Mike & Lizzie’s Awesome Dave-Wowing Interactive 3-D Multimedia Experience CS 655 (Programming Languages) University of Virginia Spring 2001.

Slides:



Advertisements
Similar presentations
Integrated Healthcare Management system. Standards based design. [ Supports HXP (Health Exchange Protocol) a standard in exchanging health care data ]
Advertisements

WINDOWS AZURE ISV: BT Signaal WEB SITE: LOCATION: Bergen, Norway ORG SIZE: 103 employees INDUSTRY: Transportation WINDOWS.
Knowledge Pathways in IT
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
System Center Configuration Manager Push Software By, Teresa Behm.
Vulnerability Analysis Borrowed from the CLICS group.
Web Server Hardware and Software
Introduction to Network Administration. Objectives.
Cluster Computing and Genetic Algorithms With ClusterKnoppix David Tabachnick.
Chapter 3 Database Management
LIONS LIONS. CTA Schedule Finder Requirements Overview Requirements Overview Technical Requirements Primary Functional Requirements Administrative Requirements.
CS538: Advanced Topics in Information Systems. 2 Secure Location transparency Consistent Real-Time Available Black Box: Distributed Storage [GMM] ? Data.
Use free templates to create interactive multimedia activities and assessments. Play educational games on-line.
Why Wireless? The answer is simple: Reach users who are often on the move!
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
BUSINESS DRIVEN TECHNOLOGY
Customer Support Center Overview June 2006.
Cloud Computing Implementation & Security Yoram Baltinester Business Owner, I.T. Implementer.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
1 SYS366 Week 10, Lecture 3 Systems Requirements Gathering: Identifying Operating Requirements.
Data mining, Video Content Analytics Moutzouris Tasos – EPI Systems 2 ο Techology Forum Παρασκευή 8 Μαΐου 2015.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Introduction to Computers Lesson 12A. home Information System A mechanism that helps people collect, store, organize and use information.
Csi315csi315 Client/Server Models. Client/Server Environment LAN or WAN Server Data Berson, Fig 1.4, p.8 clients network.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 6 Introduction to Network Administration.
NETWORK ADMINISTRATOR. EXAMPLES OF SOME COMPUTING RELATED CAREERS Multimedia Artist / Graphics Artist Information System Manager Computer Scientist Network.
Mobile Device Programming
Open Solutions for a Changing World™ Copyright 2005, Data Access Worldwide June 6-9, 2005 Key Biscayne, Florida 1 Pervasive.SQL Version 9 - What’s New.
Storing Organizational Information - Databases
Faculty of Computer & Information
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
1 System Analysis and Design Using UML INSTRUCTOR: Jesmin Akhter Lecturer, IIT, JU.
3. Global Applications CS100: The World of Computing John Dougherty Haverford College.
OSIsoft High Availability PI Replication
© TRESETarget Industry TRESE Group Department of Computer Science University of Twente P.O. Box AE Enschede, The Netherlands
NGCWE Expert Group EU-ESA Experts Group's vision Prof. Juan Quemada NGCWE Expert Group IST Call 5 Preparatory Workshop on CWEs 13th.
Introduction to Interactive Media Interactive Media Tools: Authoring Applications.
GET CONNECTED Information Technology Career Cluster.
Vehicle Management And Tracking Software
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
UML (Unified Modeling Language)
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Tolerating Intrusions Through Secure System Reconfiguration Dennis Heimbigner and Alexander Wolf University of Colorado at Boulder John Knight University.
Online technical support service in India  Why you need an online tech support service  Features  Other Services Contact: TECH STATION,sco 177,sector.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
VIRTUAL REALITY (VR) INTRODUCTION AND BASIC APPLICATIONS الواقع الافتراضي : مقدمة وتطبيقات Dr. Naji Shukri Alzaza Assist. Prof. of Mobile technology Dean.
Presenting. Introduction Galaxy Software – Company Concept Custom software to help small to mid-level organizations to become technologically competitive.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
OSIsoft High Availability PI Replication Colin Breck, PI Server Team Dave Oda, PI SDK Team.
CIS 221 Lesson 2. What is the first phase of the of the Installation of Windows XP? MS-DOS phase Why is the MS-DOS phase needed? the computer required.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Information Technology
SDN challenges Deployment challenges
Database Management:.
The Open Grid Service Architecture (OGSA) Standard for Grid Computing
Evaluating Existing Systems
Algorithm and Ambiguity
Evaluating Existing Systems
IBM WEBSPHERE MESSAGE QUEUE online Training | IBM WEBSPHERE MQ Training
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
Chapter 10: Supporting and Maintaining Desktop Applications
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Internet Engineering Course
Property & Casualty Business challenge
How Is Core Banking Solution Making Your Life Easier?
Presentation transcript:

Mike & Lizzie’s Awesome Dave-Wowing Interactive 3-D Multimedia Experience CS 655 (Programming Languages) University of Virginia Spring 2001

A Dangerous Scenario Customers deposit their hard-earned money in the bank Stressed-out, overworked primary system administrator goes on vacation Incompetent assistant system administrator uses banking network to play games Security hole found in WinNT software Diabolical intruder exploits security hole to steal money

Patching The Hole Patch also requires DetectBogusTransfer() Stop GetMyMoney() process (but leave other processes running) Install/activate DetectBogusTransfer() Install GetMyMoney() patch Restart GetMyMoney() process

Current Solution Approaches Distributed Software Dock (uses XML) RAPTOR (uses Z) Central authority for system maintenance

Desired Solution Features Formal specification Hierarchical organization Precondition analysis Properties over collections Temporal reasoning Scalability Natural way to adapt pre-existing systems