Terry Shannon (writer)
   HOME





Terry Shannon (writer)
Terry Craig Shannon (August 16, 1952 – May 26, 2005) was an American information technology consultant, journalist and author. For over 30 years, he was involved in implementing PDP, VAX, and Alpha computers with their respective operating systems RSX, VAX/VMS, OpenVMS and Windows NT. He was a respected journalist and analyst, paying particular attention to Compaq and Hewlett-Packard after the merger of Digital Equipment Corporation and the high-performance computing (HPC) space, writing a series of newsletters. He has been credited with assigning Intel Corporation the nickname " Chipzilla". Terry Shannon participated and was a keynote speaker at DECUS (the Digital Equipment Corporation Users Society), the international users group of Digital Equipment Corporation (DEC), later known as Connect, and currently HP-Interex. He also spoke as an authority at other IT and HPC conferences, and was quoted by other authors as an authority on the subject. Early life Terry Craig Shanno ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

New York (state)
New York, also called New York State, is a U.S. state, state in the northeastern United States. Bordered by New England to the east, Canada to the north, and Pennsylvania and New Jersey to the south, its territory extends into both the Atlantic Ocean and the Great Lakes. New York is the List of U.S. states and territories by population, fourth-most populous state in the United States, with nearly 20 million residents, and the List of U.S. states and territories by area, 27th-largest state by area, with a total area of . New York has Geography of New York (state), a varied geography. The southeastern part of the state, known as Downstate New York, Downstate, encompasses New York City, the List of U.S. cities by population, most populous city in the United States; Long Island, with approximately 40% of the state's population, the nation's most populous island; and the cities, suburbs, and wealthy enclaves of the lower Hudson Valley. These areas are the center of the expansive New ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Signals Intelligence
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmissions. Since the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), adversarial behavior. More generally, cryptography is about constructing and analyzing Communication protocol, protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (confidentiality, data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, Smart card#EMV, chip-based payment cards, digital currencies, password, computer passwords, and military communications. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Traffic Analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted. In general, the greater the number of messages observed, the greater information be inferred. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is also a concern in computer security. Traffic analysis tasks may be supported by dedicated computer software programs. Advanced traffic analysis techniques which may include various forms of social network analysis. Traffic analysis has historically been a vital technique in cryptanalysis, especially when the attempted crack depends on successfully seeding a known-plaintext attack, which often requires an inspired guess based on how specific the operational context might likely influence what an adversary communicates, which may be sufficient to establish a short cr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Communications
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or by wireless communication. The devices may be connected in a variety of network topologies. In order to communicate over the network, computers use agreed-on rules, called communication protocols, over whatever medium is used. The computer network can include personal computers, servers, networking hardware, or other specialized or general-purpose hosts. They are identified by network addresses and may have hostnames. Hostnames serve as memorable labels for the nodes and are rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol. Computer networks may be classified by many criteria, including the transmission medium used to carry sig ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Vietnam War
The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam was supported by the Soviet Union and China, while South Vietnam was supported by the United States and other anti-communist nations. The conflict was the second of the Indochina wars and a proxy war of the Cold War between the Soviet Union and US. The Vietnam War was one of the postcolonial wars of national liberation, a theater in the Cold War, and a civil war, with civil warfare a defining feature from the outset. Direct United States in the Vietnam War, US military involvement escalated from 1965 until its withdrawal in 1973. The fighting spilled into the Laotian Civil War, Laotian and Cambodian Civil Wars, which ended with all three countries becoming Communism, communist in 1975. After the defeat of the French Union in the First Indoc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SIGINT
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmissions. Since the Bri ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget. Still, information available as of 2013 indicates that the C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Army Security Agency
The United States Army Security Agency (ASA) was the United States Army, United States Army's signals intelligence branch from 1945 to 1977. The Latin motto of the Army Security Agency was ''Semper Vigilis'' (Vigilant Always), which echoes the declaration, often mistakenly attributed to Thomas Jefferson, that "q:Thomas Jefferson#Misattributed, The price of liberty is eternal vigilance." Although most ASA units focused upon SIGINT (signals intelligence) most if not all ASA units contained HUMINT (human intelligence) specialists as well, mostly interrogators and counter-intelligence specialists. At the end of the Cold War era, some ASA units also were staffed with ELINT (electronic intelligence) specialists and warrant officers, which incorporated field Electronic countermeasure, ECM (electronic counter-measures and field Electronic counter-countermeasures, ECCM (electronic counter-countermeasures) such as tactical jammers, direction finders, electronic signal decoys, and captured ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Vietnam
Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and dependencies by population, fifteenth-most populous country. One of two communist states in Southeast Asia, Vietnam shares land borders with China to the north, and Laos and Cambodia to the west. It shares Maritime boundary, maritime borders with Thailand through the Gulf of Thailand, and the Philippines, Indonesia, and Malaysia through the South China Sea. Its capital is Hanoi and its largest city is Ho Chi Minh City. Vietnam was inhabited by the Paleolithic age, with states established in the first millennium BC on the Red River Delta in modern-day northern Vietnam. Before the Han dynasty's invasion, Vietnam was marked by a vibrant mix of religion, culture, and social norms. The Han dynasty annexed Northern and Central Vietnam, which were subs ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Military Intelligence
Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making process, their decisions. This aim is achieved by providing an intelligence analysis, assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination. Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and d ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]