issues of stakeholder concerns (e.g.
security policies) and technical problems (e.g. firewalls and private IP addresses) have been taken into account, a solution based on two separate Condor environments was decided on. The first of these is a single large pool administered centrally by the University Computing Service (UCS) and
the second a federated service of flocked Condor pools belonging to various departments and run over a Virtual Private Network (VPN). We report on the current status of this ongoing work
An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh
The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budget constraints that limit their access to computer hardware. Currently, Macintosh computer systems are marketed with the ability to accommodate these three common operating system environments, including Windows XP in native and virtual environments. We performed a series of experiments to measure the functionality and performance of the two most commonly used Windows-based computer forensics applications on a Macintosh running Windows XP in native mode and in two virtual environments relative to a similarly configured Dell personal computer. The research results are directly beneficial to practitioners, and the process illustrates effective pedagogy whereby students were engaged in applied research
Spartan Daily, April 25, 1990
Volume 94, Issue 57https://scholarworks.sjsu.edu/spartandaily/7987/thumbnail.jp
On web user tracking of browsing patterns for personalised advertising
This is an Accepted Manuscript of an article published by Taylor & Francis in International Journal of Parallel, Emergent and Distributed Systems on 19/02/2017, available online: http://www.tandfonline.com/doi/abs/10.1080/17445760.2017.1282480On today’s Web, users trade access to their private data for content and services. App and service providers want to know everything they can about their users, in order to improve their product experience. Also, advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users’ actions and tastes to suggest a range of products to buy. Both service providers and advertisers try to track users’ behaviour across their product network. For application providers this means tracking users’ actions within their platform. For third-party services following users, means being able to track them across different websites and applications. It is well known how, while surfing the Web, users leave traces regarding their identity in the form of activity patterns and unstructured data. These data constitute what is called the user’s online footprint. We analyse how advertising networks build and collect users footprints and how the suggested advertising reacts to changes in the user behaviour.Peer ReviewedPostprint (author's final draft
Testing Memory Forensics Tools for the Macintosh OS X Operating System
Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cyberattacks that leave little or no evidence in secondary storage. The forensic community has developed tools to acquire physical memory from Apple’s Macintosh computers, but they have not much been tested. This work tested three major OS X memory-acquisition tools. Although the tools could capture system memory accurately, the open-source tool OSXPmem appeared advantageous in size, reliability, and support for memory configurations and versions of the OS X operating system
- …