CyberArchive 1.1

License: Free ‎File size: 662.63 KB
‎Users Rating: 4.0/5 - ‎1 ‎votes

Cyber Archive is a data compression and archival program which also serves as a demonstration for the Cyber Compression Suite and Cyber Operations'' data compression services. Our service includes taking your existing data or file format and creating a matching compression algorithm for maximum optimization of the data structure. Using our large array of compression algorithms and strategies we can produce a product that far outperforms off-the-shelf compression engines such as zlib. We can custom produce a compression algorithm with emphasis on throughput, compression ratio, memory requirements, or any other factors that are important to the customer. Numerous algorithms working together in Cyber Archive allow the proper emphasis on speed, compression ratio, and memory requirements for a particular application. Cyber Archive includes an abundance of algorithms, but is also designed to allow new (or special purpose) algorithms to be easily integrated into the system. A sequence of algorithms is applied to raw information based on several factors. Some algorithms are used for speed critical situations. More complex algorithms are used when maximum compression is a priority. Cyber Archive can determine the most effective algorithm based on heuristics of the data being compressed, and the required data throughput of the system. Cyber Compression Suite is OS independent. Cyber Compression Suite compression methods and algorithms include zlib, LZP, LZFast, arithmetic encoding variants, BWT, and the Markov model based X1 algorithm. Please visit the Cyber Operations website for more information on CyberArchive including a whitepaper on our Compression Suite.

VERSION HISTORY

  • Version 1.1 posted on 2006-11-15

Program Details

EULA

Cyber Operations, Inc. grants you a non-exclusive and non-transferable license for personal or internal business purposes and only the for executable code versions of the product. You are authorized to use only a single copy of the software on each of the computers for which you have purchased a license. Each permitted copy of the software may be used only in connection with a single computer owned or leased by you. Only the licensed user may use a single-user version of the product. If the software is installed on a network where multiple users have access to the program, then a license must be purchased for each user who has access to the program. Licensee may not modify or create any derivative works of the product or documentation. Licensee may not decompile, dissassemble, reverse-engineer, or otherwise attempt to derive the source code for the product, except to the extent applicable laws specifically prohibit such restriction. Licensee may not redistribute, encumber, sell, rent, lease, sub-license, or otherwise transfer rights to the product. Licensee may not remove or alter any trademark, logo, copyright, or other proprietary notices legends, symbols, or labels in the product or documentation. Disclaimer of warranties: You agree that Cyber Operations, Inc. has made no express warranties to you regarding the software and that the software is being provided to you "as is" without warranty of any kind. Cyber Operations, Inc. disclaims all warranties with regard to the software, express or implied, including, without limitation, any implied warranties of fitness for a particular purpose, merchantability, quality, or noninfringement of third party rights. Some states or jurisdictions do not allow the exclusion of implied warranties so the above limitations may not apply to you. Limit of liability: In no event will Cyber Operations, Inc. be liable to you for any loss of use, interruption of business, or any direct, indirect, special, incidental, or consequential damages of any kind, including lost profits, regardless of the form of action whether in contract, tort (including negligence), strict product liability, or otherwise, even if Cyber Operations, Inc. has been advised of the possibility of such damages. Some states or jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.