node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
386 | 9 | Variable_shadowing:variable shadowing computer programming variable shadowing occurs variable declared within certain scope decision block method inner class name variable declared outer scope level identifiers names rather variables known name masking outer variable said shadowed inner variable inner identifier said mask outer identifier lead confusion may unclear variable subsequent uses shadowed variable name refer depends name resolution rules language one first languages introduce variable shadowing algol first introduced blocks establish scopes also permitted many derivative programming languages including c c++ java c language breaks tradition allowing variable shadowing inner outer class method containing class if-block containing method case statements switch block languages allow variable shadowing cases others example kotlin allow inner variable function shadow passed argument variable inner block shadow another outer block java allow languages allow passed argument function/method shadow class field languages disallow variable shadowing completely coffeescript following lua code provides example variable shadowing multiple blocks following python code provides another example variable shadowing variable declaration variable assignment python keyword codice_1 introduced python 3 shall used avoid variable shadowing assign non-local variables keyword codice_2 shall used avoid variable shadowing assign global variables ecmascript 6 introduction let const block scoping allow variable shadowing | [
512,
1152,
4777,
8554,
5677,
10510,
8221,
10581,
11574,
10011,
2045
] | Validation |
387 | 3 | Future_Knight:future knight future knight video game released gremlin graphics 1986 several home computer systems space cruiser s.s. rustbucket crashed planet 2749 zragg system passengers taken hostage spegbott terrible minions among princess amelia beloved future knight randolph teleported wreck rustbucket defeat spegbott rescue future knight 2d flip screen platform game player must guide randolph twenty levels hostile robots aliens defeating spegbott rescuing amelia undocumented level editor included spectrum version accessed main menu pressing key combination edit-f-k game reviewed 1990 dragon 158 hartley patricia kirk lesser role computers column part mastertronic mega pack 10 games previously released europe reviewers gave game 1 5 stars stating ’ inside spaceship trying find princess distress really dumb game | [
10931,
9006
] | Test |
388 | 5 | Multiple_Access_with_Collision_Avoidance:multiple access collision avoidance multiple access collision avoidance maca slotted media access control protocol used wireless lan data transmission avoid collisions caused hidden station problem simplify exposed station problem basic idea maca wireless network node makes announcement sends data frame inform nodes keep silent node wants transmit sends signal called request-to-send rts length data frame send receiver allows transmission replies sender signal called clear-to-send cts length frame receive meanwhile node hears rts remain silent avoid conflict cts node hears cts keep silent data transmission complete wlan data transmission collisions may still occur maca wireless macaw introduced extend function maca requires nodes sending acknowledgements successful frame transmission well additional function carrier sense | [
10112,
2306,
8708,
3847,
11288,
2458,
5020,
1192,
11560,
7723,
11181,
7490,
9284,
5321,
7498,
2911,
2785,
5092,
5863,
2802
] | None |
389 | 3 | INT_10H:int 10h int 10h int 10h int 16 shorthand bios interrupt call 10 17th interrupt vector x86-based computer system bios typically sets real mode interrupt handler vector provides video services services include setting video mode character string output graphics primitives reading writing pixels graphics mode use call load ah number desired subfunction load required parameters registers make call int 10h fairly slow many programs bypass bios routine access display hardware directly setting video mode done infrequently accomplished using bios drawing graphics screen game needs done quickly direct access video ram appropriate making bios call every pixel furthermore modern x86 system bios calls performed real mode virtual 8086 mode v8086 option long mode means modern operating system operates protected mode 32 bit long mode 64 bit would need switch real mode back call bios hugely expensive operation although modern systems typically use device drivers directly set video mode feasible hobbyist systems device driver every video card problem also plagues older unsupported systems windows 98 systems instead drop real mode switch video mode draw framebuffer directly | [
5312,
255,
6118,
6730,
1515,
7501,
8301,
5823,
11634,
499,
5080,
4441,
1247
] | Test |
390 | 2 | UserLinux:userlinux userlinux project create operating system based debian targeted business customers goal provide businesses freely available high quality operating system accompanied certifications service support options project initiated bruce perens late 2003 subsequent 2005 major success ubuntu commercial linux distribution based debian canonical ltd. much aims userlinux project lost steam software shipped project ultimately abandoned | [
8837,
7435,
10127,
2321,
4887,
10394,
4123,
673,
3745,
10530,
9253,
10149,
11305,
7854,
7983,
2738,
4790,
439,
56,
59,
3903,
4673,
2375,
4039,
8907,
1110,
9693,
2914,
485,
3685,
9064,
4841,
6890,
7913,
7020,
10860,
7534,
2671,
7920,
8177,... | Test |
391 | 3 | Hacker_II:_The_Doomsday_Papers:hacker ii doomsday papers hacker ii doomsday papers computer game written steve cartwright published activision 1986 sequel 1985 game hacker hacker ii released amiga apple ii apple iigs amstrad cpc atari st commodore 64 ibm pc macintosh zx spectrum hacker ii difficult involved first game hacker ii player actually recruited based upon assumed success activities original game tasked controlling robot time infiltrate secure facility order retrieve documents known doomsday papers well guarded vault ensure security united states eventually escape papers player confronted agents united states reveal actually working former magma employee wanted papers revenge happened company player presumably exposed first game building player unwittingly broken government facility player go back facility part gambit expose magma agent avoiding security threatened player gameplay considerably changed previous game packaging notable including manual describing function four way monitor system provided player hooked camera security network facility player asked infiltrate handful robots available hidden facility case lost using camera system in-game map helps track guard patrols location robots player must explore one floor facility find codes needed open vault escape papers aid player also pre-recorded security tape typical day every camera facility player bypass actual camera feed need area extended time although care needed ensure time stamp matches actual time game discovery guards must avoided costs alerted call huge machine resembles large plate hung looks like metal frame wheels machine pursues player defenseless robot attempt crush plate player try avoid drone although relentless pursuit much faster player robot player robots destroyed game things set alarms include seen patrolling guard constant line sight corridors one cameras see robot incorrectly disabling vault security failing sync bypassed camera feed actual time giving evidence tampering going game also featured escalating problems part player interface begins fail ingame map starts lose progress player robot monitored security cameras guard eventually map player defeated system eventually get vault player may well forced control robot blindly relying maps made player saves available game first title compute described hacker ii original plot criticized inability save favorably reported game graphics detail user interface magazine stated exciting harrowing scenarios 'll find computer game advised recommend anyone weak heart computer gaming world praised hacker ii graphics design atari st stated game accurately depicted system cracking hacker cautioned difficulty scale would appeal everyone info gave commodore 64 version four stars five describing superior sequel original ... engrossing challenging espionage game | [
4579
] | None |
392 | 3 | ARM_Cortex-A53:arm cortex-a53 arm cortex-a53 one first two microarchitectures implementing armv8-a 64-bit instruction set designed arm holdings cambridge design centre cortex-a53 2-wide decode superscalar processor capable dual-issuing instructions announced october 30th 2012 marketed arm either stand-alone energy-efficient alternative powerful cortex-a57 microarchitecture used alongside powerful microarchitecture big.little configuration available ip core licensees like arm intellectual property processor designs arm cortex-a53 processor used lemaker hikey since 2015 raspberry pi 3 since february 2016 cortex-a53 also used number qualcomm snapdragon socs semi-custom derivatives cortex-a53 used kryo 250 kryo 260 cpus processor used odroid-c2 roku streaming media players high-end models 2016 2017 models another notable cortex-a53 application pine a64/a64+ single-board computer cores used 24-core soc socionext synquacer sc2a11 processor used amazon fire tablets including fire hd 8 fire hd 10 latter also includes cortex-a72 cores | [
11282,
9235,
11289,
1057,
38,
8231,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
10361,
638,
644,
7300,
11396,
9863,
8842,
146,
659,
7833,
666,
5786,
6815,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
6391,
... | Test |
393 | 9 | Compile_time_function_execution:compile time function execution compile-time function execution compile time function evaluation general constant expressions ability compiler would normally compile function machine code execute run time execute function compile time possible arguments function known compile time function make reference attempt modify global state pure function value arguments known compiler may still able perform level compile-time function execution partial evaluation possibly producing optimized code arguments known lisp macro system early example use compile-time evaluation user-defined functions language metacode extension c++ vandevoorde 2003 early experimental system allow compile-time function evaluation ctfe code injection improved syntax c++ template metaprogramming earlier versions c++ template metaprogramming often used compute values compile time using compile-time function evaluation code used compute factorial would similar one would write run-time evaluation e.g using c++11 constexpr c++11 technique known generalized constant expressions codice_1 c++14 relaxes constraints constexpr – allowing local declarations use conditionals loops general restriction data required execution available compile-time remains example compile time function evaluation c++14 example compile time function evaluation programming language example specifies valid function called factorial would typically evaluated run time use codice_2 tells compiler initializer variables must computed compile time note arguments function must able resolved compile time well ctfe used populate data structures compile-time simple way version 2 | [
1952,
6502,
5165,
10616,
2620,
10013
] | Test |
394 | 2 | OSv:osv osv stylized os cloud computing focused computer operating system released september 16 2013 special-purpose operating system built run guest top virtual machine thus include drivers bare-metal hardware unikernel designed run single linux executable application written one supported runtime environments java reason support notion users multiuser system processes everything runs kernel address space using single address space removes time-consuming operations associated context switching uses large amounts code freebsd operating system particular network stack zfs file system osv managed using rest management api optional command line interface written lua | [
2560,
6153,
6155,
6675,
7187,
10776,
25,
4637,
546,
4643,
6180,
9762,
5158,
7217,
10803,
9784,
10809,
576,
2625,
8262,
1101,
6221,
3160,
10333,
97,
4194,
10851,
11363,
6760,
9320,
8298,
9835,
10856,
7285,
4727,
2168,
9335,
634,
1147,
3197... | Validation |
395 | 4 | Multibook:multibook multibook taclane multibook single laptop combines two three different classified networks single device solution currently secure computing standards require federal government military personnel maintain multiple pcs different networks effort allow users simultaneous access unclassified classified information multibook simply complex configuration allows separate enclaves virtual machines one display multibook hard drive uses cryptographic ignition key create virtual hard drive space type 1 comsec element found inside multibook ’ integrated suite b security module security module known haipe protects information stored computer well data sent networks classified secret due lack stored collateral data multibooks burdensome comsec handling requirements data rest dar equipment turned multibooks nsa certified protect information classified secret approved suite b information/processing data transit dit encryption protecting information sent classified networks multibook security benefit user device chvp device considered cci like devices used collateral processing | [
2384
] | Test |
396 | 0 | BabelNet:babelnet babelnet multilingual lexicalized semantic network ontology developed sapienza university rome department computer science linguistic computing laboratory babelnet automatically created linking wikipedia popular computational lexicon english language wordnet integration done using automatic mapping filling lexical gaps resource-poor languages using statistical machine translation result encyclopedic dictionary provides concepts named entities lexicalized many languages connected large amounts semantic relations additional lexicalizations definitions added linking free-license wordnets omegawiki english wiktionary wikidata framenet verbnet others similarly wordnet babelnet groups words different languages sets synonyms called babel synsets babel synset babelnet provides short definitions called glosses many languages harvested wordnet wikipedia babelnet version 4.0 covers 284 languages including european languages asian languages latin babelnet 4.0 contains almost 16 million synsets 833 million word senses regardless language babel synset contains 2 synonyms per language i.e. word senses average semantic network includes lexico-semantic relations wordnet hypernymy hyponymy meronymy holonymy antonymy synonymy etc. totaling around 364,000 relation edges well underspecified relatedness relation wikipedia totaling around 1,3 bilion edges version 4.0 also associates 53 million images babel synsets provides lemon rdf encoding resource available via sparql endpoint 2.67 million synsets assigned domain labels babelnet shown enable multilingual natural language processing applications lexicalized knowledge available babelnet shown obtain state-of-the-art results babelnet received meta prize 2015 groundbreaking work overcoming language barriers multilingual lexicalised semantic network ontology making use heterogeneous data sources babelnet featured prominently time magazine article new age innovative up-to-date lexical knowledge resources available web | [
416,
6629,
5639,
8843,
7597,
5903,
7983,
5778,
53,
5781,
538,
10716,
7839
] | Test |
397 | 9 | Harry_Mairson:harry mairson harry george mairson theoretical computer scientist professor computer science volen national center complex systems brandeis university waltham massachusetts research fields logic computer science lambda calculus functional programming type theory constructive mathematics computational complexity theory algorithmics mairson received b.a mathematics yale university 1978 ph.d. computer science stanford university 1984 supervision jeffrey ullman ph.d. thesis program complexity searching table machtey award 1983 ieee symposium foundations computer science focs mairson postdoctoral researcher inria rocqencourt 1984 1985 stanford university 1985 university oxford 1986 held visiting professor position 1999 2001 boston university 2005 2007 mairson served chair faculty senate brandeis currently associate editor journal logical methods computer science information computation sits editorial board higher-order symbolic computation mairson contributions theory programming languages include proving type inference ml programming language so-called hindley–milner type inference complete exponential time parallel beta reduction non-elementary | [
7386,
1783
] | Test |
398 | 3 | Microarchitecture:microarchitecture computer engineering microarchitecture also called computer organization sometimes abbreviated µarch uarch way given instruction set architecture isa implemented particular processor given isa may implemented different microarchitectures implementations may vary due different goals given design due shifts technology computer architecture combination microarchitecture instruction set architecture isa roughly programming model processor seen assembly language programmer compiler writer isa includes execution model processor registers address data formats among things microarchitecture includes constituent parts processor interconnect interoperate implement isa microarchitecture machine usually represented less detailed diagrams describe interconnections various microarchitectural elements machine may anything single gates registers complete arithmetic logic units alus even larger elements diagrams generally separate datapath data placed control path said steer data person designing system usually draws specific microarchitecture kind data flow diagram like block diagram microarchitecture diagram shows microarchitectural elements arithmetic logic unit register file single schematic symbol typically diagram connects elements arrows thick lines thin lines distinguish three-state buses require three-state buffer device drives bus unidirectional buses always driven single source way address bus simpler computers always driven memory address register individual control lines simple computers single data bus organization single three-state bus diagram complex computers usually shows multiple three-state buses help machine operations simultaneously microarchitectural element turn represented schematic describing interconnections logic gates used implement logic gate turn represented circuit diagram describing connections transistors used implement particular logic family machines different microarchitectures may instruction set architecture thus capable executing programs new microarchitectures and/or circuitry solutions along advances semiconductor manufacturing allows newer generations processors achieve higher performance using isa principle single microarchitecture could execute several different isas minor changes microcode pipelined datapath commonly used datapath design microarchitecture today technique used modern microprocessors microcontrollers dsps pipelined architecture allows multiple instructions overlap execution much like assembly line pipeline includes several different stages fundamental microarchitecture designs stages include instruction fetch instruction decode execute write back architectures include stages memory access design pipelines one central microarchitectural tasks execution units also essential microarchitecture execution units include arithmetic logic units alu floating point units fpu load/store units branch prediction simd units perform operations calculations processor choice number execution units latency throughput central microarchitectural design task size latency throughput connectivity memories within system also microarchitectural decisions system-level design decisions whether include peripherals memory controllers considered part microarchitectural design process includes decisions performance-level connectivity peripherals unlike architectural design achieving specific performance level main goal microarchitectural design pays closer attention constraints since microarchitecture design decisions directly affect goes system attention must paid issues chip area/cost power consumption logic complexity ease connectivity manufacturability ease debugging testability general cpus single-chip microprocessors multi-chip implementations run programs performing following steps instruction cycle repeated continuously power turned historically earliest computers multicycle designs smallest least-expensive computers often still use technique multicycle architectures often use least total number logic elements reasonable amounts power designed deterministic timing high reliability particular pipeline stall taking conditional branches interrupts however microarchitectures often perform instructions per unit time using logic family discussing improved performance improvement often relative multicycle design multicycle computer computer four steps sequence several cycles clock designs perform sequence two clock cycles completing successive stages alternate clock edges possibly longer operations occurring outside main cycle example stage one rising edge first cycle stage two falling edge first cycle etc control logic combination cycle counter cycle state high low bits instruction decode register determine exactly part computer design control logic one create table bits describing control signals part computer cycle instruction logic table tested software simulation running test code logic table placed memory used actually run real computer called microprogram computer designs logic table optimized form combinational logic made logic gates usually using computer program optimizes logic early computers used ad-hoc logic design control maurice wilkes invented tabular approach called microprogramming complicating simple-looking series steps fact memory hierarchy includes caching main memory non-volatile storage like hard disks program instructions data reside always slower processor step 2 often introduces lengthy cpu terms delay data arrives computer bus considerable amount research put designs avoid delays much possible years central goal execute instructions parallel thus increasing effective execution speed program efforts introduced complicated logic circuit structures initially techniques could implemented expensive mainframes supercomputers due amount circuitry needed techniques semiconductor manufacturing progressed techniques could implemented single semiconductor chip see moore law instruction sets shifted years originally simple sometimes complex various respects recent years load-store architectures vliw epic types fashion architectures dealing data parallelism include simd vectors labels used denote classes cpu architectures particularly descriptive especially cisc label many early designs retroactively denoted cisc fact significantly simpler modern risc processors several respects however choice instruction set architecture may greatly affect complexity implementing high-performance devices prominent strategy used develop first risc processors simplify instructions minimum individual semantic complexity combined high encoding regularity simplicity uniform instructions easily fetched decoded executed pipelined fashion simple strategy reduce number logic levels order reach high operating frequencies instruction cache-memories compensated higher operating frequency inherently low code density large register sets used factor much slow memory accesses possible one first powerful techniques improve performance use instruction pipelining early processor designs would carry steps one instruction moving onto next large portions circuitry left idle one step instance instruction decoding circuitry would idle execution pipelining improves performance allowing number instructions work way processor time basic example processor would start decode step 1 new instruction last one waiting results would allow four instructions flight one time making processor look four times fast although one instruction takes long complete still four steps cpu whole retires instructions much faster risc makes pipelines smaller much easier construct cleanly separating stage instruction process making take amount time—one cycle processor whole operates assembly line fashion instructions coming one side results due reduced complexity classic risc pipeline pipelined core instruction cache could placed size die would otherwise fit core alone cisc design real reason risc faster early designs like sparc mips often ran 10 times fast intel motorola cisc solutions clock speed price pipelines means limited risc designs 1986 top-of-the-line vax implementation vax 8800 heavily pipelined design slightly predating first commercial mips sparc designs modern cpus even embedded cpus pipelined microcoded cpus pipelining seen area-constrained embedded processors large cisc machines vax 8800 modern pentium 4 athlon implemented microcode pipelines improvements pipelining caching two major microarchitectural advances enabled processor performance keep pace circuit technology based long improvements chip manufacturing allowed even circuitry placed die designers started looking ways use one common add ever-increasing amount cache memory on-die cache simply fast memory accessed cycles opposed many needed talk main memory cpu includes cache controller automates reading writing cache data already cache simply appears whereas processor stalled cache controller reads risc designs started adding cache mid-to-late 1980s often 4 kb total number grew time typical cpus least 512 kb powerful cpus come 1 2 even 4 6 8 12 mb organized multiple levels memory hierarchy generally speaking cache means performance due reduced stalling caches pipelines perfect match previously n't make much sense build pipeline could run faster access latency off-chip memory using on-chip cache memory instead meant pipeline could run speed cache access latency much smaller length time allowed operating frequencies processors increase much faster rate off-chip memory one barrier achieving higher performance instruction-level parallelism stems pipeline stalls flushes due branches normally whether conditional branch taken n't known late pipeline conditional branches depend results coming register time processor instruction decoder figured encountered conditional branch instruction time deciding register value read pipeline needs stalled several cycles branch taken pipeline needs flushed clock speeds increase depth pipeline increases modern processors may 20 stages average every fifth instruction executed branch without intervention high amount stalling techniques branch prediction speculative execution used lessen branch penalties branch prediction hardware makes educated guesses whether particular branch taken reality one side branch called much often modern designs rather complex statistical prediction systems watch results past branches predict future greater accuracy guess allows hardware prefetch instructions without waiting register read speculative execution enhancement code along predicted path prefetched also executed known whether branch taken yield better performance guess good risk huge penalty guess bad instructions need undone even added complexity gates needed support concepts outlined improvements semiconductor manufacturing soon allowed even logic gates used outline processor processes parts single instruction time computer programs could executed faster multiple instructions processed simultaneously superscalar processors achieve replicating functional units alus replication functional units made possible die area single-issue processor longer stretched limits could reliably manufactured late 1980s superscalar designs started enter market place modern designs common find two load units one store many instructions results store two integer math units two floating point units often simd unit sort instruction issue logic grows complexity reading huge list instructions memory handing different execution units idle point results collected re-ordered end addition caches reduces frequency duration stalls due waiting data fetched memory hierarchy get rid stalls entirely early designs cache miss would force cache controller stall processor wait course may instruction program whose data available cache point out-of-order execution allows ready instruction processed older instruction waits cache re-orders results make appear everything happened programmed order technique also used avoid operand dependency stalls instruction awaiting result long latency floating-point operation multi-cycle operations register renaming refers technique used avoid unnecessary serialized execution program instructions reuse registers instructions suppose two groups instruction use register one set instructions executed first leave register set set assigned different similar register sets instructions executed parallel series computer architects become stymied growing mismatch cpu operating frequencies dram access times none techniques exploited instruction-level parallelism ilp within one program could make long stalls occurred data fetched main memory additionally large transistor counts high operating frequencies needed advanced ilp techniques required power dissipation levels could longer cheaply cooled reasons newer generations computers started exploit higher levels parallelism exist outside single program program thread trend sometimes known throughput computing idea originated mainframe market online transaction processing emphasized execution speed one transaction capacity deal massive numbers transactions transaction-based applications network routing web-site serving greatly increasing last decade computer industry re-emphasized capacity throughput issues one technique parallelism achieved multiprocessing systems computer systems multiple cpus reserved high-end mainframes supercomputers small-scale 2–8 multiprocessors servers become commonplace small business market large corporations large scale 16–256 multiprocessors common even personal computers multiple cpus appeared since 1990s transistor size reductions made available semiconductor technology advances multi-core cpus appeared multiple cpus implemented silicon chip initially used chips targeting embedded markets simpler smaller cpus would allow multiple instantiations fit one piece silicon 2005 semiconductor technology allowed dual high-end desktop cpus cmp chips manufactured volume designs sun microsystems ultrasparc t1 reverted simpler scalar in-order designs order fit processors one piece silicon another technique become popular recently multithreading multithreading processor fetch data slow system memory instead stalling data arrive processor switches another program program thread ready execute though speed particular program/thread increases overall system throughput reducing time cpu idle conceptually multithreading equivalent context switch operating system level difference multithreaded cpu thread switch one cpu cycle instead hundreds thousands cpu cycles context switch normally requires achieved replicating state hardware register file program counter active thread enhancement simultaneous multithreading technique allows superscalar cpus execute instructions different programs/threads simultaneously cycle | [
3586,
7170,
7173,
6151,
6663,
5642,
9739,
5645,
9741,
5649,
2066,
7699,
11282,
5655,
11289,
1563,
4124,
10779,
10781,
1057,
6181,
8231,
4139,
2094,
3630,
9774,
2097,
6705,
7218,
8250,
8253,
2623,
2113,
7234,
7235,
7745,
2638,
3159,
1119,
... | None |
399 | 4 | Information_Security_Forum:information security forum information security forum isf independent information security body isf delivers range content activities tools isf paid membership organisation products services included membership fee time time isf makes research documents papers available non-members isf released updated standard good practice information security 2018 standard available isf members non-members purchase copies report 2018 standard represents update 2016 release standard builds upon previous release include up-to-date controls approaches thought leadership information security standard business-focused practical comprehensive guide available identifying managing information security risks organizations 2016 standard covers current information security 'hot topics threat intelligence cyber attack protection industrial control systems well significant enhancement existing topics including information risk assessment security architecture enterprise mobility management used build comprehensive effective information security management system addition covering information security-related standards cobit 5 information security cis critical security controls effective cyber defense 2016 standard covers iso/iec 27002 well pci dss 3.1 nist cybersecurity framework based member input isf selects number topics research given year research includes interviewing member non-member organizations thought leaders academic researchers key individuals well examining range approaches issue resulting reports typically go depth describing issue generally outlining key information security issues considered proposing process address issue based best practices broad fundamental areas information risk assessment return-on-investment calculations isf develops comprehensive methodologies formalize approaches issues supporting methodology isf supplies web spreadsheet-based tools automate functions isf benchmark formerly called 'information security status survey well-established pedigree – harnessing collective input hundreds world leading organizations 25 years organizations participate benchmark service time use web-based tool assess security performance across range different environments compare security strengths weaknesses organizations measure performance isf 2016 standard good practice iso/iec 27002:2013 cobit version 5 information security benchmark provides variety data export functionality used analyzing presenting data management reporting creation security improvement programs updated biennial basis align latest thinking information security provide isf members improved user experiences added value regional chapter meetings activities provide face-to-face networking among individuals isf member organisations isf encourages direct member-to-member contact address individual questions strengthen relationships chapter meetings activities conducted around world address local issues language/cultural dimensions isf annual global conference 'world congress takes place different city year 2017 conference take place october cannes france event offers opportunity attendees discuss find solutions current security challenges gain practical advice peers leading industry experts around world 1,000 global senior executives attend event includes series keynote presentations workshops networking sessions best practice thought leadership confidential peer-group environment isf extranet portal isf live enables members directly access isf materials including member presentations messaging forums contact information webcasts online tools data member use members isf regional chapters elect council develop work program generally represent member interests council elects 'executive group responsible financial strategic objectives see list computing information-security related articles | [
1312,
3552,
10717,
10437,
10823,
4936,
11567,
433,
3447,
6360,
9049,
5373
] | Test |
400 | 3 | Uncharted_Waters:uncharted waters uncharted waters originally released great age sailing japanese video game series produced koei rekoeition brand simulation role-playing video game series dealing sailing trading themed around age discovery games player takes role captain commodore translations manages seagoing fleet participate trades privateering treasure hunting exploration plain piracy even though series largely open-ended still loose plot requires player follow certain paths deviating paths may stall progress story east asia series large cult following received much recognition outside region however compared earlier sid meier pirates gameplay theme japan term daikoukai jidai refers age discovery period 15th century 17th century european explorers sailed seas open new alternative ways asia ottoman empire blocked land routes period characterized rivalry spain portugal advent colonization general exploration later games countries also involved historical events age discovery like treaty tordesillas mentioned game series makes many references historical background although much like pirates treacherous details era idealized create adventurous exciting mood first game series player assumes role leon franco young ambitious son noble family fallen hard times portugal goal game restore family former glory achieve leon dreams three nations represented portugal spain ottoman empire although many neutral ports around world player invest thus make part portugal sphere influence well discovering ports defeating merchants pirates sea battles increases leon fame increased fame leon complete tasks king portugal gain higher titles nobility story set early 16th century released msx nes 1991 sega mega drive/genesis snes 1992 snes version originally titled super daikoukai jidai japan many snes ports koei games english versions also released years respectively game ported pc macintosh well also set 16th century game sequel first title released nec pc-98 snes genesis/mega drive pc 1994 also saw releases 1996 sega saturn playstation japan exclusively snes version released nintendo virtual console japan march 17 2009 north america april 6 2009 wii japan october 30 2013 north america november 14 2013 first time europe november 28 2013 wii u game six protagonists choose representing different path career featured game game less open-ended developing character career necessary advance plot time release snes version game noted contain superior music ports game game took advantage snes nintendo s-smp chip used high quality instrument samples hand console ports game time released consoles used opl2 family chipset music pc could support high quality samples via sound blaster awe32 gravis ultrasound family cards pc port game take advantage advanced solutions instead choosing optimized adlib music cards used opl2 chip music saturn playstation version contained enhanced fmv opening cutscenes reviewing genesis version gamepro deemed game acquired taste due bare bones presentation frequent money-managing concluded interest four masted voyages european discovery could read history book play game excitement levels mobile phone version daikoukai jidai ii series changes include released 1996 pc title first depart formula engine series traditional focus story removed game character customization possible purely decorative two player characters portugal spain although differences mainly mechanical role-playing element greatly reduced theme exploration heavily emphasized land travel possible lot explored discovered overall compared early titles game starts mid fifteenth century allows player make historical discoveries new world route india well conquer civilizations like aztec inca empire also game experiments concept language video game feature uncommon industry necessitating hiring translators teachers player also continue game marrying bar-girls children turn continue seafaring tradition even take part father skills inventory perhaps due dramatic changes daikoukai jidai 3 left players uncomfortable failed achieve much popularity even within japan initial release title caused controversy allowing slave trade game feature disabled later updates unlike games series game never released consoles released pc working windows 2000 released 1997 playstation sega saturn game uses engine ii focuses story two characters instead expounding upon loose plot ties series together two protagonists follows fourth game series released playstation pc windows 2000 xp game returns previous formula although open-endedness decreased engine updated title plot-wise unrelated series ended gaiden porto estado known fine art high-quality illustrations story evolves search seven proof conqueror seven ancient artifacts seven areas around world northern europe mediterranean africa new world indian ocean south asia east asia said proofs proves sailor champion sailors four sailors plus another three expansion unwittingly involved struggle quest search proof conqueror interesting sailors europe two seven characters asia one east asia another southeast asia one caribbean another one middle east many significant changes game example game longer concept years result characters game age player also set regional fleets regional fleets valuable financial resources combat naval battle fought real time country boundaries disappeared character represented guild home country important gameplay ports game also market share rating percentage scale players trade port guild market share port gained signing contract local governor native windows 2000 xp support introduced koei rerelease sourcenext release windows game version adds following rota nova released koei march 23 2006 playstation portable nintendo ds remake porto estado handhelds mobile phone version daikoukai jidai iv series free play web browser game sequel daikoukai jidai iv series version includes sonia de la cruz sr card adds skill female intuition lv.1 rank x merchant vessel black herring herring buss scout ticket gold++ 1 million gold coins start game 5000np scouting points adds 50 free scoutings uncharted waters online offers much gameplay experience seen single player games multiplayer environment players single player series well aware similar concepts missions adjutants investment national pirate npc fleets country boundaries reappeared countries spain portugal venice ottoman empire france england netherlands however concept time non-existent storyline important unlocking new areas game player receives fame activities battling trading discovering sailing fame levels reach required amounts player unlocks new areas world level fame required differ country country game introduces 3d-environment directx 9.0c capabilities mmorpg game features fleet operations party-system companies guilds player versus player combat trade adventure poker large-scale factional warfare along single player storyline player-vs-environment quests soundtracks uncharted waters new horizons composed yoko kanno soundtrack uncharted waters online based part works dave arneson computer gaming world 1992 criticized first uncharted waters inaccurate history geography flawed repetitive game play looking variety surprises weigh anchor sail another game one-dimensional npcs unlike koei games concluded compared could mildly disappointing 1993 survey pre 20th-century strategy games magazine gave game zero stars five stating geography inaccurate user interface could bear improvement game play interesting | [
10371,
11430,
8937,
6797,
9006,
6129,
8945,
11477,
10999,
8285,
2943
] | Test |
401 | 0 | Kumiko_Tanaka-Ishii:kumiko tanaka-ishii kumiko tanaka-ishii born 1969 computational linguist associate professor department creative informatics graduate school information science technology university tokyo japan author semiotics programming award-winning book semiotically analyzing computer programs along three axes models signs kinds signs systems signs tanaka-ishii received doctorate university tokyo 1997 1995 completing phd visiting researcher laboratoire d'informatique pour la mécanique et les sciences de l'ingénieur limsi national center scientific research cnrs paris worked semantic proximity matrices japanese language 2010 awarded suntory prize social sciences humanities okawa publications prize book semiotics programming book critically favorably reviewed linguistic philosophical investigations cognitive technology journal semiotica | [
1890
] | Test |
402 | 4 | Watermark_(data_file):watermark data file watermark stored data file refers method ensuring data integrity combines aspects data hashing digital watermarking useful tamper detection though advantages disadvantages typical data hash process input file produce alphanumeric string unique data file file modified one bit changes occur within original file hash process modified file produce different alphanumeric method trusted source calculate hash original data file subscribers verify integrity data subscriber simply compares hash received data file known hash trusted source lead two situations hash hash different hash results systems involved appropriate degree confidence integrity received data hand hash results different conclude received data file altered process common p2p networks example bittorrent protocol part file downloaded data checked hash key known hash check upon result data kept discarded digital watermarking distinctly different data hashing process altering original data file allowing subsequent recovery embedded auxiliary data referred watermark subscriber knowledge watermark recovered determine certain extent whether significant changes occurred within data file depending specific method used recovery embedded auxiliary data robust post-processing lossy compression data file retrieved image provider embed watermark protection purposes process allows tolerance change still maintaining association original image file researchers also developed techniques embed components image within image help identify portions image may contain unauthorized changes even help recovering lost data disadvantage digital watermarking subscriber significantly alter files without sacrificing quality utility data true various files including image data audio data computer code | [
1456,
4617,
8302
] | Validation |
403 | 4 | Restriction_of_Hazardous_Substances_Directive:restriction hazardous substances directive restriction hazardous substances directive 2002/95/ec rohs 1 short directive restriction use certain hazardous substances electrical electronic equipment adopted february 2003 european union rohs 1 directive took effect 1 july 2006 required enforced became law member state directive restricts exceptions use six hazardous materials manufacture various types electronic electrical equipment closely linked waste electrical electronic equipment directive weee 2002/96/ec sets collection recycling recovery targets electrical goods part legislative initiative solve problem huge amounts toxic electronic waste speech rohs often spelled pronounced refers eu standard unless otherwise qualified european union member state adopt enforcement implementation policies using directive guide rohs often referred lead-free directive restricts use following ten substances dehp bbp dbp dibp added part directive eu 2015/863 published 31 march 2015 pbb pbde flame retardants used several plastics hexavalent chromium used chrome plating chromate coatings primers chromic acid maximum permitted concentrations non-exempt products 0.1 1000 ppm except cadmium limited 0.01 100 ppm weight restrictions homogeneous material product means limits apply weight finished product even component single substance could theoretically separated mechanically — example sheath cable tinning component lead example radio composed case screws washers circuit board speakers etc screws washers case may made homogenous materials components comprise multiple sub-components many different types material instance circuit board composed bare printed circuit board pcb integrated circuits ic resistors capacitors switches etc switch composed case lever spring contacts pins etc. may made different materials contact might composed copper strip surface coating loudspeaker composed permanent magnet copper wire paper etc everything identified homogeneous material must meet limit turns case made plastic 2,300 ppm 0.23 pbb used flame retardant entire radio would fail requirements directive effort close rohs 1 loopholes may 2006 european commission asked review two currently excluded product categories monitoring control equipment medical devices future inclusion products must fall rohs compliance addition commission entertains requests deadline extensions exclusions substance categories substance location weight new legislation published official journal july 2011 supersedes exemption note batteries included within scope rohs however europe batteries european commission 1991 battery directive 91/157/eec recently increased scope approved form new battery directive version 2003/0282 cod official submitted published eu official journal first battery directive addressed possible trade barrier issues brought disparate european member states implementation new directive explicitly highlights improving protecting environment negative effects waste contained batteries also contains programme ambitious recycling industrial automotive consumer batteries gradually increasing rate manufacturer-provided collection sites 45 2016 also sets limits 5 ppm mercury 20 ppm cadmium batteries except used medical emergency portable power-tool devices though setting quantitative limits quantities lead lead–acid nickel nickel–cadmium batteries cites need restrict substances provide recycling 75 batteries substances also provisions marking batteries symbols regard metal content recycling collection information directive applies equipment defined section weee directive following numeric categories apply apply fixed industrial plant tools compliance responsibility company puts product market defined directive components sub-assemblies responsible product compliance course given fact regulation applied homogeneous material level data substance concentrations needs transferred supply chain final producer ipc standard recently developed published facilitate data exchange ipc-1752 enabled two pdf forms free use rohs applies products eu whether made within eu imported certain exemptions apply updated occasion eu rohs restricted substances used broad array consumer electronics products examples components contained lead include cadmium found many components examples include plastic pigmentation nickel–cadmium nicd batteries cds photocells used night lights mercury used lighting applications automotive switches examples include fluorescent lamps mercury tilt switches rarely used nowadays hexavalent chromium used metal finishes prevent corrosion polybrominated biphenyls diphenyl ethers/oxides used primarily flame retardants rohs efforts reduce hazardous materials electronics motivated part address global issue consumer electronics waste newer technology arrives ever-increasing rate consumers discarding obsolete products sooner ever waste ends landfills countries like china recycled fashion-conscious mobile market 98 million u.s. cell phones took last call 2005 told epa estimates u.s. year 1.5 1.9 million tons computers tvs vcrs monitors cell phones equipment discarded sources electronic waste tallied could total 50 million tons year worldwide according un environment programme american electronics sent offshore countries like ghana west africa guise recycling may harm good adult child workers jobs poisoned heavy metals metals returning u.s. u.s. right shipping large quantities leaded materials china china world major manufacturing center dr. jeffrey weidenhamer says chemistry professor ashland university ohio surprising things coming full circle 're getting contaminated products back addition high-tech waste problem rohs reflects contemporary research past 50 years biological toxicology acknowledges long-term effects low-level chemical exposure populations new testing capable detecting much smaller concentrations environmental toxicants researchers associating exposures neurological developmental reproductive changes rohs environmental laws contrast historical contemporary law seek address acute toxicology direct exposure large amounts toxic substances causing severe injury death united states environmental protection agency epa published life-cycle assessment lca environmental impacts lead-free tin–lead solder used electronic products bar solders lead-free solders considered tin/copper alternative lowest best scores paste solders bismuth/tin/silver lowest impact scores among lead-free alternatives every category except non-renewable resource consumption paste bar solders lead-free solder alternatives lower better lca score toxicity categories tin/lead solder primarily due toxicity lead amount lead leaches printed wiring board assemblies determined leachability study conducted partnership study results providing industry objective analysis life-cycle environmental effects leading candidate alternative lead-free solders allowing industry consider environmental concerns along traditionally evaluated parameters cost performance assessment also allowing industry redirect efforts toward products processes reduce solders environmental footprint including energy consumption releases toxic chemicals potential risks human health environment another life-cycle assessment ikp university stuttgart shows similar results epa study ban concentrations brominated flame retardants bfr 0.1 plastics affected plastics recycling products include recycled plastics become critical know bfr concentration plastics either tracing origins recycled plastics establish bfr concentrations measuring bfr concentrations samples plastics high bfr concentrations costly handle discard whereas plastics levels 0.1 value recyclable materials number analytical techniques rapid measurement bfr concentrations x-ray fluorescence spectroscopy confirm presence bromine br indicate bfr concentration specific molecule ion attachment mass spectrometry iams used measure bfr concentrations plastics bfr ban significantly affected upstream plastic material selection downstream plastic material recycling rohs 2 directive 2011/65/eu evolution original directive became law 21 july 2011 took effect 2 january 2013 addresses substances original directive improving regulatory conditions legal clarity requires periodic re-evaluations facilitate gradual broadening requirements cover additional electronic electrical equipment cables spare parts ce logo indicates compliance rohs 2 declaration conformity detailed see 2012 final report european commission revealed eu member states considered toys scope primary rohs 1 directive 2002/95/ec irrespective whether primary secondary functions using electric currents electromagnetic fields implementation rohs 2 rohs recast directive 2011/65/eu concerned member states comply new regulation key difference recast necessary demonstrate conformity similar way lvd emc directives able show compliance sufficiently detailed files ensuring implemented production criminal offence like ce marking directives mandates production control traceability technical files describes 2 methods achieving presumption conformity directive 2011/65/eu article 16.2 either technical files include test data materials standard accepted official journal directive used currently standard en50581 risk based method reduce amount test data required harmonised standards list rohs2 ojeu c363/6 one consequences requirement demonstrate conformity requirement know exemption use component otherwise possible know compliance product placed market point time product must 'compliant many understand 'compliance varies depending exemptions force quite possible make non-compliant product 'compliant components compliance must calculated day placing market reality means knowing exemption status components using stock old status parts expire date exemptions directive 2011/65/eu article 7.b referring decision 768/2008/ec module internal production control system manage could seen lack diligence criminal prosecution could occur uk instrument 2012 n. 3032 section 39 penalties rohs 2 also dynamic approach exemptions creating automatic expiration exemptions renewed requests industry additionally new substances added controlled list 4 new substances expected controlled 2019 mean greater information control update systems required differences include new responsibilities importers distributors markings improve traceability technical files part nlf directives make supply chain active part policing directive 2011/65/eu articles 7 9 10 recent additional amendment 2017/2102 2011/65 rohs 2 directive 2011/65/eu contains allowance add new materials 4 materials highlighted attention original version amendment 2015/863 adds four additional substances annex ii 2011/65/eu 3/4 new restrictions recommended investigation original directive ref para 10 preamble another reason simple component rohs compliance statements acceptable compliance requirements vary depending date product placed market ref en50581:2012 additional four substances restriction evidence requirements shall applied products placed market 22 july 2019 except exemptions permit stated annex iii. although time writing exemptions exist applied materials four additional substances maximum permitted concentrations non-exempt products 0.1 new substances also listed reach candidate list dehp authorised manufacturing use substance eu annexe xiv reach 80 exemptions quite broad exemptions automatically expire 5 7 years unless renewed according hewlett packard european union gradually narrowing scope expiring many current rohs exemptions addition likely new substance restrictions introduced next several years exemptions medical devices exempt original directive rohs 2 narrowed exemption scope active implantable medical devices category 4h vitro diagnostic devices ivdd medical devices included automotive vehicles exempt category 4f vehicles instead addressed end life vehicles directive directive 2000/53/ec products within scope rohs 2 directive must display ce mark manufacturers name address serial batch number parties needing know detailed compliance information find eu declaration conformity product created manufacturer brand owner responsible design eu representative regulation also requires actors supply chain product importer distributors keep check document well ensuring conformance process followed correct language translation instructions provided manufacturer must keep certain documentation demonstrate conformity known technical file technical records directive requires manufacturer demonstrate conformity use test data materials following harmonised standard en50581:2012 standard time writing regulators may request file likely specific data likely large rohs require specific product labelling many manufacturers adopted compliance marks reduce confusion visual indicators included explicit rohs compliant labels green leaves check marks pb-free markings chinese rohs labels lower case e within circle arrows also imply compliance rohs 2 attempts address issue requiring aforementioned ce mark whose use policed trading standards enforcement agency states permitted indication rohs compliance ce mark closely related weee waste electrical electronic equipment directive became law simultaneously rohs depicts waste-can logo x often accompanies ce mark new substance restrictions considered introduction next years include phthalates brominated flame retardants bfrs chlorinated flame retardants cfrs pvc california passed electronic waste recycling act 2003 ewra law prohibits sale electronic devices 1 january 2007 prohibited sold eu rohs directive across much narrower scope includes lcds crts like covers four heavy metals restricted rohs ewra also restricted material disclosure requirement effective 1 january 2010 california lighting efficiency toxics reduction act applies rohs general purpose lights i.e lamps bulbs tubes electric devices provide functional illumination indoor residential indoor commercial outdoor use us states cities debating whether adopt similar laws several states mercury pbde bans already worldwide standards certification available qc 080000 standard governed national standards authority ireland ensure control hazardous substances industrial applications 2012 sweden chemicals agency kemi electrical safety authority tested 63 consumer electronics products found 12 compliance kemi claims similar testing results prior years eleven products contained prohibited levels lead one polybrominated diphenyl ether flame retardants details seven companies passed swedish prosecutors kemi says levels non-compliance rohs similar previous years remain high rohs environmental standard electronic product developers aware manufacturers find cheaper single bill materials product distributed worldwide instead customising product fit country specific environmental laws therefore develop standards allow strictest allowable substances example ibm forces suppliers complete product content declaration form document compliance environmental standard 'baseline environmental requirements materials parts products ibm logo hardware products thus ibm banned decabde even though formerly rohs exemption material overturned european court 2008 similarly hewlett-packard environmental standard adverse effects product quality reliability plus high cost compliance especially small business cited criticisms directive well early research indicating life cycle benefits lead-free solder versus traditional solder materials mixed criticism earlier came industry resistant change misunderstanding solders soldering processes deliberate misinformation espoused resist perceived non-tariff barrier created european bureaucrats many believe industry stronger experience better understanding science technologies involved one criticism rohs restriction lead cadmium address prolific applications costly electronics industry comply specifically total lead used electronics makes 2 world lead consumption 90 lead used batteries covered battery directive mentioned requires recycling limits use mercury cadmium restrict lead another criticism less 4 lead landfills due electronic components circuit boards approximately 36 due leaded glass cathode ray tube monitors televisions contain 2 kg per screen common lead-free solder systems higher melting point e.g 30 °c typical difference tin-silver-copper alloys wave soldering temperatures approximately ~255 °c however temperature typical lead free solders longer wetting times eutectic pb/sn 37:63 solder additionally wetting force typically lower disadvantageous hole filling advantageous situations closely spaced components care must taken selection rohs solders formulations harder less ductility increasing likelihood cracks instead plastic deformation typical lead-containing solders cracks occur due thermal mechanical forces acting components circuit board former common manufacturing latter field rohs solders exhibit advantages disadvantages respects dependent packaging formulation editor conformity magazine wondered 2005 transition lead-free solder would affect long-term reliability electronic devices systems especially applications mission-critical consumer products citing possible breaches due environmental factors like oxidation 2005 farnell/newark inone rohs legislation technical manual cites lead-free solder issues potential reliability concerns addressed annex item 7 rohs directive granting specific exemptions regulation 2010 issues raised directive first implemented 2003 reliability effects less known another potential problem lead-free high tin-based solders may face growth tin whiskers thin strands tin grow make contact adjacent trace developing short circuit historically tin whiskers associated handful failures including nuclear power plant shutdown pacemaker incident pure tin plating used however failures pre-date rohs also involve consumer electronics therefore may employ rohs-restricted substances desired help mitigate potential problems lead-free manufacturers using variety approaches tin-zinc formulations produce non-conducting whiskers formulations reduce growth although halt growth completely circumstances fortunately experience thus far suggests deployed instances rohs compliant products failing due whisker growth dr. ronald lasky dartmouth college reports rohs force 15 months 400b rohs-compliant products produced products field significant numbers tin whisker-related failures reported whisker growth occurs slowly time unpredictable fully understood time may true test efforts whisker growth even observable lead-based solders albeit much smaller scale countries exempted medical telecommunication infrastructure products legislation however may moot point since electronic component manufacturers convert production lines producing lead-free parts conventional parts eutectic tin-lead solder simply available even military aerospace industrial users extent solder involved least partially mitigated many lead-free components compatibility lead-containing solder processes leadframe-based components quad flat packages qfp small outline integrated circuits soic small outline packages sop gull wing leads generally compatible since finish part leads contributes small amount material finished joint however components ball grid arrays bga come lead-free solder balls leadless parts often compatible lead-containing processes de minimis exemptions e.g. micro-businesses economic effect anticipated least attempts mitigating effect made another form economic effect cost product failures switch rohs compliance example tin whiskers responsible 5 failure rate certain components swiss swatch watches 2006 prior july implementation rohs reportedly triggering us 1 billion recall swatch responded applying exemption rohs compliance denied rohs helps reduce damage people environment third-world countries much today high-tech waste ends use lead-free solders components reduces risks electronics industry workers prototype manufacturing operations contact solder paste longer represents health hazard used contrary predictions widespread component failure reduced reliability rohs first anniversary july 2007 passed little fanfare contemporary consumer electronics rohs compliant 2013 millions compliant products use worldwide many electronics companies keep rohs status pages corporate websites example amd website states although lead containing solder completely eliminated applications today amd engineers developed effective technical solutions reduce lead content microprocessors chipsets ensure rohs compliance minimizing costs maintaining product features change fit functional electrical performance specifications quality reliability standards rohs compliant products expected identical compared current packages rohs printed circuit board finishing technologies surpassing traditional formulations fabrication thermal shock solder paste printability contact resistance aluminium wire bonding performance nearing performance attributes properties lead-free solder high temperature resilience used prevent failures harsh field conditions conditions include operating temperatures test cycles range −40 °c +150 °c severe vibration shock requirements automobile manufacturers turning rohs solutions electronics move engine bay one major differences lead-containing lead-free solder pastes flow solder liquid state lead-containing solder lower surface tension tends move slightly attach exposed metal surfaces touch part liquid solder lead-free solder conversely tends stay place liquid state attaches exposed metal surfaces liquid solder touches lack flow – typically seen disadvantage lead lower quality electrical connections – used place components tightly used placed due properties lead-containing solders example motorola reports new rohs wireless device assembly techniques ... enabling smaller thinner lighter unit motorola q phone would possible without new solder lead-free solder allows tighter pad spacing research new alloys technologies allowing companies release rohs products currently exempt compliance e.g computer servers ibm announced rohs solution high lead solder joints thought remain permanent exemption lead-free packaging technology ... offers economical advantages relation traditional bumping processes solder waste reduction use bulk alloys quicker time-to-market products much lower chemical usage rate test measurement vendors national instruments also started produce rohs-compliant products despite devices category exempt rohs directive | [
6658,
5384,
11534,
9499,
3666,
2867,
7579,
597,
6197,
3323,
1500
] | Test |
404 | 7 | Nimrod_(distributed_computing):nimrod distributed computing nimrod tool parameterisation serial programs create execute embarrassingly parallel programs computational grid co-allocating scheduling brokering service nimrod one first tools make use heterogeneous resources grid single computation also early example using market economy perform grid scheduling enables nimrod provide guaranteed completion time despite using best-effort services tool created research project funded distributed systems technology centre principal investigator professor david abramson monash university commercial product based nimrod called enfuzion available axceleon | [
9040,
11353,
5956
] | None |
405 | 7 | Zonbu:zonbu zonbu technology company markets computing platform combines web-centric service small form factor pc open source based software architecture zonbu founded alain rossmann previously founder ceo openwave gregoire gentil previously co-founder twingo systems first-generation zonbox hardware ebox-4854 sold dmp electronics taiwan called zonbu mini nettop computer measuring 6 ¾ ” × 4 ¾ ” × 2 ¼ ” flash based fanless thus effectively silent official specifications device 2007 1.2 ghz via eden cpu c7 esther core 512 mb ram ethernet twisted pair 10/100 mbit/s ps/2 keyboard mouse ports vga display port 6 usb 2.0 ports 4 gb compactflash local storage graphics 2048 x 1536 16 million colors – hardware graphics mpeg2 acceleration disassembly zonbu owners shown zonbu includes options internal expansion mini pci slot optional wireless card ide connector room case 2.5 hard drive serial parallel ports zonbu subscription plans include online storage using amazon s3 automatic upgrades online support remote file access subscription service promoted reducing hassle typical computer maintenance tasks hardware repair software installation updates upgrades malicious software removal zonbu os customized version linux based gentoo distribution using xfce desktop environment geared towards non-technical users user interface focuses simplicity advanced features filesystem architecture combines transparent overlay filesystem pioneered linux live distributions on-line backup service user data locally cached compact flash card transparently encrypted 128-bit encryption transferred remote storage servers amazon s3 zonbu comes pre-loaded number software applications include firefox web browser openoffice productivity suite skype ip phone service 30 casual games default os user allowed install third-party software default set applications supposed fit needs non-technical users second home pc however zonbu provides instructions unlock operating system install additional software procedure technical intended minority users standard many linux users unlocking grub root install emerge/portage | [
1537,
3585,
2308,
780,
4236,
10893,
911,
1935,
4623,
1682,
8592,
2965,
2328,
4377,
8986,
5019,
10393,
6178,
6307,
6565,
9766,
5159,
3883,
6444,
10109,
8495,
816,
3121,
9266,
823,
7352,
1849,
3903,
1728,
2496,
4289,
11201,
7492,
10820,
122... | Validation |
406 | 2 | ICL_Direct_Machine_Environment:icl direct machine environment direct machine environment abbreviated dme mainframe environment icl 2900 series computing systems international computers limited developed 1970s dme more-or-less icl 1900 order code processor microcode permitted icl 1900 series executive operating systems program libraries operate icl 2900 series time companies computers large teams programmers write applications dme developed customers could buy new hardware run 1900 system 4 applications whilst developed replacement vme applications led users running dme vme alternately machine years unfortunately led situations development teams waiting around time run new applications fact users moving new system led icl develop system called concurrent machine environment cme vme ran dme subsystem enabling 1900 system 4 applications run 2900 series 39 machine alongside vme applications | [
512,
5730,
7173,
3594,
8524,
2541,
5455,
7983,
2804,
4151,
3960,
2045
] | None |
407 | 3 | Cache_hierarchy:cache hierarchy cache hierarchy multi-level caches refers memory architecture uses hierarchy memory stores based varying access speeds cache data highly-requested data cached high-speed access memory stores allowing swifter access central processing unit cpu cores cache hierarchy form part memory hierarchy considered form tiered storage design intended allow cpu cores process faster despite memory latency main memory access accessing main memory act bottleneck cpu core performance cpu waits data making main memory high-speed may prohibitively expensive high-speed caches compromise allowing high-speed access data most-used cpu permitting faster cpu clock history computer electronic chip development period increases cpu speed outpaced improvements memory access speed gap speed cpus memory meant cpu would often idle cpus increasingly capable running executing larger amounts instructions given time time needed access data main memory prevented programs fully benefiting capability issue motivated creation memory models higher access rates order realize potential faster processors resulted concept cache memory first proposed maurice wilkes british computer scientist university cambridge 1965 called memory models slave memory roughly 1970 1990 papers articles anant agarwal alan jay smith mark d. hill thomas r. puzak others discussed better cache memory designs first cache memory models implemented time even researchers investigating proposing better designs need faster memory models continued need resulted fact although early cache models improved data access latency respect cost technical limitations feasible computer system cache approach size main memory 1990 onward ideas adding another cache level second-level backup first-level cache proposed jean-loup baer wen-hann wang andrew w. wilson others conducted research model several simulations implementations demonstrated advantages two-level cache models concept multi-level caches caught new generally better model cache memories since 2000 multi-level cache models received widespread attention currently implemented many systems three-level caches present intel core i7 products accessing main memory instruction execution may result slow processing clock speed depending time required find fetch data order hide memory latency processor data caching used whenever data required processor fetched main memory stored smaller memory structure called cache need data cache searched first going main memory structure resides closer processor terms time taken search fetch data respect main memory advantages using cache proven calculating average access time aat memory hierarchy without cache caches small size may result frequent misses – search cache provide sought-after information – resulting call main memory fetch data hence aat affected miss rate structure searches data aat main memory given hit time aat caches given hit time caches less hit time main memory aat data retrieval significantly lower accessing data cache rather main memory using cache may improve memory latency may always result required improvement time taken fetch data due way caches organized traversed example direct-mapped caches size usually higher miss rate fully associative caches may also depend benchmark computer testing processor pattern instructions using fully associative cache may result power consumption search whole cache every time due trade-off power consumption associated heat size cache becomes critical cache design case cache miss purpose using structure rendered useless computer go main memory fetch required data however multiple-level cache computer misses cache closest processor level-one cache l1 search next-closest level cache go main memory methods fail general trend keep l1 cache small distance 1–2 cpu clock cycles processor lower levels caches increasing size store data l1 hence distant lower miss rate results better aat number cache levels designed architects according requirements checking trade-offs cost aats size technology-scaling allowed memory systems able accommodated single chip modern day processors three four cache levels reduction aat understood example computer checks aat different configurations l3 caches example main memory 50 l1 1 ns 10 miss rate l2 5 ns with1 miss rate l3 10 ns 0.2 miss rate banked cache cache divided cache dedicated instruction storage cache dedicated data contrast unified cache contains instructions data cache process l1 cache upper-level cache relation connection processor accessed processor retrieve instructions data requiring actions implemented time requires multiple ports access time unified cache multiple ports requires additional hardware wiring leading significant structure caches processing units avoid l1 cache often organized banked cache results fewer ports less hardware generally lower access times modern processors split caches systems multilevel caches higher level caches may unified lower levels split whether block present upper cache layer also present lower cache level governed memory system inclusion policy may inclusive exclusive non-inclusive non-exclusive nine inclusive policy blocks present upper-level cache present lower-level cache well upper-level cache component subset lower-level cache component case since duplication blocks wastage memory however checking faster exclusive policy cache hierarchy components completely exclusive element upper-level cache present lower cache components enables complete usage cache memory however high memory-access latency policies require set rules followed order implement none forced resulting inclusion policy called non-inclusive non-exclusive nine means upper-level cache may may present lower-level cache two policies define way modified cache block updated main memory write write back case write policy whenever value cache block changes modified lower-level memory hierarchy well policy ensures data stored safely written throughout hierarchy however case write back policy changed cache block updated lower-level hierarchy cache block evicted dirty bit attached cache block set whenever cache block modified eviction blocks set dirty bit written lower-level hierarchy policy risk data-loss recently changed copy datum stored cache therefore corrective techniques must observed case write byte present cache block byte may brought cache determined write allocate write no-allocate policy write allocate policy states case write miss block fetched main memory placed cache writing write no-allocate policy block missed cache write lower-level memory hierarchy without fetching block cache common combinations policies write block write allocate write write no-allocate private cache assigned one particular core processor accessed cores architectures core private cache creates risk duplicate blocks system cache architecture results reduced capacity utilization however type design choice multi-layer cache architecture also lend lower data-access latency shared cache cache accessed multiple cores since shared block cache unique therefore larger hit rate duplicate blocks however data-access latency increase multiple cores try access cache multi-core processors design choice make cache shared private impacts performance processor practice upper-level cache l1 sometimes l2 implemented private lower-level caches implemented shared design provides high access rates high-level caches low miss rates lower-level caches | [
7173,
9739,
5649,
2066,
7699,
5655,
10781,
8231,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
4217,
3725,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
7858,
4276,
9911,
8890,
4286,
2241,
2243,
5329,
10966,
731,
7911... | None |
408 | 3 | TURBOchannel:turbochannel turbochannel open computer bus developed dec late 1980s early 1990s although open vendor implement systems mostly used digital systems mips-based decstation decsystem systems vaxstation 4000 alpha-based dec 3000 axp digital abandoned use turbochannel favor eisa pci buses late 1994 introduction alphastation alphaserver systems turbochannel developed late 1980s digital continuously revised early 1990s turbochannel industry group industry group set digital develop promote bus turbochannel open bus beginning specification publicly available initial purchase cost reproduction material third-party implementation mechanical specifications implementation systems options turbochannel selected failed ace advanced computing environment use industry standard bus arc advanced risc computing compliant machines digital initially expected turbochannel gain widespeard industry acceptance due status arc standard although ultimately digital major user turbochannel dec 3000 axp decstation 5000 series decsystem vaxstation 4000 systems third parties implemented turbochannel systems implement numerous turbochannel option modules digital systems although main developer promoter turbochannel turbochannel industry group digital tri/add program initiative provide technical marketing support third parties implementing peripherals based open interfaces futurebus+ scsi vme turbochannel digital systems also involved promoting turbochannel implementation sales tri/add program discontinued 15 december 1992 except japan early 1990s digital expected turbochannel bus face serious competition buses vendors hp sun ibm therefore announced intended update existing turbochannel specification permit transfer 200 mb/s using similar hardware upgrade protocol backwards compatible digital later canceled intended update turbochannel towards end 1994 became clear pci become dominant turbochannel 32-bit address data multiplexed bus clocked frequencies 12.5 25 mhz maximum theoretical usable bandwidth 90 mb/s bus however differs others time point point control lines firmware contained within turbochannel cards mips machine code remnant bus original use mips-based systems later systems used bus alpha-based dec 3000 axp used emulator contained system firmware properly initialize turbochannel synchronous asymmetrical i/o channel asymmetrical sense option modules digital terminology expansion card communicate system module digital terminology motherboard option modules simple protocol used make turbochannel efficient turbochannel bus permit bus mastering turbochannel connected device wishes communicate another must first transfer information memory device read turbochannel protocol specifies option physical address space address space used address registers memory option maximum amount specified 16 gb although implementation amount anywhere amount digital systems used anywhere 4 mb early decstation 5000s 128 mb high-end dec 3000 axp models turbochannel bus uses 32-bit data address multiplexed bus transferring data addresses every turbochannel option slot set seven point-to-point control lines five lines universal control arbitration point-to-point control lines connected directly turbochannel interface turbochannel interface defined turbochannel specification although digital introduced three possible schemes example asic three possible schemes divided low-cost mid-range high performance system implementations system either time-multiplex multiple option slots order use single memory port share bandwidth dedicate memory port option slot turbochannel option modules uses 96-pin din connector specifically din 41612 option modules mounted inline system module option module single- double- triple-width although double triple width options used one turbochannel connector mean bandwidth doubled tripled slots still sharing single bus double- triple-width option modules used mechanically accommodate larger option modules supplying power mechanical specification option modules also flexible limitations attaching daughterboards simm modules used graphics options components could mounted sides option module components bottom restricted height ensure option module could fit system module maintaining enough airflow cooling airflow 150 lfms required option module airflow 50 lfms required option module slot 44 signal pins 32 used data addressing turbochannel slot supplies +5 +12v power rails provides maximum 26 watts power following table shows many amperes supplied power rail turbochannel bus extended turbochannel extender tce box options 3d graphics accelerators may require power board space single slot provide often double- triple-width option modules option modules consume additional space slots inside system presence may limit number even prevent installation turbochannel option modules turbochannel extender box used reduce number slots required inside system double triple width options turbochannel extender box contains pcb three turbochannel slots power supply supplying required power slots turbochannel option module installation host accompanies tce box external cable connects tce box option module bringing data addressing control lines turbochannel extender box performance loss associated use tce box although tce boxes support one option module regardless many remaining slots | [
9742,
2452,
6942,
799,
2723,
6187,
7215,
8625,
2994,
7234,
3142,
6854,
10833,
9686,
11627,
8301,
5873,
3445,
5368,
9723,
7421
] | None |
409 | 3 | Load–store_architecture:load–store architecture computer engineering load–store architecture instruction set architecture divides instructions two categories memory access load store memory registers alu operations occur registers risc instruction set architectures powerpc sparc risc-v arm mips load–store architectures instance load–store approach operands destination add operation must registers differs register–memory architecture example cisc instruction set architecture x86 one operands add operation may memory register earliest example load–store architecture cdc 6600 almost vector processors including many gpus use load–store approach | [
7173,
9739,
7699,
5655,
10781,
8231,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
7858,
9911,
8890,
4286,
2241,
2243,
5329,
10966,
731,
11487,
7911,
10985,
9964,
53... | Test |
410 | 2 | BlackBerry_Mobile:blackberry mobile blackberry mobile trading name used tcl communication sell blackberry branded devices world markets excluding indonesia india bangladesh sri lanka nepal blackberry limited creator blackberry brand decided 2016 cease competing smartphone market directly focus making security software due tcl communication charge manufacturing distributing designing blackberry-branded devices global market blackberry keyone first device made blackberry mobile brand although partially designed blackberry limited devices made blackberry mobile continue shipped running android along security software provided blackberry limited suite software includes dtek blackberry messenger blackberry hub also software secure boot start-up ensure android system tampered many features comparable blackberry 10 blackberry ltd former flagship operating system early 2000s research motion limited known rim became dominant mobile industry blackberry brand global dominance smartphone industry 2007 rim highest growth blackberry brand afterward slowly lost dominance many consumers moving towards devices like iphone apple samsung galaxy due all-touchscreen form factor later physical qwerty keyboard smartphone became significant feature blackberry brand named rim renamed blackberry limited set new strategy one focusing improving brand blackberry priv launched 2015 first device running android device came full touchscreen qwerty keyboard underneath 2016 blackberry ltd outsourced production tcl manufacture blackberry dtek50 dtek60 later 2016 blackberry announced moving away in-house manufacturing production moving become software security company december 2016 tcl chosen global licensee blackberry brand ces 2017 tcl showed rumored blackberry 'mercury although stating specifications device ahead mobile world congress barcelona spain tcl officially announced device stating official name blackberry keyone device designed blackberry ltd. rather tcl device sold blackberry mobile brand | [
9732,
6539,
9101,
8719,
11282,
7835,
4124,
2208,
424,
3511,
10303,
9408,
6981,
2892,
3152,
2259,
8917,
8921,
2788,
3949,
9851,
9341,
6271
] | Validation |
411 | 2 | Consistent_Network_Device_Naming:consistent network device naming consistent network device naming convention naming ethernet adapters linux created around 2009 replace old naming scheme caused problems multihomed machines network interface controllers nics would named based order found kernel booted removing existing adding new interfaces could cause previously added ones change names ecr submitted pci sig firmware group system firmware provide device naming operating systems via acpi interface new naming scheme convention implemented dell module called among first major linux distributions adopt module fedora 15 may 2011 red hat enterprise linux version 6.1 also released suse linux enterprise server 11 service pack 2 february 2012 newer dell poweredge dell precision models support new names open-source implementation available based udev mechanism present systemd red hat enterprise linux 7 introduces new network naming scheme part systemd | [
1400,
11135,
823
] | Validation |
412 | 5 | Mercury_Mail_Transport_System:mercury mail transport system mercury mail transport system mercury mts standards-compliant mail server developed david harris also develops pegasus mail client freeware prior january 2007 donationware non-commercial personal use shareware uses two versions mercury similar functionality original version longer development set netware loadable modules nlms runs versions novell netware network operating system nos 3.x 6.x current worked conjunction ms-dos workstations running pegasus mail mercury/32 win32 application running versions microsoft windows windows 98 windows nt4 latest windows vista windows server 2008 windows xp windows server 2003 recommended either version act mail server lan additional support netware lan features mercury fully independent mail server provide email services standards-compliant email clients eudora microsoft outlook versions mercury highly modular allowing support different sets internet protocols installed required mercury also installed tightly integrated pegasus mail combination pegasus/mercury similar mail aspects microsoft outlook/microsoft exchange server mercury originally developed handle mail internal external netware servers either bindery nds mode mercury ran system server integrated pegasus mail running ms-dos windows workstations mercury extremely standards-compliant supporting major internet mail-related protocols including smtp sending receiving mail pop3 imap win32 version also supports dialup connection versions many features especially powerful support managed mailing lists mercury intended largely unobtrusive needs little ongoing maintenance installation process simple task taking less minute point user must indicate domain parameter used user list manually administered limit numbers users declared single directory holds users storage locations backup copy mail directory copy users data also standard anti-virus could used mail received two files created files finally written disk simple antivirus engine could scan clamav antivirus engine supplied used desired software enormous variety configurations using proper care server could secure relay control effective ability filter mails based many rules making efficient could use blacklist/whitelist technology included tools reduce spam effects mercury/32 open source software extended anyone development documentation free publicly available pmail community well known extensions bundled mercury/32 development version netware basically stopped release version 1.48 26 may 2000 replacement windows version recommended security patch bringing mercury nlm version 1.49 released august 2007 19 june 2009 david harris announced pegasus mail site development pegasus mail associated mercury program could continue sufficient users would commit donating us 50 annually 21 july 2009 said good start new versions programs released since developer david harris said april 2017 pegasus mail mercury transport system active major development july 2019 announced mercury v5 near going beta xampp initiative apache friends develop cross-platform web server solution pack main core components apache http server mariadb mysql database php perl interpreters intended cross platform equivalent lamp stack used linux mail systems natively distributed linux operating system case microsoft windows platform apache friends selected mercury mts component specific documents provided apache friends installation configuration xampp components concept providing information via faqs forums however third party descriptions configuration use mercury mts component available | [
8582,
10248,
6797,
10906,
8747,
7983,
3250,
9909,
7739,
2748,
3007,
8644,
5063,
76,
471,
4439,
865,
4074,
8683,
11500,
3182,
5230,
7022
] | Test |
413 | 4 | COPS_(software):cops software computer oracle password system cops first vulnerability scanner unix operating systems achieve widespread use created dan farmer student purdue university gene spafford helped farmer start project 1989 cops software suite comprising least 12 small vulnerability scanners programmed audit one part operating system cops farmer developed another vulnerability scanner called satan security administrator tool analyzing networks cops generally considered obsolete uncommon find systems set insecure manner cops identify | [
3937,
3172,
2084,
7337,
4298,
7983,
8399,
10387,
3796,
5492,
8791,
7325
] | Test |
414 | 6 | OpenZFS:openzfs openzfs umbrella project aimed bringing together individuals companies use zfs file system work improvements aiming well making zfs widely used developed open-source manner openzfs brings together developers illumos linux freebsd macos platforms wide range companies high-level goals project include raising awareness quality utility availability open-source implementations zfs encouraging open communication ongoing efforts toward improving open-source variants zfs ensuring consistent reliability functionality performance distributions zfs illumos derived opensolaris provides upstream source code zfs implementations various differences illumos zfs codebase open-source implementations zfs openzfs strategically reducing existing platform-related differences order ease sharing source code founding members openzfs include matt ahrens one main architects zfs zfs file system originally developed sun microsystems solaris operating system zfs source code released 2005 common development distribution license cddl part opensolaris operating system later ported operating systems environments fsf claimed cddl gpl legal incompatibility 2005 sun implementation zfs file system n't used basis development linux kernel module n't merged linux kernel mainline linux distributions include precompiled kernel module workaround fuse framework allows file systems run userspace used linux separation layer licensing issues effect although set issues include performance penalty however april 2016 release ubuntu 16.04 lts includes cddl-licensed zfs linux kernel module maintained separate project outside linux kernel mainline claiming license compatibility following list key events development zfs various implementations leading creation openzfs umbrella project originally version numbers pool file system incremented new features introduced order designate on-disk file system format available features worked well single entity controlled development zfs versioning scheme still use zfs oracle solaris distributed development model single version number far ideal implementations openzfs would need agree changes on-disk file system format solution selected openzfs introduce feature flags new versioning system tags on-disk format changes unique names supports completely independent format changes format changes depend pool moved used openzfs implementations long feature flags use pool supported implementations openzfs uses pool version 5000 indicate use feature flags pool version unchanging number expected never conflict version numbers used oracle proprietary zfs versions legacy version numbers still exist pool versions 1–28 implied pool version 5000 initial proposal use 1000 pool version future on-disk format changes enabled disabled independently via feature flags feature flags exposed pool properties following naming scheme rules example valid property name could shortened pool feature either disabled enabled active state disabled features used on-disk format changes made result features backward-compatible enabled features used on-disk format changes made yet software may make changes time features still backward-compatible active features made backward-incompatible on-disk format changes pool pool feature enabled legacy version pool automatically upgraded 5000 prerequisite features also enabled default new pools created supported features enabled general state feature changed active back enabled undoing way performed on-disk format changes making pool compatible older openzfs implementation however features might possible on-disk format changes associated either features write features read former features openzfs implementation must support capable writing pool supporting features mandatory opening pool read-only mode latter features openzfs implementation must support able read pool open opening pool possible without actually reading example feature adds new on-disk data structure keep track freed datasets openzfs implementation need know data structure access pool read-only mode additionally writing pool features active state possible openzfs implementation support features list feature flags operating systems support available open-zfs.org web site | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
9784,
7225,
8772,
1109,
11363,
4708,
9836,
7789,
9844,
9333,
6263,
9335,
633,
9343,
6787,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
32... | Test |
415 | 3 | University_of_Bologna:university bologna university bologna unibo research university bologna italy founded 1088 organised guild students hence studiorum oldest university world well one leading academic institutions italy europe one prestigious italian universities commonly ranking first places national rankings first place study use term universitas corporations students masters came define institution especially famous law school located bologna italy university emblem carries motto alma mater studiorum nourishing mother studies date a.d. 1088 86,500 students 11 schools campuses ravenna forlì cesena rimini branch center abroad buenos aires argentina also school excellence named collegio superiore di bologna associate publisher university bologna bononia university press s.p.a. bup date founding uncertain believed accounts 1088 university granted charter authentica habita holy roman emperor frederick barbarossa 1158 19th century committee historians led giosuè carducci traced founding university back 1088 would make oldest continuously-operating university world however development institution bologna university gradual process paul grendler writes “ likely enough instruction organization existed merit term university 1150s might happened 1180s. ” university arose around mutual aid societies known universitates scholarium foreign students called nations grouped nationality protection city laws imposed collective punishment foreigners crimes debts countrymen students hired scholars city pre-existing lay ecclesiastical schools teach subjects liberal arts notarial law theology ars dictaminis scrivenery lectures given informal schools called scholae time various universitates scholarium decided form larger association studium —thus university studium grew strong position collective bargaining city since derived significant revenue visiting foreign students would depart well treated foreign students bologna received greater rights collective punishment ended also collective bargaining scholars served professors university initiation threat student strike students could enforce demands content courses pay professors would receive university professors hired fired pay determined elected council two representatives every student nation governed institution important decisions requiring majority vote students ratify professors could also fined failed finish classes time complete course material end semester student committee denouncers professors kept tabs reported misbehavior professors powerless however forming collegia doctorum professors ’ committees faculty securing rights set examination fees degree requirements eventually city ended arrangement paying professors tax revenues making chartered public university university historically notable teaching canon civil law indeed set large part aim studying digest central text roman law rediscovered italy 1070 university central development medieval roman law modern times degree granted university doctorate higher education processes harmonised across european community nowadays university offers 101 different laurea laurea breve first-level degrees three years courses followed 108 laurea specialistica laurea magistrale second-level degrees two years however 11 courses maintained preceding rules laurea specialistica ciclo unico laurea magistrale ciclo unico one cycle study five years except medicine dentistry requires six years courses laurea one may attain 1st level master one-year diploma similar postgraduate diploma second-level degrees attained one may proceed 2nd level master specialisation schools residency doctorates research phd 11 schools replace preexisting 23 faculties university structured 33 departments 66 2012 organized homogeneous research domains integrate activities related one faculty new department latin history added 2015 33 departments early 1950s students university bologna among founders review il mulino 25 april 1951 first issue review published bologna short time il mulino became one interesting reference points italy political cultural debate established important editorial relationships italy abroad editorial activities evolved along review 1954 il mulino publishing house società editrice il mulino founded today represents one relevant italian publishers addition initiated research projects focusing mostly educational institutions political system italy eventually led 1964 establishment istituto carlo cattaneo see serafino mazzetti repertorio di tutti professori antichi e moderni della famosa università ... di bologna bologna 1848 2020 qs world university rankings ranked university bologna 177th world well 74th 1st italy reference academic reputation 2019 world university rankings university bologna ranked among world top 200 universities 2019 italian newspaper la repubblica collaboration censis awarded university bologna 1st place academic ranking italian mega-universities 40,000 students tenth year row recording primacy fields internationalization academic structures digital services | [
10049,
10116,
9255,
5804,
6188,
2224,
4916,
4956
] | None |
416 | 0 | WordNet:wordnet wordnet lexical database english language groups english words sets synonyms called synsets provides short definitions usage examples records number relations among synonym sets members wordnet thus seen combination dictionary thesaurus accessible human users via web browser primary use automatic text analysis artificial intelligence applications database software tools released bsd style license freely available download wordnet website lexicographic data lexicographer files compiler called grind producing distributed database available wordnet created cognitive science laboratory princeton university direction psychology professor george armitage miller starting 1985 directed recent years christiane fellbaum project initially funded u.s. office naval research later also u.s. government agencies including darpa national science foundation disruptive technology office formerly advanced research development activity reflex george miller christiane fellbaum awarded 2006 antonio zampolli prize work wordnet november 2012 wordnet latest online-version 3.1 database contains 155 327 words organized 175 979 synsets total 207 016 word-sense pairs compressed form 12 megabytes size wordnet includes lexical categories nouns verbs adjectives adverbs ignores prepositions determiners function words words lexical category roughly synonymous grouped synsets synsets include simplex words well collocations like eat car pool different senses polysemous word form assigned different synsets meaning synset clarified short defining gloss one usage examples example adjective synset synsets connected synsets means semantic relations relations shared lexical categories include semantic relations hold among members linked synsets individual synset members words also connected lexical relations example one sense noun director linked one sense verb direct derived via morphosemantic link morphology functions software distributed database try deduce lemma stem form word user input irregular forms stored list looking ate return eat example nouns verbs organized hierarchies defined hypernym relationships instance one sense word dog found following hypernym hierarchy words level represent synset members set synonyms unique index top level hierarchies organized 25 beginner trees nouns 15 verbs called lexicographic files maintenance level linked unique beginner synset entity noun hierarchies far deeper verb hierarchies adjectives organized hierarchical trees instead two central antonyms hot cold form binary poles 'satellite synonyms steaming chilly connect respective poles via similarity relations adjectives visualized way dumbbells rather trees initial goal wordnet project build lexical database would consistent theories human semantic memory developed late 1960s psychological experiments indicated speakers organized knowledge concepts economic hierarchical fashion retrieval time required access conceptual knowledge seemed directly related number hierarchies speaker needed traverse access knowledge thus speakers could quickly verify canaries sing canary songbird required slightly time verify canaries fly access concept bird superordinate level even time verify canaries skin requiring look-up across multiple levels hyponymy animal experiments underlying theories subject criticism wordnet organization consistent experimental evidence example anomic aphasia selectively affects speakers ability produce words specific semantic category wordnet hierarchy antonymous adjectives wordnet central adjectives dumbbell structure found co-occur far frequently chance fact found hold many languages wordnet sometimes called ontology persistent claim creators make hypernym/hyponym relationships among noun synsets interpreted specialization relations among conceptual categories words wordnet interpreted used lexical ontology computer science sense however ontology corrected used contains hundreds basic semantic inconsistencies example common specializations exclusive categories ii redundancies specialization hierarchy furthermore transforming wordnet lexical ontology usable knowledge representation normally also involve distinguishing specialization relations subtypeof instanceof relations ii associating intuitive unique identifiers category although corrections transformations performed documented part integration wordnet 1.7 cooperatively updatable knowledge base webkb-2 projects claiming re-use wordnet knowledge-based applications typically knowledge-oriented information retrieval simply re-use directly wordnet also converted formal specification means hybrid bottom-up top-down methodology automatically extract association relations wordnet interpret associations terms set conceptual relations formally defined dolce foundational ontology works claim integrated wordnet ontologies content wordnet simply corrected seemed necessary instead wordnet heavily re-interpreted updated whenever suitable case example top-level ontology wordnet re-structured according ontoclean based approach wordnet used primary source constructing lower classes sensus ontology wordnet include information etymology pronunciation words contains limited information usage wordnet aims cover everyday english include much domain-specific terminology wordnet commonly used computational lexicon english word sense disambiguation wsd task aimed assigning context-appropriate meanings i.e synset members words text however argued wordnet encodes sense distinctions fine-grained issue prevents wsd systems achieving level performance comparable humans always agree confronted task selecting sense dictionary matches word context granularity issue tackled proposing clustering methods automatically group together similar senses word wordnets subsequently created languages 2012 survey lists wordnets availability effort propagate usage wordnets global wordnet community slowly re-licensing wordnets open domain researchers developers easily access use wordnets language resources provide ontological lexical knowledge natural language processing tasks open multilingual wordnet provides access open licensed wordnets variety languages linked princeton wordnet english pwn goal make easy use wordnets multiple languages wordnet used number purposes information systems including word-sense disambiguation information retrieval automatic text classification automatic text summarization machine translation even automatic crossword puzzle generation common use wordnet determine similarity words various algorithms proposed including measuring distance among words synsets wordnet graph structure counting number edges among synsets intuition closer two words synsets closer meaning number wordnet-based word similarity algorithms implemented perl package called wordnet :similarity python package called nltk sophisticated wordnet-based similarity techniques include adw whose implementation available java wordnet also used inter-link vocabularies princeton maintains list related projects includes links widely used application programming interfaces available accessing wordnet using various programming languages environments wordnet connected several databases semantic web wordnet also commonly re-used via mappings wordnet synsets categories ontologies often top-level categories wordnet mapped global wordnet association gwa public non-commercial organization provides platform discussing sharing connecting wordnets languages world gwa also promotes standardization wordnets across languages ensure uniformity enumerating synsets human languages gwa keeps list wordnets developed around world wordnet database distributed dictionary package usually single file following software | [
6145,
8323,
133,
8582,
5639,
11529,
8843,
396,
2575,
11538,
9879,
538,
2588,
6174,
7839,
5677,
7597,
3504,
11056,
2100,
8118,
3385,
9149,
11206,
1737,
7371,
5197,
10452,
2901,
3811,
7780,
8421,
9577,
874,
8554,
2414,
11509,
8440,
7164
] | None |
417 | 8 | Acid1:acid1 acid1 originally called box acid test test page web browsers developed october 1998 important establishing baseline interoperability early web browsers especially cascading style sheets 1.0 specification acid tests gold produce quick obvious assessment quality piece metal web acid tests designed produce clear indication browser compliance web standards acid1 tests many features one page reference image acid1 developed todd fahrner frustrated lack stringent tests improve browser interoperability looking tests developed braden mcdaniel used reference renderings clarify intended result fahrner developed comprehensive test resulted quirky-looking graphic 1999 test incorporated css1 test suite text used acid1 allusion t. s. eliot poem hollow men acid1 included offline easter egg internet explorer 5 mac os accessible typing 'tasman text replaced names developers early 2008 major browsers passed acid1 test acid1 served inspiration acid2 acid3 | [
2948,
9029,
9275,
6034,
11223,
10808,
2139,
124,
8923
] | Validation |
418 | 4 | Scapy:scapy scapy packet manipulation tool computer networks written python philippe biondi forge decode packets send wire capture match requests replies also handle tasks like scanning tracerouting probing unit tests attacks network discovery scapy provides python interface libpcap winpcap/npcap windows similar way wireshark provides view capture gui interface number programs provide visualisation including wireshark decoding packets gnuplot providing graphs graphviz vpython visualisation etc scapy supports python 3 since 2018 scapy 2.4.0+ kamene independent outdated fork scapy originally named scapy3k | [
2569,
842,
6345,
5612,
6701,
8554,
7983,
11249,
11221,
5657,
7901
] | None |
419 | 4 | Venafi:venafi venafi inc. privately held cybersecurity company develops software secure protect cryptographic keys digital certificates enterprise key certificate management security products certificate authority ca independent manage security instruments transport layer security tls digital certificates secure shell ssh keys venafi sell encryption certificate authority ca venafi reports customer base public- private-sector entities mostly global 5000 organizations operate variety industries venafi headquartered salt lake city utah offices california united kingdom russell thornton ben hodson university washington graduates cofounded venafi predecessor company 1998 recognizing recent consulting project broader commercial application cofounders incorporated company imcentric washington state october 26 2000 seeking infusion angel capital hodson thornton moved company utah joined jayson seegmiller hodson led engineering thornton seegmiller focused business operations application filed conduct business imcentric inc. orem utah march 18 2003 thornton filed change imcentric state incorporation home state washington delaware april 1 2004 early 2005 saw company leadership name change name imcentric venafi leadership thornton president chief executive officer seegmiller vice president secretary treasurer trell rohovit president chief executive officer william clay epstein vice president darren denning secretary company also moved headquarters sandy utah 2005 jeff hudson current chief executive officer replaced rohovit october 2010 company moved salt lake city ut 2013 venafi made-up word created combining two latin roots—vena vein root fides trust faith venafi secures root trust—the encryption keys certificates venafi participating organization payment card industry security standards council pci ssc issues payment card industry data security standard pci dss venafi submitted cryptographic keys digital certificate security guidelines special interest group sig topic consideration 2015 2016 pci ssc sig topic selected finalist 2015 sig 1 7 finalists selected 2016 sig 1 5 finalists selected venafi also member financial services information sharing analysis group fs-isac july 2012 paul turner venafi vice president product strategy co-authored national institute standards technology nist information technology laboratory itl bulletin “ itl bulletin july 2012 preparing responding certification authority compromise fraudulent certificate issuance ” provides best practices-based information 2015 turned teamed nist document best practices security interactive automated access management using secure shell ssh | [
3941,
517,
10341,
5834,
2932,
10106,
2558
] | Test |
420 | 4 | FIPS_140-2:fips 140-2 federal information processing standard fips publication 140-2 fips pub 140-2 u.s. government computer security standard used approve cryptographic modules title security requirements cryptographic modules initial publication may 25 2001 last updated december 3 2002 national institute standards technology nist issued fips 140 publication series coordinate requirements standards cryptography modules include hardware software components protection cryptographic module within security system necessary maintain confidentiality integrity information protected module standard specifies security requirements satisfied cryptographic module standard provides increasing qualitative levels security intended cover wide range potential applications environments security requirements cover areas related secure design implementation cryptographic module areas include cryptographic module specification cryptographic module ports interfaces roles services authentication finite state model physical security operational environment cryptographic key management electromagnetic interference/electromagnetic compatibility emi/emc self-tests design assurance mitigation attacks federal agencies departments validate module use covered existing fips 140-1 fips 140-2 certificate specifies exact module name hardware software firmware and/or applet version numbers cryptographic modules produced private sector open source communities use u.s. government regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information commercial cryptographic module also commonly referred hardware security module hsm fips 140-2 defines four levels security simply named level 1 level 4 specify detail level security required particular application security level 1 provides lowest level security basic security requirements specified cryptographic module e.g. least one approved algorithm approved security function shall used specific physical security mechanisms required security level 1 cryptographic module beyond basic requirement production-grade components example security level 1 cryptographic module personal computer pc encryption board security level 2 improves upon physical security mechanisms security level 1 cryptographic module requiring features show evidence tampering including tamper-evident coatings seals must broken attain physical access plaintext cryptographic keys critical security parameters csps within module pick-resistant locks covers doors protect unauthorized physical access addition tamper-evident physical security mechanisms required security level 2 security level 3 attempts prevent intruder gaining access csps held within cryptographic module physical security mechanisms required security level 3 intended high probability detecting responding attempts physical access use modification cryptographic module physical security mechanisms may include use strong enclosures tamper-detection/response circuitry zeroes plaintext csps removable covers/doors cryptographic module opened security level 4 provides highest level security security level physical security mechanisms provide complete envelope protection around cryptographic module intent detecting responding unauthorized attempts physical access penetration cryptographic module enclosure direction high probability detected resulting immediate deletion plaintext csps security level 4 cryptographic modules useful operation physically unprotected environments security level 4 also protects cryptographic module security compromise due environmental conditions fluctuations outside module normal operating ranges voltage temperature intentional excursions beyond normal operating ranges may used attacker thwart cryptographic module defenses cryptographic module required either include special environmental protection features designed detect fluctuations delete csps undergo rigorous environmental failure testing provide reasonable assurance module affected fluctuations outside normal operating range manner compromise security module levels 2 higher operating platform upon validation applicable also listed vendors always maintain baseline validations fips 140-2 establishes cryptographic module validation program cmvp joint effort nist communications security establishment cse government canada security programs overseen nist cse focus working government industry establish secure systems networks developing managing promoting security assessment tools techniques services supporting programs testing evaluation validation addresses areas development maintenance security metrics security evaluation criteria evaluation methodologies tests test methods security-specific criteria laboratory accreditation guidance use evaluated tested products research address assurance methods system-wide security assessment methodologies security protocol validation activities appropriate coordination assessment-related activities voluntary industry standards bodies assessment regimes fips 140-2 standard information technology security approval program cryptographic modules produced private sector vendors seek products certified use government departments regulated industries financial health-care institutions collect store transfer share disseminate sensitive unclassified sbu information tamper evident fips 140-2 security labels utilized deter detect tampering modules tests cmvp handled third-party laboratories accredited cryptographic module testing laboratories national voluntary laboratory accreditation program nvlap vendors interested validation testing may select twenty-two accredited labs nvlap accredited cryptographic modules testing laboratories perform validation testing cryptographic modules cryptographic modules tested requirements found fips pub 140-2 security requirements cryptographic modules security requirements cover 11 areas related design implementation cryptographic module within areas cryptographic module receives security level rating 1–4 lowest highest depending requirements met areas provide different levels security cryptographic module receives rating reflects fulfillment requirements area overall rating issued cryptographic module indicates vendor validation certificate individual ratings listed well overall rating nist maintains validation lists cryptographic standards testing programs past present lists updated new modules/implementations receive validation certificates nist cse items fips 140-1 fips 140-2 validation list reference validated algorithm implementations appear algorithm validation lists fips pub 140-2 annexes steven marquess posted criticism fips 140-2 validation lead incentives keep vulnerabilities defects hidden cmvp decertify software vulnerabilities found take year re-certify software defects found companies left without certified product ship example steven marquess mentions vulnerability found publicised fixed fips-certified open-source derivative openssl publication meaning openssl derivative decertified decertification hurt companies relying openssl-derivative fips certification contrast companies renamed certified copy open-source openssl derivative decertified even though basically identical fix vulnerability steven marquess therefore argues fips process inadvertently encourages hiding software origins de-associate defects since found original potentially leaving certified copy vulnerable | [
10504,
265,
5136,
3097,
10908,
2208,
10656,
1314,
6439,
9640,
11432,
2610,
8627,
9408,
8904,
9165,
8657,
3671,
7139,
7153,
10620,
2558
] | Test |
421 | 2 | MUSIC/SP:music/sp music/sp multi-user system interactive computing/system product originally mcgill university system interactive computing developed mcgill university 1970s early ibm time-sharing system called rax remote access computing system system ran ibm s/360 s/370 4300-series mainframe hardware offered novel features time file access control data compression designed allow academics students create run programs interactively terminals era mainframe computing still done punched cards years development continued system evolved embrace email internet eventually world wide web peak late 1980s 250 universities colleges high school districts used system north south america europe asia file system music/sp file system unique number respects single system-wide file index owner userid file name hashed locate file index file system could located single i/o operation however presented flat file system user lacked directory structure commonly offered dos microsoft windows unix systems 1990 tree-structured directory view file system overlaid bringing system line file systems available default information stored files compressed offered considerable saving disk space file system fairly sophisticated access control scheme allowing owner control could read write append execute file also concept public file visible users private file visible owner version 2.3 even private files listed common library result two users could files name 4.0 limitation removed virtual memory initial versions system provided support virtual memory address translation one active user could reside core memory time swapping disk used time-share different users variable-length timeslice used virtual memory support introduced 1985 allowed multiple users core memory time removed many restrictions size programs could run provided significant performance improvement system performance also improved pre-loading commonly used modules virtual memory startup time could available users simultaneously programming languages system designed support academic computing teaching computer science rich suite programming languages available system nucleus written ibm/370 assembler native applications written fortran system supported waterloo watfiv watbol compilers also provided compilers pascal c pl/i basic apl algol rpg gpss system missing command scripting language rexx ported cms 1984 later 1986 complete user interface written entirely rexx e-mail internet e-mail one major applications music/sp e-mail interface initially provided access local e-mail networks developed expanded provide access bitnet internet based e-mail music/sp direct access internet 1990 university wisconsin wiscnet tcp/ip code ported system allowing system provide access internet services compatibility ibm systems major feature system ability run programs designed run ibm mainstream operating system mvs accomplished using mvs emulator intercepted system calls supervisor call instruction svc level third-party applications ran mode rather write version application music/sp developers would usually start mvs version rebuild run mvs emulation mode since mvs emulation limited subset real thing applications generally ran efficiently music/sp features one major advantage system educational environments use special lines called control cards top file source files supported language could automatically directed appropriate compiler fortran default compiled linked executed compilation linkage execution options also specified control cards simply entering filename command line wide variety terminals supported 1980 including ebcdic-based units using ibm-proprietary protocols asynchronous ascii-based units since terminals connected various types front-end processors per common ibm timesharing practice could therefore function without cpu attention considerable amount time music used variable-length time slices could compute-bound processing reach maximum several seconds per time slice conversely user filled output buffer reached conversational read timeslice would end immediately sim390 emulator runs microsoft windows contains demonstration system music/sp freely available demonstration system also run hercules users run windows | [
512,
2560,
6155,
7186,
6675,
7187,
7188,
10776,
25,
4637,
9762,
4643,
6180,
5158,
7217,
10803,
7733,
9784,
10809,
573,
576,
2625,
6221,
3160,
10333,
97,
11363,
9829,
6248,
6760,
8298,
9835,
10856,
6772,
7285,
4727,
2168,
119,
634,
1147,
... | Test |
422 | 4 | PhishTank:phishtank phishtank anti-phishing site phishtank launched october 2006 entrepreneur david ulevitch offshoot opendns company offers community-based phish verification system users submit suspected phishes users vote phish phishtank used opera yahoo mail mcafee apwg cmu st benard mozilla kaspersky firetrust officer blue finra message level surbl sanesecurity clamav career builder site truth avira c-sirt phishtank sitechecker phishtank data provided gratis download access via api call including commercial use restrictive license 2018 announced phishtank rebuilding website new features functionality work begin 2019 phishtank currently ran thomas mccourt cisco talos undertaking rebuild project | [
8584,
7362,
1242,
4722
] | Test |
423 | 4 | Prevx:prevx prevx discontinued anti-malware utility separate real-time on-demand versions remove low-risk adware free user purchase enter license key serious scanning take anywhere less two minutes five minutes tony zaitoun about.com liked utility except confusion configuring interface key protection disabled default issue referenced since corrected prevx limited formed march 2001 uk registered name “ immunify ” changing name “ trustcorps ” later year finally re-branded “ prevx ” 2003 founder team led nick ray ceo paul stubbs coo originally positioned host intrusion prevention system company initial software product designed protect unix linux servers advanced malware threats without reliance malware signatures thus providing protection unknown “ zero-day ” threats software positioned last line defence threats bypassed overcome firewall network security installed anti-virus host-based protection systems early product monitored behaviour executables real-time would block system calls breached rules thus providing protection offered protection buffer overflow attacks could successfully detect rootkits attempted hide memory disk end 2002 company received investment south east growth fund early 2003 private investors angel network hotbed 2003 company rebranded prevx june 2004 launched first product windows platform “ prevx home beta ” offered freeware download prevx home 1.0 also free followed september 2004 prevx home 2.0 launched october 2004 incorporated functionality report security events detected central database operated prevx would allow prevx monitor new virus outbreaks detect block spyware end 2004 6 months launching 1m copies prevx downloaded subsequent versions included prevx 3.0 prevx edge prevx csi prevx stirred controversy amongst internet communities announced november 27 2009 recent windows update causing black screen death affecting users windows xp vista 7 claimed bug rendered machine unusable later discovered black screen caused malware infection daonol unrelated windows update prevx apologized earlier claims 2005 prevx acquired share offer retento limited investment vehicle owned serial entrepreneur mel morris joined prevx board june 2003 investor prevx introduced hotbed retento subsequently renamed prevx group limited november 2010 prevx acquired us-based internet security company webroot full conditions deal released announcement made webroot fully integrate prevx behaviour-based antivirus technology existing software also make mel morris founder chief executive prevx group vice president webroot prevx division webroot since discontinued prevx product line although technology concepts continue underpin webroot products | [
877,
6797,
7983,
9713,
10297,
1629
] | Test |
424 | 3 | LG_Electronics:lg electronics lg electronics inc. south korean multinational electronics company headquartered yeouido-dong seoul south korea lg electronics part fourth-largest chaebol south korea lg corporation 2014 global sales reached 55.91 billion ₩ 59.04 trillion lg comprises four business units home entertainment mobile communications home appliances air solutions vehicle components starion india main production vendor refrigeration washing machines indian sub-continent lg electronics owns zenith controls 37.9 percent lg display since 2008 lg electronics remains world second-largest lcd television manufacturer company 128 operations worldwide employing 83,000 people 1958 lg electronics founded goldstar hangul 금성 established aftermath korean war provide rebuilding nation domestically-produced consumer electronics home appliances lg electronics produced south korea first radios tvs refrigerators washing machines air conditioners goldstar one lg groups brethren company lak-hui pronounced lucky chemical industrial corp. lg chem lg households goldstar merged lucky chemical ls cable 28 february 1995 changing corporate name lucky-goldstar finally lg electronics lg electronics earned us 100 million revenue exports first time history rapid growth globalization saw company establish first overseas production based united states 1982 1994 goldstar officially adopted lg electronics brand new corporate logo 1995 lg electronics acquired us-based tv manufacturer zenith also year lg electronics made world first cdma digital mobile handsets supplied ameritech gte us company also awarded ul certification us 1998 lg developed world first 60-inch plasma tv 1999 established joint venture philips lg.philips lcd goes name lg display order create holding company former lg electronics split 2002 new lg electronics spun old lg electronics changing name lg ei merged lg ci 2003 legal successor former lg chem company started goldstar currently exist lg electronics plays large role global consumer electronics industry second-largest lcd tv manufacturer worldwide 2013 2005 lg top 100 global brand 2006 lg recorded brand growth 14 display manufacturing affiliate lg display 2009 world largest lcd panel manufacturer 2010 lg electronics entered smartphone industry since lg electronics continued develop various electronic products releasing world first 84-inch ultra-hd tv retail sale 5 december 2012 antitrust regulators european union fined lg electronics five major companies samsung thomson since 2010 known technicolor matsushita today panasonic corp philips toshiba fixing prices tv cathode-ray tubes two cartels lasting nearly decade 11 june 2015 lg electronics found midst human rights controversy guardian published article rosa moreno former employee lg television assembly factory end 2016 lg electronics merged german branch situated ratingen european headquarter situated london together eschborn suburb frankfurt main march 2017 lg electronics sued handling hardware failures recent smartphones lg g4 july 2018 koo bon-joon ceo vice chairman replaced nephew implementing first son-only succession rule also involved rule present ceo lg corporation parent company koo kwang-mo succeeding father koo bon-moo died brain tumor may 20 2018 november 2018 lg announced hwang jeong-hwan took job president lg mobile communications october 2017 replaced brian kwon head lg hugely profitable home entertainment business 1 december 2018 lg electronics four business units lg electronics products include televisions home theater systems refrigerators washing machines computer monitors wearable devices smart appliances smartphones lg sl9000 one several new borderless hdtv advertised release ifa berlin 2009 lg electronics launched oled tv 2013 65-inch 77-inch sizes 2014 lg electronics introduced first internet tv 2007 originally branded netcast entertainment access devices later renamed 2011 internet televisions lg smart tv interactive television features added enable audience receive information internet watching conventional tv programming november 2013 blogger discovered lg smart tvs silently collect filenames attached usb storage devices program viewing data transmit information lg servers lg-affiliated servers shortly blog entry went live lg disabled playback site video explaining viewer analytics work closed brightcove account video hosted lg manufactures remote control models use hillcrest labs freespace technology allow users change channels using gestures dragon naturallyspeaking technology voice recognition 2014 lg using webos ribbon interface smart tvs lg reported first eight months release sold 5 million webos tvs 2016 exclusively india indian arm south korea lg electronics inc started selling tv would repel mosquitoes uses ultrasonic waves silent humans cause mosquitoes fly away released 16 june 2016 technology also used air conditioners washing machines tv aimed lower-income consumers living conditions would make susceptible mosquitoes 2018 reported lg planning sell big-screen televisions could rolled retract automatically push button come 2019 lg electronics manufactures smartphones tablet devices g3 lg officially unveiled curved smartphone g flex 27 october 2013 lg released south korea november 2013 later announced releases europe rest asia north america consumer electronics show january 2014 lg announced u.s. release g2 across several major carriers 2015 lg released lg g4 globally late may early june 7 september 2016 lg unveiled v20 v30 announced 31 august 2017 lg g6 officially announced mwc 2017 26 february 2017 introduction g7 thinq model scheduled 2 may 2018 media briefing 2014 lg announced three new additions g series tablets lg knock code feature allowing users unlock devices series taps tablets also feature q pair allows tablets sync smartphone phone calls text messages passed tablet real time lg google announced android wear-based smartwatch lg g watch june 2014 august 2014 lg g watch r circular face similar moto 360 released lg watch urbane lg third android wear-based smart watch released april 2015 first device support newer smartwatch features wi-fi new parts android wear software interface like ability draw emoji friends 2015 lg announced bluetooth keyboard folds along four rows keys portability rolly keyboard made solid plastic two tiny plastic arms fold end keyboard support tablet smartphone toggle two different bluetooth-connected devices time battery life expected three months single aaa battery lg manufactures home appliances including refrigerators washing machines tumble dryers vacuum cleaners air conditioners microwave ovens june 2014 lg electronics announced launch smart appliances homechat messaging service south korea homechat employs line mobile messenger app korean company 'naver let homeowners communicate control monitor share content lg smart appliances users send simple messages start washing cycle order control washing machines lg sports limited subsidiary lg corporation owns korean baseball organisation kbo lg twins lg 트윈스 thru acquisition 1990 mbc blue dragons one six original founding members kbo 1982 became lg twins team two korean series 1990 1994 lg attracts large attendance fans much enjoyment took 3rd place league august 2013 lg electronics announced would sponsor german bundesliga club bayer 04 leverkusen next three years option extend one year lg sponsors international cricket council world governing body cricket also sponsors icc awards 2009 2013 lg electronics sponsored formula one global partner technology partner lg also official supplier virgin racing lotus racing team plus engine manufacturer cosworth 2010 2012 lg also sponsors london fashion week lg arena birmingham period 2001–2003 lg sponsored snooker grand prix years tournament known lg cup 2008 lg became sponsors extreme sport 'fso4 freeze festival lg electronics company australia dissolved sponsorship former australian vice-captain david warner 27 march 2018 dropped brand ambassador company ball tampering scandal shook australian cricket 3rd test 2017–18 tempestuous test series south africa david warner agreement lg electronics company 2014 contract planned renewal choice magazine independent tests popular lg fridge models 2010 found energy consumption two models higher claimed lg lg aware problem offered compensation affected customers 2004 lg made 4a-rated water efficiency claims numerous washing machines certified lg gave undertakings australian competition consumer commission accc provide appropriate corrective notices upgrade maintain trade practices compliance program 2006 lg overstated energy efficiency five air conditioner models required offer consumers rebates cover extra energy costs march 2018 announced one lg steam clothing care system earned asthma allergy friendly certification lg electronics usa proposed build new headquarters borough englewood cliffs bergen county new jersey including tall building would stand taller tree line hudson palisades us national natural landmark company proposed build environmentally friendly facility englewood cliffs incidental bergen county per-capita leading korean american population received initially favorable legal decision concerning building height issues plan approved local government met resistance segments general public well government officials new jersey adjacent new york initial court decision upholding local government approval overturned new jersey appellate court 2015 lg subsequently submitted revised scaled-down 64-foot building approval borough englewood cliffs 2016 lg broke ground new us 300 million englewood cliffs headquarters 7 february 2017 completed late 2019 | [
2179,
6276,
9732,
9863,
6539,
3340,
5262,
8719,
1427,
10393,
410,
7835,
7068,
798,
4259,
5028,
8355,
424,
10537,
4011,
3117,
2862,
8237,
9137,
6834,
3380,
1083,
10303,
196,
11588,
2502,
11082,
5963,
7246,
2258,
2259,
8917,
8921,
3162,
252... | None |
425 | 8 | WS-Discovery:ws-discovery web services dynamic discovery ws-discovery technical specification defines multicast discovery protocol locate services local network operates tcp udp port 3702 uses ip multicast address 239.255.255.250 name suggests actual communication nodes done using web services standards notably soap-over-udp udp ports 139 445 1124 3702 tcp ports 139 445 3702 49179 5357,5358 protocol originally developed bea systems canon intel microsoft webmethods july 1 2009 approved standard oasis various components microsoft windows vista operating system use ws-discovery e.g people near ws-discovery integral part windows rally technologies devices profile web services component wsdmon windows 7 later uses ws-discovery automatically discover wsd-enabled network printers show network windows explorer installed double-clicking windows 8 later installation automatic ws-discovery enabled default networked hp printers since circa 2008 | [
514,
1411,
9734,
5384,
7690,
8203,
11413,
7320,
6811,
7198,
10924,
8238,
2996,
2501,
7878,
1354,
1098,
10829,
6993,
601,
2013,
4457,
4974,
4979,
10229,
10879
] | Test |
426 | 3 | MIPS_architecture_processors:mips architecture processors since 1985 numerous processors implementing version mips architecture designed widely used first mips microprocessor r2000 announced 1985 added multiple-cycle multiply divide instructions somewhat independent on-chip unit new instructions added retrieve results unit back register file result-retrieving instructions interlocked r2000 could booted either big-endian little-endian thirty-one 32-bit general purpose registers condition code register designers considered potential bottleneck feature shares amd 29000 alpha unlike registers program counter directly accessible r2000 also support four co-processors one built main cpu handled exceptions traps memory management three left uses one could filled optional r2010 fpu thirty-two 32-bit registers could used sixteen 64-bit registers double-precision r3000 succeeded r2000 1988 adding 32 kb soon increased 64 kb caches instructions data along support shared-memory multiprocessing form cache coherence protocol flaws r3000s multiprocessing support successfully used several successful multiprocessor computers r3000 also included built-in mmu common feature cpus era r3000 like r2000 could paired r3010 fpu r3000 first successful mips design marketplace eventually one million made speed-bumped version r3000 running 40 mhz r3000a delivered performance 32 vups vax unit performance mips r3000a-compatible r3051 running 33.8688 mhz processor used sony playstation though n't fpu mmu third-party designs include performance semiconductor r3400 idt r3500 r3000as integrated r3010 fpu toshiba r3900 virtually first soc early handheld pcs ran windows ce radiation-hardened variant space applications mongoose-v r3000 integrated r3010 fpu r4000 series released 1991 extended mips full 64-bit architecture moved fpu onto main die create single-chip microprocessor high clock frequency 100 mhz introduction however order achieve clock frequency caches reduced 8 kb took three cycles access high operating frequencies achieved technique deep pipelining called super-pipelining time improved r4400 followed 1993 larger 16 kb primary caches largely bug-free 64-bit operation support larger l2 cache mips division sgi called mti designed low-cost r4200 basis even cheaper r4300i derivative microprocessor nec vr4300 used nintendo 64 game console quantum effect devices qed separate company started former mips employees designed r4600 orion r4700 orion r4650 r5000 r4000 pushed clock frequency sacrificed cache capacity qed designs emphasized large caches could accessed two cycles efficient use silicon area r4600 r4700 used low-cost versions sgi indy workstation well first mips-based cisco routers 36x0 7x00-series routers r4650 used original webtv set-top boxes microsoft tv r5000 fpu flexible single precision floating-point scheduling r4000 result r5000-based sgi indys much better graphics performance similarly clocked r4400 indys graphics hardware sgi gave old graphics board new name combined r5000 order emphasize improvement qed later designed rm7000 rm9000 family devices embedded markets like networking laser printers qed acquired semiconductor manufacturer pmc-sierra august 2000 latter company continuing invest mips architecture rm7000 included integrated 256 kb l2 cache controller optional l3 cache rm9xx0 family soc devices included northbridge peripherals memory controller pci controller gigabit ethernet controller fast i/o hypertransport port r8000 1994 first superscalar mips design able execute two integer floating point two memory instructions per cycle design spread six chips integer unit 16 kb instruction 16 kb data caches floating-point unit three full-custom secondary cache tag rams two secondary cache accesses one bus snooping cache controller asic design two fully pipelined double precision multiply-add units could stream data 4 mb off-chip secondary cache r8000 powered sgi power challenge servers mid-1990s later became available power indigo2 workstation although fpu performance fit scientific users quite well limited integer performance high cost dampened appeal users r8000 marketplace year remains fairly rare 1995 r10000 released processor single-chip design ran higher clock frequency r8000 larger 32 kb primary instruction data caches also superscalar major innovation out-of-order execution even single memory pipeline simpler fpu vastly improved integer performance lower price higher density made r10000 preferable customers later designs based upon r10000 core r12000 used 0.25 micrometre process shrink chip achieve higher clock rates revised r14000 allowed higher clock rates additional support ddr sram off-chip cache later iterations named r16000 r16000a feature increased clock frequency smaller die manufacturing compared members mips family include r6000 ecl implementation produced bipolar integrated technology r6000 introduced mips ii architecture translation lookaside buffer tlb cache architecture different members mips family r6000 deliver promised performance benefits although saw use control data machines quickly disappeared mainstream market 1981 john l. hennessy began mips microprocessor without interlocked pipeline stages project stanford university investigate risc technology results research convinced future commercial potential technology 1984 took sabbatical found mips computer systems company designed new architecture also called mips introduced first mips implementation r2000 1985 r2000 improved design introduced r3000 1988 32-bit cpus formed basis company 1980s used primarily sgi series workstations later digital equipment corporation decstation workstations servers sgi commercial designs deviated stanford mips implementing interlocks hardware supplying full multiply divide instructions among others designs guided part software architect earl killian designed mips iii 64-bit instruction-set extension led work r4000 microarchitecture 1991 mips released first 64-bit microprocessor r4000 however mips financial difficulties bringing market design important sgi time one mips major customers sgi bought company outright 1992 order guarantee design would lost subsidiary sgi company became known mips technologies early 1990s mips started licensing designs third-party vendors proved fairly successful due simplicity core allowed used number applications would formerly used much less capable cisc designs similar gate count price—the two strongly related price cpu generally related number gates number external pins sun microsystems attempted enjoy similar success licensing sparc core nearly successful late 1990s mips powerhouse embedded processor field according mips technologies inc. exponential growth 48-million mips-based cpu shipments 49 total risc cpu market share 1997 mips successful sgi spun mips technologies 1998 fully half mips income today comes licensing designs much rest comes contract design work cores produced third parties 1999 mips technologies replaced previous versions mips architecture two architectures 32-bit mips32 based mips ii additional features mips iii mips iv mips v 64-bit mips64 based mips v licensing nec toshiba sibyte later acquired broadcom obtained licenses mips64 soon announced philips lsi logic idt since joined today mips cores one most-used heavyweight cores marketplace computer-like devices hand-held computers set-top boxes etc. since mips architecture licensable attracted several processor start-up companies years one first start-ups design mips processors quantum effect devices see next section mips design team designed r4300i started company sandcraft designed r5432 nec later produced sr71000 one first out-of-order execution processors embedded market original dec strongarm team eventually split two mips-based start-ups sibyte produced sb-1250 one first high-performance mips-based systems-on-a-chip soc alchemy semiconductor later acquired amd produced au-1000 soc low-power applications lexra used mips- like architecture added dsp extensions audio chip market multithreading support networking market due lexra licensing architecture two lawsuits started two companies first quickly resolved lexra promised advertise processors mips-compatible second mips patent 4814976 handling unaligned memory access protracted hurt companies business culminated mips technologies giving lexra free license large cash payment two companies emerged specialize building multi-core devices using mips architecture raza microelectronics inc. purchased product line failing sandcraft later produced devices contained eight cores targeted telecommunications networking markets cavium originally security processor vendor also produced devices eight cpu cores later 32 cores markets companies designed cores in-house licensing architecture instead purchasing cores mips among manufacturers made computer workstation systems using mips processors sgi mips computer systems inc. whitechapel workstations olivetti siemens-nixdorf acer digital equipment corporation nec deskstation operating systems ported architecture include sgi irix microsoft windows nt v4.0 windows ce linux freebsd netbsd openbsd unix system v sinix qnx mips computer systems risc/os speculation early 1990s mips powerful risc processors would overtake intel ia-32 architecture encouraged support first two versions microsoft windows nt alpha mips powerpc—and lesser extent clipper architecture sparc however intel quickly released faster versions pentium class cpus microsoft windows nt v4.0 dropped support anything ia-32 alpha sgi decision transition itanium ia-32 architectures 2007 following 2006 chapter 11 bankruptcy 2009 acquisition rackable systems inc. support ended mips/irix consumer market december 2013 originally scheduled however support team still exists special circumstances refurbished systems still available limited basis 1990s mips architecture widely adopted embedded market including use computer networking telecommunications video arcade games video game consoles computer printers digital set-top boxes digital televisions dsl cable modems personal digital assistants low power-consumption heat characteristics embedded mips implementations wide availability embedded development tools knowledge architecture means use mips microprocessors embedded roles likely remain common recent years technology used various mips generations offered ip-cores building-blocks embedded processor designs 32-bit 64-bit basic cores offered known 4k 5k cores mixed add-in units fpus simd systems various input/output devices etc mips cores commercially successful used many consumer industrial applications mips cores found newer cisco linksys mikrotik routerboard routers cable modems adsl modems smartcards laser printer engines set-top boxes robots hand-held computers cellphones pdas mips largely unable displace incumbent competing arm architecture mips architecture processors include idt rc32438 ati/amd xilleon alchemy au1000 1100 1200 broadcom sentry5 rmi xlr7xx cavium octeon cn30xx cn31xx cn36xx cn38xx cn5xxx infineon technologies easyport amazon danube adm5120 wildpass inca-ip inca-ip2 microchip technology pic32 nec emma emma2 nec vr4181a vr4121 vr4122 vr4181a vr4300 vr5432 vr5500 oak technologies generation pmc-sierra rm11200 quicklogic quickmips esp toshiba donau toshiba tmpr492x tx4925 tx9956 tx7901 komdiv-32 komdiv-64 elvees multicore russia one interesting applications mips architecture use massive processor count supercomputers silicon graphics sgi refocused business desktop graphics workstations high-performance computing market early 1990s success company first foray server systems challenge series based r4400 r8000 later r10000 motivated sgi create vastly powerful system introduction integrated r10000 allowed sgi produce system origin 2000 eventually scalable 1024 cpus using numalink cc-numa interconnect origin 2000 begat origin 3000 series topped 1024 maximum cpu count using r14000 r16000 chips 700 mhz mips-based supercomputers withdrawn 2005 sgi made strategic decision move intel ia-64 architecture high-performance computing startup called sicortex introduced massively parallel mips-based supercomputer 2007 machines based mips64 architecture high performance interconnect using kautz graph topology system power efficient computationally powerful innovative aspect system multicore processing node integrates six mips64 cores crossbar switch memory controller interconnect dma engine gigabit ethernet pci express controllers single chip consumes 10 watts power yet peak floating point performance 6 gigaflops powerful configuration sc5832 single cabinet supercomputer consisting 972 node chips total 5832 mips64 processor cores 8.2 teraflops peak performance loongson family mips-compatible microprocessors designed chinese academy sciences institute computing technology ict independently designed chinese early models lacked support four instructions patented mips technologies june 2009 ict licensed mips32 mips64 architectures mips technologies starting 2006 number companies released loongson-based computers including nettops netbooks designed low-power use dawning 6000 supercomputer projected performance 1 pflops use loongson processor dawning 6000 currently jointly developed ict dawning information industry company li guojie chairman dawning information industry company director academician ict said research development dawning 6000 expected completed two years chinese-made high-performance computers expected achieve two major breakthroughs first adoption domestically made processors second existing cluster-based system structure high-performance computers changed performance reaches 1 pflops announced 2012 mips aptiv family includes three 32-bit cpu products based mips32 release 3 architecture microaptiv compact real-time embedded processor core five-stage pipeline micromips code compression instruction set microaptiv either configured microprocessor microaptiv instruction data caches memory management unit microcontroller microaptiv uc memory protection unit cpu integrates dsp simd functionality address signal processing requirements entry-level embedded segments including industrial control smart meters automotive wired/wireless communications interaptiv multiprocessor core leveraging nine-stage pipeline multi-threading core used highly-parallel applications requiring cost power optimization smart gateways baseband processing lte user equipment small cells ssd controllers automotive equipment proaptiv superscalar out-of-order processor core available single multi-core product versions proaptiv designed applications processing connected consumer electronics control plane processing networking applications announced june 2013 mips warrior family includes multiple 32-bit 64-bit cpu products based mips release 5 6 architectures 32-bit mips cores embedded microcontroller applications 64-bit mips cpus high-performance low-power embedded applications 32-bit 64-bit mips application processors | [
9857,
4098,
6659,
5380,
8327,
8711,
9739,
3597,
6926,
783,
8976,
1425,
9745,
5523,
2452,
7445,
2071,
5272,
9851,
4124,
6815,
8481,
8355,
5028,
6057,
938,
8237,
7983,
5681,
10548,
1461,
823,
321,
7234,
9665,
10051,
3014,
2503,
1480,
3142,
... | None |
427 | 4 | Register_spring:register spring computer security register spring sort trampoline bogus return pointer structured exception handling seh pointer exploit places call stack directing control flow existing code within dynamic-link library dll static program binary target code turn consists call jump call ebx jmp esp appropriate processor register previously prepared exploit point payload code begins | [
5040,
3473,
2558,
9911
] | Train |
428 | 9 | Ada_(programming_language):ada programming language ada structured statically typed imperative object-oriented high-level computer programming language extended pascal languages built-in language support design-by-contract extremely strong typing explicit concurrency tasks synchronous message passing protected objects non-determinism ada improves code safety maintainability using compiler find errors favor runtime errors ada international standard current version known ada 2012 defined iso/iec 8652:2012 ada originally designed team led french computer scientist jean ichbiah cii honeywell bull contract united states department defense dod 1977 1983 supersede 450 programming languages used dod time ada named ada lovelace 1815–1852 credited first computer programmer ada originally targeted embedded real-time systems ada 95 revision designed s. tucker taft intermetrics 1992 1995 improved support systems numerical financial object-oriented programming oop features ada include strong typing modularity mechanisms packages run-time checking parallel processing tasks synchronous message passing protected objects nondeterministic select statements exception handling generics ada 95 added support object-oriented programming including dynamic dispatch syntax ada minimizes choices ways perform basic operations prefers english keywords else symbols || ada uses basic arithmetical operators avoids using symbols code blocks delimited words declare begin end end cases followed identifier block closes e.g. ... end loop ... end loop case conditional blocks avoids dangling else could pair wrong nested if-expression languages like c java ada designed development large software systems ada packages compiled separately ada package specifications package interface also compiled separately without implementation check consistency makes possible detect problems early design phase implementation starts large number compile-time checks supported help avoid bugs would detectable run-time languages would require explicit checks added source code example syntax requires explicitly named closing blocks prevent errors due mismatched end tokens adherence strong typing allows detection many common software errors wrong parameters range violations invalid references mismatched types etc either compile-time otherwise run-time concurrency part language specification compiler cases detect potential deadlocks compilers also commonly check misspelled identifiers visibility packages redundant declarations etc provide warnings useful suggestions fix error ada also supports run-time checks protect access unallocated memory buffer overflow errors range violations off-by-one errors array access errors detectable bugs checks disabled interest runtime efficiency often compiled efficiently also includes facilities help program verification reasons ada widely used critical systems anomaly might lead serious consequences e.g. accidental death injury severe financial loss examples systems ada used include avionics air traffic control railways banking military space technology ada dynamic memory management high-level type-safe ada generic untyped pointers implicitly declare pointer type instead dynamic memory allocation deallocation must take place explicitly declared access types access type associated storage pool handles low-level details memory management programmer either use default storage pool define new ones particularly relevant non-uniform memory access even possible declare several different access types designate type use different storage pools also language provides accessibility checks compile time run time ensures access value outlive type object points though semantics language allow automatic garbage collection inaccessible objects implementations support default would cause unpredictable behaviour real-time systems ada support limited form region-based memory management also creative use storage pools provide limited form automatic garbage collection since destroying storage pool also destroys objects pool double-dash -- resembling em dash denotes comment text comments stop end line prevent unclosed comments accidentally voiding whole sections source code disabling whole block code requires prefixing line column individually -- clearly denoting disabled code column repeated -- page renders experimental dis/re-enablement large blocks drawn process semicolon statement terminator null no-operation statement codice_1 single codice_2 without statement terminate allowed unlike iso standards ada language definition known ada reference manual arm sometimes language reference manual lrm free content thus common reference ada programmers programmers implementing ada compilers apart reference manual also extensive rationale document explains language design use various language constructs document also widely used programmers language revised new rationale document written one notable free software tool used many ada programmers aid writing ada source code gnat programming studio 1970s us department defense dod concerned number different programming languages used embedded computer system projects many obsolete hardware-dependent none supported safe modular programming 1975 working group high order language working group holwg formed intent reduce number finding creating programming language generally suitable department uk ministry defence requirements many iterations beginning original straw man proposal eventual programming language named ada total number high-level programming languages use projects fell 450 1983 37 1996 holwg working group crafted steelman language requirements series documents stating requirements felt programming language satisfy many existing languages formally reviewed team concluded 1977 existing language met specifications requests proposals new programming language issued four contractors hired develop proposals names red intermetrics led benjamin brosgol green cii honeywell bull led jean ichbiah blue softech led john goodenough yellow sri international led jay spitzen april 1978 public scrutiny red green proposals passed next phase may 1979 green proposal designed jean ichbiah cii honeywell bull chosen given name ada—after augusta ada countess lovelace proposal influenced programming language lis ichbiah group developed 1970s preliminary ada reference manual published acm sigplan notices june 1979 military standard reference manual approved december 10 1980 ada lovelace birthday given number mil-std-1815 honor ada lovelace birth year 1981 c. a. r. hoare took advantage turing award speech criticize ada overly complex hence unreliable subsequently seemed recant foreword wrote ada textbook ada attracted much attention programming community whole early days backers others predicted might become dominant language general purpose programming defense-related work ichbiah publicly stated within ten years two programming languages would remain ada lisp early ada compilers struggled implement large complex language compile-time run-time performance tended slow tools primitive compiler vendors expended efforts passing massive language-conformance-testing government-required acvc validation suite required another novel feature ada language effort jargon file dictionary computer hacker slang originating 1975-1983 notes entry ada precisely one might expect given kind endorsement fiat designed committee ... difficult use overall disastrous multi-billion-dollar boondoggle ... ada lovelace ... would almost certainly blanch use name latterly put kindest thing said probably good small language screaming get inside vast elephantine bulk first validated ada implementation nyu ada/ed translator certified april 11 1983 nyu ada/ed implemented high-level set language setl number commercial companies began offering ada compilers associated development tools including alsys telesoft ddc-i advanced computer techniques tartan laboratories tld systems verdix others 1991 us department defense began require use ada ada mandate software though exceptions rule often granted department defense ada mandate effectively removed 1997 dod began embrace cots technology similar requirements existed nato countries ada required nato systems involving command control functions ada mandated preferred language defense-related applications countries sweden germany canada late 1980s early 1990s ada compilers improved performance still barriers full exploitation ada abilities including tasking model different real-time programmers used ada safety-critical support features used military applications also commercial projects software bug severe consequences e.g. avionics air traffic control commercial rockets ariane 4 5 satellites space systems railway transport banking example airplane information management system fly-by-wire system software boeing 777 written ada developed honeywell air transport systems collaboration consultants ddc-i became arguably best-known ada project civilian military canadian automated air traffic system written 1 million lines ada sloc count featured advanced distributed processing distributed ada database object-oriented design ada also used air traffic systems e.g. uk next-generation interim future area control tools support ifacts air traffic control system designed implemented using spark ada also used french tvm in-cab signalling system tgv high-speed rail system metro suburban trains paris london hong kong new york city language became ansi standard 1983 ansi/mil-std 1815a translation french without changes english became iso standard 1987 iso-8652:1987 version language commonly known ada 83 date adoption ansi sometimes referred also ada 87 date adoption iso ada 95 joint iso/ansi standard iso-8652:1995 published february 1995 making ada 95 first iso standard object-oriented programming language help standard revision future acceptance us air force funded development gnat compiler presently gnat compiler part gnu compiler collection work continued improving updating technical content ada programming language technical corrigendum ada 95 published october 2001 major amendment iso/iec 8652:1995/amd 1:2007 published march 9 2007 ada-europe 2012 conference stockholm ada resource association ara ada-europe announced completion design latest version ada programming language submission reference manual international organization standardization iso approval iso/iec 8652:2012 published december 2012 related standards include iso 8651-3:1988 information processing systems—computer graphics—graphical kernel system gks language bindings—part 3 ada ada algol-like programming language featuring control structures reserved words else however ada also many data structuring facilities abstractions included original algol 60 type definitions records pointers enumerations constructs part inherited inspired pascal common example language syntax hello world program ada.text_io use ada.text_io procedure hello begin end hello program compiled using freely available open source compiler gnat executing gnatmake hello.adb ada type system based set predefined primitive types allows users declare types declaration turn based internal representation type describing goal achieved allows compiler determine suitable memory size type check violations type definition compile time run time i.e. range violations buffer overruns type consistency etc. ada supports numerical types defined range modulo types aggregate types records arrays enumeration types access types define reference instance specified type untyped pointers permitted special types provided language task types protected types example date might represented type day_type range 1 .. 31 type month_type range 1 .. 12 type year_type range 1800 .. 2100 type hours mod 24 type weekday monday tuesday wednesday thursday friday saturday sunday type date types refined declaring subtypes subtype working_hours hours range 0 .. 12 -- 12 hours work day subtype working_day weekday range monday .. friday -- days work work_load constant array working_day working_hours -- implicit type declaration types modifiers limited abstract private etc private types accessed limited types modified copied within scope package defines ada 95 adds additional features object-oriented extension types ada structured programming language meaning flow control structured standard statements standard constructs deep-level early exit supported use also supported go commands seldom needed -- equal b loop /= b loop end loop b else end 1 .. 10 loop end loop loop end loop case end case aweekday weekday'range loop -- loop enumeration end loop among parts ada program packages procedures functions example package specification example.ads package example end example package body example.adb ada.text_io package body example -- package initialization executed package elaborated begin end example program compiled e.g. using freely available open-source compiler gnat executing gnatmake -z example.adb packages procedures functions nest depth also logical outermost block package procedure function declarations constants types variables procedures functions packages declared order ada language support task-based concurrency fundamental concurrent unit ada task built-in limited type tasks specified two parts – task declaration defines task interface similar type declaration task body specifies implementation task depending implementation ada tasks either mapped operating system threads processes scheduled internally ada runtime tasks entries synchronisation form synchronous message passing task entries declared task specification task entry one accept statements within task body control flow task reaches accept statement task blocked corresponding entry called another task similarly calling task blocked called task reaches corresponding accept statement task entries parameters similar procedures allowing tasks synchronously exchange data conjunction select statements possible define guards accept statements similar dijkstra guarded commands ada also offers protected objects mutual exclusion protected objects monitor-like construct use guards instead conditional variables signaling similar conditional critical regions protected objects combine data encapsulation safe mutual exclusion monitors entry guards conditional critical regions main advantage classical monitors conditional variables required signaling avoiding potential deadlocks due incorrect locking semantics like tasks protected object built-in limited type also declaration part body protected object consists encapsulated private data accessed within protected object procedures functions entries guaranteed mutually exclusive exception functions required side effect free therefore run concurrently functions task calling protected object blocked another task currently executing inside protected object released task leaves protected object blocked tasks queued protected object ordered time arrival protected object entries similar procedures additionally guards guard evaluates false calling task blocked added queue entry another task admitted protected object task currently executing inside protected object guards re-evaluated whenever task leaves protected object time evaluation guards changed calls entries requeued entries signature task requeued blocked added queue target entry means protected object released allows admission another task select statement ada used implement non-blocking entry calls accepts non-deterministic selection entries also guards time-outs aborts following example illustrates concepts concurrent programming ada ada.text_io use ada.text_io procedure traffic begin end traffic pragma compiler directive conveys information compiler allow specific manipulation compiled output certain pragmas built language others implementation-specific examples common usage compiler pragmas would disable certain features run-time type checking array subscript boundary checking instruct compiler insert object code instead function call c/c++ inline functions | [
512,
516,
9224,
2062,
6160,
6675,
1556,
10261,
3613,
9245,
5663,
10786,
1572,
2605,
5677,
9264,
5684,
7734,
2617,
58,
3642,
6718,
9280,
10819,
7237,
8262,
1610,
1611,
9804,
6228,
3159,
7256,
1116,
10851,
7274,
9330,
3705,
1145,
7292,
9345... | Test |
429 | 5 | X_Image_Extension:x image extension x image extension xie extension x window system enhance graphics capability intended provide powerful mechanism transfer display virtually image x-capable hardware first released x11r6 1994 longer included x11 reference distribution removed x11r6.7 2004 xie never gained significant usage — according jim gettys failed due excessive complexity lack good implementation intended use general purpose image-processing engine xie provide set image rendition enhancement primitives could combined arbitrarily complex expressions xie also provided import export facilities moving images client server accessing images resources client side programming library xielib documented prentice hall book developing imaging applications xielib syd logan addition server client library performance test tool xieperf included x11r6 client also written syd logan xie developed contract x consortium san diego ca company longer extant called age logic principal team members include larry hare bob shelley dr. dean verheiden dr. ben fahey dr. gary rogers syd logan practical purposes image extension obsolete adequate image performance instead gained use ubiquitous mit-shm extension allows transfer large images client server machine common use-case via shared memory | [
9223,
8682,
5867,
1644,
7309,
8975,
3764,
2581,
11485
] | Test |
430 | 2 | Action_Center:action center action center notification center included windows phone 8.1 windows 10 windows 10 mobile first introduced windows phone 8.1 july 2014 introduced desktop launch windows 10 july 29 2015 action center replaces charms windows 10 action center allows four quick settings windows 10 users expand view show quick settings notifications sorted categories app users swipe right clear notifications action center also supports actionable notifications starting windows 10 mobile version user swipe top bottom invoke action center features introduced windows phone 8.1 include ability change simple settings volume controls new notifications area design allows user example change wireless networks turn bluetooth airplane mode access driving mode four customisable boxes top screen beneath four horizontally placed boxes include recent text messages social integration desktop version user invoke action center clicking icon taskbar lower right corner screen swiping right microsoft announced microsoft build 2016 cortana would able mirror notifications actions centers windows 10 mobile windows 10 cortana would also able synchronize notifications android devices windows 10 action center | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
6709,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
4704,
3170,
8296,
8299,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8... | Test |
431 | 8 | Web_Services_Security_Kerberos_Binding:web services security kerberos binding web services security kerberos binding web services specification authored ibm microsoft details integrate kerberos authentication mechanism web services security model recent draft specification released 2003 identified review evaluation | [
6098,
3323,
10020,
7878
] | None |
432 | 2 | Interchange_File_Format:interchange file format interchange file format iff generic container file format originally introduced electronic arts company 1985 cooperation commodore order facilitate transfer data software produced different companies iff files standard extension many systems generate iff files file extensions important os stores file format metadata separately file name codice_1 extension commonly used ilbm format files use iff container format resource interchange file format format developed microsoft ibm 1991 based iff except byte order changed little-endian match x86 processor architecture apple aiff big-endian audio file format developed iff tiff image file format unrelated iff file built chunks chunk begins specification calls type id macintosh called ostype windows developers might call fourcc followed 32-bit signed integer integers iff file structure big-endian specifying size following data chunk content bytes specification includes explicit lengths chunk possible parser skip chunks either ca n't n't care process structure closely related type-length-value tlv representation predefined group chunks type ids codice_2 codice_3 codice_4 codice_2 chunk like record structure containing type id indicating record type followed nested chunks specifying record fields codice_3 factoring structure containing series codice_7 property chunks plus nested group chunks properties apply codice_4 collection nested chunks special semantics group chunks contain group chunks depending needs application group chunks like simpler counterparts contain length element skipping group thus done simple unix-style relative seek operation chunks must begin even file offsets befits origins iff motorola 68000 processor could n't address quantities larger byte odd addresses thus chunks odd lengths padded even byte boundary adding so-called pad byte regular end top-level structure iff file consists exactly one group chunks codice_2 codice_3 codice_4 codice_2 far common one type chunk typically different internal structure could numerical data text raw data also possible include iff files chunks note structure four letters followed length formats use standard chunks could present iff file codice_13 containing text information author file codice_14 containing text annotation usually name program created file codice_15 containing text name work file codice_16 containing file version codice_17 containing text copyright information also chunks common among number formats codice_18 holds color palette ilbm anim dr2d files pictures animations vector pictures chunks common name hold different data codice_19 could store image ilbm file sound 8svx file finally chunks unique file type programs create iff files add chunks internal data files later read programs without disruption parsers could skip uninteresting chunks great advantage iff similar formats | [
1162,
139,
5264,
2193,
9236,
3233,
9249,
9381,
8618,
6062,
8369,
8115,
6075,
11076,
10570,
11210,
5709,
1742,
850,
4564,
6233,
1631,
5729,
5736,
11370,
5743,
7407,
499,
11123,
9848,
3323,
124
] | Validation |
433 | 4 | Standard_of_Good_Practice_for_Information_Security:standard good practice information security standard good practice information security published information security forum isf business-focused practical comprehensive guide identifying managing information security risks organizations supply chains recent edition 2018 update 2016 edition upon release 2011 standard significant update standard four years covers information security 'hot topics consumer devices critical infrastructure cybercrime attacks office equipment spreadsheets databases cloud computing 2011 standard aligned requirements information security management system isms set iso/iec 27000-series standards provides wider deeper coverage iso/iec 27002 control topics well cloud computing information leakage consumer devices security governance addition providing tool enable iso 27001 certification 2011 standard provides full coverage cobit v4 topics offers substantial alignment relevant standards legislation pci dss sarbanes oxley act enable compliance standards standard used chief information security officers cisos information security managers business managers managers internal external auditors service providers organizations sizes 2018 standard available free charge members isf non-members able purchase copy standard directly isf standard historically organized six categories aspects computer installations networks address underlying infrastructure critical business applications run end-user environment covers arrangements associated protecting corporate workstation applications endpoint use individuals systems development deals new applications systems created security management addresses high-level direction control standard primarily published simple modular format eliminates redundancy example various sections devoted security audit review consolidated six aspects within standard composed number areas covering specific topic area broken sections contains detailed specifications information security best practice statement unique reference example sm41.2 indicates specification security management aspect area 4 section 1 listed specification 2 within section principles objectives part standard provides high-level version standard bringing together principles provide overview needs performed meet standard objectives outline reason actions necessary section published standard also includes extensive topics matrix index introductory material background information suggestions implementation information see list computing information-security related articles | [
3552,
4448,
997,
10823,
399,
11567,
245,
3447,
6360,
5373
] | Test |
434 | 6 | IEEE_P1619:ieee p1619 institute electrical electronics engineers ieee standardization project encryption stored data generically refers security storage working group siswg includes family standards protection stored data corresponding cryptographic key management siswg oversees work following standards base ieee 1619 standard architecture encrypted shared storage media uses xts-advanced encryption standard xex-based tweaked codebook mode tcb ciphertext stealing cts proper name xtc xex tcb cts acronym already used denote drug ecstasy p1619.1 authenticated encryption length expansion storage devices uses following algorithms p1619.2 standard wide-block encryption shared storage media proposed algorithms including p1619.3 standard key management infrastructure cryptographic protection stored data defines system managing encryption data rest security objects includes architecture namespaces operations messaging transport p1619 also standardized key backup xml format encryption algorithm used data storage support independent encryption decryption portions data so-called narrow-block algorithms operate relatively small portions data wide-block algorithms encrypt decrypt whole sector narrow-block algorithms advantage efficient hardware implementation hand smaller block size provides finer granularity data modification attacks standardized acceptable granularity however example possibility data modification granularity one bit bit-flipping attack generally considered unacceptable reasons working group selected narrow-block 128 bits encryption authentication standard p1619 assuming added efficiency warrants additional risk recognizing wide-block encryption might useful cases another project p1619.2 started study usage wide-block encryption project maintained ieee security storage working group siswg disk storage standard p1619 sometimes called p1619.0 tape storage standard p1619.1 standardized december 2007 discussion ongoing standardization wide-block encryption disk drives like cmc eme p1619.2 key management p1619.3 2004 2006 drafts p1619 standards used advanced encryption standard aes lrw mode 30 aug 2006 meeting siswg straw poll showed members would approve p1619 consequently lrw-aes replaced xex-aes tweakable block cipher p1619.0 draft 7 renamed xts-aes draft 11 members group found non-trivial abandon lrw available public peer-review many years unlike newly suggested variants issues lrw | [
8708,
7045,
7049,
5270,
5671,
6187,
4396,
3629,
3762,
3382,
11321,
7229,
5439,
3780,
4563,
10332,
479,
4581,
5863,
4456,
7794,
2932,
11125,
6904,
8828,
3838
] | Test |
435 | 2 | Stack-based_memory_allocation:stack-based memory allocation stacks computing architectures regions memory data added removed last-in-first-out lifo manner modern computer systems thread reserved region memory referred stack function executes may add state data top stack function exits responsible removing data stack minimum thread stack used store location function calls order allow return statements return correct location programmers may choose explicitly use stack region memory lies thread stack memory said allocated stack data added removed last-in-first-out manner stack-based memory allocation simple typically faster heap-based memory allocation also known dynamic memory allocation another feature memory stack automatically efficiently reclaimed function exits convenient programmer data longer required however data needs kept form must copied stack function exits therefore stack based allocation suitable temporary data data longer required creating function exits thread assigned stack size small bytes small cpus allocating memory stack available result crash due stack overflow processor families x86 special instructions manipulating stack currently executing thread processor families including powerpc mips explicit stack support instead rely convention delegate stack management operating system application binary interface abi | [
2304,
10883,
8587,
8474,
11423,
7589,
5677,
5040,
5176,
9921,
7234,
846,
4562,
5074,
6868,
10581,
6751,
499,
3577,
8700
] | Test |
436 | 8 | Aviary_(image_editor):aviary image editor aviary photo-editing platform ios android windows web web application aviary powers numerous mobile applications including self-titled ios android apps windows app called photo editor contains large collection easy-to-use editing tools custom photo filters frames graphics overlays aviary platform also free sdk provides developers customizable photo editor embedded apps ios android windows os x web company founded 2007 goal providing professional-quality photo-editing tools general public aviary since received millions dollars funding investors spark capital bezos september 22 2014 aviary acquired adobe systems later november 13 2014 aviary integrated suite adobe creative cloud december 2018 adobe announced remove aviary download stores end support product | [
7595,
7983
] | Test |
437 | 7 | Jem_The_Bee:jem bee jem bee java cloud-aware application implements batch execution environment help manage execution jobs described job control language jcl jem bee performs following functions core applications usually performed batch processing involves executing one batch jobs sequential flow job entry manager jem helps receive jobs schedule processing determine job output processed like ibm jes2 many batch jobs run parallel jcl used control operation job correct use jcl parameters allows parallel asynchronous execution jobs may need access data sets one goal jem process work making best use system resources achieve goal resource management needed key phases jem clustering based hazelcast cluster member called node rights responsibilities others exception oldest member going see details hazelcast implements peer-to-peer clustering master node node starts checks see already cluster network two ways find cluster found node first member cluster multicast enabled starts multicast listener respond incoming join requests otherwise listen join request coming via tcp/ip existing cluster already oldest member cluster receive join request checks request right group oldest member cluster start join process join process oldest member every member cluster member list order first member oldest member oldest member dies second member list becomes first member list new oldest member oldest member considered jem cluster coordinator execute actions must executed single member i.e locks releasing due member crash aside normal nodes another kind nodes cluster called supernodes supernode lite member hazelcast supernodes members storage join cluster lite members data partition data nodes get super fast access cluster like regular member nodes used web application running apache tomcat well application server diagram various nodes statuses execution environment set logical definition related cluster must used address job right member executed jem implements 3 kinds coordinates used tags named node belongs jcl defined run jem manages several queues used maintain life-cycle job queues implemented using hazelcast data sharing explanation job moved output queue submitter receive job ended notification via topic addition memory data sharing one important requirements jem use global file system gfs main goal able store data common file system jobs could manage reading writing nevertheless gfs mandatory desire data spread machines configuring jem separate environment specific domains affinities anyway gfs suggested used put keys keystores encryption licenses used jem following folders configured paths mount shared file system may different shared file systems one path needed nodes cluster refers files way avoid redundancy always date relative libraries versions binary versions etc ... documentation referred jem gfs global file system referring paths | [
8640,
3522,
4194,
5956,
9762,
1801,
3629,
5677,
7053,
11568,
1363,
3571,
4535,
11416,
2974
] | Validation |
438 | 9 | List_of_ECMAScript_engines:list ecmascript engines ecmascript engine program executes source code written version ecmascript language standard example javascript new generation ecmascript engines web browsers implementing just-in-time compilation jit variations idea performance benefits just-in-time compilation make much suitable web applications written javascript | [
1409,
259,
8068,
3462,
6791,
8584,
1802,
6154,
10507,
8854,
4378,
10012,
3229,
8605,
7455,
6176,
8479,
1698,
803,
8609,
3237,
5031,
3761,
1203,
10419,
11060,
4920,
1470,
5311,
2880,
7871,
9152,
4171,
5067,
3407,
11087,
339,
84,
4822,
4056... | Test |
439 | 3 | Ubuntu_Budgie:ubuntu budgie ubuntu budgie formerly budgie-remix official community flavor ubuntu featuring budgie desktop combines stable thoroughly-tested ubuntu core modern lightweight traditional-looking desktop developed solus project ubuntu budgie started unofficial community flavor parallel ubuntu 16.04 lts referred budgie-remix budgie-remix 16.10 later released strictly following time frame issued ubuntu 16.10 eventually recognized official community flavor ubuntu rebranded ubuntu budgie vincenzo bovino hired new brand pr manager ubuntu budgie 17.04 released april 2017 updated version 17.10 october 2017 ubuntu budgie 18.10 32-bit support dropped 32-bit support also dropped ubuntu mate budgie-remix 16.04 released april 25 2016 four days release ubuntu 16.04 system contains budgie desktop 10.2.5 window manager based mutter customizable panel notification center settings arc-gtk+ theme used compared ubuntu 16.04 budgie-remix nautilus version 3.18 time ubuntu version nautilus 3.14 also dock-panel plank version 0.11.1 gedit version 3.18 gnome 3.18 photos gthumb 3.4.3 rhythmbox 3.3 totem 3.18 gnome terminal 3.18 libreoffice 5.1.2 mozilla firefox 45.0 transmission 2.84 gtk+ 3.18.9 mesa 11.2.0 xorg 1.18.3 linux kernel 4.4.0. budgie-remix 16.10 released october 16 2016 three days release ubuntu 16.10 system contains shell budgie desktop 10.2.7 gtk+ 3.22 linux kernel 4.8 many new features implemented version full disk encryption home folder encryption support multiple languages installation theme design arc gtk+ new theme icons pocillo one developers budgie-remix david mohammed says ubuntu budgie 17.04 released april 19 2017. budgie-remix renamed name distribution became official ubuntu community system contains budgie desktop 10.2.9 shell linux 4.10 kernel mesa 17.0.3 xorg 1.19.3 budgie-welcome application updated support application indicator appeared sound applets managed gnome 3.24 applications enabled gnome terminal replaced termix chromium replaced google chrome gtk+ theme support qt enabled use theme design arc gtk+ theme icons moka record release version written follows ubuntu budgie 17.10 released october 19 2017 system contains budgie desktop 10.4 shell linux 4.13 kernel budgie 10.4 desktop environment equipped set native features include new stylish alt-tab support spotify raven support switching window controls left right support smb files encrypted volumes addition applets supports customizing appearance dates times addition support left right side panels budgie desktop 10.4 support converting panels dock transparency dynamic auto-image panels ability replenish bottom panel work without terrible jump effect noteworthy improvements release ubuntu budgie 17.10 include night light caffeine tools tilix default terminal emulator instead termix well support tilix quake mode f12 key updated panel icons new wallpapers december 20 2017 canonical withdrew ubuntu 17.10 distribution october hid link site downloading reason critical bug bios damage lenovo notebook models one acer model january 12 2018 version 17.10.1 released contained correction serious problem version 17.10 ubuntu budgie released april 26 2018 system includes linux 4.15 kernel became possible install openvnc network-manager new applets appeared quick note notes dropby downloading viewing data usb devices hot corners moving windows corner screen windowpreviews viewing open windows clockworks viewing time zones autoswitch tying keyboard layout application window mover order quickly move window another virtual desktop gnome applications updated version 3.28 nautilus version 3.26 | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
9324,
10860,
5742,
2671,
3189,
5755,
11388,
2692,
8837,
9353,
9873,
11410,
... | Test |
440 | 2 | Microsoft_Product_Activation:microsoft product activation microsoft product activation drm technology used microsoft corporation several computer software programs notably windows operating system office productivity suite procedure enforces compliance program end-user license agreement transmitting information product key used install program user computer hardware microsoft inhibiting completely preventing use program validity license confirmed procedure met significant criticism many consumers technical analysts computer experts argue poorly designed highly inconvenient ultimately nothing prevent software piracy process successfully circumvented multiple occasions installing retail copy windows office user asked input unique product key supplied certificate authenticity included program later verified activation immediate activation required following installation program must activated within specific period time order continue function properly throughout grace period user periodically reminded activate program warnings becoming frequent time certain versions windows office available volume license single product key used multiple installations programs purchased license must still activated exception windows xp versions office released prior office 2010 businesses using licensing system option using microsoft activation servers creating managing windows pre-installed computer original equipment manufacturer oem operating system automatically activated without need interaction user case copy windows installed use product key listed certificate authenticity rather master product key issued oems called system locked pre-installation slp key boot windows confirms presence specific information stored bios manufacturer ensuring activation remains valid computer even product key used another machine activation performed within grace period fails illegal invalid product key following restrictions imposed user activation takes place program saves record verification data user computer system booted significant hardware changes application likely require reactivation prevent copy program installed two different systems windows 10 activation process also generate digital entitlement allows operating system hardware license status saved activation servers operating system license automatically restored clean installation without need enter product key activation performed utility supplied windows office called activation wizard performed either internet telephone activating internet activation wizard automatically transmits receives verification data microsoft servers completing process without interaction user activation telephone requires user microsoft agent verbally exchange activation information case installation id generated read agent agent verifies information replies confirmation id typed activation wizard activation wizard generates verification data primarily based information hardware computer windows xp information following eight categories hardware included verification data also based product key entered activation cases product key checked list known illegally distributed keys certain retail copies windows office sold certain countries classified emerging markets geographical activation restrictions allow user activate product within indicated region activation completes successfully user continue use application without issues impediments also key gets blacklisted application continue run normal unless clean install activation performed key blacklisted following tables illustrate usage product activation throughout microsoft software specifying whether programs equipped retail volume licensing activation well geographical activation restrictions microsoft says product activation benefits consumers allowing microsoft produce higher quality software nevertheless received much criticism regarding design implementation effectiveness stopping piracy respect privacy rights instance development windows xp beta testers strongly criticized introduction product activation particularly change computer hardware required re-activation ken fischer ars technica questioned whether activation would ultimately effective stopping piracy stating casual computer users would affected would fool think someone wo n't find way break whole thing dave wilson technology columnist los angeles times describes activation another example rapacious monopolist abusing computer users helpless anything believed system would significant effect professional pirates fred langa informationweek reference transmission hardware information activation stated many users incensed level monitoring intrusion control microsoft finally dr. cyrus peikari seth fogie security consultants considered product activation hostile privacy human dignity others defend microsoft use product activation harrison group market research firm conducted study sponsored microsoft 2011 illustrating computers running activated versions windows software average 50 faster pirated counterparts group concluded stating users genuine microsoft products ultimately receive superior performance counterfeit users susceptible security issues lost productivity fully licensed gmbh developer digital rights management technology criticizing microsoft vague nature information sent given computer activation nevertheless concluded activation particularly intrusive significantly violate privacy microsoft product activation also criticized multiple occasions violating patent law 2006 microsoft required pay 142 million z4 technologies infringing product activation patent 2009 microsoft ordered pay 388 million uniloc patent infringement product activation windows xp office xp windows server 2003 microsoft product activation cracked circumvented numerous occasions since introduced 2001 2001 uk security company called bit arts successfully managed bypass product activation windows xp 2003 volume license keys windows xp leaked public allowing users purchased volume license operating system bypass activation 2009 several security flaws windows 7 used hackers circumvent activation since introduction windows vista attempts circumvention product activation focused using leaked slp product keys bios information used oems preactivate windows 2007 circumvention measure developed windows vista warez-group paradox simulates bios allowing leaked slp information fed operating system bypassing activation 2009 slp product keys certificate information windows 7 leaked public allowing bios reconfigured bypass activation | [
11144,
6797,
4505,
8103,
3496,
7983,
6972,
9791,
2244,
2632,
460,
4309,
4447,
7523,
4074,
1515,
1776,
1904,
9328,
7411,
2046
] | Test |
441 | 4 | Weev:weev andrew alan escher auernheimer born best known pseudonym weev american computer grey hat hacker affiliated alt-right identified using variety aliases media although sources correctly provide first name andrew member hacker group goatse security auernheimer exposed flaw security compromised e-mail addresses ipad users revealing flaw media group also exposed personal data 100,000 people led criminal investigation indictment identity fraud conspiracy auernheimer sentenced 41 months federal prison served approximately 13 months conviction vacated higher court 2016 auernheimer responsible sending thousands white-supremacist flyers unsecured web-connected printers multiple universities locations u.s since release prison lived variety locations eastern europe middle east 2017 reported acting webmaster neo-nazi website daily stormer auernheimer claimed responsibility reclassification many books gay issues pornography amazon services april 2009 amazon said responsible incident even amazon incident several media publications profiled regarding hacking trolling activities including new york times claimed member hacker group called organization making 10 million annually also claimed owner rolls-royce phantom times story auernheimer published reporters sought commentary hacking-related stories gawker published story sarah palin email hacking incident prominently featured auernheimer comments title story 2008 new york times interview besides claiming make millions dollars rolls-royce also claimed memphis two handle used troll author game developer kathy sierra response touchy reaction receiving threatening comments blog memphis two posted libelous account career online including charges former sex worker home address social security number post instigated harassment abuse sierra led withdraw online activity several years member gay nigger association america anti-blogging trolling group take name 1992 danish movie gayniggers outer space members goatse security involved ipad hack also members gnaa also formerly gnaa president auernheimer member group computer experts known goatse security exposed flaw security allowed e-mail addresses ipad users revealed contrary first claimed group revealed security flaw gawker media notified also exposed data 114,000 ipad users including celebrities government military group actions rekindled public debate disclosure security flaws auernheimer maintains goatse security used common industry standard practices said tried good guys jennifer granick electronic frontier foundation also defended methods used goatse security fbi opened investigation incident led criminal complaint january 2011 computer fraud abuse act shortly investigation opened fbi local police raided auernheimer home arkansas fbi search related investigation security breach auernheimer instead detained state drug charges police allege execution search warrant related breach found cocaine ecstasy lsd schedule 2 3 pharmaceuticals released 3,160 bail pending state trial release bail broke gag order protest maintained violations civil rights particular disputed legality search house denial access public defender also asked donations via paypal defray legal costs january 2011 drug-related charges dropped immediately following auernheimer arrest federal authorities u.s. justice department announced would charged one count conspiracy access computer without authorization one count fraud although co-defendant daniel spitler quickly released bail auernheimer initially denied bail unemployment lack family member host incarcerated federal transfer center oklahoma city released 50,000 bail late february 2011 federal grand jury newark new jersey indicted auernheimer one count conspiracy gain unauthorized access computers one count identity theft july 2011 september 2011 freed bail raising money legal defense fund november 20 2012 auernheimer found guilty one count identity fraud one count conspiracy access computer without authorization november 29 2012 auernheimer wrote article wired entitled forget disclosure – hackers keep security holes advocating disclosure zero-day exploit individuals use interests social justice january 2013 techcrunch article likened prosecution aaron swartz writing march 18 2013 found guilty identity fraud conspiracy access computer without authorization auernheimer sentenced 41 months federal prison ordered pay 73,000 restitution prior sentencing posted ask anything thread reddit comments hope give maximum people rise storm docks regret nice enough give chance patch dropping dataset gawker wo n't nearly nice next time cited prosecution next day court justification sentence later march 2013 civil rights lawyer george washington university law school faculty orin kerr joined auernheimer legal team free charge auernheimer serving sentence federal correctional institution allenwood low low-security federal prison pennsylvania scheduled release january 2016 july 1 2013 legal team filed brief third circuit court appeals arguing convictions reversed violated relevant provisions computer fraud abuse act april 11 2014 third circuit issued opinion vacating auernheimer conviction basis venue new jersey improper judges address substantive question legality site access skeptical original conviction noting circumvention passwords occurred publicly accessible information obtained released prison april 11 2014 october 2014 auernheimer published article neo-nazi blog daily stormer announced white nationalist 2012 told gawker jewish ancestry also claimed converted mormonism according pandodaily auernheimer living lebanon 2014 order avoid prosecution united states 2016 told interviewer living kharkiv ukraine southern poverty law center reported auernheimer left ukraine 2017 tiraspol capital transnistria self-proclaimed republic eastern europe october 2015 auernheimer published names u.s. government employees exposed adult friendfinder ashley madison data breaches told cnn went straight government employees seem easiest shame also involved release undercover planned parenthood videos temporary restraining order washington post quoted saying lulz pair incidents 2016 auernheimer sent flyers adorned racist antisemitic messages thousands unsecured printers across u.s. flyers bearing swastikas promoting daily stormer sent several universities also claimed responsibility 50,000 flyers sent printers across u.s. urging killing black jewish children praising anders behring breivik killed 77 people pair terrorist attacks norway 2011 claimed used tool scour internet unsecured printers finding million vulnerable devices email leak buzzfeed news october 2017 revealed auernheimer contact milo yiannopoulos asked auernheimer advice article alt-right yiannopoulos asked editor breitbard permission auernheimer appear podcast rejected since editor want breitbart associate legit racist 2017 auernheimer reported working webmaster daily stormer despite neo-nazi affiliations auernheimer mother stated jewish relatives sides family | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
8244,
1608,
3657,
8779,
82,
4703,
8288,
8292,
119,
10875,
3711,
8320,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
10995,
9460,... | None |
442 | 3 | SPARCstation_ZX:sparcstation zx sparcstation zx computer workstation produced sun microsystems launched august 1993 end-of-lifed march 1994 original price usd 19,995.00 sparcstation zx identical sparcstation lx addition sun zx also known leo accelerated 3d framebuffer card double-width double-decked sbus card providing 24-bit color performance 750,000 3d vectors per second 310,000 triangle mesh/second | [
9665,
9955
] | Test |
443 | 9 | Programming_style:programming style programming style also known code style set rules guidelines used writing source code computer program often claimed following particular programming style help programmers read understand source code conforming style help avoid introducing errors classic work subject elements programming style written 1970s illustrated examples fortran pl/i languages prevalent time programming style used particular program may derived coding conventions company computing organization well preferences author code programming styles often designed specific programming language language family style considered good c source code may appropriate basic source code etc however rules commonly applied many languages good style subjective matter difficult define however several elements common large number programming styles issues usually considered part programming style include layout source code including indentation use white space around operators keywords capitalization otherwise keywords variable names style spelling user-defined identifiers function procedure variable names use style comments programming styles commonly deal visual appearance source code goal readability software long available formats source code automatically leaving coders concentrate naming logic higher techniques practical point using computer format source code saves time possible enforce company-wide standards without debates indent styles assist identifying control flow blocks code programming languages indentation used delimit logical blocks code correct indentation cases matter style languages indentation white space affect function although logical consistent indentation makes code readable compare something like first two examples probably much easier read indented established way hanging paragraph style indentation style especially useful dealing multiple nested constructs note however example simply moduliq zero indent style groups carriage returns rather indents compare lua use traditional curly braces parenthesis if/else statements require expression followed codice_1 closing if/else statement codice_2 indentation optional codice_3 codice_4 codice_5 used true/false statements true/false statements would mean false python uses indentation indicate control structures correct indentation required need bracketing curly braces i.e codice_6 codice_7 eliminated hand copying pasting python code lead problems indentation level pasted code may indentation level current line reformatting tedious hand text editors ides features automatically also problems python code rendered unusable posted forum web page removes white space though problem avoided possible enclose code white space-preserving tags pre ... /pre html code ... /code bbcode etc notice python use curly braces regular colon e.g codice_8 many python programmers tend follow commonly agreed style guide known pep8 tools designed automate pep8 compliance haskell similarly off-side rule i.e two dimension syntax indentation meaningful define blocks although alternate syntax uses curly braces semicolons haskell declarative language statements declarations within haskell script example may written one line haskell encourage use literate programming extended text explain genesis code literate haskell scripts named codice_9 extension everything comment except blocks marked code program written latex case codice_10 environment marks code also active code paragraph marked preceding ending empty line starting line code greater sign space example using latex markup example using plain text often helpful align similar elements vertically make typo-generated bugs obvious compare latter example makes two things intuitively clear clear former however note arguments vertical alignment example simple refactoring operation performed code renaming variables replacement r anothervalue resulting code look like original sequential formatting still look fine change situations white space required grammars free-format languages unconcerned amount appears style related white space commonly used enhance readability currently known hard facts conclusions studies whitespace styles best readability instance compare following syntactically equivalent examples c code versus use tabs create white space presents particular issues enough care taken location tabulation point different depending tools used even preferences user example one programmer prefers tab stops four toolset configured way uses format code another programmer prefers tab stops eight toolset configured way someone else examines original person code may well find difficult read one widely used solution issue may involve forbidding use tabs alignment rules tab stops must set note tabs work fine provided used consistently restricted logical indentation used alignment | [
3876,
6502,
8262,
8775,
4777,
5710,
5651,
8502,
3960,
2045
] | None |
444 | 8 | Web_banner:web banner web banner banner ad form advertising world wide web delivered ad server form online advertising entails embedding advertisement web page intended attract traffic website linking website advertiser many cases banners delivered central ad server advertiser scans logfiles detects web user visited advertiser site content site clicking banner ad advertiser sends content provider small amount money usually around five ten us cents payback system often content provider able pay internet access supply content first place usually though advertisers use ad networks serve advertisements resulting revshare system higher quality ad placement web banners function way traditional advertisements intended function notifying consumers product service presenting reasons consumer choose product question fact first documented hotwired 1996 researchers rex briggs nigel hollis web banners differ results advertisement campaigns may monitored real-time may targeted viewer interests behavior often tracked use click tag many web surfers regard advertisements annoying distract web page actual content waste bandwidth cases web banners cover screen content user wishes see newer web browsers often include software adblocker options disable pop-ups block images selected websites another way avoiding banners use proxy server blocks privoxy web browsers may also extensions available block banners example adblock plus mozilla firefox adthwart google chrome ie7pro internet explorer pioneer online advertising prodigy company owned ibm sears time prodigy used online advertising first promote sears products 1980s advertisers including aol one prodigy direct competitors prodigy unable capitalize first mover advantage online advertising first clickable web ad later came known term banner ad sold global network navigator gnn 1993 heller ehrman white mcauliffe defunct law firm silicon valley office gnn first commercially supported web publication one first commercial web sites ever hotwired first web site sell banner ads large quantities wide range major corporate advertisers andrew anker hotwired first ceo rick boyce former media buyer san francisco advertising agency hal riney partners spearheaded sales effort company hotwired coined term banner ad first company provide click rate reports customers first web banner sold hotwired paid corp. put online october 27 1994 another source also credits hotwired october 1994 coors zima campaign first web banner may 1994 ken mccarthy mentored boyce transition traditional online advertising first introduced concept clickable/trackable ad stated believed direct response model—in return investment individual ads measured—would prove sustainable long run online advertising spite prediction banner ads valued sold based number impressions generated first central ad server released july 1995 focalink communications enabled management targeting tracking online ads local ad server quickly followed netgravity january 1996 technology innovation ad server together sale online ads impression basis fueled dramatic rise proliferation web advertising provided economic foundation web industry period 1994 2000 new online advertising model emerged early years 21st century introduced goto.com later overture yahoo mass marketed google adwords program relies heavily tracking ad response rather impressions banner ad played significant role enabling rapid development paid advertising internet standard formats operation clickable link destination pricing system impressions banner ad enabled web site sell advertising provided operating requirements ad server companies netgravity develop systems needed operate track web-based advertising banner ad also unique compared advertising appearing comparable media newspapers magazines unlike advertising periodicals banner ad encouraged media consumers actually leave media service product go separate media environment typically web site operated advertiser contrast readers viewing newspaper magazine advertising encouraged leave periodical rather message advertising intended influence reader ad sizes standardized extent iab prior iab standardization banner ads appeared 250 different sizes however websites advertising networks outside eurosphere north america may use iab base ad sizes iab ad sizes standard web banners included iab universal package ad units guidelines supported major ad serving companies particularly relevant iab members adform appnexus chitika conversant epom hiro mixpo spotxchange zedo many others additionally ad serving providers may offer non-standard banner sizes technologies well support different online advertising formats e.g native ads however standard banner ad sizes constantly evolving due consumer creative fatigue banner blindness ad companies consistently test performance ad units ensure maximum performance clients publishers known unique custom executions include buzzfeed craveonline quartz publication thought catalog elite daily vice media inc. mic media company many others according media research firm emarketer types custom executions publisher direct buys rise native advertising spending hit 4.3 billion end 2015 use web banners restricted online advertising hero images widespread examples non-advertising application web banners banners type constitute part website design typically used aesthetic reasons hero images represented large photos graphics videos placed prominent sections website | [
5536,
9187,
488,
3688,
6538,
8735,
6576,
2611,
4725,
119,
24,
3323,
988,
4797,
8639
] | Test |
445 | 3 | Ys_III:_Wanderers_from_Ys:ys iii wanderers ys ys iii initially released pc-8801 pc-9801 1989 versions msx2 x68000 soon followed 1991 number console ports produced versions turbografx-cd famicom snes sega genesis port playstation 2 released taito corporation 2005 turbografx-cd snes genesis ports well playstation portable microsoft windows remake received official english-translated releases addition famicom msx2 ports fan-translated opening scene informs player three years since events adol christin friend dogi journey passing town find gypsy caravan dogi fortune told fortune teller crystal ball explodes adol dogi decide go dogi hometown redmont way redmont pair chance upon wildcat attacks saving dogi childhood friend elena stoddart process upon arriving learn townspeople threatened men nearby valestein castle always ready adventure adol decides assume task helping travelling tigray quarry adol discovers cave monsters taken quarry adol travels deep inside quarry rescue edgar mayor redmont defeating boss quarry ellefale claiming first statue adol finds chester brother elena threatening edgar adol pulls edgar back entrance quarry goes back redmont meeting elena formally time adol learns statues sought lord macguire king felghana province game takes place another statue sought illsburn ruins adol travels retrieve another townsperson father pierre gone well adol gets altar sorts overhears chester talking pierre brief duel chester adol caught tells chester elena worried lord macguire watching chester rebuffs adol kicks pit lava battling monsters adol finds fire dragon gilan defeats reward gets adol large river lava solidifying escaping pit ellena meets adol top staircase informs statue indeed hidden opens hidden door fights wyvern claiming second statue upon coming back town adol meets dogi informs heading mountains edgar wishes see adol adol meets edgar informs men valestein ballacetine snes version castle actively seeking statues informs adol statue tigray quarry adol proceeds quarry defeats monster guarding third statue adol heads back redmont inform edgar upon arriving edgar house interrupts conversation edgar lord macguire bishop garland galbalan galbalan according edgar demon tremendous power used rule populace felgana long time ago sealed away hero using four statues adol sent eldarm mountains chat hermit living adol finds dogi chatting master mountain master tells adol statue indeed mountains inaccessible due statue guards entrance adol travels mountain peak defeats harpy gaining staff opens way statue defeats guardian dragon claims fourth final statue chester show tries force adol hand four statues cave interrupts conversation dogi digs two men chester reunited dogi converse briefly adol dogi leave town find almost deserted mr. gardner town guard nowhere found inside walls find mr. gardner townsfolk apparently adol dogi mountains soldiers valestein castle came town kidnapped townsfolk exchange statues adol converses edgar setting castle valestein castle adol fights way dungeons finds townspeople father pierre tells pierre get people castle goes find lord macguire way lord macguire chambers comes across bishop garland taunts adol garland reveals adol defeats lengthy battle upon reaching lord macguire adol finds lord macguire repentant sorry actions make reparations actions adol goes back across bridge met elena congratulates beating soldiers hero galbalan reawoken due seal statues broken kidnaps elena midair taunts adol telling bring statues island fortress adol goes back town doubting edgar dogi bring adol back senses adol sets rescue elena surviving many challenges adol comes platform ellena chester talking galbalan taunts chester adol arrives adol promises statues galbalan harm chester elena galbalan agrees pulls adol realm adol fights defeats galbalan rescues elena adol finds chester gone center galbalan island seal away ellena tells adol village people descendants man sealed away galbalan first time chester knows sink galbalan island adol must interfere adol understands elena leave sinking island scene shifts chester manipulating crystals sink island good tells adol take care elena sacrificing destroy island island disappears good back redmont adol dogi inn getting ready leave dogi tells adol go ahead something take care leaving early morning cause stir within community dogi chatting ellena love adol dogi leaves ellena almost stays walks inn mr. gardner asking adol dogi planning mr. gardner would like adol dogi stay adol wants adventures dogi leave walking along shore ellena runs shouts dogi adol wave goodbye elena cries text scrolls telling adventures waiting adol dogi instead top-down camera view used previous ys games ys iii uses side-scrolling platformer presentation auto-attack removed player must push button make adol attack enemies otherwise gameplay mechanics identical previous entries series statistics equipment shopping experience system magic function ys ii though spells represented rings instead wand icons mp renamed ring power neither player character enemies temporary invincibility soundtrack original version ys iii entirely composed mieko ishikawa x68000 version game introduced number additional compositions composed masaaki kawai kawai also responsible arrangements ishikawa existing compositions version falcom released number music cds dedicated music ys iii include commemorate release ys iii remake oath felghana 2005 see falcom released ys premium music cd box felghana boxed set ys iii music produced 2005 falcom released ys oath felghana microsoft windows remake ys iii oath felghana slightly modifies greatly expands story original ys iii expands dungeons extend gameplay time original side-scroller also replaced 3d game engine based used 2010 falcom released version ys oath felghana playstation portable xseed games officially released english later year followed 2012 newly localized version original 2005 pc release entertainment weekly gave game c+ wrote ys pronounced 'ease 'wise one classic role-playing games adults hard time getting used kind 're hailed savior beleaguered townspeople given sword various magical powers charged restoring peace land fill-in-the-blank point venture forth bravely get slaughtered first insignificant bug happens cross path learn fight back though ys interesting enough adventure becomes somewhat tedious since follow prearranged story line little room surprise experimentation battles even evolved creatures bugs start seem awfully repetitive youtuber neoturbomaniac reviewed turbo grafx cd version ys iii giving overall positive rating criticized game choppy parallax scrolling poor quality voice acting step positively received voice acting ys book ii said game fondness ys iii step ys book 1 2 ys fan keeps coming back fun first played 25 years ago still enjoy today say worth playing even though best game series emulation accessible way play turbo grafx cd version due high cost pf obtaining original 9:16-9:39 youtuber snes drunk commented ys iii wanderers ys super nintendo saying tough know recommend ys iii fun first games series like ys iv super famicom lot well like combat system games lot ys iii little standard guess makes little bland n't think bad game definitely flawed 2:58-3:15 youtuber aboveup spoke game negative terms also complaining poor quality voice acting ys iii compared first two games choppy parallax scrolling turbo grafx cd version game also stated boss battles wanderers ys n't well made original games said generally think ys iii wanderers ys good game game worth experiencing exception stellar soundtrack really good sprite work n't much could speak positively outside maybe jab along lines know 10:50-11:06 | [
10240,
2249,
10316,
6797,
10931
] | None |
446 | 2 | IPad_(4th_generation):ipad 4th generation fourth-generation ipad marketed ipad retina display colloquially referred ipad 4 tablet computer produced marketed apple inc compared predecessor third-generation ipad fourth-generation ipad maintained retina display featured new upgraded components apple a6x chip lightning connector introduced september 12 2012 shipped ios 6.0 provides platform audio-visual media including electronic books periodicals films music computer games presentations web content like ipad 2 third-generation ipad supported five major ios releases case ios 6 7 8 9 10. ios 11 released 19 september 2017 support fourth-generation ipad ios 11 drops support 32-bit devices announced media conference october 23 2012 fourth generation ipad line first released november 2 2012 35 countries december ten countries including china india brazil third generation discontinued following fourth announcement seven months general availability device available either black white front glass panel various connectivity storage options storage size options include 16 gb 32 gb 64 gb 128 gb available connectivity options wi-fi wi-fi cellular lte capabilities fourth-generation ipad received primarily positive reviews praised hardware improvements well retina display also featured device predecessor furthermore benchmarks reveal fourth-generation ipad able perform cpu-reliant tasks twice fast predecessor first weekend sales aggregated amount 3 million fourth-generation ipads ipad minis sold rumors regarding next-generation ipad emerged shortly release third-generation ipad point speculated next ipad released would smaller size speculations emerged july 2012 digitimes help unspecified sources claimed apple made small revisions upcoming ipad scheduled release late 2012 october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company pre-disclose subject event widely expected regarding ipad mini photographic images device dock connector front camera emerged shortly media event media event apple ceo tim cook introduced new version ibooks new generations macbook pro mac mini imac unveiling fourth-generation ipad lower-end ipad mini unveiling apple stated fourth-generation ipad would available pre-order online selected number countries starting october 26 november 2 apple released wi-fi model device 35 countries across europe east asia north america cellular model released in-store weeks initial release device release fourth-generation ipad led discontinuation predecessor angered many third-generation ipad users response apple extended 14-day return policy 30 days itproportal noted since price models identical consumers purchased third-generation ipad within time frame effectively allowed exchange discontinued device fourth-generation model january 29 2013 apple announced scheduled launch 128 gb variant 4th generation ipad released february 5 2013 following announcement ipad air october 22 2013 sales fourth-generation ipad discontinued fourth-generation ipad reintroduced march 18 2014 following discontinuation ipad 2 order make reintroduction low-end device ipad air price cut 20 original launch price october 16 2014 fourth-generation ipad discontinued favor ipad air 2 ipad air took place entry-level ipad time fourth-generation ipad shipped ios 6.0 later ios 7 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access apple app store digital application distribution platform ios service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available ipad comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed without computer although tablet designed make phone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation application using voice recognition technology iphone 4s user speaks ipad types say screen though ipad must internet connection available via wi-fi cellular network due feature reliance apple servers translate speech fourth-generation ipad optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad 4th generation ipad unlike immediate predecessor 3rd generation ipad supported ios 10 however announced apple wwdc 2017 4th generation ipad along iphone 5/5c support ios 11. ios 10.3.3 latest final version ios include support wifi models devices ios 10.3.4 latest final version ios include support cellular models devices device apple a6x soc comprises 32-bit apple dual-core cpu running 1.4 ghz quad-core powervr sgx554mp4 gpu 1 gb ram also features 5-megapixel rear-facing camera capable 1080p video recording 720p hd front-facing videophone camera designed facetime device features 9.7 diagonal display resolution 2,048 1,536 qxga resulting 3.1 million pixels gives display pixel density 264 ppi total number pixels used display fourth-generation ipad four times ipad 2 – providing even scaling prior model previous generations iphone ipad hardware four buttons one switch fourth-generation ipad device portrait orientation home button face device display returns user home screen wake/sleep button top edge device two buttons upper right side device performing volume up/down functions switch whose function varies according device settings generally functioning either switch device silent mode lock/unlock orientation screen externally fourth-generation ipad identical predecessor apart differences dock connectors used change manufacturers produce display addition wi-fi version weighs 652 grams cellular model weighs 662 grams – 2 grams heavier respective predecessors display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi fourth-generation ipad available 16 32 64 128 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos audio playback fourth-generation ipad frequency response 20 hz 20,000 hz without third-party software play following audio formats he-aac aac protected aac mp3 mp3 vbr audible formats 2 3 4 aea aax aax+ alac aiff wav ipad uses internal rechargeable lithium-ion polymer lipo battery hold charge 11,560 mah batteries made taiwan simplo technology 60 dynapack international technology 40 ipad designed charged relatively high current 2 amps using included 12 w usb power adapter lightning connector charged older usb port computer limited 500 milliamps 0.5 amps result ipad use powered computer may charge slowly high-power usb ports found newer computers accessories provide full charging capabilities apple claims battery provide 10 hours video audio playback web surfing wi-fi 9 hours web surfing cellular connection one month standby like rechargeable battery ipad battery loses capacity time however ipad battery user-replaceable program similar ipod iphone battery-replacement programs apple promised replace ipad hold electrical charge refurbished unit fee battery replacement process user data preserved/transferred repaired refurbished units come new case warranty refurbished unit may vary jurisdictions smart cover introduced ipad 2 screen protector magnetically attaches face ipad cover three folds allow convert stand also held together magnets smart cover also assume positions folding smart covers microfiber bottom cleans front ipad wakes unit cover removed comes five colors polyurethane expensive leather apple offers several accessories adapters proprietary lightning connector port besides headphone jack dock holds ipad angle dock connector audio line-out port ipad use bluetooth keyboards also work macs pcs ipad charged standalone power adapter wall charger compatible ipods iphones 12 watt charger included fourth-generation ipad received primarily favorable reviews critics commentators review gareth beavis techradar praised device high resolution retina display techradar wrote ... one impressive 've seen tablet date however reviewer also wrote screen lacks 'punch seen super amoled screens seen devices like samsung galaxy note 2 review also praised interface ipad simple design easy use layout additionally aspects design ipad updated soc noted praised review critically beavis noted ipad still moderately heat medium usage however extent seen third-generation ipad tim stevens engadget praised retina display labelled best screen available tablets benchmarks tests conducted engadget resulted stevens concluding fourth-generation ipad fastest apple mobile device available surpassing record iphone 5 held brief period benchmark tests conducted slashgear concluded soc fourth-generation ipad able perform cpu-reliant tasks twice fast third-generation ipad series benchmark tests conducted graphics performance fourth-generation ipad anandtech resulted device achieving highest score compared consumer mobile devices including samsung galaxy iii nexus 10 third-generation ipad performance increase fourth-generation ipad varies tests however increase nonetheless evident furthermore battery longevity tests conducted organization suggests battery fourth-generation ipad able last longer predecessor however battery updated ipad 2 able outlast fourth-generation ipad first weekend sales ipad mini fourth-generation ipad apple reported sold aggregated number 3 million units techradar noted first weekend sales figures fourth-generation ipad lower corresponding figures third-generation ipad sold 3 million units first weekend subsequent reports analysis david hsieh technology analyst suggest ipad mini selling better fourth-generation ipad despite noted slump sales apple stock price direct response figures released rose 1.4 584.62 november 5 repairability review conducted ifixit fourth-generation ipad scored 2 10 10 easiest repair due use adhesive attach components however reviewers noted several components screen battery could removed easily replacement | [
10755,
9732,
1549,
5647,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
6186,
4139,
6700,
7211,
1074,
8754,
9784,
8253,
576,
1090,
8783,
4180,
10838,
1623,
3672,
10840,
9312,
3681,
9826,
8806,
3691,
2673,
6258,
10357,
6264,
4220,
... | Test |
447 | 0 | DiShIn:dishin described dishin disjunctive shared information method calculate shared information content complementing value informative common ancestor mica disjunctive ancestors exploring multiple inheritance ontology shared information content two terms ontology information science popular technique measure semantic similarity.. dishin re-defines shared information content two concepts average disjunctive ancestors assuming ancestor disjunctive difference number distinct paths concepts different informative ancestor words disjunctive ancestor informative ancestor representing given set parallel interpretations dishin improvement grasm terms computational efficiency management parallel interpretations example palladium platinum silver gold considered precious metals silver gold copper considered coinage metals thus calculating semantic similarity platinum gold dishin starts calculating number paths difference common ancestors metal two paths gold one platinum path difference one precious one path concept path difference zero since path difference distinct common ancestors metal precious considered disjunctive common ancestors calculating semantic similarity platinum palladium dishin starts calculating number paths difference common ancestors metal precious one path concept path difference zero common ancestors thus common ancestor precious informative considered disjunctive common ancestor given node-based semantic similarity measures proportional average information content common disjunctive ancestors metal precious case platinum gold precious case platinum palladium means dishin palladium platinum similar platinum gold calculating semantic similarity silver gold dishin starts calculating number paths difference common ancestors case platinum palladium common ancestors path difference zero since silver gold share relationships therefore parallel interpretations thus informative common ancestor precious coinage considered disjunctive common ancestor means dishin similarity silver gold greater equal similarity pair leaf concepts thus dishin penalize parallel interpretations grasm | [
11206
] | Test |
448 | 7 | CenturyLink:centurylink centurylink inc. global technology company headquartered monroe louisiana provides communications network services security cloud solutions voice managed services customers worldwide company member p 500 index fortune 500 communications services include local long-distance voice broadband multi-protocol label switching mpls private line including special access ethernet hosting including cloud hosting managed hosting data integration video network public access voice internet protocol voip information technology ancillary services centurylink also serves global enterprise customers across north america latin america emea asia pacific centurylink ’ products services focus 3 key segments enterprise business small business residential centurylink enterprise business provides products services around network cloud security voice managed services enterprise customers centurylink ’ network services include sd wan mpls/ipvpn hybrid wan ethernet internet access wavelength services dark fiber private lines centurylink cloud provides big data service internet things iot multi-cloud management private cloud public cloud bare metal saas applications cloud connect centurylink security monitors billion security events daily services include cloud infrastructure ddos web application email web security company also provides analytics threat management risk compliance support threat research labs centurylink offers voice products ranging traditional landlines unified communications collaboration uc c services recognized 2018 frost sullivan “ growth excellence voip access sip trunking ” centurylink ’ managed services include advanced professional services consulting strategic partnerships centurylink small business provides products services around internet phone tv cloud applications centurylink residential provides internet including gigabit fiber voice tv via partnership directv company also offers bundling verizon wireless centurylink residential services available following states centurylink fiber fiber premises service united states providing broadband internet prism tv small slowly growing number locations service first introduced omaha nebraska next rolled las vegas nevada plans expansion several markets unlike company existing high speed internet deployments utilize fiber-to node/neighborhood increase speed adsl2+ speeds 20/2 mbit/s vectored vdsl2+ speeds 140/10mbit/s markets centurylink installs fiber optic cable way home business speeds 1,000 mbit/s download 1,000 mbit/s upload using calix optical network terminals feb. 2 2014 centurylink announced availability gigabit fiber service multi-tenant businesses salt lake city surrounding communities aug. 5 2014 centurylink announced expansion gigabit fiber service 16 additional markets sep 15 2015 centurylink announced expansion gigabit fiber service residential business customers six additional states increasing company service coverage select areas 17 states gigabit fiber markets may 2 2017 centurylink inc. completed previously announced sale data centers colocation business funds advised bc partners consortium including medina capital advisors longview asset management deal worth approximately 1.86 billion centurylink retaining approximately 10 equity stake consortium newly formed global secure infrastructure company cyxtera technologies centurylink second largest u.s. communications provider global enterprise customers centurylink customers 60 countries october 27 2008 embarq announced would acquired centurytel inc. all-stock transaction valued 6 billion centurytel ceo glen post would remain ceo merged company following acquisition remained ceo 2018 embarq former landline business sprint served cities 18 states including nevada florida north carolina ohio deal made centurytel third-largest landline phone provider pennsylvania behind verizon verizon pennsylvania verizon north comcast april 22 2010 centurylink point still legally known centurytel inc. announced would acquire qwest stock-for-stock transaction agreement centurylink would swap 0.1664 shares share qwest result centurylink shareholders prior merger wound 50.5 share ownership combined company former qwest shareholders gained remaining 49.5 valuation centurylink purchase 12 billion merger completed april 1 2011 addition qwest allowed centurylink become third largest telecommunications company united states largest landline phone provider state colorado new company 17 million access lines 5 million broadband customers 1.4 million video subscribers across 37 states merger also made centurylink owner one so-called baby bells qwest included us west baby bell much western united states july 15 2011 centurylink acquired savvis inc. global provider cloud infrastructure hosted services 2 billion represented outstanding shares savvis common stock 40 per share acquisition allowed centurylink provide expanded managed hosting cloud services december 4 2012 centurylink launched integrated suite cloud services called savvisdirect savvisdirect expansion centurylink ’ portfolio savvis cloud services includes cloud application hosting cloud servers cloud storage private cloud small businesses administrators developers centurylink later shuttered savvisdirect subsidiary consolidating cloud service offerings internally october 16 2012 savvis acquired ito business division ciber thereby adding managed services portfolio june 14 2013 centurylink announced acquisition appfog portland-based platform service used 100,000 developers automate deployment software public clouds amazon web services openstack november 19 2013 centurylink announced acquisition tier 3 seattle-based infrastructure service iaas platform advanced cloud management company based cloud foundry december 8 2014 centurylink announced acquisition datagardens inc. disaster recovery as-a-service draas provider based edmondton alberta canada december 11 2014 centurylink announced acquisition cognilytics predictive analytics big data service provider march 30 2016 centurylink announced acquisition netaura security services company focuses cybersecurity security information event management siem analytics vulnerability management january 9 2017 centurylink announced acquisition edison new jersey-based seal consulting leading sap services provider expanded centurylink ’ existing integrated sap capabilities hosting managed services include integration software implementation october 31 2016 centurylink announced intent acquire level 3 communications deal valued around 25 billion securing necessary regulatory approvals centurylink closed transaction november 1 2017 centurylink technology center excellence monroe la earliest predecessor centurylink oak ridge telephone company oak ridge louisiana owned f. e. hogan sr 1930 hogan sold company 75 paid subscribers william clarke marie williams 500 moved switchboard williams family front parlor 1946 williams son clarke mcrae williams received ownership family telephone company wedding gift 1947 clarke williams learned telephone company marion louisiana sale loan business associate joe sydney carter clarke purchased marion telephone company eventually made base operation grew company acquisitions centurylink still maintains offices former headquarters building company remained family-operated business became incorporated 1968 1967 oak ridge telephone company served three states 10,000 access lines year company incorporated central telephone electronics clarke m. williams served president chairman board 1972 1975 clarke gradually moved headquarters marion monroe louisiana access larger employee base near airport century telephone logo 1971 company renamed century telephone enterprises inc 1972 century telephone acquired la crosse telephone corporation wisconsin october 24 1978 century telephone moved new york stock exchange first time began trade ticker symbol ctl century telephone performed well long bear market 1970s stock rose fourfold company provided telephone service parts 14 states time 1981 century telephone acquired war telephone west virginia 1982 century telephone earnings peaked 14 million declined 1983 following early 1980s recession finally began recover 1984 however 1983 decline led loss half value company stock 1984 1985 earnings stock price recovered new record highs company accumulated 206 million long-term debt century telephone sold operations war telephone two companies colonial telephone 4.66 million 1987 stock price nearly doubled low year old 1982 record high falling back third 1987 stock market crash earnings steadily grown year 1983 low 1987 reached nearly us 20 million 1989 century telephone enterprises acquired universal telephone inc. us 90 million cash late 1980s company began long trend performed extremely well stock split three-for-two twice period earnings steadily grew 1990-1991 recession year-end 1991 reached nearly us 40 million double 1987 1992 century telephone acquired central telephone company ohio centel subsidiary 135 million acquisition served 65,000 access lines added 20 century access line total also year glen f. post iii became chief executive officer named vice chairman board century telephone 1993 century telephone revenues 425 million 350 million 1992 1993 earnings nearly 80 million 70 million 1992 excluding nearly 16 million charge 1992 due cumulative effect accounting change year also 1993 company split stock three-for-two yet however time company accumulated nearly 520 million long-term debt 1995 century telephone enterprises added p midcap 400 index earnings continued steady growth trend 1994 economic soft landing 1995 reached us 115 million long-term debt continued grow well reaching us 623 million year 1997 century telephone acquired delta security alarm co. inc. monroe louisiana largest acquisition time pacific telecom doubling size 660,000 additional telephone access lines 12 states pacific telecom inc. would continue existence renamed centurytel northwest inc 1998 century telephone split stock three-for-two company acquired another monroe louisiana security company century protection systems also acquired 89,000 access lines 19 exchanges 21 northern wisconsin communities ameritech affected customers formerly served wisconsin bell ameritech directory publishing operations serving customers also acquired 1999 company renamed centurytel inc split stock three-for-two added standard poor 500 index year former centurytel logo used company prior becoming centurylink centurytel office ann arbor michigan 2000 centurytel acquired 230,500 gte lines arkansas also bought 127,000 gte lines missouri partnership spectra communications wisconsin acquired 133,000 additional lines 70,500 access lines us 195 million verizon year centurytel also bought 62,650 lines us 170 million partnership telephone usa wisconsin llc 2001 centurytel acquired csw net inc. russellville arkansas fended hostile take-over attempt alltel inc 2002 son company original founder chairman board clarke m. williams died succeeded vice chairman glen f. post iii company sold wireless business alltel become pure-play rural local exchange carrier also year centurytel acquired 300,000 verizon access lines alabama 354,000 verizon access lines missouri bringing total operations 22 states 2.5 million access lines 2003 centurytel acquired half ownership skycomm international inc. houston texas march form satellite teleport global network access point nap system june centurytel also acquired fiber network digital teleport inc. 5,700-mile 9,200 km route running illinois texas adjoining states centurytel renamed network company lightcore closing year december centurytel acquired midwest fiber optic network mfon level 3 communications inc. december stand-alone system core central states lightcore august 2004 partnered echostar communications corporation dish network multi-channel digital tv september centurytel began relationship cingular wireless 2005 centurytel began wireless voice data service bought number fiber networks central united states kmc telecom holdings inc 2006 centurytel sold arizona assets hopi telecommunications inc. bringing total operations 23 states may 2007 centurytel acquired madison river communications based mebane nc parent company four lecs al ga il nc well clec operations il la nc lecs included mebtel communications telephone company serving alamance county north carolina gulftel communications based foley al serving baldwin surrounding counties coastal communications based hinesville ga gallatin river communications serving dixon galesburg pekin areas il late 2007 customer respect group international research consulting firm focuses corporations treat online customers ranked centurytel best among six leading communications providers june 2 2009 press release announced combined centurytel/embarq entity would called centurylink denver-based monigle associates retained formulate new brand strategy acquisition completed july 1 2009 october 19 2009 centurytel embarq brandings retired business officially conducted centurylink banner continuing trade nyse centurytel stock ticker ctl new corporate name centurylink inc. become official may 2010 federal communications commission ordered centurylink pay record 16 million failing alert authorities preventable programming error left nearly 11 million people seven states without access emergency services six hours 2014 december 2018 centurylink faced criticism requiring residential customers utah via dns hijacking view acknowledge notice advertising security parental control software could connect internet provider claimed required recently-enacted state law requires isps inform users provide ability block material harmful minors bill sponsor utah state senate member todd weiler stated law require service disrupted notice acknowledged law requires notice delivered conspicuous manner advertisement within bill invoice require disruption service december 27 2018 “ nationwide outage ” caused 9-1-1 service disrupted across country federal communications commission says investigate areas outage lasted nearly twelve hours third shutdown year following outages april november 2018 atm point sale credit card machines also widely affected | [
10368,
2057,
4236,
10893,
911,
1935,
4623,
8592,
2965,
2328,
4377,
2458,
8986,
11170,
6307,
9766,
5159,
1705,
7723,
6444,
8495,
1969,
2994,
3121,
7352,
1083,
448,
2496,
4289,
7490,
1224,
8520,
3660,
4429,
7248,
1362,
467,
9682,
6367,
3168... | Test |
449 | 5 | Cookie_exchange:cookie exchange cookie exchange ipsec comes oakley protocol protocol key management cookie exchange requires side send pseudorandom number cookie initial message side acknowledges acknowledgement must repeated first message diffie–hellman key exchange source address forged opponent gets answer thus opponent force user generate acknowledgements perform diffie–hellman calculation note cookies sense ipsec unrelated http cookies used web browsers recommended method creating cookie perform fast hash e.g md5 ip source destination addresses udp source destination ports locally generated secret value | [
5472,
7965,
3742
] | None |
450 | 4 | Cross-site_cooking:cross-site cooking cross-site cooking type browser exploit allows site codice_1 set cookie codice_2 cookie domain another site codice_3 cross-site cooking used perform session fixation attacks malicious site fixate session identifier cookie another site attack scenarios may also possible example codice_1 may know security vulnerability codice_3 exploitable using cookie security vulnerability requires e.g administrator password codice_1 know cross-site cooking could used fool innocent users unintentionally perform attack cross site cross-site cooking similar concept cross-site scripting cross-site request forgery cross-site tracing cross-zone scripting etc. involves ability move data code different web sites cases e-mail instant messages sites problems linked fact web browser shared platform different information applications sites logical security boundaries maintained browsers ensures one site corrupt steal data another however browser exploit cross-site cooking used move things across logical security boundaries name cross-site cooking concept presented michał zalewski 2006 name mix cookie cross-site attempting describe nature cookies set across sites michał zalewski article 2006 benjamin franz credited discovery may 1998 reported cookie domain related vulnerability vendors benjamin franz published vulnerability discussed mainly way circumvent privacy protection mechanisms popular browsers michał zalewski concluded bug 8 years later still present unresolved browsers could exploited cross-site cooking various remarks vendors ... certainly hurry fix made zalewski others | [
10466,
2470,
4198,
8200,
2931,
2099,
6938,
7965
] | Test |
451 | 6 | Mount_(Unix):mount unix computing mount command various operating systems user access file unix-like machine file system contains needs mounted mount command frequently mount used sd card usb storage dvd removable storage devices command also available efi shell mount command instructs operating system file system ready use associates particular point overall file system hierarchy mount point sets options relating access mounting makes file systems files directories devices special files available use available user counterpart umount instructs operating system file system disassociated mount point making longer accessible may removed computer important umount device removing since changes files may partially written completed part umount mount umount commands require root user privilege effect changes alternately specific privileges perform corresponding action may previously granted root user file system defined user mountable codice_1 file root user display mounted partitions example mount second partition hdd hard disk drive unmount referring physical disk partition referring mount point remount partition specific options codice_2 wrapper around standard mount program permits normal users mount removable devices without matching /etc/fstab entry provides robust basis automounting frameworks like gnome utopia project keeps usage root minimum package also contains wrapper pmount-hal reads information device labels mount options hal passes pmount codice_3 package contains programs mounting unmounting ejecting storage devices goal gnome-mount gnome software gnome-volume-manager gnome-vfs use instead invoking mount/umount/eject/pmount direct hal invoking methods gnome previously used pmount note gnome-mount intended direct use users gnome-mount programs utilize hal methods run unprivileged rationale gnome-mount centralized place gconf settings mount options mount locations maintained unix-like commands options specific version mount precisely detailed man page addition system call mount function mount_root mounts first root filesystem context mount called system call setup | [
2432,
515,
516,
9733,
4615,
3976,
5256,
9735,
652,
4750,
5397,
2198,
6812,
6138,
9762,
7847,
4398,
7983,
11568,
8115,
10933,
823,
1336,
8631,
6075,
7356,
965,
8522,
3659,
7379,
10967,
9946,
7136,
6369,
8675,
8676,
9444,
10087,
6120,
491,
... | None |
452 | 2 | BNU_(software):bnu software bnu high-performance communications device driver designed provide enhanced support serial port communications bnu serial port driver specifically targeted use early late 1980s 1990s dos-based bbs software reason bnu similar enhanced serial port drivers provide better support serial communications software offered machine bios and/or dos used machine serial port support provided bnu similar drivers allowed communications software programmers spend time actual applications instead depths details talk serial ports modems connected sending communications data across modem link lot involved sending data serial printer basically originally capable done existing serial port software support bnu written david nugent experimental driver serial communications following fossil specification david released bnu public 1989 use bbs world spread rapidly bnu one two three available fossil drivers ibm pc compatible hardware ms-dos/pc dos operating system bnu one widely used ms-dos fossil communications drivers bnu mainly used dos-based bulletin board system bbs software written late 1980s mid-1990s used windows-based bbs software bnu used windows ntvdm run dos-based bbs software windows bnu similar drivers limited solely used bbs world enhanced capabilities offered also used easily communicate serially connected devices reasons fossil specification fossil drivers originally created reason noted separate details serial port communications actual application software programmers needed talk serial driver standardized way send receive data name bnu originally rip-off bnu uucp context meant basic networking utilities author bnu david nugent felt acronym particularly apt bnu function bnu also called bloody nugent utility written david nugent one many bbs related utilities known time acronym bnu actually stood bnufaq used posted fidonet bnu support echo author saved text file last official posting faq david nugent bnu author | [
9525,
9166
] | Validation |
453 | 3 | Register_memory_architecture:register memory architecture computer engineering register–memory architecture instruction set architecture allows operations performed memory well registers architecture allows operands memory registers combinations called register plus memory architecture register–memory approach one operands add operation may memory register differs load/store architecture used risc designs mips operands add operation must registers add examples register memory architecture ibm system/360 successors intel x86 examples register plus memory architecture vax motorola 68000 family | [
7173,
9739,
7699,
5655,
10781,
8231,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
7858,
9911,
11447,
8890,
4286,
2241,
2243,
5329,
10966,
731,
7911,
10985,
9964,
5358,
89... | None |
454 | 7 | WORKetc:worketc worketc cloud-based crm business management platform small medium businesses company founded 2009 daniel barnett son colin barnett headquartered sydney australia company founded 2009 daniel barnett company went name veetro changing name worketc 2008 worketc headquartered australia operates micro-multinational enterprise consists team 12 working australia america canada china philippines worketc ranked 75 2013 deloitte technology fast500 asia pacific 2016 company announced planned list asx worketc cloud-based saas application combines crm project management billing help desk collaboration modules one business management platform worketc able integrate xero quickbooks g suite evernote microsoft outlook | [
6367
] | None |
455 | 3 | Pico-ITX:pico-itx pico-itx pc motherboard form factor announced via technologies january 2007 demonstrated later year cebit formfactor transferred sff-sig 2008 pico-itx form factor specifications call board half area nano-itx processor via c7 via eden v4 via nano uses via nanobga2 technology speeds 1.5 ghz 128kb l1 l2 caches uses ddr2 400/533 so-dimm memory support 1gb video supplied via agp via unichrome pro ii gpu built-in mpeg-2 4 wmv9 decoding acceleration bios 4 8 mbit award bios first motherboard produced form factor called epia px10000g 10 layers deep operating temperature range 0°c 50°c operating humidity level relative non-condensing 0 95 uses 1 ghz via c7-m processor via vx700 chip set rohs compliant onboard vga video via vt6106s 10/100 8p8c ethernet udma 33/66/100/133 44-pin ata 1x sata 1x i/o dvi lvds video-out usb 2.0 com ps/2 mouse keyboard hd 5.1 channel audio supplied via vt1708a chip supported usage i/o pin headers add-on modules/daughter cards demonstrated running microsoft windows xp windows vista modern versions major linux distributions including fedora core 6 ubuntu 7.10 also run available single board well part barebones package artigo small form factor complete computer model similar px10000g uses 500 mhz via eden ulv cpu two versions model px5000g fan-assisted heatsink px5000eg fanless heatsink note either via px-o add-on module 4 usb 2.0 i/o supplied retail packages via px-o daughtercard supplies access via vt1625m daughtercard supplies access serener pxfpio also labeled via px-dio 109mm × 22mm size connects via 120mm ribbon cable daughter card addon may require modification heatsink due size daughter card supplies access via px-tc daughter card compatible px10000g designed enhance multimedia capture output supplies access second motherboard series form factor p700 series improves upon px10000g series offering gigabit ethernet using via vt6122 chipset 10/100 ethernet adapter via vt6107 manufacturing option integrating power adapter allowing direct +12v dc-in enabling directly power sata making ethernet vga ports optional via p700-a daughter card expanded functionality offered via following pin i/o epia-p700-10l 1 ghz via c7 cpu epia-p700-05le 500 mhz via eden ulv cpu passive heatsink p700 comes retail p700-a p700-b daughter cards p700-a supplies p700-b supplies even though form factor introduced via technologies also boards available based intel processors cpu chipset directly pico-itx board boards like toradex daisy allow addition nano com express modules pico-itx boards also available arm architecture field dh electronics uses standardized dhcom computer modules several arm based modules pico-itxe specification adds onto pico-itx form factor taking epia-p700 upgrading chipset vx800 doubling maximum ram 2 gb allowing 667/533 so-dimm ram upgrading gpu via chrome9 hc3 adding support sumit another notable addition expansion 10 12 layers thickness | [
10337,
2500,
7113,
1515,
3883,
9964,
7151,
3037,
2161,
10095,
2803,
10715,
823,
8730,
9307,
2525,
799
] | None |
456 | 2 | IPhone_4S:iphone 4s iphone 4s retroactively stylized lowercase iphone 4s september 2013 smartphone designed marketed apple inc fifth generation iphone succeeding iphone 4 preceding iphone 5 announced october 4 2011 apple cupertino campus media coverage accompanied news death former apple ceo co-founder steve jobs following day orders could placed october 7 2011 mainstream availability retail stores began october 14 2011 united states australia canada united kingdom france germany japan sales peaked predecessor million sales first twenty-four hours order availability four million sales first four days retail availability worldwide rollout including 22 additional countries october 28 came next several months iphone named 4s stood siri iphone 4s-exclusive intelligent personal assistant later included future generations mobile apple products retaining external design iphone 4 4s hosted major internal upgrades including upgrade apple a5 chipset 8-megapixel camera 1080p video recording debuted ios 5 fifth major version ios apple mobile operating system introduced features including icloud imessage notification center reminders twitter integration reception generally favorable reviewers noted siri new camera processing speeds significant advantages prior model succeeded iphone 5 apple flagship phone september 12 2012 iphone 4s remained sale albeit sold reduced storage 16/32/64 gb 8 gb 4s officially discontinued september 9 2014 following announcement iphone 6 although production continue developing markets february 17 2016 course lifetime iphone 4s best-selling iphone ever produced first iphone support five major versions ios ios 5 ios 6 ios 7 ios 8 ios 9 ipad 2 supported ios 4 ios 9 4s also last iphone original 30 pin connector succeeding iphone 5 replaced digital lightning connector early may 2011 leaks fairly accurate description iphone 4s including name apple a5 chip hsdpa new camera sprint carrying unveiled apple let talk iphone event october 4 2011 apple campus cupertino california keynote first tim cook gave since verizon keynote earlier year also cook first launch without apple co-founder steve jobs whose health deteriorating died day announcement tim carmody wired praised cook focusing company achievements calling global business thinker taskmaster let talk iphone event held apple october 4 2011 mike capps demonstrated epic games infinity blade ii sequel infinity blade capps boasted game uses epic games unreal engine 3 features graphic techniques used xbox 360 game gears war 3 speculation apple next generation phone including various specifications predicted name iphone 5 widespread time preceding debut announced considered media disappointment due expected release iphone 5 external differences iphone 4 cdma model exception sim card slot changes internal slight external differences iphone 4 gsm model exist said differences existed cdma gsm models iphone 4 september 10 2013 iphone 4s name re-stylised iphone 4s using lower case reflect names newly announced iphone 5s iphone 5c unusual apple upper case used since introduction iphone 3gs 2009 september 9 2014 iphone 4s officially discontinued following reveal iphone 6 iphone 6 plus however 4s production continue developing markets february 17 2016 june 13 2016 following release ios 10 apple dropped support iphone 4s making ios 9 last major ios version available device runs ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons response user input immediate provides fluid interface interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating three dimensions one common result switching portrait landscape mode iphone 4s first shipped ios 5 released october 12 2011 2 days release device 4s uses ios 5.1.1 released may 7 2012 september 2015 device updated ios 9 act hotspot sharing internet connection wifi bluetooth usb also accesses app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple iphone 4s play music movies television shows ebooks audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations options always presented alphabetically except playlists retain order itunes iphone 4s uses large font allows users plenty room touch selection users rotate device horizontally landscape mode access cover flow like itunes feature shows different album covers scroll-through photo library scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks 4s volume changed included apple earphones voice control feature used identify track play songs playlist specific artist create genius playlist introduced new automated voice control system called siri allows user give iphone commands execute respond example iphone commands weather going like generate response weather cloudy rainy drop 54 degrees today commands vary greatly control almost every application phone commands given specific used natural language siri accessed holding home button short amount time compared using regular function impact siri shown apple video messages much easier people use device functions driving exercising hands full also means people trouble reading seeing typing access phone easily texting aided voice assistant allows speech-to-text addition regular texting messaging supported imessage specialized instant messaging program service allows unlimited texting apple ios 5 products supports inclusion media text messages integration device voice controlled software assistant read receipts sent messages input computer comes keyboard displayed multi-touch screen voice-to text speaking microphone entered text supported predictive suggestion software well spell-checker includes many regional dialects like swiss spoken french announcement plans place support many languages different features different language requirements keyboards compared word predictor spell-checker needs large dictionary words language support related ios 5 operating system device launched although always siri digital assistant supported french english german launch since uses software based keyboard supported multi-touch display support many different keyboard layouts without change physically display different languages scripts time september 19 2012 ios 6 released iphone 4s among compatible ios device air ota upgrade package according apple update contains 200 new features tweaks includes new maps app dubbed apple maps facebook integration passbook application allows users store coupons boarding passes tickets digitally september 18 2013 apple released ios 7 iphone 4s among compatible ios devices also receive update without lagging issues compared iphone 4 although device improved performance ios 7 newer features released newer models airdrop carplay supported iphone 4s also run ios 8 released september 17 2014 given device supported 3 years newer features software apple pay supported also unable work apple watch due relatively aged hardware fact users often reported performance 4s slow similar ios 7 ran iphone 4 suggesting upgrade due battery draining issues hanging calls meanwhile apple released ios 8.1.1 brought slight improvements phone ipad 2 still run fast newer models june 8 2015 apple announced wwdc iphone 4s would support ios 9 makes first iphone support 5 major versions ios second ios device support 5 major versions ios 9 support ipad 2 well bringing total six major versions ios supported although iphone 4s begun limitations ios 8 ios 9 said bring performance enhancements may help aging device run smoothly december 22 2015 apple faced class action lawsuit crippling iphone 4s ios 9 update slow buggy software pay hundreds dollars new iphone june 13 2016 apple announced iphone 4s support ios 10 due hardware limitations january 2018 apple suddenly started firmware signing ios 6.1.3 ipad 2 iphone 4s allowing users downgrade devices ios 6.1.3. ios 8 available over-the-air update ios 6 allowing users update devices ios 8.4.1 july 2019 still supported july 22 2019 apple released ios 9.3.6 iphone 4s makes longest supported iphone time number version least uses apple a5 system-on-chip soc incorporates imagination technologies powervr sgx543 graphics processing unit gpu gpu features pixel vertex geometry shader hardware supporting opengl es 2.0 sgx543 improved version gpu used predecessor iphone 4 uses dual-core model integrated apple a5 soc way ipad 2 apple claims seven times faster graphics iphone 4 corroborated epic games president mike capps 512 mb ddr2 ram maximum available storage size increased 64 gb 32 gb 16 gb model options retained september 2013 apple released iphone 4s free two year contract 8 gb storage screen prior generation iphones 640×960 resolution apple retina design improvement interactive multimedia applications compared predecessor improved cellular gsm antenna design iphone 4 new antenna divided two pieces within stainless steel band wraps around sides phone therefore gripped way attenuate one piece cellular antenna radio switch piece n't gripped support maximum theoretical download speed 14.4 mbps hsdpa+ result upgraded radio chip inside phone addition world phone gsm cdma customers roam internationally gsm networks also supports bluetooth 4.0 camera also known isight camera take 8-megapixel photos 3,264 2,448 pixels record 1080p videos 30 frames per second upgraded quality 30 better clarity 26 better white balance color accuracy due additional lens ir filter wider f/2.4 aperture image signal processor built-in a5 built-in gyroscope allows image stabilization camera recording video although still room improvement since state-of-the-art image stabilization algorithms need use gyroscope use image processing features camera macro close pictures faster capture including able take first picture 1.1 seconds next half second later features 960 640 pixel multitouch retina display two volume buttons ring/silent switch left side top left 3.5 mm headphone jack microphone used noise cancellation calls speakerphone/facetime video calling mode lock/power button situated top right edge device right side device micro-sim card slot bottom device features speaker output right microphone input left apple proprietary 30-pin dock connector center supports video via airplay various apple a/v cables supported video formats include h.264 1080p 30 frames per second maximum mpeg-4 video motion jpeg m-jpeg addition user inputs device also several sensors give phone information orientation external conditions include three-axis gyroscope accelerometer proximity sensor ambient light sensor stated 200 hours standby time 8 hours talk time 3g 14 hours talk time 2g 6 hours 3g browsing 9 hours wi-fi browsing additionally sustain 10 hours video playback 40 hours audio playback stainless steel dual cellular antenna design identical iphone 4 cdma apple redesigned antenna cdma original iphone 4 users reported cellular signal attenuation problems result holding phone certain positions improved cellular radio phone switch two antennas depending sending/receiving best signal two antennas incorporated distinctive stainless steel band wraps around sides bands iphone 4s divided two antennas cellular global positioning system gps bluetooth wi-fi reliant internal antenna iphone 4 4s designed jonathan ive 4 generation iphones differ earlier apple designs bulges back panel well band front back gone replaced flattened surfaces redesign reflects utilitarianism uniformity existing apple products ipad imac overall dimensions lower 3gs high wide deep compared iphone 3gs high wide deep making iphone 4 4s 21.5 thinner 3gs internal components situated two panels aluminosilicate glass described apple chemically strengthened 20 times stiffer 30 times harder plastic theoretically allowing scratch-resistant durable prior models reception generally favorable reviewers noted siri new camera processing speeds significant advantages prior model tim stevens engadget said everything better iphone 4 simply n't anything substantially different joshua topolsky verge stated car would mercedes siri probably one novel applications apple ever produced reviewers thought siri important feature brian chen wired said fifth-generation iphone superb camera speedy dual-core processor classy additions siri reason people buy phone retrevo surveyed 1,300 u.s. consumers reported 71 percent smartphone owners disappointed new 47 percent almost half current iphone 4 owners 12 percent hoping bigger display 21 percent wanted refreshed design 29 percent desired 4g echoing technology pundits reuters suggested lack radical departure iphone 4 could open new market opportunities rivals analyst c. k. lu gartner believed apple longer leading edge 4s would sell due brand loyalty fans expecting iphone 5 thinner profile edge-to-edge screen stronger features fans also wanted cheaper stripped-down iphone 4 gaming likened playstation vita features sgx gpu quad-core configuration nintendo 3ds handheld game consoles ability process 80 million polygons per second compared playstation 3 xbox 360 home video game consoles process 275 million 500 million polygons per second respectively computer video games cvg deputy editor andy robinson told techradar 4s certainly laying serious credibility iphone core gaming device pushing games simply eclipse 3ds visually features like cloud saving tv streaming support really exciting gamers senior gaming analyst jon peddie research ted pollak believes biggest improvement gaming voice control features noting one features nintendogs players loved ability talk reason game like could n't done much sophisticated given voice control shown 2012 iphone 4s t3 work gadget year award beating rim blackberry bold 9900 rival samsung galaxy note amongst others since introduction iphone 4s several issues reported users internet forums noted media organizations cnn boy genius report guardian pc world unlike prior iphone models number sales iphone 4 yet climaxed introduction 4s previous iphone models released declining sales figures addition iphone 4 users high marks satisfied phone upon announcement shares samsung electronics htc nokia gained wednesday 4s announced apple stock fell however later day apple shares rebounded ending 1 gain launch orders said demand extraordinary 200,000 orders placed within 12 hours release german phone company deutsche telekom said satisfied consumer interest addition verizon sprint sold-out initial stock october 8 2011 october 9 1–2 week estimate new orders filled october 20 2011 surpassed one million activations october 10 apple announced one million orders received within first 24 hours sale beating 600,000 device record set iphone 4 16-month wait iphone 4 4s may contributed overwhelming sales well october 17 2011 apple announced four million units sold first three days release 25 million ios users upgraded latest version ios ios 5 released upon introduction phone phil schiller apple senior vice president worldwide product marketing stated great start four million sold first weekend—the ever phone double iphone 4 launch first three days used phone market saw unprecedented rates trade-ins weeks leading 4s announcement drop prices offered previous generation iphones recirculated markets various methods third-party buyers may purchase older generation iphones apple also buys back previous generation iphones special program april 24 2012 announced 7.6 million iphone units activated q4 2011 4.3 million q1 2012 total sold 5.5 million smartphones first quarter 2012 78 iphones | [
4609,
10755,
9732,
1549,
5647,
7697,
4114,
11289,
7706,
1057,
1576,
6186,
4139,
6700,
1074,
8754,
9784,
1083,
8253,
576,
7745,
8783,
4180,
10838,
1623,
3672,
3681,
9826,
7780,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
4225,
10878,
8... | None |
457 | 3 | System.map:system.map linux system.map file symbol table used kernel symbol table look-up symbol names addresses memory symbol name may name variable name function system.map required address symbol name symbol name address needed especially useful debugging kernel panics kernel oopses kernel address-to-name translation codice_1 enabled tools like ksymoops required following part codice_2 file addresses may change one build next new codice_2 generated build kernel character address symbol separated spaces type symbol codice_4 utility program unix systems list symbols object files codice_2 directly related file produced codice_4 whole kernel program like codice_4 lists symbols types small object programs types building linux kernel codice_2 located root source directory however software installation steps expect locate file elsewhere | [
4616,
3082,
5139,
10780,
10785,
3618,
6180,
8242,
9266,
4161,
10817,
8772,
6213,
8268,
589,
593,
6244,
5222,
10856,
4207,
5244,
4734,
11391,
7812,
8326,
7821,
4238,
10382,
2195,
8852,
2711,
6808,
9882,
1694,
2723,
8364,
10933,
5815,
5822,
... | None |
458 | 8 | International_Journal_of_Web_Services_Research:international journal web services research international journal web services research ijwsr quarterly peer-reviewed academic journal covering web services established 2004 published igi global editor-in-chief liang-jie zhang kingdee international software group china open group journal abstracted indexed | [
10020,
8975
] | None |
459 | 1 | Circumpolar_Health_Bibliographic_Database:circumpolar health bibliographic database circumpolar health bibliographic database chbd free electronic database abstracts citations geographic subject indexing library codes links full text publications peer-reviewed gray literature established 2007 contains sixty five hundred records describe human health circumpolar region chbd circumpolar chronic disease prevention project canadian institutes health research maintained university calgary calgary alberta canada chbd initially constructed records arctic institute north america database mainly northern canadian records expected take several years add non-canadian records chbd circumpolar health observatory proposed may 2008 norway would disseminate data chbd funding database increased 50 period 2008-2009 | [] | Test |
460 | 2 | Information_Bridge_Framework:information bridge framework information bridge framework microsoft office programmability framework microsoft targeting microsoft office 2003 later versions used extract data office documents embedding functionality office applications custom applications | [
7523,
2632,
11144,
10029,
1904,
9328,
5619,
440,
2046
] | Test |
461 | 4 | Fiddler_(software):fiddler software fiddler http debugging proxy server application originally written eric lawrence formerly program manager internet explorer development team microsoft fiddler captures http https traffic logs user review logging performed implementing man-in-the-middle interception using self-signed certificates 6 october 2003 eric lawrence released first official version fiddler 12 september 2012 fiddler acquired telerik lawrence joined company work fiddler full-time basis 23 december 2015 lawrence left telerik google chrome security team telerik continued develop fiddler june 2018 lawrence returned microsoft principal program manager | [
7264,
9440,
4797,
1064,
842,
3310,
7983,
3604,
3573,
4725,
823,
2169,
2205,
9694,
4863
] | Test |
462 | 9 | SciPy:scipy scipy pronounced /ˈsaɪpaɪ'/ sigh pie free open-source python library used scientific computing technical computing scipy contains modules optimization linear algebra integration interpolation special functions fft signal image processing ode solvers tasks common science engineering scipy builds numpy array object part numpy stack includes tools like matplotlib pandas sympy expanding set scientific computing libraries numpy stack similar users applications matlab gnu octave scilab numpy stack also sometimes referred scipy stack scipy also family conferences users developers tools scipy united states euroscipy europe scipy.in india enthought originated scipy conference united states continues sponsor many international conferences well host scipy website scipy library currently distributed bsd license development sponsored supported open community developers also supported numfocus community foundation supporting reproducible accessible science scipy package key algorithms functions core python scientific computing capabilities available sub-packages include basic data structure used scipy multidimensional array provided numpy module numpy provides functions linear algebra fourier transforms random number generation generality equivalent functions scipy numpy also used efficient multidimensional container data arbitrary datatypes allows numpy seamlessly speedily integrate wide variety databases older versions scipy used numeric array type deprecated favor newer numpy array code 1990s python extended include array type numerical computing called numeric package eventually replaced travis oliphant wrote numpy 2006 blending numeric numarray started 2001 2000 growing number extension modules increasing interest creating complete environment scientific technical computing 2001 travis oliphant eric jones pearu peterson merged code written called resulting package scipy newly created package provided standard collection common numerical operations top numeric array data structure shortly thereafter fernando pérez released ipython enhanced interactive shell widely used technical computing community john hunter released first version matplotlib 2d plotting library technical computing since scipy environment continued grow packages tools technical computing | [
9208,
7684,
9893,
5703,
8554,
5612,
7983,
8079,
11221,
6134,
3960,
11385,
2045,
7326
] | None |
463 | 2 | Image_Packaging_System:image packaging system image packaging system also known ips pkg 5 cross-platform written python package management system created opensolaris community coordination sun microsystems used solaris 11 several illumos-based distributions openindiana omnios xstreamos growing number layered applications including glassfish across variety os platforms features include fact ips delivers single file separate shelf separate checksum package update needs replace files modified elf binaries computes checksums loaded parts elf binary permits e.g avoid update elf binary changed elf comment section due fact ips delivers single file separate shelf slow operation caused input source medium high latency e.g internet higher round trip time cd/dvd media slow seeks | [
10760,
8213,
6680,
9245,
5155,
5670,
7722,
5677,
10817,
3667,
6227,
11363,
9324,
1138,
2168,
7293,
9343,
6797,
10900,
10394,
4775,
6828,
5819,
190,
4302,
2259,
4309,
5335,
6361,
8413,
741,
231,
2281,
6393,
11525,
7435,
7947,
9487,
788,
18... | Test |
464 | 2 | IPhone_3G:iphone 3g iphone 3g smartphone designed marketed apple inc. second generation iphone successor original iphone introduced june 9 2008 wwdc 2008 moscone center san francisco united states iphone 3g internally similar predecessor included several new hardware features gps 3g data tri-band umts/hsdpa device originally loaded concurrently launched iphone os 2.0 addition features including push email turn-by-turn navigation new operating system introduced app storeapple new distribution platform third-party applications july 11 2008 apple released iphone 3g across twenty-two countries two storage options 8gb 16gb 16gb model produced either black white following release successor iphone 3gs model one year later iphone 3g remained sale became apple budget phone offer price cut half 99 iphone 3g required two-year contract available black 8 gb storage came bundled then-new iphone os 3.0 firmware june 7 2010 iphone 3g finally discontinued replaced apple budget phone 8gb iphone 3gs selling price 99 2-year contract iphone 3g came preloaded latest version iphone os continued receive updates software two years major iterations released annual basis however phone access decreasing proportion new features update hardware became superseded later models launched iphone 3g came preloaded iphone os 2.0 introduced app store microsoft exchange activesync support apple ’ mobileme service push email support along new features bug fixes june 2009 iphone 3g users received iphone os 3.0 software update introduced long-awaited mms feature copy paste landscape support applications bluetooth stereo support improvements june 2010 apple released ios 4.0 software update unlike successor models iphone 3g support prominent features ios 4.0 multitasking ability set home screen wallpaper bluetooth keyboard support however provide access unified mailbox feature homescreen folders better organize apps playlist creation enhancements update widely criticized slow performance iphone 3g though september 2010 ios 4.1 release resolved problem however unlike modern ios devices update provide iphone 3g owners access important features case game center application november 22 2010 iphone 3g received ios 4.2 software update ios 4.2.1 introduced features youtube voting security fixes however iphone 3g unable use many features included update airplay safari text search last ios release support iphone model ios 4.3 later compatible iphone model due hardware limitations performance issues iphone 3g back featured redesigned polycarbonate plastic housing replacing aluminum back first generation buttons changed plastic metal edges phone tapered providing better grip iphone 3g introduced first official color options outer casing 16gb version available black white dimensions iphone 3g marginally larger original iphone high wide deep compared predecessor high wide deep iphone 3g sported capacitive touchscreen 480×320 hvga resolution 163 ppi scratch-resistant glass sits top display like original iphone touchscreen designed bare finger multiple fingers multi-touch sensing device featured sensors predecessor proximity sensor deactivates display calls face near repositioned save battery power prevent inadvertent inputs user ’ face ears ambient light sensor included adjust display brightness different lighting conditions helps save battery power 3-axis accelerometer included sense orientation phone change screen accordingly allowing user easily switch portrait landscape mode iphone 3g internal hardware based original iphone still includes samsung 32-bit risc arm11 620 mhz processor underclocked 412 mhz powervr mbx lite 3d gpu 128 mb package package pop dram rear device iphone 3g features fixed-focus 2.0 megapixel camera predecessor camera optical zoom flash autofocus native video recording although various applications became available allow video recording device iphone 3g operating system supports geotagging photographs addition edge iphone 3g supports assisted gps 3g data tri-band umts/hsdpa enhancements allow faster data downloads turn-by-turn navigation maps compared previous devices like predecessor iphone 3g features proprietary 30-pin dock connector charging device also used synchronize device computer connect various accessories iphone 3g features flush-mounted 3.5 mm headphone jack instead recessed headphone jack included original iphone could therefore used headphones provided apple iphone 3g features internal rechargeable battery rated 1150 mah like predecessor user-replaceable apple stated iphone 3g ’ battery capable providing six hours web browsing via wi-fi five hours via 3g 25 hours audio playback alternatively said provide 300 hours standby time walt mossberg wall street journal described device capable version already excellent device however said hidden costs ios 4 still compatible iphone 3g released june 21 2010 article wall street journal digits column july 28 2010 reported iphone 3g phones updating ios 4 responded slowly diminished battery life became excessively hot | [
4609,
10755,
9732,
1549,
5647,
7697,
4114,
5138,
11289,
7706,
1057,
1576,
6186,
4139,
6700,
1074,
8754,
9784,
1083,
8253,
576,
8783,
4180,
10838,
1623,
3672,
6748,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
10878,
8842,
6... | Test |
465 | 9 | Lightweight_Imaging_Device_Interface_Language:lightweight imaging device interface language lightweight imaging device interface language abbr lidil printer interface definition language used recent hewlett-packard printers language commonly used hp deskjets support pcl printer language name suggests language supports definition raster documents limited overall host-based protocol advertised ldl cmd command set field device id string models support printing ascii text | [
5384,
8262,
10465,
6830
] | Test |
466 | 3 | Load–store_unit:load–store unit computer engineering load–store unit lsu specialized execution unit responsible executing load store instructions generating virtual addresses load store operations loading data memory storing back memory registers load–store unit usually includes queue acts waiting area memory instructions unit operates independently processor units load–store units may also used vector processing cases term load–store vector may used load-store units also capable executing simple fixed-point and/or integer operations | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
2241,
224... | Test |
467 | 7 | Software_as_a_service:software service software service saas software licensing delivery model software licensed subscription basis centrally hosted sometimes referred on-demand software formerly referred software plus services microsoft saas typically accessed users using thin client e.g via web browser saas become common delivery model many business applications including office software messaging software payroll processing software dbms software management software cad software development software gamification virtualization accounting collaboration customer relationship management crm management information systems mis enterprise resource planning erp invoicing human resource management hrm talent acquisition learning management systems content management cm geographic information systems gis service desk management saas incorporated strategy nearly leading enterprise software companies according gartner estimate saas sales 2018 expected grow 23 72 billion saas applications also known web-based software on-demand software hosted software term software service saas considered part nomenclature cloud computing along infrastructure service iaas platform service paas desktop service daas managed software service msaas mobile backend service mbaas information technology management service itmaas centralized hosting business applications dates back 1960s starting decade ibm mainframe providers conducted service bureau business often referred time-sharing utility computing services included offering computing power database storage banks large organizations worldwide data centers expansion internet 1990s brought new class centralized computing called application service providers asp asps provided businesses service hosting managing specialized business applications goal reducing costs central administration solution provider specialization particular business application two world pioneers largest asps usi headquartered washington dc area futurelink corporation headquartered irvine california software service essentially extends idea asp model term software service saas however commonly used specific settings acronym first appeared goods services description uspto trademark filed september 23 1985 dbaas database service emerged sub-variety saas type cloud database cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen however market grown saas managed service players forced try redefine role unlike traditional software conventionally sold perpetual license up-front cost optional ongoing support fee saas providers generally price applications using subscription fee commonly monthly fee annual fee consequently initial setup cost saas typically lower equivalent enterprise software saas vendors typically price applications based usage parameters number users using application however saas environment customers data reside saas vendor opportunities also exist charge per transaction event unit value number processors required relatively low cost user provisioning i.e. setting new customer multitenant environment enables saas vendors offer applications using freemium model model free service made available limited functionality scope fees charged enhanced functionality larger scope saas applications completely free users revenue derived alternative sources advertising key driver saas growth saas vendors ability provide price competitive on-premises software consistent traditional rationale outsourcing systems involves applying economies scale application operation i.e. outside service provider may able offer better cheaper reliable applications vast majority saas solutions based multitenant architecture model single version application single configuration hardware network operating system used customers tenants support scalability application installed multiple machines called horizontal scaling cases second version application set offer select group customers access pre-release versions applications e.g. beta version testing purposes contrasted traditional software multiple physical copies software — potentially different version potentially different configuration often customized — installed across various customer sites traditional model version application based unique code although exception rather norm saas solutions use multitenancy use mechanisms—such virtualization—to cost-effectively manage large number customers place multitenancy whether multitenancy necessary component software service topic controversy two main varieties saas although software-as-a-service applications share traits characteristics common among many saas applications saas applications similarly support traditionally known application configuration words like traditional enterprise software single customer alter set configuration options a.k.a parameters affect functionality look-and-feel customer may settings parameter values configuration options application customized degree designed based set predefined configuration options example support customers common need change application look-and-feel application appears customer brand or—if desired—co-branded many saas applications let customers provide self service interface working application provider staff custom logo sometimes set custom colors customer however change page layout unless option designed saas applications often updated frequently traditional software many cases weekly monthly basis enabled several factors accelerated feature delivery enabled agile software development methodologies methodologies evolved mid-1990s provide set software development tools practices support frequent software releases saas applications access company internal systems databases internal services predominantly offer integration protocols application programming interfaces apis operate wide area network typically protocols based http rest soap ubiquity saas applications internet services standardization api technology spawned development mashups lightweight applications combine data presentation functionality multiple services creating compound service mashups differentiate saas applications on-premises software latter easily integrated outside company firewall inspired success online social networks so-called web 2.0 functionality many saas applications offer features let users collaborate share information example many project management applications delivered saas model offer—in addition traditional project planning functionality—collaboration features letting users comment tasks plans share documents within outside organization several saas applications let users vote offer new feature ideas although collaboration-related functionality also integrated on-premises software implicit explicit collaboration users different customers possible centrally hosted software opensaas refers software service saas based open source code similar saas applications open saas web-based application hosted supported maintained service provider roadmap open saas applications defined community users upgrades product enhancements managed central provider term coined 2011 dries buytaert creator drupal content management framework andrew hoppin former chief information officer new york state senate vocal advocate opensaas government calling future government innovation points wordpress unified successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website -- simply pay wordpress.com host drupal gardens free web hosting platform based open source drupal content management system offers another example forbes contributor dan woods calls new open source model saas according woods open source provides escape hatch drupal gardens users able press button get source code version drupal code runs site along data database take code put one hosting companies anything would like several important changes software market technology landscape facilitated acceptance growth saas solutions limitations slow acceptance saas prohibit used cases standard model also limitations engineering simulation software traditionally delivered on-premises solution user desktop ideal candidate saas delivery market saas engineering simulation software infancy interest concept growing similar reasons interest saas growing industries main driver traditional engineering simulation software required large up-front investment order access simulation software large investment kept engineering simulation inaccessible many startups middle market companies reluctant unable risk large software expenditure unproven projects according survey himss analytics 83 us healthcare organizations using cloud services 9.3 planning whereas 67 healthcare organizations currently running saas-based applications software service data escrow process keeping copy critical software-as-a-service application data independent third party similar source code escrow critical software source code stored independent third party saas data escrow applies logic data within saas application allows companies protect insure data resides within saas applications protecting data loss many varied reasons considering saas data escrow including concerns vendor bankruptcy unplanned service outages potential data loss corruption many businesses also keen ensure complying data governance standards want improved reporting business analytics saas data research conducted clearpace software ltd. growth saas showed 85 percent participants wanted take copy saas data third participants wanted copy daily basis one notable criticism saas comes richard stallman free software foundation refers service software substitute saass considers use saass violation principles free software according stallman saas products face problem 2010 forbes contributor dan woods noted drupal gardens web hosting platform based open source drupal content management system new open source model saas added similarly mediawiki wordpress many extensions increasingly used wide variety internal applications well public web services obtaining code relatively simple integration existing extensions plug-ins templates etc actual customizations rare usually quickly replaced standard publicly available extensions additionally guarantee software source code obtained means accurately reflects software system claims reflect andrew hoppin former chief information officer new york state senate refers combination saas open source software opensaas points wordpress another successful example opensaas software delivery model gives customers best worlds options fact open source means start building websites self-hosting wordpress customizing website heart ’ content concurrently fact wordpress saas means ’ manage website – simply pay wordpress.com host cloud saas model physical need indirect distribution distributed physically deployed almost instantaneously thereby negating need traditional partners middlemen | [
1539,
2052,
10756,
11268,
3593,
9228,
526,
3086,
4623,
530,
10773,
10262,
1559,
10265,
9754,
2075,
3614,
5662,
5666,
2084,
549,
9252,
39,
5159,
7721,
42,
554,
9766,
9261,
558,
4142,
9771,
3121,
3634,
4659,
5681,
8756,
3638,
5689,
5182,
... | Train |
468 | 2 | Hoard_memory_allocator:hoard memory allocator hoard memory allocator hoard memory allocator linux solaris microsoft windows operating systems hoard designed efficient used multithreaded applications multiprocessor computers hoard distributed gpl purchased proprietary software 2000 author emery berger benchmarked famous memory allocators stated hoard improves performance multithreaded applications providing fast scalable memory management functions malloc free particular reduces contention heap central data structure used dynamic memory allocation caused multiple threads allocate free memory avoids false sharing introduced memory allocators time hoard strict bounds fragmentation hoard continues maintained improved use number open source commercial projects also inspired changes memory allocators one os x since february 2008 first released mac os x snow leopard | [
8545,
6797,
7983,
823,
3512,
7802,
731,
9559
] | Test |
469 | 5 | Internet_chess_server:internet chess server internet chess server ics external server provides facility play discuss view board game chess internet term specifically refers facilities connecting players variety graphical chess clients located user computer 1970s one could play correspondence chess plato system program called 'chess3 several users used chess3 regularly often particular user would make several moves per day sometimes several games simultaneously progress theory one could use chess3 play complete game chess one sitting chess3 usually used way plato connected internet predecessor arpanet way allowed mass use public consequently chess3 still relatively unknown public eighties chess play email still fairly novel latency email less traditional correspondence chess via paper letters often one could complete dozen moves week network technology improved public widespread use centralised server live play became possibility michael moore university utah richard nash recognised potential internet chess server created first incarnation hosted lark.utah.edu accessible telnet official opening date ics january 15 1992 john chanak william kish aaron putnam moved server host machine carnegie mellon university july 1992 took operation although buggy suffered lag problems server popular among small group chess enthusiasts time many features added ics elo ratings support graphical clients server made stable late 1992 daniel sleator professor computer science carnegie mellon university took management ics addressed among issues frequent complaint players would lose blitz games time due network lag 1994 copyrighted code began receiving purchase offers companies wanting commercialise server questions whether sleator right claim ics intellectual property since code original server although made substantial improvements code march 1 1995 sleator announced intentions commercialise ics renaming internet chess club icc charging yearly membership fee us 49 us 59.95 2007 announcement highly controversial among existing members many volunteers contributed various ways flourishing ics upset anyone would attempt profit efforts active players server used service provided without charge pleased addition membership fee handful programmers worked original ics became unhappy saw commoditization project formed free internet chess server fics continued allow everyone access features free 1996 john fanning uncle napster founder shawn fanning started chess.net commercial internet chess server rival ics services remain operational today ics protocol simple text-based variant telnet protocol sparsely documented standardised although reference implementations several clients exist theory ics accessed telnet client however almost users choose play using graphical client called interface currently popular interface xboard windows counterpart winboard recent years however lost ground newer interfaces like pychess eboard xics x graphical interface internet chess server unlike earlier text-based ics clients xics allows players see board play pieces graphically usually 2-d configuration addition standalone clients many servers also offer java interfaces used directly web browser popular new users users public computers years several internet chess servers created popular chess.com chesshub.com lichess.org icc playchess.com fics chesscube chess also among games previously offered non-specialist site yahoo games | [
11112,
4490,
6797,
11002,
735
] | Validation |
470 | 2 | UniFLEX:uniflex uniflex unix-like operating system developed technical systems consultants tsc motorola 6809 family allowed multitasking multiprocessing released dma-capable 8 floppy extended memory addressing hardware software controlled 4kib paging 768 kib ram motorola 6809 based computers examples included machines swtpc gimix goupil france swtpc machines uniflex also supported 20 mb 14 hard drive oem 'd century data systems 1979 later also supported larger 14 drives 80 mb 8 hard drives 5-1/4 floppies 1982 machines also supported first widely available 5-1/4 hard disks using st506 interface 5 mb basf 6182 removable syquest sq306rd capacity due limited address space 6809 64 kb hardware limitations main memory space uniflex kernel well running process smaller 56 kb code data processes could 64k minus 512 bytes achieved writing kernel user space code entirely assembly language removing classic unix features group permissions files otherwise uniflex similar unix version 7 though command names slightly different technical reason renaming apart achieving level command-level compatibility single-user sibling flex simply restoring unix style names considerable degree unix look feel could established though due memory limitations command line interpreter shell less capable bourne shell known unix version 7 memory management included swapping dedicated portion system disk even floppies whole processes could swapped individual pages caused swapping big hit system responsiveness memory sized appropriately however uniflex extremely memory-efficient operating system machines less megabyte ram serving dozen asynchronous terminals uncommon worked surprisingly well tsc never bundled c compiler uniflex 6809 though produced one early 1980s c language implementation became available 3rd party products mccosh introl compilers using c compiler could establish source-level compatibility unix version 7 i.e. number unix tools applications could ported uniflex size allowed unix pdp-11 limited executables 64 kb code another 64 kb data uniflex limitation approximately 56 kb code data together much application software available uniflex ports dynacalc spreadsheet stylograph word processor flex operating system existed copies sold mid 1980s successor version motorola 68000 announced though removed pressing space limitations commercially successful compete source-code ports original unix source code uniflex supporting software available internet netherlands uniflex users ported fair number unix utilities uniflex also modified kernel code give foreground processes preference background processes accessing disk gave major improvement user experience one tsc guys dan vanada later started company scintillex software .products i.e accessing utilities allowed transfer data uniflex ms-dos vice versa well dos format utilities code patch utility | [
2179,
6787,
6412,
5397,
1304,
3487,
1952,
2345,
3241,
9643,
7983,
3248,
2995,
9141,
823,
9784,
9151,
10436,
8262,
5840,
477,
6369,
9444,
5492,
2424,
633,
2045
] | None |
471 | 5 | Delivermail:delivermail ancestor sendmail delivermail also eric allman mail transport agent used ftp protocol early arpanet transmit e-mail recipient 1979 delivermail first shipped 4.0bsd 4.1bsd arpanet still using ncp network protocol arpanet switched tcp/ip 1982 road paved mtas longer relied ftp delivery new protocol sending mail smtp dns replaced hosts files delivermail evolved sendmail | [
2748,
7364,
2887,
5063,
10248,
76,
9452,
5230,
11500,
5492,
9909,
4439,
472,
412
] | Validation |
472 | 2 | Eric_Allman:eric allman eric paul allman born september 2 1955 american computer programmer developed sendmail precursor delivermail late 1970s early 1980s uc berkeley 1998 allman greg olson co-founded company sendmail inc. born el cerrito california allman knew early age wanted work computing breaking high school mainframe later using uc berkeley computing center computing needs 1973 entered uc berkeley unix operating system began become popular academic circles earned b.s m.s degrees uc berkeley 1977 1980 respectively unix source code available berkeley local hackers quickly made many extensions code one extension delivermail 1981 turned sendmail mta designed deliver email still relatively small compared today internet arpanet consisted many smaller networks vastly differing formats e-mail headers sendmail soon became important part berkeley software distribution bsd used widely used mta unix based systems despite somewhat complex configuration syntax frequent abuse internet telemarketing firms 1998 allman greg olson founded sendmail inc. headquartered emeryville california proprietary work improving sendmail logging format used mta known syslog first used solely sendmail eventually became unofficial standard format used unrelated programs logging later format made official rfc 3164 2001 however original format made obsolete recent revision rfc 5424 allman credited popularizing allman indent style also known bsd indent style ported fortran version super star trek c programming language later became bsd trek still included various linux distributions part classic bsdgames package awarded telluride tech festival award technology august 2006 telluride colorado 2009 recognized distinguished engineer association computing machinery april 2014 inducted internet hall fame allman openly gay lives berkeley california marshall kirk mckusick partner 30 years married october 2013 mckusick lead developer bsd two first met graduate school | [
6273,
1125,
8395,
1484,
5421,
11659,
6352,
11155,
5492,
8373,
9845,
471,
9909,
4793,
6780,
9151
] | Validation |
473 | 3 | AMD_K5:amd k5 k5 amd first x86 processor developed entirely in-house introduced march 1996 primary competition intel pentium microprocessor k5 ambitious design closer pentium pro pentium regarding technical solutions internal architecture however final product closer pentium regarding performance although faster clock-for-clock compared pentium k5 based upon internal highly parallel 29k risc processor architecture x86 decoding front-end k5 offered good x86 compatibility in-house-developed test suite proved invaluable later projects models 4.3 million transistors five integer units could process instructions order one floating-point unit branch target buffer four times size pentium register renaming helped overcome register dependencies chip speculative execution instructions reduced pipeline stalls 16 kb four-way set-associative instruction cache 8 kb data cache floating-point divide square-root microcode mechanically proven floating-point transcendental instructions implemented hardware faithful true mathematical results operands k5 project represented early chance amd take technical leadership intel although chip addressed right design concepts actual engineering implementation issues low clock rates part due amd limitations cutting edge manufacturing company time part due design many levels logic process technology day hampering clock scaling additionally k5 floating-point performance regarded superior cyrix 6x86 slower pentium although offering reliable transcendental function results late market meet performance expectations k5 never gained acceptance among large computer manufacturers am486 amd k6 enjoyed two revisions k5 architecture internally called ssa/5 5k86 released k5 label original set ssa/5 cpus branch prediction unit disabled additional internal waitstates added issues remedied 5k86 resulting 30 better performance clock clock ssa/5 line ran 75 100 mhz 5k86 line ran 90 133 mhz however amd used called pr rating performance rating label chips according suggested equivalence integer performance pentium clock speed thus 116 mhz chip second line marketed k5 pr166 manufacturing delays caused pr200 arrival nearly align release k6 since amd want two chips competing k5-pr200 arrived small numbers | [
3586,
8322,
5380,
7173,
9092,
6151,
8327,
10375,
6924,
1677,
398,
3470,
5645,
6926,
8851,
7963,
4252,
2719,
6815,
5541,
11047,
2094,
9911,
6978,
7234,
4805,
3911,
11080,
11083,
2764,
2638,
8033,
2791,
1260,
1005,
5356,
8815,
1776,
1137,
9... | None |
474 | 4 | Certificate_policy:certificate policy certificate policy cp document aims state different entities public key infrastructure pki roles duties document published pki perimeter use x.509 certificates specific field set include link associated certificate policy thus exchange relying party access assurance level associated certificate decide level trust put certificate reference document writing certificate policy rfc proposes framework writing certificate policies certification practice statements cps points described based framework presented rfc document describe general architecture related pki present different entities pki exchange based certificates issued pki important point certificate policy description authorized prohibited certificate uses certificate issued stated attributes use cases intended fulfill example certificate issued digital signature e-mail aka s/mime encryption data authentication e.g web server one uses https issuance certificates delegation authority prohibited uses specified way document also describes certificates names chosen besides associated needs identification authentication certification application filled certification authority delegation registration authority charge checking information provided applicant identity make sure ca take part identity theft generation keys also mentioned certificate policy users may allowed generate keys submit ca generation associated certificate pki may also choose prohibit user-generated keys provide separated probably secure way generating keys example using hardware security module different procedures certificate application issuance acceptance renewal re-key modification revocation large part document procedures describe actor pki act order whole assurance level accepted chapter found regarding physical procedural controls audit logging procedures involved pki ensure data integrity availability confidentiality part describes technical requirements regarding key sizes protection private keys use key escrow various types controls regarding technical environment computers network lists vital part public key infrastructure specific chapter dedicated description management associated lists ensure consistency certificate status content list pki needs audited ensure complies rules stated documents certificate policy procedures used assess compliance described last chapter tackles remaining points example pki-associated legal matters | [
513,
517,
1157,
1288,
9744,
1297,
1683,
1688,
3742,
2083,
8358,
3629,
11693,
11569,
9394,
7736,
5433,
3776,
9281,
9412,
3657,
5834,
10831,
11345,
5590,
3805,
7264,
225,
8674,
7139,
10341,
5107,
501,
1526,
2169,
3707,
510,
4863
] | None |
475 | 2 | Lee_E._McMahon:lee e. mcmahon lee e. mcmahon 1931–1989 american computer scientist graduate st. louis university obtained ph.d. psychology harvard worked bell labs 1963 1989 best known contributions early versions unix operating system particular sed stream editor mcmahon contributed development comm qsort grep index cref cu datakit devised mcmahon system tournament | [
9298,
5492,
9735
] | Test |
476 | 9 | Oscar_Nierstrasz:oscar nierstrasz oscar marius nierstrasz born professor computer science institute iam university berne specialist software engineering programming languages active field led software composition group university bern since 1994 date december 2011 cyberchair online submission reviewing system based oscar nierstrasz publication called identify champion described peer review process contributions scientific conferences using organizational pattern language nierstrasz co-authored several books object-oriented reengineering patterns pharo example editor journal object technology 2010 2013 succeeding founding editor richard wiener nierstrasz senior dahl–nygaard_prize 2013 | [
9701
] | None |
477 | 9 | Assembly_language:assembly language assembly language assembler language often abbreviated asm low-level programming language strong correspondence instructions language architecture machine code instructions assembly language may also called symbolic machine code assembly code converted executable machine code utility program referred assembler conversion process referred assembly assembling source code assembly language usually one statement per machine instruction 1:1 comments statements assembler directives macros symbolic labels program memory locations often also supported assembly language specific particular computer architecture sometimes operating system however assembly languages provide specific syntax operating system calls assembly languages used universally operating system language provides access real capabilities processor upon system call mechanisms ultimately rest contrast assembly languages high-level programming languages generally portable across multiple architectures require interpreting compiling much complicated task assembling assembly language uses mnemonic represent low-level machine instruction opcode typically also architectural register flag etc many operations require one operands order form complete instruction assemblers permit named constants registers labels program memory locations calculate expressions operands thus programmers freed tedious repetitive calculations assembler programs much readable machine code depending architecture elements may also combined specific instructions addressing modes using offsets data well fixed addresses many assemblers offer additional mechanisms facilitate program development control assembly process aid debugging assembler program creates object code translating combinations mnemonics syntax operations addressing modes numerical equivalents representation typically includes operation code opcode well control bits data assembler also calculates constant expressions resolves symbolic names memory locations entities use symbolic references key feature assemblers saving tedious calculations manual address updates program modifications assemblers also include macro facilities performing textual substitution – e.g. generate common short sequences instructions inline instead called subroutines assemblers may also able perform simple types instruction set-specific optimizations one concrete example may ubiquitous x86 assemblers various vendors able perform jump-instruction replacements long jumps replaced short relative jumps number passes request others may even simple rearrangement insertion instructions assemblers risc architectures help optimize sensible instruction scheduling exploit cpu pipeline efficiently possible like early programming languages fortran algol cobol lisp assemblers available since 1950s first generations text based computer interfaces however assemblers came first far simpler write compilers high-level languages mnemonic along addressing modes operands instruction translates rather directly numeric representations particular instruction without much context analysis also several classes translators semi automatic code generators properties similar assembly high level languages speedcode perhaps one better known examples may several assemblers different syntax particular cpu instruction set architecture instance instruction add memory data register x86-family processor might codice_1 original intel syntax whereas would written codice_2 syntax used gnu assembler despite different appearances different syntactic forms generally generate numeric machine code see single assembler may also different modes order support variations syntactic forms well exact semantic interpretations fasm-syntax tasm-syntax ideal mode etc. special case x86 assembly programming two types assemblers based many passes source needed many times assembler reads source produce object file cases assembler must able determine size instruction initial passes order calculate addresses subsequent symbols means size operation referring operand defined later depends type distance operand assembler make pessimistic estimate first encountering operation necessary pad one no-operation instructions later pass errata assembler peephole optimization addresses may recalculated passes allow replacing pessimistic code code tailored exact distance target original reason use one-pass assemblers speed assembly – often second pass would require rewinding rereading program source tape rereading deck cards punched paper tape later computers much larger memories especially disc storage space perform necessary processing without re-reading advantage multi-pass assembler absence errata makes linking process program load assembler directly produces executable code faster example following code snippet one-pass assembler would able determine address backward reference bkwd assembling statement s2 would able determine address forward reference fwd assembling branch statement s1 indeed fwd may undefined two-pass assembler would determine addresses pass 1 would known generating code pass 2 sophisticated high-level assemblers provide language abstractions see language design details program written assembly language consists series mnemonic processor instructions meta-statements known variously directives pseudo-instructions pseudo-ops comments data assembly language instructions usually consist opcode mnemonic followed list data arguments parameters translated assembler machine language instructions loaded memory executed example instruction tells x86/ia-32 processor move immediate 8-bit value register binary code instruction 10110 followed 3-bit identifier register use identifier al register 000 following machine code loads al register data 01100001 binary computer code made human-readable expressing hexadecimal follows codice_3 means 'move copy following value al codice_4 hexadecimal representation value 01100001 97 decimal assembly language 8086 family provides mnemonic mov abbreviation move instructions machine code written follows assembly language complete explanatory comment required semicolon much easier read remember mov al 61h load al 97 decimal 61 hex assembly languages including one mnemonic mov may used family related instructions loading copying moving data whether immediate values values registers memory locations pointed values registers immediate a/k/a direct addresses assemblers may use separate opcode mnemonics l move memory register st move register memory lr move register register mvi move immediate operand memory etc mnemonic used different instructions means mnemonic corresponds several different binary instruction codes excluding data e.g codice_5 example depending operands follow mnemonic example x86/ia-32 cpus intel assembly language syntax codice_6 represents instruction moves contents register ah register al hexadecimal form instruction first byte 88h identifies move byte-sized register either another register memory second byte e0h encoded three bit-fields specify operands registers source ah destination al case like mnemonic represent one binary instruction assembler determines instruction generate examining operands first example operand codice_5 valid hexadecimal numeric constant valid register name codice_3 instruction applicable second example operand codice_9 valid register name valid numeric constant hexadecimal decimal octal binary codice_10 instruction applicable assembly languages always designed sort unambiguousness universally enforced syntax example intel x86 assembly language hexadecimal constant must start numeral digit hexadecimal number equal decimal ten would written codice_11 codice_12 codice_9 specifically appear name register ah rule also prevents ambiguity names registers bh ch dh well user-defined symbol ends letter h otherwise contains characters hexadecimal digits word beach returning original example x86 opcode 10110000 codice_3 copies 8-bit value al register 10110001 codice_15 moves cl 10110010 codice_16 dl assembly language examples follow mov al 1h load al immediate value 1 mov cl 2h load cl immediate value 2 mov dl 3h load dl immediate value 3 syntax mov also complex following examples show mov eax ebx move 4 bytes memory address contained ebx eax mov esi+eax cl move contents cl byte address esi+eax mov ds dx move contents dx segment register ds case mov mnemonic translated directly one opcodes 88-8c 8e a0-a3 b0-bf c6 c7 assembler programmer normally know remember transforming assembly language machine code job assembler reverse least partially achieved disassembler unlike high-level languages one-to-one correspondence many simple assembly statements machine language instructions however cases assembler may provide pseudoinstructions essentially macros expand several machine language instructions provide commonly needed functionality example machine lacks branch greater equal instruction assembler may provide pseudoinstruction expands machine set less branch zero result set instruction full-featured assemblers also provide rich macro language discussed used vendors programmers generate complex code data sequences since information pseudoinstructions macros defined assembler environment present object program disassembler reconstruct macro pseudoinstruction invocations disassemble actual machine instructions assembler generated abstract assembly-language entities likewise since comments assembly language source file ignored assembler effect object code generates disassembler always completely unable recover source comments computer architecture machine language computers differ number type operations support different sizes numbers registers representations data storage general-purpose computers able carry essentially functionality ways differ corresponding assembly languages reflect differences multiple sets mnemonics assembly-language syntax may exist single instruction set typically instantiated different assembler programs cases popular one usually supplied cpu manufacturer used documentation two examples cpus two different sets mnemonics intel 8080 family intel 8086/8088 intel claimed copyright assembly language mnemonics page documentation published 1970s early 1980s least companies independently produced cpus compatible intel instruction sets invented mnemonics zilog z80 cpu enhancement intel 8080a supports 8080a instructions plus many zilog invented entirely new assembly language new instructions also 8080a instructions example intel uses mnemonics mov mvi lda sta lxi ldax stax lhld shld various data transfer instructions z80 assembly language uses mnemonic ld similar case nec v30 v20 cpus enhanced copies intel 8086 8088 respectively like zilog z80 nec invented new mnemonics 8086 8088 instructions avoid accusations infringement intel copyright questionable whether copyrights valid later cpu companies amd cyrix republished intel x86/ia-32 instruction mnemonics exactly neither permission legal penalty doubtful whether practice many people programmed v20 v30 actually wrote nec assembly language rather intel since two assembly languages instruction set architecture isomorphic somewhat like english pig latin requirement use manufacturer published assembly language manufacturer products large degree diversity way authors assemblers categorize statements nomenclature use particular describe anything machine mnemonic extended mnemonic pseudo-operation pseudo-op typical assembly language consists 3 types instruction statements used define program operations instructions statements assembly language generally simple unlike high-level languages generally mnemonic symbolic name single executable machine language instruction opcode least one opcode mnemonic defined machine language instruction instruction typically consists operation opcode plus zero operands instructions refer single value pair values operands immediate value coded instruction registers specified instruction implied addresses data located elsewhere storage determined underlying processor architecture assembler merely reflects architecture works extended mnemonics often used specify combination opcode specific operand e.g. system/360 assemblers use extended mnemonic mask 15 operation – nothing one step mask 0 extended mnemonics often used support specialized uses instructions often purposes obvious instruction name example many cpu explicit nop instruction instructions used purpose 8086 cpus instruction used pseudo-opcode encode instruction disassemblers recognize decode instruction similarly ibm assemblers system/360 system/370 use extended mnemonics zero masks sparc architecture known synthetic instructions assemblers also support simple built-in macro-instructions generate two machine instructions instance z80 assemblers instruction recognized generate followed sometimes known pseudo-opcodes mnemonics arbitrary symbols 1985 ieee published standard 694 uniform set mnemonics used assemblers standard since withdrawn instructions used define data elements hold data variables define type data length alignment data instructions also define whether data available outside programs programs assembled separately program data section defined assemblers classify pseudo-ops assembly directives also called pseudo-opcodes pseudo-operations pseudo-ops commands given assembler directing perform operations assembling instructions. directives affect assembler operates may affect object code symbol table listing file values internal assembler parameters sometimes term pseudo-opcode reserved directives generate object code generate data names pseudo-ops often start dot distinguish machine instructions pseudo-ops make assembly program dependent parameters input programmer one program assembled different ways perhaps different applications pseudo-op used manipulate presentation program make easier read maintain another common use pseudo-ops reserve storage areas run-time data optionally initialize contents known values symbolic assemblers let programmers associate arbitrary names labels symbols memory locations various constants usually every constant variable given name instructions reference locations name thus promoting self-documenting code executable code name subroutine associated entry point calls subroutine use name inside subroutines goto destinations given labels assemblers support local symbols lexically distinct normal symbols e.g. use 10 goto destination assemblers nasm provide flexible symbol management letting programmers manage different namespaces automatically calculate offsets within data structures assign labels refer literal values result simple computations performed assembler labels also used initialize constants variables relocatable addresses assembly languages like computer languages allow comments added program source code ignored assembly judicious commenting essential assembly language programs meaning purpose sequence binary machine instructions difficult determine raw uncommented assembly language generated compilers disassemblers quite difficult read changes must made many assemblers support predefined macros others support programmer-defined repeatedly re-definable macros involving sequences text lines variables constants embedded macro definition commonly mixture assembler statements e.g. directives symbolic machine instructions templates assembler statements sequence text lines may include opcodes directives macro defined name may used place mnemonic assembler processes statement replaces statement text lines associated macro processes existed source code file including assemblers expansion macros existing replacement text macros sense date ibm autocoders 1950s assembly language term macro represents comprehensive concept contexts c programming language define directive typically used create short single line macros assembler macro instructions like macros pl/i languages lengthy programs executed interpretation assembler assembly since macros 'short names expand several indeed many lines code used make assembly language programs appear far shorter requiring fewer lines source code higher level languages also used add higher levels structure assembly programs optionally introduce embedded debugging code via parameters similar features macro assemblers often allow macros take parameters assemblers include quite sophisticated macro languages incorporating high-level language elements optional parameters symbolic variables conditionals string manipulation arithmetic operations usable execution given macro allowing macros save context exchange information thus macro might generate numerous assembly language instructions data definitions based macro arguments could used generate record-style data structures unrolled loops example could generate entire algorithms based complex parameters instance sort macro could accept specification complex sort key generate code crafted specific key needing run-time tests would required general procedure interpreting specification organization using assembly language heavily extended using macro suite considered working higher-level language since programmers working computer lowest-level conceptual elements underlining point macros used implement early virtual machine snobol4 1967 written snobol implementation language sil assembly language virtual machine target machine would translate native code using macro assembler allowed high degree portability time macros used customize large scale software systems specific customers mainframe era also used customer personnel satisfy employers needs making specific versions manufacturer operating systems done example systems programmers working ibm conversational monitor system virtual machine vm/cms ibm real time transaction processing add-ons customer information control system cics acp/tpf airline/financial system began 1970s still runs many large computer reservation systems crs credit card systems today also possible use solely macro processing abilities assembler generate code written completely different languages example generate version program cobol using pure macro assembler program containing lines cobol code inside assembly time operators instructing assembler generate arbitrary code ibm os/360 uses macros perform system generation user specifies options coding series assembler macros assembling macros generates job stream build system including job control language utility control statements realized 1960s concept macro processing independent concept assembly former modern terms word processing text processing generating object code concept macro processing appeared appears c programming language supports preprocessor instructions set variables make conditional tests values note unlike certain previous macro processors inside assemblers c preprocessor turing-complete lacks ability either loop go latter allowing programs loop despite power macro processing fell disuse many high level languages major exceptions c c++ pl/i remaining perennial assemblers macro parameter substitution strictly name macro processing time value parameter textually substituted name famous class bugs resulting use parameter expression simple name macro writer expected name macro intention caller would provide name variable global variable constant b would used multiply foo called parameter codice_17 macro expansion codice_18 occurs avoid possible ambiguity users macro processors parenthesize formal parameters inside macro definitions callers parenthesize input parameters assemblers incorporated structured programming elements encode execution flow earliest example approach concept-14 macro set originally proposed dr. harlan mills march 1970 implemented marvin kessler ibm federal systems division extended s/360 macro assembler if/else/endif similar control flow blocks way reduce eliminate use goto operations assembly code one main factors causing spaghetti code assembly language approach widely accepted early '80s latter days large-scale assembly language use curious design a-natural stream-oriented assembler 8080/z80 processors whitesmiths ltd. developers unix-like idris operating system reported first commercial c compiler language classified assembler worked raw machine elements opcodes registers memory references incorporated expression syntax indicate execution order parentheses special symbols along block-oriented structured programming constructs controlled sequence generated instructions a-natural built object language c compiler rather hand-coding logical syntax fans little apparent demand sophisticated assemblers since decline large-scale assembly language development spite still developed applied cases resource constraints peculiarities target system architecture prevent effective use higher-level languages assemblers strong macro engine allow structured programming via macros switch macro provided masm32 package note code complete program assembly languages available time stored-program computer introduced kathleen booth credited inventing assembly language based theoretical work began 1947 working arc2 birkbeck university london following consultation then-future husband andrew booth john von neumann herman goldstine institute advanced study late 1948 electronic delay storage automatic calculator edsac assembler named initial orders integrated bootstrap program used one-letter mnemonics developed david wheeler credited ieee computer society creator first assembler reports edsac introduced term assembly process combining fields instruction word soap symbolic optimal assembly program assembly language ibm 650 computer written stan poley 1955 assembly languages eliminate much error-prone tedious time-consuming first-generation programming needed earliest computers freeing programmers tedium remembering numeric codes calculating addresses widely used sorts programming however 1980s 1990s microcomputers use largely supplanted higher-level languages search improved programming productivity today assembly language still used direct hardware manipulation access specialized processor instructions address critical performance issues typical uses device drivers low-level embedded systems real-time systems historically numerous programs written entirely assembly language burroughs mcp 1961 first computer operating system developed entirely assembly language written executive systems problem oriented language espol algol dialect many commercial applications written assembly language well including large amount ibm mainframe software written large corporations cobol fortran pl/i eventually displaced much work although number large organizations retained assembly-language application infrastructures well 1990s early microcomputers relied hand-coded assembly language including operating systems large applications systems severe resource constraints imposed idiosyncratic memory display architectures provided limited buggy system services perhaps important lack first-class high-level language compilers suitable microcomputer use psychological factor may also played role first generation microcomputer programmers retained hobbyist wires pliers attitude commercial context biggest reasons using assembly language minimal bloat size minimal overhead greater speed reliability typical examples large assembly language programs time ibm pc dos operating systems turbo pascal compiler early applications spreadsheet program lotus 1-2-3 assembly language used get best performance sega saturn console notoriously challenging develop program games 1993 arcade game nba jam another example assembly language long primary development language many popular home computers 1980s 1990s msx sinclair zx spectrum commodore 64 commodore amiga atari st large part interpreted basic dialects systems offered insufficient execution speed well insufficient facilities take full advantage available hardware systems systems even integrated development environment ide highly advanced debugging macro facilities compilers available radio shack trs-80 successors capability combine inline assembly source high-level program statements upon compilation built-in assembler produced inline machine code always debates usefulness performance assembly language relative high-level languages although assembly language specific niche uses important see tools optimization tiobe index programming language popularity ranks assembly language 11 ahead visual basic example assembler used optimize speed optimize size case speed optimization modern optimizing compilers claimed render high-level languages code run fast hand-written assembly despite counter-examples found complexity modern processors memory sub-systems makes effective optimization increasingly difficult compilers well assembly programmers moreover increasing processor performance meant cpus sit idle time delays caused predictable bottlenecks cache misses i/o operations paging made raw code execution speed non-issue many programmers situations developers might choose use assembly language assembly language still taught computer science electronic engineering programs although programmers today regularly work assembly language tool underlying concepts remain important fundamental topics binary arithmetic memory allocation stack processing character set encoding interrupt processing compiler design would hard study detail without grasp computer operates hardware level since computer behavior fundamentally defined instruction set logical way learn concepts study assembly language modern computers similar instruction sets therefore studying single assembly language sufficient learn basic concepts ii recognize situations use assembly language might appropriate iii see efficient executable code created high-level languages | [
6148,
6160,
2066,
22,
8221,
10273,
45,
4151,
8262,
2120,
8273,
6226,
6228,
2137,
96,
10340,
6248,
8326,
10387,
6296,
154,
4255,
2224,
8369,
6325,
191,
8388,
6352,
213,
219,
226,
228,
10469,
10470,
8429,
8438,
2304,
6403,
8454,
10508,
27... | Test |
478 | 2 | Your_Phone:phone phone app developed microsoft windows 10 connect android ios devices first shown microsoft build 2018 allows see recent photos taken android phone directly windows 10 pc/tablet also used sending sms messages right pc comes preinstalled windows 10 october 2018 update replaces old phone companion phone app used mirror screen android phone however currently phones supported feature beta.at samsung ’ galaxy note10 launch event microsoft teased new phone app feature might soon allow make receive phone calls may 26 2015 microsoft announced phone companion designed help users connect pc whatever smartphone use — windows phone android ios also confirmed cortana digital assistant app arrive android ios previously available windows devices may 7 2018 microsoft announced phone app build 2018 event allows see recent photos send sms messages | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
6797,
2193,
9874,
1... | Test |
479 | 5 | XML:xml extensible markup language xml markup language defines set rules encoding documents format human-readable machine-readable w3c xml 1.0 specification several related specifications—all free open standards—define xml design goals xml emphasize simplicity generality usability across internet textual data format strong support via unicode different human languages although design xml focuses documents language widely used representation arbitrary data structures used web services several schema systems exist aid definition xml-based languages programmers developed many application programming interfaces apis aid processing xml data essence extensible markup languages necessary explained markup language example see markup language § xml standard generalized markup language hundreds document formats using xml syntax developed including rss atom soap svg xhtml xml-based formats become default many office-productivity tools including microsoft office office open xml openoffice.org libreoffice opendocument apple iwork xml also provided base language communication protocols xmpp applications microsoft .net framework use xml files configuration property lists implementation configuration storage built xml many industry data standards e.g hl7 ota fpml mismo niem etc based xml rich features xml schema specification many standards quite complex uncommon specification comprise several thousand pages publishing dita xml industry data standard xml used extensively underpin various publishing formats xml widely used services oriented architecture soa disparate systems communicate exchanging xml messages message exchange format standardised xml schema xsd also referred canonical schema xml come common use interchange data internet ietf superseded gave rules construction internet media types use sending xml also defines media types codice_1 codice_2 say data xml nothing semantics rfc 7303 also recommends xml-based languages given media types ending codice_3 example codice_4 svg guidelines use xml networked context appear rfc 3470 also known ietf bcp 70 document covering many aspects designing deploying xml-based language material section based xml specification exhaustive list constructs appear xml provides introduction key constructs often encountered day-to-day use xml documents consist entirely characters unicode repertoire except small number specifically excluded control characters character defined unicode may appear within content xml document xml includes facilities identifying encoding unicode characters make document expressing characters one reason another used directly unicode code points following ranges valid xml 1.0 documents xml 1.1 extends set allowed characters include plus remaining characters range u+0001–u+001f time however restricts use c0 c1 control characters u+0009 horizontal tab u+000a line feed u+000d carriage return u+0085 next line requiring written escaped form example u+0001 must written codice_22 equivalent case c1 characters restriction backwards incompatibility introduced allow common encoding errors detected code point u+0000 null character permitted xml 1.0 1.1 document unicode character set encoded bytes storage transmission variety different ways called encodings unicode defines encodings cover entire repertoire well-known ones include utf-8 utf-16 many text encodings predate unicode ascii iso/iec 8859 character repertoires almost every case subsets unicode character set xml allows use unicode-defined encodings encodings whose characters also appear unicode xml also provides mechanism whereby xml processor reliably without prior knowledge determine encoding used encodings utf-8 utf-16 necessarily recognized every xml parser xml provides escape facilities including characters problematic include directly example five predefined entities permitted unicode characters may represented numeric character reference consider chinese character 中 whose numeric code unicode hexadecimal 4e2d decimal 20,013 user whose keyboard offers method entering character could still insert xml document encoded either codice_32 codice_33 similarly string 3 jörg could encoded inclusion xml document codice_34 codice_35 permitted however null character one control characters excluded xml even using numeric character reference alternative encoding mechanism base64 needed represent characters comments may appear anywhere document outside markup comments appear xml declaration comments begin codice_36 end codice_37 compatibility sgml string -- double-hyphen allowed inside comments means comments nested ampersand special significance within comments entity character references recognized way represent characters outside character set document encoding example valid comment codice_38 xml 1.0 fifth edition xml 1.1 support direct use almost unicode character element names attributes comments character data processing instructions ones special symbolic meaning xml less-than sign following well-formed xml document including chinese armenian cyrillic characters xml specification defines xml document well-formed text meaning satisfies list syntax rules provided specification key points fairly lengthy list include definition xml document excludes texts contain violations well-formedness rules simply xml xml processor encounters violation required report errors cease normal processing policy occasionally referred draconian error handling stands notable contrast behavior programs process html designed produce reasonable result even presence severe markup errors xml policy area criticized violation postel law conservative send liberal accept xml specification defines valid xml document well-formed xml document also conforms rules document type definition dtd addition well-formed xml document may valid means contains reference document type definition dtd elements attributes declared dtd follow grammatical rules dtd specifies xml processors classified validating non-validating depending whether check xml documents validity processor discovers validity error must able report may continue normal processing dtd example schema grammar since initial publication xml 1.0 substantial work area schema languages xml schema languages typically constrain set elements may used document attributes may applied order may appear allowable parent/child relationships oldest schema language xml document type definition dtd inherited sgml dtds following benefits dtds following limitations two peculiar features distinguish dtds schema types syntactic support embedding dtd within xml documents defining entities arbitrary fragments text and/or markup xml processor inserts dtd xml document wherever referenced like character escapes dtd technology still used many applications ubiquity newer schema language described w3c successor dtds xml schema often referred initialism xml schema instances xsd xml schema definition xsds far powerful dtds describing xml languages use rich datatyping system allow detailed constraints xml document logical structure xsds also use xml-based format makes possible use ordinary xml tools help process xs schema element defines schema relax ng regular language xml next generation initially specified oasis standard part 2 regular-grammar-based validation iso/iec 19757 dsdl relax ng schemas may written either xml based syntax compact non-xml syntax two syntaxes isomorphic james clark conversion tool—trang—can convert without loss information relax ng simpler definition validation framework xml schema making easier use implement also ability use datatype framework plug-ins relax ng schema author example require values xml document conform definitions xml schema datatypes schematron language making assertions presence absence patterns xml document typically uses xpath expressions schematron standard part 3 rule-based validation iso/iec 19757 dsdl dsdl document schema definition languages multi-part iso/iec standard iso/iec 19757 brings together comprehensive set small schema languages targeted specific problems dsdl includes relax ng full compact syntax schematron assertion language languages defining datatypes character repertoire constraints renaming entity expansion namespace-based routing document fragments different validators dsdl schema languages vendor support xml schemas yet extent grassroots reaction industrial publishers lack utility xml schemas publishing schema languages describe structure particular xml format also offer limited facilities influence processing individual xml files conform format dtds xsds ability instance provide infoset augmentation facility attribute defaults relax ng schematron intentionally provide cluster specifications closely related xml developed starting soon initial publication xml 1.0 frequently case term xml used refer xml together one technologies come seen part xml core specifications conceived part xml core failed find wide adoption including xinclude xlink xpointer design goals xml include shall easy write programs process xml documents despite xml specification contains almost information programmers might go processing xml infoset specification provides vocabulary refer constructs within xml document provide guidance access information variety apis accessing xml developed used standardized existing apis xml processing tend fall categories stream-oriented facilities require less memory certain tasks based linear traversal xml document faster simpler alternatives tree-traversal data-binding apis typically require use much memory often found convenient use programmers include declarative retrieval document components via use xpath expressions xslt designed declarative description xml document transformations widely implemented server-side packages web browsers xquery overlaps xslt functionality designed searching large xml databases simple api xml sax lexical event-driven api document read serially contents reported callbacks various methods handler object user design sax fast efficient implement difficult use extracting information random xml since tends burden application author keeping track part document processed better suited situations certain types information always handled way matter occur document pull parsing treats document series items read sequence using iterator design pattern allows writing recursive descent parsers structure code performing parsing mirrors structure xml parsed intermediate parsed results used accessed local variables within functions performing parsing passed function parameters lower-level functions returned function return values higher-level functions examples pull parsers include data :edit :xml perl stax java programming language xmlpullparser smalltalk xmlreader php elementtree.iterparse python system.xml.xmlreader .net framework dom traversal api nodeiterator treewalker pull parser creates iterator sequentially visits various elements attributes data xml document code uses iterator test current item tell example whether start-tag end-tag text inspect attributes local name namespace values xml attributes value text etc also move iterator next item code thus extract information document traverses recursive-descent approach tends lend keeping data typed local variables code parsing sax instance typically requires parser manually maintain intermediate data within stack elements parent elements element parsed pull-parsing code straightforward understand maintain sax parsing code document object model dom api allows navigation entire document tree node objects representing document contents dom document created parser generated manually users limitations data types dom nodes abstract implementations provide programming language-specific bindings dom implementations tend memory intensive generally require entire document loaded memory constructed tree objects access allowed xml data binding binding xml documents hierarchy custom strongly typed objects contrast generic objects created dom parser approach simplifies code development many cases allows problems identified compile time rather run-time suitable applications document structure known fixed time application written example data binding systems include java architecture xml binding jaxb xml serialization .net framework xml serialization gsoap xml appeared first-class data type languages ecmascript xml e4x extension ecmascript/javascript language explicitly defines two specific objects xml xmllist javascript support xml document nodes xml node lists distinct objects use dot-notation specifying parent-child relationships e4x supported mozilla 2.5+ browsers though deprecated adobe actionscript adopted universally similar notations used microsoft linq implementation microsoft .net 3.5 scala uses java vm open-source xmlsh application provides linux-like shell special features xml manipulation similarly treats xml data type using notation resource description framework defines data type codice_42 hold wrapped canonical xml facebook produced extensions php javascript languages add xml core syntax similar fashion e4x namely xhp jsx respectively xml application profile sgml iso 8879 versatility sgml dynamic information display understood early digital media publishers late 1980s prior rise internet mid-1990s practitioners sgml gained experience then-new world wide web believed sgml offered solutions problems web likely face grew dan connolly added sgml list w3c activities joined staff 1995 work began mid-1996 sun microsystems engineer jon bosak developed charter recruited collaborators bosak well connected small community people experience sgml web xml compiled working group eleven members supported roughly 150-member interest group technical debate took place interest group mailing list issues resolved consensus failed majority vote working group record design decisions rationales compiled michael sperberg-mcqueen december 4 1997 james clark served technical lead working group notably contributing empty-element codice_43 syntax name xml names put forward consideration included magma minimal architecture generalized markup applications slim structured language internet markup mgml minimal generalized markup language co-editors specification originally tim bray michael sperberg-mcqueen halfway project bray accepted consulting engagement netscape provoking vociferous protests microsoft bray temporarily asked resign editorship led intense dispute working group eventually solved appointment microsoft jean paoli third co-editor xml working group never met face-to-face design accomplished using combination email weekly teleconferences major design decisions reached short burst intense work august november 1996 first working draft xml specification published design work continued 1997 xml 1.0 became w3c recommendation february 10 1998 xml profile iso standard sgml xml comes sgml unchanged sgml comes separation logical physical structures elements entities availability grammar-based validation dtds separation data metadata elements attributes mixed content separation processing representation processing instructions default angle-bracket syntax removed sgml declaration xml fixed delimiter set adopts unicode document character set sources technology xml tei text encoding initiative defined profile sgml use transfer syntax html elements synchronous resource document character sets separate resource encoding codice_44 attribute invented like http metadata accompanied resource rather needed declaration link ercs extended reference concrete syntax project spread standardization project regarding east asian documents project iso-related china/japan/korea document processing expert group basis xml 1.0 naming rules spread also introduced hexadecimal numeric character references concept references make available unicode characters support ercs xml html better sgml standard 8879 revised 1996 1998 websgml adaptations xml header followed iso hytime ideas developed discussion novel xml included algorithm encoding detection encoding header processing instruction target xml space attribute new close delimiter empty-element tags notion well-formedness opposed validity enables parsing without schema first formalized xml although implemented successfully electronic book technology dynatext software software university waterloo new oxford english dictionary project risp lisp sgml text processor uniscope tokyo us army missile command iads hypertext system mentor graphics context interleaf xerox publishing system two current versions xml first xml 1.0 initially defined 1998 undergone minor revisions since without given new version number currently fifth edition published november 26 2008 widely implemented still recommended general use second xml 1.1 initially published february 4 2004 day xml 1.0 third edition currently second edition published august 16 2006 contains features contentious intended make xml easier use certain cases main changes enable use line-ending characters used ebcdic platforms use scripts characters absent unicode 3.2 xml 1.1 widely implemented recommended use need particular features prior fifth edition release xml 1.0 differed xml 1.1 stricter requirements characters available use element attribute names unique identifiers first four editions xml 1.0 characters exclusively enumerated using specific version unicode standard unicode 2.0 unicode 3.2 fifth edition substitutes mechanism xml 1.1 future-proof reduces redundancy approach taken fifth edition xml 1.0 editions xml 1.1 certain characters forbidden names everything else allowed accommodate suitable name characters future unicode versions fifth edition xml names may contain characters balinese cham phoenician scripts among many others added unicode since unicode 3.2 almost unicode code point used character data attribute values xml 1.0 1.1 document even character corresponding code point defined current version unicode character data attribute values xml 1.1 allows use control characters xml 1.0 robustness control characters introduced xml 1.1 must expressed numeric character references x7f x9f allowed xml 1.0 xml 1.1 even required expressed numeric character references among supported control characters xml 1.1 two line break codes must treated whitespace whitespace characters control codes written directly discussion xml 2.0 although organization announced plans work project xml-sw sw skunkworks written one original developers xml contains proposals xml 2.0 might look like elimination dtds syntax integration namespaces xml base xml information set base standard world wide web consortium also xml binary characterization working group preliminary research use cases properties binary encoding xml information set working group chartered produce official standards since xml definition text-based itu-t iso using name fast infoset binary infoset avoid confusion see itu-t rec x.891 iso/iec 24824-1 xml extensions regularly criticized verbosity complexity redundancy mapping basic tree model xml type systems programming languages databases difficult especially xml used exchanging highly structured data applications primary design goal however xml data binding systems allow applications access xml data directly objects representing data structure data programming language used ensures type safety rather using dom sax retrieve data direct representation xml accomplished automatically creating mapping elements xml schema xsd document members class represented memory criticisms attempt refute claim xml self-describing language though xml specification makes claim json yaml s-expressions frequently proposed simpler alternatives see comparison data serialization formats focus representing highly structured data rather documents may contain highly structured relatively unstructured content however w3c standardized xml schema specifications offer broader range structured xsd data types compared simpler serialization formats offer modularity reuse xml namespace | [
6144,
6145,
10242,
6147,
10243,
8201,
4107,
13,
4111,
8208,
35,
8227,
2088,
44,
6188,
53,
58,
64,
6212,
69,
8262,
4174,
83,
6231,
8280,
8285,
8291,
10340,
2150,
8303,
8304,
115,
4213,
119,
124,
4229,
140,
6284,
8335,
8340,
10393,
4255... | None |
480 | 1 | IPUMS:ipums integrated public use microdata series ipums world largest individual-level population database ipums consists microdata samples united states ipums-usa international ipums-international census records well data u.s. international surveys records converted consistent format made available researchers web-based data dissemination system ipums housed institute social research data innovation interdisciplinary research center university minnesota direction professor steven ruggles ipums includes persons enumerated united states censuses 1790 2010 1890 census missing destroyed fire american community survey since 2000 current population survey since 1962 ipums provides consistent variable names coding schemes documentation across samples facilitating analysis long-term change ipums-international includes countries africa asia europe latin america 1960 forward database currently includes billion individuals enumerated 365 censuses 94 countries around world ipums-international converts census microdata multiple countries consistent format allowing comparisons across countries time periods special efforts made simplify use data losing meaningful information comprehensive documentation provided coherent form facilitate comparative analyses social economic change additional databases ipums family include journal american history described effort one great archival projects past two decades liens socio french portal social sciences gave ipums “ best site ” designation gone non-french website writing “ ipums est un projet absolument extraordinaire ... époustouflante mind-blowing ” official motto ipums use good never evil ipums data documentation available online free charge | [
11275
] | Test |
481 | 3 | Gorby_no_Pipeline_Daisakusen:gorby pipeline daisakusen gorby pipeline daisakusen puzzle video game developed compile msx2 famicom fm towns published tokuma shoten 1991 game player assembles water pipe segments pipeline moscow tokyo order strengthen japan–soviet union relations permission soviet embassy game promotional materials feature name likeness mikhail gorbachev president soviet union time game development release two months tokuma shoten released gorby pipeline daisakusen japan sega published game gear handheld game console games released japan several months dissolution soviet union falling-block puzzle game small girl—wearing russian national costume sarafan kokoshnik valenki—pushes tiles representing segments water pipe two-dimensional vertical shaft shaft field play second girl also national costume waves semaphore flags give impression guides placement tiles player must quickly rotate place tiles catch conduct continuously-flowing stream water pipes one side shaft player successfully links inflow pipe one side shaft outflow pipe side row tiles disappears player earns points player routes water dead end game adds layer pipe segments player clear accumulating pipe segments stack top shaft game ends clearing requisite number rows player proceeds next game level background music level rendition russian classical music composition among selections great gate kiev final movement mussorgsky suite pictures exhibition 1874 swan theme tchaikovsky ballet swan lake 1876 flight bumblebee interlude rimsky-korsakov opera tale tsar saltan 1900 | [
5762,
10931,
9006,
10855
] | Test |
482 | 9 | Asm.js:asm.js asm.js subset javascript designed allow computer software written languages c run web applications maintaining performance characteristics considerably better standard javascript typical language used applications asm.js consists strict subset javascript code written statically-typed languages manual memory management c translated source-to-source compiler emscripten based llvm performance improved limiting language features amenable ahead-of-time optimization performance improvements mozilla firefox first web browser implement asm.js-specific optimizations starting version 22. asm.js enables significant performance improvements web applications aim improve performance hand-written javascript code enable anything enhanced performance intended performance characteristics closer native code standard javascript limiting language features amenable ahead-of-time optimization performance improvements using subset javascript asm.js largely supported major web browsers unlike alternative approaches google native client asm.js typically written directly instead intermediate language generated use compiler takes source code language c++ outputs asm.js example given following c code int f int emscripten would output following js code function f note addition codice_1 lack type specifiers javascript bitwise operators convert operands 32-bit signed integers give integer results means bitwise zero otherwise useless operation converts value integer parameter ensures function called outside code value converted correct type also used return value case ensure result adding 1 integer otherwise could become large mark return type function conversions required asm.js optimising compiler produce highly efficient native code ahead-of-time optimising compiler conversions performed asm.js code calls asm.js code required type specifiers mean guaranteed values already correct type furthermore rather performing floating-point addition converting integer simply native integer operation together leads significant performance benefits another example calculate length string would result following asm.js code generated code variable mem8 actually byte-by-byte view typed buffer serves heap asm.js code since asm.js runs browser performance heavily depends browser hardware preliminary benchmarks c programs compiled asm.js usually within factor 2 slowdown native compilation clang much performance gain normal javascript due 100 type consistency virtually garbage collection memory manually managed large typed array simpler model dynamic behavior memory allocation deallocation narrow set well-defined integer floating point operations enables much greater performance potential optimization mozilla benchmark december 2013 showed significant improvements firefox float32 optimizations run benchmarks around 1.5× slower native better mozilla points performance natively compiled code single measure rather range different native compilers case clang gcc delivering code differing performance fact benchmarks like box2d fasta copy asm.js close closer clang clang gcc one case asm.js even beats clang slight amount box2d emscripten project provides tools used compile c c++ codebases languages converted llvm ir asm.js browsers support newest edition javascript able run asm.js code subset specification however since features added edition enable full asm.js support older browsers lacking features may encounter problems browser implementations especially optimised asm.js almost current applications based asm.js c/c++ applications compiled asm.js using emscripten mandreel mind kind applications going target asm.js near future benefit portability running browser level complexity direct port javascript would infeasible far number programming languages application frameworks programs libraries games game engines software already ported given | [
2050,
9736,
6154,
9245,
9757,
6176,
10284,
9281,
8262,
4171,
84,
6231,
603,
8289,
5219,
10860,
10353,
4728,
637,
1664,
6791,
8854,
11418,
4777,
1713,
3761,
1203,
7861,
11449,
5311,
7871,
7889,
4822,
8923,
7396,
4326,
10991,
10480,
2804,
8... | Test |
483 | 4 | STRIDE_(security):stride security stride model threats developed praerit garg loren kohnfelder microsoft identifying computer security threats provides mnemonic security threats six categories threats stride initially created part process threat modelling stride model threats used help reason find threats system used conjunction model target system constructed parallel includes full breakdown processes data stores data flows trust boundaries today often used security experts help answer question go wrong system 're working threat violation desirable property system repudiation unusual threat viewed security perspective desirable property privacy systems example goldberg record messaging system useful demonstration tension security design analysis must sometimes grapple elevation privilege often called escalation privilege privilege escalation synonymous | [
1344,
4163,
612,
7075,
2409,
1453,
9293,
4948,
8468,
2558
] | Test |
484 | 4 | Techreturns:techreturns techreturns nederland bv dutch company founded aim reduce electronic waste e-waste buying used electronics especially mobile phones consumers companies repair give second life choose donate mobile phone organisations masterpeace artis zoo company revenues comes selling second hand devices mainly asia africa market affordable quality electronics sales also take place europe especially netherlands sister company beatsnew techreturns connected closing loop foundation collecting e-waste developing countries recycling involved project also organisations fairphone text change recently techreturns appeared multiple times dutch media instance discussion sustainability initiatives dutch government annual summary dutch sustainable businesses 2013 mvo netherlands consumer television programme kassa 14-01-14 segment reuse versus recycling electronic industry techreturns founded 2009 based amsterdam netherlands part social enterprise nederland additionally techreturns department genova italy | [
7579
] | Test |
485 | 3 | Deepin:deepin deepin stylized deepin formerly known linux deepin hiweed linux open source operating system based debian stable branch features dde deepin desktop environment built qt version 15.10 also uses dde-kwin copy kde plasma window manager distribution praised aesthetics various reviews past also criticized using statistical tracking service app store removed since development deepin led china-based wuhan deepin technology co. ltd. generates revenue sale technical support services related distribution ships many open-source proprietary programs google chrome spotify steam also includes software suite applications developed deepin technology well wps office codeweavers crossover deepin comes installer named “ deepin installer ” created deepin technology installer praised swapnil bhartiya writing linux.com simplest installation procedure also quite pleasant writing forbes jason evangelho complained installer requiring user select location world map though concluded saying aside little time zone selection pet peeve installer beautiful brisk intuitive deepin features desktop environment called deepin de dde written qt distribution also maintains window manager dde-kwin desktop environment described single beautiful desktop market jack wallen writing techrepublic besides deepin linux distributions arch linux started include deepin desktop environment package repositories manjaro linux community-supported version comes deepin desktop environment desktop environment also available software repositories fedora 30 deepin comes number applications built via dtk deepin tool kit based c++ qt following list deepin applications created deepin development team release cycle followed various schedules currently aims four releases per year releases delayed work development testing completed distribution begun 2004 hiweed linux 2011 development team behind deepin established company named wuhan deepin technology support commercial development operating system company received business investments year founded wuhan deepin technology joined linux foundation 2015 general reception distribution generally praised aesthetics users reviewers alike linux.com fossbytes techrepublic deepin accused 2018 containing spyware use statistics software within app store company made official statement clarifying would collect private user information according deepin cnzz website similar google analytics collects user-anonymous usage information screen size browser harmless browser user agent information stating cnzz analyzed deepin store used order improve july 20 2018 deepin removed cnzz statistics collection deepin app store website due backlash deepin reputation past relatively high cpu memory demands based mainly gtk html technologies even system idle switching qt-based de performance improved linux.com noted review deepin 15.7 | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
9851,
11388,
2692,
8837,
9353,
9873,
11410,
8857,
10394,... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.