詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "Who" UNIX
417件中 1-20の結果を表示しています
  • Nobuo TAKAHASHI, Tomofumi TAKAMATSU
    Annals of Business Administrative Science
    2013年 12 巻 3 号 123-137
    発行日: 2013/06/15
    公開日: 2013/06/15
    ジャーナル オープンアクセス
    From 1992 to 1994, BSD which was
    UNIX
    developed at the University of California, Berkeley (UC Berkeley), found itself involved in a license-related lawsuit filed by AT&T. At around the same time, the GNU project, which developed a
    UNIX
    -like free software not infringing on the AT&T license, was nearing completion—the “jigsaw puzzle"—with the exception of the kernel. Linux, a free
    UNIX
    -style software kernel with open source code free from the AT&T license made its appearance as the desired kernel becoming the “last piece" of the puzzle. A
    UNIX
    -type operating system is an aggregate of single function programs called tools, which are easily substitutable. Under these conditions, the free software system, noted for being “
    UNIX
    running on a PC," was completed in a short span of time. Essential to the success of Linux was its miraculous release timing. It goes without saying that this phenomenon is unlikely to be repeated even under ideal conditions of it being free of charge and open source.
  • 田中 昭夫
    医学図書館
    1996年 43 巻 1 号 44-55
    発行日: 1996/03/20
    公開日: 2011/09/21
    ジャーナル フリー
  • *波田野 裕一
    経営情報学会 全国研究発表大会要旨集
    2010年 2010s 巻 C1-1
    発行日: 2010年
    公開日: 2010/06/14
    会議録・要旨集 フリー
    運用業務のプロセス分析については、ITILやBPMなどさまざまな分析の提案がなされてきた。 <br/>運用フレームワークfwopでは、運用業務を遂行する組織、個人に着目し、運用組織に求められる 10 の機能を業務機能ユニットとしてモデル化することで、運用業務プロセス全般を表現しようとしている。 <br />本発表では、この「業務機能ユニット」のコンセプトを紹介するとともに、「業務機能ユニット」で表現された運用業務プロセスの、1.標準化による効率化2. 業務特性に従ったモデル化による展開容易性の実現3. 運用業務基盤に反映 (実装) するための「運用アーキテクチャ」の3つの展望について述べる。
  • 水島 洋, 口野 嘉幸
    Genome Informatics
    1993年 4 巻 446-450
    発行日: 1993年
    公開日: 2011/07/11
    ジャーナル フリー
    National Cancer Center Research Institute has about 200 researchers. Most of them are engaged in studies of molecular biology. Before the introduction of Local Area Network system (LAN), each division in our institute had their own genetic analysis system working independently. As we integrated LAN and connected it to the internet by joining TISN, we planned to make a total system for genetic analysis. Our concept was to make a system so that all researchers can use updated versions of database and analyze their data by supercomputers, easily. We thought it is hard for all researchers to use
    UNIX
    commands to perform their searches and retrievals to the database. So, our system is consisted with PC-9801 or Macintosh based system. It uses daily-updated database from NCBI to search by PC-9801 or macintosh programs. It includes gopher system to retrieve required sequence from database, and connection to mail-servers at many places to perform homology searches using supercomputers. As we are maintaining a gopher server in our institute, we are now making a gopher interface to many databases to retrieve and search data easily. We are performing many services not only to the researchers in our institute but also to the researchers outside our institute.
  • *Ayahiko Niimi, Kei Ito
    SCIS & ISIS
    2010年 2010 巻 SA-C5-2
    発行日: 2010年
    公開日: 2012/03/28
    会議録・要旨集 フリー
    In light of the development of information-processing technology and its globalization because of the spread of the Internet, the promotion of IT talent is strongly required, and the creation of not only programming techniques, but also an entire information system and the education of managerial techniques are required. However, in the system-management practice domain, it takes time to prepare a practice environment and to evaluate the possible problem solutions. In this paper, we propose a practice support system for system management, and report on the results of its actual use in real practice
  • Syunji Yazaki, Hideaki Tsuchiya, Hiroaki Ishihata
    Journal of Information Processing
    2018年 26 巻 376-385
    発行日: 2018年
    公開日: 2018/05/15
    ジャーナル フリー

    In this paper, we describe the details of the design and implementation of our Front-end Environment for Hands-on Activities (FEHA), which is a web-based programming environment. FEHA provides a programming environment on the web and utilizes existing

    Unix
    -like systems that equip a specialized programming environment as the build and runtime platform. FEHA controls the existing systems by using Secure SHell (SSH) and Rsync without any modification of the existing systems. We discuss a case study of FEHA in which it was applied to actual programming lectures at a university. In the lectures, 70% of the students completed registrations to use FEHA in about 3 min. In addition, they could understand how to use the FEHA and started submitting codes within several minutes after the registration. The case study shows that FEHA is able to provide a specialized programming environment for more than 100 students with a small amount of effort from the instructor and system administrator.

  • ケン・トンプソン 博士, デニス・リッチー 博士
    学術の動向
    2011年 16 巻 8 号 8_109
    発行日: 2011/08/01
    公開日: 2011/12/09
    ジャーナル フリー
  • Sigeru OKAMOTO, Ryoichi INOUE, Yosiaki NAKAMURA, Kohei HATSUSE
    Bulletin of the Faculty of Science, Ibaraki University. Series A, Mathematics
    1986年 18 巻 19-21
    発行日: 1986/05/31
    公開日: 2009/07/09
    ジャーナル フリー
  • Hideo Shinagawa, Ei-ichi Honda, Takashi Ono, Tohru Kurabayashi, Kimie Ohyama
    Journal of Medical and Dental Sciences
    2004年 51 巻 3 号 147-154
    発行日: 2004年
    公開日: 2016/11/28
    ジャーナル オープンアクセス
    The hardware chosen for fMRI data analysis may depend on the platform already present in the laboratory or the supporting software. In this study, we ran SPM99 software on multiple platforms to examine whether we could analyze fMRI data by SPM99, and to compare their differences and limitations in processing fMRI data, which can be attributed to hardware capabilities. Six normal right-handed volunteers participated in a study of hand-grasping to obtain fMRI data. Each subject performed a run that consisted of 98 images. The run was measured using a gradient echo-type echo planar imaging sequence on a 1.5T apparatus with a head coil. We used several personal computer (PC),
    Unix
    and Linux machines to analyze the fMRI data. There were no differences in the results obtained on several PC,
    Unix
    and Linux machines. The only limitations in processing large amounts of the fMRI data were found using PC machines. This suggests that the results obtained with different machines were not affected by differences in hardware components, such as the CPU, memory and hard drive. Rather, it is likely that the limitations in analyzing a huge amount of the fMRI data were due to differences in the operating system (OS).
  • 阿久津 達也
    Genome Informatics
    1993年 4 巻 430-433
    発行日: 1993年
    公開日: 2011/07/11
    ジャーナル フリー
    We have been developing an interactive database system for three dimensional protein structures named PROTEIX. The most important feature of PROTEIX is that it has pattern matching facilities for three dimensional protein structures. For example, such functions as substructure search and alignment of two protein structures are included. As well as such functions, PROTEIX has the following facilities: a mechanism for inputing a file in PDB (Protein Data Bank) data format, an interactive graphic interface, and various pattern matching functions for amino acid sequences (strings).
    Currently, PROTEIX is being developed and is used as a workbench for developing pattern matching algorithms. The final target of the system is to be a prototype of a powerful tool for biologists
    who
    study relations between amino acid sequences and three dimensional structures of proteins. PROTEIX is implemented on
    UNIX
    workstations using C-language. X-window is adopted for the graphic interface.
  • James C. LIU, Kunio HIJIKATA
    伝熱研究
    1994年 33 巻 130 号 57-85
    発行日: 1994年
    公開日: 2010/12/16
    ジャーナル フリー
    This article is a summary of basic system administration for configuring client-server computers connected to the Internet. Thisarticle assumes that the reader has some basic knowledge of the
    UNIX
    operating system. The goal of this summary is to provideresearchers in the academic and corporate research environments a short handbook, which will allow them to maintain a basic network ofworkstations, minimize disk utilization, optimize network cpu performance, and to better disseminate information to other researchers.This also describes the procedures to install most free software, including X-windows, FTP and HTTP information servers and Mosaicclients. The document focuses specifically on the Sparc/SunOS based platforms, but should be useful in administering other types ofworkstations. This handbook is not designed to replace the many volume sets of documentation provided by vendors, but rather, it listshelpful tips that may be scattered throughout the documentation. The main goal of providing these system administration procedures isto encourage better networking in the research environment. By following the steps in this handbook, a research group should be able toinstall many of the network servers to provide freer access to information at their site. This information can be beneficial to the otherresearchers at the local site or to the rest of the computing public. This handbook describes how to install and use the Mosaic Internetbrowser. As a tutorial, users will be shown how to read this document on-line with Mosaic. Lastly, this article announces thebeginning of on-line articles for Thermal Science and Engineering which is a Journal of the Heat Transfer Society of Japan.
  • 田中 正興, 高橋 岳之, 後藤 雅史
    四日市大学論集
    2000年 13 巻 1 号 1-8
    発行日: 2000/09/01
    公開日: 2019/12/01
    ジャーナル フリー
  • Masayuki Hatta
    Annals of Business Administrative Science
    2022年 21 巻 5 号 91-102
    発行日: 2022/10/15
    公開日: 2022/10/15
    [早期公開] 公開日: 2022/10/13
    ジャーナル オープンアクセス

    In the world of open source constructed on the basis of the

    Unix
    philosophy, there are cases of unsung heroic programs in obscure locations being maintained in a detailed way by a single unknown person or a small number of unknown people, mainly for personal reasons. However, if once these small programs close to the bottom rung of the ladder break, it may cause a loss of balance and collapse of our entire modern infrastructure. This is referred to as the Nebraska Problem in this paper. We can see from the actual and serious case of the Heartbleed bug that “the number of eyeballs” taken for granted in Linus's Law up to this point needs to be proactively secured, and we need to consider complementary measures, such as SBOM, against risk in advance.

  • インターネットのセキュリティ
    白橋 明弘
    情報管理
    1996年 39 巻 7 号 525-539
    発行日: 1996年
    公開日: 2001/04/01
    ジャーナル フリー
    インターネットが爆発的に成長を遂げている現在、インターネットに多数の民間企業などが参加し、社会的に重要な情報が載るようになった。それに伴い、侵入などの行為を組織的に行う犯罪者も現れ、それに対する備えが必要となってきた。さらにインターネット上でのオンライン取り引きに対する期待が高まるとともに、暗号化や認証といった技術に対する要求も高まってきている。そのような中でのインターネットにおけるセキュリティの取り組み方、基本知識、技術について述べ、セキュリティ対策の重要性を論じた。
  • Linuxはなぜ成功したのか
    高橋 伸夫, 高松 朋史
    赤門マネジメント・レビュー
    2002年 1 巻 4 号 283-308
    発行日: 2002/07/25
    公開日: 2018/03/20
    ジャーナル フリー

    Linuxの成功によって、オープン・ソース戦略を採用する企業が増えている。しかし、Linuxが成功した経緯を整理してみると、Linux成功の本質は、オープン・ソース戦略にあるのではなく、「奇跡」的な投入のタイミングと、Microsoft社にも通ずるソフトウェア開発参加者のモティベーションを高める開発スタイルにあった。

  • Takashi Yamanoue, Kentaro Oda, Koichi Shimozono
    Information and Media Technologies
    2013年 8 巻 2 号 576-584
    発行日: 2013年
    公開日: 2013/06/15
    ジャーナル フリー
    Locating malicious bots in a large network is problematic because the internal firewalls and network address translation (NAT) routers of the network unintentionally contribute to hiding the bots' host address and malicious packets. However, eliminating firewalls and NAT routers merely for locating bots is generally not acceptable. In the present paper, we propose an easy to deploy, easy to manage network security control system for locating a malicious host behind internal secure gateways. The proposed network security control system consists of a remote security device and a command server. The remote security device is installed as a transparent link (implemented as an L2 switch), between the subnet and its gateway in order to detect a host that has been compromised by a malicious bot in a target subnet, while minimizing the impact of deployment. The security device is controlled remotely by ‘polling’ the command server in order to eliminate the NAT traversal problem and to be firewall friendly. Since the remote security device exists in transparent, remotely controlled, robust security gateways, we regard this device as a beneficial bot. We adopt a web server with wiki software as the command server in order to take advantage of its power of customization, ease of use, and ease of deployment of the server.
  • Takashi Yamanoue, Kentaro Oda, Koichi Shimozono
    Journal of Information Processing
    2013年 21 巻 2 号 237-245
    発行日: 2013年
    公開日: 2013/04/15
    ジャーナル フリー
    Locating malicious bots in a large network is problematic because the internal firewalls and network address translation (NAT) routers of the network unintentionally contribute to hiding the bots' host address and malicious packets. However, eliminating firewalls and NAT routers merely for locating bots is generally not acceptable. In the present paper, we propose an easy to deploy, easy to manage network security control system for locating a malicious host behind internal secure gateways. The proposed network security control system consists of a remote security device and a command server. The remote security device is installed as a transparent link (implemented as an L2 switch), between the subnet and its gateway in order to detect a host that has been compromised by a malicious bot in a target subnet, while minimizing the impact of deployment. The security device is controlled remotely by ‘polling’ the command server in order to eliminate the NAT traversal problem and to be firewall friendly. Since the remote security device exists in transparent, remotely controlled, robust security gateways, we regard this device as a beneficial bot. We adopt a web server with wiki software as the command server in order to take advantage of its power of customization, ease of use, and ease of deployment of the server.
  • Takaaki NIHEI, Zaheer AHMED, Md. Alamgir Hossen BHUIYAN, Mohammad Ismail HOSSAIN, Wahid ULLAH
    地理学論集
    2023年 98 巻 1 号 1-8
    発行日: 2023年
    公開日: 2024/05/03
    ジャーナル フリー
  • Fumihiko IKUINE, Hideki FUJITA
    Annals of Business Administrative Science
    2014年 13 巻 5 号 283-298
    発行日: 2014/10/15
    公開日: 2014/10/15
    ジャーナル オープンアクセス
    In terms of software, “continuous development” of the software is the best quality assurance. Continuous development requires either the original developer to continue development, or the next generation of developers to take over the development. It has been noted that when the original developer has used “open source,” a development paradigm in which the source code is kept open to all, highly motivated and competent developers will participate in development. This makes it easier for a project to survive. However, at the same time, when the source code is opened to a broad audience a fork in the source code tends to occur. When this happens, those with a high level of competence and motivation abandon the development and go their separate ways. In such a situation, it is difficult for a project to survive. In the case of Denshin 8 go, a guardian for the source code was appointed, and the original developer and the guardians avoided this dilemma. Richard Stallman of the GNU project and Linus Torvalds of Linux project act as legitimate guardians to avoid fork.
  • Shin-ichi Nakagawa, Mieko Kimura, Yoshinori Itokawa, Yoshiya Kasahara, Toru Sato, Iwane Kimura
    Journal of Epidemiology
    1995年 5 巻 3 号 131-140
    発行日: 1995年
    公開日: 2007/11/30
    ジャーナル フリー
    In order to develop the distributed database management system for total health care management on the Internet (the world wide computer network) as an infrastructure, a new distributed type network-based database management system using the electronic mail (e-mail) system was reported in this paper. The basic architecture of this system is as follows ; (1) the history management server stores only the consultation record of about 100, 000-population, (2) it also indicates the medical consultation records and health care histories (when, where, and summary of medical procedures) of the each person when it is required, (3) the facility management system stores the raw data of each person and sends it when the patient or doctor makes a request through the history management server. A model system was built using the e-mail system in an Internet environment on a
    UNIX
    * workstation as an experiment. The performance of this model was considered to be adequate for practical use since the basic facilities can be easily set up. J Epidemiol. 1995; 5 : 131-140.
feedback
Top