Owl Computing Technologies Partners with University of Waterloo
The network security firm engages researchers for program command analysis
RIDGEFIELD, Conn., Oct. 16, 2013 /PRNewswire/ — Owl Computing Technologies, Inc., a network security and information solutions provider, is pleased to announce a research engagement with the University of Waterloo. The project, entitled “Hunting for Architectural Working Knowledge” (Hawk), is designed to assist with scripting program commands.
Coordinated through the University’s Cheriton School of Computer Science, the Hawk project is being led by principle researchers Ric Holt and Michael Godfrey. Primarily responsible for the project’s technical content, Holt and Godfrey are also working with Associate Professor Ian Davis, who handles the project’s software tool development.
The purpose of the Hawk project is to have researchers analyze BASH – command processor or Unix shell scripts for the purposes of extracting and categorizing variable types, as well as isolating configuration parameters from program logic. The project has been working to develop two software conversion tool sets from the extrapolated results. The first set is considered an interim tool for producing an XML file, which handles dynamic system configurations. The second tool ports the XML formatted file back into another, state-of-the-art scripting language.
The end result of the project is expected to produce a script that provides greater flexibility, and is intended to lead to the production of automatic/HTML-like menu generation.
Owl’s engagement with the University compliments existing efforts to enable secure, reliable, and robust one-way information sharing and real-time collection for all data types, including historian replication, streaming full motion video, scanned file, and SMTP email systems.
Since end-user requirements vary between clients and evolve over time, software distributed by Owl must be specifically configured to align with the client’s stated needs, expectations, operational environment, and purchased features. To enable such customization, software products are architected and built by configuring common infrastructure components together with product-specific code. Each client configuration is generated by a collection of scripts, and the Waterloo research engagement should assist with this.
About Owl Computing Technologies, Inc.
Owl Computing Technologies is the leading source for next generation network security. Owl’s DualDiode® Technology, a proprietary data diode, has been successfully deployed in over 1500 solutions across government, military and critical infrastructure networks. Owl’s hardware-enforced technology enables secure, reliable and robust information sharing for all files sizes and data types.
CONTACT: Erica Taguiam, 646.564.3880, email@example.com
SOURCE Owl Computing Technologies, Inc.