Works Cited

advertisement
Data Shredding, Updating the Status Bar, and More
Edited by Nancy Michell
QLast month
data formats
QLast month
data formats
you mentioned data shredding in a question about converting from relational
to XML. What exactly is data shredding and what do I need to know about it?
you mentioned data shredding in a question about converting from relational
to XML. What exactly is data shredding and what do I need to know about it?
AHere shredding refers to extracting relevant data out of hierarchical XML and putting it into
flat relational storage.
AHere shredding refers to extracting relevant data out of hierarchical XML and putting it into
flat relational storage.
Shredding is an open problem with many different solutions, but in general, the more
hierarchical the XML is (that is, the more deeply nested the data), the more joins are required
to turn the flat, shredded data back into XML. Joins are expensive, so the more deeply nested
the original XML, the more expensive the data's reconstitution becomes. XML also has other
context information, like in-scope namespaces, that accumulates on the stack during parsing
and therefore also contributes to performance slowdown.
(msdn.microsoft)
Works Cited
msdn.microsoft. 12 February 2009 <http://msdn.microsoft.com/enus/magazine/cc188772.aspx>.
Keep Hackers Out: Part One, Personal
Edition
11.19.02
Total posts: 20
by Konstantinos Karagiannis and Matthew D. Sarrel
As we rely more on our computers, the potential for hackers to hurt us through them
likewise has grown, threatening to expose or destroy our private data and personal
records. Current hacker tools are sophisticated, automated, and more difficult to spot. In
addition, broadband connections have made us more vulnerable; always-connected
computers, typically with static or rarely changing IP addresses (the addresses computers
on the Internet use to find you), give would-be attackers unlimited time to discover and
exploit system vulnerabilities. With a few tricks and tools, however, you can secure your
home or small-office computer against the average hacker searching for the low-hanging
fruit.
(pcmag)
Works Cited
pcmag. 12 February 2009 <http://www.pcmag.com/article2/0,4149,653189,00.asp>.
Keeping private data private
One of the things at Google that impresses me most
(besides the quality of the food, of course) is the level
of commitment and energy that the company puts into
keeping its user's data secure. From the classic story
about not handing out search data to its latest face
blurring technology for street view, these guys do
whatever they can to keep private data private. With
the launch of App Engine, the company opens up its
data centers to you and me, so I think it's only fair to
strive for the same standard of quality. There are
many small things we can do in our applications to
decrease the chance of leaking data. In this post, I
would like to talk about one of them.
Take a look at the following example application.
Ignore the lack of transactions or that I hardcode my
html and focus on the security aspect. Do you see
anything wrong? (blog.appenginefan)
Works Cited
blog.appenginefan. 12 February 2009 <http://blog.appenginefan.com/2008/06/keepingprivate-data-private.html>.
Should Anti-Spyware Programs Fight Snooping I.S.P.s?
By Saul Hansell
The efforts of Internet service providers to keep track of what their customers do online
poses an interesting question for the makers of anti-spyware software: Should they find a
way to help users block these systems from monitoring their surfing or showing them
advertising that relates to their interests?
The Anti-Spyware Coalition is setting up a project to help address those issues. It’s
potentially an important step because the coalition, run by the Center for Democracy and
Technology, has created standards used by the major vendors of anti-virus and antispyware technology to help define how dangerous certain software and cookies are.
Most anti-spyware programs scan users’ computers and sort the findings into high-,
medium- or low-risk threats. Users can define their own settings to tell the programs how
to deal with various sorts of threats and potential privacy invasion
(bits.blogs.nytimes)
Works Cited
bits.blogs.nytimes. 12 February 2009 <http://bits.blogs.nytimes.com/2008/04/25/shouldanti-spyware-programs-fight-snooping-isps/>.
system Restore is a component of Microsoft's Windows Me, Windows XP and Windows
Vista operating systems that allows for the rolling back of system files, registry keys,
installed programs, etc., to a previous state in the event of malfunctioning or failure.
(wikipedia)
The Windows Server operating system family does not include System Restore. The
System Restore built into Windows XP can be installed on a Windows Server 2003
machine, [1] although this is not supported by Microsoft. (wikipedia)
In Windows Vista, System Restore features an improved interface and is based on
Shadow Copy technology. In prior Windows versions, it was based on a file filter that
watched changes for a certain set of file extensions, and then copied files before they
were overwritten.[2] The advantage of using Shadow Copy is that block-level changes in
files located in any directory on the volume can be monitored and backed up regardless
of their location. [3] (wikipedia)
Works Cited
wikipedia. 12 February 09 <http://en.wikipedia.org/wiki/System_Restore>.
Download