node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
686 | 7 | Babel_(protocol):babel protocol babel routing protocol distance-vector routing protocol internet protocol packet-switched networks designed robust efficient wireless mesh networks wired networks babel based ideas destination-sequenced distance vector routing dsdv ad hoc on-demand distance vector routing aodv cisco enhanced interior gateway routing protocol eigrp uses different techniques loop avoidance babel provisions using multiple dynamically computed metrics default uses hop-count wired networks variant etx wireless links configured take radio diversity account automatically compute link latency include metric babel operates ipv4 ipv6 networks reported robust protocol fast convergence properties october 2015 babel chosen mandatory-to-implement protocol ietf homenet working group albeit experimental basis june 2016 ietf working group created whose main goal produce standard version babel four implementations babel freely available bird reference version support source-specific routing.. extension authentication available reference version merged yet mainline version | [
4611,
2825,
9098,
1814,
3095,
152,
8862,
2206,
2085,
3751,
3752,
7983,
823,
11579,
9279,
10433,
5959,
5322,
11086,
10451,
9048,
5978,
3036,
5469,
5470,
5472
] | None |
687 | 4 | Advanced_Intrusion_Detection_Environment:advanced intrusion detection environment advanced intrusion detection environment aide initially developed free replacement tripwire licensed terms gnu general public license gpl primary developers named rami lehti pablo virolainen associated tampere university technology along richard van den berg independent dutch security consultant project used many unix-like systems inexpensive baseline control rootkit detection system aide takes snapshot state system register hashes modification times data regarding files defined administrator snapshot used build database saved may stored external device safekeeping administrator wants run integrity test administrator places previously built database accessible place commands aide compare database real status system change happened computer snapshot creation test aide detect report administrator alternatively aide configured run schedule report changes daily using scheduling technologies cron default behavior debian aide package mainly useful security purposes given malicious change could happened inside system would reported aide | [
6372,
7983,
8399,
5397,
5245,
3353,
2045,
9791
] | None |
688 | 4 | Barnaby_Jack:barnaby jack barnaby michael douglas jack 22 november 1977 – 25 july 2013 new zealand hacker programmer computer security expert known presentation black hat computer security conference 2010 exploited two atms made dispense fake paper currency stage among notable works exploitation various medical devices including pacemakers insulin pumps jack renowned among industry experts influence medical financial security fields 2012 testimony led united states food drug administration change regulations regarding wireless medical devices time death jack director embedded device security ioactive black hat conference 2010 jack gave presentation jackpotting causing automated teller machines dispense cash without withdrawing bank account using bank card scenario first described fiction 1995 cyberpunk movie hackers jack gave demonstrations different kinds attacks involving physical access machines completely automated remote attacks cases malware injected operating system machines causing dispense currency fraudulently attacker command physical attack automated teller machine atm demonstrated jack attacker takes advantage physical access target machine uses flash drive loaded malware gain unauthorised access machines allowing control currency dispensing mechanism remote attack malware installed onto target system via exploited vulnerabilities remote management system notably use default passwords remote management tcp ports attacker executes malware causing target atm dispense currency mcafee focus 11 conference october 2011 las vegas working mcafee security jack first demonstrated wireless hacking insulin pumps one worn diabetic friend another model bench set demonstration interfacing pumps high-gain antenna obtained complete control pumps without prior knowledge serial numbers able cause demonstration pump repeatedly deliver maximum dose 25 units entire reservoir 300 units depleted amounting many times lethal dose delivered typical patient rsa security conference san francisco february 2012 using transparent mannequin demonstrated could wirelessly hack insulin pump distance 90 metres using high-gain antenna 2012 jack demonstrated ability assassinate victim hacking pacemaker scenario first explored fiction tv series homeland blog post broken hearts jack wrote hack even easier portrayed tv ridiculous n't need serial number jack demonstrated delivering deadly electric shock live 2012 breakpoint security conference melbourne game watch dogs similar hack shown black hat aiden pearce killing one main antagonists jack died week give presentation hacking heart implants black hat 2013 conference scheduled held las vegas june 2013 interview vice jack outlined presentation barnaby jack director embedded device security computer security firm ioactive developed software allowed remotely send electric shock anyone wearing pacemaker within 50-foot radius also came system scans insulin pumps communicate wirelessly within 300 feet allows hack without needing know identification numbers sets dish less insulin necessary sending patients hypoglycemic shock quickly excessive insulin dispensed ketoacidosis enough insulin dispensed period time.in presentation jack set outline vulnerabilities various medical devices well give safe demonstrations attacks certainly potential health risk jack found dead san francisco apartment 25 july 2013 girlfriend according coroner report jack died overdose heroin cocaine benadryl xanax 35 years old time death due attend black hat briefings hacking conference las vegas black hat general manager trey ford said everyone would agree life work barnaby jack legendary irreplaceable announced spot would replaced conference barnaby jack jackpotting technique atm multiple atms hacked forced spit amount cash triggered number events described jack 2010 black hat presentation used plot line 20th december 2015 episode series 2 cbs crime drama apart showing hack use explaining works episode also included nods barnaby jack work including naming hacked bank barnaby bank csi spinoff focused team fbi agents ex-blackhat hackers working stop various cyber threats across us | [
161,
2275,
488,
3532,
4212,
7449,
7515,
4956,
2558
] | None |
689 | 2 | AMSDOS:amsdos amsdos disk operating system 8-bit amstrad cpc computer various clones name contraction amstrad disk operating system amsdos first appeared 1984 cpc 464 added 3 inch disk drive cpc 664 cpc 6128 relatively fast efficient time amsdos quicker effective contemporaries amsdos provided built rom either supplied external disk drive machine rom depending model accessible built-in locomotive basic well firmware routines main function map cassette access routines built every cpc model disk drive enabled majority cassette-based programs work disk drive modification amsdos able support two connected disk drives amdos extends amstrad basic addition number external commands identified preceding nowiki /nowiki bar symbol following list external commands supported amsdos disk operating systems amstrad range included cp/m also bundled external disk drive built-in rom depending model ramdos allowed full 800k capacity single-density 3 ½ disks used providing suitable drive connected symbos | [
2179,
5359,
7983,
6675,
2933,
22,
4409
] | Test |
690 | 9 | Mobile_Information_Device_Profile:mobile information device profile mobile information device profile midp specification published use java embedded devices mobile phones pdas midp part java platform micro edition java framework sits top connected limited device configuration cldc set lower level programming interfaces midp developed java community process first midp devices launched april 2001 core application programming interfaces defined underlying connected limited device configuration system contains java me-specific classes used i/o operations contains java me-specific classes used gui lcdui simple screen based approach single displayable always active time application user interface lcdui api provides small set displayables common mobile device user interfaces list alert textbox form canvas displayables device midp implementation control presentation layout displayable canvas low-level graphics surface application full control rendered although normally space reserved system areas like screen title indicators common mobile device uis since midp 2.0 canvas also supports full-screen mode allows use full screen graphics especially useful games lcdui also quite unique approach abstract operations called commands placement commands added displayable completely device implementation toolkit application programmer uses api specified command types indicate usage purpose command application user interface common types back exit item screen idea command abstraction make applications portable across various mobile devices application developers use command types properly indicate purpose operation device implementation places operation common location given type device specific user interface style may e.g specific key like back navigation key back commands button screen acronym lcdui actually in-house joke within jcp expert group though undefined midp specifications denotes limited capability device user interface joke no-one else really knew stood later book programming wireless devices java 2 platform micro edition gave definition common pseudo-definitions appeared liquid crystal display user interface would reflect fact mobile phones normally use lcds however api specifically tailored particular display technology also said lcd ui stands lowest common denominator due fact specific ui simplest possible design provides form persistent storage java database mobile device contains base classes java applications allows applications notified changes state following java specification requests selection optional jsrs added top midp implementation add extra functionalities optional jsrs guarantee midp handset implement apis wireless messaging api optional sending sms mms messages personal information management api optional access device address book to-do list calendar file connection optional package fcop one two optional packages defined jsr 75 java community process fileconnection api specified jsr 75 gives access local file systems devices like pda order overcome security issues midlet needs include requested file permission jad file midlet-permission property several different ways create midp applications code written plain text editor one use advanced ide netbeans intellij bundled java plugin eclipse plugins eclipseme user interface graphically laying forms create well providing many advanced features available simple text editor limitations may avoided using vendor-specific api midp 2.0 obviously reduces portability application midp developed java community process midp succeeded meep java 8 | [
2208,
4960,
6338,
4324,
10053,
3561,
3626,
10410,
5677,
7246,
9101,
8882,
9011,
5143,
3416,
5659,
6748,
1533
] | Validation |
691 | 4 | Institute_of_Information_Security_Professionals:institute information security professionals institute information security professionals iisp independent non-profit body governed members principal objective advancing professionalism information security practitioners thereby professionalism industry whole primary aim institute provide universally accepted focal point information security profession institute information security professionals membership representing 8,000 individuals globally throughout industry academia government iisp offices evesham worcestershire southwark london institute hqs based evesham close cyber-hubs cheltenham malvern institute run members elected board directors dr alastair macwillson chairman one main activities act accreditation authority industry part government investment cyber security iisp consortium including crest rhul appointed ncsc provide certification uk government information assurance ia professionals consortium awarded licence issue cesg certified professional ccp mark based skills framework part certification scheme driven ncsc ia arm gchq full membership institute information security professional standard endorses knowledge experience professionalism individual field award membership levels competency-based sets apart purely knowledge-based qualifications awarded professionals demonstrate breadth depth knowledge substantial practical experience iisp number regional branches developed members based london united kingdom institute established 2006 information security professionals 2007 institute developed iisp skills framework framework describes range competencies expected information security information assurance professionals effective performance roles developed collaboration private public sector organisations academics security leaders 2012 part government investment cyber security iisp consortium appointed ncsc formally cesg provide certification uk government information assurance ia professionals iisp defined set information security skills skill levels skill definitions supplemented ncsc enable certification bodies make formal assessments others make informal assessments ia skill levels | [
5423,
4595,
6648,
2202,
5373
] | Test |
692 | 9 | Tcl:tcl tcl pronounced tickle tee cee ell high-level general-purpose interpreted dynamic programming language designed goal simple powerful tcl casts everything mold command even programming constructs like variable assignment procedure definition tcl supports multiple programming paradigms including object-oriented imperative functional programming procedural styles commonly used embedded c applications rapid prototyping scripted applications guis testing tcl interpreters available many operating systems allowing tcl code run wide variety systems tcl compact language used embedded systems platforms full form several small-footprint versions popular combination tcl tk extension referred tcl/tk enables building graphical user interface gui natively tcl tcl/tk included standard python installation form tkinter tcl programming language created spring 1988 john ousterhout working university california berkeley originally born frustration according author programmers devising languages intended embedded applications tcl gained acceptance ousterhout awarded acm software system award 1997 tcl/tk name originally comes tool command language conventionally spelled tcl rather tcl tcl conferences workshops held united states europe tcl features include safe-tcl subset tcl restricted features tcl scripts harm hosting machine application file system access limited arbitrary system commands prevented execution uses dual interpreter model untrusted interpreter running code untrusted script designed nathaniel borenstein marshall rose include active messages e-mail safe-tcl included e-mail application/safe-tcl multipart/enabled-mail supported functionality safe-tcl since incorporated part standard tcl/tk releases syntax semantics tcl covered twelve rules known dodekalogue tcl script consists series command invocations command invocation list words separated whitespace terminated newline semicolon first word name command may built language found available library defined script subsequent words serve arguments command following example uses puts command display string text host console sends string hello world standard output device along appended newline character variables results commands substituted strings example uses set expr commands store result calculation variable note tcl use codice_3 assignment operator uses puts short put string print result together explanatory text codice_4 character introduces comment comments appear anywhere interpreter expecting command name seen examples one basic construct language command quoting mechanisms substitution rules determine arguments command processed one special substitution occurs parsing commands arguments final character line i.e. immediately newline backslash backslash-newline combination spaces tabs immediately following newline replaced single space provides line continuation mechanism whereby long lines source code wrapped next line convenience readers continuing normal argument processing word begins double-quote character codice_5 extends next double-quote character word thus contain whitespace semicolons without characters interpreted special meaning i.e. treated normal text characters word begins opening curly-brace character codice_6 extends next closing curly-brace character codice_7 inside curly braces forms substitution suppressed except previously mentioned backslash-newline elimination words enclosed either construct known bare words bare double-quoted words three types substitution may occur substitution proceeds left-to-right single scan word substituted text scanned possible substitutions however number substitutions appear single word tcl 8.5 onwards word may prefixed codice_12 causes word split apart constituent sub-words purposes building command invocation similar codice_13 sequence lisp quasiquote feature consequence rules result command may used argument command also operator command string concatenation language concatenates directly note unlike unix command shells tcl reparse string unless explicitly directed makes interactive use cumbersome scripted use predictable e.g. presence spaces filenames cause difficulties single equality sign codice_3 serves special role language double equality sign codice_15 test equality used expression contexts codice_16 command first argument codice_17 commands part standard library special place library replaced desired majority tcl commands especially standard library variadic codice_18 constructor scripted command procedures allows one define default values unspecified arguments catch-all argument allow code process arbitrary numbers arguments tcl statically typed variable may contain integers floats strings lists command names dictionaries value values reinterpreted subject syntactic constraints types demand however values immutable operations appear change actually return new value instead important commands refer program execution data operations usual execution control commands looping commands additionally controlled following commands codice_1 allows command script executed scope current innermost scope stack command script may call procedures use uplevel command net effect transforming call stack call tree originally implemented permit tcl procedures reimplement built-in commands like still ability manipulate local variables example following tcl script reimplementation command omitting exception handling codice_2 arranges one local variables current procedure refer variables enclosing procedure call global variables upvar command simplifies implementation call-by-name procedure calling also makes easier build new control constructs tcl procedures decr command works like built-in codice_54 command except subtracts value variable instead adding tcl 8.6 added built-in dynamic object system tcloo 2012 includes features tcl object oriented oo syntax 2012 various extension packages emerged enable object-oriented programming widespread existing tcl source code popular extensions include tcloo added build strong object oriented system also enable extension packages build object oriented abstractions using foundation release tcloo incr tcl updated use tcloo foundation tcl web server pure-tcl implementation http protocol server runs script top vanilla tcl interpreter apache rivet open source programming system apache http server allows developers use tcl scripting language creating dynamic web applications rivet similar php asp jsp rivet primarily developed damon courtney david welton massimo manghi harald oehlmann karl lehenbauer rivet use thousands publicly available tcl packages offer countless features database interaction oracle postgresql mysql sqlite etc interfaces popular applications gd graphics library tcl interfaces natively c language originally written framework providing syntactic front-end commands written c commands language including things might otherwise keywords codice_17 codice_25 implemented way command implementation function passed array values describe already substituted arguments command free interpret values sees fit digital logic simulators often include tcl scripting interface simulating verilog vhdl systemverilog hardware languages tools exist e.g swig ffidl automatically generate necessary code connect arbitrary c functions tcl runtime critcl reverse allowing embedding arbitrary c code inside tcl script compiling runtime dll tcl language always allowed extension packages provide additional functionality gui terminal-based application automation database access commonly used extensions include | [
5634,
515,
11269,
2576,
6160,
1556,
8221,
9245,
546,
8739,
2603,
5677,
50,
9780,
1591,
9783,
1594,
6718,
10304,
8771,
10819,
8262,
1101,
9808,
595,
84,
8275,
3159,
7256,
7769,
10841,
10851,
102,
9320,
7274,
3183,
5743,
8303,
8304,
9330,
... | Test |
693 | 1 | Svensk_mediedatabas:svensk mediedatabas svensk mediedatabas swedish media database search engine audiovisual works national library sweden database contains data tv radio video movies shown cinemas gramophone records cds cassette tapes video games multimedia smdb contains swedish broadcasts publications since 1979 also older works almost complete list swedish gramophone records starting end 19th century smdb also contains information special collections older advertisement films video recordings swedish theatres database contains information nearly eight million hours audiovisual content database contains information following starting 1979 | [
2901
] | Test |
694 | 3 | Palm_Vx:palm vx palm vx personal digital assistant made palm computing division 3com benefited sleek design low weight predecessor palm v increasing available storage 8 mb 114 grams one lightest models ever offered palm retail price launch us 399 soon release vx palm computing spun form palm inc.. result later-production palm vx units first palm devices longer carry 3com branding vx based palm v design primary difference two vx 8 megabytes ram compared v 2 megabytes one last palm models include memory slot also one first feature interaction email avantgo online programs vx powered motorola dragonball ez processor operating 20 mhz originally equipped palm os 3.3 later models came palm os 3.5 upgrade palm os 4.1 formerly offered sale palm website longer available device built rechargeable battery replaceable unless unit disassembled button top screen permitted access contrast menu also includes illumination feature causes screen backlit green glow however default backlight behaviour inverted text glowed background remained dark unfortunate side effect making backlit pictures appear negative images made display hard read ambient lighting level backlight screen crisp clear bright sunlight total darkness august 1 2000 palm announced release claudia schiffer edition palm vx palm vx cse featured blue brushed-metal finish instead usual silver color came pre-loaded healthetec diet exercise weight management software package abroad travel organization program device sold exclusively supermodel website retailed us 399 palm also released limited edition colored versions palm vx without special branding special edition offered gold millennium blue also palm cresenda edition blue faceplate reflecting corporate color cresenda wireless | [
2308,
10500,
6790,
3606,
8982,
6178,
5164,
7983,
9013,
5318,
11337,
9037,
2258,
1621,
4832,
4449,
2285,
1776,
2420,
8952,
9598
] | Validation |
695 | 3 | Laplace_no_Ma:laplace video game mixture role-playing video game survival horror genres set vicinity boston massachusetts town called newcam modeled fictional city arkham created h. p. lovecraft horror part game lies exploration fictional weathertop mansion whose owner dabbled black magic game crpg features include character classes—dilettante medium detective scientist journalist—and player leave mansion walk around town go shops buy items needed defeat monsters complete game release famicom tsūshin scored super famicom version game 26 40 | [
9006
] | Test |
696 | 1 | Astrodatabank:astrodatabank astrodatabank wiki website containing collection astrological data freely accessible database features birth details associated birth charts public figures mundane events collection started astrologer lois rodden 1979 astrodatabank currently owned maintained swiss company astrodienst published english 1979 lois rodden started publishing birth data book profiles women eventually led onto formation astrodatabank mark mcdonough developed astrodatabank database work using astrology birth data collected lois rodden 40 years research six months lois rodden died lois named pat taglilatelo successor data collection another lifelong collector edwin charles steinbrecher integrated database next two years july 2005 mcdonough gave richard smoot ownership company astrodatabank later bought swiss company astrodienst ag alois treindl 2008 converted wiki project made freely accessible astrodatabank wiki released 12 march 2009 72,271 pages english names astrodatabank astro-databank astrodatabank adb refer one project astrodatabank contents data wiki recommended purpose research related astrological studies project referred national council geocosmic research astrological research recommended astrological association great britain large collection verified astrological charts useful resource scientific research researchers imported astrodatabank birth chart data statistical package social sciences spss analysis claim astrodatabank sets standards rigorous astrological methodology meet social scientific research design standards astrodatabank used astrological predictions astrologers database served important source information related notable people research studies using astrodatabank replicate original results successful test conducted students statistics class lake forest college attempted information provided astrodatabank used work related history reference work contents astrodatabank details time event person related biography entry used also studying relation charts events public lives astrodatabank variety astrological data collections data includes birth details celebrities public figures royal births time dates significant events also included editors astrological data collectors contribute astrodatabank entries entries first reviewed main editor reliability notability publication astrodatabank birth entries ranked according lois rodden rating system requires full citation source notes detail reference origin datum collected entries updated reflect recent accurate information originally highest rating accuracy suggestion marion march aa category included distinguish data based personal memory supported birth certificate least reliable rating dd refers called dirty data third rate source datum speculative contradictory dubious dd rating apply entry multiple claims different birth data equally reliable sources research article cognitive simulation astrodatabank records using artificial intelligence system – aidos published technology simulation described important results discussed data astrodatabank used statistical studies astrology studying patterns account human behavior astrodatabank data referenced authors writers source information data magazines published books astrodatabank uses wiki software mediawiki self-created extensions provide astrological charts global rank astrodatabank august 2016 increase positive 6523 | [
5450,
735
] | None |
697 | 2 | X00:x00 x00 popular dos-based fossil driver commonly used mid-1980s late 1990s even still used today fossil drivers mainly used run bbs software ms-dos x00 also run windows even linux dosemu environments allow fossil-aware ms-dos based applications function x00 developed raymond l. gwinn 1989 1993 final release version version 1.50 later beta version 1.53 added support baud rates 38400 x00 free non-commercial usage x00 included many enhancements ftc fossil revision 5 specifications later used fossil drivers adf netfoss gwinn moved develop replacement serial port driver os/2 called sio sio contained virtualized fossil vx00 could loaded applications needed fossil support | [
9166,
2789,
6797,
823
] | Test |
698 | 3 | Processor_array:processor array processor array like storage array contains manages processing elements instead storage elements processor array following characteristics | [
7151,
4423
] | Test |
699 | 2 | PokerTH:pokerth pokerth open-source texas hold 'em simulator runs windows mac os x linux android pokerth written c++ using qt framework allows ten human players computer-controlled players filling enough humans players also play pokerth users online game ample settings players configure customize play pokerth project started 2006 felix hammer florian thauer version 0.1 released public allowed play flop well river version 0.2 released 4 october year followed 0.3 16 october version 0.2 game could play complete round version 0.4 released 4 april 2007 included completely new interface options dialog reprogrammed opponents june 2007 version 0.5 added network online play well sound effects internationalization started version 0.5 20 languages version 0.6 released 13 december 2007 prominent change addition dedicated game server online play well ipv6 support version 0.7 released 3 may 2009 adding support ten players new skinnable interface version 0.8 released 9 september 2010 adding option play online ranking games 2011 pokerth relicensed gplv2 agpl version 0.9 released january 4 2012 year development busy beta phase version introduces one frequently requested feature possibility rejoin internet games disconnection e.g trouble player internet connection players worry drop rank anymore furthermore around 15 new features lot bugfixes version 0.9.5 pokerth includes preliminary support android devices version 1.0 online log file analysis tool added sound support higher screen resolutions android devices support windows 8 desktop mode license change openssl exception windows 8 support gcrypt currently crashes windows 8 server re-factored using google protocol buffers basically enables use html5 clients latest stable version 1.1.2 released 1 september 2017 pokerth selected april 2013 hotpick linux format pokerth became quite popular freeware game downloaded alone sourceforge.net 2007 may 2017 2.8 million times article contains material translated german wikipedia article specifically version | [
7983,
6797,
5470,
823
] | Train |
700 | 2 | Superuser:superuser computing superuser special user account used system administration depending operating system os actual name account might root administrator admin supervisor cases actual name account determining factor unix-like systems example user user identifier uid zero superuser regardless name account systems implement role based security model user role superuser synonyms carry actions superuser account principle least privilege recommends users applications run ordinary account perform work superuser account capable making unrestricted potentially adverse system-wide changes unix-like computer oses linux root conventional name user rights permissions files programs modes single- multi-user alternative names include baron beos avatar unix variants bsd often provides toor root written backward account addition root account regardless name superuser always user id 0 root user many things ordinary user changing ownership files binding network ports numbered 1024 name root may originated root user account permission modify root directory unix system directory originally considered root home directory unix filesystem hierarchy standard recommends root home /root first process bootstrapped unix-like system usually called init runs root privileges spawns processes directly indirectly inherit parents privileges process running root allowed change user id another user done way back sometimes called dropping root privileges often done security measure limit damage possible contamination process another case login programs ask users credentials case successful authentication allow run programs privileges accounts often recommended no-one use root normal user account since simple typographical errors entering commands cause major damage system instead normal user account used either su substitute user sudo substitute user command used su approach requires user know root password sudo method requires user set power run root within /etc/sudoers file typically indirectly made member wheel adm admin sudo group number reasons sudo approach generally preferred – example leaves audit trail used command administrative operations performed oses macos linux distributions notably ubuntu automatically give initial user created ability run root via sudo – configure ask password administrative actions cases actual root account disabled default ca n't directly used mobile platform-oriented oss apple ios android superuser access inaccessible design generally security system exploited order obtain systems plan 9 superuser windows nt later systems derived windows 2000 windows xp windows server 2003 windows vista/7/8/10 must least one administrator account windows xp earlier one able elevate privileges superuser windows vista/7/8/10 via user account control windows xp earlier systems built-in administrator account remains hidden user administrator-equivalent account exists built-in administrator account created blank password poses security risks local users would able access computer via built-in administrator account password left blank account disabled default windows vista later systems due introduction user account control uac remote users unable access built-in administrator account windows administrator account exact analogue unix root account – administrator built-in administrator account user administrator account level privileges default user account created windows systems administrator account unlike macos linux windows vista/7/8/10 administrator accounts administrator accounts windows systems without uac insulate system pitfalls full root access one pitfalls includes decreased resilience malware infections avoid maintain optimal system security pre-uac windows systems recommended simply authenticate necessary standard user account either via password set built-in administrator account another administrator account windows vista/7/8/10 administrator accounts prompt appear authenticate running process elevated privileges usually user credentials required authenticate uac prompt administrator accounts authenticating uac prompt requires entering username password administrator standard user accounts windows xp earlier systems administrator accounts authentication required run process elevated privileges poses another security risk led development uac users set process run elevated privileges standard accounts setting process run administrator using runas command authenticating prompt credentials username password administrator account much benefit authenticating standard account negated administrator account credentials used blank password built-in administrator account windows xp earlier systems hence recommended set password built-in administrator account windows nt 2000 higher root user administrator account novell netware superuser called supervisor later admin openvms system superuser account os many older oses computers intended personal home use anyone using system full privileges many systems dos concept multiple accounts although others windows 95 allow multiple accounts could preferences profile – users still full administrative control machine | [
5637,
4616,
13,
3602,
537,
10788,
5158,
8742,
5179,
7739,
9791,
10318,
10835,
1632,
107,
2164,
7804,
5251,
6797,
11413,
10392,
7325,
161,
3750,
8877,
10933,
4801,
4298,
1741,
9424,
3283,
9939,
2292,
9972,
8954,
7947,
8976,
8978,
5397,
387... | None |
701 | 6 | /dev/zero:/dev/zero read operations return many null characters 0x00 requested read operation unlike may used source sink data write operations succeed effects however commonly used purpose memory-mapped e.g. mmap virtual address space equivalent using anonymous memory i.e memory connected file /dev/zero introduced 1988 sunos-4.0 order allow mappable bss segment shared libraries using anonymous memory mid 1990s hp-ux introduced mmap flag map_anonymous maps anonymous memory directly without need open /dev/zero since late 1990s map_anonymous supported unix versions removing original purpose /dev/zero dd unix utility program reads octet streams source destination possibly performing data conversions process destroying existing data file system partition low-level formatting creating 1 mib file called foobar filled null characters note block size value given si decimal values e.g gb mb etc create 1 gb file one would simply type note instead creating real file zero bytes many file systems also support creation sparse files returns zeros upon reading use less actual space | [
3841,
8065,
9507,
7983,
5397,
3708,
4925,
8414
] | Test |
702 | 5 | Unidirectional_Lightweight_Encapsulation:unidirectional lightweight encapsulation unidirectional lightweight encapsulation ule data link layer protocol transportation network layer packets mpeg transport streams low protocol overhead especially suited ip satellite services every bit counts system example dvb-s however ule also used context dvb-c dvb-t theoretically every system based mpeg transport streams e.g. atsc ule engineered ip dvb ipdvb working group internet engineering task force ietf standardized rfc 4326 another encapsulation method multiprotocol encapsulation mpe developed standardized dvb project software linux kernel ulenet windows xp ipdvb working group maintains list ule implementations | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
7865,
10171,
4797,
5181,
3133,
3006,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
5471,
5472,
... | Test |
703 | 3 | A_View_to_a_Kill_(video_game):view kill video game view kill name two separate computer games released 1985 based james bond film view kill first action game titled view kill computer game developed published domark available zx spectrum amstrad cpc commodore 64 oric 1 oric atmos msx second game titled james bond 007 view kill text-based adventure video game ms-dos macintosh apple ii computers developed angelsoft inc. published mindscape domark created action game split three separate sections inspired scenes film game starts famous movie intro sequence moving gunsight bond shooting towards camera first section set paris james bond commandeers taxi follow may day parachuted eiffel tower roadblocks police cars stop bond shoot pistol get way display three sections overhead map paris small 3d view car point view scanner showing may day height james must arrive right location catch lands second section james must help stacey sutton escape san francisco city hall fire room displayed side-on perspective james must collect useful objects get floors building keys open doors buckets water stop progress fire third final section james must collect code numbers stop detonation zorin bomb bond runs around mine avoiding rockfalls long drops among objects pick grapnel gun fire ropes upward climb safety plank wood bridge gaps may day also somewhere mine password system lets user play second third levels without completing first music commodore 64 version written antony tony crowther consists two covers one famous james bond theme monty norman second duran duran theme film mindscape published text adventure game angelsoft inc dos macintosh apple ii computers full title james bond 007 view kill future bond novelist raymond benson worked development game spawned follow-up game sinclair user gave zx spectrum version four stars five commodore user called commodore 64 version certainly one better 'game film implementations around commodore gave commodore 64 version two stars five criticized gameplay concepts writing sometimes programmers go overboard special effects expense could otherwise superb game view kill one example zzap 64 gave commodore 64 version 36 percent rating criticized game graphics music three separate gameplay modes writing focusing single gameplay style might better zzap 64 overall conclusion game powerful idea seems missed point zzap 64 reviewed commodore 64 version 1992 giving 19 percent rating writing problem licence potential turned diabolical arcade adventure questbusters wrote positive review praised game well-written text well-paced story criticized first level skullsmasher near impossible without information obtained film ... maybe designers figured people would n't play game unless 'd seen movie questbusters criticized game slow loading times response times major drawback ultimately concluded bond fans disappointed | [
10931,
9166,
9006
] | Test |
704 | 4 | McAfee:mcafee mcafee llc formerly known mcafee associates inc. 1987–2014 intel security group 2014–2017 american global computer security software company headquartered santa clara california claims world largest dedicated security technology company company purchased intel february 2011 became part intel security division september 7 2016 intel announced strategic deal tpg capital convert intel security joint venture companies called mcafee deal closed april 3 2017 thoma bravo took minority stake new company intel maintains 49 stake company founded 1987 mcafee associates named founder john mcafee resigned company 1994 mcafee incorporated state delaware 1992 network associates formed 1997 merger mcafee associates network general pgp corporation helix software company restructured 2004 beginning sale magic solutions business remedy subsidiary bmc software early year mid-2004 company sold sniffer technologies business venture capital backed firm named network general name original owner sniffer technologies changed name back mcafee reflect focus security-related technologies among companies bought sold mcafee trusted information systems developed firewall toolkit free software foundation commercial gauntlet firewall later sold secure computing corporation mcafee result brief ownership tis labs/nai labs/network associates laboratories/mcafee research highly influential world open-source software organization produced portions linux freebsd darwin operating systems developed portions bind name server software snmp version 3 mcafee acquired calgary alberta canada-based fsa corporation helped company diversify security offerings away client-based antivirus software bringing board network desktop encryption technologies fsa team also oversaw creation number technologies leading edge time including firewall file encryption public key infrastructure product lines product lines individual successes including powerbroker written dean huxley dan freedman sold beyondtrust growth antivirus ware always outpaced growth security product lines fair say mcafee remains best known anti-virus anti-spam products august 19 2010 intel announced would purchase mcafee 48 share deal valued 7.68 billion january 6 2014 intel ceo brian krzanich announced consumer electronics show name change mcafee security intel security company red shield logo would remain firm continuing operate wholly owned intel subsidiary john mcafee longer involvement company expressed pleasure name longer associated software everlastingly grateful intel freeing terrible association worst software planet words words millions irate users however 2016 products still bore mcafee name company spun back intel april 4 2017 mcafee primarily develops digital-security tools personal computers server devices recently mobile devices mcafee brands products sub-products include | [
2049,
10245,
4622,
1052,
550,
2601,
6699,
10283,
9775,
8752,
2611,
11320,
10297,
1085,
3133,
9791,
10308,
6730,
7755,
10831,
9817,
8283,
8795,
94,
2654,
1634,
4722,
119,
10872,
9341,
1662,
127,
7295,
7809,
8320,
131,
7304,
6282,
10385,
57... | Test |
705 | 8 | Visit_filter:visit filter visit filters used web log analysis software include exclude data visit session specifying ranges types data let limit web log data analyzed letting focus relevant activity | [
4640,
6576,
119
] | Test |
706 | 5 | M3UA:m3ua m3ua stands mtp level 3 mtp3 user adaptation layer defined ietf sigtran working group replaces supersedes m3ua enables ss7 protocol user parts e.g isup sccp tup run ip instead telephony equipment like isdn pstn m3ua uses service sctp transmit messages network elements several owns pc uses sgw stp transit pointcode m3ua uses complex state machine manage indicate states running several m3ua messages mandatory make m3ua association peering fully functional asp asp acknowledge asp active asp active acknowledge others recommended notify destination audits daud open implementation m3ua standard found openss7 web site wireshark shipped dissector m3ua sample packets found wireshark wiki page shows isup packet samples including m3ua | [
3168,
706,
7811,
5704,
842,
7120,
10864,
7865,
1437,
3006
] | Train |
707 | 3 | The_Eidolon:eidolon eidolon one two games part lucasfilm games second wave december 1985 koronis rift took advantage fractal technology developed rescue fractalus enhancing eidolon rescue fractal mountains turned upside became inside cave addition common cassette formats atari commodore 64 versions supplied flippy disk one side atari version commodore 64 version atari version required xl/xe 64kb memory player discovers eidolon strange 19th-century vehicle abandoned laboratory player investigates device accidentally transported another dimension trapped vast maze-like cave creatures cave sensing energy emanating eidolon woken long slumber player soon finds chance survival lies mysterious vehicle powerful energy weapon objective eidolon successfully navigate game levels defeating dragon guardian end level player navigates maze collects energy orbs come four different colors red yellow green blue along way various enemies wake attack eidolon attempting absorb energy enemies also fire orbs eidolon red orbs absorbed pressing space bar right time replenish eidolon limited energy green orbs also power transform enemies different kinds enemies blue orbs freeze enemies temporarily giving player momentary advantage fight level contains three diamonds guarded enemy specific color defeating enemies collecting diamonds player proceed dragon guards exit eight levels game game player successfully defeated final dragon runs time zzap 64 gave game gold medal award overall 97 score summary reviews three reviewers lucasfilm original release yet containing outstanding graphics gameplay elements eidolon immaculate sic conception execution missed gregg williams computer gaming world disliked eidolon stated difficult koronis rift save game feature praising graphics sound ardai criticized game lack imagination get transported god-knows-where ... basically shoot everything sight reasonable—let alone responsible—way explore new world charles ardai later described game magazine one worst 1986 game positively reviewed retrospective article retro gamer magazine praised wonderfully atmospheric due technical achievement fractally created environment also considered ambitious original release 3 lucasfilm games used fractal routines overall described fascinating snapshot gaming history showed innovative immersive tense first-person style arcade-adventure could 8-bit platforms | [
7586,
748,
9006
] | None |
708 | 5 | Transmission_(BitTorrent_client):transmission bittorrent client transmission bittorrent client features variety user interfaces top cross-platform back-end transmission free software licensed terms gnu general public license parts mit license transmission allows users quickly download files multiple peers internet upload files adding torrent files via user interface users create queue files downloaded uploaded within file selection menus users customise downloads level individual files transmission also seeds automatically share downloaded content transmission allows assigning priorities torrents files within torrents thus potentially influencing files download first supports magnet uri scheme encrypted connections allows torrent-file creation peer exchange compatible vuze μtorrent includes built-in web server users control transmission remotely via web also supports automatic port-mapping using upnp/nat-pmp peer caching blocklists bad peers bandwidth limits dependent time-of-day globally per-torrent partial support ipv6 allows use multiple trackers simultaneously local peer discovery micro transport protocol µtp udp tracker support directly subscribing rss feeds containing torrent files automatic download third-party add-ons supply functionality macos-specific features include dock growl notifications automatic updates using sparkle universal binary version 2.22 transmission 1.60 later removed support mac os x v10.4 currently transmission 1.54 last version runs mac os x 10.4 although possible compile later versions source either downloading project web site using package manager like fink macports unsupported bugs specific 10.4 fixed starting transmission 2.30 apple mac intel cpu needed powerpc-based systems longer supported natively transmission back-end libtransmission also serves basis transmission daemon daemon supports web front-end called clutch older versions ported form basis update system video game playstation 3 well backend imageshack bittorrent service portable version available portableapps.com transmission set lightweight bittorrent clients gui cli daemon form incarnations feature simple intuitive interface top efficient cross-platform back-end several transmission clients different operating systems including unix-like macos beos/zeta operating system front-end built using native widget toolkits example transmission-gtk uses gtk+ interface transmission-qt qt interface transmission-cli command-line interface transmission-remote-cli ncurses interface transmission-daemon python-transmissionrpc python module implementing json-rpc client protocol transmission unofficial port transmission using command-line interface cli ios accomplished 3 march 2008 november 2010 itransmission another unofficial port released jailbroken iphones sporting gui capable downloading directly device wifi 3g transmission remote released android name transdroid currently support downloading directly devices windows transmission-qt built mingw daemon console tools built cygwin also two third-party guis transmission-remote-dotnet transmission remote gui well unofficial full builds transmission qt client. also unofficial full build transmission daemon run windows service unofficial full build transmission daemon running windows service used direct streaming downloading file port platforms enhanced streaming downloading file located github also ported maemo os nokia n810 internet tablet n900 smartphone well meego/harmattan os nokia n9 n950 smartphones download torrents device march 2016 palo alto networks reported transmission official website compromised tainted .dmg files uploaded site using apple developer signature bypass os x gatekeeper feature tainted packages installed ransomware application variant linux.encoder.1 recompiled mac known keranger encrypts user files attempts force users pay 1 bitcoin worth roughly us 404 time attack order get decryption pack transmission website advised mac users immediately upgrade new version removes malware-infected file apple revoked developer certificate used sign tainted package added package signature xprotect anti-malware system transmission default bittorrent client many unix linux distributions including joli os solaris ubuntu mandriva mint fedora ref name= distribution/download/bittorrent /ref puppy crunchbang zenwalk gnome flavor opensuse fonera ships routers transmission pre-installed cnet editor paul huges praised transmission simplicity lightweight well feature-packed april 2017 software ranked third p2p downloads mac cnet | [
11394,
4229,
4490,
6413,
6797,
9487,
8848,
9872,
10254,
3859,
1172,
5397,
10646,
11029,
11413,
9625,
7450,
5019,
10522,
1822,
5407,
10270,
6691,
3366,
1960,
5292,
10924,
7983,
1970,
9908,
439,
11577,
3770,
1471,
1728,
3649,
1087,
8640,
9407... | Test |
709 | 3 | International_Symposium_on_Computer_Architecture:international symposium computer architecture international symposium computer architecture isca annual academic conference computer architecture generally viewed top-tier field association computing machinery special interest group computer architecture acm sigarch institute electrical electronics engineers computer society technical sponsors isca participated federated computing research conference 1993 1996 1999 2003 2007 2011 2015 every year conference organized isca influential paper award presented annually isca sigarch tcca award given paper impact field area research development products ideas conference 15 years ago prior recipients include | [
2113,
995,
9283,
8229,
9932,
4144,
4241,
4308,
9851
] | None |
710 | 2 | RDMA_over_Converged_Ethernet:rdma converged ethernet rdma converged ethernet roce network protocol allows remote direct memory access rdma ethernet network two roce versions roce v1 roce v2 roce v1 ethernet link layer protocol hence allows communication two hosts ethernet broadcast domain roce v2 internet layer protocol means roce v2 packets routed although roce protocol benefits characteristics converged ethernet network protocol also used traditional non-converged ethernet network network-intensive applications like networked storage cluster computing need network infrastructure high bandwidth low latency advantages rdma network application programming interfaces berkeley sockets lower latency lower cpu load higher bandwidth roce protocol allows lower latencies predecessor iwarp protocol exist roce hcas host channel adapter latency low 1.3 microseconds lowest known iwarp hca latency 2011 3 microseconds roce v1 protocol ethernet link layer protocol ethertype 0x8915 means frame length limits ethernet protocol apply 1500 bytes regular ethernet frame 9000 bytes jumbo frame roce v1.5 uncommon experimental non-standardized protocol based ip protocol roce v1.5 uses ip protocol field differentiate traffic ip protocols tcp udp value used protocol number unspecified left deployment select roce v2 protocol exists top either udp/ipv4 udp/ipv6 protocol udp destination port number 4791 reserved roce v2 since rocev2 packets routable roce v2 protocol sometimes called routable roce rroce although general delivery order udp packets guaranteed rocev2 specification requires packets udp source port destination address must reordered addition rocev2 defines congestion control mechanism uses ip ecn bits marking cnp frames acknowledgment notification software support roce v2 still emerging mellanox ofed 2.3 later roce v2 support also linux kernel v4.5 roce defines perform rdma ethernet infiniband architecture specification defines perform rdma infiniband network roce expected bring infiniband applications predominantly based clusters onto common ethernet converged fabric others expected infiniband keep offering higher bandwidth lower latency possible ethernet technical differences roce infiniband protocols roce protocols define perform rdma using ethernet udp/ip frames iwarp protocol defines perform rdma connection-oriented transport like transmission control protocol tcp roce v1 limited single ethernet broadcast domain roce v2 iwarp packets routable memory requirements large number connections along tcp flow reliability controls lead scalability performance issues using iwarp large-scale datacenters large-scale applications i.e large-scale enterprises cloud computing web 2.0 applications etc. also multicast defined roce specification current iwarp specification define perform multicast rdma reliability iwarp given protocol tcp reliable rocev2 hand utilizes udp far smaller overhead better performance provide inherent reliability therefore reliability must implemented alongside rocev2 one solution use converged ethernet switches make local area network reliable require converged ethernet support switches local area network prevents rocev2 packets traveling wide area network internet reliable another solution add reliability roce protocol i.e reliable roce adds handshaking roce provide reliability cost performance question protocol better depends vendor intel chelsio recommend exclusively support iwarp mellanox xilinx broadcom recommend exclusively support roce/rocev2 vendors involved network industry provide support protocols marvell microsoft linux kazan cisco supports roce vic rdma protocol protocols standardized iwarp standard rdma tcp defined ietf roce standard rdma ethernet defined ibta aspects could defined roce specification left addition protocol running ip assume underlying network guaranteed ordering assume congestion occur least one vendor offers rdma ethernet solution supports another wire protocol addition roce known use pfc lead network-wide deadlock popular vendors roce enabled equipment include | [
3328,
2723,
3820,
10924,
367,
6993,
7411,
10005,
11413,
10461,
10303,
863
] | Validation |
711 | 4 | Bug_bounty_program:bug bounty program bug bounty program deal offered many websites organizations software developers individuals receive recognition compensation reporting bugs especially pertaining exploits vulnerabilities programs allow developers discover resolve bugs general public aware preventing incidents widespread abuse bug bounty programs implemented large number organizations including mozilla facebook yahoo google reddit square microsoft companies outside technology industry including traditionally conservative organizations like united states department defense started using bug bounty programs pentagon ’ use bug bounty programs part posture shift seen several us government agencies reverse course threatening white hat hackers legal recourse inviting participate part comprehensive vulnerability disclosure framework policy hunter ready initiated first known bug bounty program 1983 versatile real-time executive operating system anyone found reported bug would receive volkswagen beetle a.k.a bug return little decade later 1995 jarrett ridlinghafer technical support engineer netscape communications corporation coined phrase 'bugs bounty netscape encouraged employees push whatever takes get job done ridlinghafer recognized netscape many enthusiasts evangelists products seemed even fanatical particularly mosaic/netscape/mozilla browser started investigate phenomenon detail discovered many netscape enthusiasts actually software engineers fixing product bugs publishing fixes workarounds ridlinghafer thought company leverage resources sat wrote proposal 'netscape bugs bounty program presented manager turn suggested ridlinghafer present next company executive team meeting next executive team meeting attended james barksdale marc andreessen vps every department including product engineering member given copy 'netscape bugs bounty program proposal ridlinghafer invited present idea netscape executive team everyone meeting embraced idea except vp engineering want go forward believing waste time resources however vp engineering overruled ridlinghafer given initial 50k budget run proposal first official 'bugs bounty program launched 1995 program huge success mentioned many books detailing netscape successes august 2013 computer science student named khalil used exploit post letter facebook timeline site founder mark zuckerberg according hacker tried report vulnerability using facebook bug bounty program vague incomplete report response team told vulnerability actually bug facebook started paying researchers find report security bugs issuing custom branded “ white hat ” debit cards reloaded funds time researchers discover new flaws “ researchers find bugs security improvements rare value find ways reward ” ryan mcgeehan former manager facebook ’ security response team told cnet interview “ exclusive black card another way recognize show conference show card say ‘ special work facebook. ’ ” 2014 facebook stopped issuing debit cards researchers 2016 uber experienced security incident individual accessed personal information 57 million uber users worldwide individual supposedly demanded ransom 100,000 order destroy users ’ data congressional testimony uber ciso indicated company verified data destroyed paying 100,000 mr. flynn expressed regret uber disclose incident 2016 part response incident uber worked partner hackerone update bug bounty program policies among things thoroughly explain good faith vulnerability research disclosure india either first second largest number bug hunters world depending report one cites also tops facebook bug bounty program largest number valid bugs “ india came top number valid submissions 2017 united states trinidad tobago second third place respectively ” facebook quoted post yahoo severely criticized sending yahoo t-shirts reward security researchers finding reporting security vulnerabilities yahoo sparking came called t-shirt-gate high-tech bridge geneva switzerland-based security testing company issued press release saying yahoo offered 12.50 credit per vulnerability could used toward yahoo-branded items t-shirts cups pens store ramses martinez director yahoo security team claimed later blog post behind voucher reward program basically paying pocket eventually yahoo launched new bug bounty program october 31 year allows security researchers submit bugs receive rewards 250 15,000 depending severity bug discovered similarly ecava released first known bug bounty program ics 2013 criticized offering store credits instead cash incentivize security researchers ecava explained program intended initially restrictive focused human safety perspective users integraxor scada ics software october 2013 google announced major change vulnerability reward program previously bug bounty program covering many google products shift however program broadened include selection high-risk free software applications libraries primarily designed networking low-level operating system functionality submissions google found adherent guidelines would eligible rewards ranging 500 3133.70 2017 google expanded program cover vulnerabilities found applications developed third parties made available google play store similarly microsoft facebook partnered november 2013 sponsor internet bug bounty program offer rewards reporting hacks exploits broad range internet-related software 2017 github ford foundation sponsored initiative managed volunteers uber microsoft facebook adobe hackerone software covered ibb includes adobe flash python ruby php django ruby rails perl openssl nginx apache http server phabricator addition program offered rewards broader exploits affecting widely used operating systems web browsers well internet whole march 2016 peter cook announced us federal government first bug bounty program hack pentagon program program ran april 18 may 12 1400 people submitted 138 unique valid reports hackerone total us department defense paid 71,200 june secretary defense ash carter met two participants david dworken craig arendt honor participation program open bug bounty crowd security bug bounty program established 2014 allows individuals post website security vulnerabilities hope reward affected website operators | [
5636,
8582,
1547,
10894,
3473,
3092,
4374,
5404,
9245,
8735,
3619,
3237,
7590,
7983,
3380,
5813,
8644,
4813,
11213,
11221,
865,
1764,
10726,
3944,
8554,
2804,
1912
] | Test |
712 | 9 | Applesoft_BASIC:applesoft basic applesoft basic dialect microsoft basic developed marc mcdonald ric weiland supplied apple ii series computers supersedes integer basic basic rom apple ii series computers original apple ii model also referred fp basic floating point apple dos command used invoke instead codice_1 integer basic applesoft basic supplied microsoft name derived names apple microsoft apple employees including randy wigginton adapted microsoft interpreter apple ii added several features first version applesoft released 1977 cassette tape lacked proper support high-resolution graphics applesoft ii made available cassette disk rom apple ii plus subsequent models released 1978 latter version syntax differences support apple ii high-resolution graphics modes usually synonymous term applesoft applesoft compiler tasc applesoft compiler produced microsoft 1981 steve wozniak wrote integer basic apple ii implement support floating point math primarily interested writing games task integers alone sufficient 1976 microsoft developed microsoft basic basic interpreter mos technology 6502 time production computer used upon learning apple 6502 machine microsoft asked company interested licensing basic steve jobs replied apple already one apple ii unveiled public west coast computer faire april 1977 became available sale june one common customer complaints computer basic lack floating-point capability integer basic limited whole numbers −32768 32767 caused problems users attempting write business applications steve wozniak never added floating point capabilities integer basic consider necessary gaming educational software two primary tasks envisioned apple ii wozniak—the person understood integer basic well enough add floating point features—was busy disk ii drive controller apple dos apple turned microsoft making things problematic rival commodore pet personal computer floating point-capable basic interpreter beginning applesoft license also saved microsoft near-bankruptcy licensed basic commodore pet agreement proved unexpectedly costly apple reportedly obtained eight-year license applesoft basic microsoft flat fee 31,000 renewing 1985 arrangement gave microsoft rights source code apple macintosh version basic applesoft designed backwards-compatible integer basic uses core microsoft 6502 basic implementation includes using get command detecting key presses requiring spaces program lines applesoft basic slower integer basic many features older basic lacks conversely applesoft lacks codice_9 remainder operator present integer basic adapting basic apple ii tedious job apple received source listing microsoft 6502 basic proved buggy also required addition integer basic commands since apple 6502 assembler hand development team forced send source code phone lines call computer outfit offered compiler services extremely tedious slow process call computer lost source code due equipment malfunction one programmers cliff huston used imsai 8080 computer cross assemble basic source applesoft similar commodore basic 2.0 aside features inherited integer basic minor differences applesoft lack bitwise operators otherwise basic programs utilize hardware-dependent features run basics pr statement used redirect output expansion card used redirect input expansion card slot number card specified pr within statement computer lock card present slot require reboot pr 0 restore output 40 column screen 0 keyboard pr statement used redirect output printer e.g x slot number containing printer port card send basic program listing printer user would type outputting printer necessary execute pr 0 statement reset output screen pr 6 cause applesoft boot disk drives although disk ii controller slot usually slot 6 pr 3 switch 80 column text mode 80 column card present 80 column cards also add 12 new control codes generated chr function enhanced apple iie iic models mousetext character set include another two control codes enable disable feature commodore basic numeric variables stored 40-bit floating point variable requires five bytes memory programmer may designate variables integer following percent sign case use two bytes limited range -32768 32767 however basic internally converts back floating point percent sign also takes additional byte program code practice feature useful reducing memory usage large array variables rnd function generates pseudorandom fractional number 0 1. returns recently generated random number rnd negative number jump point sequence determined particular negative number used rnd positive value generate new random number sequence dependent actual value given random numbers generated via formula based previously generated value thus truly random locations 4e 4f system cycles values continuously waiting user keystrokes peeked provide truly random values use seed negated rnd like implementations microsoft basic applesoft discards spaces outside strings comments program lines codice_10 adds spaces displaying code sake readability since list code add space every tokenized keyword often produces two spaces row one would suffice readability default prompt codice_11 question mark codice_12 add leading space front numbers coleco claimed adam home computer smartbasic source-code compatible applesoft microsoft licensed basic compatible applesoft vtech laser 128 clone several early models apple ii applesoft basic support use lowercase letters programs except strings thus applesoft display lowercase letters recognize part program hence codice_12 valid command codice_14 codice_15 unrecognizable result syntax error applesoft lacks several commands functions common non-6502 microsoft basic interpreters applesoft like integer basic come built-in commands file disk handling feature save programs load programs cassette tape apple ii disk operating system known simply dos augments language provide abilities unlike integer basic applesoft basic variable names significant two letters made longer first two letters used instance low loss treated variable attempting assign value loss overwrites value assigned low furthermore language used tokenization programmer avoid using consecutive letters also applesoft commands operations one use name score variable interprets boolean operator thus rendering sc e one use background command gr invokes low-resolution graphics mode case creating syntax error sound support option codice_12 ascii bell character sound system alert beep codice_21 command click speaker language fast enough produce baritone buzz repeated clicks programs however store machine-language routine called generate electronic musical tones spanning several octaves applesoft supports apple ii lores graphics display 40 color blocks horizontally 48 blocks vertically displayed 16 colors commands plot individual blocks horizontal vertical lines well hires mode six colors fixed subset lores palette 16 colors displayed resolution 280 horizontally 192 vertically limitations horizontal placement command draw points diagonal lines onscreen beginning apple iie new double-high resolution mode based mode introduced apple iii computer became available machines 128k memory mode essentially duplicates resolution original hires mode including 16 colors lores palette applesoft however provide support mode must rely supplemental machine-language routines order utilize additional new graphics modes apple iigs likewise supported provision exists mixing text graphics except limited hardware split screen apple ii four lines text bottom screen vector-based shape tables used draw objects hires graphics slow comparison routines draw bitmaps directly also support defining horizontal vertical lines diagonals curves supported although shapes drawn rotated various angles lines ostensibly defined horizontal vertical appear diagonal addition shapes drawn scaled larger sizes applesoft basic extended two means ampersand command usr function two features call low-level machine-language routines stored memory useful routines need fast require direct access arbitrary functions data memory usr function takes one numerical argument programmed derive return calculated function value used numerical expression effectively shorthand call address predefined deficiency applesoft error-trapping onerr means system stack would reset error-handling routine invoke resume potentially leading crash error-handling employ resume avoid problem call -3288 equivalent 62248 exiting routine wozniak originally referred integer basic game basic written could implement breakout clone new computer action games written applesoft basic large part use floating-point numbers math operations degrades performance applesoft basic programs stored linked list lines codice_22 codice_23 takes linear time programs subroutines top reduce time calling unlike integer basic applesoft basic convert literal numbers source code internal binary format time source line entered rather string digits stored entered relatively slow conversion happens runtime whenever line executed since variable lookup often faster conversion generally faster store numeric constants used inside loops variables loop entered hello world applesoft basic entered following multiple commands included line code separated colon codice_24 codice_25 used applesoft basic almost versions microsoft basic shortcut print though spelling word acceptable canonical—applesoft converted entered programs token print thus memory actually saved using thus either appears print program listed program appears codice_10 command applesoft ii basic initially released mid-1978 came cassette tape could loaded memory via apple ii machine language monitor enhanced apple ii+ replaced original ii 1979 applesoft included rom automatically started power-up bootable floppy disk present conversely integer basic removed rom turned executable file dos 3.3 disk original applesoft stored ram documented reference manual november 1977 smaller interpreter code later applesoft ii occupying 8½ kb memory instead 10 kb used later applesoft ii consequently lacks number command features developed later mainstream version well several later version would already present apple integer basic addition low-resolution graphics commands different names integer basic/applesoft ii counterparts command names form pltx gr color= plot hlin vlin called pltg pltc pltp plth pltv respectively command returning text mode known text versions simply tex carries proviso last statement program line applesoft basic 1.x closer microsoft original 6502 basic code later applesoft ii retained memory size prompt displayed microsoft copyright notice maintain consistency integer basic ok prompt microsoft code replaced character applesoft 1.x also prompted user upon loading wished disable rem statement let keyword assignment statements exchange lores graphics commands usr function also defined differently serving stand-in absent call command argument passing numerical value machine-language routine instead call-address routine hook pre-define address several examples manual use function access system monitor rom routines short user-routines manipulate rom routines mention made code calculate value returned function function always shown assigned dummy variables without action set value user-code receive meaningless value handed back even accessed rom routines return values examples provide service pdl scrn functions merely values stored user-routines locations separately peeked subsequent statement unlike integer basic applesoft ii boolean operators perform bitwise operations 16-bit integer values given values outside range error results terms plt aforementioned appear list reserved words explained anywhere manual | [
2304,
3718,
7691,
5260,
1805,
9997,
786,
11412,
22,
3736,
3481,
9881,
797,
3233,
11683,
5925,
8101,
4136,
10666,
5677,
8494,
303,
7343,
7983,
4530,
11315,
315,
7355,
7486,
7870,
4160,
8767,
4674,
8774,
10750,
847,
1879,
92,
11229,
2915,
... | None |
713 | 2 | Keychain_(software):keychain software keychain password management system macos developed apple introduced mac os 8.6 included subsequent versions mac os known macos keychain contain various types data passwords websites ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images private keys certificates secure notes macos keychain files stored ~/library/keychains/ subdirectories /library/keychains/ /network/library/keychains/ keychain access gui application located utilities folder applications folder free open source software released terms apsl command line equivalent keychain access /usr/bin/security keychain file stores variety data fields including title url notes password passwords secure notes encrypted triple des default keychain file login keychain typically unlocked login user login password although password keychain instead different user ’ login password adding security expense convenience keychain access application permit setting empty password keychain keychain may set automatically locked computer idle time locked manually keychain access application locked password re-entered next time keychain accessed unlock overwriting file ~/library/keychains/ new one e.g part restore operation also causes keychain lock password required next access login keychain protected login password keychain password changed whenever login password changed within logged session macos shared mac/non-mac network possible login keychain password lose synchronization user login password changed non-mac system also password changed directory service like active directory open directory password changed another admin account e.g using system preferences network administrators react deleting keychain file logout new one created next time user logs means keychain passwords remembered one session next even login password changed happens user restore keychain file ~/library/keychains/ backup lock keychain need unlocked next use keychain access macos application allows user access keychain configure contents including passwords websites web forms ftp servers ssh accounts network shares wireless networks groupware applications encrypted disk images etc unlocks locks displays passwords saved system dynamically linked user login password well managing root certificates keys secure notes graphical user interface displays various keychains usually least two login keychain system keychain also includes keychain first aid utility removed 10.11.2 update repair problems keychains various events cause problems keychains sometimes solution problem delete keychain also deletes passwords stored keychain create new one usually found utilities folder applications macos ancillary application macos subject updates via software update thus moved utilities folder also included command-line tool access keychain called security keychains initially developed apple e-mail system powertalk early 1990s among many features powertalk used plug-ins allowed mail retrieved wide variety mail servers online services keychain concept naturally fell code used powertalk manage user various login credentials various e-mail systems powertalk could connect passwords easily retrievable due encryption yet simplicity interface allowed user select different password every system without fear forgetting single password would open file return time implementations concept available platforms keychain one parts powertalk obviously useful suggested promoted become part basic mac os due internal politics kept inside powertalk system therefore available mac users return steve jobs 1997 keychain concept revived now-discontinued powertalk point time concept longer unusual still rare see keychain system associated particular piece application software typically web browser keychain later made standard part mac os 9 included mac os x first commercial versions keychain distributed ios osx ios version simpler applications run mobile devices typically need basic keychain features example features acls access control lists sharing keychain items different apps present thus ios keychain items accessible app created | [
9732,
1542,
4615,
510,
1549,
3598,
5647,
9744,
1042,
6700,
3629,
4657,
1074,
1592,
9784,
576,
9802,
5713,
3670,
4184,
2141,
4702,
3167,
2149,
3691,
8303,
6771,
2676,
6264,
2686,
7806,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
5784,
4251... | Test |
714 | 8 | Bingbot:bingbot bingbot web-crawling robot type internet bot deployed microsoft october 2010 supply bing collects documents web build searchable index bing search engine performs function google googlebot typical user agent string bingbot nowiki mozilla/5.0 compatible bingbot/2.0 +http //www.bing.com/bingbot.htm /nowiki appears web server logs tell webmaster requesting file webmaster able use included agent identifier bingbot disallow allow access site default access allowed n't want grant access use robots exclusion standard block relying assumed good behaviour bingbot use server specific means relying web server blocking | [
3744,
225,
8769,
3875,
2566,
4473,
2318,
944,
113,
11284,
119,
1240,
1913,
2459
] | Test |
715 | 4 | Controlled_Access_Protection_Profile:controlled access protection profile controlled access protection profile also known capp common criteria security profile specifies set functional assurance requirements information technology products software systems conform capp standards provide access controls capable enforcing access limitations individual users data objects capp-conformant products also provide audit capability records security-relevant events occur within system capp intended protection software systems users assumed non-hostile well-managed requiring protection primarily threats inadvertent casual attempts breach security protections intended applicable circumstances protection required determined attempts hostile well-funded attackers fully address threats posed malicious system development administrative personnel generally higher level access capp derived requirements c2 class u.s. department defense trusted computer system evaluation criteria material upon requirements based | [
8904,
2558
] | Test |
716 | 2 | Dispose_pattern:dispose pattern object-oriented programming dispose pattern design pattern resource management pattern resource held object released calling method – usually called codice_1 codice_2 codice_3 codice_4 similar – releases resources object holding onto many languages offer language constructs avoid call dispose method explicitly common situations dispose pattern primarily used languages whose runtime environment automatic garbage collection see motivation thus may styled manual resource management languages automatic memory management wrapping resources objects object-oriented form encapsulation underlies dispose pattern resources typically represented handles abstract references concretely usually integers used communicate external system provides resource example files provided operating system specifically file system many systems represents files file descriptor integer representing file handles used directly storing value variable passing argument functions use resource however frequently useful abstract handle example different operating systems represent files differently store additional auxiliary data handle handles stored field record along data opaque data type provides information hiding user abstracted actual representation example c file input/output files represented objects codice_5 type confusingly called file handles language-level abstraction stores operating system handle file file descriptor together auxiliary information like i/o mode reading writing position stream objects created calling codice_6 object-oriented terms factory acquires resource returns pointer resource released calling codice_7 pointer codice_5 object code note codice_7 function codice_10 parameter object-oriented programming instead instance method file object python precisely dispose pattern differs syntax code structure traditional file opening closing resources managed exactly way acquired constructor factory released explicit codice_1 codice_2 method fundamental problem dispose pattern aims solve resources expensive example may limit number open files thus released promptly finalization work often needed particularly i/o flushing buffers ensure data actually written resource unlimited effectively unlimited explicit finalization necessary important release fact short-lived programs often explicitly release resources due short run time unlikely exhaust resources rely runtime system operating system finalization however general resources must managed particularly long-lived programs programs use many resources safety ensure data written explicit disposal means resource finalization release deterministic prompt codice_2 method complete done alternative requiring explicit disposal tie resource management object lifetime resources acquired object creation released object destruction approach known resource acquisition initialization raii idiom used languages deterministic memory management e.g c++ case example resource acquired file object created scope variable codice_14 exited file object codice_14 refers destroyed part resource released raii relies object lifetime deterministic however automatic memory management object lifetime concern programmer objects destroyed point longer used abstracted indeed lifetime often deterministic though may notably reference counting used indeed cases guarantee objects ever finalized program terminates may finalize objects instead let operating system reclaim memory finalization required e.g. flush buffers data loss occur thus coupling resource management object lifetime dispose pattern allows resources released promptly giving implementation flexibility memory management cost resources must managed manually tedious error-prone key problem dispose pattern codice_2 method called resource leaked common cause early exit function due early return exception example function returns first return file never closed resource leaked intervening code raises exception function exits early file never closed resource leaked handled codice_17 construct ensures finally clause always executed exit generically codice_17 construct necessary proper exception safety since codice_19 block enables execution cleanup logic regardless exception thrown codice_20 block one disadvantage approach requires programmer explicitly add cleanup code codice_19 block leads code size bloat failure lead resource leakage program make safe use dispose pattern less verbose several languages kind built-in support resources held released block code c language features codice_22 statement automatically calls codice_23 method object implements codice_24 interface equal similarly python language codice_25 statement used similar effect context manager object context manager protocol requires implementing codice_26 codice_27 methods get automatically called codice_25 statement construct prevent duplication code would otherwise occur codice_20/codice_19 pattern java language introduced new syntax called codice_20-with-resources java version 7 used objects implement autocloseable interface defines method close beyond key problem correct resource management presence returns exceptions heap-based resource management disposing objects different scope created many complexities associated dispose pattern problems largely avoided raii however common simple use complexities arise acquire single resource something automatically release fundamental problem resource longer class invariant resource held object creation disposed object still live point resource may available object tries use example trying read closed file means methods object use resource potentially fail concretely usually returning error raising exception practice minor use resources usually fail reasons well example trying read past end file methods already might fail resource adds another possible failure standard way implement add boolean field object called codice_32 set true codice_2 checked guard clause methods use resource raising exception codice_34 .net object disposed possible call codice_2 object may indicate programming error object holding resource must disposed exactly simpler robust thus usually preferable codice_2 idempotent meaning calling multiple times calling easily implemented using boolean codice_32 field checking guard clause start codice_2 case returning immediately rather raising exception java distinguishes disposable types implement autocloseable disposable types dispose idempotent subtype closeable disposal presence inheritance composition objects hold resources analogous problems destruction/finalization via destructors finalizers since dispose pattern usually language support boilerplate code necessary firstly derived class overrides codice_2 method base class overriding method derived class generally needs call codice_2 method base class order properly release resources held base secondly object relationship another object holds resource i.e. object indirectly uses resource another object directly uses resource indirectly using object disposable corresponds whether relationship owning object composition viewing object aggregation even communicating association conventions found indirect user responsible resource responsible indirect use responsible resource must disposable dispose owned objects disposed analogous destroying finalizing owned objects composition owning provides encapsulation object used needs tracked cost considerable complexity relationships objects aggregation viewing considerably simpler cost lacking encapsulation .net convention direct user resources responsible implement idisposable type uses unmanaged resources directly see resource management details examples | [
9762,
8554,
4747,
5677,
10670,
7983,
8975,
9490,
3871,
3413,
10684,
6813,
6527
] | Test |
717 | 0 | ISO_12620:iso 12620 iso 12620 standard iso/tc 37 defines data category registry registry registering linguistic terms used various fields translation computational linguistics natural language processing defining mappings different terms terms used different systems goal registry new systems reuse existing terminology least easily mapped existing terminology aid interoperability end number terminologies added registry including ones based general ontology linguistic description national corpus polish termbase exchange localization industry standards association standard first released iso 12620:1999 rendered obsolete iso 12620:2009 first edition english-only second bilingual english-french standard relatively low-level used standards lexical markup framework iso 24613:2008 | [
1890,
2948,
7780,
11056,
2100,
7164,
6655
] | Validation |
718 | 5 | TCP_Westwood_plus:tcp westwood plus tcp westwood+ sender-side modification tcp reno protocol stack optimizes performance tcp congestion control wireline wireless networks tcp westwood+ based end-to-end bandwidth estimation set congestion window slow start threshold congestion episode three duplicate acknowledgments timeout bandwidth estimated properly low-pass filtering rate returning acknowledgment packets rationale strategy simple contrast tcp reno blindly halves congestion window three duplicate acks tcp westwood+ adaptively sets slow start threshold congestion window takes account bandwidth used time congestion experienced tcp westwood+ significantly increases throughput wireless links fairness compared tcp reno/new reno wired networks tcp westwood+ evolution tcp westwood main idea westwood tcp end-to-end bandwidth estimation setting control windows congestion proposed saverio mascolo came idea reading chapter tcp congestion control book data networks larry peterson first implementation tcp westwood ns2 done university california los angeles ucla 1999 name westwood chosen s. mascolo due homage home ucla visiting researcher time main collaborators prof. mario gerla dr. claudio casetti dr. medy senadidi saverio mascolo went back italy evolution westwood tcp named westwood+ main novelty westwood+ algorithm used estimate available bandwidth end-to-end fact soon discovered westwood bandwidth estimation algorithm work well presence reverse traffic due ack compression phenomenon explained terms aliasing effects new version westwood+ implemented first time kernel linux 2.2 roberto ferorelli kernel linux 2.4 2.6 angelo dell'aera working politecnico di bari undergraduate students 2003 2004 main references saverio mascolo claudio casetti mario gerla m. y. sanadidi ren wang tcp westwood bandwidth estimation enhanced transport wireless links proc acm mobicom 2001 rome italy july 16-21 2001 l. a. grieco s. mascolo performance evaluation comparison westwood+ new reno vegas tcp congestion control acm computer communication review april 2004 vol 34 2 s. mascolo g. racanelli testing tcp westwood+ transatlantic links 10 gigabit/second rate third international workshop protocols fast long-distance networks pfldnet05 ecole normale supérieure lyon france february 3,4 2005 | [
7017,
10147,
10924,
823
] | Test |
719 | 4 | Sheep_dip_(computing):sheep dip computing data security sheep dip process using dedicated computer test files removable media viruses allowed used computers protocol normal first line defence viruses high-security computing environments security specialists expected familiar concept process originally developed response problem boot sector viruses floppy discs subsequently scope expanded include usb flash drives portable hard discs memory cards cd-roms removable devices potentially carry malware name sheep dip derived method preventing spread parasites flock sheep dipping animals one another trough pesticide term use since least early 1990s though footbath also used time sheep dip system considered special case sandbox used test malware sheep dip normally stand-alone computer connected network antivirus software order scan removable media protect sheep dip computer system made effective one antivirus program single antivirus product able detect types virus important secure sheep dip computers strongly possible malware role first line defence means particularly likely attacked software updates applied soon become available antivirus signatures up-to-date available practice means must updated least daily operating system hardened locked far possible network connections avoided two reasons firstly internet connection potential attack vector via computer could compromised secondly risk worm removable device might escape local area network sheep dip computer connected isolation networks makes automatic updating impossible sheep dip computer able make contact servers software updates antivirus signatures distributed therefore normal updates applied manually downloaded separate network-connected computer copied usb flash drive computer security antivirus updates dependent manual intervention human beings system security becomes vulnerable human error pressure work prevents updates applied soon become available sheep dip computer gradually become insecure absence network connections also makes difficult organisation monitor status sheep dips deployed several different locations people central responsibility security must rely prompt accurate reports use sheep dips risk human error active sheep dip antivirus protection monitored real time another program order increase security antivirus effective up-to-date properly configured running active sheep dips add extra layer security checking antivirus intervening necessary least active sheep dip must disable access removable media detects antivirus signatures up-to-date advanced system allowed limited network access automatic updates remote monitoring must enable network connection immediate malware risk network connection active removable media access must disabled | [
2432,
2213,
4972,
7515,
11188,
7739
] | Test |
720 | 3 | Intel_8279:intel 8279 intel 8279 keyboard/display controller specially developed interfacing keyboard display devices intel 8085 8086 8088 microprocessors important features keyboard section display section scan section cpu interface section interfacing 8279 8085 microprocessor based system keyboard 7-segment led display interfaced using ports latches processor carry following task operating modes 8279 1 input modes basic input modes 1 scanned keyboard 2 scanned sensor matrix 3 strobed input 2 display modes two basic output modes 1 left entry typewriter type 2 right entry calculator type full datasheet link http //www.futurlec.com/datasheet/80series/8279.pdf | [] | Test |
721 | 9 | CMS-2_(programming_language):cms-2 programming language cms-2 embedded systems programming language used united states navy early attempt develop standardized high-level computer programming language intended improve code portability reusability cms-2 developed primarily us navy ’ tactical data systems ntds cms-2 developed rand corporation early 1970s stands compiler monitor system name cms-2 followed literature letter designating type target system example cms-2m targets navy 16-bit processors an/ayk-14 cms-2 developed fcpcpac fleet computer programming center pacific san diego ca implemented computer sciences corporation 1968 design assistance intermetrics language continued developed eventually supporting number computers including an/uyk-7 an/uyk-43 uyk-20 uyk-44 computers cms-2 designed encourage program modularization permitting independent compilation portions total system language statement oriented source free-form may arranged programming convenience data types include fixed-point floating-point boolean character status direct reference manipulation character bit strings permitted symbolic machine code may included known direct code cms-2 program composed statements statements made symbols separated delimiters categories symbols include operators identifiers constants operators language primitives assigned compiler specific operations definitions program identifiers unique names assigned programmer data units program elements statement labels constants known values may numeric hollerith strings status values boolean cms-2 statements free form terminated dollar sign statement label may placed beginning statement reference purposes cms-2 source program composed two basic types statement declarative statements provide basic control information compiler define structure data associated particular program dynamic statements cause compiler generate executable machine instructions object code declarative statements defining data program grouped units called data designs data designs consist precise definitions temporary permanent data storage areas input areas output areas special data units dynamic statements act data perform calculations grouped procedures data designs procedures grouped form system elements cms-2 program compiler combines system elements compile time system compile time system may stand alone part larger program data declarative statements provide compiler information data element definitions define format structure order data elements compile-time system three major kinds data switches variables aggregates switches provide transfer program control specific location compile-time system contain set identifiers switch points facilitate program transfers branches switch represents program address statement label procedure name variable single piece data may consist one bit multiple bits words value may assigned variable definition variables may hold constant changing value data types include integers fix point floating point hollerith character strings status booleans tables hold ordered sets identically structured information common unit data table item items may subdivided fields smallest subdivision table allowable data types contained fields include integer fixed point floating point hollerith character string status boolean array extension table concept basic structural unit array item array items contain fields defined programmer dynamic statements specify processing operations result executable code generation compiler dynamic statement consists operator followed list operands additional operators operand may single name constant data-element reference expression major cms-2 operators summarized special operators facilitate references data structures operations dynamic statements describe processing operations program grouped blocks statements called procedures input/output statements provide communication hardware devices running non-realtime environment monitor system compiler monitor system 2 cms-2 system ran univac cp-642b an/usq-20 system software included monitor compiler librarian cp-642 loader tape utility flow charter batch processing operating system controls execution cms-2 components user jobs run cp-642 computer provides input/output software library facilities debugging tools job accounting also provided compiler cs-1 cms-2 languages generates object code cp-642 l-304 an/uyk-7 1830a 1218/1219 computers 1970s different versions cms-2 compiler depending computer used compile code source code rewritten work around functions different versions cms-2 problems debugging tools extended cms-2 compiler adding language features an/uyk-7 computer generates an/uyk-7 object code file management system provides storage access source object code two object code loaders loading absolute relocatable object code set utilities managing data magnetic tape flowcharter software processes flowcharter statements cms-2 source code outputs flowchart high-speed printer | [
9345,
8262,
10089,
1611,
428,
5428,
8502,
3960
] | None |
722 | 6 | StuffIt:stuffit stuffit family computer software utilities archiving compressing files originally produced macintosh versions microsoft windows linux x86 sun solaris later created proprietary compression format used stuffit utilities also termed stuffit stuffit originally developed summer 1987 raymond lau student stuyvesant high school new york city combined fork-combining capabilities utilities macbinary newer compression algorithms similar used zip compared existing utilities mac notably packit stuffit offered one step operation higher compression ratios fall 1987 stuffit largely replaced packit mac world many software sites even going far convert existing packit archives save space stuffit soon became popular aladdin systems formed market last shareware release lau version 1.5.1 split product line two offering stuffit classic shareware stuffit deluxe commercial package deluxe added variety additional functions including additional compression methods integration mac finder allow files compressed magic menu without opening stuffit stuffit upgraded several times lau removed direct development major upgrades internal machinery rare new features techniques appeared regularly macintosh platform shareware utility compact pro emerged competitor stuffit early 1990s major competitive upgrade followed accompanied release freeware stuffit expander make format universally readable well shareware stuffit lite made easier produce prior anyone attempting use format needed buy stuffit making compact pro attractive move success compact pro subsequently fell use several mac compression utilities appeared disappeared 1990s none became real threat stuffit dominance ones see widespread use special-purpose disk expanders like diskdoubler superdisk served different niche apparently side-effect stuffit saw upgrades file format changed number major revisions leading incompatible updates pc-based formats long surpassed stuffit terms compression notably newer systems like rar 7z little impact mac market never appeared easy-to-use program mac introduction mac os x newer mac software lost forks longer needed anything except built-in unix utilities like gzip tar numerous programs wrapping utilities distributed since files could opened machine considerably practical stuffit era data cross-platform release os x public beta aladdin systems released stuffit 6.0 runs os x expander longer relying stuffit engine™ although late market aladdin systems introduced completely new stuffit x format september 2002 stuffit deluxe 7.0 macintosh designed extendable support compression methods support long file names support unix windows file attributes stuffit x improves original stuffit format descendants adding multiple compression algorithms ppm bwt lzw-type compression also added block mode option several encryption options january 2005 jpeg compression added stuffit x compression option see related 'sif format mid-1990s 2005 acquisition smith micro software coinciding release mac os x v10.4 tiger stuffit expander came bundled macintosh operating system although mac files generally use filename extensions one stuffit primary uses allow mac files stored non-mac systems extensions required stuffit-compressed files save resource forks macintosh files inside typically extension .sit newer non-backwards compatible stuffit x-compressed files carry file extension .sitx encrypted stuffit archives created now-discontinued private file utility .pf extensions stuffit-compressed shrinkwrap disk images carry .img .image extensions however classic mac os version stuffit needed mount images convert newer format readable macos smith micro software offers free downloads stuffit expander mac windows expands uncompresses files compressed using stuffit stuffit x format well many compressed encoded encrypted segmented formats shareware application dropstuff permits compressing files stuffit x format stuffit stuffit x formats remain unlike file compression formats proprietary smith micro software charge license fees use programs given alternative programs support format also self-expanding variant stuffit files .sea extension runs executable utility called unsea exists turn executable vanilla sit file early 2005 new jpeg compression system released regularly obtained compression order 25 meaning compressed file size 75 original file size without loss image quality ability rebuild original file original image zip-like programs typically achieve jpeg compression rates order 1 3 programs optimise jpegs without regard original file original image obtain compression rates 3 10 depending efficiency original jpeg programs use rarely implemented arithmetic coding option available jpeg standard typically achieve rates around 12 new technique implemented stuffit x format option stuffit deluxe product also proposed new image format known sif simply consists single jpeg file compressed using new technique pending filing patent retain knowledge details algorithm trade secret duplicate folding™ feature saves even space keeping one copy duplicate file archive changes stuffit compression software claimed developer upgrades frequently render previous versions stuffit unable decompress newer archives without first downloading purchasing new version incompatibility inconvenient work flows timely execution importance though users able create archives legacy format functionality clearly exposed july 5 2005 smith micro software announced acquisition intention expand new jpeg recompression technique wireless platforms file formats initial press release preliminary information saw first use title “ stuffit wireless. ” macos includes archive utility compatible open formats zip gzip bzip2 versions since 10.3 panther preserves resource forks zip format stuffit longer requirement mac file compression zip also de facto standard making widely accepted archives sharing stuffit used standard way packaging mac software download macos native compressed disk images dmg largely replaced practice stuffit might still used situations specific features required archive editing/browsing better compression jpeg compression encryption old packages open source alternative might unarchiver even n't support newer stuffit file formats 3rd-party software macintosh finder replacement path finder use stuffit sdk gain features stuffit | [
2432,
9988,
6022,
10121,
1420,
6797,
1940,
3222,
9880,
3114,
10027,
9388,
2095,
7983,
4406,
823,
6713,
576,
10817,
2755,
11076,
1352,
4296,
3659,
10317,
4174,
10575,
3921,
4561,
2389,
4309,
3804,
7422,
1631,
3296,
9953,
5858,
11614,
6759,
... | Test |
723 | 7 | Physicalization:physicalization physicalization opposite virtualization way place multiple physical machines rack unit way reduce hardware costs since cases server processors cost per core energy efficient laptop processors may make added cost board level integration moore law makes increasing integration less expensive jobs require lots i/o bandwidth may less expensive provide using many fewer integrated processors applications services i/o bound likely benefit physicalized environments ensures operating system instance running processor network interface card host bus i/o sub-system unlike case multi-core servers single i/o sub-system shared cores vms data physicalization simply physicalization physical artefact whose geometry material properties encode data main goals engage people communicate data using computer-supported physical data representations | [] | None |
724 | 4 | List_of_Kiosk_software:list kiosk software list kiosk software list includes kiosk-exclusive software well mobile device management software kiosk features | [
8615,
6153,
3949,
5371,
6834,
823,
2328,
1849,
5210,
3323
] | Test |
725 | 3 | Transmeta_Efficeon:transmeta efficeon efficeon processor transmeta second-generation 256-bit vliw design released 2004 employs software engine code morphing software aka cms convert code written x86 processors native instruction set chip like predecessor transmeta crusoe 128-bit vliw architecture efficeon stresses computational efficiency low power consumption low thermal footprint efficeon closely mirrors feature set intel pentium 4 processors although like amd opteron processors supports fully integrated memory controller hypertransport io bus nx bit no-execute x86 extension pae mode nx bit support available starting cms version 6.0.4 efficeon computational performance relative mobile cpus like intel pentium thought lower although little appears published relative performance competing processors efficeon came two package types 783- 592-contact ball grid array power consumption moderate consuming little 3 watts 1 ghz 7 watts 1.5 ghz passively cooled two generations chip produced first generation tm8600 manufactured using tsmc 0.13 micrometre process produced speeds 1.2 ghz second generation tm8800 tm8820 manufactured using fujitsu 90 nm process produced speeds ranging 1 ghz 1.7 ghz internally efficeon two arithmetic logic units two load/store/add units two execute units two floating-point/mmx/sse/sse2 units one branch prediction unit one alias unit one control unit vliw core execute 256-bit vliw instruction per cycle called molecule room store eight 32-bit instructions called atoms per cycle efficeon 128 kb l1 instruction cache 64 kb l1 data cache 1 mb l2 cache caches die additionally efficeon cms code morphing software reserves small portion main memory typically 32 mb translation cache dynamically translated x86 instructions | [
6818,
8231,
1005,
5134,
977,
4465,
499,
5844,
9137,
630,
1820,
8125,
8126,
3071
] | Validation |
726 | 9 | Susan_L._Graham:susan l. graham susan lois graham born september 16 1942 american computer scientist graham pehong chen distinguished professor computer science division department electrical engineering computer sciences university california berkeley born cleveland graham received a.b mathematics harvard 1964 graduate work computer science stanford receiving m.s 1966 ph.d. 1971 supervision david gries 1971 joined faculty university california berkeley rising assistant professor 1971–1976 associate professor 1976–1981 full professor 1981 onwards graham research projects include graham published dozens research articles lectured published extensively subjects computer languages compilers programming environments member united states president council advisors science technology among activities chaired panel open source software high end computing graham long involved harvard culminating joining harvard corporation 2011 1994 inducted fellow association computing machinery also fellow american association advancement science american academy arts sciences ieee member national academy engineering 2004 paper gprof appeared list 50 influential pldi papers time one four papers 1982 year 2009 awarded ieee john von neumann medal contributions programming language design implementation exemplary service discipline computer science sept. 29 2011 announced chosen receive acm-ieee-cs ken kennedy award november 15 2011 seattle sc11 international conference high-performance computing graham featured notable women computing cards | [
8395,
11317,
1783,
1180,
7775
] | None |
727 | 9 | Lambda_lifting:lambda lifting lambda lifting meta-process restructures computer program functions defined independently global scope individual lift transforms local function global function two step process consisting term lambda lifting first introduced thomas johnsson around 1982 historically considered mechanism implementing functional programming languages used conjunction techniques modern compilers lambda lifting closure conversion requires call sites adjusted adding extra arguments calls introduce closure lifted lambda expression contrast closure conversion require call sites adjusted introduce closure lambda expression mapping free variables values technique may used individual functions code refactoring make function usable outside scope written lambda lifts may also repeated order transform program repeated lifts may used convert program written lambda calculus set recursive functions without lambdas demonstrates equivalence programs written lambda calculus programs written functions however demonstrate soundness lambda calculus deduction eta reduction used lambda lifting step introduces cardinality problems lambda calculus removes value variable without first checking one value satisfies conditions variable see curry paradox lambda lifting expensive processing time compiler efficient implementation lambda lifting formula_1 processing time compiler untyped lambda calculus basic types functions lifting may change result beta reduction lambda expression resulting functions meaning mathematical sense regarded function untyped lambda calculus see also intensional versus extensional equality reverse operation lambda lifting lambda dropping lambda dropping may make compilation programs quicker compiler may also increase efficiency resulting program reducing number parameters reducing size stack frames however makes function harder re-use dropped function tied context used different context first lifted following algorithm one way lambda-lift arbitrary program language n't support closures first-class objects language closures first-class objects passed arguments returned functions closure need represented data structure captures bindings free variables following ocaml program computes sum integers 1 100 codice_1 declares codice_2 function may call function f adds sum argument sum numbers less argument local function within definition f n free variable start converting free variable parameter next lift f global function following example time written javascript lambda lifting closure methods implementing block structured programs implements block structure eliminating functions lifted global level closure conversion provides closure links current frame frames closure conversion takes less compile time recursive functions block structured programs without lifting may implemented using stack based implementation simple efficient however stack frame based implementation must strict eager stack frame based implementation requires life functions last-in first-out lifo recent function start calculation must first end functional languages haskell implemented using lazy evaluation delays calculation value needed lazy implementation strategy gives flexibility programmer lazy evaluation requires delaying call function request made value calculated function one implementation record reference frame data describing calculation place value later value required frame used calculate value time needed calculated value replaces reference frame similar stack frame difference stored stack lazy evaluation requires data required calculation saved frame function lifted frame needs record function pointer parameters function modern languages use garbage collection place stack based allocation manage life variables managed garbage collected environment closure records references frames values may obtained contrast lifted function parameters value needed calculation let expression useful describing lifting dropping describing relationship recursive equations lambda expressions functional languages let expressions also block structured programming languages like algol pascal similar allow local definition function use restricted scope let expression used fully mutually recursive version let rec implemented many functional languages let expressions related lambda calculus lambda calculus simple syntax semantics good describing lambda lifting convenient describe lambda lifting translations lambda let expression lambda dropping reverse let expressions allow mutual recursion sense lifted supported lambda calculus lambda calculus support mutual recursion one function may defined outermost global scope conversion rules describe translation without lifting given let expression article following rules describe equivalence lambda let expressions meta-functions given describe lambda lifting dropping meta-function function takes program parameter program data meta-program program meta program different meta-levels following conventions used distinguish program meta program simplicity first rule given matches applied rules also assume lambda expressions pre-processed lambda abstraction unique name substitution operator used extensively expression formula_5 means substitute every occurrence g l return expression definition used extended cover substitution expressions definition given lambda calculus page matching expressions compare expressions alpha equivalence renaming variables lambda lift takes lambda abstraction sub expression lambda expression replaces function call application function creates free variables sub expression parameters function call lambda lifts may used individual functions code refactoring make function usable outside scope written lifts may also repeated expression lambda abstractions order transform program lift given sub-expression within expression lift top expression expression may part larger program allows control sub-expression lifted lambda lift operation used perform lift within program sub expression may either lambda abstraction lambda abstraction applied parameter two types lift possible anonymous lift lift expression lambda abstraction regarded defining anonymous function name must created function named lift expression lambda abstraction applied expression lift regarded named definition function anonymous lift takes lambda abstraction called lambda lift substitution lambda abstraction function application along addition definition function new lambda expression substituted g. note l =g means substitution g l function definitions function definition g added rule g function application substituted expression defined v function name must new variable i.e name already used lambda expression formula_10 meta function returns set variables used e function call g constructed adding parameters variable free variable set represented v function h named lift similar anonymous lift except function name v provided anonymous lift expression g constructed v applying free variables defined lambda lift transformation takes lambda expression lifts lambda abstractions top expression abstractions translated recursive functions eliminates lambda abstractions result functional program form series function definitions n expression representing value returned example de-let meta function may used convert result back lambda calculus processing transforming lambda expression series lifts lift lifts applied lets combined together single let parameter dropping applied remove parameters necessary let expression let expression allows function definitions refer directly whereas lambda abstractions strictly hierarchical function may directly refer two different ways expression may selected lifting first treats lambda abstractions defining anonymous functions second treats lambda abstractions applied parameter defining function lambda abstractions applied parameter dual interpretation either let expression defining function defining anonymous function interpretations valid two predicates needed definitions lambda-free expression containing lambda abstractions lambda-anon anonymous function expression like formula_21 x lambda free search deepest anonymous abstraction lift applied function lifted become simple equation definition recognize lambda abstractions parameter defining function lambda abstractions regarded defining anonymous functions lift-choice first anonymous found traversing expression none function example search deepest named anonymous function definition lift applied function lifted become simple equation definition recognizes lambda abstraction actual parameter defining function lambda abstractions without application treated anonymous functions example example combinator lifted parameter dropping lambda expression see conversion let lambda expressions lifting anonymous functions combinator parameter dropping lambda expression first sub expression chosen lifting formula_42 transforms lambda expression formula_43 creates equation formula_44 second sub expression chosen lifting formula_45 transforms lambda expression formula_46 creates equation formula_47 result surprisingly result simpler one obtained lifting named functions apply function y-combinator calls parameter function repeatedly value defined function fixed point function never terminate lambda dropping making scope functions smaller using context reduced scope reduce number parameters functions reducing number parameters makes functions easier comprehend lambda lifting section meta function first lifting converting resulting lambda expression recursive equation described lambda drop meta function performs reverse first converting recursive equations lambda abstractions dropping resulting lambda expression smallest scope covers references lambda abstraction lambda dropping performed two steps lambda drop applied expression part program dropping controlled set expressions drop excluded lambda drop transformation sinks abstractions expression sinking excluded expressions set expressions sink-tran sinks abstraction starting innermost sinking moving lambda abstraction inwards far possible still outside references variable application 4 cases abstraction use renaming insure variable names distinct variable 2 cases sink test excludes expressions dropping parameter dropping optimizing function position function lambda lifting added parameters necessary function moved context dropping process reversed extra parameters contain variables free may removed dropping parameter removing unnecessary parameter function actual parameter passed always expression free variables expression must also free function defined case parameter dropped replaced expression body function definition makes parameter unnecessary example consider example actual parameter formal parameter always p p free variable whole expression parameter may dropped actual parameter formal parameter always n however n bound lambda abstraction parameter may dropped result dropping parameter main example definition drop-params-tran abstraction defines function build information required make decisions dropping names information describes parameter parameter name expression actual value indication expressions value example parameters function g abstraction renamed unique name parameter list associated name abstraction example g parameter list build-param-lists builds lists expression traversing expression four parameters abstraction lambda expression form formula_70 analyzed extract names parameters function locate name start building parameter list name filling formal parameter names also receive actual parameter list body expression return actual parameter list expression variable call function function name parameter start populating actual parameter list outputting parameter list name application application function call processed extract actual parameter details retrieve parameter lists expression parameter retrieve parameter record parameter list expression check current parameter value matches parameter record value parameter name use later checking logic quite subtle way works value indicator never set true set false values matched value retrieved using build set boolean values allowed true member values parameter equal parameter may dropped similarly def uses set theory query variable given value let let expression use let example building parameter lists gives parameter dropped give another example x equal f. parameter list mapping parameter x dropped give use information obtained build parameter lists drop actual parameters longer required drop-params parameters abstraction variable function name parameter start populating actual parameter list outputting parameter list name application application function call processed extract let let expression use let drop-formal removes formal parameters based contents drop lists parameters drop-formal defined explained starting function definition y-combinator gives back fixed-point combinator|y combinator category implementation functional programming languages category lambda calculus category compiler construction | [
512,
2304,
1952,
8000,
3876,
3462,
6536,
8524,
10510,
5040,
1523,
10581,
2585,
10618
] | None |
728 | 6 | Tahoe-LAFS:tahoe-lafs tahoe-lafs tahoe least-authority file store free open secure decentralized fault-tolerant distributed data store distributed file system used online backup system serve file web host similar freenet depending front-end used insert access files tahoe system tahoe also used raid-like fashion using multiple disks make single large redundant array inexpensive nodes rain pool reliable data storage system designed implemented around principle least authority pola strict adherence convention enabled use cryptographic capabilities provide minimum set privileges necessary perform given task asking agents rain array acts storage volume servers need trusted confidentiality integrity stored data patched version tahoe-lafs exists 2011 made run anonymous networks i2p support multiple introducers also version microsoft windows distributed site within i2p network contrast normal tahoe-lafs operation i2p tahoe-lafs used together location nodes disguised allows anonymous distributed grids formed | [
5120,
2050,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
546,
9762,
5158,
3629,
2609,
7225,
10813,
9281,
8772,
10835,
1109,
8283,
4193,
4194,
4708,
9836,
7789,
3700,
5749,
9332,
6263,
9333,
9335,
7804,
9343,
4746,
7818,
83... | None |
729 | 9 | Richard_O'Keefe:richard o'keefe dr. richard a. o'keefe computer scientist best known writing influential book prolog programming craft prolog lecturer researcher department computer science university otago dunedin new zealand concentrates languages logic programming functional programming including prolog haskell erlang | [
3876,
8421
] | Test |
730 | 3 | Opcode_table:opcode table opcode table also called opcode matrix visual representation opcodes instruction set arranged axis table represents upper lower nibble combined form full byte opcode additional opcode tables exist additional instructions created using opcode prefix structure arrangement opcode table appears follows cell 00-ff contains information equivalent assembly instruction corresponding opcode parameters cpu cycle counts | [
10786,
8715,
8716,
10796,
5358,
8143,
372,
7421
] | Train |
731 | 3 | Multithreading_(computer_architecture):multithreading computer architecture computer architecture multithreading ability central processing unit cpu single core multi-core processor provide multiple threads execution concurrently supported operating system approach differs multiprocessing multithreaded application threads share resources single multiple cores include computing units cpu caches translation lookaside buffer tlb multiprocessing systems include multiple complete processing units one cores multithreading aims increase utilization single core using thread-level parallelism well instruction-level parallelism two techniques complementary sometimes combined systems multiple multithreading cpus cpus multiple multithreading cores multithreading paradigm become popular efforts exploit instruction-level parallelism stalled since late 1990s allowed concept throughput computing re-emerge specialized field transaction processing even though difficult speed single thread single program computer systems actually multitasking among multiple threads programs thus techniques improve throughput tasks result overall performance gains two major techniques throughput computing multithreading multiprocessing thread gets lot cache misses threads continue taking advantage unused computing resources may lead faster overall execution resources would idle single thread executed also thread use computing resources cpu instructions depend result running another thread may prevent resources becoming idle multiple threads interfere sharing hardware resources caches translation lookaside buffers tlbs result execution times single thread improved degraded even one thread executing due lower frequencies additional pipeline stages necessary accommodate thread-switching hardware overall efficiency varies intel claims 30 improvement hyper-threading technology synthetic program performing loop non-optimized dependent floating-point operations actually gains 100 speed improvement run parallel hand hand-tuned assembly language programs using mmx altivec extensions performing data prefetches good video encoder might suffer cache misses idle computing resources programs therefore benefit hardware multithreading indeed see degraded performance due contention shared resources software standpoint hardware support multithreading visible software requiring changes application programs operating systems multiprocessing hardware techniques used support multithreading often parallel software techniques used computer multitasking thread scheduling also major problem multithreading simplest type multithreading occurs one thread runs blocked event normally would create long-latency stall stall might cache miss access off-chip memory might take hundreds cpu cycles data return instead waiting stall resolve threaded processor would switch execution another thread ready run data previous thread arrived would previous thread placed back list ready-to-run threads example conceptually similar cooperative multi-tasking used real-time operating systems tasks voluntarily give execution time need wait upon type event type multithreading known block cooperative coarse-grained multithreading goal multithreading hardware support allow quick switching blocked thread another thread ready run achieve goal hardware cost replicate program visible registers well processor control registers program counter switching one thread another thread means hardware switches using one register set another switch efficiently active threads active thread needs register set example quickly switch two threads register hardware needs instantiated twice additional hardware support multithreading allows thread switching done one cpu cycle bringing performance improvements also additional hardware allows thread behave executing alone sharing hardware resources threads minimizing amount software changes needed within application operating system support multithreading many families microcontrollers embedded processors multiple register banks allow quick context switching interrupts schemes considered type block multithreading among user program thread interrupt threads purpose interleaved multithreading remove data dependency stalls execution pipeline since one thread relatively independent threads less chance one instruction one pipelining stage needing output older instruction pipeline conceptually similar preemptive multitasking used operating systems analogy would time slice given active thread one cpu cycle example type multithreading first called barrel processing staves barrel represent pipeline stages executing threads interleaved preemptive fine-grained time-sliced multithreading modern terminology addition hardware costs discussed block type multithreading interleaved multithreading additional cost pipeline stage tracking thread id instruction processing also since threads executed concurrently pipeline shared resources caches tlbs need larger avoid thrashing different threads advanced type multithreading applies superscalar processors whereas normal superscalar processor issues multiple instructions single thread every cpu cycle simultaneous multithreading smt superscalar processor issue instructions multiple threads every cpu cycle recognizing single thread limited amount instruction-level parallelism type multithreading tries exploit parallelism available across multiple threads decrease waste associated unused issue slots example distinguish types multithreading smt term temporal multithreading used denote instructions one thread issued time addition hardware costs discussed interleaved multithreading smt additional cost pipeline stage tracking thread id instruction processed shared resources caches tlbs sized large number active threads processed implementations include dec later compaq ev8 completed intel hyper-threading technology ibm power5 sun microsystems ultrasparc t2 cray xmt amd bulldozer zen microarchitectures major area research thread scheduler must quickly choose among list ready-to-run threads execute next well maintain ready-to-run stalled thread lists important subtopic different thread priority schemes used scheduler thread scheduler might implemented totally software totally hardware hardware/software combination another area research type events cause thread switch cache misses inter-thread communication dma completion etc multithreading scheme replicates software-visible state including privileged control registers tlbs enables virtual machines created thread allows thread run operating system processor hand user-mode state saved less hardware required would allow threads active one time die area cost | [
5120,
7173,
9224,
9739,
2066,
7699,
5655,
5658,
10779,
10781,
6181,
8231,
6184,
3630,
6705,
2098,
7218,
4664,
2623,
2113,
7234,
3142,
8262,
2638,
9302,
2140,
7263,
1122,
4194,
5730,
7780,
3175,
5223,
8810,
4205,
8815,
3698,
630,
119,
6774... | Test |
732 | 5 | Security_association:security association security association sa establishment shared security attributes two network entities support secure communication sa may include attributes cryptographic algorithm mode traffic encryption key parameters network data passed connection framework establishing security associations provided internet security association key management protocol isakmp protocols internet key exchange kerberized internet negotiation keys provide authenticated keying material sa simplex one-way channel logical connection endorses provides secure data connection network devices fundamental requirement sa arrives two entities communicate one channel take example mobile subscriber base station subscriber may subscribe one service therefore service may different service primitives data encryption algorithm public key initialization vector make things easier security information grouped logically logical group security association sa id called said base station mobile subscriber share said derive security parameters words sa logical group security parameters enable sharing information another entity | [
9383,
8265,
4874,
939,
10831,
10908,
3742
] | Validation |
733 | 4 | Hashcat:hashcat hashcat self-proclaimed world fastest password recovery tool proprietary code base 2015 released free software versions available linux os x windows come cpu-based gpu-based variants examples hashcat-supported hashing algorithms microsoft lm hashes md4 md5 sha-family unix crypt formats mysql cisco pix hashcat made way news many times optimizations flaws discovered creator exploited subsequent hashcat releases example flaw 1password password manager hashing scheme previously hashcat used come two main variants release hashcat v3.00 gpu cpu tools merged single tool called hashcat cpu-only version became hashcat-legacy cpu gpu require opencl many algorithms supported hashcat-legacy md5 sha1 others cracked shorter time using well-documented gpu acceleration leveraged gpu-based hashcat however algorithms accelerated leveraging gpus bcrypt good example due factors data-dependent branching serialization memory name oclhashcat/cudahashcat n't catchall replacements hashcat-legacy hashcat-legacy available linux osx windows hashcat available macos windows linux gpu cpu generic opencl support allows fpgas accelerator cards hashcat offers multiple attack modes obtaining effective complex coverage hash keyspace modes traditional bruteforce attack considered outdated hashcat core team recommends mask-attack full replacement team hashcat official team hashcat software composed core hashcat members first place korelogic crack competitions defcon 2010 2012 2014 2015 derbycon 2017 | [
3937,
7426,
8513,
4580,
6916,
7556,
4956,
7557,
8867,
4140,
5612,
7983,
10135,
6617,
3290,
8827,
2716,
63
] | None |
734 | 1 | Materialized_view:materialized view computing materialized view database object contains results query example may local copy data located remotely may subset rows and/or columns table join result may summary using aggregate function process setting materialized view sometimes called materialization form caching results query similar memoization value function functional languages sometimes described form precomputation forms precomputation database users typically use materialized views performance reasons i.e form optimization materialized views store data based remote tables also known snapshots c. j date regards phrase materialized view deprecated term snapshot database management system following relational model view virtual table representing result database query whenever query update addresses ordinary view virtual table dbms converts queries updates underlying base tables materialized view takes different approach query result cached concrete materialized table rather view may updated original base tables time time enables much efficient access cost extra storage data potentially out-of-date materialized views find use especially data warehousing scenarios frequent queries actual base tables expensive materialized view indexes built column contrast normal view typically possible exploit indexes columns come directly mapping indexed columns base tables often functionality offered materialized views implemented first oracle database query rewrite feature added version 8i example syntax create materialized view oracle refresh fast start sysdate postgresql version 9.3 newer natively support materialized views version 9.3 materialized view auto-refreshed populated time creation unless codice_1 used may refreshed later manually using codice_2 version 9.4 refresh may concurrent selects materialized view codice_3 used example syntax create materialized view postgresql microsoft sql server differs rdbms way implementing materialized view via concept known indexed views main difference views require refresh fact always synchronized original data tables compound view achieve necessary lines origin destination deterministic mapping limits types possible queries mechanism realised since 2000 version sql server example syntax create materialized view sql server create view mv_my_view schemabinding select col1 sum col2 total table_name group col1 go create unique clustered index xv apache kafka since v0.10.2 apache spark since v2.0 support materialized views streams data materialized views also supported sybase sql anywhere ibm db2 called materialized query tables mysql n't support materialized views natively workarounds implemented using triggers stored procedures using open-source application flexviews materialized views implemented amazon dynamodb using data modification events captured dynamodb streams | [
2051,
7175,
10632,
8201,
9225,
9360,
8979,
2068,
10389,
3990,
4630,
2456,
1049,
5658,
5403,
7446,
4255,
9631,
9634,
2339,
4263,
2344,
2217,
7080,
8871,
10286,
9397,
5051,
3004,
10048,
5953,
6850,
1222,
9286,
333,
337,
2901,
10326,
2011,
9... | Test |
735 | 8 | Alexa_Internet:alexa internet alexa internet inc. american web traffic analysis company based san francisco wholly owned subsidiary amazon alexa founded independent company 1996 acquired amazon 1999 250m stock toolbar collects data internet browsing behavior transmits alexa website stored analyzed basis company web traffic reporting including alexa rank according website alexa provides web traffic data global rankings information 30 million websites 2018 website visited 3 million people every month alexa internet founded april 1996 brewster kahle bruce gilliat company name chosen homage library alexandria ptolemaic egypt drawing parallel largest repository knowledge ancient world potential internet become similar store knowledge alexa initially offered toolbar gave internet users suggestions go next based traffic patterns user community company also offered context site visited registered many pages many sites pointed frequently updated alexa operations grew include archiving web pages crawled examined automated computer program nicknamed bot web crawler database served basis creation internet archive accessible wayback machine 1998 company donated copy archive two terabytes size library congress alexa continues supply internet archive web crawls 1999 company moved away original vision providing intelligent search engine alexa acquired amazon.com approximately us 250 million amazon stock alexa began partnership google early 2002 web directory dmoz january 2003 december 2005 alexa opened extensive search index web-crawling facilities third-party programs comprehensive set web services apis could used instance construct vertical search engines could run alexa servers elsewhere may 2006 google replaced windows live search provider search results december 2006 amazon released alexa image search built in-house first major application built company web platform may 2007 alexa changed api limit comparisons three websites reduce size embedded graphs flash add mandatory embedded britepic advertisements april 2007 company filed lawsuit alexa v. hornbaker stop trademark infringement statsaholic service lawsuit alexa alleged ron hornbaker stealing traffic graphs profit primary purpose site display graphs generated alexa servers hornbaker removed term alexa service name march 19 2007 november 27 2008 amazon announced alexa web search longer accepting new customers service would deprecated discontinued existing customers january 26 2009 thereafter alexa became purely analytics-focused company march 31 2009 alexa revealed major website redesign redesigned site provided new web traffic metrics—including average page views per individual user bounce rate rate users come leave webpage user time website following weeks alexa added features including visitor demographics clickstream web search traffic statistics alexa introduced new features compete web analytics services key metric published alexa internet analytics alexa traffic rank also simply known alexa rank also referred global rank alexa internet designed estimate website popularity alexa internet tooltip global rank says rank calculated combination daily visitors page views website 3-month period alexa traffic rank used monitor popularity trend website compare popularity different websites alexa ranks sites based primarily tracking sample set internet traffic—users toolbar internet explorer firefox google chrome web browsers alexa toolbar includes popup blocker stops unwanted ads search box links amazon.com alexa homepage alexa ranking website user visiting also allows user rate website view links external relevant websites early 2005 alexa stated 10 million downloads toolbar though company provide statistics active usage originally web pages ranked amongst users alexa toolbar installed could biased specific audience subgroup reluctant take part rankings caused controversies representative alexa user base typical internet behavior especially less-visited sites 2007 michael arrington provided examples alexa rankings known contradict data comscore web analytics service including ranking youtube ahead google 2007 third-party-supplied plugin firefox browser served option firefox users amazon abandoned a9 toolbar july 16 2007 alexa released official toolbar firefox called sparky 16 april 2008 many users reported drastic shifts alexa rankings alexa confirmed later day announcement released updated ranking system claiming would take account sources data beyond alexa toolbar users using alexa pro service website owners sign certified statistics allows alexa access website traffic data site owners input javascript code page website permitted user security privacy settings runs sends traffic data alexa allowing alexa display—or display depending owner preference—more accurate statistics total pageviews unique pageviews number antivirus companies assessed alexa toolbar toolbar internet explorer 7 one point flagged malware microsoft defender symantec classified toolbar trackware 2007 mcafee classified adware deeming potentially unwanted program 2005 mcafee site advisor rated alexa site green 2007 finding significant problems warned small fraction downloads ... people consider adware potentially unwanted programs 2014 though possible delete paid subscription within alexa account possible delete account created alexa web interface | [
4623,
5660,
8735,
6176,
9768,
560,
3632,
8240,
2611,
8244,
77,
590,
8271,
7248,
82,
9816,
4704,
3688,
1129,
106,
1643,
2156,
3691,
3182,
113,
4215,
3191,
6796,
10390,
5787,
8865,
2217,
696,
704,
9414,
5319,
6856,
8921,
2267,
735,
235,
... | Test |
736 | 2 | Microsoft_Data_Access_Components:microsoft data access components microsoft data access components mdac also known windows dac framework interrelated microsoft technologies allows programmers uniform comprehensive way developing applications access almost data store components include activex data objects ado ole db open database connectivity odbc several deprecated components well microsoft jet database engine msdasql ole db provider odbc remote data services rds components also become obsolete former data access objects api remote data objects first version mdac released august 1996 time microsoft stated mdac concept stand-alone program widespread distribution method later microsoft released upgrades mdac web-based redistributable packages eventually later versions integrated microsoft windows internet explorer mdac 2.8 sp1 ceased offering mdac redistributable package throughout history mdac subject several security flaws led attacks escalated privileges attack although vulnerabilities generally fixed later versions fairly promptly current version 2.8 service pack 1 product many different versions many components deprecated replaced newer microsoft technologies mdac known windows dac windows vista latest version mdac 2.8 consists several interacting components windows specific except odbc available several platforms mdac architecture may viewed three layers programming interface layer consisting ado ado.net database access layer developed database vendors oracle microsoft ole db .net managed providers odbc drivers database component layers made available applications mdac api microsoft sql server network library proprietary access method specific microsoft sql server also included mdac developers windows applications encouraged use ado ado.net data access benefit users application program constrained choice database architecture except supported mdac naturally developers still choice writing applications directly access ole db odbc microsoft sql server network library also known net-lib used microsoft sql server read write data using many different network protocols though net-lib specific sql server microsoft includes mdac sql server uses open data services ods library communicate net-lib interfaces directly windows nt operating system line win32 subsystem sql server network library controlled use client network utility bundled sql server net-lib supported network protocol separate driver confused device driver support session layer protocol stack two general types net-lib primary secondary primary net-lib consists super socket net-lib shared memory net-lib numerous secondary net-libs including tcp/ip named pipes network libraries named pipes method communicating processes via system-persistent pipeline given identity microsoft ole db provider sql server sqloledb communicates via primary net-libs super socket net-lib deals inter-computer communications coordinates secondary net-libs – though tcp/ip secondary net-lib exception calls windows sockets 2 api directly banyan vines appletalk servernet ipx/spx giganet rpc net-libs dropped mdac 2.5 onwards network library router job managing protocols however named pipes secondary net-lib managed router super socket net-lib also handles data encryption via use windows ssl api shared memory net-lib hand manages connections multiple instances sql server exist one computer uses shared memory area communicate processes inherently secure need data encryption instances sql server exist one computer operating system allow process access instances area shared memory net-lib also able support impersonation logged user security context protocols support authenticated connections called trusted connections allows net-lib provide integrated logon authentication mechanism via use windows authentication windows authentication supported windows 98 windows ole db also called oledb ole-db allows mdac applications access different types data stores uniform manner microsoft used technology separate application data store website data store needs access done different applications need access different types sources data necessarily need know access technology-specific functionality technology conceptually divided consumers providers consumers applications need access data provider software component exposes ole db interface use component object model com ole db database access interface technology used mdac ole db providers created access simple data stores text file spreadsheet complex databases oracle sql server however different data store technology different capabilities ole db providers may implement every possible interface available capabilities available implemented use com objects ole db provider map data store technology functionality particular com interface microsoft calls availability interface provider-specific may applicable depending database technology involved additionally however providers may also augment capabilities data store capabilities known services microsoft parlance microsoft ole db provider sql server sqloledb ole db provider microsoft provides microsoft sql server version 6.5 upwards universal data link files '.udl files provide common user interface specifying connection attributes user use data link properties dialog box save connection information .udl file alternative directly specifying hand connection string consequently files provide convenient level indirection additionally dialog box specifies number alternate ole db data providers variety target applications open database connectivity odbc native interface accessed programming language usually c make calls native library mdac interface defined dll separate module driver needed database must accessed functions odbc api implemented dbms-specific drivers driver microsoft provides mdac called sql server odbc driver sqlodbc name implies designed microsoft sql server supports sql server v6.5 upwards odbc allows programs use sql requests access databases without know proprietary interfaces databases handles sql request converts request individual database system understands according microsoft sql server 2012 odbc driver updated recent server features including microsoft windows azure sql database released microsoft odbc driver sql server activex data objects ado high-level programming interface ole db uses hierarchical object model allow applications programmatically create retrieve update delete data sources supported ole db ado consists series hierarchical com-based objects collections object acts container many objects programmer directly access ado objects manipulate data send sql query database via several ado mechanisms ado made nine objects four collections collections objects ado.net latest version ado ado 2.8 often referred ado classic part mdac 2.8 stack alongside classic ado built around microsoft .net though sometimes seen evolutionary step ado fundamental structural changes made microsoft ado.net runs .net managed provider modified version ole db provider specifically designed .net object structure longer built around recordset object instead dataset object used contain data gathered multiple sources transparent programmer unlike old ado recordset dataset design promotes use disconnected data conceptually dataset object seen small in-memory relational database right allows manipulation data direction order propagate changes back database dataadapter object used transfers data data source dataset object cursors also deprecated ado.net replaced datareader object used efficiently process large list results one record time without storing mdac continually evolving component framework several components previously part since deprecated removed entirely framework jet stands joint engine technology database engine used microsoft access microsoft exchange server visual basic jet part relational database management system rdbms offered single interface software could use access microsoft databases jet also provided support security referential integrity transaction processing indexing record page locking data replication later versions jet engine extended run sql queries store character data unicode format create views allowed bi-directional replication microsoft sql server since superseded msde three modules jet one native jet isam driver jet dynamic link library dll could directly manipulate microsoft access database files mdb modified form indexed sequential access method isam database another one modules isam drivers dlls allowed access isam databases among xbase paradox btrieve foxpro files final module data access objects dao dll dao allowed programmers access jet engine basically object-oriented data language used access basic visual basic application developers access jet similarly microsoft jet ole db provider replication objects jro allowed replication jet data sources removed mdac 2.6 microsoft ole db provider odbc codice_19 ole db provider allowing activex data objects access databases via odbc driver microsoft supplied several ole-db providers indexing service active directory jet sql server oracle codice_20 internet publishing however unless otherwise directed ado defaulted using msdasql default provider mdac 2.5 oracle odbc driver msdasql supported oracle 7 partially supported oracle 8i features supported microsoft initially deprecated msdasql component 64-bit operating systems microsoft oracle odbc driver later superseded .net managed oracle provider supported oracle 9i however windows server 2008 windows vista sp1 ship 64-bit version msdasql remote data services rds allowed retrieval set data server client altered way sent back server processing popular adoption transact-sql extends sql programming constructs loops conditional statements became less necessary eventually deprecated mdac 2.7 microsoft produced soap toolkit 2.0 allows clients via open xml-based standard sqlxml designed sql server 2000 deprecated mdac 2.6 allowed microsoft relational database viewed xpath allowed data viewable xml file actually deprecated removed later versions mdac though microsoft provide downloadable component support 64-bit operating systems several components completely removed mdac microsoft longer supported microsoft released several versions mdac time distribution method varied feature-set different version mdac 1.0 first released august 1996 according microsoft mdac 1.0 existed concept coordinated stand-alone setup program mdac 1.0 stack consisted odbc 3.0 ole db 1.1 ado 1.0 advanced data connector adc 1.0 – according microsoft precursor remote data service mdac 1.5 also included odbc drivers access/jet sql server oracle databases mdac 1.0 released via several mechanisms advanced data connector shipped internet information server iis 3.0 downloadable cab file ole db 1.1 ado 1.0 shipped ole db 1.1 sdk came visual studio 97 also downloadable mdac 1.0 came active server pages came iis 3.0 also came visual interdev 1.0 mdac 1.5 released september 1997 march 1998 involved centralised distribution mechanism mdac 1.0 released microsoft internet explorer 4.0 internet client sdk 4.0 cd-rom given 1997 professional developers conference pdc five versions mdac 1.5 different versions mdac 1.5 consisted version mdac security flaw made vulnerable escalated privileges attack vulnerability caused systems iis mdac installed give unauthorized web user ability execute shell commands iis system privileged user allowed attacker use mdac tunnel sql odbc data requests public connection private back-end network multi-homed internet-connected iis system also allowed user gain unauthorized access secured non-published files iis system mdac 1.5 last data access component release supported windows nt 3.51 sp5 mdac 2.0 distributed data access 2.0 sdk included contents mdac 1.5 odbc 3.5 sdk ole db 1.5 sdk ole db olap specification also included many updates core product including security feature added rds prevented used maliciously iis server version came included windows nt 4.0 sp4 also visual studio 6.0 came full data access sdk mdac 2.1 distributed sql server 7.0 sql server 6.5 sp5 mdac 2.1 sp1 distributed internet explorer 5 mdac 2.1 sp1a ga distributed microsoft office 2000 backoffice 4.5 visual studio 98 sp3 however none versions mdac released general public via world wide web mdac 2.1 sp2 distributed microsoft website components included 2.1 version security vulnerabilities whereby unchecked buffer could allow elevated privileges attack found time later affected mdac 2.1 2.5 2.6 addressed later patch mdac 2.5 released february 17 2000 distributed windows 2000 mdac service packs released parallel windows 2000 service packs also distributed microsoft website three service packs released components included 2.5 several issues found version mdac using ole db session pooling microsoft com+ would try continuously load unload ole db conflict could arise caused ole db session pooling run 100 cpu usage later fixed microsoft published full list bugs fixed mdac 2.5 service pack 2 mdac 2.5 service pack 3 security vulnerability also existed later fixed whereby unchecked buffer found sql server driver flaw introduced mdac 2.5 sp2 mdac 2.6 released september 2000 distributed web microsoft sql server 2000 mdac 2.6 rtm sp1 released june 20 2001 sp2 released june 11 2002 distributed parallel microsoft sql server 2000 service packs could also downloaded microsoft website beginning version mdac microsoft jet microsoft jet ole db provider odbc desktop database drivers included instead could installed manually microsoft also released alert warning mdac 2.6 installed sql server 7.0 cluster install mdac 2.6 later node cluster directly installation another program may cause catastrophic failure sql server agent sql server services issue affected veritas software backup exec 9.0 windows servers installs microsoft sql server 2000 desktop engine msde 2000 database revision 4367 installed mdac version 2.6 sp2 revision 4454 installed mdac version 2.7 sp1 problem mdac 2.7 released october 2001 microsoft website refresh release issued april 2002 release windows xp microsoft website version 2.7 available u.s. english chinese traditional simplified german japanese korean brazilian portuguese czech danish greek slovak slovenian spanish finnish french hungarian italian dutch norwegian polish portuguese russian swedish turkish hebrew arabic available windows xp main feature change support microsoft 64-bit operating system however support banyan vines also dropped version mdac several known issues mdac 2.7 continued causing connectivity problems clustered servers running microsoft sql server 6.5 sql server 7.0 workaround provided microsoft creating configuring odbc data source names dsns using microsoft sql server odbc driver network library protocol might unexpectedly switch tcp/ip even dsn configured use named pipes issue found infoworld reporter randall c. kennedy identified change actually made mdac 2.6 never documented discovered testing client/server database workloads windows xp computer infoworld claims although overall server cpu utilization rose 8 percent using tcp/ip context switches per second dropped 150 percent course impossible would negative context switch rate drop either 33 60 depending planet author time writing 10-user workload unimpressed fundamental functional change default behaviour net-lib occurred without passing mention unrelated document windows xp users also sometimes experienced problems connecting sql server sql server attempts use certificates finds local computer however one certificate available know one use attempting use microsoft analysis services 2000 rtm error would sometimes appear trying browse cubes microsoft also discovered problem windows 95 windows 98 windows setup program prevented mdac installation program rolling back encountered installation error several security issues resolved microsoft mdac 2.7 david litchfield next generation security software ltd reported security vulnerability results one odbc functions mdac used connect data sources contained unchecked buffer another vulnerability fixed one whereby attacker could respond sql server discovery message broadcast clients specially crafted packet could cause buffer overflow another flaw found whereby code could executed remotely attacker responded broadcast another specially crafted packet mdac 2.8 released august 2003 distributed microsoft windows server 2003 well microsoft data access technologies website introduce new features product fixed number bugs security issues – reg file automates changes registry removed made server run unsafe mode whereby rds could exploited gain unauthorized access system new restriction imposed length shape query string also several odbc administrator changes may 23 2005 brad rhodes lead program manager microsoft data access technologies announced mdac 2.8 sp1 last stand-alone redistributable mdac microsoft ship mdac official component microsoft operating system though providing ongoing bug security fixes previously released versions web-distributable version however microsoft created new component called sql native client sqlncli stand-alone data access api combined ole db odbc libraries one dll formed independent mdac reliant state operating system – developer links library avoids situations update operating system updates mdac breaks applications built different version mdac windows 7 sp1 broken forward compatibility mdac 2.8 software compiled windows 7 sp1 relies mdac ado work windows versions prior windows 7 sp1 including windows 7 rtm vista xp microsoft provided solutions work around issue applications vba applications remain affected fix issue release february 2012 windows vista longer use mdac instead use windows dac consists updated versions ado ole db odbc components according microsoft windows dac includes changes work windows vista almost entirely functionally equivalent mdac 2.8 two ways checking version mdac installed computer windows 2000 windows xp windows server 2003 one way check via microsoft component checker program compares value installed mdac dll mdac file manifest second way check key codice_21 windows registry microsoft notes information may incorrect versions mdac prior 2.1 compared versions mdac files installed system | [
10243,
5636,
9744,
10769,
9234,
1043,
5658,
1055,
2083,
8227,
4647,
1577,
4143,
9263,
11316,
1077,
8246,
8262,
4174,
4178,
83,
9813,
603,
2145,
5225,
2669,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
6797,
9362,
10899,
322... | Validation |
737 | 2 | Nokia_Browser_for_Symbian:nokia browser symbian nokia browser symbian formerly known web browser s60 default web browser s60 symbian mobile phone platform browser based port apple inc. ’ open-source webcore javascriptcore frameworks form webkit rendering engine apple uses safari web browser first version 2002 lacking support wireless application protocol wap wireless markup language wml adobe flash lite s60 version 2 introduced support wap wml hence nokia services wap browser default browser initial device shipments platform nokia announced porting webkit s60 browser june 2005 made available november 2006 world wide web conference nokia announced releasing source code port webkit back community supports drawbacks supports nokia browser 7.0 supported s60 5th edition devices version supports features prior nokia browser 7 releases well following additional features nokia browser 7.1 supported s60 3rd 5th edition devices new features drawbacks nokia browser 7.2 supported symbian^3 s60 3rd 5th edition platform devices new features nokia browser 7.3 pre-installed symbian anna devices like nokia e6 nokia x7 browser 7.3 also available symbian^3 devices nokia c6-01 nokia c7 nokia e7 nokia n8 part upgrade symbian^3 symbian anna s60 3rd edition s60 5th edition devices received updated browser form firmware updates version brings touch-optimized user interface addition better web standards support improved performance new features include nokia browser 7.4 pre-installed nokia belle devices nokia 600 nokia 603 nokia 700 nokia 701 browser 7.4 also available symbian^3/anna devices part upgrade symbian anna nokia belle browser 7.4 added support following features additionally user interface changed comparison v7.3 follows come nokia belle fp2 nokia 603 nokia 700 nokia 701 nokia 808 | [
513,
6657,
9736,
2579,
5659,
6171,
9757,
7713,
10791,
9770,
9262,
559,
7220,
4661,
3639,
10808,
3643,
9275,
64,
5707,
7246,
10834,
6231,
8281,
6747,
9320,
1642,
9834,
9841,
115,
9843,
4728,
2684,
637,
1664,
2182,
10910,
8351,
5290,
10410,... | Test |
738 | 9 | Parlog:parlog parlog logic programming language designed efficient utilization parallel computer architectures semantics based first order predicate logic expresses concurrency interprocess communication indeterminacy synchronization within declarative language framework designed imperial college london steve gregory keith l. clark descendant ic prolog relational language | [] | Validation |
739 | 6 | Log-structured_File_System_(BSD):log-structured file system bsd log-structured file system lfs implementation log-structured file system concept originally proposed implemented john ousterhout originally developed bsd removed freebsd openbsd netbsd implementation nonfunctional work leading 4.0 release made viable production file system on-disk format lfs borrowed ufs indirect block inode directory formats almost identical allows well-tested ufs file system code re-used current implementations lfs share higher-level ufs code lower-level code ffs since file systems share much common ufs lfs divides disk segments one active one time segment header called summary block summary block contains pointer next summary block linking segments one long chain lfs treats linear log segments necessarily adjacent disk reason larger segment sizes 384kb 1mb recommended amortize cost seeking segments whenever file directory changed lfs writes head log unlike ufs inodes lfs fixed locations inode map—a flat list inode block locations—is used track everything else inode map blocks also written log changed segment filled lfs goes fill next free clean segment segments said dirty contain live blocks blocks newer copies exist ahead log lfs garbage collector turns dirty segments clean ones copying live blocks dirty segment current segment skipping rest summary block segment contains map track live blocks generally garbage collection delayed clean segments left also deferred system idle even least-dirty segments picked collection intended avoid penalty cleaning full segments i/o bandwidth needed checkpoint usually scheduled every 30 seconds lfs writes last known block locations inode map number current segment checkpoint region fixed place disk two regions lfs alternates checkpoint written checkpoint represents last consistent snapshot file system recovery crash normal mounting work way—the file system simply reconstructs state last checkpoint resumes logging | [
5120,
2051,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
11323,
8772,
4708,
8298,
9836,
7789,
9333,
6263,
9335,
2687,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1212,
8380,
3267,
1... | None |
740 | 2 | Games_for_Windows:games windows games windows discontinued brand owned microsoft introduced 2006 coincide release windows vista operating system brand represents standardized technical certification program online service windows games bringing measure regulation pc game market much way console manufacturers regulate platforms branding program open first-party third-party publishers games windows promoted convention kiosks forums early 2005 promotional push culminated deal ziff davis media rename computer gaming world magazine first gfw issue published november 2006 2008 ziff davis announced magazine would cease published though online content would still updated maintained 2013 microsoft announced xbox pc marketplace would cease operations would result discontinuation games windows brand spite announcement company stated content previously purchased could still accessed via games windows – live client software games certified microsoft feature prominent games windows logo border across top packaging manner similar games developed xbox 360 software must meet certain requirements mandated microsoft order display brand packaging requirements include microsoft claimed increased sales games windows-branded games stores giving games greater focus stated planned increase marketing efforts brand certain games certified games windows brand including shadowrun uno featured cross-platform compatibility allowing gamers play across xbox 360 consoles traditional windows vista windows 7 pcs starting halo 2 may 31 2007 certain games windows titles access microsoft live network online play features including voice chat instant messaging friends lists accessed in-game menu called guide users log xbox live gamertags gain achievements play games chat across platforms games support cross-platform compatibility features including cross-platform multiplayer gaming multiplayer achievements initially required subscription xbox live gold however july 22 2008 microsoft announced games windows functionality would free existing future members early adopters technology would receive refunds previously incurred charges addition microsoft launched games windows live marketplace similar xbox live marketplace allowed users download purchase content game demos add-ons gamer pics microsoft points publisher title would determine item required purchased time microsoft announced intentions make games windows live client software interface friendly reduce technical requirements developers games explorer included versions windows vista windows 7 special folder showcases games installed user computer related information compatible game installed operating system adds shortcut game games explorer optionally download additional information game packaging content rating information e.g. esrb pegi acb cero developer game definition file information provided internet although feature discontinued since 2016 windows experience index information also displayed within interface feature removed entirely windows 10 v1803 games explorer supports custom commands games also includes shortcuts configure various operating system components may pertinent gamers audio devices display devices firewall settings game controllers windows vista games explorer allows developers expose game metadata thumbnails interface windows search shell handler games explorer fully compatible parental controls feature included windows vista windows 7 parental controls allows parents include preclude certain games played based content rating and/or title also block games played altogether compatibility typically depends age popularity game newer games better compatibility game incompatible user manually add game dragging dropping games explorer tray play technology developed microsoft windows vista allows users insert game disc optical disc drive play game installs background streams disc minimal zero caching—in manner similar game console first commercial game known use technology windows version halo 2 part games windows initiative involved ensuring xbox 360 peripherals xbox 360 controller wireless gaming receiver worked across windows platforms xbox 360 peripherals work certified games also default games included windows vista minesweeper | [
4356,
11524,
5004,
6797,
782,
1935,
10900,
4248,
11549,
7970,
2339,
8998,
1832,
6827,
7983,
3890,
8757,
6462,
4289,
6088,
9033,
1098,
10957,
4051,
9812,
11221,
342,
11605,
9434,
9819,
11103,
10338,
740,
488,
617,
8681,
2027,
5356,
10989,
... | Test |
741 | 2 | Fink_(software):fink software fink project effort port package open-source unix programs macos fink uses dpkg apt debian package management system well frontend program codice_1 implemented set perl modules fink features binary distribution quick easy installation using apt well extensive source distribution addition command-line tools handling packages shareware app phynchronicity provides gui fink used install newer versions packages installed macos install packages included macos apple edict fink stores data directory codice_2 default though changed initially compiling fink source code goes filesystem hierarchy standard recommendation use codice_3 prefix reasons given fink faq installers might overwrite fink files codice_3 entirely separate directory makes easier disable binaries libraries fink installs within fink directory fhs-like layout codice_5 codice_6 codice_7 etc used fink project started december 2000 german hacker christoph pfisterer name fink german finch reference name macos core darwin charles darwin study diversity among finches led eventually concept natural selection christoph pfisterer left project november 2001 since several people stepped picked support fink march 2008 project managed 6 administrators 89 developers active community march 2014 fink core team made nine active developers responsible central management project maintain essential packages fink community regularly adds support latest versions macos release latest fink versions starting version 0.39 support os x el capitan | [
6657,
8068,
11525,
3462,
8582,
10760,
2955,
7435,
6797,
7947,
9487,
788,
1813,
5397,
8213,
6680,
10900,
10394,
8476,
9245,
5155,
5670,
4775,
7722,
811,
6828,
5677,
6446,
7983,
1842,
823,
2872,
6583,
5819,
10172,
190,
9151,
3393,
10817,
70... | Test |
742 | 4 | Shell_shoveling:shell shoveling shell shoveling network security refers act redirecting input output shell service remotely accessed computing basic method interfacing operating system shell microsoft windows based systems program called cmd.exe command.com unix unix-like systems may variety programs bash ksh etc program accepts commands typed prompt executes usually real time displaying results referred standard output usually monitor screen shell shoveling process one programs set run perhaps silently without notifying someone observing computer accepting input remote system redirecting output remote system therefore operator shoveled shell able operate computer present console | [
6498,
7717,
939,
6797,
3856,
11442,
5492,
5397,
7325
] | Test |
743 | 4 | Alexandra_Elbakyan:alexandra elbakyan alexandra asanovna elbakyan kazakhstani graduate student computer programmer described internet pirate hiding science pirate queen creator site sci-hub nature listed 2016 top ten people mattered science ars technica compared aaron swartz new york times compared edward snowden elbakyan born almaty kazakhstan 6 november 1988 armenian slavic asian descent elbakyan undertook university studies almaty developed skills computer hacking year working computer security moscow gave finances proceed freiburg 2010 work brain–computer interface project developed interest transhumanism led summer internship georgia institute technology united states studied neuroscience consciousness 2009 obtained bachelor science degree computer science kazakh national technical university specializing information security began sci-hub return kazakhstan 2011 characterised science correspondent john bohannon awe-inspiring act altruism massive criminal enterprise depending ask following lawsuit brought us publisher elsevier elbakyan presently hiding due risk extradition elsevier granted 15 million injunction according 2016 interview neuroscience research hold enrolled history science master ’ program small private university undisclosed location thesis focuses scientific communication december 2016 nature publishing group named alexandra elbakyan one 10 people mattered science 2016 elbakyan sci-hub involved lawsuit 2017 time american chemical society acs sued site copyright infringement contributory copyright infringement trademark counterfeiting trademark infringement conversion later year court ruled favor acs fining sci-hub 4,800,000 damages elbakyan stated inspired communist ideals although consider strict marxist stated supports strong state stand western world want scientists russia native kazakhstan share fates scientists iraq libya syria 'helped usa become democratic particular elbakyan strongly critical former dynasty foundation associated figures believing foundation politicized tied russia liberal opposition fit legal definition foreign agent dynasty founder opinion financed researchers whose political views agreed elbakyan states began investigate foundation activities published findings online became target cyberharassment campaign dynasty supporters 2017 species parasitoid wasps discovered russian mexican entomologists named elbakyan idiogramma elbakyanae elbakyan offended writing analyse situation scientific publications real parasites scientific publishers sci-hub contrary fights equal access scientific information following event context long-running tense relations liberal pro-western wing russian scientific community blocked access sci-hub users russian federation sci-hub access later restored russia elbakyan said interview many fans contacted convinced opinion so-called 'science popularizers attacked internet considered opinion scientific community russian entomologist responsible naming wasp stated supports sci-hub event naming insult particular parasitoids closer predators parasites elbakyan strong supporter open access movement claims sci-hub mission falls perfectly line movement argues websites like sci-hub part goal open access proponents striving towards elbakyan believes via open access movement citizens become informed 2018 elbakyan asked supporters sci-hub join local pirate party order fight copyright laws changed | [
3495,
3817,
11659,
2864,
4752,
5973,
3223,
4956,
5373,
2558
] | None |
744 | 4 | Digital_Postmarks:digital postmarks digital postmark dpm technology applies trusted time stamps issued postal operator electronic document validates electronic signatures stores archives non-repudiation data needed support potential court challenge guarantees certainty date time postmarking global standard renamed electronic postal certification mark epcm 2007 shortly new iteration technology developed microsoft poste italiane key addition traditional postmarking technology integrity electronically postmarked item meaning kind falsification tampering easily definitely detected additionally content confidentiality guaranteed since document certification carried without access reading postal operator epcm eventually available upu international postal operators 191 member countries willing compliant standard thus granting interoperability certified communications postal operators united states us postal service operates non-global standard called electronic postmark although soon expected provide services utilizing epcm united states end 2010 authentidate authorized usps epm provider however contract allowed expire dpm fundamentally non-repudiation service supporting designed protect sanctity mail digital form working current infrastructure easy implement providing functionality even client-side software provides automated functionality client software digital postmark used variety business applications key dates development digital postmark recognizing great potential digital postmark numerous postal administrations worldwide begun deploying dpm-based solutions five postal services – canada france italy portugal united states – developed digital postmark use today major software developers also working incorporate global standard popular applications used millions people worldwide universal postal union upu identified trust services greatest opportunity global postal growth specifically identified digital postmark important trust service providing excellent defense online fraud abuse united states postal service usps electronic postmark epm © proprietary variation digital postmark issued usps introduced 1996 u.s postal service service offering provides proof integrity authentication electronic transactions applied email epostmarks inc. see epostmarks homepage usps epm web-based service third-party verify authenticity electronic content electronic proof postmarked postal service provides evidence support non-repudiation electronic transactions epm designed deter detect fraudulent tampering altering electronic data usps wrote key features electronic postmark usps listed laws relevant epm follows digital postmark dpm also network security mechanism developed penn state researchers ihab hamadeh george kesidis identify region packet set packets comes developed way combat spam denial-of-service virus attacks isolating source attacks still allowing good messages pass digital postmark works perimeter router marks packet border region-identifying data also called border router packet marking uses obsolete unused portion packet place regional mark-up room exist one portion packet region information broken hashed subsequently retrievable way | [
2848,
7075,
11684,
4490,
939,
3629,
7739,
479
] | Test |
745 | 4 | Differentiated_security:differentiated security differentiated security form computer security deploys range different security policies mechanisms according identity context user transaction makes much difficult scale replicate attacks since cluster/individual different security profile common weaknesses one way achieving subdividing population small differentiated clusters extreme individual belongs different class | [
11262,
8259,
2558
] | Test |
746 | 6 | Linear_Data_Set:linear data set linear dataset lds type data set organization used vsam computer data storage system data set allows physical addressing allows used systems operating systems benefit systems os access multiple disk spindles view single storage implementation limitations though make particularly useful higher level abstraction levels | [
2104,
1801,
2077
] | Test |
747 | 7 | Apache_Parquet:apache parquet apache parquet free open-source column-oriented data storage format apache hadoop ecosystem similar columnar-storage file formats available hadoop namely rcfile orc compatible data processing frameworks hadoop environment provides efficient data compression encoding schemes enhanced performance handle complex data bulk open-source project build apache parquet began joint effort twitter cloudera parquet designed improvement upon trevni columnar storage format created hadoop creator doug cutting first version—apache parquet 1.0—was released july 2013 since april 27 2015 apache parquet top-level apache software foundation asf -sponsored project apache parquet implemented using record-shredding assembly algorithm accommodates complex data structures used store data values column physically stored contiguous memory locations columnar storage provides following benefits moreover apache parquet implemented using apache thrift framework increases flexibility work number programming languages like c++ java python php etc august 2015 parquet supports big-data-processing frameworks including apache hive apache drill apache impala apache crunch apache pig cascading apache spark parquet compression performed column column enables different encoding schemes used text integer data strategy also keeps door open newer better encoding schemes implemented invented parquet automatic dictionary encoding enabled dynamically data small number unique values 10^5 enables significant compression boosts processing speed storage integers usually done dedicated 32 64 bits per integer small integers packing multiple integers space makes storage efficient optimize storage multiple occurrences value single value stored along number occurrences parquet implements hybrid bit packing rle encoding switches based produces best compression results strategy works well certain types integer data combines well dictionary encoding apache parquet comparable rcfile optimized row columnar orc file formats -- -all three fall category columnar data storage within hadoop ecosystem better compression encoding improved read performance cost slower writes addition features apache parquet supports limited schema evolution i.e. schema modified according changes data also provides ability add new columns merge schemas n't conflict | [
9344,
10377,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
3877,
10661,
11303,
5677,
1327,
7983,
7159,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
8644,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
7767,
... | None |
748 | 3 | Koronis_Rift:koronis rift koronis rift 1985 computer game lucasfilm games produced designed noah falstein originally developed atari 8-bit family commodore 64 koronis rift ported amstrad cpc apple ii msx tandy color computer 3 zx spectrum atari c64 version shipped flippy disk one version game side cassette version also released commodore 64 atari version required computers gtia chip installed order display properly koronis rift one two games lucasfilm games second wave december 1985 eidolon enhanced fractal technology developed rescue fractalus koronis rift atari 8-bit family additional colors commodore 64 allowed programmers gradually fade background rather suddenly popping rescue early example depth cueing computer game player controls surface rover vehicle enter several rifts alien planet effectively fractal mazes lost civilisation known ancients left strange machinery so-called hulks within rifts guarded armed flying saucers different design color depending respective color shields gunshots rover saucers varying effectiveness part game figuring shield weapon modules work best means drone robot rover retrieve modules various functions immediately obvious nearby hulks deployed attacking guardian saucers destroyed modules installed rover analyzed aboard player space ship sold rover carry six different modules time activated de-activated player sees fit large variety modules available different weapon shield modules varying power levels color codes modules increase rover power output mapper activating extra screen rover even one module turns retrieval probe bomb destroying hulks probe sent investigate instead retrieving modules conversely different types hulks exist including one simply swallows probe without yielding module requiring player purchase new probe possibly sell useful modules raise required funds goal game find destroy saucer control base hulk located 20th rift end player must explore rifts find hulks retrieve analyze modules understand color-coding weapons shields overcome increasingly aggressive dangerous saucers game solved several ways quickest acquire bomb module send probe saucer base bomb module activated info rated koronis rift four stars five stating best epyx four lucasfilm games computer gaming world stated kr game also puzzle ... arcade skill alone n't enough reviewer enjoy game difficult spent much time savescumming praised graphics sound zzap 64 thought game improvement predecessor rescue fractalus superior graphics gameplay given overall rating 96 | [
707,
9006
] | Test |
749 | 9 | RoboDK:robodk robodk offline programming simulation software industrial robots simulation software used many manufacturing projects including milling welding pick place packaging labelling palletizing painting robot calibration robodk library 300 robots 30 different manufacturers including abb fanuc kuka motoman universal robots user interface enables easy simulation n't require previous programming knowledge different types files imported including step iges files robodk post processors allow programs exported actual robot including abb rapid mod/prg fanuc ls ls/tp kuka krc/iiwa src/java motoman inform jbi universal robots urscript | [
4792,
7983,
6797,
823
] | Test |
750 | 7 | RushTera:rushtera rushtera software service provides accelerated upload/download storage sharing management large media files rushtera first demonstrated april 2012 nab show product marketed new york company attend llc founded 2008 2012 rushtera deployed cloudsigma since redeployed private infrastructure provided unitas global attend content ingest network uses geographically distributed virtual machines eliminate latency provide fast uploads downloads huge files rushtera became generally available november 2012 since rushtera used focus features post production several major motion pictures including academy award winner dallas buyers club well kill messenger world end black sea admission promax/bda used rushtera submissions platform hot spots showcase 2013 2014 company ceo chuck stormon interviewed january 2013 attend llc rushtera selected alternate finalist 13th 6,932 applicants 43north largest business idea competition world | [
467
] | None |
751 | 5 | Multiprotocol_Encapsulation:multiprotocol encapsulation multiprotocol encapsulation mpe short data link layer protocol defined dvb published part etsi en 301 192 provides means carry packet oriented protocols like instance ip top mpeg transport stream ts another encapsulation method unidirectional lightweight encapsulation ule developed standardized within ietf rfc 4326 mpe uses mpeg-2 private table sections carry user datagrams section header used convey mac addresses 1 6 bytes length may used format mpeg-2 dsm-cc sections happens compatible dvb mpe complete ip service offering mpeg-2 ts established organizing mpe streams one ip platforms carried broadcast network means ip/mac notification table mechanism also defined etsi en 301 192 major european satellite operators ses eutelsat offering commercial ip services using mpe astra2connect businesses consumers | [
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2996,
9909,
3383,
7865,
10171,
3133,
3006,
702,
4797,
5181,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
5... | Test |
752 | 4 | IDrive_Inc.:idrive inc. idrive inc. technology company specializes data backup applications flagship product idrive online backup service available windows mac linux ios iphone ipad android users pro softnet corporation founded 1995 based calabasas california within los angeles county pro softnet corporation initial product called ibackup acquired idrive.com domain name defunct company i-drive around mid-2003 idrive products mentioned lifehacker macworld pc world cnet tech crunch notebook review pc magazine engadget idrive based bangalore india pro softnet corporation plagued patent infringement lawsuits spoken publicly drain company resources idrive automated backup application runs windows mac ios android installed users select folders files backed user-specified times idrive offers incremental compressed backups users upload modified portions backup file files may also updated real time continuous backup option users ability limit bandwidth usage backup process previous 10 versions file automatically retained idrive automatically delete backup data even backup files deleted user computer users share files email social media sites including facebook twitter via mobile phone application android iphone windows phone idrive allows user back data compatible devices single account idrive application runs natively windows osx well several models nas devices made synology qnap netgear idrive provides multiple data retrieval options backup files accessed remotely internet browser idrive client software user wants access backup files idrive ship backup files 3 tb hard drive files idrive stored using 256-bit aes encryption allowing optional user-defined key must shared idrive idrive claims permanently stored servers idrive also provides activity reports backup status reports shared file reports idrivesync allows user synchronize files across different devices idrive portable usb hard drive designed local backup hard drive 3 terabyte storage space runs 5,400 rpm idrive lite free application ios blackberry android devices allows users back contacts list online users also restore backup contacts different devices even devices different operating systems 2012 idrive released idrive evs publicly available software development kit api kit includes built-in encryption command-line api allows users create applications use idrive cloud storage services idriveconnect allowing users access google docs sitting regular folder computer | [
2208,
9732,
823
] | Test |
753 | 5 | Firefly_Media_Server:firefly media server firefly media server formerly mt-daapd open-source audio media server daemon roku soundbridge itunes serves media files using roku server protocol rsp digital audio access protocol daap features include firefly media server formerly known mt-daapd renamed adopted new features support rsp support microsoft windows mac os x. firefly media server active development although attempts resurrect abortive effort continue project firefly2 media server without developers coming forward however old forums links many forked versions available new website since july 2009 development continues linux/freebsd fork named forked-daapd latest version forked-daapd v25.0 | [
9732,
11037,
5291,
5612,
6797,
9358,
11063,
5492,
823,
4219,
2045
] | Test |
754 | 7 | Cloudlet:cloudlet cloudlet mobility-enhanced small-scale cloud datacenter located edge internet main purpose cloudlet supporting resource-intensive interactive mobile applications providing powerful computing resources mobile devices lower latency new architectural element extends today ’ cloud computing infrastructure represents middle tier 3-tier hierarchy mobile device cloudlet cloud cloudlet viewed data center box whose goal bring cloud closer cloudlet term first coined m. satyanarayanan victor bahl ramón cáceres nigel davies prototype implementation developed carnegie mellon university research project concept cloudlet also known follow cloud mobile micro-cloud many mobile services split application front-end client program back-end server program following traditional client-server model front-end mobile application offloads functionality back-end servers various reasons speeding processing advent cloud computing back-end server typically hosted cloud datacenter though use cloud datacenter offers various benefits scalability elasticity consolidation centralization lead large separation mobile device associated datacenter end-to-end communication involves many network hops results high latencies low bandwidth reasons latency emerging mobile applications require cloud offload infrastructure close mobile device achieve low response time ideal case one wireless hop away example offload infrastructure could located cellular base station could lan-connected set wi-fi base stations individual elements offload infrastructure referred cloudlets cloudlets aim support mobile applications resource-intensive interactive augmented reality applications use head-tracked systems require end-to-end latencies less 16 ms cloud games remote rendering also require low latencies high bandwidth wearable cognitive assistance system combines device like google glass cloud-based processing guide user complex task futuristic genre applications characterized “ astonishingly transformative ” report 2013 nsf workshop future directions wireless networking applications use cloud resources critical path real-time user interaction consequently tolerate end-to-end operation latencies tens milliseconds apple siri google perform compute-intensive speech recognition cloud examples emerging space significant overlap requirements cloud cloudlet levels need strong isolation untrusted user-level computations b mechanisms authentication access control metering c dynamic resource allocation user-level computations ability support wide range user-level computations minimal restrictions process structure programming languages operating systems cloud datacenter requirements met today using virtual machine vm abstraction reasons used cloud computing today vms used abstraction cloudlets meanwhile important differentiators cloud cloudlet different cloud data centers optimized launching existing vm images storage tier cloudlets need much agile provisioning association mobile devices highly dynamic considerable churn due user mobility user far away may unexpectedly show cloudlet e.g. got international flight try use application personalized language translator user provisioning delay able use application impacts usability mobile device user moves away cloudlet currently using interactive response degrade logical network distance increases address effect user mobility offloaded services first cloudlet need transferred second cloudlet maintaining end-to-end network quality resembles live migration cloud computing differs considerably sense vm handoff happens wide area network wan since cloudlet model requires reconfiguration additional deployment hardware/software important provide systematic way incentivise deployment however face classic bootstrapping problem cloudlets need practical applications incentivize cloudlet deployment however developers heavily rely cloudlet infrastructure widely deployed break deadlock bootstrap cloudlet deployment researchers carnegie mellon university proposed openstack++ extends openstack leverage open ecosystem openstack++ provides set cloudlet-specific api openstack extensions 2015 cloudlet based applications commercially available 2017 national institute standards technology published draft standards fog computing cloudlets defined nodes fog architecture | [
4194,
1602,
4964,
2222,
754,
154
] | None |
755 | 5 | SIP_extensions_for_the_IP_Multimedia_Subsystem:sip extensions ip multimedia subsystem session initiation protocol sip signaling protocol selected 3rd generation partnership project 3gpp create control multimedia sessions two participants ip multimedia subsystem ims therefore key element ims framework sip developed internet engineering task force ietf standard controlling multimedia communication sessions internet protocol ip networks working application layer internet protocol suite several sip extensions added basic protocol specification order extend functionality extensions based request comments rfc protocol recommendations ietf 3gpp collaboration groups telecommunications associations aimed developing maintaining ims stated series requirements sip successfully used ims could addressed using existing capabilities extensions sip cases 3gpp collaborate ietf standardize new sip extensions meet new requirements case ietf evolves sip generic basis use extensions restricted ims framework 3gpp stated several general requirements stated operation ims include efficient use radio interface minimizing exchange signaling messages mobile terminal network minimum session setup time performing tasks prior session establishment instead session establishment minimum support required terminal support roaming non-roaming scenarios terminal mobility management supported access network sip support ipv6 addressing requirements involve protocol extensions sip header fields exchange user server information sip methods support new network functionality requirement registration re-registration de-registration event notifications instant messaging call control primitives additional capabilities call transference specific requirements finally also necessary protocols network services dhcp dns adapted work sip instance outbound proxy p-cscf location sip uniform resource identifier uri ip address resolution respectively mechanism sip extension negotiation user agents ua servers consisting three header fields supported require unsupported uas servers i.e user terminals call session control function cscf ims may use specify extensions understand client initiates sip dialog server states extensions requires used also extensions understood supported server send response list extensions requires extensions listed client message response server error response likewise server support client required extensions send error response list unsupported extensions kind extensions called option tags sip also extended new methods case user agents servers use allow header state methods support require use particular method particular dialog must use option tag associated method two extensions allow users specify preferences service ims provides caller preferences extension calling party able indicate kind user agent want reach e.g whether fixed mobile voicemail human personal business services capable provide methods supports search three header fields accept-contact describe desired destination user agents reject-contact state user agents avoid request-disposition specify request handled servers network i.e whether redirect search user sequentially parallel using user agent capabilities extension user agents terminals describe register others search according caller preferences extension headers purpose list capabilities contact header field register message aim event notification obtain status given resource e.g user one voicemail service receive updates status changes event notification necessary ims framework inform presence user i.e online offline others may waiting contact notify user p-cscf registration state know reachable public identities registered moreover event notification used provide additional services voicemail i.e notify new voice messages inbox end specific event notification extension defines framework event notification sip two new methods subscribe notify new header fields response codes two roles subscriber notifier entity interested state information resource subscriber sends subscribe message uniform resource identifier uri resource request initial line type event event header entity charge keeping track state resource notifier receives subscribe request sends back notify message subscription-state header well information status resource message body whenever resource state changes notifier sends new notify message subscriber kind event subscriber subscribe defined new event package event package describes new value subscribe event header well mime type carry event state information notify message also allow-events header indicate event notification capabilities 202 accepted 489 bad event response codes indicate subscription request preliminary accepted turned notifier understand kind event requested order make efficient use signaling messages also possible establish limited notification rate real-time notifications mechanism called event throttling moreover also mechanism conditional event notification allows notifier decide whether send complete notify message depending something new notify since last subscription event notification framework defines user agent subscribe events state resource specify state published sip extension event state publication defined allow user agents publish state event entity notifier thais responsible composing event state distributing subscribers state publication framework defines new method publish used request publication state resource specified request-uri reference event stated event header information carried message body functionality sending instant messages provide service similar text messaging defined instant messaging extension messages unrelated i.e originate sip dialog sent sip signaling network sharing resources control messages functionality supported new message method used send instant message resource stated request-uri content carried message body content defined mime type text/plain common one order instant messaging session related messages message session relay protocol msrp used refer method extension defines mechanism request user agent contact resource identified uri refer-to header field request message typical use mechanism call transfer call participant sends refer message tells recipient contact user agent identified uri corresponding header field refer message also implies event subscription result operation sender know whether recipient could contact third person however mechanism restricted call transfer since refer-to header field kind uri instance http uri require recipient visit web page basic sip specification requests final responses i.e 2xx response codes transmitted reliably retransmitted sender acknowledge message arrives i.e corresponding response code request ack request corresponding 2xx response code mechanism necessary since sip run reliable transport protocols tcp assure message delivered also unreliable ones udp offer delivery guarantees even possible kinds protocols present different parts transport network however scenario ims framework necessary extend reliability provisional responses invite requests session establishment start call reliability provisional responses extension provides mechanism confirm provisional responses 180 ringing response code lets caller know callee alerted successfully received extension defines new method prack request message used tell sender provisional response message received message includes rack header field sequence number matches rseq header field provisional response acknowledged also contains cseq number identifies corresponding invite request indicate user agent requests supports reliable provisional responses 100rel option tag used aim update method extension allow user agents provide updated session description information within dialog final response initial invite request generated used negotiate allocate call resources called party alerted ims framework required callee alerted chances session failure minimum important source failure inability reserve network resources support session resources allocated phone rings however ims reserve resources network needs know callee ip address port session parameters therefore necessary initial offer/answer exchange establish session started invite request basic sip exchange eventually causes callee alerted solve problem concept preconditions introduced concept caller states set constraints session i.e codecs qos requirements offer callee responds offer without establishing session alerting user establishment occur caller callee agree preconditions met preconditions sip extension affects sip new option tag precondition defined offer/answer exchanges session description protocol sdp format used describe streaming media initialization parameters carried body sip messages new sdp attributes meant describe current status resource reservation desired status reservation proceed session establishment confirmation status indicate reservation status confirmed ims initial session parameter negotiation done using provisional responses session description updating extensions along sdp body messages first offer described means sdp carried invite request deal caller supported codecs request answered provisional reliable response code 183 session progress carry sdp list supported codecs caller callee corresponding prack provisional answer used select codec initiate qos negotiation qos negotiation supported prack request starts resource reservation calling party network answered 2xx response code response sent called party selected codec starts resource reservation side subsequent update requests sent inform reservation progress answered 2xx response codes typical offer/answer exchange one update sent calling party reservation completed called party respond eventually finish allocating resources resources call place caller alerted ims framework fundamental handle user identities authentication authorization accounting purposes ims meant provide multimedia services ip networks also needs mechanism charge users functionality supported new special header fields private header extensions sip also known p-headers special header fields whose applicability limited private networks certain topology characteristics lower layers protocols designed specifically meet 3gpp requirements general solution available header fields used variety purposes including charging information networks call traverses private headers defined user database accessing private extensions asserted identity within trusted networks designed enable network trusted sip servers assert identity authenticated users within administrative domain previously agreed policies generation transport usage identification information extensions also allow users request privacy identities spread outside trust domain indicate must insert privacy token id privacy header field main functionality supported p-asserted-identity extension header proxy server receives request untrusted entity authenticates user i.e verifies user says inserts header identity authenticated forwards request usual way proxy servers receive sip request within trust domain i.e network trusted entities previously agreed security policies safely rely identity information carried p-asserted-identity header without necessity re-authenticating user p-preferred-identity extension header also defined user several public identities able tell proxy public identity included p-asserted-identity header user authenticated finally privacy requested proxies must withhold asserted identity information outside trusted domain removing p-asserted-identity headers forwarding user requests untrusted identities outside trust domain exist analogous extension headers handling identification services users instead users case uniform resource names used identify service e.g voice call instant messaging session iptv streaming access security ims consists first authenticating authorizing user done s-cscf establishing secure connections p-cscf user several mechanisms achieve security mechanisms agreement extension sip introduced provide secure mechanism negotiating security algorithms parameters used p-cscf terminal extension uses three new header fields support negotiation process necessity ims reserving resources provide quality service qos leads another security issue admission control protection denial-of-service attacks obtain transmission resources user agent must present authorization token network i.e policy enforcement point pep token obtained p-cscf may charge qos policy control interface policy control entity network i.e policy decision function pdf originally provides authorization token private extensions media authorization link session signaling qos mechanisms applied media network defining mechanisms obtaining authorization tokens p-media-authorization header field carry tokens p-cscf user agent extension applicable within administrative domains trust relationships particularly designed specialized sip networks like ims general internet source routing mechanism allows sender message specify partially completely route message traverses sip route header field filled sender supports functionality listing set proxies message visit ims context certain network entities i.e certain cscfs must traversed requests user listed route header field allow sender discover entities populate route header field mainly two extension header fields path service-route extension header field registering non-adjacent contacts provides path header field accumulates transmits sip uris proxies situated user agent registrar register message traverses way registrar able discover record sequence proxies must transited get back user agent ims every user agent served p-cscf discovered using dynamic host configuration protocol equivalent mechanism user enters ims network requests responses user agent must traverse proxy user registers home registrar s-cscf p-cscf adds sip uri path header field register message s-cscf receives stores information associated contact information user way s-cscf forward every request addressed user corresponding p-cscf listing uri route header field extension service route discovery registration consists service-route header field used registrar 2xx response register request inform registering user entity must forward every request originated ims registrar home network s-cscf also required requests handled entity include sip uri service-route header field user include sip uri route header field requests forwarded home s-cscf ims possible user multiple terminals e.g mobile phone computer application instances e.g video telephony instant messaging voice mail identified public identity i.e sip uri therefore mechanism needed order route requests desired device application globally routable user agent uri gru uri identifies specific user agent instance i.e terminal application instance globally i.e valid route messages user agent user agent internet uris constructed adding gr parameter sip uri either public sip uri value identifies user agent instance specially created uri reveal relationship gruu user identity privacy purposes commonly obtained registration process registering user agent sends uniform resource name urn uniquely identifies sip instance registrar i.e s-cscf builds gruu associates registered identity sip instance sends back user agent response s-cscf receives request gruu able route request registered sip instance efficient use network resources may include radio interface low-bandwidth access essential ims order provide user acceptable experience terms latency achieve goal sip messages compressed using mechanism known sigcomp signaling compression compression algorithms perform operation substituting repeated words message position dictionary words appear first approach dictionary may built message compressor sent decompressor along message however many words repeated different messages extended operations sigcomp define way use shared dictionary among subsequent messages moreover order speed process building dictionary along subsequent messages provide high compression ratios since first invite message sip provides static sip/sdp dictionary already built common sip sdp terms mechanism indicate sip message desired compressed mechanism defines comp=sigcomp parameter sip uris signals sip entity identified uri supports sigcomp willing receive compressed messages used request-uris indicates request compressed via header fields signals subsequent response compressed order obtain even shorter sip messages make efficient use resources content indirection extension makes possible replace mime body part message external reference typically http uri way recipient message decide whether follow reference fetch resource depending bandwidth available network address translation nat makes impossible terminal reached outside private network since uses private address mapped public one packets originated terminal cross nat therefore nat traversal mechanisms needed signaling plane media plane internet engineering task force rfc 6314 summarizes unifies different methods achieve symmetric response routing client-initiated connections sip signaling use stun turn ice combines previous ones media streams internet engineering task force rfc 6157 describes necessary mechanisms guarantee sip works successfully internet protocol versions transition ipv6 sip signaling messages transmitted heterogeneous ipv4/ipv6 networks long proxy servers dns entries properly configured relay messages across networks according recommendations user agents need implement extensions directly exchange media streams extensions related session description protocol offer/answer initial exchange used gather ipv4 ipv6 addresses ends establish direct communication apart explained extensions sip make possible ims work successfully also necessary ims framework interworks exchanges services existing network infrastructures mainly public switched telephone network pstn several standards address requirements following two services interworking pstn internet i.e ims network also pstn-sip gateways support calls one end network moreover sip info method extension designed carry user information terminals without affecting signaling dialog used transport dual-tone multi-frequency signaling provide telephone keypad function users | [
2818,
6403,
9745,
11413,
2456,
1437,
3742,
10270,
10271,
3105,
10924,
1709,
7214,
2996,
5433,
2558,
7368,
5071,
3792,
2901,
5469,
5470,
5472,
8674,
2409,
7802,
3198,
4863
] | Validation |
756 | 3 | Federation_(information_technology):federation information technology federation group computing network providers agreeing upon standards operation collective fashion term may used describing inter-operation two distinct formally disconnected telecommunications networks may different internal structures term may also used groups attempt delegate collective authority development prevent fragmentation telecommunication interconnection internal modus operandi different systems irrelevant existence federation joining two distinct networks collective authority networking systems federated means users able send messages one network client operate networks interacts independently example 2009 google allowed gmail users log aol instant messenger aim accounts gmail one could send messages gtalk accounts xmpp google/gtalk federated with—xmpp lingo federation s2s facebook msn live implementations support aim screen names vice versa may 2011 aim gmail federated allowing users network add communicate | [
2377,
362,
2346,
4746,
7210,
6286,
8735,
9967,
531,
8979,
3350,
3959,
8446,
574,
8159
] | None |
757 | 3 | DEC_Prism:dec prism prism parallel reduced instruction set machine 32-bit risc instruction set architecture isa developed digital equipment corporation dec final outcome number dec research projects 1982–85 time-frame point delivering silicon 1988 management canceled project next year work alpha started based heavily prism design period 1982 1985 fewer four attempts made create risc chip different dec divisions titan dec western research laboratory wrl palo alto california high-performance ecl based design started 1982 intended run unix safe streamlined architecture fast execution 64-bit design started year designed alan kotok spacewar fame dave orbits intended run vms hr-32 hudson risc 32-bit started 1984 rich witek dan dobberpuhl hudson fab intended used co-processor vax machine year dave cutler started cascade project decwest bellevue washington eventually cutler asked define single risc project 1985 selecting rich witek chief architect design started 64-bit chip later downsized 32-bits august 1985 first draft high-level design delivered work began detailed design prism specification developed period many months five-person team dave cutler dave orbits rich witek dileep bhandarkar wayne cardoza work 98 done 1985–86 heavily supported simulations pete benoit large vaxcluster terms integer operations prism architecture similar mips designs 32-bits instructions 6 highest 5 lowest bits instruction leaving 21 bits word encoding either constant register locations sixty-four 32-bit registers included opposed thirty-two mips usage otherwise similar prism mips lack register windows hallmark major risc design berkeley risc/sparc prism design notable several aspects instruction set notably prism included epicode extended processor instruction code defined number special instructions intended offer operating system stable abi across multiple implementations epicode given set 22 32-bit registers use set vector processing instructions later added well supported additional sixteen 64-bit vector registers could used variety ways two versions system planned decwest worked high-end ecl implementation known crystal semiconductor advanced development team worked microprism cmos version microprism finished first sent test fabrication april 1988 additionally cutler led development new microkernel-based operating system code-named mica offer unix-like vms-like personalities top common substrate services throughout prism period dec involved major debate future direction company newer workstations introduced performance benefit vax constantly eroded price/performance ratio completely undermined different groups within company debated best respond advocated moving vax high-end abandoning low-end workstations others suggested moving workstation market using commodity processor still others suggested re-implementing vax risc processor led considerable problems turf wars various groups competition divisions delayed architecture review n't closed 1986 work associated support chips memory management unit floating point unit later interrupted yet another debate whether design 32- 64-bit microprism design finalized april 1988 frustrated growing number losses cheaper faster competitive machines independently small group outside central engineering focused workstations unix/ultrix entertained idea using off-the-shelf risc processor build new family workstations group carried due diligence eventually choosing mips r2000 group acquired development machine prototyped port ultrix system initial meetings mips prototype machine took 90 days full production able start january 1989 resulting decstation 3100 family meeting reviewing various projects july 1988 company decided cancel prism continue mips workstations high-end vax products dave cutler left company soon every attempt produce faster vax could compete newer workstations eventually failed vax 9000 ran delays time shipped newer unix workstations already surpassed performance tiny fraction cost size apparently aware danger meeting prism canceled ken olsen started new project continue exploring risc-based vax indirectly led formation alpha project next year | [
7173,
9739,
2066,
7187,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
4144,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
7770,
3175,
8815,
6268,
3197,
639,
7313,
9371,
8861,
6815,
5793,
6818,
6821,
6311,
682,
7852,
4269,
9391,
2224,
2226,
7858... | Test |
758 | 8 | Web_Services_Test_Forum:web services test forum web services test forum wstf provides framework members web service community develop interoperability scenarios test implementations scenarios implementations wstf charge dues central governing authority i.e board wstf patterned initial creators bea systems fujitsu ibm oracle soapbuilders mailing list/community main focus test various web service specifications also serves forum entire web service community share ideas concerns open fashion wstf founded following basic principles unlike interoperability organizations work wstf center around individual specifications activities organized around concept test scenario scenarios made three parts scenario defined members wstf may implement using products open source projects deploy implementations onto publicly available systems test interoperability crosswise fashion problems issues discussed wstf mailing lists scenario may need clarified re-factored process implementation reaches certain level maturity implementers choose scenario implementations made visible outside wstf publishing whether published endpoints provide scenario implementations expected maintained indefinitely allows members wstf perform regression testing test new implementations verify behavior etc without requiring active participation implementer wstf chose keep work private couple reasons first entirely public forum members may feel free bring sensitive topics signing participation agreement members agree keep discussions private group thus allowing much open honest discussion second members wstf wanted wstf published scenario mean broad community support without formal publish step process would hard distinguish scenarios community support versus ones implemented one company scenario published 5 different implementations least two third implementor choose make public members wstf put implementations/endpoints scenario eligible vote restriction done ensure skin game allowed influence information process see wstf charter functional non-functional web service testing done help wsdl parsing regression testing performed identifying changes made thereafter web service regression testing needs categories three different ways namely changes wsdl changes code selective re-testing web service operations capture three changes three intermediate forms wsdl namely difference wsdl dwsdl unit wsdl uwsdl reduced wsdl rwsdl respectively used intermediate forms wsdls combined form combined wsdl cwsdl used regression testing web service help automatic web service change management awscm performing selection relevant test cases construct reduced test suite old test suite wstf produces following artifacts | [
9137,
3323
] | Test |
759 | 9 | Level_I_BASIC:level basic level basic dialect basic programming language shipped first trs-80 trs-80 model original prototype trs-80 model ran li-chen wang public domain version tiny basic demonstration executives tandy corporation president charles tandy tried enter salary tiny basic used 2-byte signed integers ranging 32,767 n't able result request floating-point math production version besides adding single-precision floating-point math tandy-employee steve leininger extended language support input/output routines keyboard crt reading writing cassettes language fit within 4 kb rom presentation announcing trs-80 leininger said went back wang basic completely tore 60 per cent integer overhead kind stuff trs-80 introduced three versions basic announced level language available trs-80 model ii briefly re-surfaced baseline package trs-80 model iii 1981 selling 699 compared 999 system model iii basic another microsoft product language identical model version addition commands output printer level basic supported following keywords like palo alto tiny basic based level basic tokenize keywords like microsoft basic used abbreviations reduce amount memory used keywords codice_29 codice_30 codice_31 codice_11 codice_33 codice_5 codice_35 codice_36 language supported 26 single-precision variables z two strings b one pre-defined array language lacked dim statement dimensioning array size determined available memory used program listing 4 bytes per item language lacked many common math functions manual provided subroutine listings square root exponentiation exponentials logarithms arithmetic sign trigonometry functions | [
7691,
1805,
9997,
786,
11412,
22,
3481,
9881,
797,
3233,
11683,
5925,
8101,
4136,
10666,
8494,
303,
7343,
11315,
315,
7355,
7486,
7870,
4160,
4674,
10750,
712,
847,
92,
11229,
2915,
9188,
5733,
11243,
2541,
8429,
5747,
6778,
6910,
1535
] | None |
760 | 3 | R6000:r6000 r6000 microprocessor chip set developed mips computer systems implemented mips ii instruction set architecture isa chip set consisted r6000 microprocessor r6010 floating-point unit r6020 system bus controller r6000 first implementation mips ii isa r6000 implemented emitter-coupled logic ecl mid- late 1980s trend implement high-end microprocessors high-speed logic ecl mips fabless company r6000 chip set fabricated bipolar integrated technology r6000 users control data systems cds used 80 mhz version high-end 4680-300 series inforserver server mips used r6000 rc6260 rc6280 servers | [
4098,
8327,
8711,
783,
7445,
9851,
4124,
8481,
5028,
6057,
938,
426,
8237,
7234,
1480,
10316,
6247,
6250,
6252,
6253,
5358,
10734,
6256,
5237,
3451
] | Test |
761 | 4 | Not_Just_Another_Bogus_List:another bogus list another bogus list njabl dns blacklist njabl maintained list known potential spam sources open mail relays open proxies open form mail http gateways dynamic ip pools direct spammers purpose able tag refuse e-mail thereby block spam certain sources njabl automatically retests listed open relays every 90 days open proxy ips portion njabl data used spamhaus xbl list njabl dynamic ip list originally came dynablock maintained independently since dynablock stopped updating december 2003 sorbs dynamic ip list also development dynablock aggressively inclusive njabl version march 1 2013 njabl process shut dnsbl zones emptied internet time remove njabl server configs ns pointed unallocated space 192.0.2.0/24 test-net-1 hopefully make shutdown obvious slower notice april 29 above-mentioned pointing dnsbl ns 192.0.2.0/24 done jan 02/2019 domain name njabl.org set expire dns servers switched tucows autorenew servers would cause lookups servers still removed configuration rejections | [
8224,
5591
] | None |
762 | 8 | DNSimple:dnsimple dnsimple managed domain name server service operated aetrion llc d/b/a dnsimple offers dns hosting domain registration ssl certificates dnsimple also icann-accredited domain registrar dnsimple founded 2010 anthony eden darrin eden first public version service launched july 2010 offered managed dns domain registration added later september 2010 partnership enom november 2011 dnsimple announced new proprietary dns record type called alias provides cname-like dns record apex domain september 2012 dnsimple acquired robodomain inc. provided domain management service robodomain whois software service robowhois simone carletti robodomain inc. founder joined dnsimple first official full-time employee dnsimple robodomain discontinued end 2013 december 2013 dnsimple migrated customers unicast new anycast network composed 5 points presence december 2014 dnsimple fell victim major distributed denial-of-service ddos attack across entire network resulted several hours downtime part mitigation plans company decided review implementation secondary dns support released begin 2015 dnsimple us company however company completely decentralized team members work remotely actively promote telecommuting company dns service actively used one let encrypt dns challenge validation seen download numbers docker hub | [
8204,
467,
2003,
11221,
1435,
9245
] | None |
763 | 2 | Masque_Attack:masque attack masque attack name ios vulnerability identified named computer security company fireeye july 2014 fireeye privately informed apple inc. issue july 26 2014 disclosed vulnerability public november 10 2014 blog post website vulnerability identified exist ios 7.1.1 7.1.2 8.0 8.1 8.1.1 beta jailbroken non-jailbroken ios devices vulnerability consists getting users download install apps deceptively created bundle identifier existing legitimate app deceptive app replace pose legitimate app long app one pre-installed along ios i.e. default apple apps – thus reason fireeye gave naming vulnerability masque attack november 13 2014 united states computer emergency readiness team us-cert part department homeland security released alert bulletin ta14-317a regarding masque attack apple stated november 14 aware incidents one customers affected attack | [
4081,
5563,
2558
] | Test |
764 | 9 | Solidity:solidity solidity object-oriented programming language writing smart contracts used implementing smart contracts various blockchain platforms notably ethereum developed gavin wood christian reitwiessner alex beregszaszi liana husikyan yoichi hirai several former ethereum core contributors enable writing smart contracts blockchain platforms ethereum solidity initially proposed august 2014 gavin wood language later developed ethereum project solidity team led christian reitwiessner present solidity primary language ethereum well private blockchains running platforms compete ethereum monax hyperledger burrow blockchain uses tendermint consensus swift deployed proof concept using solidity running burrow cornell university researcher stated solidity partially blame dao hack took place 2016 stated actually flaw exploit dao contract technically ethereum virtual machine evm operating intended solidity introducing security flaws contracts missed community missed designers language solidity statically-typed programming language designed developing smart contracts run evm solidity compiled bytecode executable evm solidity developers able write applications implement self-enforcing business logic embodied smart contracts leaving non-repudiable authoritative record transactions writing smart contracts smart contract specific languages solidity referred easy ostensibly already programming skills specified wood designed around ecmascript syntax make familiar existing web developers unlike ecmascript static typing variadic return types compared evm-targeting languages time serpent mutan solidity contained number important differences complex member variables contracts including arbitrarily hierarchical mappings structs supported contracts support inheritance including multiple inheritance c3 linearization application binary interface abi facilitating multiple type-safe functions within single contract also introduced later supported serpent documentation system specifying user-centric description ramifications method-call also included proposal known natural language specification example solidity program contract gavcoin solidity available | [
9248,
3713,
9921,
9859,
3462,
8554,
1935,
7248,
5330,
1908,
8916,
8854,
4827,
11612,
1087
] | Validation |
765 | 3 | Pcmicro:pcmicro pcmicro large bulletin board system bbs support site 1981 1998 world wide web became popular pcmicro bbs served central file repository non-commercial bbs software related utilities bbs fidonet member 1991-1997 support distribution site several shareware freeware bbs packages including remoteaccess proboard elebbs pcmicro later released telnet communications driver named netfoss allows dos-based bbs software used telnet bbs longer service today entire collection freeware shareware bbs software utilities found bbs archives http //archives.thebbs.org containing thousands third party add-ons bbs packages | [] | Test |
766 | 4 | Paul_M._Nakasone:paul m. nakasone paul miki nakasone born november 19 1963 four-star general united states army currently serves commander united states cyber command concurrently serves director national security agency chief central security service previously commander united states army cyber command nakasone took command united states second army cyber command october 2016 second army inactivation march 2017 may 2018 became head national security agency central security service united states cyber command nakasone born st. paul minnesota son edwin m. nakasone retired army colonel served military intelligence service world war ii mary anne nakasone née costello nakasone father second-generation japanese american nakasone grew white bear lake minnesota attended white bear high school married four children nakasone attended st. john university received commission graduation 1986 reserve officer training program nakasone also attended university southern california national defense intelligence college united states army war college holding master degrees also graduate united states army command general staff college nakasone held commands company battalion brigade levels also held foreign postings iraq afghanistan korea served senior intelligence officer battalion division corps levels nakasone served joint chiefs staff deputy director trans-regional policy 2012 promoted brigadier general previously served staff officer general keith b. alexander prior promoted lieutenant general 2016 nakasone deputy commanding general united states cyber command later commander cyber national mission force cyber command nakasone twice served staff officer joint chiefs staff director intelligence j2 international security assistance force afghanistan october 14 2016 took command united states second army united states army cyber command nakasone also given control united states cyber command joint task force-ares task-force designed coordinate electronic counter-terrorist activities islamic state served commander second army inactivated fourth time history march 31 2017 remains commander united states army cyber command january 2018 reported nakasone list potential replacements outgoing nsa director michael s. rogers february 2018 nominated promotion general april 2018 nakasone unanimously confirmed united states senate director national security agency head cyber command also promoted general | [
6017,
7137,
1189,
6343,
11335,
3305,
7145,
9517,
1838,
7759,
7887,
3154,
2419,
8276,
6005,
6136,
5308,
991
] | None |
767 | 4 | Relay_attack:relay attack relay attack computer security type hacking technique related man-in-the-middle replay attacks classic man-in-the-middle attack attacker intercepts manipulates communications two parties initiated one parties classic relay attack communication parties initiated attacker merely relays messages two parties without manipulating even necessarily reading peggy works high security building accesses using smart card purse approaches door building building detects presence smart card initiates exchange messages constitute zero-knowledge password proof card peggy building allows peggy enter mallory wants break building mallory approaches building device simulates smart card building responds initiating exchange messages mallory forwards message accomplice evelyn tailing peggy runs errands another part town evelyn relays message peggy smart card listens answer forwards answer mallory relays building continuing way mallory evelyn relay messages building peggy smart card building satisfied communicating peggy smart card building opens mallory enters | [
8694,
2558,
4863
] | Test |
768 | 3 | Circus_Charlie:circus charlie game six regular stages plus extra stage differing tasks completed charlie grabbing money bags performing dangerous tricks avoiding enemies completing stages etc. earns charlie points sixth stage completed game starts faster pace difficult exactly terms task completed levels charlie also races time bonus points awarded according time remaining running time cost player life standard arcade version 6 levels total levels 1 2 4 5 5 sublevels level 3 contains 7 sublevels sublevel gets difficult level 6 also 5 sublevels repeats long user lives level select version game player choose stages play limited number times whereupon level become unselectable ending game—after first five levels played limit player repeats trapeze stage lives exhausted famicom version trampoline stage omitted b mode levels repeated added difficulty game often shows famicom clone systems multicarts usually title screen altered remove copyright versions also levels split make separate games multicarts music comes american patrol blue danube mikie another konami arcade game headbutting teacher desk three times classroom stage make circus charlie appear giving player extra points circus charlie released along konami classic games nintendo ds compilation | [
8601,
10931,
9006
] | Validation |
769 | 8 | WebMethods_Glue:webmethods glue webmethods glue enterprise web services platform webmethods provides web services/soap capabilities existing java c/c++ applications developers use java-based product add enterprise web services integration legacy applications reduced programming effort embeddable product small footprint turns non-web service application one exposes functionality web services similar open source apache axis glue product provides layer web service interoperability existing applications webmethods glue features include created mind electric glue—as named—was company flagship product released two forms free unsupported standard version company-supported commercially licensed professional edition september 2003 glue featured microsoft press book microsoft .net j2ee interoperability toolkit webmethods acquired product part merger mind electric merger resulted rebranding product webmethods prefix become webmethods glue webmethods glue product 6.5.x maintenance ended may 31 2010 support ended year later http servlets xml soap wsdl uddi | [
10020,
5677,
2045,
10486,
7261
] | Test |
770 | 3 | Legacy_of_the_Wizard:legacy wizard legacy wizard originally released japan fantasy-themed action role-playing platform game released msx msx2 famicom japan nintendo entertainment system united states legacy wizard installment falcom dragon slayer series one five dragon slayer games localized outside japan game early example open-world non-linear action rpg combining action-rpg gameplay would later called metroidvania -style action-adventure elements game chronicles story drasle family abbreviation dragon slayer localized worzen family usa attempt destroy ancient dragon named keela magically entrapped painting within underground labyrinth accomplish goal must find dragon slayer magical sword protected four hidden crowns player must use unique abilities member family regain possession crowns destroy evil keela like many games era story legacy wizard explained almost entirely game instruction manual game contains little text little add even explain story game drasle family consists six members three generations plus family pet resembles small dinosaur player takes control members drasles pet sending one time vast underground cavern filled traps puzzles monsters search four crowns periodically returning family household surface change characters obtain password member family consists father mother son daughter pet different strengths weaknesses contribute goal characters seemingly powerful strengths offset proportionate limitations example father strongest attack power jump high rest family mother family relatively weak attributes one use specific magical items required find one crowns discovering utilizing character strengths player travels extensive dungeon eventually fighting four bosses gain crowns game vast labyrinth five major sections four contain boss guards one crowns fifth contains final boss section noticeably different characteristics different background music designed one particular playable character mind crowns acquired without player utilizing family members specific skills get sections dungeon therefore playable character must used point order complete game example one section may blocked bricks destroyed mattock player must use character use mattock get area four crowns acquired family young boy use magic crowns find dragon slayer use magical sword slay evil keela player encounter endless supply monsters running convoluted passageways character fire shots varying strength defeat monsters attacking uses character magic power monsters drop items defeated keys used open locked doors treasure chests bread restores player health potions restore magic power sometimes poison harms player money also collected defeated monsters spent shops inns located throughout dungeon characters legacy wizard must utilize several magical items quest acquired chests bought shops sometimes located impractical locations item effects include restoring character health magic power boosting attack power range environmental effects like enabling character fly move special bricks items used certain characters since accomplishing goals requires use items player determine character must used regain crown acquiring items finding properly use essence legacy wizard dragon slayer iv drasle family released msx2 home computer july 10 1987 ported famicom nihon falcom released july 17 1987 conversion often misattributed quintet due reference company name game ending credits composer yuzo koshiro confirmed pure coincidence since company n't formed two years later 2008 game released mobile phones japan 1up.com called hidden gem nes | [
3113,
10217,
9006,
10931,
11443,
9658,
1596
] | Test |
771 | 5 | RFB_protocol:rfb protocol rfb “ remote framebuffer ” open simple protocol remote access graphical user interfaces works framebuffer level applicable windowing systems applications including microsoft windows macos x window system rfb protocol used virtual network computing vnc derivatives default viewer/client uses tcp port 5900 connect server 5800 browser access also set use port alternatively server connect viewer listening mode default port 5500 one advantage listening mode server site configure firewall/nat allow access specified ports burden viewer useful server site computer expertise viewer user would expected knowledgeable although rfb started relatively simple protocol enhanced additional features file transfers sophisticated compression security techniques developed maintain seamless cross-compatibility many different vnc client server implementations clients servers negotiate connection using best rfb version appropriate compression security options support rfb originally developed olivetti research laboratory orl remote display technology used simple thin client atm connectivity called videotile order keep device simple possible rfb developed used preference existing remote display technologies rfb found second enduring use vnc developed vnc released open source software rfb specification published web since rfb free protocol anybody use orl closed 2002 key people behind vnc rfb formed realvnc ltd. order continue development vnc maintain rfb protocol current rfb protocol published realvnc website published versions rfb protocol follows developers free add additional encoding security types must book unique identification numbers maintainers protocol numbers clash clashing type numbers would cause confusion handshaking connection break cross-compatibility implementations list encoding security types maintained realvnc ltd separate protocol specification new types added without requiring specification reissued community version rfb protocol specification aims document existing extensions hosted tigervnc project terms transferring clipboard data currently way transfer text outside latin-1 character set vnc protocol pixel based although leads great flexibility i.e type desktop displayed often less efficient solutions better understanding underlying graphic layout like x11 desktop rdp protocols send graphic primitives high level commands simpler form e.g open window whereas rfb sends raw pixel data albeit compressed vnc protocol expresses mouse button state single byte binary up/down limits number mouse buttons eight effectively 7 given convention button 0 meaning “ disabled ” many modern mice enumerate 9 buttons leading forward/back buttons effect rfb | [
6797,
6993,
7857,
4729,
10747
] | Test |
772 | 7 | Social_BI:social bi social bi social business intelligence refers creation publishing sharing custom business analytics reports dashboards end users cloud technologies social collaborative bi use enterprise 2.0 tools practices business intelligence outputs purpose making collective decisions first enabled rapid growth social media networks 2009 social bi allows collaborative development post user-generated analytics among business analysts data mining professionals removed previous barriers self-service bi still employing traditional analytics applications social bi also interpreted providing business intelligence based social networks data example company selling consumer electronics goods needs know people responding latest advertisements promotions reports visualizations made using social media represent people talking real time pulling data different social media preparing understandable reports help company decide upon steps dashboards visualizations reports based social media help companies get efficient feedback act accordingly september 13 2011 dachis group introduced social business index provide insights ‘ social ’ companies stack similar corporations respective industries competitors provide ‘ social business ’ benchmarks company subsidiary geography department brand | [
4194,
5525
] | None |
773 | 0 | Sinewave_synthesis:sinewave synthesis sinewave synthesis sine wave speech technique synthesizing speech replacing formants main bands energy pure tone whistles first sinewave synthesis program sws automatic creation stimuli perceptual experiments developed philip rubin haskins laboratories 1970s program subsequently used robert remez philip rubin david pisoni colleagues show listeners perceive continuous speech without traditional speech cues i.e. pitch stress intonation work paved way view speech dynamic pattern trajectories articulatory-acoustic space | [
3533
] | None |
774 | 4 | Software_Defined_Perimeter:software defined perimeter software defined perimeter sdp also called black cloud approach computer security evolved work done defense information systems agency disa global information grid gig black core network initiative around 2007 connectivity software defined perimeter based need-to-know model device posture identity verified access application infrastructure granted application infrastructure effectively “ black ” dod term meaning infrastructure detected without visible dns information ip addresses inventors systems claim software defined perimeter mitigates common network-based attacks including server scanning denial service sql injection operating system application vulnerability exploits man-in-the-middle cross-site scripting xss cross-site request forgery csrf pass-the-hash pass-the-ticket attacks unauthorized users open source implementation done paid homeland security premise traditional enterprise network architecture create internal network separated outside world fixed perimeter consists series firewall functions block external users coming allows internal users get traditional fixed perimeters help protect internal services external threats via simple techniques blocking visibility accessibility outside perimeter internal applications infrastructure weaknesses traditional fixed perimeter model becoming ever problematic popularity user-managed devices phishing attacks providing untrusted access inside perimeter saas iaas extending perimeter internet software defined perimeters address issues giving application owners ability deploy perimeters retain traditional model value invisibility inaccessibility outsiders deployed anywhere – internet cloud hosting center private corporate network across locations simplest form architecture sdp consists two components sdp hosts sdp controllers 6 sdp hosts either initiate connections accept connections actions managed interactions sdp controllers via control channel see figure 1 thus software defined perimeter control plane separated data plane enable greater scalability addition components redundant higher availability sdp framework following workflow see figure 2 general workflow remains implementations application sdps favor certain implementations others client-to-gateway implementation one servers protected behind accepting sdp host accepting sdp host acts gateway clients protected servers implementation used inside enterprise network mitigate common lateral movement attacks server scanning os application vulnerability exploits password cracking man-in-the-middle pass-the-hash pth others alternatively implemented internet isolate protected servers unauthorized users mitigate attacks denial service sql injection os application vulnerability exploits password cracking man-in-the-middle cross-site scripting xss cross-site request forgery csrf others client-to-server implementation similar features benefits client-to-gateway implementation discussed however case server protected running accepting sdp host software instead gateway sitting front server running software choice client-to-gateway implementation client-to-server implementation typically based number servers protected load balancing methodology elasticity servers similar topological factors 13 server-to-server implementation servers offering representational state transfer rest service simple object access protocol soap service remote procedure call rpc kind application programming interface api internet protected unauthorized hosts network example case server initiating rest call would initiating sdp host server offering rest service would accepting sdp host implementing sdp use case reduce load services mitigate attacks similar ones mitigated client-to-gateway implementation client-to-server-to-client implementation results peer-to-peer relationship two clients used applications ip telephone chat video conferencing cases sdp obfuscates ip addresses connecting clients minor variation user also client-to-gateway-to-client configuration user wishes hide application server well data breaches involve intellectual property financial information hr data sets data available within enterprise network attackers may gain entrance internal network compromising one computers network move laterally get access high value information asset case enterprise deploy sdp inside data center partition network isolate high-value applications unauthorized users network access protected application thus mitigating lateral movement attacks depend useful protecting physical machines software overlay nature sdp also allows integrated private clouds leverage flexibility elasticity environments role sdps used enterprises hide secure public cloud instances isolation unified system includes private public cloud instances and/or cross-cloud clusters software-as-a-service saas vendors use sdp protect services implementation software service would accepting sdp host users desiring connectivity service would initiating hosts allows saas leverage global reach internet without enabling internet global attack surface infrastructure-as-a-service iaas vendors offer sdp-as-a-service protected on-ramp customers allows customers take advantage agility cost savings iaas mitigating wide range potential attacks platform-as-a-service paas vendors differentiate offering including sdp architecture part service gives end users embedded security service mitigates network-based attacks vast amount new devices connected internet back-end applications manage devices and/or extract information devices mission-critical act custodian private sensitive data sdps used hide servers interactions internet provide improved security up-time | [
899,
997,
2470,
4198,
4552,
3742,
3473,
7031,
7388,
2558
] | Validation |
775 | 7 | ClearTrial:cleartrial cleartrial multinational software developer headquartered chicago illinois usa company develops markets software service saas system designed biopharmaceutical medical device manufacturers planning outsourcing tracking clinical trials cleartrial software architecture follows project management methodology includes activity-based costing predicts level effort specific resource person perform given task activity level effort calculated based algorithm derived analysis cost time drivers affect task cleartrial work breakdown structure defines groups tasks subtasks comprise clinical trial way organizes defines total work scope clinical project cleartrial ’ clinical trial subject matter experts smes published peer-reviewed articles functional service provider outsourcing clinical trials adaptive clinical trials clinical trials medical devices well articles clinical trial trends april 2011 cleartrial named one five “ cool vendors life sciences ” research firm gartner march 29 2012 oracle corporation announced agreed acquire cleartrial transaction closed | [
467
] | Test |
776 | 3 | Alabama_Regional_Communications_System:alabama regional communications system alabama regional communications system arcs radio/alert notification communications district responsibility providing user-based administration operations maintenance interoperable communications system serves calhoun county alabama talladega county alabama motorola trunked radio system licensed federal communications commission fcc operate radio frequency spectrum 800 megahertz mhz public safety band calhoun-talladega 800 mhz communications system originally developed installed enhance interoperability provide alert notification community destruction chemical weapons anniston army depot anad communications system funded maintained federal grant known chemical stockpile emergency preparedness program csepp joint united states army federal emergency management agency fema program designed provide community education emergency preparedness resources event chemical agent emergency original communications system legacy system analog trunking went on-the-air 1998 quickly became primary means two-way communications public safety agencies calhoun talladega counties replacing standalone conventional radio repeaters 2006 csepp communications system upgraded digital project 25 motorola type ii smartzone version 7.4 linear simulcast/multicast trunked 800 mhz communications system facilities anad known anniston chemical activity anca stored approximately seven percent nation chemical weapon stockpile including vx nerve agent sarin gb agent anad one nine united states army installations united states stored chemical weapons united states army began incinerating stored weapons august 9 2003 destruction anad chemical weapons stockpile controversial part potential danger surrounding community incident occur weapons disposal operations september 2011 us army chemical materials agency cma successfully completed safe elimination anad ’ chemical weapons stockpile result completion chemical warfare disposal operations anad federal funding communities surrounding anniston army depot end march 31 2012 includes funding operations maintenance csepp communications system years community become increasingly dependent upon capabilities communications system particular reliability interoperability capacity in-building coverage provides 24-7-365 voice data communications services nearly 3,000 users including law enforcement fire rescue emergency medical services school facilities buses hospitals transportation utilities many agencies also provides activation signaling almost 200 outdoor warning sirens located throughout counties time chemical weapons disposal completed system serving nearly 100 percent mission-critical communications needs calhoun talladega county preparation end csepp grant funding local officials explored alternative strategies generate funds would allow continued service operation existing communications system support cooperation local state elected officials fema consulting firms users system exploratory committee crafted legislation would allow users take ownership system june 15 2011 alabama governor robert j. bentley signed house bill 389 law act 2011-675 create radio/alert notification communications district purpose legislation create mechanism community transition csepp communications system federal grant funding locally generated funding operations ownership provided new alabama law codified sections 11-31-1 11-31-4 code alabama 1975 amended calhoun talladega county commissions made respective appointments communications district board directors term appointment listed parenthesis duly appointed board directors convened first time september 1 2011 first day appointment terms members present motion passed unanimously officially name communications district alabama regional communications system arcs board directors meetings open public regularly scheduled monthly meetings held second tuesday every month oxford alabama police department municipal court 600 stanley merrill drive oxford alabama 36203 april 1 2012 arcs become fully responsible administration operation 800 mhz system assets estimated value approximately 100 million dollars time cost operating system 100 percent funded revenue collected user fees based current predicted costs operate maintain system arcs board directors determined monthly user fee 22.50 per two-way radio device mobile portable modem siren control 50.00 per dispatch console rate applies local users calhoun talladega county formula determining user fee based total estimated annual costs operate communications system compared projected total number users subscribing system current user fees established based approximately 2,800 users projected annual cost approximately 760,000 operate maintain system | [
2948,
9373
] | Validation |
777 | 5 | Gigabit_Video_Interface:gigabit video interface gigabit video interface gvif digital video serial interface developed sony 1996 high quality uncompressed video transmission digital video hardware intended primarily automotive applications compatible hdcp encryption system gvif transmits uncompressed serial data speeds 1.95 gbit/s gvif transmits single differential pair result cable thin transmission distances ten meters possible gvif bus used circa 2000 onwards many mid range vehicles including land rover discovery 3 range rover lexus models toyota prius gvif bus primarily carrying video signal integrated satellite navigation unit vehicle display also known head unit gvif bus vehicles carried video despite specification allowing data stuffing information | [
3629
] | Test |
778 | 4 | WindowsSCOPE:windowsscope windowsscope memory forensics reverse engineering product windows used acquiring analyzing volatile memory one uses detection reverse engineering rootkits malware windowsscope supports acquisition analysis windows computers running windows xp windows 10 windowsscope supports software-based acquisition well hardware-assisted methods locked unlocked computers windowsscope add-on hardware memory acquisition uses pci express bus direct access system memory memory snapshots acquired windowsscope stored repository memory snapshots repository compared track changes system time windowsscope shows processes dlls drivers running computer time memory snapshot well open network sockets file handles registry key handles also provides disassembly control flow graphing executable code windowsscope live version tool allows analysis performed mobile device | [
5284,
4423,
9319,
6797,
4589,
3854,
10173,
7515,
6813,
9791
] | None |
779 | 2 | Intel_Inspector:intel inspector intel inspector successor intel thread checker memory thread checking debugging tool increase reliability security accuracy c/c++ fortran applications memory checking includes memory leaks dangling pointers uninitialized variables use invalid memory references mismatched memory allocation deallocation stack memory checks stack trace controllable stack trace depth thread checking includes race conditions deadlocks depth configurable call stack analysis diagnostic guidance built-in knowledge threading building blocks tbb openmp posix win32 threads available part intel parallel studio limitations | [
1954,
6184,
814,
7983,
8531,
7097,
3162,
1916,
2045,
3962
] | Test |
780 | 5 | Parallel_port:parallel port parallel port type interface found computers personal otherwise connecting peripherals name refers way data sent parallel ports send multiple bits data parallel communication opposed serial interfaces send bits one time parallel ports require multiple data lines cables port connectors tend larger contemporary serial ports require one data line many types parallel ports term become closely associated printer port centronics port found personal computers 1970s 2000s industry de facto standard many years finally standardized ieee 1284 late 1990s defined enhanced parallel port epp extended capability port ecp bi-directional versions today parallel port interface virtually non-existent rise universal serial bus usb devices along network printing using ethernet wi-fi connected printers parallel port interface originally known parallel printer adapter ibm pc-compatible computers primarily designed operate printers used ibm eight-bit extended ascii character set print text could also used adapt peripherals graphical printers along host devices designed communicate system wang robert howard prentice robinson began development low-cost printer centronics subsidiary wang laboratories produced specialty computer terminals printer used dot matrix printing principle print head consisting vertical row seven metal pins connected solenoids power applied solenoids pin pulled forward strike paper leave dot make complete character glyph print head would receive power specified pins create single vertical pattern print head would move right small amount process repeated original design typical glyph printed matrix seven high five wide models used print head 9 pins formed glyphs 9 7 left problem sending ascii data printer serial port minimum pins wires requires device buffer data arrives bit bit turn back multi-bit values parallel port makes simpler entire ascii value presented pins complete form addition seven data pins system also needed various control pins well electrical grounds wang happened surplus stock 20,000 amphenol 36-pin micro ribbon connectors originally used one early calculators interface required 21 pins rest grounded connected connector become closely associated centronics popularly known centronics connector centronics model 101 printer featuring connector released 1970 host sent ascii characters printer using seven eight data pins pulling high +5v represent 1 data ready host pulled strobe pin low 0 v. printer responded pulling busy line high printing character returning busy low host could send another character control characters data caused actions like codice_1 codice_2 host could also printer automatically start new line pulling autofeed line high keeping host carefully watch busy line ensure feed data printer rapidly especially given variable-time operations like paper feed printer side interface quickly became industry de facto standard manufacturers used various connectors system side variety cables required example ncr used 36-pin micro ribbon connector ends connection early vax systems used dc-37 connector texas instruments used 25-pin card edge connector data general used 50-pin micro ribbon connector ibm implemented parallel interface ibm pc used db-25f connector pc-end interface creating familiar parallel cable db25m one end 36-pin micro ribbon connector theory centronics port could transfer data rapidly 75,000 characters per second far faster printer averaged 160 characters per second meaning port spent much time idle performance defined rapidly host could respond printer busy signal asking data improve performance printers began incorporating buffers host could send data rapidly bursts reduced eliminated delays due latency waiting next character arrive host also freed host perform operations without causing loss performance performance improved using buffer store several lines printing directions eliminating delay print head returned left side page changes doubled performance otherwise unchanged printer case centronics models like 102 308 ibm released ibm personal computer 1981 included variant centronics interface— ibm logo printers rebranded epson could used ibm pc ibm standardized parallel cable db25f connector pc side 36-pin centronics connector printer side vendors soon released printers compatible standard centronics ibm implementation original ibm parallel printer adapter ibm pc designed support 8-bit data bidirectionally 1981 allowed port used purposes output printer accomplished allowing data lines written devices either end cable required ports host bidirectional feature saw little use removed later revisions hardware years later 1987 ibm reintroduced bidirectional interface ibm ps/2 series could enabled disabled compatibility applications hardwired expect printer port bidirectional printer market expanded new types printing mechanisms appeared often supported new features error conditions could represented existing port relatively status pins ibm solution could support trivial implement time supported led bi-tronics system introduced hp laserjet 4 1992 used four existing status pins error select pe busy represent nibble using two transfers send 8-bit value bi-tronics mode known nibble mode indicated host pulling select line high data transferred host toggles autofeed low changes handshaking protocols improved performance reaching 400,000 cps printer 50,000 cps back host major advantage bi-tronics system driven entirely software host uses otherwise unmodified hardware pins used data transfer back host already printer-to-host lines introduction new devices like scanners multi-function printers demanded much performance either bi-tronics ibm style backchannels could handle two standards become popular purposes enhanced parallel port epp originally defined zenith electronics similar ibm byte mode concept changes details handshaking allow 2 mbyte/s extended capability port ecp essentially entirely new port physical housing also adds direct memory access based isa run-length encoding compress data especially useful transferring simple images like faxes black-and-white scanned images ecp offers performance 2.5 mbyte/s directions enhancements collected part ieee 1284 standard first release 1994 included original centronics mode compatibility mode nibble byte modes well change handshaking already widely used original centronics implementation called busy lead toggle change line data busy-by-line whereas ieee 1284 calls busy toggle received character busy-by-character reduces number busy toggles resulting interruptions sides 1997 update standardized printer status codes 2000 epp ecp modes moved standard well several connector cable styles method daisy chaining eight devices single port host systems print servers may use strobe signal relatively low voltage output fast toggle issues might cause intermittent printing missing repeated characters garbage printing printer models may switch setting set busy character others may require handshake adapter dataproducts introduced different implementation parallel interface printers used dc-37 connector host side 50 pin connector printer side—either dd-50 sometimes incorrectly referred db50 block shaped m-50 connector m-50 also referred winchester dataproducts parallel available short-line connections long-line version using differential signaling connections dataproducts interface found many mainframe systems 1990s many printer manufacturers offered dataproducts interface option wide variety devices eventually designed operate parallel port devices uni-directional one-way devices meant respond information sent pc however devices zip drives able operate bi-directional mode printers also eventually took bi-directional system allowing various status report information sent advent usb parallel interface adapted access number peripheral devices printers one early use parallel port dongles used hardware keys supplied application software form software copy protection uses included optical disc drives cd readers writers zip drives scanners external modems gamepads joysticks earliest portable mp3 players required parallel port connection transferring songs device adapters available run scsi devices via parallel devices eprom programmers hardware controllers could connected via parallel port pc-compatible systems 1980s 1990s one three ports communication interfaces defined like printer port present 0x3bc second port row 0x378 becomes logical parallel port 1 0x278 becomes logical parallel port 2 bios sometimes printer ports jumpered share interrupt despite io addresses i.e one used interrupt-driven time cases bios supports fourth printer port well base address differs significantly vendors since reserved entry fourth logical printer port bios data area bda shared uses ps/2 machines s3 compatible graphics cards typically requires special drivers environments dr-dos 7.02 bios port assignments changed overridden using lpt1 lpt2 lpt3 optionally lpt4 config.sys directives dos-based systems make logical parallel ports detected bios available device names lpt1 lpt2 lpt3 corresponding logical parallel port 1 2 3 respectively names derive terms like line print terminal local print terminal line printer similar naming convention used dec systems well cp/m 86-dos lst dos parallel printers could accessed directly command line example command type c \autoexec.bat lpt1 would redirect contents autoexec.bat file printer port prn device also available alias lpt1 operating systems like multiuser dos allow change fixed assignment different means dos versions use resident driver extensions provided mode users change mapping internally via config.sys prn=n directive dr-dos 7.02 higher dr-dos 7.02 also provides optional built-in support lpt4 underlying bios supports prn along con aux others invalid file directory names dos windows even windows xp even ms-dos device path name vulnerability windows 95 98 causes computer crash user types c \con\con c \prn\prn c \aux\aux windows explorer address bar microsoft released patch fix bug newly installed windows 95 98 operating systems still bug special print command also existed achieve effect microsoft windows still refers ports manner many cases though often fairly hidden sco unix linux first parallel port available via filesystem /dev/lp0 linux ide devices use paride parallel port ide driver consumers usb computer networks replaced parallel printer port connections printers devices many manufacturers personal computers laptops consider parallel legacy port longer include parallel interface smaller machines less room large parallel port connectors usb-to-parallel adapters available make parallel-only printers work usb-only systems pci pci-express cards provide parallel ports also print servers provide interface parallel port network usb-to-epp chips also allow non-printer devices continue work modern computers without parallel port electronics hobbyists parallel port still often easiest way connect external circuit board faster common legacy port serial port requires serial-to-parallel converter requires far less interface logic software usb target interface however microsoft operating systems later windows 95/98 prevent user programs directly writing reading lpt without additional software kernel extensions current cnc milling machines also often make use parallel port directly control machine motors attachments traditionally ibm pc systems allocated first three parallel ports according configuration table three printer ports exist unused slot port addresses others moved example port 0x3bc exist port 0x378 become first logical parallel port base address 0x3bc typically supported printer ports mda hercules display adapters whereas printer ports provided mainboard chipset add-on cards rarely allow configured base address therefore absence monochrome display adapter common assignment first logical parallel port therefore also corresponding lpt1 dos device driver today 0x378 even though default still 0x3bc would selected bios detects printer port address irq lines typically configurable hardware well assigning interrupt one printer port avoided typically cause one corresponding ports work polled mode port addresses assigned slot determined reading bios data area bda 0000h:0408h bit-to-pin mapping standard parallel port spp indicates hardware inversion bit versions windows use windows nt kernel well dos operating systems programs could access parallel port simple outportb inportb subroutine commands operating systems windows nt unix netbsd freebsd solaris 386bsd etc microprocessor operated different security ring access parallel port prohibited unless using required driver improves security arbitration device contention linux inb outb used process run root ioperm command used allow access base address alternatively ppdev allows shared access used userspace appropriate permissions set cross-platform library parallel port access libieee1284 also available many linux distributions provides abstract interface parallel ports system access handled open-claim-release-close sequence allows concurrent access userspace older parallel printer ports 8-bit data bus four pins control output strobe linefeed initialize select five control input ack busy select error paper data transfer speed 150 kbit/s newer epps enhanced parallel ports 8-bit data bus control pins normal parallel printer port newer ports reach speeds 2 mb/s pinouts parallel port connectors inverted lines true logic low inverted logic high true pin 25 db25 connector might connected ground modern computers hardware ic chips | [
3457,
7041,
5384,
9992,
11657,
1147,
780,
6797,
10635,
8976,
8850,
4244,
533,
405,
7188,
7445,
2201,
6556,
9633,
1186,
548,
1958,
7591,
1194,
7215,
9907,
1463,
2871,
823,
3514,
4409,
4796,
8898,
6854,
3272,
7626,
6859,
2383,
5711,
5457,
... | None |
781 | 3 | Apple_A12X:apple a12x apple a12x bionic 64-bit system chip soc designed apple inc first appeared 11-inch ipad pro third-generation 12.9-inch ipad pro announced october 30 2018 a12x variant a12 apple claims 35 percent faster single-core cpu performance 90 percent faster multi-core cpu performance predecessor a10x a12x features apple-designed 64-bit armv8-a octa-core cpu four high-performance cores called vortex four energy-efficient cores called tempest vortex cores 7-wide decode out-of-order superscalar design tempest cores 3-wide decode out-of-order superscalar design like mistral cores tempest cores based apple swift cores apple a6 similar performance arm cortex-a73 cpu cores apple ’ first soc octa core cpu a12x integrates apple-designed septa core graphics processing unit gpu twice graphics performance a10x embedded a12x m12 motion coprocessor a12x includes dedicated neural network hardware apple calls next-generation neural engine neural network hardware found a12 perform 5 trillion operations per second a12x manufactured tsmc using 7 nm finfet process contains 10 billion transistors vs. 6.9 billion a12 a12x paired 4 gb lpddr4x memory third-generation 12.9 ipad pro 11 ipad pro 6 gb 1tb storage configurations | [
9732,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
8222,
1057,
2551,
38,
6183,
1576,
4139,
7211,
8237,
9774,
2097,
8250,
8253,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
10840,
9312,
9826,
99,
8806,
8812,
6258,
10357,
10361,
4220,
10365,
6... | Test |
782 | 8 | Secure_Islands:secure islands secure islands technologies ltd. israeli privately held technology company headquartered 5 menachem begin ave. beit dagan subsequently acquired microsoft company develops markets information protection control ipc solutions secure islands technologies ltd. founded two brothers aki yuval eldar late 2006 develop sell advanced data security solutions jerusalem-based start-up company suggested new solution data protection embedding security directly data secure islands builds software designed classify sensitive information automatically based policies outlined enterprise wrap appropriate level digital rights management drm microsoft acquired israeli cyber-sec startup secure islands 2015 secure islands technologies ltd. software based active data immunization concept secure islands ’ data immunization technology uniquely embeds protection within information moment creation initial organizational access process automatic accompanies sensitive information throughout lifecycle creation usage collaboration storage archival company iqprotector product cloud-based classifies unstructured data automates irm classification endpoints | [
2818,
259,
4356,
10245,
6150,
11524,
6797,
1935,
10900,
3605,
11030,
3224,
11549,
7838,
7456,
929,
5666,
3875,
7970,
11559,
1832,
6441,
6827,
7215,
3890,
11060,
8757,
7359,
4289,
194,
3527,
9033,
6476,
10957,
4816,
4051,
9812,
11221,
11605,... | None |
783 | 3 | R2000_(microprocessor):r2000 microprocessor r2000 32-bit microprocessor chip set developed mips computer systems implemented mips instruction set architecture isa introduced january 1986 first commercial implementation mips architecture first commercial risc processor available companies r2000 competed digital equipment corporation dec vax minicomputers motorola 68000 intel corporation 80386 microprocessors r2000 users included ardent computer dec silicon graphics northern telecom mips unix workstations chip set consisted r2000 microprocessor r2010 floating-point accelerator four r2020 write buffer chips core r2000 chip executed non-floating-point instructions simple short pipeline chip also controlled external code data caches made fast standard sram chips organized direct indexing one-cycle read latency r2000 chip contained small translation lookaside buffer mapping virtual memory addresses r2010 chip held floating point registers floating point data paths longer simple pipeline writes main memory dram took tens cycles fully complete r2020 chips queued completed 4 pending writes main memory allowing r2000 core proceed without stalling absence cache misses chip set sustained instruction completion rate one instruction per alu cycle much faster non-risc microprocessors time needed several cycles per instruction 1986 also saw similar technology sun first sparc microprocessor hewlett packard first pa-risc microprocessor overall speed limited cache size cache cycle time r2000 chip set sram initially sold complete circuit board ensure good cache bus timings 1987 system builders began using chip set arbitrary new board designs r2000 available 8.3 12.5 15 mhz grades die contained 110,000 transistors measured 80 mm 2.0 μm double-metal cmos process mips fabless semiconductor company capability fabricate integrated circuits chip set initially fabricated mips sierra semiconductor toshiba december 1987 mips licensed integrated device technology lsi logic performance semiconductor also fabricate market r2000 sierra toshiba continued serve foundries lsi fabricated chip set 2.0 μm double-metal cmos process marketed lr2000 performance semiconductor fabricated chip set pace-i 0.8 μm double-metal cmos process marketed pr2000 1988 improved version introduced r2000a composed r2000a r2010a ics operated 12.5 16.67 mhz used extensively embedded applications printer controllers 1988 r2000 followed r3000 using similar overall system design faster chip implementation | [
4098,
8327,
8711,
3597,
7954,
7445,
9851,
4124,
8481,
5028,
8231,
6057,
938,
426,
9003,
8237,
9391,
7234,
10051,
3142,
1480,
10316,
11604,
6247,
6250,
2155,
6252,
6253,
5358,
6256,
5873,
8944,
5237,
1399,
760,
3451
] | Validation |
784 | 2 | IPad_Mini_(1st_generation):ipad mini 1st generation first-generation ipad mini stylized marketed ipad mini mini tablet computer designed developed marketed apple inc announced october 23 2012 fourth major product ipad line first ipad mini line features reduced screen size contrast standard features similar internal specifications ipad 2 including display resolution first generation ipad mini received positive reviews reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage lack retina display october 16 2012 apple announced media event scheduled october 23 california theatre san jose california company predisclose subject event widely expected ipad mini day event apple ceo tim cook introduced new version macbook family new generations macbook pro mac mini imac ipad mini higher end fourth-generation ipad released november 2 2012 nearly apple markets 32 gb 64 gb models discontinued release successor ipad mini 2 october 22 2013 almost 3 years june 19 2015 remaining 16 gb model discontinued well well discontinued stores ipad mini longer receives software updates supported apple ipad mini shipped ios 6.0 act hotspot carriers sharing internet connection wi-fi bluetooth usb also access app store digital application distribution platform ios developed maintained apple service allows users browse download applications itunes store developed xcode ios sdk published apple app store garageband imovie iphoto iwork apps pages keynote numbers available latest version currently ios 9.3.6 ipad mini comes several pre-installed applications including siri safari mail photos video music itunes app store maps notes calendar game center photo booth contacts like ios devices ipad sync content data mac pc using itunes although ios 5 later managed backed icloud although tablet designed make telephone calls cellular network users use headset built-in speaker microphone place phone calls wi-fi cellular using voip application skype device dictation using voice recognition technology iphone 4s user speaks ipad types say screen provided ipad connected wi-fi cellular network device optional ibooks application displays books epub-format content downloaded ibookstore several major book publishers including penguin books harpercollins simon schuster macmillan committed publishing books device despite direct competitor amazon kindle barnes noble nook amazon.com barnes noble offer e-reader apps ipad september 17 2014 ios 8 released first generation ipad mini apple devices however newer features software supported due relatively aged hardware shared ipad 2 september 16 2015 ipad mini received ios 9 update n't new multitasking features featured ipads june 13 2016 apple announced ios 10 update major updates mobile operating system however ipad mini receive update along devices using a5 processor including iphone 4s ipad 2 ipad 3rd generation ipod touch 5th generation due hardware limitations apple stopping latest ios updates ipad mini expected many industry however led criticism device sale june 2015 june 2016 versions operating system beyond ios 9 made available tablet four buttons one switch ipad mini including home button near display returns user home screen three aluminum buttons right side top wake/sleep volume volume plus software-controlled switch whose function varies software updates tablet manufactured either without capability communicate cellular network models connect wireless lan via wi-fi ipad mini available 16 32 64 gb internal flash memory expansion option apple sells camera connection kit sd card reader used transfer photos videos ipad mini features partially hardware ipad 2 screens resolutions 1024 x 768 ipad mini smaller screen thus higher pixel density ipad 2 163 ppi vs 132 ppi unlike ipad 2 5 mp 1.2 mp cameras lightning connector system-on-chip a5 one found later revision ipad 2 32 nm audio processor found iphone 5 ipad 4th generation allows ipad mini siri voice dictation unlike ipad 2 graphics processor gpu ipad mini one found ipad 2 powervr sgx543mp2 ipad mini initially featured slate silver colors however release mini 2 slate color changed space gray silver color remained smart cover introduced ipad 2 screen protector magnetically attaches face ipad smaller version available ipad mini 1 later models including ipad mini 4 also use smart cover cover three folds allow convert stand held together magnets smart covers microfiber bottom cleans front ipad wakes unit cover removed comes six colors polyurethane apple offers accessories including bluetooth keyboard several types earbuds headphones many adapters lightning connector applecare free engraving also available ipad mini reviews first generation ipad mini positive reviewers praising device size design availability applications criticizing use proprietary power connector lack expandable storage retina display device competes tablets amazon kindle fire hd google nexus 7 barnes noble nook hd joshua topolsky verge praised industrial design ipad mini however panned lack retina display price | [
10755,
9732,
1549,
5647,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
6186,
4139,
6700,
7211,
1074,
8754,
9784,
8253,
576,
1090,
8783,
4180,
10838,
1623,
3672,
10840,
9312,
3681,
9826,
8806,
3691,
2673,
6258,
10357,
6264,
4220,
... | Test |
785 | 3 | Amdahl's_law:amdahl law computer architecture amdahl law amdahl argument formula gives theoretical speedup latency execution task fixed workload expected system whose resources improved named computer scientist gene amdahl presented afips spring joint computer conference 1967 amdahl law often used parallel computing predict theoretical speedup using multiple processors example program needs 20 hours using single processor core particular part program takes one hour execute parallelized remaining 19 hours execution time parallelized regardless many processors devoted parallelized execution program minimum execution time less critical one hour hence theoretical speedup limited 20 times formula_1 reason parallel computing many processors useful highly parallelizable programs amdahl law formulated following way furthermore shows theoretical speedup execution whole task increases improvement resources system regardless magnitude improvement theoretical speedup always limited part task benefit improvement amdahl law applies cases problem size fixed practice computing resources become available tend get used larger problems larger datasets time spent parallelizable part often grows much faster inherently serial work case gustafson law gives less pessimistic realistic assessment parallel performance task executed system whose resources improved compared initial similar system split two parts example computer program processes files disk part program may scan directory disk create list files internally memory another part program passes file separate thread processing part scans directory creates file list sped parallel computer part processes files execution time whole task improvement resources system denoted formula_4 includes execution time part would benefit improvement resources execution time one would benefit fraction execution time task would benefit improvement resources denoted formula_5 one concerning part would benefit therefore execution part benefits improvement resources accelerated factor formula_7 improvement resources consequently execution time part benefit remains part benefits becomes theoretical execution time formula_9 whole task improvement resources amdahl law gives theoretical speedup latency execution whole task fixed workload formula_11 yields 30 execution time may subject speedup p 0.3 improvement makes affected part twice fast 2 amdahl law states overall speedup applying improvement example assume given serial task split four consecutive parts whose percentages execution time respectively told 1st part sped 2nd part sped 5 times 3rd part sped 20 times 4th part sped 1.6 times using amdahl law overall speedup notice 5 times 20 times speedup 2nd 3rd parts respectively n't much effect overall speedup 4th part 48 execution time accelerated 1.6 times example serial program two parts b therefore making part run 2 times faster better making part b run 5 times faster percentage improvement speed calculated non-parallelizable part optimized factor follows amdahl law speedup due parallelism given formula_20 formula_21 meaning speedup measured respect execution time non-parallelizable part optimized formula_22 formula_24 formula_25 formula_26 next consider case wherein non-parallelizable part reduced factor parallelizable part correspondingly increased follows amdahl law speedup due parallelism given derivation agreement jakob jenkov analysis execution time vs. speedup tradeoff amdahl law often conflated law diminishing returns whereas special case applying amdahl law demonstrates law diminishing returns one picks optimally terms achieved speedup improve one see monotonically decreasing improvements one improves however one picks non-optimally improving sub-optimal component moving improve optimal component one see increase return note often rational improve system order non-optimal sense given improvements difficult require larger development time others amdahl law represent law diminishing returns considering sort return one gets adding processors machine one running fixed-size computation use available processors capacity new processor added system add less usable power previous one time one doubles number processors speedup ratio diminish total throughput heads toward limit 1/ 1 − p analysis neglects potential bottlenecks memory bandwidth i/o bandwidth resources scale number processors merely adding processors provides even lower returns implication amdahl law speedup real applications serial parallel portions heterogeneous computing techniques required example cpu-gpu heterogeneous processor may provide higher performance energy efficiency cpu-only gpu-only processor | [
6656,
6801,
7313,
7699,
153,
7963,
6815,
2210,
8229,
5798,
9126,
6184,
2345,
5802,
4909,
8367,
6268,
7218,
10675,
8501,
5948,
4286,
2623,
2113,
8514,
5956,
4423,
1480,
6909,
330,
1866,
7497,
8523,
78,
9932,
4308,
2008,
344,
2394,
731,
2... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.