Mobile code2008

Mobile code2008 - Mobile Codes list A Cable Being Laid A...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Mobile Codes
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
list
Background image of page 2
A Cable Being Laid A Few Months Later
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Rings Most modern cables are constructed in rings If a failure occurs, data is automatically rerouted around the other direction of the ring It takes 2 failures on different segments to bring system down.
Background image of page 4
Repair 1. Cable Damage is Detected 2. Location of Fault is determined on land 3. Maintenance Authority for that region of cable contacts a Maintenance Company to send a repair ship 4. Ship leaves port ~24 hours 5. Time to reach position 6. Repair, bring up both ends of the cable splice in a new section, put back on seabed (burry later) 7. Cost ~$1million http://www.iscpc.org/ Country of Registry Cableship Name Baseport Owner/Oper ator Purpose Cable Total Ships Bahamas Fu Lai Shanghai, China S. B. Submarine Systems Co. Ltd. www.sbsubmarinesystems.com Repair / Lay 3200 tons Plough / ROV Capability ~50
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Java Mobile Codes “The introduction of Java Applets” has taken the World Wide Web by storm”. In the old days (i.e. before 1995…), the kind of content that was transported over the network was essentially “passive”, i.e.: data, text, mail, spreadsheets and the like. A program (word, excel, image display), which was in the receiving computer, was in charge of presenting the content . Now we are in the era of “active” content and mobile codes. When one visits a JavaScripted Web page using a JavaScript-enabled browser, a program will get downloaded and executed in the receiver’s computer. In this new era of active content, one routinely imports programs from (often) untrusted sources, and run them in one’s computer .
Background image of page 6
Adware Adware or advertising-supported software is any software application in which advertisements are displayed while the program is running. These applications include additional code that displays the ads in pop-up windows or through a bar that appears on a computer screen. What differentiates adware from other shareware is that it is primarily advertising supported. Other types of shareware include demoware, nagware, crippleware, freeware, and even spyware. The more unethical forms of adware tend to coalesce with spyware.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spyware Strictly defined, spyware consists of computer software that gathers and reports information about a computer user without the user's knowledge or consent. More broadly, the term spyware can refer to a wide range of related malware products which fall outside the strict definition of spyware. These products perform many different functions, including the delivery of unrequested advertising (pop-up ads in particular), harvesting private information, re- routing page requests to illegally claim commercial site referral fees, and installing stealth phone dialers.
Background image of page 8
Security Security played a key role in the design of the Java platform. Security was a preoccupation before the appearance of Java, the Java Virtual Machine (JVM) and the applets, in 1995. All the applets were assumed to be untrusted, and the JVM was designed to
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 45

Mobile code2008 - Mobile Codes list A Cable Being Laid A...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online