When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Project Jupyter - Wikipedia

    en.wikipedia.org/wiki/Project_Jupyter

    A Jupyter Notebook document is a JSON file, following a versioned schema, usually ending with the ".ipynb" extension. The main parts of the Jupyter Notebooks are: Metadata, Notebook format and list of cells. Metadata is a data Dictionary of definitions to set up and display the notebook. Notebook Format is a version number of the software.

  3. IPython - Wikipedia

    en.wikipedia.org/wiki/IPython

    IPython continued to exist as a Python shell and kernel for Jupyter, but the notebook interface and other language-agnostic parts of IPython were moved under the Jupyter name. [ 11 ] [ 12 ] Jupyter is language agnostic and its name is a reference to core programming languages supported by Jupyter, which are Julia , Python , and R .

  4. Kernel page-table isolation - Wikipedia

    en.wikipedia.org/wiki/Kernel_page-table_isolation

    In January 2018, the Meltdown vulnerability was published, known to affect Intel's x86 CPUs and ARM Cortex-A75. [22] [23] It was a far more severe vulnerability than the KASLR bypass that KAISER originally intended to fix: It was found that contents of kernel memory could also be leaked, not just the locations of memory mappings, as previously thought.

  5. Kernel panic - Wikipedia

    en.wikipedia.org/wiki/Kernel_panic

    After recompiling a kernel binary image from source code, a kernel panic while booting the resulting kernel is a common problem if the kernel was not correctly configured, compiled or installed. [8] Add-on hardware or malfunctioning RAM could also be sources of fatal kernel errors during start up, due to incompatibility with the OS or a missing ...

  6. Meltdown (security vulnerability) - Wikipedia

    en.wikipedia.org/wiki/Meltdown_(security...

    Meltdown exploits a race condition, inherent in the design of many modern CPUs.This occurs between memory access and privilege checking during instruction processing. . Additionally, combined with a cache side-channel attack, this vulnerability allows a process to bypass the normal privilege checks that isolate the exploit process from accessing data belonging to the operating system and other ...

  7. Core dump - Wikipedia

    en.wikipedia.org/wiki/Core_dump

    Kernel memory dump – contains all the memory in use by the kernel at the time of the crash. Small memory dump – contains various info such as the stop code, parameters, list of loaded device drivers, etc. Automatic Memory Dump (Windows 8 and later) – same as Kernel memory dump, but if the paging file is both System Managed and too small ...

  8. Address space layout randomization - Wikipedia

    en.wikipedia.org/wiki/Address_space_layout...

    Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. [1] In order to prevent an attacker from reliably redirecting code execution to, for example, a particular exploited function in memory, ASLR randomly arranges the address space positions of key data areas of a process, including the base of the ...

  9. Slab allocation - Wikipedia

    en.wikipedia.org/wiki/Slab_allocation

    When the allocator is asked to free the object's memory, it just adds the slot to the containing slab's list of free (unused) slots. The next call to create an object of the same type (or allocate memory of the same size) will return that memory slot (or some other free slot) and remove it from the list of free slots.