Slices & Articles Get by the slice or add to your own ebook
|Edwin Morgan||Carcanet Press Ltd.|
|Silvia Hagen||O'Reilly Media||ePub|
The developers of IPv4 did not rack their brains about security. The "Internet" in those early days connected a few trusted networks of some visionary researchers. The individuals who controlled these networks, as well as those who were allowed to use the networked resources, were implicitly trusted to not cause any malicious or destructive behavior. This is the reason why the original IP architecture does not include a security framework that can be used by all applications. If security was needed, it was usually rudimentary authentication/authorization and was included in the application code (e.g., the password for Telnet and FTP). Many years later, IPsec was introduced when IPv4 had already been widely deployed. Therefore, it needed to be retrofitted into existing deployments. Due to many interoperability and performance issues, IPsec is not widely deployed in many IPv4 scenarios. This is in contrast to IPv6, which from the beginning had the notion that fundamental security functionality had to be included in the base protocol in order to be used on any Internet platform. A standards-conforming IPv6 implementation must include IPsec to allow more secured communication once it is appropriately configured. Before we dive into the technical details, I want to talk about some general security concepts and practices.See All
|David Pogue||O'Reilly Media||ePub|
The whole point of owning a computer, of course, is to run programsor, as Apple likes to call them, apps. And in Mountain Lion, Apple wants programs to look and work like they do on the iPad: simply. As full-screen, autosaving worlds. Youre supposed to open them from a simple Home screen arrayed with app icons, and youre supposed to switch among them by swiping with your fingers on your trackpad or mouse.
This radical new vision of running programs is actually possible in Mountain Lionsort of. The hitch is that a lot of the iPaddy features, including full-screen mode and autosaving, dont work in pre-Lion programs. Software companies have to update their apps to add these features.
Most of them will do that, but in the meantime, youll go through a weird period of mixed metaphors, where some programs can do those tricks and others cant.
In any case, this chapter covers Apples New Way of Running Programs, and all of its Capitalized Elements: the Mac App Store, Launchpad, Mission Control, Full Screen, Auto Save, Versions, and more.See All
|Bob Alexander||University of North Texas Press|
“I’m shot, sure as hell”
The morning of July 12, 1874, found Major John B. Jones and his permanently assigned escort detachment in the broken and hilly country northeast of old Fort Belknap, then abandoned, near present day
Graham, Texas.1 Fortuitously they were not the only band of heavily armed horsemen in the sparsely settled frontier neighborhood. In fact, the region was literally crawling with competing cavalries.
The Frontier Battalion commander had managed the arduous overland journey to look over the tactically placed encampment of
Captain George W. Stevens’ Company B. The Texas Ranger camp was in reasonably close proximity to Fort Sill and the loosely superintended tribal reservations in Indian Territory. Known members of
Major Jones’ escort detachment from Company D were John P. Holmes, D. Ross James, William W. Lewis, Horatio Grooms Lee, Walter
M. Robertson, John V. Wheeler, and Edward B. “Ed” Carnal. Their ages averaged 22.8 years.2 Rangers Robertson and Carnal would later narrate in published accounts their experiences of what would become an adventurously harrowing and sad day. Supplementary commentary would be potted in unpublished ranger remembrances.See All
|Zhexembayeva, Nadya||Berrett-Koehler Publishers||ePub|
AT A GLANCE
WE ARE TAUGHT TO look nearby—to our customers, competition, and suppliers—for sources of unique competitive advantage. Yet in the world of overfished oceans, risks and opportunities are hiding far away from the home grounds—among the suppliers of the suppliers of the suppliers, and customers of customers of customers. Expand your horizons.
We started this journey with a broad, bird’s-eye look at our global economy—the linear throwaway economy, to be precise. Now it’s time to take a much closer look—at each individual strand, each individual industry that plays a role within the complex weave that is our market.
Take your industry, for example. The global value chain of your industry can be drawn out as a line, consisting of many stages and companies—upstream through all the suppliers, reaching to your company, and downstream, touching your customers, consumers, and end-of-life enterprises. Growing up in business, we are taught to look downstream from our business, paying attention to our customers and consumers (the customer is king, right?). We are also naturally tracking the flow upstream leading to our company—suppliers can make or break our profit margin. But more than anything, we are asked to pay our utmost attention to the vertical cut in this chain: our competitors.See All
Business & Economics