The document discusses analyzing the history of Linux mandatory access control (MAC) by examining messages posted to the LSM mailing list from December 2003 to June 2008. It finds that:
- 6545 messages were posted across 978 threads in that period, contained in a 55MB mbox file.
- Monthly message volume peaked in April 2006, June 2007, and October 2007, driven by discussions on new MAC modules like AppArmor and TOMOYO Linux.
- The major contributors to discussions were developers of MAC modules like AppArmor, Smack, and TOMOYO Linux.
- Analyzing the mailing list archive provides insights into the evolution of Linux MAC and interests around new security models over that
Hollywood vs Silicon Valley: Open Video als VermittlerBertram Gugel
Hollywood is facing increasing competition from Silicon Valley as new digital platforms emerge for distributing entertainment content. New players like Netflix and Hulu are producing their own content and attracting viewers away from traditional television. As devices like smartphones and tablets proliferate, consumers are spending more time with digital content on multiple screens. For the entertainment industry to succeed, it will need to embrace new forms of storytelling, collaborate with digital platforms, and make content widely available across all devices and services.
Market for Gas as a Motor Fuel in Russia and GloballyBlueCorridorRally
This document discusses Gazprom's role in Russia's compressed natural gas (CNG) market and opportunities for growth. It notes that Russia currently ranks 20th globally in vehicle fleet running on natural gas, with 86,000 vehicles, and that Gazprom operates 242 of Russia's 525 CNG stations. Factors that could support growth include government subsidies, more CNG vehicle options, regional conversion programs, and expanding refueling infrastructure. The railway sector is also exploring use of liquefied natural gas to power locomotives. Gazprom aims to set targets and measures to develop the CNG market through legal and policy frameworks.
The document provides an overview of India's power sector and initiatives to develop smart grid technologies. It discusses:
1) Key organizations in India's power sector including the Ministry of Power, Central Electricity Authority, and state/central transmission utilities.
2) Current power scenario including installed capacity mix, plans for capacity additions, and transmission infrastructure.
3) Initiatives to modernize distribution networks and reduce losses through the Restructured Accelerated Power Development and Reforms Program (R-APDRP).
4) Efforts to develop smart grid technologies through the constitution of the Indian Smart Grid Task Force and India Smart Grid Forum to coordinate activities and establish standards.
This document contains statistics and charts summarizing police data from March 2009 including:
- Calls for service by source were highest from phone calls followed by on-view and 911 calls.
- Priority 1 calls accounted for the most calls for service.
- Most incidents occurred in District 4 followed by District 1.
- Traffic crashes increased in March with most occurring on Fridays.
- Citations were highest on Fridays and Saturdays with most for moving violations.
- Investigations cleared the most cases involving theft and made several arrests.
- A stolen vehicle was recovered leading to two felony arrests.
The Cottonwood Heights Police Department July 2009 statistical report provides data on calls for service, incidents, traffic stops, and citations. Some key highlights include:
- Calls for service were 1,930, a 10% increase from June.
- Assaults increased 28.2% to 65 incidents from the monthly average of 41.
- Traffic crashes resulting in injury increased to 25% of total crashes from the monthly average of 20%.
- Citations issued totaled 248 with moving violations comprising 65% and warnings 35%.
Telemedicine and distance care are important in Västerbotten County due to its large geographic size and low population density. The county has invested heavily in high-speed broadband infrastructure and uses videoconferencing and telemedicine applications to provide healthcare services to residents over long distances. Examples include virtual consultations between specialists and primary care centers, remote rehabilitation services, and monitoring of chronic conditions. While telemedicine has improved access and reduced costs, establishing effective business models remains a work in progress.
- Quarterly earnings slides for Q4 2012 were presented, including key metrics such as monthly active users (MAUs), daily active users (DAUs), and mobile users over time which showed continued growth in all regions.
- Total revenue for Q4 2012 reached $1.585 billion, an increase from $1.26 billion in Q4 2011. Advertising revenue continued to be the largest contributor.
- Average revenue per user (ARPU) also increased in most regions from the prior year.
- Expenses related to share-based compensation remained the largest cost as a percentage of revenue, though this decreased slightly from the previous quarter.
The study analyzed electricity consumption data from 31 households in Baza, Spain in 2008. It found a total consumption of 162,131 kWh at a total cost of €20,156. On average, consumption was 1,228 kWh per person and 5,230 kWh per household, costing €152.70 and €650.20 respectively. Consumption varied based on housing type, with detached houses using the most electricity on average per household and person.
Hollywood vs Silicon Valley: Open Video als VermittlerBertram Gugel
Hollywood is facing increasing competition from Silicon Valley as new digital platforms emerge for distributing entertainment content. New players like Netflix and Hulu are producing their own content and attracting viewers away from traditional television. As devices like smartphones and tablets proliferate, consumers are spending more time with digital content on multiple screens. For the entertainment industry to succeed, it will need to embrace new forms of storytelling, collaborate with digital platforms, and make content widely available across all devices and services.
Market for Gas as a Motor Fuel in Russia and GloballyBlueCorridorRally
This document discusses Gazprom's role in Russia's compressed natural gas (CNG) market and opportunities for growth. It notes that Russia currently ranks 20th globally in vehicle fleet running on natural gas, with 86,000 vehicles, and that Gazprom operates 242 of Russia's 525 CNG stations. Factors that could support growth include government subsidies, more CNG vehicle options, regional conversion programs, and expanding refueling infrastructure. The railway sector is also exploring use of liquefied natural gas to power locomotives. Gazprom aims to set targets and measures to develop the CNG market through legal and policy frameworks.
The document provides an overview of India's power sector and initiatives to develop smart grid technologies. It discusses:
1) Key organizations in India's power sector including the Ministry of Power, Central Electricity Authority, and state/central transmission utilities.
2) Current power scenario including installed capacity mix, plans for capacity additions, and transmission infrastructure.
3) Initiatives to modernize distribution networks and reduce losses through the Restructured Accelerated Power Development and Reforms Program (R-APDRP).
4) Efforts to develop smart grid technologies through the constitution of the Indian Smart Grid Task Force and India Smart Grid Forum to coordinate activities and establish standards.
This document contains statistics and charts summarizing police data from March 2009 including:
- Calls for service by source were highest from phone calls followed by on-view and 911 calls.
- Priority 1 calls accounted for the most calls for service.
- Most incidents occurred in District 4 followed by District 1.
- Traffic crashes increased in March with most occurring on Fridays.
- Citations were highest on Fridays and Saturdays with most for moving violations.
- Investigations cleared the most cases involving theft and made several arrests.
- A stolen vehicle was recovered leading to two felony arrests.
The Cottonwood Heights Police Department July 2009 statistical report provides data on calls for service, incidents, traffic stops, and citations. Some key highlights include:
- Calls for service were 1,930, a 10% increase from June.
- Assaults increased 28.2% to 65 incidents from the monthly average of 41.
- Traffic crashes resulting in injury increased to 25% of total crashes from the monthly average of 20%.
- Citations issued totaled 248 with moving violations comprising 65% and warnings 35%.
Telemedicine and distance care are important in Västerbotten County due to its large geographic size and low population density. The county has invested heavily in high-speed broadband infrastructure and uses videoconferencing and telemedicine applications to provide healthcare services to residents over long distances. Examples include virtual consultations between specialists and primary care centers, remote rehabilitation services, and monitoring of chronic conditions. While telemedicine has improved access and reduced costs, establishing effective business models remains a work in progress.
- Quarterly earnings slides for Q4 2012 were presented, including key metrics such as monthly active users (MAUs), daily active users (DAUs), and mobile users over time which showed continued growth in all regions.
- Total revenue for Q4 2012 reached $1.585 billion, an increase from $1.26 billion in Q4 2011. Advertising revenue continued to be the largest contributor.
- Average revenue per user (ARPU) also increased in most regions from the prior year.
- Expenses related to share-based compensation remained the largest cost as a percentage of revenue, though this decreased slightly from the previous quarter.
The study analyzed electricity consumption data from 31 households in Baza, Spain in 2008. It found a total consumption of 162,131 kWh at a total cost of €20,156. On average, consumption was 1,228 kWh per person and 5,230 kWh per household, costing €152.70 and €650.20 respectively. Consumption varied based on housing type, with detached houses using the most electricity on average per household and person.
TokuDB, Spider, and CONNECT are storage engines that provide additional functionality beyond InnoDB in MariaDB. TokuDB offers improved performance through fractal tree indexing and compression. Spider provides horizontal partitioning and sharding across multiple database servers. CONNECT enables querying of external data sources like files, ODBC, XML, and JSON without needing to import the data.
This webinar is a technical overview of the MariaDB CONNECT Storage Engine
The MariaDB CONNECT Storage Engine allows to access various file formats (CSV, XML, Excel, etc). It give access to any ODBC data sources (Oracle, DB2, SQLServer, etc). It also allows to access remote MySQL tables or ODBC tables.
A CONNECT table itself can be a set of remote MySQL tables. This opens the door to interesting distributed architectures that can help to address big data.
SQL requests can be executed in parallel against these CONNECT distributed tables
The document discusses the MariaDB CONNECT storage engine, which allows querying external file formats from within MariaDB. It was created by database expert Olivier Bertrand and brings business intelligence capabilities to MariaDB by enabling access to data sources like CSV, XML, Excel and other formats without needing ETL processes. The storage engine uses the MySQL plugin architecture and implements features like indexing, condition pushdown, and support for ODBC, MySQL tables, and various file types.
El documento proporciona instrucciones paso a paso para doblar un origami de búho. Incluye 19 pasos que explican cómo doblar y cortar el papel para formar la cabeza, alas, cola y pico del búho. También incluye ilustraciones que muestran cómo hacer los pliegues de valle y montaña necesarios para dar forma al búho de papel.
Norcal Neuro August Recap Salesand Marketing Wrapped Finaljay_brunz
The document provides sales and marketing recaps for Neuro NorCal in August 2011. It summarizes distributor sales performance, buying reports, sales metrics, and marketing events including sampling at Walgreens stores, media placements, an Earthquakes soccer game, a paintball event, Bevmo stores, and Outside Lands music festival in San Francisco. Overall, marketing events in August sampled over 1,000 people and generated over 120,000 impressions to help boost sales.
Presentation given at the Sept. 18th/19th, 2008 Climate Change and the Physical Environment Seminar, College of Architecture, University of Nebraska, Lincoln. Title: Keeping "Green" Buildings From Turning "Brown"
The document is an OECD report on health data from 2012 that compares US health spending to other countries. It finds that the US spends over two times the OECD average on health care per capita, spending $8,233 PPP compared to an average of $3,309 PPP. It also spends a higher percentage of its GDP on health care than any other country, allocating 17.6% of GDP compared to an average of 9% among OECD countries.
Manganese alloys essential for steel making.
Like all RM even Mn :
a) depleting resources in most regions,
b) ore controlled & concentrated to a few leading to steeper increase in RM price than steel price profit shifting to RM
c) HG ore prices increasing faster than MG & LG Ore prices as more concentrated (geographic) spread of HG ore.
Way out :
Invest in technology for Mn alloys like steel industry has done for iron ore : viz beneficiation, agglomeration, pre-reduction and coke : viz washing, stamp charging PCI etc.
Beneficiation, Agglomeration, Alloy making not using electricity – direct reduction using coal/natural gas.
Use of lower grades of ferro alloys that can be made from LG Ores which are more easily available.
Steel Production Global + India Going Up
Manganese Alloy Demand Going Up
High Grade Manganese Ore Restricted To Few Countries & High Consolidation Of High Grade Mn Ore Resource.
Globally Steel Industry Has Tackled Poor Quality Of Principal Raw Materials
Iron Ore – By Viz Beneficiation, Agglomeration, Pre-reduction.
Coke - Washing, Stamp Charging, Pulverized Coal Injection Etc
Indian Mn Ore Of Poor Quality, High Grade Ore Price Increase & Electricity Cost Increase + Shortage.
Hence Need For Steel Industry To Invest In :
Beneficiation
Agglomeration
Alternate Methods Of Production For Mn Alloys
This document discusses various methods of counting and deriving number fields. It begins by describing dot-row counting, pyramid counting, and triangular numbers. It then discusses different methods for deriving the number field, including the copy-down method, coat-hanger method, and algebraic method. The document goes on to describe features of the number field such as conservation of information, negative edges, and applications. It concludes that correct counting involves distinguishing novel from repeated information, and basic exploration of these concepts yields insights into the nature of number fields.
The document discusses the importance of physical education (PE) and active transportation. It provides data showing rising obesity rates in the US and studies linking physical fitness with better academic performance. It advocates for quality daily PE that is accessible to all students. The document also discusses the health, economic, and community benefits of promoting active transportation infrastructure like trails and bike lanes. It summarizes DuPage County's existing and proposed bikeway plans to create a more connected network for bicycling and walking throughout the region.
The document appears to be a loan repayment schedule containing information about loan dates, amounts, and borrower details. It includes sections for the loan date, capital amount, repayment quota, borrower name, signature, and ID number. The bulk of the document consists of two tables outlining the repayment dates from days 1 to 30 in monthly installments.
Capital Cooling: Platinum Upright Back Bar CoolersCapital Cooling
The Platinum range of upright back bar coolers offers superb cooling properties and fashionable exteriors. Suitable for the display of beer, wine and soft drinks.
The document discusses issues with glass manufacturing in Firozabad, India. It focuses on two major problems: 1) frequent failures of pots used for melting glass, which increases processing time, and 2) inefficient furnace designs. Data on pot failures in two furnaces over 165 days showed great variation in time between failures, from 1 to 29 days. Addressing these two problems could significantly improve energy efficiency and reduce carbon emissions from the glass production process.
The document contains information about calls for service from September 2008 to June 2009 for a police department. It includes three pie charts showing the percentage of calls from different sources each month, and line graphs displaying the number of calls by priority level and average response times. The summaries are:
1) The majority of calls for service came from citizens calling by phone (48%), with on-view calls from officers comprising the second largest source (40%).
2) Most calls were for lower priority levels 3-5, while fewer calls were for the highest priorities of life-threatening situations.
3) Average police response times were generally between 9-11 minutes, with some improvement over the 10 month period. Response times for
I've uploaded my own Japanese translation of Jos's speech at Stanford University at http://www.slideshare.net/haradats/youve-got-to-find-what-you-love-jobs-says.
If you treasure the original speech like I do, why don't you make and share your version in your language?
This kit is a LaTeX template including the speech text. All you need is replace "*Your*" with translations and compile.
Enjoy.
Hint:
To adjust the horizontal positions of paragraphs, \baselineskip is handy.
Note:
The original text which has been published at the Stanford University is slightly different from the spoken words. My guess is that Stanford text is based on Job's memo received from Jobs.
My own Japanese translation of the legendary Steven Jobs's speech at the Stanford university.
Browser version available in http://slides.com/haradats/deck#/
この翻訳および文書の作成は、2015年10月23日に芝浦工業大学で行った講義、「人生をより良く生きるためのプレゼンーション入門」の資料として作成したものです。
PDFファイルは下記でダウンロードできます。
http://www11.plala.or.jp/tsh/stanford.pdf
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
TokuDB, Spider, and CONNECT are storage engines that provide additional functionality beyond InnoDB in MariaDB. TokuDB offers improved performance through fractal tree indexing and compression. Spider provides horizontal partitioning and sharding across multiple database servers. CONNECT enables querying of external data sources like files, ODBC, XML, and JSON without needing to import the data.
This webinar is a technical overview of the MariaDB CONNECT Storage Engine
The MariaDB CONNECT Storage Engine allows to access various file formats (CSV, XML, Excel, etc). It give access to any ODBC data sources (Oracle, DB2, SQLServer, etc). It also allows to access remote MySQL tables or ODBC tables.
A CONNECT table itself can be a set of remote MySQL tables. This opens the door to interesting distributed architectures that can help to address big data.
SQL requests can be executed in parallel against these CONNECT distributed tables
The document discusses the MariaDB CONNECT storage engine, which allows querying external file formats from within MariaDB. It was created by database expert Olivier Bertrand and brings business intelligence capabilities to MariaDB by enabling access to data sources like CSV, XML, Excel and other formats without needing ETL processes. The storage engine uses the MySQL plugin architecture and implements features like indexing, condition pushdown, and support for ODBC, MySQL tables, and various file types.
El documento proporciona instrucciones paso a paso para doblar un origami de búho. Incluye 19 pasos que explican cómo doblar y cortar el papel para formar la cabeza, alas, cola y pico del búho. También incluye ilustraciones que muestran cómo hacer los pliegues de valle y montaña necesarios para dar forma al búho de papel.
Norcal Neuro August Recap Salesand Marketing Wrapped Finaljay_brunz
The document provides sales and marketing recaps for Neuro NorCal in August 2011. It summarizes distributor sales performance, buying reports, sales metrics, and marketing events including sampling at Walgreens stores, media placements, an Earthquakes soccer game, a paintball event, Bevmo stores, and Outside Lands music festival in San Francisco. Overall, marketing events in August sampled over 1,000 people and generated over 120,000 impressions to help boost sales.
Presentation given at the Sept. 18th/19th, 2008 Climate Change and the Physical Environment Seminar, College of Architecture, University of Nebraska, Lincoln. Title: Keeping "Green" Buildings From Turning "Brown"
The document is an OECD report on health data from 2012 that compares US health spending to other countries. It finds that the US spends over two times the OECD average on health care per capita, spending $8,233 PPP compared to an average of $3,309 PPP. It also spends a higher percentage of its GDP on health care than any other country, allocating 17.6% of GDP compared to an average of 9% among OECD countries.
Manganese alloys essential for steel making.
Like all RM even Mn :
a) depleting resources in most regions,
b) ore controlled & concentrated to a few leading to steeper increase in RM price than steel price profit shifting to RM
c) HG ore prices increasing faster than MG & LG Ore prices as more concentrated (geographic) spread of HG ore.
Way out :
Invest in technology for Mn alloys like steel industry has done for iron ore : viz beneficiation, agglomeration, pre-reduction and coke : viz washing, stamp charging PCI etc.
Beneficiation, Agglomeration, Alloy making not using electricity – direct reduction using coal/natural gas.
Use of lower grades of ferro alloys that can be made from LG Ores which are more easily available.
Steel Production Global + India Going Up
Manganese Alloy Demand Going Up
High Grade Manganese Ore Restricted To Few Countries & High Consolidation Of High Grade Mn Ore Resource.
Globally Steel Industry Has Tackled Poor Quality Of Principal Raw Materials
Iron Ore – By Viz Beneficiation, Agglomeration, Pre-reduction.
Coke - Washing, Stamp Charging, Pulverized Coal Injection Etc
Indian Mn Ore Of Poor Quality, High Grade Ore Price Increase & Electricity Cost Increase + Shortage.
Hence Need For Steel Industry To Invest In :
Beneficiation
Agglomeration
Alternate Methods Of Production For Mn Alloys
This document discusses various methods of counting and deriving number fields. It begins by describing dot-row counting, pyramid counting, and triangular numbers. It then discusses different methods for deriving the number field, including the copy-down method, coat-hanger method, and algebraic method. The document goes on to describe features of the number field such as conservation of information, negative edges, and applications. It concludes that correct counting involves distinguishing novel from repeated information, and basic exploration of these concepts yields insights into the nature of number fields.
The document discusses the importance of physical education (PE) and active transportation. It provides data showing rising obesity rates in the US and studies linking physical fitness with better academic performance. It advocates for quality daily PE that is accessible to all students. The document also discusses the health, economic, and community benefits of promoting active transportation infrastructure like trails and bike lanes. It summarizes DuPage County's existing and proposed bikeway plans to create a more connected network for bicycling and walking throughout the region.
The document appears to be a loan repayment schedule containing information about loan dates, amounts, and borrower details. It includes sections for the loan date, capital amount, repayment quota, borrower name, signature, and ID number. The bulk of the document consists of two tables outlining the repayment dates from days 1 to 30 in monthly installments.
Capital Cooling: Platinum Upright Back Bar CoolersCapital Cooling
The Platinum range of upright back bar coolers offers superb cooling properties and fashionable exteriors. Suitable for the display of beer, wine and soft drinks.
The document discusses issues with glass manufacturing in Firozabad, India. It focuses on two major problems: 1) frequent failures of pots used for melting glass, which increases processing time, and 2) inefficient furnace designs. Data on pot failures in two furnaces over 165 days showed great variation in time between failures, from 1 to 29 days. Addressing these two problems could significantly improve energy efficiency and reduce carbon emissions from the glass production process.
The document contains information about calls for service from September 2008 to June 2009 for a police department. It includes three pie charts showing the percentage of calls from different sources each month, and line graphs displaying the number of calls by priority level and average response times. The summaries are:
1) The majority of calls for service came from citizens calling by phone (48%), with on-view calls from officers comprising the second largest source (40%).
2) Most calls were for lower priority levels 3-5, while fewer calls were for the highest priorities of life-threatening situations.
3) Average police response times were generally between 9-11 minutes, with some improvement over the 10 month period. Response times for
Similar to OLS2008: Time to Glean - Mac for Linux history and the future (10)
I've uploaded my own Japanese translation of Jos's speech at Stanford University at http://www.slideshare.net/haradats/youve-got-to-find-what-you-love-jobs-says.
If you treasure the original speech like I do, why don't you make and share your version in your language?
This kit is a LaTeX template including the speech text. All you need is replace "*Your*" with translations and compile.
Enjoy.
Hint:
To adjust the horizontal positions of paragraphs, \baselineskip is handy.
Note:
The original text which has been published at the Stanford University is slightly different from the spoken words. My guess is that Stanford text is based on Job's memo received from Jobs.
My own Japanese translation of the legendary Steven Jobs's speech at the Stanford university.
Browser version available in http://slides.com/haradats/deck#/
この翻訳および文書の作成は、2015年10月23日に芝浦工業大学で行った講義、「人生をより良く生きるためのプレゼンーション入門」の資料として作成したものです。
PDFファイルは下記でダウンロードできます。
http://www11.plala.or.jp/tsh/stanford.pdf
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document discusses the advantages and disadvantages of label-based access control versus pathname-based access control. It notes that while label-based access control is robust against changes to pathnames and namespaces, the location and name of a file still have meaning in terms of how the system behaves and provides services. The document argues that restricting pathname changes is important for preventing unintended system behavior and maintaining system availability. It suggests that both label-based and pathname-based access controls are needed and that the LSM should support both.
TOMOYO Linux is an extension of the Linux kernel that adds process tracing capabilities. It automatically stores the "process invocation history" which shows how each process was created. This allows users to browse the entire process tree and see the relationships between running processes. The TOMOYO Linux policy editor provides a command line interface to view the stored process histories on a system and monitor actions caused by each process. TOMOYO Linux can help provide visibility into process activity and is maintained as an open source project with repositories of patched kernels and tools.
This document provides an introduction to securing Linux systems. It begins by explaining the types of exploits that can compromise Linux systems and gain root access. It then discusses how traditional Linux security methods like discretionary access controls (DAC) and firewalls are insufficient to prevent exploits. The document introduces mandatory access controls (MAC) as an enhancement that can restrict what programs are allowed to do even with root privileges. It emphasizes that MAC systems require security policies to define which accesses should be allowed or denied to provide protection while maintaining usability. The goal of secure Linux extensions is to grant necessary access according to policies while rejecting all other access attempts.
This document summarizes the key differences between SELinux and TOMOYO Linux access control systems. SELinux focuses on restricting programs based on security labels, while TOMOYO Linux focuses on restricting programs based on their process invocation history and parameters. The document argues that while label-based access control has limitations in guaranteeing information flow, TOMOYO Linux can help reinforce access control by restricting programs' actions and parameters within the kernel.
This document discusses the TOMOYO Linux access control system. It describes two versions of TOMOYO - version 1.6 which does not use Linux Security Modules (LSM) and version 2.2 which modifies TOMOYO to use LSM. The document then provides examples of how TOMOYO can provide access control based on file/directory names and parameters to address scenarios like restricting file uploads and executions. It argues that while label-based access control controls permissions, name-based controls like TOMOYO can address additional factors around how file contents are processed once in userspace.
The document proposes a method called "login authentication multiplexing" to strengthen login authentication security by enforcing multiple authentications rather than a single authentication. It involves placing extra authentication programs after the initial login that must be passed before accessing protected resources. This approach reduces vulnerabilities, allows flexible policies, and prevents damage until all authentications are passed. Practical issues like restricting shell access and remote access programs are also discussed.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
OLS2008: Time to Glean - Mac for Linux history and the future
1. Time to Glean
MAC
for
Linux,
history
and
the
future
July 25, 2008
Toshiharu Harada
<haradats@nttdata.co.jp>
Kentaro Takeda
Tetsuo Handa
NTT DATA CORPORATION
2. Welcome
to my BoF of “MAC for Linux:Time to Glean”
I am project manager of TOMOYO Linux,
but this is *not* a TOMOYO Linux BoF
3. This BoF
• looks in the history of Linux MAC: (Mandatory
Access Control)
• As Smack had been added as 2nd in-tree module, it
might be a good time to stop by and look what have
passed
• I tried to find information from the LSM ml archive
during the period December 2003 to June 2008
4. Please Don’t ...
• Ask me if this is worth spending time (I’ve
already spent my time ...)
• Get mad on me if the result is not what you
want (we can’t tell what we find until we dig)
5. Where to look at?
• ML archive has the information
• Whole LKML seems to be too much ...
• LSM mailing list archive should be a modest place
for resort
6. How to glean?
• Downloaded LSM message archive from gmane.org
during the period of December 3, 2003 through
June 30, 2008
• Plenty of nice tools are available
–ruby, perl, sort, uniq ... (joy of computing)
• Used Excel and Numbers occasionally for saving
time purpose
7. Welcome aboard!
Let’s start digging
Is this free?
Of course,
it’s open source!
9. Can You Guess?
1. How many messages has been posted during
December 3, 2003 - June 30, 2008?
10. Can You Guess?
1. How many messages has been posted during
December 3, 2003 - June 30, 2008?
2. How many threads were there?
11. Can You Guess?
1. How many messages has been posted during
December 3, 2003 - June 30, 2008?
2. How many threads were there?
3. How big is the downloaded mbox file?
21. 3 Peaks
• Peaks should have reasons
• Let’s take a look at each peaks
22. (1) April 2006
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Torok Edwin
[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones
RE: [ANNOUNCE] Release Digsig 1.5: kernel module for run-timeauthentication of binaries Makan Pourzandi
[ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries Makan Pourzandi
[ANNOUNCE] ISSI is porting PitBull Foundation and LX to Linux using the LSM Mikel L. Matthews
[2.6 patch] remove the Root Plug Support sample module Adrian Bunk
using lsm hook to implement transparent file crypt hu jun
RE: [ANNOUNCE] Release Digsig 1.5: kernel module forrun-timeauthentication of binaries Makan Pourzandi
Re: [PATCH] fix up security_socket_getpeersec_* documentation Xiaolan Zhang
about security and trust of linux in engineering information system hu jun
A transparent secure architecture for special applications hu jun
23. (1) April 2006
0%
0%
1%0%
0%
1%
2%2%
5%
52%
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) Torok Edwin
[RFC][PATCH 0/11] security: AppArmor - Overview Tony 36% Jones
RE: [ANNOUNCE] Release Digsig 1.5: kernel module for run-timeauthentication of binaries Makan Pourzandi
[ANNOUNCE] Release Digsig 1.5: kernel module for run-time authentication of binaries Makan Pourzandi
[ANNOUNCE] ISSI is porting PitBull Foundation and LX to Linux using the LSM Mikel L. Matthews
[2.6 patch] remove the Root Plug Support sample module Adrian Bunk
using lsm hook to implement transparent file crypt hu jun
RE: [ANNOUNCE] Release Digsig 1.5: kernel module forrun-timeauthentication of binaries Makan Pourzandi
Re: [PATCH] fix up security_socket_getpeersec_* documentation Xiaolan Zhang
about security and trust of linux in engineering information system hu jun
A transparent secure architecture for special applications hu jun
24. (2) June 2007
[AppArmor 00/45] AppArmor security module overview John Johansen
[AppArmor 00/44] AppArmor security module overview John Johansen
Re: implement-file-posix-capabilities.patch Serge E. Hallyn
[RFC] TOMOYO Linux Toshiharu Harada
[TOMOYO 0/9] TOMOYO Linux security module. Kentaro Takeda
[RFD 0/4] AppArmor - Don't pass NULL nameidata to vfs_create/lookup/permission IOPs John Johansen
What kind of feature does New LSM security model need? Kazuki Omo
[PATCH 1/1] file caps: update selinux xattr hooks Serge E. Hallyn
Re: [TOMOYO 5/9] Memory and pathname management functions. Albert Cahalan
[PATCH 1/1] file capabilities: get_file_caps cleanups Serge E. Hallyn
[RFC][Patch 1/1] IBAC Patch Mimi Zohar
[PATCH] [RFC] security: add hook inode_post_removexattr Hawk Xu
[PATCH 1/1] file capabilities: introduce cap_setfcap Serge E. Hallyn
Re: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook Pavel Machek
Re: implement-file-posix-capabilities.patch Serge E. Hallyn
25. (2) June 2007
1%1% 0%
0%
0%
0%
1% 1%
2%
3%
4%
4%
[AppArmor 00/45] AppArmor security module overview John Johansen
[AppArmor 00/44] AppArmor security module overview John Johansen
Re: implement-file-posix-capabilities.patch Serge E. Hallyn14% 52%
[RFC] TOMOYO Linux Toshiharu Harada
[TOMOYO 0/9] TOMOYO Linux security module. Kentaro Takeda
[RFD 0/4] AppArmor - Don't pass NULL nameidata to vfs_create/lookup/permission IOPs John Johansen
What kind of feature does New LSM security model need? Kazuki Omo
[PATCH 1/1] file caps: update selinux xattr hooks Serge E. Hallyn
Re: [TOMOYO 5/9] Memory and pathname management functions. 17% Cahalan
Albert
[PATCH 1/1] file capabilities: get_file_caps cleanups Serge E. Hallyn
[RFC][Patch 1/1] IBAC Patch Mimi Zohar
[PATCH] [RFC] security: add hook inode_post_removexattr Hawk Xu
[PATCH 1/1] file capabilities: introduce cap_setfcap Serge E. Hallyn
Re: [AppArmor 01/41] Pass struct vfsmount to the inode_create LSM hook Pavel Machek
Re: implement-file-posix-capabilities.patch Serge E. Hallyn
26. (3) October 2007
Linux Security *Module* Framework (Was: LSM conversion to static interface Simon Arlott
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler
[AppArmor 00/45] AppArmor security module overview John Johansen
[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history. Kentaro Takeda
Re: Linux Security *Module* Framework (Was: LSM conversion to static interface) Rob Meijer
[RFC 0/2] getsecurity/vfs_getxattr cleanup Daved P. Quigley
Re: LSM conversion to static interface Thomas Fricaccia
[PATCH] Version 4 (2.6.23-rc8-mm2) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler
[TOMOYO #4 00/13] TOMOYO Linux - MAC based on process invocation history. Tetsuo Handa
[PATCH 1/2 -mm] capabilities: clean up file capability reading Serge E. Hallyn
27. (3) October 2007
3%
3%
4%
22%
5%
5%
8%
Linux Security *Module* Framework (Was: LSM conversion to static interface Simon Arlott
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler
20%
[AppArmor 00/45] AppArmor security module overview John Johansen
[TOMOYO 00/15](repost) TOMOYO Linux - MAC based on process invocation history. Kentaro Takeda
13%
Re: Linux Security *Module* Framework (Was: LSM conversion to static interface) Rob Meijer
[RFC 0/2] getsecurity/vfs_getxattr cleanup Daved P. Quigley
Re: LSM conversion to static interface Thomas Fricaccia 17%
[PATCH] Version 4 (2.6.23-rc8-mm2) Smack: Simplified Mandatory Access Control Kernel Casey Schaufler
[TOMOYO #4 00/13] TOMOYO Linux - MAC based on process invocation history. Tetsuo Handa
[PATCH 1/2 -mm] capabilities: clean up file capability reading Serge E. Hallyn
29. People
“It is people that writes and reads messages”
It is also people that fight and argue (and reject)
30.
31. LSM top 20 contributors
650
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
32. LSM top 20 contributors
650
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
33. LSM top 20 contributors
650
Stephen Smalley
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
34. LSM top 20 contributors
650 David Howells
Stephen Smalley
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
35. LSM top 20 contributors
650 David Howells
Stephen Smalley
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
36. LSM top 20 contributors Serge E. Hallyn
650 David Howells
Stephen Smalley
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
37. LSM top 20 contributors Serge E. Hallyn
650 David Howells
Stephen Smalley
Casey Schaufler
James Morris
520
John Johansen
Chris Wright
Paul Moore
390 Tetsuo Handa
Crispin Cowan
Andrew G. Morgan
Greg KH
260
Valdis.Kletnieks
Kentaro Takeda
Pavel Machek
130 Tony Jones
Andreas Gruenbacher
KaiGai Kohei
Ahmed S. Darwish
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08 Kylene Jo Hall
40. Men of wisdom (“cc”ed ranking)
2400
Stephen Smalley
Chris Wright
Casey Schaufler
James Morris
Serge E. Hallyn
Andrew Morton
David Howells
Christoph Hellwig
1600
Andreas Gruenbacher
Al Viro
John Johansen
Trond Myklebust
Linus Torvalds
Andrew G. Morgan
Crispin Cowan
Greg KH
Eric Paris
800
Tony Jones
Tetsuo Handa
Arjan van de Ven
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08
41.
42. 7000
Which ML cc-ed most
5250
3500
1750
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08
43. 7000
Which ML cc-ed most
linux-security-module ML (self)
linux-kernel ML
5250 linux-fsdevel ML
selinux ML
netdev ML
3500
fireflier-devel ML
linux-audit ML
1750
0
Dec-03 Mar-04 Jun-04 Sep-04 Dec-04 Mar-05 Jun-05 Sep-05 Dec-05 Mar-06 Jun-06 Sep-06 Dec-06 Mar-07 Jun-07 Sep-07 Dec-07 Mar-08 Jun-08
60. Time to determine
“important” threads
• “How?” is the question
• My version of completely fair formula :-)
• Give points to threads ranked 1-20 according to
the rank (1st thread gets 20, 20th one gets 1)
• Apply for 3 aspects (days/people/messages), so the
perfect thread get 60 points
61. Example
days people messages
8th 4th 3rd
rank-days rank-people rank-messages
21 - 8 = 13 21 - 4 = 17 21 - 3 = 18
total point is 13+17+18 = 48
62. Results
• LSM ml top 10 important threads are ...
Good, boy.
Show me the list.
63. LSM important threads 10
[AppArmor 00/41] AppArmor security module overview 13 17 18
[AppArmor 00/45] AppArmor security module overview 12 15 19
RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner) 1 20 20
Linux Security *Module* Framework (Was: LSM conversion to static interface 6 18 15
[RFC][PATCH 0/11] security: AppArmor - Overview 0 19 17
TCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Control Kernel 5 16 14
AppArmor FAQ 16 131
[PATCH 00/28] Permit filesystem local caching [try #2] 0 14 16
[AppArmor 00/44] AppArmor security module overview 0 14 13
[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released 0 10 12
0 10 20 30 40 50
days people messages
64. LSM important threads 20
rank- rank- rank-
subject from days people messages point
days people messages
[AppArmor 00/41] AppArmor security module overview John Johansen 49 24 176 13 17 18 48
[AppArmor 00/45] AppArmor security module overview John Johansen 44 22 236 12 15 19 46
[RFC][PATCH 0/7] fireflier LSM for labeling sockets based onTorok Edwin
its creator (owner) 27 34 244 1 20 20 41
Linux Security *Module* Framework (Was: LSM conversion to static Arlott
Simon interface 34 26 89 6 18 15 39
[RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones 10 33 170 19 17 36
[PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory AccessSchaufler
Casey Control Kernel 32 24 81 5 16 14 35
AppArmor FAQ John Johansen 55 15 48 16 13 1 30
[PATCH 00/28] Permit filesystem local caching [try #2] David Howells 50 8 126 14 16 30
[AppArmor 00/44] AppArmor security module overview John Johansen 9 19 76 14 13 27
[TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa 21 12 74 10 12 22
Re: implement-file-posix-capabilities.patch Serge E. Hallyn 14 14 65 12 9 21
[PATCH 0/3] exporting capability name/code pairs (final#2) KaiGai Kohei 82 7 32 20 20
[PATCH] capabilities: implement per-process securebits Andrew G. Morgan 70 3 7 19 19
[PATCH] Implement file posix capabilities Serge E. Hallyn 59 5 9 18 18
[PATCH 2/2-v2] NFS: use new LSM interfaces to explicitly set mount options
Eric Paris 57 3 6 17 17
[RFC 0/28] Patches to pass vfsmount to LSM inode security hooks Jones
Tony 8 12 61 8 8 16
Mediating send_sigurg Stephen Smalley 54 2 12 15 15
New stacker performance results Serge E. Hallyn 9 12 51 9 4 13
[AppArmor 00/45] AppArmor security module overview John Johansen 4 10 70 1 11 12
Re: Linux Security *Module* Framework (Was: LSM conversion to static interface)
Rob Meijer 9 13 33 11 11
65. LSM important threads 10
Subject By
1 [AppArmor 00/41] AppArmor security module overview John Johansen
2 [AppArmor 00/45] AppArmor security module overview John Johansen
3 [RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)
Torok Edwin
4 Linux Security *Module* Framework (Was: LSM conversion to Simoninterface
static Arlott
5 [RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones
6 [PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Schaufler
Casey Control Kernel
7 AppArmor FAQ John Johansen
8 [PATCH 00/28] Permit filesystem local caching [try #2] David Howells
9 [AppArmor 00/44] AppArmor security module overview John Johansen
10 [TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa
66. LSM important threads top 10
Subject By
1 [AppArmor 00/41] AppArmor security module overview John Johansen
2 [AppArmor 00/45] AppArmor security module overview John Johansen
3 [RFC][PATCH 0/7] fireflier LSM for labeling sockets based on its creator (owner)
Torok Edwin
4 Linux Security *Module* Framework (Was: LSM conversion to Simoninterface
static Arlott
5 [RFC][PATCH 0/11] security: AppArmor - Overview Tony Jones
6 [PATCH] Version 3 (2.6.23-rc8) Smack: Simplified Mandatory Access Schaufler
Casey Control Kernel
7 AppArmor FAQ John Johansen
8 [PATCH 00/28] Permit filesystem local caching [try #2] David Howells
9 [AppArmor 00/44] AppArmor security module overview John Johansen
10 [TOMOYO #7 00/30] TOMOYO Linux 1.6.0 released Tetsuo Handa
• 4 LSM related (including 1 for Smack)
• 1 for TOMOYO
• 5 out of 10 belong to AppArmor
74. Summary
• Numbers of messages passing by every day
• We always have a lot of things to do and it’s hard to
stop by and think about the past
• I felt we were doing kind of waste and that was a
major motivation of this attempt
• Despite of the amount time I spent, I don’t really
think I found out something quite new ...
• There should be more wise way to extract valuable
information from the past