165,927 research outputs found

    Video game performance analysis on selected operating systems

    Get PDF
    The video game industry is currently one of the most dominant in IT. Unfortunately, developers rarely focus on maintaining older games, which often leads to the inability to launch them on newer systems. The aim of the paper is the video game performance analysis on selected operating systems. The analysis was performed on the first three installments of The Sims series, published in the first decade of the 21st century, on a computer with Windows XP as the operating system and another with Windows 10 as the operating system. For the performance analysis three hardware monitoring programs were used: Open Hardware Monitor, MSI Afterburner and Windows Performance Monitor. In addition, all tested games were compared visually in order to determine whether their appearance and available graphic options are the same on both systems. Results analysis have shown, that despite lower system load in all games on the computer with Windows 10 there are some graphical anomalies not present on the older operating system

    Malware Static Analysis on Microsoft Macro Attack

    Get PDF
    In the 21st century, technology is increasing rapidly, the increase in technology is the potential for cyber attacks on today's technological infrastructure. Malware that is designed to damage computer systems without the owner's knowledge at a considerable cost becomes a cyber crime. This macro malware analysis is to study the code and behavior of malware when run on an operating system. To analyze this malware, this study uses a static analysis method by analyzing malware without running the program

    Leveraging Monopoly Power by Degrading Interoperability: Theory and Evidence from Computer Markets

    Get PDF
    When will a monopolist have incentives to foreclose a complementary market by degrading compatibility/interoperability of his products with those of rivals? We develop a framework where leveraging extracts more rents from the monopoly market by “restoring” second degree price discrimination. In a random coefficient model with complements we derive a policy test for when incentives to reduce rival quality will hold. Our application is to Microsoft’s strategic incentives to leverage market power from personal computer to server operating systems. We estimate a structural random coefficients demand system which allows for complements (PCs and servers). Our estimates suggest that there were incentives to reduce interoperability which were particularly strong at the turn of the 21st Century.

    Leveraging Monopoly Power by Degrading Interoperability: Theory and Evidence from Computer Markets

    Get PDF
    When will a monopolist have incentives to leverage her/his market power in a primary market to foreclose competition in a complementary market by degrading compatibility/interoperability of her/his products with those of her/his rivals? We develop a framework where leveraging extracts more rents from the monopoly market by ‘restoring’ second‐degree price discrimination. In a random coefficient model with complements, we derive a policy test for when incentives to reduce rival quality will hold. Our application is to Microsoft's alleged strategic incentives to leverage market power from personal computer to server operating systems. We estimate a structural random coefficients demand system that allows for complements (personal computers and servers). Our estimates suggest that there were incentives to reduce interoperability that were particularly strong at the turn of the 21st century

    Leveraging monopoly power by degrading interoperability: theory and evidence from computer markets

    Get PDF
    When will a monopolist have incentives to leverage his market power in a primary market to foreclose competition in a complementary market by degrading compatibility/interoperability of his products with those of her rivals? We develop a framework where leveraging extracts more rents from the monopoly market by .restoring. second degree price discrimination. In a random coefficient model with complements we derive a policy test for when incentives to reduce rival quality will hold. Our application is to Microsoft’s alleged strategic incentives to leverage market power from personal computer to server operating systems. We estimate a structural random coefficients demand system which allows for complements (PCs and servers). Our estimates suggest that there were incentives to reduce interoperability which were particularly strong at the turn of the 21st Century

    Bringing IoT to the Lab : SiLA2 and Open-Source-Powered Gateway Module for Integrating Legacy Devices into the Digital Laboratory

    Get PDF
    In this article a gateway module to integrate legacy laboratory devices into the network of the digital laboratory in the 21st century is introduced. The device is based on ready to buy consumer hardware that is easy to get and inexpensive. Depending on the specific requirements of the desired application (bare embedded computer, RS232 serial port connector, IP65 certified casing and connectors) the needed investment ranges from about 95 € up to 200 €. The embedded computer runs an open source Linux operating system and can in principle be used to run any kind of software needed for communicating with the laboratory device. Here the open source SiLA2 standard is used for presenting the device’s functions in the network. As an example the digital integration of a magnetic stirrer is shown and can be used as a template for other applications. A method for easy remote integration of the device to ensure an easy and consistent workflow in development, testing and usage is also presented. This incorporates a method for remote installation of SiLA2 servers on the box as well as a web frontend for administration, debugging and management of those

    The development of computer science research in the People's Republic of China 2000-2009: A bibliometric study

    No full text
    This paper reports a bibliometric study of the development of computer science research in the People's Republic of China in the 21st century, using data from the Web of Science, Journal Citation Reports and CORE databases. Focusing on the areas of data mining, operating systems and web design, it is shown that whilst the productivity of Chinese research has risen dramatically over the period under review, its impact is still low when compared with established scientific nations such as the USA, the UK and Japan. The publication and citation data for China are compared with corresponding data for the other three BRIC nations (Brazil, Russian and India). It is shown that China dominates the BRIC nations in terms of both publications and citations, but that Indian publications often have a greater individual impact. © The Author(s) 2012

    Count three for wear able computers

    Get PDF
    This paper is a postprint of a paper submitted to and accepted for publication in the Proceedings of the IEE Eurowearable 2003 Conference, and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library. A revised version of this paper was also published in Electronics Systems and Software, also subject to Institution of Engineering and Technology Copyright. The copy of record is also available at the IET Digital Library.A description of 'ubiquitous computer' is presented. Ubiquitous computers imply portable computers embedded into everyday objects, which would replace personal computers. Ubiquitous computers can be mapped into a three-tier scheme, differentiated by processor performance and flexibility of function. The power consumption of mobile devices is one of the most important design considerations. The size of a wearable system is often a design limitation

    Current screens

    No full text
    The architecture of screen design, including LCD, LED and DLP projection, is analysed in terms of the political economy and their aesthetics and phenomenological impacts, in association with the use of codecs as constraining as well as enabling tools in the control and management of visual data transmission
    • 

    corecore