node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
786
9
Sinclair_BASIC:sinclair basic sinclair basic dialect programming language basic used 8-bit home computers sinclair research timex sinclair sinclair basic interpreter made nine tiles networks ltd. sinclair basic originally developed 1979 zx80 nine tiles programmers john grant owner nine tiles steve vickers initially incomplete implementation 1978 american national standards institute ansi minimal basic standard integer arithmetic termed 4k basic rom size zx80 evolved floating-point 8k basic zx81 ts1000 also available upgrade zx80 became almost complete version 16 kb rom zx spectrum present zx spectrum compatibles 2015 interpreters exist modern operating systems older systems allow sinclair basic used easily new basic programmers might start simple program perhaps using language print statement display message screen well-known often-replicated example kernighan ritchie hello world program 16k/48k zx spectrum 88 keywords sinclair basic denoting commands 50 functions logical operators 31 keywords 16 including 9 also commands functions keywords entered via sinclair unique keyword entry system indicated table common commands need one keystroke example pressing start line spectrum produces full command codice_1 less frequent commands require complex key sequences codice_2 example keyed pressing plus access extended mode later models include key keeping held pressing keywords colour-coded original spectrum keyboard indicate mode required zx81 8k basic used shorter forms codice_3 codice_4 codice_5 codice_6 whereas spectrum used longer forms codice_7 codice_8 codice_9 codice_10 zx80 4k basic also used longer forms differed using spelling codice_11 zx81 8k basic version use codice_12 codice_13 codice_14 codice_15 zx80 4k basic exclusive function codice_16 equivalent string operator later versions unique code points assigned zx80 character set zx81 character set zx spectrum character set keyword multi-character operator i.e codice_17 codice_18 codice_19 codice_20 tokenized zx81 codice_21 replaced codice_22 spectrum expanded referencing token table rom thus keyword uses one byte memory significant saving traditional letter-by-letter storage also meant basic interpreter could quickly determine command function evaluating one byte keywords need reserved words like basic dialects programming languages e.g. allowed define variable named codice_1 output value codice_24 also related syntax requirement every line start command keyword pressing one keypress command start line changes editor command mode letter mode thus variable assignment requires let i.e. let a=1 a=1 practice also different basic dialects meant unlike basic dialects interpreter needed parentheses identify functions codice_25 sufficient codice_26 needed though latter allowed 4k basic rom zx80 short list exceptions functions codice_27 codice_28 codice_16 codice_30 codice_31 codice_32 codice_33 codice_34 one-byte tokens typed letter-by-letter required parentheses listed integral functions label right keyboard 128k spectrum models zx spectrum 128 +2 +3 +2a +2b also stored keywords internally one-byte code points used conventional letter-by-letter basic input system also introduced two new commands original spanish zx spectrum 128 included four additional commands spanish one undocumented translated unlike codice_41 codice_42 codice_43 functions used ubiquitous microsoft basic dialects home computers parts strings sinclair basic accessed numeric range example gives substring starting 5th ending 10th character variable codice_44 thus possible replace codice_41 codice_43 commands simply omitting left right array position respectively example equivalent codice_47 codice_48 alone enough replace codice_49 string array variable names must consist one alphabetical character thus let a=5 let apples=5 let hello dim 10 dim 10 good let apples fruit dim apples 10 dim apples 10 long variable names allowed numeric variables include alphanumeric characters first character let a0=5 allowed let 0a=5 long variable names also include spaces ignored let number apples 5 let numberofapples 5 several zx spectrum interpreters exist several zx spectrum compilers exist
[ 9345, 3718, 7691, 1805, 9997, 11412, 22, 3736, 3481, 9881, 797, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 9006, 11315, 823, 9911, 1849, 6074, 315, 7355, 7486, 7870, 4160, 4674, 10750, 712, 10571, 3788, 847, 2383, 1879, 92, ...
None
787
2
UNETix:unetix unetix early implementation unix ibm pc systems true unix written scratch pc without using code system v. unetix supported single user however maintained closer compatibility standard versions unix early versions qnx unetix multiple windows capability possibly first implementation windowing unix-like operating system 10 windows supported could run independent tasks could individual foreground background colors set special codice_1 command published lantech systems inc unetix list price 1984 130 usd discounted advertised 99 usd usd today minimum ram requirement 256 kb machine would able support single-tasking multitasking required 512 kb emulation environment ms-dos could run dos 1.1 programs one window unix programs ran windows major weaknesses slow speed lack hard disk support unetix came full assembly language programming environment c compiler optional lantech claimed c compiler first available x86 architecture
[ 6675, 7187, 10776, 25, 4637, 9762, 5158, 7217, 9784, 10809, 576, 10333, 97, 8298, 7285, 9335, 2168, 633, 1147, 3197, 1150, 2179, 6787, 10883, 6797, 9366, 6296, 7325, 9887, 3241, 3248, 6837, 8388, 10436, 9932, 5840, 7382, 8410, 6369, 1253,...
Test
788
2
Ports_collection:ports collection ports collections ports trees ports sets makefiles patches provided bsd-based operating systems freebsd netbsd openbsd simple method installing software creating binary packages usually base package management system ports handling package creation additional tools managing package removal upgrade tasks addition bsds linux distributions implemented similar infrastructure including gentoo portage arch arch build system abs crux ports void linux templates main advantage ports collection method install fine tuning optimization software installation according hardware resources available instance system administrator easily create 64-bit install piece software 64-bit system 64-bit binary n't readily available instead using 32-bit version optimized system hand main disadvantage extra time spent packages compilation instance full install freebsd system ports collection take several days depending system performance jordan hubbard committed port make macros freebsd cvs repository august 21 1994 package install suite makefile committed year earlier august 26 1993 core ports framework first maintained hubbard along satoshi asami several years ports management team later formed handle task netbsd pkgsrc ports collection distinctive aims portable usable number operating systems aside netbsd including bsds smartos/illumos macos minix 3 linux unix-likes pkgsrc created august 1997 based existing freebsd ports system follows quarterly release schedule october 2018 contains 22'000 packages 1.4 release dragonfly bsd announced would adopting pkgsrc official package management system dragonfly bsd however built ports implementation called dports release 3.4 switched completely 3.6 development done via git contrast freebsd ports originally based openbsd ports system intended source used create end product packages installing port first creates package installs ports made makefile text files descriptions installation messages patches required adjust program work openbsd packing list listing files included packages ports tree uses set standard makefiles shared source tree provide bulk functionality shared infrastructure includes many utility functions port developers means ports often made simply late october 2007 openbsd developer nikolay sturm announced -stable ports tree considered unmaintained due lack resources effectively forced users run -current ports/base tree order keep security updates 2009 decided revive -stable ports tree supervision robert nagy jasper lievisse adriaanse two unofficial web-sites listing openbsd ports packages
[ 6657, 10760, 8213, 6680, 9245, 5155, 1574, 5670, 7722, 5677, 10817, 3667, 6227, 8280, 1637, 9324, 8305, 1138, 2168, 7293, 6797, 2193, 10900, 10394, 4775, 6828, 1718, 5819, 190, 4302, 2259, 6361, 8413, 741, 10469, 231, 2281, 6393, 8954, 11...
None
789
2
IBM_CP-40:ibm cp-40 cp-40 research precursor cp-67 turn part ibm then-revolutionary cp -67 /cms – virtual machine/virtual memory time-sharing operating system ibm system/360 model 67 parent ibm vm family cp-40 ran multiple instances client operating systems – particularly cms cambridge monitor system built part effort like cp-67 cp-40 first version cms developed ibm cambridge scientific center csc staff working closely mit researchers project mac lincoln laboratory cp-40/cms production use began january 1967 cp-40 ran unique specially modified ibm system/360 model 40 cp-40 one-off research system declared goals however also important unofficial mission demonstrate ibm commitment capability supporting time-sharing users like mit cp-40 successor achieved goals technical social standpoints – helped prove viability virtual machines establish culture time-sharing users launch remote computer services industry however project became embroiled internal ibm political war time-sharing versus batch processing failed win hearts minds academic computer science community ultimately turned away ibm systems like multics unix tenex various dec operating systems ultimately however virtualization concepts developed cp-40 project bore fruit diverse areas remain important today cp-40 first operating system implemented complete virtualization i.e provided virtual machine environment supporting aspects target computer system s/360-40 s/360 operating systems could installed tested used stand-alone machine cp-40 supported fourteen simultaneous virtual machines virtual machine ran problem state – privileged instructions i/o operations caused exceptions caught control program simulated similarly references virtual memory locations present main memory cause page faults handled control program rather reflected virtual machine details implementation found cp/cms architecture basic architecture user interface cp-40 carried forward cp-67/cms evolved become ibm current vm product line model 67 available building cp-40 custom virtual memory device based associative memory cat box designed built csc involved hardware microcode changes specially modified system/360 model 40 changes gave unit technology needed full virtualization system/360 hardware modified model 40 influenced design forthcoming model 67 intended meet needs community time-sharing users notably mit project mac bell laboratories – though sites became notable ibm sales failures three distinct virtual memory systems implemented ibm period systems different bore family resemblance cp-40 cat box key milestone pugh et al cite ieee paper cp-40 virtual memory hardware states unique included parallel-search register bank speed dynamic address translation funds supplied cambridge ibm engineer ... built 64-register associative memory integrated 360/40 one-of-a-kind result shipped cambridge early 1966 important note although virtualization support explicit goal csc modified model 40 apparently case original model 67 design fact virtualization capabilities ultimately implemented -67 thus enabled success cp-67/cms speaks tenacity persuasivness csc team cms first built 1964 csc run 'client operating system cp-40 cms project leader john harmon although s/360 operating system could run cp-40 virtual machine decided new simple single-user interactive operating system would best supporting interactive time-sharing users would avoid complexity overhead running multi-user system like ctss contrast ibm os/mvt-tso successors – essentially time-sharing operating system running single task ibm batch operating system cms interactive user gets private virtual machine september 1965 many important cms design decisions already made radical departures difficult file naming job control via jcl requirements ibm real operating systems concepts goals operating systems vendors control data corporation dec. cms file system design flat directory structure kept deliberately simple creasy notes structure multiple disks single directory chosen simple useful multi-level linked directories files stored common areas design trend began simplified design components cms reduce implementation complexity application programs running cms executed within address space accessed system services cms file system simple programming interface cms nucleus resided low memory within cms virtual machine variety system calls provided would familiar current cms programmers since applications ran cms virtual machine could potentially misbehave overwriting cms data using privileged instructions taking actions could take crash virtual machine course could affect virtual machines mutually isolated could damage underlying control program unlike operating systems cp crashes rarely stemmed application errors – thus relatively rare following notes provide brief quotes primarily pugh varian creasy see references illustrating development context cp-40 direct quotes rather paraphrases provided authors perspectives color interpretations also see history cp/cms additional context
[ 6675, 7187, 10776, 25, 4637, 3615, 9762, 5158, 7217, 10803, 7733, 9784, 10809, 573, 576, 9811, 10333, 97, 9829, 6248, 8298, 6772, 7285, 9335, 2168, 1147, 2172, 3197, 1150, 11390, 2179, 10883, 3725, 6797, 9361, 9366, 6296, 9370, 7325, 9887...
None
790
4
Download.ject:download.ject computing download.ject also known toofer scob malware program microsoft windows servers installed insecure website running microsoft internet information services iis appends malicious javascript pages served site download.ject first noted case users internet explorer windows could infect computers malware backdoor key logger merely viewing web page came prominence widespread attack starting june 23 2004 infected servers included several financial sites security consultants prominently started promoting use opera mozilla firefox instead ie wake attack download.ject virus worm spread june 23 attack hypothesised put place automatic scanning servers running iis hackers placed download.ject financial corporate websites running iis 5.0 windows 2000 breaking using known vulnerability patch existed vulnerability many administrators applied attack first noticed june 23 although researchers think may place early june 20 download.ject appended fragment javascript web pages compromised servers page server viewed internet explorer ie windows javascript would run retrieve copy one various backdoor key logging programs server located russia install user machine using two holes ie β€” one patch available without vulnerabilities present versions ie windows except version included windows xp service pack 2 beta testing time server browser flaws exploited attack notable however combining two placed upon popular mainstream websites although list affected sites released network compromised sites used attack reportedly numbering thousands far previous compromised network microsoft advised users remove infection browse security settings maximum security experts also advised switching javascript using web browser internet explorer using operating system windows staying internet altogether particular attack neutralised june 25 server download.ject installed backdoor shut microsoft issued patch windows 2000 2003 xp july 2 although sizable attack compared email worms time fact almost existing installations ie β€” 95 web browsers use time β€” vulnerable latest series ie holes leaving underlying operating system vulnerable caused notable wave concern press even business press started advising users switch browsers despite then-prerelease windows xp sp2 invulnerable attack
[ 5765, 3462, 8584, 9609, 6028, 6797, 8978, 790, 6171, 7713, 11683, 10026, 10282, 7983, 11060, 10808, 7739, 9167, 9808, 4439, 11223, 8281, 2777, 7515, 603, 4956, 107, 9328, 2041 ]
Test
791
9
Nyquist_(programming_language):nyquist programming language nyquist programming language sound synthesis analysis based lisp programming language extension xlisp dialect lisp named harry nyquist nyquist programmer designs musical instruments combining functions call upon instruments generate sound typing simple expression programmer combine simple expressions complex ones create whole composition also generate various kinds musical non-musical sounds nyquist interpreter read write sound files midi files adagio text-based music score files many platforms also produce direct audio output real time nyquist programming language also used write plug-in effects audacity digital audio editor one notable difference nyquist traditional music-n languages nyquist segregate synthesis functions see unit generator scoring functions example csound actually two languages one creating orchestras writing scores nyquist two domains combined nyquist runs linux unix environments mac os microsoft windows nyquist programming language interpreter written roger dannenberg carnegie mellon university support yamaha corporation ibm
[ 10752, 11269, 6797, 2062, 8728, 6810, 10012, 3869, 8226, 5031, 823, 6840, 6717, 9023, 5569, 8262, 11218, 10712, 3675, 7392, 10083, 6502, 2666, 5360, 5361, 8435, 5492, 3446, 9210, 3323, 7550 ]
Test
792
2
Epoll:epoll codice_1 linux kernel system call scalable i/o event notification mechanism first introduced version 2.5.44 linux kernel mainline function monitor multiple file descriptors see whether i/o possible meant replace older posix codice_2 codice_3 system calls achieve better performance demanding applications number watched file descriptors large unlike older system calls operate n time codice_1 operates 1 time codice_1 similar freebsd codice_6 consists set user-space functions taking file descriptor argument denoting configurable kernel object cooperatively operate codice_1 used red-black tree rb-tree data structure keep track file descriptors currently monitored creates codice_1 object returns file descriptor codice_9 parameter allows epoll behavior modified one valid value codice_10 codice_11 older variant codice_12 deprecated linux kernel version 2.6.27 glibc version 2.9 controls configures file descriptors watched object events codice_13 add modify delete waits events registered codice_14 least one occurs timeout elapses returns occurred events codice_15 codice_16 codice_1 provides edge-triggered level-triggered modes edge-triggered mode call codice_18 return new event enqueued codice_1 object level-triggered mode codice_18 return long condition holds instance pipe registered codice_1 received data call codice_18 return signaling presence data read suppose reader consumed part data buffer level-triggered mode calls codice_18 return immediately long pipe buffer contains data read edge-triggered mode however codice_18 return new data written pipe bryan cantrill pointed codice_1 mistakes could avoided learned predecessors input/output completion ports event ports solaris kqueue however large part criticism addressed codice_1 codice_27 codice_28 options codice_27 added version 2.6.2 linux kernel mainline released february 2004. codice_28 added version 4.5 released march 2016
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 8275, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 6813, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, ...
None
793
4
Arbor_Networks:arbor networks arbor networks software company founded 2000 based burlington massachusetts united states sells network security network monitoring software used – according company claims – 90 internet service providers company products used protect networks denial-of-service attacks botnets computer worms efforts disable network routers company founded 2000 co-founders farnam jahanian rob malan spun research university michigan sponsored darpa cisco intel joined students jonathan arnold matthew smart jonathan poland entrepreneurs ted julian dug song make founding team company raised 11 million round venture capital later august 2002 company raised another 22 million second round venture capital led thomas weisel venture partners participants included battery ventures cisco systems among others january 2008 arbor acquired ellacoya networks company provides broadband traffic shaping products acquisition expected increase total addressable market tam arbor 750 million 2008 1.5 billion end 2009 march 2009 arbor worked 100 isps create new network monitoring system called atlas 2.0 october 2009 company estimated google paid almost nothing youtube bandwidth noting google probably used dark fibre instead run website august 31 2010 tektronix communications announced completed acquisition arbor networks upon completion acquisition arbor networks joins danaher corporation portfolio communications enterprise companies includes tektronix communications september 3 2013 arbor networks announced acquired privately held packetloop leader security analytics based sydney australia arbor strategic partnerships cisco ibm juniper networks addition headquarters burlington massachusetts company also offices ann arbor michigan london singapore wired stated due popularity arbor software among isps company likely knows internet ebbs flows anyone outside national security agency arbor part netscout systems part acquisition fluke tektronix communications tekcomms vss 2015 danaher
[ 5472, 2409, 939, 5547, 9259, 10283, 7887, 6834, 4883, 2041, 3323, 3581 ]
Test
794
4
Wireless_intrusion_prevention_system:wireless intrusion prevention system computing wireless intrusion prevention system wips network device monitors radio spectrum presence unauthorized access points intrusion detection automatically take countermeasures intrusion prevention primary purpose wips prevent unauthorized network access local area networks information assets wireless devices systems typically implemented overlay existing wireless lan infrastructure although may deployed standalone enforce no-wireless policies within organization advanced wireless infrastructure integrated wips capabilities large organizations many employees particularly vulnerable security breaches caused rogue access points employee trusted entity location brings easily available wireless router entire network exposed anyone within range signals july 2009 pci security standards council published wireless guidelines pci dss recommending use wips automate wireless scanning large organizations wireless intrusion detection system wids monitors radio spectrum presence unauthorized rogue access points use wireless attack tools system monitors radio spectrum used wireless lans immediately alerts systems administrator whenever rogue access point detected conventionally achieved comparing mac address participating wireless devices rogue devices spoof mac address authorized network device new research uses fingerprinting approach weed devices spoofed mac addresses idea compare unique signatures exhibited signals emitted wireless device known signatures pre-authorized known wireless devices addition intrusion detection wips also includes features prevent threat automatically automatic prevention required wips able accurately detect automatically classify threat following types threats prevented good wips wips configurations consist three components simple intrusion detection system single computer connected wireless signal processing device antennas placed throughout facility huge organizations multi network controller provides central control multiple wips servers soho smb customers functionality wips available single box wips implementation users first define operating wireless policies wips wips sensors analyze traffic air send information wips server wips server correlates information validates defined policies classifies threat administrator wips notified threat policy set accordingly wips takes automatic protection measures wips configured either network implementation hosted implementation network wips implementation server sensors console placed inside private network accessible internet sensors communicate server private network using private port since server resides private network users access console within private network network implementation suitable organizations locations within private network hosted wips implementation sensors installed inside private network however server hosted secure data center accessible internet users access wips console anywhere internet hosted wips implementation secure network implementation data flow encrypted sensors server well server console hosted wips implementation requires little configuration sensors programmed automatically look server internet secure tls connection large organization locations part private network hosted wips implementation simplifies deployment significantly sensors connect server internet without requiring special configuration additionally console accessed securely anywhere internet hosted wips implementations available on-demand subscription-based software service model hosted implementations may appropriate organizations looking fulfill minimum scanning requirements pci dss
[ 4163, 4517, 9640, 2409, 10092, 9968, 467, 7411, 7222, 2430, 4863 ]
Test
795
3
Daniel_Slotnick:daniel slotnick daniel leonid slotnick 1931–1985 mathematician computer architect slotnick papers published john cocke 1958 discussed use parallelism numerical calculations first time later served chief architect illiac iv supercomputer principal investigator darpa contract early 1970s produced illiac iv arpanet fairly large operation building campus uiuc originally called center advanced computation astronomy building illiac iv constructed burroughs corporation using special chips made fairchild semiconductor campus unrest due vietnam war mansfield amendments illiac iv completed installed ames research center instead uiuc slotnick darpa contract renewed 1985 ida nsa formed supercomputing research facility dc area slotnick widow donated library 1987 first issue journal supercomputing contained tribute slotnick development arpanet took place mit lincoln labs bbn technologies however planned illiac iv would network work funded slotnick darpa contract example standard character set established also purdy polynomial secure hash function protect passwords arpanet ironically illiac iv project moved ames research center computer could accessed telephone 415 329-0740 awarded afips prize 1962 elected ieee fellow 1976
[ 9932, 1783 ]
Test
796
4
Project_Safe_Childhood:project safe childhood project safe childhood psc department justice initiative launched 2006 aims combat proliferation technology-facilitated sexual exploitation crimes children psc coordinates efforts various federal state local agencies organizations protect children investigating prosecuting online sexual predators psc partners include internet crimes children icac task forces fbi u.s postal inspection service immigration customs enforcement u.s marshals service national center missing exploited children state local law enforcement officials u.s. attorney ’ district
[ 10545 ]
Test
797
9
TI-BASIC:ti-basic ti-basic official name basic-like language built texas instruments ti graphing calculators ti-basic language family three different incompatible versions released different products ti rarely refers language name name ti-basic used developer documentation many applications convenient way program ti calculator since capability write programs ti-basic built-in assembly language often referred asm also used c compilers exist translation assembly tigcc motorola 68000 68k based calculators sdcc zilog z80 based calculators however cross-compilers allowing on-calculator programming ti-basic considerably slower assembly language interpreted making better suited writing programs quickly solve math problems perform repetitive tasks rather programming games graphics-intensive applications math instruction books even provide programs ti-basic usually widespread variant used ti-82/83/84 series although somewhat minimalist compared programming languages used computers ti-basic nonetheless important factor programming community ti graphing calculators required advanced mathematics classes many high schools universities ti-basic often provides first glimpse many students world programming syntax versions ti-basic somewhat different typical basic implementations language basic structured programming capabilities makes limited use allowance white space indentation also dependent somewhat non-standard character set specific characters assignment right sto arrow readily available character sets square cube roots mathematical symbols well tokenized entry storage keywords statements begin colon also functions statement separator within lines ti-83/84 models closing parentheses brackets braces quotes optionally omitted end line sto token order save space although sometimes better left example ti 83/84 models loop function runs much slower without closing parentheses certain circumstances expressions use infix notation standard operator precedence many statements demand arguments parentheses similar syntax used mathematical functions syntax assignment copying data variable unusual respect conventional programming languages computers rather using basic-like let statement equal sign algol-like codice_1 operator ti-basic uses right-arrow sto operator syntax source β†’ destination similar several japanese calculators casio canon sharp often employed similar syntax ever since first mass market japanese alphanumerical calculators appeared late 1970s early 1980s control flow statements include if-then-else blocks loops loops repeat loops though switch statements main control flow statements unusual high level language ti-basic implementations include increment skip greater ds decrement skip less statements constructs generally associated assembly languages sections programs labeled however particularly z80 models labels function destinations goto statements codice_2 functions rather program block labels availability functions subroutines depends implementation versions available ti-82-descended calculators even support gosub-like function though possible call programs within share variables programs ti-89/92-based designs access shared functions essentially programs capable returning value ti-basic strongly dynamically-typed language available data types differ considerably 68k z80 versions possible create user-defined data types without using library written assembly lists often used replacement structs data types directly manipulated include data types directly manipulated typing name line would result error include flexibility use variables varies widely calculator model ti-83/84 programmer create lists whose names five characters data types limited 27 real complex variables number predefined variable names types e.g. matrices one ten variables codice_16-codice_17 ti-83/84 certain variables codice_34 finance variables fixed addresses ram making much faster access 27 letter variables codice_34 acts special variable containing result last evaluated code line variable still evaluated contents stored codice_34 result codice_34 reevaluated frequently often used store temporary calculations hold values would otherwise slow access items list variables global contrast 68k calculators allow variable names eight alphanumeric including greek characters furthermore variables grouped folders made local program declaring codice_38 statement z80 programmers often start lines double quotation mark denote comment lines starting actually executed changing codice_34 variable affect anything performance unless codice_34 read immediately afterwards 68k calculators allow programs include single-line comments using Β© comment symbol comment appears first line prgm statement displayed status bar program selected catalog comments often used document names types parameters 68k interpreter built feature store number space characters beginning line allows indentation z80 version ti-basic makes explicit functions like 68k impossible however variables global functions emulated setting variables similar arguments calling another program return values exist codice_41 statement stops current program continues program called 68k version ti-basic allows creating user-defined functions functions syntax programs except use codice_42 ... codice_43 keywords instead codice_44 ... codice_45 allowed use instructions perform i/o modify non-local variables call programs however functions still non-pure call built-in functions codice_46 codice_47 codice_48 functions return value absence explicit codice_41 statement last expression evaluated third-party applications chronological order omnicalc xlib celtic doors cs overloaded ti-basic functions z80 calculators provide additional language functionality third-party libraries overload sum real det identity functions handled interpreted respective applications among extra functions fast shape-drawing routines sprite tilemap tools program vat modification access abilities gui construction features much ordinarily restricted use assembly programmers functions require application like doors cs 7.0 present user calculator sometimes considered detraction use libraries following programs executed display phrase codice_50 lists many possible names allows many programs manipulate many lists without overriding previous data lists ti-82 custom names l l preprogrammed ti-85 ti-86 ability handle variable name subscripts ti-81 completely unable handle lists lists used numerous built-in ti-basic functions calculating statistics including various regression analyses called inside programs however still show info pausing execution store specific results variables recursion possible program called within within another program example used compute factorials order work codice_51 parameter factorial function codice_3 must equal 1 68k series makes distinction programs functions functions like programs except allow statements perform i/o including modifying non-local variables return value absence explicit codice_41 statement last expression evaluated growth hobbyist graphing calculator community 1990s brought sharing collaboration including need share ti-basic code mailing lists discussion forums first done typing ti-basic code calculator screen computer hand conversely entering programs manually calculators ti-basic programs stored tokenized format edited using standard computer text editors calculator programming community matured need automated converter arose format computer-stored ti-basic programs generated texas instruments ti-graphlink application eventually decoded third-party tools created manipulate files ti created basic editor included certain releases ti-graphlink linking program gained widespread usage particular used custom character set display properly copied pasted fora 2005 joe penna created optibasic translator tool convert text ti-graphlink editor standard unicode project soon expanded include regex-based ti-basic optimizer independently christopher kerm martian mitchell cemetech began creating online converter extract plain-text later html bbcode-formatted contents tokenized ti-basic programs expanded include online program editor exporter ti-83 plus emulator sourcecoder project absorbed optibasic end 2005 major ti-basic editor currently use tokenide tokens created shaun merthsoft mcfall offline editor tokens import edit export ti-basic programs includes tools track program size correctness offers ancillary features sprite/image editor built around token definitions stored xml files intended extensible work user-specified token mapping programmes nsprire series well ti 92 plus voyage 200 calculators transferred saved flat clear text ansi/ascii/iso 8859-* format several ides ti calculator programming series textpad syntax definitions code snippets charts available ti calculators syntax definitions also converted format used zeus editor clear text format also used lua interpreter calculator independent project exists developing pc-side interpreter ti89-92-voyage 200 variant ti basic would allow programmes calculator run directly well combined programmes languages call interpreter interpreter uses standard input output error specifiable log configuration files console mode windows second programme replicate graphics used calculator would related way tk tools integrated tcl perl rexx c languages related project developing tk kind tool use vbscript source tool third tool integrates pc-side ti basic spreadsheet database programmes via vba wsh engines also envisioned project also involves calculator-side unix-style shell rexx perl interpreters fortran 77 interpreter well converters go back forth amongst various casio hp sharp texas instruments calculator programming languages various scripting languages
[ 5635, 3718, 8582, 7691, 1805, 9997, 6160, 786, 11412, 22, 3736, 3481, 9881, 1952, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 11315, 692, 315, 7355, 7486, 7870, 4160, 7616, 4674, 5059, 966, 10750, 712, 847, 2383, 1879, 219, 9...
None
798
2
Android_Marshmallow:android marshmallow android marshmallow codenamed android development sixth major version android operating system 13th version android first released beta build may 28 2015 officially released october 5 2015 nexus devices first receive update marshmallow primarily focuses improving overall user experience predecessor lollipop introduced new permissions architecture new apis contextual assistants first used new feature tap provide context-sensitive search results new power management system reduces background activity device physically handled native support fingerprint recognition usb-c connectors ability migrate data applications microsd card internal changes 16.9 devices accessing google play run android 6.0 single popular point release android android nougat oreo major releases 7.x 8.x larger install bases release internally codenamed macadamia nut cookie first developer preview build codenamed android unveiled released google i/o may 28 2015 nexus 5 nexus 6 smartphones nexus 9 tablet nexus player set-top box second developer preview released july 9 2015 third final preview released august 17 2015 along announcing android would titled android marshmallow september 29 2015 google unveiled launch devices marshmallow lg-produced nexus 5x huawei-produced nexus 6p alongside google pixel c tablet android 6.0 updates factory images nexus 5 6 7 2013 9 player released october 5 2015 older nexus devices including nexus 4 nexus 7 2012 nexus 10 receive official update october 14 2015 lg announced planned release marshmallow flagship lg g4 smartphone poland following week marking first third-party device receive update marshmallow android 6.0.1 software patch featuring security fixes support unicode 8.0 emoji although without supporting skin tone extensions human emoji return next alarm feature disturb mode released december 7 2015 new assist api allows information currently opened app including text screenshot current screen sent designated assistant application analysis processing system used google search app feature google tap allows users perform searches within context information currently displayed on-screen home button used android 5 show available apps home button used together voice command generate on-screen cards display information suggestions actions related content direct share allows share menus display recently used combinations contacts associated app direct targets adoptable storage allows newly inserted sd card secondary storage media designated either portable internal storage portable maintains default behavior previous android versions treating media secondary storage device storage user files storage media removed replaced without repercussions subject access restrictions apps designated internal storage storage media reformatted encrypted ext4 file system adopted operating system primary storage partition existing data including applications private data folders migrated external storage normal operation device becomes dependent presence media apps operating system functions function properly adopted storage device removed user loses access storage media adopted storage forgotten makes data permanently inaccessible samsung lg however removed ability use sd card internal storage galaxy s7 g5 devices samsung arguing feature could result unexpected losses data prevents users able transfer data using card android marshmallow introduces redesigned application permissions model apps longer automatically granted specified permissions installation time opt-in system used users prompted grant deny individual permissions ability access camera microphone application needed first time applications remember grants revoked user time new permissions model used applications developed marshmallow using software development kit sdk older apps continue use previous all-or-nothing approach permissions still revoked apps though might prevent working properly warning displayed effect marshmallow introduces new power management schemes known doze app standby running battery power device enter low-power state inactive physically handled state network connectivity background processing restricted high-priority notifications processed additionally network access apps deferred user recently interacted app apps may request permission exempt policies rejected google play store violation dangerous products policy core functionality adversely affected android marshmallow provides native support fingerprint recognition supported devices via standard api allowing third-party applications implement fingerprint-based authentication fingerprints used unlocking devices authenticating play store google pay purchases android marshmallow supports usb-c including ability instruct devices charge another device usb marshmallow also introduces verified links configured open directly specified application without user prompts user data apps targeting marshmallow automatically backed google drive wi-fi application receives 25 mb storage separate user google drive storage allotment marshmallow android compatibility definition document contains new security mandates devices dictating capable accessing encrypted data without affecting performance must enable secure boot device encryption default conditions comprise part specification must met order certified operating system able license google mobile services software requirement mandatory device encryption originally intended take effect lollipop delayed due performance issues
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 10284, 5677, 1083, 10303, 6212, 69, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8812, 8821, 11391, 11396, 1670, 7816, 5262, 10393, 8858, 7835, 2208, 673, 8870, 1191, 1203, 7359, 196, 3269, 3...
Test
799
3
Accelerated_Graphics_Port:accelerated graphics port accelerated graphics port agp designed high-speed point-to-point channel attaching video card computer system primarily assist acceleration 3d computer graphics originally designed successor pci-type connections video cards since 2004 agp progressively phased favor pci express pcie mid-2008 pci express cards dominated market agp models available gpu manufacturers add-in board partners eventually dropping support interface favor pci express computers increasingly became graphically oriented successive generations graphics adapters began push limits pci bus shared bandwidth led development agp bus dedicated graphics adapters agp heavily based pci fact agp bus superset conventional pci bus agp cards must act pci cards primary advantage agp pci provides dedicated pathway slot processor rather sharing pci bus addition lack contention bus direct connection allows higher clock speeds second major change agp uses split transactions address data phases pci transaction separated card may send many address phases host processes order avoids long delays bus idle read operations third pci bus handshaking simplified unlike pci bus transactions whose length negotiated cycle-by-cycle basis using frame stop signals agp transfers always multiple 8 bytes long total length included request rather using irdy trdy signals word data transferred blocks four clock cycles 32 words agp 8Γ— speed pauses allowed blocks finally agp allows optional agp 1.0 2.0 mandatory agp 3.0 sideband addressing meaning address data buses separated address phase use main address/data ad lines done adding extra 8-bit sideband address bus graphics controller issue new agp requests agp data flowing main 32 address/data ad lines results improved overall agp data throughput great improvement memory read performance makes practical agp card read textures directly system ram pci graphics card must copy system ram card video memory system memory made available using graphics address remapping table gart apportions main memory needed texture storage maximum amount system memory available agp defined agp aperture agp slot first appeared x86-compatible system boards based socket 7 intel p5 pentium slot 1 p6 pentium ii processors intel introduced agp support i440lx slot 1 chipset august 26 1997 flood products followed major system board vendors first socket 7 chipsets support agp via apollo vp3 sis 5591/5592 ali aladdin v. intel never released agp-equipped socket 7 chipset fic demonstrated first socket 7 agp system board november 1997 fic pa-2012 based via apollo vp3 chipset followed quickly epox p55-vp3 also based via vp3 chipset first market early video chipsets featuring agp support included rendition vΓ©ritΓ© v2200 3dfx voodoo banshee nvidia riva 128 3dlabs permedia 2 intel i740 ati rage series matrox millennium ii s3 virge gx/2 early agp boards used graphics processors built around pci simply bridged agp resulted cards benefiting little new bus improvement used 66 mhz bus clock resulting doubled bandwidth pci bus exclusivity examples cards voodoo banshee vΓ©ritΓ© v2200 millennium ii s3 virge gx/2 intel i740 explicitly designed exploit new agp feature set fact designed texture agp memory making pci versions board difficult implement local board ram emulate agp memory microsoft first introduced agp support windows 95 oem service release 2 osr2 version 1111 950b via usb supplement osr2 patch applying patch windows 95 system became windows 95 version 4.00.950 b first windows nt-based operating system receive agp support windows nt 4.0 service pack 3 introduced 1997 linux support agp enhanced fast data transfers first added 1999 implementation agpgart kernel module intel released agp specification 1.0 1997 specified 3.3 v signals 1Γ— 2Γ— speeds specification 2.0 documented 1.5 v signaling could used 1Γ— 2Γ— additional 4Γ— speed 3.0 added 0.8 v signaling could operated 4Γ— 8Γ— speeds 1Γ— 2Γ— speeds physically possible specified available versions listed adjacent table agp version 3.5 publicly mentioned microsoft universal accelerated graphics port uagp specifies mandatory supports extra registers marked optional agp 3.0 upgraded registers include pcists capptr ncapid agpstat agpcmd nistat nicmd new required registers include apbaselo apbasehi agpctrl apsize nepg gartlo garthi various physical interfaces connectors see compatibility section official extension cards required electrical power longer slot additional pins purpose agp pro cards usually workstation-class cards used accelerate professional computer-aided design applications employed fields architecture machining engineering simulations similar fields 64-bit channel proposed optional standard agp 3.0 draft documents dropped final version standard standard allows 64-bit transfer agp8Γ— reads writes fast writes 32-bit transfer pci operations number non-standard variations agp interface produced manufacturers agp cards backward forward compatible within limits 1.5 v-only keyed cards go 3.3 v slots vice versa though universal cards exist fit either type slot also unkeyed universal slots accept either type card agp universal card plugged-into agp universal slot 1.5 v portion card used cards like nvidia geforce 6 series except 6200 ati radeon x800 series keys 1.5 v prevent installed older mainboards without 1.5 v support last modern cards 3.3 v support nvidia geforce fx series fx 5200 fx 5500 fx 5700 fx 5800 fx 5900 fx 5950 geforce 6 series 6200 6600/6600 le/6600 gt ati radeon 9500/9700/9800 r350 9600/9800 r360 geforce 6200 geforce 6600 cards function agp 1.0 3.3v slots agp pro cards fit standard slots standard agp cards work pro slot motherboards equipped universal agp pro slot accept 1.5 v 3.3 v card either agp pro standard agp configuration universal agp card universal agp pro card cards incorrectly dual notches motherboards incorrectly fully open slots allowing card plugged slot support correct signaling voltage may damage card motherboard incorrectly designed older 3.3 v cards 1.5 v key proprietary systems incompatible standard agp example apple power macintosh computers apple display connector adc extra connector delivers power attached display cards designed work specific cpu architecture e.g. pc apple may work others due firmware issues mark allen playtools.com made following comments regarding practical agp compatibility agp 3.0 agp 2.0 ... nobody makes agp 3.0 cards nobody makes agp 3.0 motherboards least manufacturers find every single video card could find claimed agp 3.0 card actually universal 1.5v agp 3.0 card every motherboard claimed agp 3.0 motherboard turned universal 1.5v agp 3.0 motherboard makes sense think anyone actually shipped consumer-oriented product supported 0.8 volts would end lots confused customers support nightmare consumer market 'd crazy ship 0.8 volt product actual power supplied agp slot depends upon card used maximum current drawn various rails given specifications various versions example maximum current drawn supplies voltages specified upper limits agp 3.0 slot supply 48.25 watts figure used specify power supply conservatively practice card unlikely ever draw 40 w slot many using less agp pro provides additional power 110 w. many agp cards additional power connectors supply power slot could provide 2010 new motherboards agp slots new motherboard chipsets equipped agp support motherboards continued produced older chipsets support agp graphics processors period use pci-express general-purpose restricted graphics standard supports higher data transfer rates full-duplex create agp-compatible graphics cards chips require additional pcie-to-agp bridge-chip convert pcie signals agp signals incurs additional board costs due need additional bridge chip separate agp-designed circuit board various manufacturers graphics cards continued produce agp cards shrinking agp user-base first bridged cards geforce 6600 ati radeon x800 xl boards released 2004-5 2009 agp cards nvidia ceiling geforce 7 series 2011 directx 10-capable agp cards amd vendors club 3d sapphire jaton visiontek diamond etc included radeon hd 2400 3450 3650 3850 4350 4650 4670 hd 5000 agp series mentioned amd catalyst software never available many problems amd catalyst 11.2 11.6 agp hotfix drivers windows 7 hd 4000 series agp video cards use 10.12 11.1 agp hotfix drivers recommended workaround several vendors listed make available past versions agp drivers agp bus superset 66 mhz conventional pci bus immediately reset follows protocol card must act pci target optionally may act pci master agp 2.0 added fast writes extension allows pci writes motherboard card transfer data higher speed card initialized using pci transactions agp transactions permitted card always agp master motherboard always agp target card queues multiple requests correspond pci address phase motherboard schedules corresponding data phases later important part initialization telling card maximum number outstanding agp requests may queued given time agp requests similar pci memory read write requests use different encoding command lines c/be 3:0 always 8-byte aligned starting address length always multiples 8 bytes 64 bits three low-order bits address used instead communicate length request whenever pci gnt signal asserted granting bus card three additional status bits st 2:0 indicate type transfer performed next bits codice_1 previously queued agp transaction data transferred three bits codice_2 card may begin pci transaction sideband addressing use queue request in-band using pipe like pci agp transaction begins address phase communicating address 4-bit command code possible commands different pci however agp 3.0 dropped high-priority requests long read commands little used also mandated side-band addressing thus dropping dual address cycle leaving four request types low-priority read 0000 low-priority write 0100 flush 1010 fence 1100 queue request in-band card must request bus using standard pci req signal receive gnt plus bus status st 2:0 equal codice_2 instead asserting frame begin pci transaction card asserts pipe signal driving agp command address length c/be 3:0 ad 31:3 ad 2:0 lines respectively address 64 bits dual address cycle similar pci used every cycle pipe asserted card sends another request without waiting acknowledgement motherboard configured maximum queue depth last cycle marked deasserting req pipe deasserted following idle cycle side-band addressing supported configured pipe signal used signal re-used another purpose agp 3.0 protocol requires side-band addressing instead requests broken 16-bit pieces sent two bytes across sba bus need card ask permission motherboard new request may sent time long number outstanding requests within configured maximum queue depth possible values sideband address bytes sent rate data transfers 8Γ— 66 mhz basic bus clock sideband addressing advantage mostly eliminates need turnaround cycles ad bus transfers usual case read operations greatly outnumber writes asserting gnt motherboard may instead indicate via st bits data phase queued request performed next four queues two priorities low- high-priority reads writes processed order obviously motherboard attempt complete high-priority requests first limit number low-priority responses may delivered high-priority request processed cycle gnt asserted status bits value codice_13 read response indicated priority scheduled returned next available opportunity typically next clock cycle motherboard assert trdy target ready begin transferring response oldest request indicated read queue pci bus signals like frame devsel irdy remain deasserted four clock cycles worth data 16 bytes agp 1Γ— 128 bytes agp 8Γ— transferred without waiting acknowledgement card response longer card motherboard must indicate ability continue third cycle asserting irdy initiator ready trdy respectively either one wait states inserted two cycles value irdy trdy times irrelevant usually deasserted c/be byte enable lines may ignored read responses held asserted bytes valid motherboard card may also assert rbf read buffer full signal indicate temporarily unable receive low-priority read responses motherboard refrain scheduling low-priority read responses card must still able receive end current response first four-cycle block following one scheduled plus high-priority responses requested cycle gnt asserted status bits value codice_14 write data scheduled sent across bus next available opportunity typically next clock cycle card assert irdy initiator ready begin transferring data portion oldest request indicated write queue data longer four clock cycles motherboard indicate ability continue asserting trdy third cycle unlike reads provision card delay write n't data ready send n't queued request c/be lines used write data may used card select bytes written memory multiplier agp 2Γ— 4Γ— 8Γ— indicates number data transfers across bus 66 mhz clock cycle transfers use source synchronous clocking strobe signal ad_stb 0 ad_stb 1 sb_stb generated data source agp 4Γ— adds complementary strobe signals agp transactions may short two transfers agp 4Γ— 8Γ— speeds possible request complete middle clock cycle case cycle padded dummy data transfers c/be byte enable lines held deasserted agp connector contains almost pci signals plus several additions connector 66 contacts side although 4 removed keying notch pin 1 closest i/o bracket b sides table looking motherboard connector contacts spaced 1 mm intervals however arranged two staggered vertical rows 2 mm space pins row odd-numbered a-side contacts even-numbered b-side contacts lower row 1.0 3.5 mm card edge others upper row 3.7 6.0 mm card edge pci signals omitted signals added
[ 3588, 5386, 9742, 3472, 8851, 408, 4252, 7071, 10658, 2723, 4264, 3883, 6187, 8625, 3250, 823, 2745, 2623, 455, 1614, 4175, 10833, 594, 3923, 3798, 9686, 2525, 1501, 2529, 10337, 8035, 8931, 10851, 2791, 11627, 4334, 7151, 11631, 499, 280...
None
800
4
SWIPSY:swipsy swipsy firewall toolkit produced defence evaluation research agency uk later qinetiq swipsy toolkit itsec e3 equivalent common criteria eal4 evaluated product allowed additional code added security β€˜ compartments ’ without affecting evaluation status toolkit swipsy security properties assured network process separation particular processes communicating one network could communicate directly network β€˜ trusted mover agents ’ turn force data passed format content checkers swipsy ran trusted solaris 8 platform utilising mandatory access controls enforce separation compartments swipsy stood switch ip securely used build snmp firewall system called midass swipsy technology licensed clearswift use deep-secure line guard products swipsy used basis guard citrix ica protocol qinetiq
[ 3930, 4404 ]
None
801
3
Altered_Beast:altered beast altered beast 1988 beat 'em arcade game developed manufactured sega game set ancient greece follows centurion resurrected zeus rescue daughter athena order save daughter zeus transforms centurion beasts use power-ups initial arcade release ported several home video game consoles home computers including mega drive/genesis pack-in game altered beast side scrolling beat 'em game light platform elements player punch kick jump two players play player controls centurion fighting undead creatures monsters setting resembling ancient greece originally five levels graveyard underworld cavern neff palace base city dis one enemies white two-headed wolf blue mega drive version blue ox dos version upon defeat releases spirit ball power-up orb increase strength size player character three orbs turn centurion beast original version werewolf thunder weredragon werebear weretiger powerful golden werewolf beast abilities dragon flight lightning bear petrification becoming beast character face end-level boss though boss also appear regardless whether character transformed player takes long complete level upon boss defeat neff appears removes transformation orbs roman centurion died battle resurrected zeus centurion ordered zeus save daughter athena demon god called neff underworld become able withstand perils warrior gets ability collect three spirit balls level last transforms human/beast hybrid formidable power series battles journey ends dis centurion finally defeats neff rescues athena original arcade game end credits interspersed images actors costumes different characters monsters game implying whole game film production altered beast ported several platforms original release 1988 released master system pc engine hucard cd-rom² formats family computer atari st zx spectrum msx commodore 64 amstrad cpc amiga ms-dos mega drive/genesis version original pack-in game system north america europe brazil replaced sonic hedgehog hand-held version game made tiger electronics released 1988 certain differences seen several versions game like master system version single-player four levels others provided different beasts mutate humanoid lion shark form seen famicom version commodore 64 version severely rushed programmed 7 weeks mega drive version included compilations sega smash pack sega genesis collection sonic ultimate genesis collection latter two also including arcade version unlockable game wii virtual console service offers emulated versions arcade mega drive port xbox 360 xbox live arcade playstation 3 playstation network re-worked arcade version hd support online leaderboards network play sega released official ios port mega drive version late 2010 taken 2015 2017 altered beast rereleased ios android part sega forever collection game also seen 3d port nintendo 3ds digital download nintendo eshop retains original game local multiplayer also features new mode random transformations based mega drive/genesis port arcade version initial arcade release altered beast well-received game however mega drive release received somewhat negative reception 1997 next generation commented altered beast dreadful genesis game sold thousands one games available genesis n't make classic mega placed game 10 list 10 worst mega drive games time re-release wii virtual console given lukewarm reception gamespot ign describing game merely decent nostalgic value xbox live arcade re-release even described ign relic arcade heyday n't hold today altered beast guardian realms developed defunct 3d6 games published thq 2002 sequel game boy advance style original arcade game adds new features like power-ups new beast forms destructible environments playstation 2 title released sega 2005 known jūōki project altered beast japan simply altered beast europe rather serving sequel original game newer title features modern setting unconnected original game project x zone 2 ulala space channel 5 summons centurion werewolf form part solo unit attack 1990-93 series parker lewis ca n't lose season 1 episode 16 jerry stein becomes addicted video games seen playing nightmares sega genesis version altered beast 1993 matthew sweet named album altered beast game 2009 alternative rock band breaking benjamin released promo flash game altered benjamin based altered beast featured lead singer benjamin burnley main character neff rhinoceros-man form makes cameo 2012 walt disney pictures film wreck-it ralph sega formed production company stories international teaming evan cholfin film tv projects based games altered beast animated project
[ 8937, 4043, 10316, 9166, 9006 ]
None
802
2
LoΓ―c_Dachary:loΓ―c dachary loΓ―c dachary born 1965 french free software developer activist active since 1987 dachary currently contributes free software projects acts president free software foundation france speaker gnu project april association right full-time volunteer securedrop project dachary started c lisp developer 1986 1987 hired teach unix programming axis 1988 lectra launched 68k based hardware dachary led unix system v port using gnu compiler collection project completed took sabbatical 1989 create gna non-profit group development distribution free software dachary went back development tic tac toon agence france-presse afp learned c++ 1995 founded ecila search engine acquired tiscali discontinued 2001 two years dedicated fsf france dachary worked inria rfid software 2003 starting mekensleep 2004 dachary wrote poker related free software published part pokersource project 2007 hired outflop startup specialized poker software services based pokersource 2011 became free software freelancer worked xivo january 2012 loΓ―c became involved openstack worked ceph developer 2017 working securedrop project full-time volunteer employed axis 1987 dachary offered copies free software magnetic tapes emacs gnu compiler collection internet difficult access time became distributor software working lectra project dachary created gna gna axis non profit organization 1989 although original goal gna develop free software started news mail provider connectivity news mail provider washington d.c. provided agence france-presse afp half-used satellite link 1990 gna provided mail news feeds 200 non profit organisations individuals companies gna kept distributing free software magnetic tapes compiling sources difficult dachary packaged pre-compiled binaries motorola 68000 family x86 sparc left tapes computer book store le monde en tique sold customers richard stallman occasionally visited france met dachary started spread free software year gna dachary took advantage stallman presence france organize conferences Γ©cole nationale supΓ©rieure d'arts et mΓ©tiers paris 8 university former school Γ©cole pour l'informatique et les techniques avancΓ©es 1990 dachary took secondary role gna friend hugues lafarge became president 1996 met founders april french free sotftware ngo donated first server hosted ecila office dachary returned active role non profit work 2000 wrote code newly created sourceforge platform attempt understand project dynamics travelled va linux offices met eric raymond tim perdue felt team focused in-house interactions welcome external contributor however became familiar published code base va linux started use proprietary software created alternative platform using latest free software code base published gnu savannah early 2001 dachary secured funds buy hardware free software foundation offices moved boston install late 2001 va linux asked assign copyright contributions dachary published article explaining time move away sourceforge 2002 dachary gradually delegated responsibilities gnu savannah contributors free software foundation staff retired 2003 2001 free software foundation established presence europe dachary took part process creating fsf france renaming gna publication number 20010027 journal officiel serving first vice president fsf europe addition supporting growth gnu savannah fsf france assisted french developers companies gpl compliance bradley m. kuhn executive director free software foundation time dachary worked first contract new gpl compliance labs french governmental agency ongoing interest enforcing copyleft licenses led visible outcomes publication c cs orange sfr court case involving free kept confidential 2009 dachary joined software freedom conservancy board directors years late 2002 dachary became concerned lack protest european copyright directive transposed french law instead acting name fsf france problems limited free software launched eucd.info initiative six months full-time lobbying hired christophe espern work fsf france delegated responsibilities dachary played active role since although keeps touch friend jΓ©rΓ©mie zimmermann christophe espern successor co-founder spokesperson la quadrature du net late 2003 gnu savannah compromise created tensions governance early 2004 dachary worked mathieu roy set gna using policy software different decisional process 2010 maintainers savannah gna overlapped worked network administrator although centralized forges gna popular dachary recently gradually transgressed towards distributed hosting collects machines hosting facilities umbrella fsf france runs openstack based clusters dachary helps projects gnu compiler collection software freedom conservancy providing maintaining machines infrastructure late 2008 created amateur datacenter codename microdtc34 seven square meter room center paris laurent guerby process creating tetaneutral.net non profit isp dachary appointed honorary member april association behalf april participated commission spΓ©cialisΓ©e de terminologie et de nΓ©ologie de l'informatique et des composants Γ©lectroniques 2006 2009 primarily discuss definition free software shortly april 2012 openstack summit dachary founded upstream university train developers become better free software contributors
[ 1026, 2050, 1028, 5644, 2581, 3618, 6691, 2109, 8258, 10822, 5703, 8263, 589, 4177, 8787, 1112, 3674, 8304, 7793, 3189, 5759, 2180, 4230, 9865, 8848, 657, 6808, 6302, 3744, 8354, 4265, 8364, 1717, 11447, 2233, 5833, 6352, 3802, 4831, 7904...
None
803
9
Index_of_JavaScript-related_articles:index javascript-related articles list articles related javascript programming language
[ 1409, 4482, 259, 8068, 3462, 5255, 6791, 1802, 10507, 1295, 916, 1812, 8084, 8854, 8858, 5915, 8605, 7455, 2977, 1698, 1713, 3761, 1203, 11060, 11186, 438, 4920, 6143, 189, 5311, 2880, 65, 7871, 8384, 4292, 9152, 5708, 4045, 7372, 11087, ...
Validation
804
2
Star_Control_II:star control ii star control ii ur-quan masters sequel star control developed toys bob fred ford paul reiche iii originally published accolade 1992 ms-dos released critical acclaim star control ii widely viewed today one greatest pc games ever made appeared numerous publications lists greatest video games time game features exoplanet abundant star systems hyperspace travel extraterrestrial life interstellar diplomacy game featuring 25 different alien races communicated game ported 3do crystal dynamics 1994 enhanced multimedia presentation allowed cd technology source code 3do port licensed gnu gpl 2002 game content creative commons license 3do code ported pc ur-quan masters sequel star control 3 released 1996 star control ii added large number species ship types already diverse cast replaced first game strategy-based scenarios story-driven space exploration adventure game included diplomacy inhabitants galaxy resource gathering sub-sections instances melee combat first game whenever diplomacy fails typical adventure game genre player must explore game world little direction make discoveries connections independently interaction various alien species chief part adventure game backstory species first games new ones fleshed considerably hours dialogue species bringing characteristic conversational quirks music even display fonts two-player mode available named super melee consisting solely ship-to-ship combat ships first game available even made appearance story along number new ones last phase war alliance free stars hierarchy battle thralls tobermoon earthling ship discovered ancient precursor subterranean installation cave surface uninhabited planet vela star system alliance hastily sent secret scientific mission study relics massive hierarchy offensive forced alliance fleets retreat beyond vela mission commander captain burton decided go hiding planet sent back tobermoon starship asking help though ur-quan forces n't find earthlings sweep system relief never arrived years later help genius child born planet colonists activated precursor machinery found programmed build starship using limited store raw materials available planet ten years precursor factory built barely functional ship could piloted grown genius child alone could interact precursor central computer first test flight discovered ship burton sent help severely damaged ur-quan orbiting unpowered outer solar system alliance never known mission discoveries colonists decided fix recovered ship train new crew members precursor ship tobermoon send mission back earth eager know war ended shortly reaching sol little fleet attacked unknown ship captain burton commanding earthling ship intercepted alien ship could damage defenseless precursor starship killed short fight leaving genius young man command player begins game commander precursor starship returns earth find enslaved ur-quan discovered rest humans allies war ur-quan either eradicated put slave shield put service ur-quan battle thralls player progresses revealed ur-quan fighting internecine war kohr-ah subspecies ur-quan believes eradicating life galaxy opposed enslaving winner war gain access sa-matra precursor starship unparalleled power player must take advantage ur-quans distraction contact recruit alien races new alliance gather resources build fleet find way destroy sa-matra ur-quan finish war become unstoppable contents soundtrack pc version determined running contest anybody could participate composing tracks based description game included soundtrack compositions aaron grier erol otus eric e. berge riku nuottajΓ€rvi kevin palivec dan nicholson president founding member kosmic free music foundation musicians searched posting contest amiga users newsgroup mostly amiga hobbyists making sample based tracker music days music protracker-mod format uses digitized instrument samples pc game music still relied fm-synthesis based instruments time game also supported gravis ultrasound sound card popular among mod composers star control ii highly influenced story game design games starflight 1986 1989 developed binary systems released variety platforms electronic arts indeed greg johnson starflight lead designer helped write dialog star control ii paul reiche iii contributed earlier game alien communication system david brin science fiction series uplift universe also often mentioned inspiration star control ii universe well larry niven known space universe addition numerous awards gaming magazines published around release star control ii also spots top games compilations notable gaming publications computer gaming world stated star control ii much sequel starflight star control reviewer praised vga graphics wrote game best dialogue ever encountered genre concluded game placed reviewer top ten list time ... one enjoyable games review year often perfect balance struck role playing adventure action/arcade 1994 survey space war games gave grade b+ stating game lacked replayability except ship-to-ship melee minigame 1994 survey strategic space games set year 2000 later gave game four-plus stars five stating offers hours 'simple hot deep play game reviewed 1993 dragon 195 hartley patricia kirk lesser role computers column reviewers gave game 5 5 stars reviewing 3do version gamepro remarked user-friendly interface makes complicated gameplay easy handle also praised impressive graphics voice acting use unique vocal inflections alien race concluded game addicting epic sci-fi adventure patient space explorers zero-gravity tacticians glued screens million hours others stay away four reviewers electronic gaming monthly likewise praised accessible interface impressive graphics complained alien voices sometimes difficult understand cited cd quality audio melee mode strong points one commented blows pc version water gave 8.25 10 star control ii nominated award 1993 game developers conference computer gaming world named magazine adventure game year eric unready next generation reviewed 3do version game rating three stars five stated 've patience spend hours digging minerals game addictive state art 1994 pc gamer us named star control ii 21st best computer game ever editors called epic thoroughly enjoyable play look year pc gamer uk named 33rd best computer game time editors wrote ever game deserved award underrated star control ii years later star control 2 remained 52nd best computer game time pc gamer 2011 version list star control remains highly ranked many best lists 1996 computer gaming world ranked 29th best pc game time calling stunning mix adventure action humor ign named star control ii 17th best game time 2005 2013 kotaku crowd sourced list best pc games time star control 2 emerging popular choice among audience gamespot also named one greatest games time addition also given eighth place gamespot list best gameworlds reader choice well third place best endings ur-quan masters uqm project aimed port star control ii modern operating systems including windows linux mac os x bsd project began 2002 original creators fred ford paul reiche iii released source code 3do version open-source gpl project renamed ur-quan masters trademark star control registered accolade 1997 acquired 1999 atari known infogrames along rest accolade assets latest version 0.7.0 released 4 july 2011 game media free use non-commercial context released creative commons by-nc-sa 2.5 license ur-quan masters adds option online multiplayer melee play something available original game ability mod game one project goals variety modifications melee released fans including versions superpowered ships numerous planets high-definition graphics version game uqm-hd subsequently released beta 2013 development uqm codebase second group semi-professional musicians called precursors created new musical tracks remixes originals ultimately releasing four remix packs optional package listened in-game replacing original music played audio player group main members jouni airaksinen alias mark vera tore aune fjellstad alias void espen gΓ€tzschmann alias tilt riku nuottajΓ€rvi original composer 1992 release fully sometimes unofficial playable port produced wii ouya android microconsole gp2x portable game system pandora handheld maemo 5-based n900 smart phone ports underway sony psp microsoft xbox
[ 3300, 6797, 9166, 7983, 823 ]
Test
805
9
Syntax_error:syntax error computer science syntax error error syntax sequence characters tokens intended written compile-time program compile syntax errors corrected interpreted languages however syntax error may detected program execution interpreter error messages might differentiate syntax errors errors kinds disagreement errors syntax errors example would say use uninitialized variable value java code syntax error many others would disagree would classify static semantic error 8-bit home computers used basic interpreter primary user interface syntax error error message became somewhat notorious response command user input interpreter could parse syntax error may also occur invalid equation entered calculator caused instance opening brackets without closing less commonly entering several decimal points one number java following syntactically correct statement following second example would theoretically print variable hello world instead words hello world however variable java space syntactically correct line would system.out.println hello_world compiler flag syntax error given source code meet requirements language grammar type errors attempt apply ++ increment operator boolean variable java undeclared variable errors sometimes considered syntax errors detected compile-time however common classify errors static semantic errors instead syntax error many scientific calculators occur many ways including confused math errors like dividing 0 equation resulting big number non scientific calculators math errors referred errors
[ 1952, 8262, 5677, 10510, 9871, 240, 5395, 4823 ]
Validation
806
9
COFFEE_(Cinema_4D):coffee cinema 4d coffee often written c.o.f.f.e.e computer scripting language forms part cinema 4d proprietary 3d graphics application although presented acronym letters word coffee allegedly stand cinema object-oriented fery fast environment enhancer primarily comic reference java considerably famous computer language like scripting languages coffee used extend modify functionality host software technique preferable writing so-called plug-in module using traditional language c number reasons among several different aspects cinema 4d operation customised using coffee scripts notably additions user interface extensions reading writing new file formats creating texture shaders almost main functionality application accessed coffee program customised features look behave much like supplied standard coffee fairly typical curly bracket language would look familiar previous user c/c++ java perl anything along lines function object class definitions closely modelled c++ however coffee dynamically typed variables defined simple var keyword without reference type unlike similar scripting languages squirrel javascript coffee use function keyword introduce functions require return type void return like c/c++ function definition simply begins function name coffee memory management handled entirely garbage collection process essentially means looks programmer seldom needs worry however possible control process explicitly necessary 3d graphics programming makes extensive use certain mathematical techniques notably trigonometry vector arithmetic coffee well equipped area good set mathematical functions built-in vector datatype since coffee used extend cinema 4d clearly needs make use host program features extent application programming interface api possible locate 3d objects created user access internal data structures example new object created existing one modified distorted script since major purpose coffee allow new file formats used cinema api provides features useful task file input/output class available allows individual items binary data integers floating point numbers read written
[ 1952, 2304, 8582, 3462, 9714, 9780 ]
Train
807
4
Nikto_(vulnerability_scanner):nikto vulnerability scanner nikto free software command-line vulnerability scanner scans webservers dangerous files/cgis outdated server software problems performs generic server type specific checks also captures prints cookies received nikto code free software data files uses drive program nikto detect 6700 potentially dangerous files/cgis checks outdated versions 1250 servers version specific problems 270 servers also checks server configuration items presence multiple index files http server options attempt identify installed web servers software scan items plugins frequently updated automatically updated variations nikto one macnikto macnikto applescript gui shell script wrapper built apple xcode interface builder released terms gpl provides easy access subset features available command-line version installed along macnikto application
[ 225, 2084, 8582, 10478, 7983, 7965 ]
Test
808
6
DELTREE:deltree computing codice_1 short delete tree command line command microsoft operating systems spartados x freedos recursively deletes entire subdirectory files ibm microsoft introduced pc-dos 1.0 ms-dos 1.0 subdirectories yet supported state affairs remedied release dos 2.0 introduced support subdirectories directory nesting however built-in facility deleting entire subdirectory trees release ms-dos 5.0 removing nested subdirectories required removing files lowest subdirectories removing subdirectory repeating process directory tree 1991 least one competing product dr-dos introduced well-received utility enabled recursive file deletion introduction ms-dos 6.0 microsoft regained parity adding codice_1 command codice_1 retained windows 9x shipped windows nt family operating systems instead codice_4 alias codice_5 command removes subdirectory along files codice_6 command-line switch given ms-dos pc-dos windows 9x codice_1 implemented external command functionality kept separate file outside command.com normal operation prompted user verification specified directories indeed intended removed safeguard could suppressed command-line option unlike commands operated file system multiple directories could passed command one time undocumented feature allowed user append trailing character directory name order preserve directory remove everything underneath theory deleted material could recovered freedos version developed charles dye licensed gpl command-syntax codice_1 designed ignore file directory attributes hidden read-only system command described potentially dangerous capable wiping hundreds files time combined purge command prevented data recovery became example worst-case payload malware well figuring one early computer sabotage trials contributing problem fact ms-dos windows 9x support discretionary access control mitigate issue windows nt family furthermore starting windows vista mandatory access control user account control mitigate issue
[ 3970, 8834, 6148, 10631, 2568, 6281, 6797, 3856, 8976, 6674, 532, 4248, 537, 8729, 4001, 4771, 292, 7847, 808, 7983, 7088, 10033, 178, 9780, 1978, 7356, 5437, 7486, 10428, 960, 8517, 1741, 4174, 9166, 10580, 1750, 9946, 7515, 10727, 6120,...
None
809
4
Double_switching:double switching double switching double cutting double breaking practice using multipole switch close open positive negative sides dc electrical circuit hot neutral sides ac circuit technique used prevent shock hazard electric devices connected unpolarised ac power plugs sockets double switching crucial safety engineering practice railway signalling wherein used ensure single false feed current relay unlikely cause wrong-side failure example using redundancy increase safety reduce likelihood failure analogous double insulation double switching increases cost complexity systems employed example extra relay contacts extra relays technique applied selectively provide cost-effective safety improvement landslip washaway detector buried earth embankment opens circuit landslide occur possible guarantee wet earth embankment complete circuit supposed break circuit double cut positive negative wires wet conductive earth likely blow fuse one hand short detecting relay hand either almost certain apply correct warning signal clapham junction rail crash 1988 caused part lack double switching known double cutting british railway industry signal relay question switched hot side return current came back unswitched wire loose wire bypassed contacts train detection relays switched signal allowing signal show green fact stationary train ahead 35 people killed resultant collision similar accident united airlines flight 811 caused part single-switched safety circuit baggage door mechanism failure wiring insulation circuit allowed baggage door unlocked false feed leading catastrophic de-pressurisation deaths nine passengers study railway electrical signalling new south wales 1900s shows ever increasing proportion double switching compared single switching double switching course cost wires relay contacts testing hand double switching inherently less prone wrong side failures helps overcome short-circuit faults hard test partial double switching might double switch lever controls track circuits one signal next single switching track circuits less critical overlap beyond next signal double switching facilitated modern relays contacts less space
[]
Test
810
3
ARM_big.LITTLE:arm big.little arm big.little heterogeneous computing architecture developed arm holdings coupling relatively battery-saving slower processor cores little relatively powerful power-hungry ones big typically one side active cores access memory regions workloads swapped big little cores fly intention create multi-core processor adjust better dynamic computing needs use less power clock scaling alone arm marketing material promises 75 savings power usage activities commonly arm big.little architectures used create multi-processor system-on-chip mpsoc october 2011 big.little announced along cortex-a7 designed architecturally compatible cortex-a15 october 2012 arm announced cortex-a53 cortex-a57 armv8-a cores also intercompatible allow use big.little chip arm later announced cortex-a12 computex 2013 followed cortex-a17 february 2014 cortex-a12 cortex-a17 also paired big.little configuration cortex-a7 given library cmos logic active power increases logic switches per second leakage increases number transistors cpus designed run fast different cpus designed save power fast out-of-order cpu loafing low speeds cpu much less leakage fewer transistors could work example might use smaller fewer transistors memory cache simpler microarchitecture pipeline big.little way optimize cases power speed system practice big.little system surprisingly inflexible one issue number types power clock domains ic provides may match standard power management features offered operating system another cpus longer equivalent abilities matching right software task right cpu becomes difficult problems solved making electronics software flexible three ways different processor cores arranged big.little design depending scheduler implemented kernel clustered model approach first simplest implementation arranging processor identically-sized clusters big little cores operating system scheduler see one cluster time load whole processor changes low high system transitions cluster relevant data passed common l2 cache active core cluster powered one activated cache coherent interconnect cci used model implemented samsung exynos 5 octa 5410 cpu migration via in-kernel switcher iks involves pairing 'big core 'little core possibly many identical pairs one chip pair operates one so-termed virtual core one real core fully powered running time 'big core used demand high 'little core employed demand low demand virtual core changes high low incoming core powered running state transferred outgoing shut processing continues new core switching done via cpufreq framework complete big.little iks implementation added linux 3.11. big.little iks improvement cluster migration main difference pair visible scheduler complex arrangement involves non-symmetric grouping 'big 'little cores single chip could one two 'big cores many 'little cores vice versa nvidia created something similar low-power 'companion core tegra 3 system-on-chip powerful use model big.little architecture heterogeneous multi-processing hmp enables use physical cores time threads high priority computational intensity case allocated big cores threads less priority less computational intensity background tasks performed little cores model implemented samsung exynos starting exynos 5 octa series 5420 5422 5430 apple mobile application processors starting apple a11 paired arrangement allows switching done transparently operating system using existing dynamic voltage frequency scaling dvfs facility existing dvfs support kernel e.g codice_1 linux simply see list frequencies/voltages switch sees fit like existing hardware however low-end slots activate 'little core high-end slots activate 'big core alternatively cores may exposed kernel scheduler decide process/thread executed required non-paired arrangement could possibly also used paired cores poses unique problems kernel scheduler least modern commodity hardware able assume cores smp system equal rather heterogeneous may 2017 arm announced dynamiq successor big.little dynamiq expected allow flexibility scalability designing multi-core processors contrast big.little increases maximum number cores cluster 8 allows varying core designs within single cluster 32 total clusters technology also offers fine grained per core voltage control faster l2 cache speeds however dynamiq incompatible previous arm designs initially supported cortex-a75 cortex-a55 cpu cores
[ 644, 9863, 392, 9226, 6926, 146, 7699, 11282, 2838, 7833, 6391, 1057, 2339, 5417, 8237, 7983, 10675, 8501, 10562, 9155, 6981, 2635, 1871, 1872, 9042, 980, 10966, 6495, 99, 8036, 9964, 5358, 6001, 5363, 373, 1014, 3575, 6268 ]
Validation
811
2
Installer_(macOS):installer macos installer application included macos progenitors openstep nextstep extracts installs files .pkg packages created next maintained apple inc. purpose help software developers create uniform software installers installer launches package metapackage file opened installation process vary substantially installer allows developers customize information user presented example made display custom welcome message software license readme installer also handles authentication checks packages valid installing allows developers run custom scripts several points installation process installer packages file extension prior mac os x leopard installer packages implemented mac os x packages packages collection files resided folders .pkg file extension mac os x leopard software packaging method changed use xar extensible archiver file format directory tree containing files packaged xar archive file extension instead distributing multiple files package allowed software files contained single file easier distribution benefit package signing
[ 2050, 4615, 5647, 1042, 6700, 4657, 1074, 9780, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 10857, 8303, 4721, 6771, 2676, 7806, 9343, 4737, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 94...
Test
812
4
Anomali:anomali anomali us-based cyber security company known threat intelligence analysis platform anomali founded 2013 threatstream rebranded anomali 2016 company gained investments major investors including gv formerly google ventures lumia capital company launched first version threatstream 2013 threatstream threat intelligence solution designed aggregate curate integrate threat data myriad sources threatstream platform notable product anomali known collaboration data integration microsoft company subsequently launched app store marketplace customers purchase trial premium threat intelligence anomali partners anomali also created trusted circles enable secure sharing among peers anomali enterprise launched 2016 solution detection active threats based machine learning optimized threat intelligence enabling organizations identify new attacks explore historical data uncover existing breaches anomali launched staxx free utility supporting stix taxii equipped free threat intelligence feed limo company works bank england numerous isacs received coverage various mainstream sources wall street journal bbc fortune harvard business review hill others anomali named cybersecurity 500 list
[]
Test
813
4
VPNBook:vpnbook vpnbook free virtual private network service service financed advertising donations service connects vpn via openvpn client pptp connection minimal variety geographic locations available servers include united states canada romania vpnbook used bypass governmental restrictions service connected two ways connection via third-party openvpn client pptp mac os x ios android ubuntu windows operating systems pptp support built software openvpn clients used also provides protocol stack file system process scheduling openvpn uses ssl protocol generally secure layer 2 tunnel protocol pptp review done pc magazine concluded service good choice among free vpn services even though certain functionality flaws service also reviewed techradar
[ 6797, 2228, 5749, 2558 ]
Test
814
2
Memory_debugger:memory debugger memory debugger also known runtime debugger debugger finding software memory problems memory leaks buffer overflows due bugs related allocation deallocation dynamic memory programs written languages garbage collection managed code might also need memory debuggers e.g memory leaks due living references collections memory debuggers work monitoring memory access allocations deallocation memory many memory debuggers require applications recompiled special dynamic memory allocation libraries whose apis mostly compatible conventional dynamic memory allocation libraries else use dynamic linking electric fence debugger debugs memory allocation malloc memory debuggers e.g valgrind work running executable virtual machine-like environment monitoring memory access allocation deallocation recompilation special memory allocation libraries required finding memory issues leaks extremely time consuming may manifest except certain conditions using tool detect memory misuse makes process much faster easier abnormally high memory utilization contributing factor software aging memory debuggers help programmers avoid software anomalies would exhaust computer system memory thus ensuring high reliability software even long runtimes static analysis tools also help find memory errors memory debuggers operate part application running static code analysis performed analyzing code without executing different techniques typically find different instances problems using together yields best result list tools useful memory debugging profiler used conjunction memory debugger
[ 2304, 1409, 7173, 2698, 779, 4747, 4112, 5008, 9490, 11539, 1689, 541, 3871, 1952, 8609, 1954, 7462, 6568, 815, 817, 4407, 3512, 2620, 11071, 2625, 1474, 1730, 4424, 6730, 6221, 6477, 10703, 5840, 5074, 6868, 3413, 86, 2262, 5080, 8280, ...
Test
815
2
Valgrind:valgrind valgrind programming tool memory debugging memory leak detection profiling valgrind originally designed free memory debugging tool linux x86 since evolved become generic framework creating dynamic analysis tools checkers profilers name valgrind reference main entrance valhalla norse mythology development release project named heimdall however name would conflicted security package valgrind essence virtual machine using just-in-time jit compilation techniques including dynamic recompilation nothing original program ever gets run directly host processor instead valgrind first translates program temporary simpler form called intermediate representation ir processor-neutral ssa-based form conversion tool see free whatever transformations would like ir valgrind translates ir back machine code lets host processor run valgrind recompiles binary code run host target simulated cpus architecture also includes gdb stub allow debugging target program runs valgrind monitor commands allow query valgrind tool various sorts information considerable amount performance lost transformations usually code tool inserts usually code run valgrind none tool nothing ir runs 1/4 1/5 speed normal program multiple tools included valgrind several external ones default used tool memcheck memcheck inserts extra instrumentation code around almost instructions keeps track validity unallocated memory starts invalid undefined initialized deterministic state possibly memory addressability whether memory address question points allocated non-freed memory block stored so-called v bits bits respectively data moved around manipulated instrumentation code keeps track v bits always correct single-bit level addition memcheck replaces standard c memory allocator implementation also includes memory guards around allocated blocks bits set invalid feature enables memcheck detect off-by-one errors program reads writes outside allocated block small amount problems memcheck detect warn include following price lost performance programs running memcheck usually run 20–30 times slower running outside valgrind use memory memory penalty per allocation thus developers run code memcheck valgrind tool time commonly use tools either trace specific bug verify latent bugs kind memcheck detect code addition memcheck valgrind several tools also several externally developed tools available one tool threadsanitizer another detector race conditions version 3.4.0 valgrind supports linux x86 x86-64 powerpc support added version 3.5.0 support linux armv7 used example certain smartphones added version 3.6.0 support solaris added version 3.11.0 unofficial ports unix-like platforms like freebsd openbsd netbsd version 3.7.0 arm/android platform support added since version 3.9.0 support linux mips64 little big endian mips dsp ase mips32 s390x decimal floating point instructions power8 power isa 2.07 instructions intel avx2 instructions intel transactional synchronization extensions rtm hle initial support hardware transactional memory power named main entrance valhalla norse mythology original author valgrind julian seward 2006 google-o'reilly open source award work valgrind several others also made significant contributions including cerion armour-brown jeremy fitzhardinge tom hughes nicholas nethercote paul mackerras dirk mueller bart van assche josef weidendorfer robert walsh used number linux-based projects addition performance penalty important limitation memcheck inability detect cases bounds errors use static stack-allocated data following code pass memcheck tool valgrind without incident despite containing errors described comments experimental valgrind tool exp-sgcheck written address limitation memcheck detect array overrun errors provided first access array within array bounds note exp-sgcheck detect array overrun code since first access array bounds detect array overrun error following code inability detect errors involving access stack allocated data especially noteworthy since certain types stack errors make software vulnerable classic stack smashing exploit
[ 7938, 5636, 7812, 8326, 4360, 4493, 4112, 2195, 11155, 1813, 10780, 1309, 1694, 8609, 1954, 3618, 3367, 6184, 4011, 814, 7983, 9646, 1459, 823, 4407, 11322, 9660, 833, 1474, 1730, 7234, 8773, 10817, 5067, 4562, 8147, 9432, 11644, 10333, 1...
Test
816
5
Ethernet_over_twisted_pair:ethernet twisted pair ethernet twisted pair technologies use twisted-pair cables physical layer ethernet computer network subset ethernet physical layers early ethernet used various grades coaxial cable 1984 starlan showed potential simple unshielded twisted pair led development 10base-t successors 100base-tx 1000base-t 10gbase-t supporting speeds 10 100 mbit/s 1 10 gbit/s respectively standards use 8p8c connectors cables range cat 3 cat 8 first two early designs twisted pair networking starlan standardized ieee standards association ieee 802.3e 1986 one megabit per second lattisnet developed january 1987 10 megabit per second developed 10base-t standard published 1990 ieee 802.3i used different signalling directly compatible 1988 released starlan 10 named working 10 mbit/s starlan 10 signalling used basis 10base-t addition link beat quickly indicate connection status using twisted pair cabling star topology ethernet addressed several weaknesses previous standards although 10base-t rarely used normal-operation signaling rate today still wide use nics wake-on-lan power-down mode special low-power low-bandwidth applications 10base-t still supported twisted-pair ethernet ports gigabit ethernet speed common names standards derive aspects physical media leading number 10 10base-t refers transmission speed mbit/s base denotes baseband transmission used designates twisted pair cable several standards transmission speed distinguished letter digit following tx t4 referring encoding method number lanes ethernet cables wired straight-through pin 1 pin 1 pin 2 pin 2 instances crossover form receive transmit transmit receive may still required cables ethernet may wired either t568a t568b termination standards ends cable since standards differ swap positions two pairs used transmitting receiving cable t568a wiring one end t568b wiring results crossover cable 10base-t 100base-tx host uses connector wiring called medium dependent interfaces mdi transmitting pins 1 2 receiving pins 3 6 network device infrastructure node hub switch accordingly uses connector wiring called mdi-x transmitting pins 3 6 receiving pins 1 2 ports connected using straight-through cable transmitter talks receiver end cable nodes two types ports mdi uplink port mdi-x regular port x internal crossover hubs switches regular ports routers servers end hosts e.g personal computers uplink ports two nodes type ports need connected crossover cable may required especially older equipment connecting nodes different type ports i.e mdi mdi-x vice versa requires straight-through cable thus connecting end host hub switch requires straight-through cable older switches hubs provided button allow port act either normal regular uplink port i.e using mdi-x mdi pinout respectively many modern ethernet host adapters automatically detect another computer connected straight-through cable automatically introduce required crossover needed neither adapters capability crossover cable required newer switches auto mdi-x ports allowing connections made straight-through cables devices connected support 1000base-t according standards connect regardless whether straight-through crossover cable used 10base-t transmitter sends two differential voltages +2.5 v βˆ’2.5 v. 100base-tx transmitter sends three differential voltages +1 v 0 v βˆ’1 v. unlike earlier ethernet standards using broadband coaxial cable 10base5 thicknet 10base2 thinnet 10base-t specify exact type wiring used instead specifies certain characteristics cable must meet done anticipation using 10base-t existing twisted-pair wiring systems conform specified wiring standard specified characteristics attenuation characteristic impedance propagation delay several types noise crosstalk cable testers widely available check parameters determine cable used 10base-t characteristics expected met 100 meters 24-gauge unshielded twisted-pair cable however high quality cabling reliable cable runs 150 meters longer often achievable considered viable technicians familiar 10base-t specification 100base-tx follows wiring patterns 10base-t sensitive wire quality length due higher bit rates 1000base-t uses four pairs bi-directionally using hybrid circuits cancellers data encoded using 4d-pam5 four dimensions using pam pulse amplitude modulation five voltages βˆ’2 v βˆ’1 v 0 v +1 v +2 v. +2 v βˆ’2 v may appear pins line driver voltage cable nominally +1 v +0.5 v 0 v βˆ’0.5 v βˆ’1 v. 100base-tx 1000base-t designed require minimum category 5 cable also specify maximum cable length 100 meters category 5 cable since deprecated new installations use category 5e 10base-t 100base-tx require two pairs pins 1–2 3–6 operate since common category 5 cable four pairs possible use spare pairs pins 4–5 7–8 10- 100-mbit/s configurations purposes spare pairs may used power ethernet poe two plain old telephone service pots lines second 10base-t 100base-tx connection practice great care must taken separate pairs 10/100-mbit/s ethernet equipment electrically terminate unused pins shared cable option gigabit ethernet 1000base-t requires four pairs operate addition computer-oriented two four-pair variants 100base-t1 1000base-t1 single-pair ethernet phys intended automotive applications optional data channels interconnect applications single pair operates full duplex maximum reach 15 100base-t1 1000base-t1 link segment type 40 1000base-t1 link segment type b four in-line connectors phys require balanced twisted pair impedance 100 Ο‰ cable must capable transmitting 600 mhz 1000base-t1 66 mhz 100base-t1 similar poe power data lines podl provide 50 w device ethernet twisted pair standards gigabit ethernet define full-duplex half-duplex communication however half-duplex operation gigabit speed n't supported existing hardware higher speed standards 2.5gbase-t 40gbase-t running 2.5 40 gbit/s consequently define full-duplex point-to-point links generally connected network switches n't support traditional shared-medium csma/cd operation many different modes operations 10base-t half duplex 10base-t full duplex 100base-tx half duplex ... exist ethernet twisted pair network adapters capable different modes operation 1000base-t requires autonegotiation order operate two linked interfaces set different duplex modes effect duplex mismatch network functions much slowly nominal speed duplex mismatch may inadvertently caused administrator configures interface fixed mode e.g 100 mbit/s full duplex fails configure remote interface leaving set autonegotiate autonegotiation process fails half duplex assumed autonegotiating side link
[ 2785, 5185, 5681, 7698, 405, 2998, 5270, 2968, 11321 ]
None
817
2
Splint_(programming_tool):splint programming tool splint short secure programming lint programming tool statically checking c programs security vulnerabilities coding mistakes formerly called lclint modern version unix lint tool splint ability interpret special annotations source code gives stronger checking possible looking source alone splint used gpsd part effort design zero defects splint free software released terms gnu general public license development activity splint stopped 2010 according cvs sourceforge september 2012 recent change repository november 2010 june 2018 git repository github concurs showing changes since november 2010 splint output fixed source
[ 1474, 1668, 5636, 5612, 814, 7983, 5492, 11221, 2045 ]
Train
818
4
LogicLocker:logiclocker logiclocker cross-vendor ransomware worm targets programmable logic controllers plcs used industrial control systems ics first described research paper released georgia institute technology malware capable hijacking multiple plcs various popular vendors researchers using water treatment plant model able demonstrate ability display false readings shut valves modify chlorine release poisonous levels using schneider modicon m241 schneider modicon m221 allen bradley micrologix 1400 plc ransomware designed bypass weak authentication mechanisms found various plcs lock legitimate users planting logicbomb plc 14 february 2017 noted 1,400 plcs used proof-of-concept attack accessible internet found using shodan attack method used logiclocker employs five stages initial infection horizontal vertical movement locking encryption negotiation initial infection take place various vulnerability exploits ics devices typically always state gives cyber-criminals ample time attempt compromise plc plcs generally strong authentication mechanisms place assist protecting potential attack initial infection could take place users clicking potentially malicious email attachment upon initial infection plc horizontal vertical movement achieved plc corporate network depending capabilities plc next stage attack locking attacker locks legitimate users inhibit prevent restoration efforts done password changes oem locking over-utilization plc resources changing ip/ports different locking methods offer varying degrees success strengths ensure successful attack encryption employed follow traditional cryptoransomware practices future negotiations lastly negotiations conducted attacker victim service restoration plcs contain email capability used send ransom message case micrologix 1400 plc used proof-of-concept attack assist defense vulnerability mitigation efforts several strategies employed endpoint security techniques password changes disabling unused ports protocols implementation access control lists acl maintaining proper backups firmware updates used significantly reduce attack surface presented cyber-criminals increased vigilant network monitoring used detect abnormalities protocol whitelisting firewalls network segmentation automated backups provide additional security provide decreased restoration time provided backups compromised attack training employees properly identify phishing emails prohibition usb devices incorporating comprehensive incident response plan used assist countering threat
[ 1970, 3525 ]
Test
819
6
Block_suballocation:block suballocation block suballocation feature computer file systems allows large blocks allocation units used making efficient use slack space end large files space would otherwise lost use internal fragmentation file systems n't support fragments feature also called tail merging tail packing commonly done packing tail last partial block multiple files single block file systems traditionally divided disk equally sized blocks simplify design limit worst-case fragmentation block sizes typically multiples 512 due size hard disk sectors files allocated traditional file systems whole blocks allocated individual files file sizes often multiples file system block size design inherently results last blocks files called tails occupying part block resulting called internal fragmentation confused external fragmentation waste space significant file system stores many small files become critical attempting use higher block sizes improve performance ffs derived unix file systems support fragments greatly mitigate effect block suballocation addresses problem dividing tail block way allow store fragments files block suballocation schemes perform allocation byte level however simply divide block smaller ones divisor usually power 2 example 38 kib file stored file system using 32 kib blocks file would normally span two blocks 64 kib storage remaining 26 kib second block becomes unused slack space 8 kib block suballocation however file would occupy 6 kib second block leave 2 kib 8 kib suballocation block slack free 24 kib block files file systems since designed take advantage unused space pack tails several files single shared tail block may first seem like would significantly increase file system fragmentation negative effect mitigated readahead features modern operating systems – dealing short files several tails may close enough another read together thus disk seek introduced file systems often employ heuristics order determine whether tail packing worthwhile given situation defragmentation software may use evolved heuristic scenarios majority files shorter half block size folder small source code files small bitmap images tail packing increase storage efficiency even twofold compared file systems without tail packing translates conservation disk space may also introduce performance increases due higher locality reference less data read also translating higher page cache efficiency however advantages negated increased complexity implementation widely used read-write file systems support block suballocation btrfs freebsd ufs2 called block level fragmentation popular reiserfs reiser4 longer common several read-only file systems use blocks thus implicitly using space efficiently suballocating file systems file systems double archive formats
[ 9762, 8772, 5256, 10091, 5293, 8379, 7983, 2194, 3315, 11667, 950, 4982, 3512, 3802, 3323, 7070, 2687 ]
Validation
820
4
Access_Control_Service:access control service access control service windows azure access control service acs microsoft-owned cloud-based service provides easy way authenticating authorizing users gain access web applications services allowing features authentication authorization factored application code facilitates application development time providing users benefit able log multiple applications reduced number authentications cases one authentication system provides authorization store accessed programmatically well via management portal authorizations configured user coming application via acs arrives application entrance authentication token also set authorization claims attached token acs retired microsoft november 7 2018 acs following features acs supports modern web platforms .net framework php python java ruby used web applications web services
[ 4704, 4194, 8644, 8554, 5677, 8174, 3573, 6805, 5433, 6811, 9245, 6750, 8159 ]
None
821
2
Nokia_N72:nokia n72 nokia n72 smartphone introduced nokia april 25 2006 runs symbian os 8.1a s60 2nd edition fp2 effectively re-branded nokia n70 reduced feature set released june 2006 nseries device features quite limited 2 mp camera runs symbian 8.1a operating system n72 based upon n70 actually remake n70-5 redesigned targeted mass market like prior model n70-5 removal 3g hardware making much cheaper however retains edition symbian os n70 well similar set features nokia n72 feature-rich phone 2-megapixel camera built-in flash fm radio bluetooth 2.0 digital music player functionality support 3d java games also supports bluetooth 2.0 usb 2.0 – pop-port interface available two colors namely glossy black pearl pink n72 uses dual-voltage reduced size mmc rs-dv-mmc cards also marketed mmcmobile cards mistaken rs-mmc cards 7 contact pins size user memory nokia n72 expandable 4 gb memory
[ 1537, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, 967, 9292,...
None
822
1
Act_on_Health_Sector_Database:act health sector database act health sector database also known act health sector database 139/1998 health sector database act media colloquial names 1998 act icelandic parliament allowed icelandic government grant license private company creation national biological database store health information could used research act noted boldly introducing policy related biobanks subject controversy decode genetics lobbying act beneficiary license create database passing act spurred international discussion policies already place differences policy existed among biobanks establishment national database icelandic citizens raised discussion nature informed consent process project
[]
Train
823
2
Linux:linux linux family open source unix-like operating systems based linux kernel operating system kernel first released september 17 1991 linus torvalds linux typically packaged linux distribution distributions include linux kernel supporting system software libraries many provided gnu project many linux distributions use word linux name free software foundation uses name gnu/linux emphasize importance gnu software causing controversy popular linux distributions include debian fedora ubuntu commercial distributions include red hat enterprise linux suse linux enterprise server desktop linux distributions include windowing system x11 wayland desktop environment gnome kde plasma 5 distributions intended servers may omit graphics altogether include solution stack lamp linux freely redistributable anyone may create distribution purpose linux originally developed personal computers based intel x86 architecture since ported platforms operating system linux leading operating system servers big iron systems mainframe computers os used top500 supercomputers since november 2017 gradually eliminated competitors used around 2.3 percent desktop computers chromebook runs linux kernel-based chrome os dominates us k–12 education market represents nearly 20 percent sub- 300 notebook sales us linux also runs embedded systems i.e devices whose operating system typically built firmware highly tailored system includes routers automation controls televisions digital video recorders video game consoles smartwatches many smartphones tablet computers run android linux derivatives dominance android smartphones linux largest installed base general-purpose operating systems linux one prominent examples free open-source software collaboration source code may used modified distributedβ€”commercially non-commerciallyβ€”by anyone terms respective licenses gnu general public license unix operating system conceived implemented 1969 bell laboratories united states ken thompson dennis ritchie douglas mcilroy joe ossanna first released 1971 unix written entirely assembly language common practice time later key pioneering approach 1973 rewritten c programming language dennis ritchie exception hardware i/o routines availability high-level language implementation unix made porting different computer platforms easier due earlier antitrust case forbidding entering computer business required license operating system source code anyone asked result unix grew quickly became widely adopted academic institutions businesses 1984 divested bell labs freed legal obligation requiring free licensing bell labs began selling unix proprietary product users legally allowed modify unix gnu project started 1983 richard stallman goal creating complete unix-compatible software system composed entirely free software work began 1984 later 1985 stallman started free software foundation wrote gnu general public license gnu gpl 1989 early 1990s many programs required operating system libraries compilers text editors unix shell windowing system completed although low-level elements device drivers daemons kernel called gnu/hurd stalled incomplete linus torvalds stated gnu kernel available time 1991 would decided write although released 1992 due legal complications development 386bsd netbsd openbsd freebsd descended predated linux torvalds also stated 386bsd available time probably would created linux minix created andrew s. tanenbaum computer science professor released 1987 minimal unix-like operating system targeted students others wanted learn operating system principles although complete source code minix freely available licensing terms prevented free software licensing changed april 2000 1991 attending university helsinki torvalds became curious operating systems frustrated licensing minix time limited educational use began work operating system kernel eventually became linux kernel torvalds began development linux kernel minix applications written minix also used linux later linux matured linux kernel development took place linux systems gnu applications also replaced minix components advantageous use freely available code gnu project fledgling operating system code licensed gnu gpl reused computer programs long also released compatible license torvalds initiated switch original license prohibited commercial redistribution gnu gpl developers worked integrate gnu components linux kernel making fully functional free operating system linus torvalds wanted call invention freax portmanteau free freak x allusion unix start work system project makefiles included name freax half year torvalds already considered name linux initially dismissed egotistical order facilitate development files uploaded ftp server codice_1 funet september 1991 ari lemmke torvalds coworker helsinki university technology hut one volunteer administrators ftp server time think freax good name named project linux server without consulting torvalds later however torvalds consented linux demonstrate word linux pronounced torvalds included audio guide kernel source code another variant pronunciation adoption linux production environments rather used hobbyists started take first mid-1990s supercomputing community organizations nasa started replace increasingly expensive machines clusters inexpensive commodity computers running linux commercial use began dell ibm followed hewlett-packard started offering linux support escape microsoft monopoly desktop operating system market today linux systems used throughout computing embedded systems virtually supercomputers secured place server installations popular lamp application stack use linux distributions home enterprise desktops growing linux distributions also become popular netbook market many devices shipping customized linux distributions installed google releasing chrome os designed netbooks linux greatest success consumer market perhaps mobile device market android one dominant operating systems smartphones popular tablets recently wearables linux gaming also rise valve showing support linux rolling gaming oriented linux distribution linux distributions also gained popularity various local national governments federal government brazil greg kroah-hartman lead maintainer linux kernel guides development stallman heads free software foundation turn supports gnu components finally individuals corporations develop third-party non-gnu components third-party components comprise vast body work may include kernel modules user applications libraries linux vendors communities combine distribute kernel gnu components non-gnu components additional package management software form linux distributions linux-based system modular unix-like operating system deriving much basic design principles established unix 1970s 1980s system uses monolithic kernel linux kernel handles process control networking access peripherals file systems device drivers either integrated directly kernel added modules loaded system running gnu userland key part systems based linux kernel android notable exception project implementation c library functions wrapper system calls linux kernel necessary kernel-userspace interface toolchain broad collection programming tools vital linux development including compilers used build linux kernel coreutils implement many basic unix tools project also develops popular cli shell graphical user interface gui used linux systems built top implementation x window system recently linux community seeks advance wayland new display server protocol place x11 many open-source software projects contribute linux systems installed components linux system include following user interface also known shell either command-line interface cli graphical user interface gui controls attached associated hardware common embedded systems desktop systems default user interface usually graphical although cli commonly available terminal emulator windows separate virtual console cli shells text-based user interfaces use text input output dominant shell used linux bourne-again shell bash originally developed gnu project low-level linux components including various parts userland use cli exclusively cli particularly suited automation repetitive delayed tasks provides simple inter-process communication desktop systems popular user interfaces gui shells packaged together extensive desktop environments kde plasma gnome mate cinnamon unity lxde pantheon xfce though variety additional user interfaces exist popular user interfaces based x window system often simply called x provides network transparency permits graphical application running one system displayed another user may interact application however certain extensions x window system capable working network several x display servers exist reference implementation x.org server popular several types window managers exist x11 including tiling dynamic stacking compositing window managers provide means control placement appearance individual application windows interact x window system simpler x window managers dwm ratpoison i3wm herbstluftwm provide minimalist functionality elaborate window managers fvwm enlightenment window maker provide features built-in taskbar themes still lightweight compared desktop environments desktop environments include window managers part standard installations mutter gnome kwin kde xfwm xfce although users may choose use different window manager preferred wayland display server protocol intended replacement x11 protocol received wider adoption unlike x11 wayland need external window manager compositing manager therefore wayland compositor takes role display server window manager compositing manager weston reference implementation wayland gnome mutter kde kwin ported wayland standalone display servers enlightenment already successfully ported since version 19 linux currently two modern kernel-userspace apis handling video input devices v4l2 api video streams radio dvb api digital tv reception due complexity diversity different devices due large amount formats standards handled apis infrastructure needs evolve better fit devices also good userspace device library key success userspace applications able work formats supported devices primary difference linux many popular contemporary operating systems linux kernel components free open-source software linux operating system although far widely used free open-source software licenses based principle copyleft kind reciprocity work derived copyleft piece software must also copyleft common free software license gnu general public license gpl form copyleft used linux kernel many components gnu project linux-based distributions intended developers interoperability operating systems established computing standards linux systems adhere posix sus lsb iso ansi standards possible although date one linux distribution posix.1 certified linux-ft. free software projects although developed collaboration often produced independently fact software licenses explicitly permit redistribution however provides basis larger scale projects collect software produced stand-alone projects make available form linux distribution many linux distributions manage remote collection system software application software packages available download installation network connection allows users adapt operating system specific needs distributions maintained individuals loose-knit teams volunteer organizations commercial entities distribution responsible default configuration installed linux kernel general system security generally integration different software packages coherent whole distributions typically use package manager apt yum zypper pacman portage install remove update system software one central location distribution largely driven developer user communities vendors develop fund distributions volunteer basis debian well-known example others maintain community version commercial distributions red hat fedora suse opensuse many cities regions local associations known linux user groups lugs seek promote preferred distribution extension free software hold meetings provide free demonstrations training technical support operating system installation new users many internet communities also provide support linux users developers distributions free software open-source projects irc chatrooms newsgroups online forums another means support notable examples linuxquestions.org various distribution specific support community forums ones ubuntu fedora gentoo linux distributions host mailing lists commonly specific topic usage development given list several technology websites linux focus print magazines linux often bundle cover disks carry software even complete linux distributions although linux distributions generally available without charge several large corporations sell support contribute development components system free software analysis linux kernel showed 75 percent code december 2008 january 2010 developed programmers working corporations leaving 18 percent volunteers 7 unclassified major corporations provide contributions include dell ibm hp oracle sun microsystems part oracle nokia number corporations notably red hat canonical suse built significant business around linux distributions free software licenses various software packages distribution built linux kernel based explicitly accommodate encourage commercialization relationship linux distribution whole individual vendors may seen symbiotic one common business model commercial suppliers charging support especially business users number companies also offer specialized business version distribution adds proprietary support packages tools administer higher numbers installations simplify administrative tasks another business model give away software order sell hardware used norm computer industry operating systems cp/m apple dos versions mac os prior 7.6 freely copyable modifiable computer hardware standardized throughout 1980s became difficult hardware manufacturers profit tactic os would run manufacturer computer shared architecture linux distributions support dozens programming languages original development tools used building linux applications operating system programs found within gnu toolchain includes gnu compiler collection gcc gnu build system amongst others gcc provides compilers ada c c++ go fortran many programming languages cross-platform reference implementation supports linux example php perl ruby python java go rust haskell first released 2003 llvm project provides alternative cross-platform open-source compiler many languages proprietary compilers linux include intel c++ compiler sun studio ibm xl c/c++ compiler basic form visual basic supported forms gambas freebasic xbasic terms terminal programming quickbasic turbo basic programming form qb64 common feature unix-like systems linux includes traditional specific-purpose programming languages targeted scripting text processing system configuration management general linux distributions support shell scripts awk sed make many programs also embedded programming language support configuring programming example regular expressions supported programs like grep locate traditional unix mta sendmail contains turing complete scripting system advanced text editor gnu emacs built around general purpose lisp interpreter distributions also include support php perl ruby python dynamic languages common linux also supports c via mono vala scheme guile scheme acts extension language targeting gnu system utilities seeking make conventionally small static compiled c programs unix design rapidly dynamically extensible via elegant functional high-level scripting system many gnu programs compiled optional guile bindings end number java virtual machines development kits run linux including original sun microsystems jvm hotspot ibm j2se well many open-source projects like kaffe jikesrvm gnome kde popular desktop environments provide framework developing applications projects based gtk+ qt widget toolkits respectively also used independently larger framework support wide variety languages number integrated development environments available including anjuta codelite eclipse geany activestate komodo kdevelop lazarus monodevelop netbeans qt creator long-established editors vim nano emacs remain popular linux kernel widely ported operating system kernel available devices ranging mobile phones supercomputers runs highly diverse range computer architectures including hand-held arm-based ipaq ibm mainframes system z9 system z10 specialized distributions kernel forks exist less mainstream architectures example elks kernel fork run intel 8086 intel 80286 16-bit microprocessors Β΅clinux kernel fork may run systems without memory management unit kernel also runs architectures ever intended use manufacturer-created operating system macintosh computers powerpc intel processors pdas video game consoles portable music players mobile phones several industry associations hardware conferences devoted maintaining improving support diverse hardware linux freedomhec time support different hardware improved linux resulting off-the-shelf purchase good chance compatible besides linux distributions designed general-purpose use desktops servers distributions may specialized different purposes including computer architecture support embedded systems stability security localization specific region language targeting specific user groups support real-time applications commitment given desktop environment furthermore distributions deliberately include free software four hundred linux distributions actively developed dozen distributions popular general-purpose use popularity linux standard desktop computers laptops increasing years modern distributions include graphical user environment two popular environments kde plasma desktop xfce single official linux desktop exists rather desktop environments linux distributions select components pool free open-source software construct gui implementing less strict design guide gnome example human interface guidelines design guide gives human–machine interface important role graphical design also considering people disabilities even focusing security collaborative nature free software development allows distributed teams perform language localization linux distributions use locales localizing proprietary systems would cost-effective example sinhalese language version knoppix distribution became available significantly microsoft translated windows xp sinhalese case lanka linux user group played major part developing localized system combining knowledge university professors linguists local developers performance linux desktop controversial topic example 2007 con kolivas accused linux community favoring performance servers quit linux kernel development frustration lack focus desktop gave tell interview topic since significant amount development focused improving desktop experience projects upstart systemd aim faster boot time wayland mir projects aim replacing x11 enhancing desktop performance security appearance many popular applications available wide variety operating systems example mozilla firefox openoffice.org/libreoffice blender downloadable versions major operating systems furthermore applications initially developed linux pidgin gimp ported operating systems including windows macos due popularity addition growing number proprietary desktop applications also supported linux autodesk maya foundry nuke high-end field animation visual effects see list proprietary software linux details also several companies ported companies games linux linux also supported platform popular steam desura digital-distribution services many types applications available microsoft windows macos also run linux commonly either free software application exist functions application found another operating system application version works linux skype video games like dota 2 team fortress 2 furthermore wine project provides windows compatibility layer run unmodified windows applications linux sponsored commercial interests including codeweavers produces commercial version software since 2009 google also provided funding wine project crossover proprietary solution based open-source wine project supports running windows versions microsoft office intuit applications quicken quickbooks adobe photoshop versions cs2 many popular games world warcraft cases linux port software areas desktop publishing professional audio equivalent software available linux also possible run applications written android versions linux using anbox besides externally visible components x window managers non-obvious quite central role played programs hosted freedesktop.org d-bus pulseaudio major desktop environments gnome kde include offering graphical front-ends written using corresponding toolkit gtk+ qt display server another component longest time communicating x11 display server protocol clients prominent software talking x11 includes x.org server xlib frustration cumbersome x11 core protocol especially numerous extensions led creation new display server protocol wayland installing updating removing software linux typically done use package managers synaptic package manager packagekit yum extender major linux distributions extensive repositories often containing tens thousands packages software run linux available official repositories alternatively users install packages unofficial repositories download pre-compiled packages directly websites compile source code methods come different degrees difficulty compiling source code general considered challenging process new linux users hardly needed modern distributions method specific linux linux distributions also become popular netbook market many devices asus eee pc acer aspire one shipping customized linux distributions installed 2009 google announced chrome os minimal linux-based operating system using chrome browser main user interface chrome os run non-web applications except bundled file manager media player certain level support android applications added later versions netbooks shipped operating system termed chromebooks started appearing market june 2011 linux distributions long used server operating systems risen prominence area netcraft reported september 2006 eight ten two unknown os reliable internet hosting companies ran linux distributions web servers linux top position june 2008 linux distributions represented five top ten freebsd three ten microsoft two ten since february 2010 linux distributions represented six top ten freebsd three ten microsoft one ten linux top position linux distributions cornerstone lamp server-software combination linux apache mariadb/mysql perl/php/python achieved popularity among developers one common platforms website hosting linux distributions become increasingly popular mainframes partly due pricing open-source model december 2009 computer giant ibm reported would predominantly market sell mainframe-based enterprise linux server linuxcon north america 2015 ibm announced linuxone series mainframes specifically designed run linux open-source software linux distributions also dominant operating systems supercomputers november 2017 supercomputers 500 list run variant linux several operating systems smart devices smartphones tablet computers smart tvs in-vehicle infotainment ivi systems based linux major platforms systems include android firefox os mer tizen android become dominant mobile operating system smartphones running 79.3 units sold worldwide second quarter 2013 android also popular operating system tablets android smart tvs in-vehicle infotainment systems also appeared market cellphones pdas running linux open-source platforms became common 2007 examples include nokia n810 openmoko neo1973 motorola rokr e8 continuing trend palm later acquired hp produced new linux-derived operating system webos built line palm pre smartphones nokia maemo one earliest mobile operating systems based debian later merged intel moblin another linux-based operating system form meego project later terminated favor tizen operating system targeted mobile devices well ivi tizen project within linux foundation several samsung products already running tizen samsung gear 2 significant example samsung z smartphones use tizen instead android result meego termination mer project forked meego codebase create basis mobile-oriented operating systems july 2012 jolla announced sailfish os mobile operating system built upon mer technology mozilla firefox os consists linux kernel hardware abstraction layer web-standards-based runtime environment user interface integrated web browser canonical released ubuntu touch aiming bring convergence user experience mobile operating system desktop counterpart ubuntu operating system also provides full ubuntu desktop connected external monitor due low cost ease customization linux often used embedded systems non-mobile telecommunications equipment sector majority customer-premises equipment cpe hardware runs linux-based operating system openwrt community driven example upon many oem firmware releases based example popular tivo digital video recorder also uses customized linux several network firewalls routers makers cisco/linksys korg oasys korg kronos yamaha motif xs/motif xf music workstations yamaha s90xs/s70xs yamaha mox6/mox8 synthesizers yamaha motif-rack xs tone generator module roland rd-700gx digital piano also run linux linux also used stage lighting control systems wholehogiii console past games available linux recent years games released support linux especially indie games exception aaa title games android popular mobile platform uses linux kernel gained much developer interest one main platforms mobile game development along ios operating system apple iphone ipad devices february 14 2013 valve released linux version steam popular game distribution platform pc many steam games ported linux december 13 2013 valve released steamos gaming oriented os based debian beta testing plans ship steam machines gaming entertainment platform valve also developed vogl opengl debugger intended aid video game development well porting source game engine desktop linux result valve effort several prominent games dota 2 team fortress 2 portal portal 2 left 4 dead 2 natively available desktop linux july 31 2013 nvidia released shield attempt use android specialized gaming platform linux users play windows games wine crossover linux 22 august 2018 valve released fork wine called proton aimed gaming features improvements vanilla wine vulkan-based directx 11 12 implementations steam integration better full screen game controller support improved performance multi-threaded games due flexibility customizability free open-source nature linux becomes possible highly tune linux specific purpose two main methods creating specialized linux distribution building scratch general-purpose distribution base distributions often used purpose include debian fedora ubuntu based debian arch linux gentoo slackware contrast linux distributions built scratch general-purpose bases instead focus jeos philosophy including necessary components avoiding resource overhead caused components considered redundant distribution use cases home theater pc htpc pc mainly used entertainment system especially home theater system normally connected television often additional audio system openelec linux distribution incorporates media center software kodi os tuned specifically htpc built ground adhering jeos principle os lightweight suitable confined usage range htpc also special editions linux distributions include mythtv media center software mythbuntu special edition ubuntu kali linux debian-based linux distribution designed digital forensics penetration testing comes preinstalled several software applications penetration testing identifying security exploits ubuntu derivative backbox provides pre-installed security network analysis tools ethical hacking arch-based blackarch includes 2100 tools pentesting security researching many linux distributions created privacy secrecy network anonymity information security mind including tails tin hat linux tinfoil hat linux lightweight portable security distribution based arch linux developed united states department defense tor-ramdisk minimal distribution created solely host network anonymity software tor linux live cd sessions long used tool recovering data broken computer system repairing system building upon idea several linux distributions tailored purpose emerged use gparted partition editor additional data recovery system repair software spacex uses multiple redundant fault-tolerant design falcon 9 rocket merlin engine controlled three voting computers two physical processors per computer constantly check operation linux inherently fault-tolerant operating system function whole system including hardware flight computer software makes purpose flexibility commercial off-the-shelf parts system-wide radiation-tolerant design used instead radiation hardened parts spacex conducted 76 launches falcon 9 since 2010 one successfully delivered primary payloads intended orbit plans use transport astronauts international space station addition windows used operating system non-mission critical systemslaptops used board space station examplebut replaced linux first linux-powered humanoid robot also undergoing in-flight testing jet propulsion laboratory used linux number years help projects relating construction unmanned space flight deep space exploration nasa uses linux robotics mars rover ubuntu linux save data satellites linux distributions created provide hands-on experience coding source code students devices raspberry pi addition producing practical device intention show students things work hood ubuntu derivatives edubuntu linux schools project well debian derivative skolelinux provide education-oriented software packages also include tools administering building school computer labs computer-based classrooms linux terminal server project ltsp instant webkiosk webconverger browser-based linux distributions often used web kiosks digital signage thinstation minimalist distribution designed thin clients rocks cluster distribution tailored high-performance computing clusters general-purpose linux distributions target specific audience users specific language geographical area examples include ubuntu kylin chinese language users blankon targeted indonesians profession-specific distributions include ubuntu studio media creation dnalinux bioinformatics also muslim-oriented distribution name sabily consequently also provides islamic tools certain organizations use slightly specialized linux distributions internally including gendbuntu used french national gendarmerie goobuntu used internally google astra linux developed specifically russian army many quantitative studies free/open-source software focus topics including market share reliability numerous studies specifically examining linux linux market growing rapidly revenue servers desktops packaged software running linux expected exceed 35.7 billion 2008 analysts proponents attribute relative success linux security reliability low cost freedom vendor lock-in linux kernel licensed gnu general public license gpl version 2 gpl requires anyone distributes software based source code license must make originating source code modifications available recipient terms key components typical linux distribution also mainly licensed gpl may use licenses many libraries use gnu lesser general public license lgpl permissive variant gpl x.org implementation x window system uses mit license torvalds states linux kernel move version 2 gpl version 3 specifically dislikes provisions new license prohibit use software digital rights management would also impractical obtain permission copyright holders number thousands 2001 study red hat linux 7.1 found distribution contained 30 million source lines code using constructive cost model study estimated distribution required eight thousand person-years development time according study software developed conventional proprietary means would cost us dollars develop united states source code 71 written c programming language many languages used including c++ lisp assembly language perl python fortran various shell scripting languages slightly half lines code licensed gpl linux kernel 2.4 million lines code 8 total later study analysis performed debian version 4.0 etch released 2007 distribution contained close 283 million source lines code study estimated would required seventy three thousand man-years cost us dollars develop conventional means united states name linux trademark registered linus torvalds initially nobody registered august 15 1994 william r. della croce jr. filed trademark linux demanded royalties linux distributors 1996 torvalds affected organizations sued trademark assigned torvalds 1997 case settled licensing trademark since handled linux mark institute lmi torvalds stated trademarked name prevent someone else using lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense free software foundation fsf prefers gnu/linux name referring operating system whole considers linux distributions variants gnu operating system initiated 1983 richard stallman president fsf explicitly take issue name android android os also operating system based linux kernel gnu part minority public figures software projects stallman fsf notably debian sponsored fsf 1996 also use gnu/linux referring operating system whole media common usage however refers family operating systems simply linux many large linux distributions example suse linux red hat enterprise linux contrast linux distributions containing free software use gnu/linux simply gnu trisquel gnu/linux parabola gnu/linux-libre blag linux gnu gnewsense 8 13 modern linux distribution made gnu components range depending whether gnome considered part gnu determined counting lines source code making ubuntu natty release meanwhile 6 taken linux kernel increased 9 including direct dependencies
[ 8195, 8197, 9, 15, 18, 19, 8213, 8214, 25, 28, 8225, 8227, 8228, 38, 8235, 44, 8242, 8243, 56, 8248, 59, 8254, 8256, 8260, 69, 8262, 8263, 76, 8268, 85, 89, 97, 8294, 8295, 8298, 8303, 8304, 8306, 118, 8312, 125, 8319, 131, 132, ...
Test
824
7
Planview:planview planview global enterprise software company headquartered austin texas company founded 1989 austin texas patrick durbin 1997 company launched complete web-based resource project portfolio management ppm software planview enterprise version 14 2017 2010 company moved cloud offer software service saas solutions december 2013 insight venture partners acquired substantial interest planview august 2014 planview acquired projectplace stockholm-based project collaboration company planview went acquire troux technologies austin-based enterprise architecture management software company may 2015 august 1 2016 company announced acquisition san francisco-based innotas thus extending project portfolio management software leadership mid-market january 2017 thoma bravo acquired planview becoming majority shareholder insight venture partners maintained original 2014 capital investment company december 2017 planview acquired leankit december 2018 planview acquired spigit planview recognized visionary magic quadrant enterprise architecture tools gartner magic quadrant enterprise architecture tools – may 24 2017 gartner names planview leader project portfolio management ppm gartner 2017 magic quadrant project portfolio management worldwide may 25 2017 planview cited leader troux forrester waveβ„’ enterprise architecture management suites q2 2017 – june 14 2017 forrester research identifies projectplace leader rapidly growing work collaboration market forrester waveβ„’ enterprise collaborative work management q4 2016 ventana research awards 2016 cio/it leadership award mentor graphics using planview enterprise projectplace ensure resources working initiatives highest strategic value constellation research names projectplace 2016 constellation shortlistβ„’ social task management
[]
Test
825
9
Christophe_de_Dinechin:christophe de dinechin christophe de dinechin french computer scientist contributions video games programming languages operating systems designer xl programming language associated concept programming methodology de dinechin also contributed c++ notably high-performance exception handling implementation became de facto standard industry de dinechin one proponents portable c++ abi initially developed itanium widely used across platforms initial developer alpha waves groundbreaking atari st game probably first 3d platform game de dinechin heavily influenced frederick raynal main developer alone dark de dinechin also wrote viral games hp-48 calculators first person take advantage hardware-scrolling machines early 2000s worked software architect hp-ux initial designer hp virtualisation platform itanium servers hp integrity virtual machines awarded 10 us patents work christophe de dinechin initial port emacs aqua user interface wrote variety open-source drivers hp de200c digital entertainment center turning web-connected cd player true digital video recorder christophe de dinechin currently ceo taodyne company develops 3d animation tool using xl programming language describe dynamic documents
[ 9921, 8262, 7983, 5523, 1304 ]
None
826
4
Cyber_Storm_Exercise:cyber storm exercise cyber storm exercise simulated exercise overseen department homeland security took place february 6 february 10 2006 purpose testing nation defenses digital espionage simulation targeted primarily american security organizations officials united kingdom canada australia new zealand participated well exercise simulated large scale attack critical digital infrastructure communications transportation energy production simulation took place series incidents included exercise computers running simulation came attack players heavily censored files released associated press reveal time exercise organizers sent every one involved e-mail marked important telling participants simulation attack game control computers cyber storm exercise highlighted gaps shortcomings nation cyber defenses cyber storm exercise report found institutions attack hard time getting bigger picture instead focused single incidents treating individual discrete light test department homeland security raised concern relatively modest resources assigned cyber-defense would overwhelmed real attack
[ 10249, 4956, 9398 ]
Test
827
4
Composite_Blocking_List:composite blocking list computer networking composite blocking list cbl dns-based blackhole list suspected e-mail spam sending computer infections cbl takes source data large spamtraps/mail infrastructures lists ips exhibiting characteristics cbl attempts avoid listing real mail servers certain misconfigurations mail servers make system appear infected example servers send helo 'localhost similar incorrect domain entries automatically expire period time cbl provide public access gathered evidence cbl data used spamhaus xbl list
[ 8224, 10756, 4295, 4883, 5591, 2041, 7739 ]
Test
828
1
Interfolio:interfolio interfolio academic faculty management software higher education technology company based washington d.c company provides software assist shared governance processes faculty activity tracking tools assist institutional accreditation reporting january 2016 company acquired 12 million investor funding interfolio founded georgetown university senior steve goldenberg 1999 interfolio ’ services represents complete faculty lifecycle information system interfolio created streamline college application process academic jobs providing online portfolio application system principal interfolio services includes dossier service collecting curating delivering academic materials scholarly opportunities interfolio based module faculty information includes workflow evaluation suite well tool faculty activity reporting
[]
Validation
829
5
Discard_Protocol:discard protocol discard protocol service internet protocol suite defined rfc 863 intended testing debugging measurement host management purposes host may send data host supports discard protocol either transmission control protocol tcp user datagram protocol udp port number 9 data sent server simply discarded response returned reason udp usually used tcp allows services accessible session-oriented connections example via http proxies vpn unix-like operating systems discard server built inetd xinetd daemon discard service usually enabled default may enabled adding following lines file /etc/inetd.conf reloading configuration discard protocol tcp/udp equivalent unix filesystem node codice_1 service guaranteed receive sent used debugging tcp and/or udp code requiring guaranteed reception payload sent various routers tcp udp port 9 discard protocol port 7 echo protocol relaying icmp datagrams also used default proxy relay wake-on-lan wol magic packets internet hosts local network order wake remotely hosts must also network adapter configured accept wol datagrams router must proxy setting enabled possibly also configuration forwarding rules embedded firewall open ports internet side
[ 10242, 3847, 649, 9868, 3218, 5397, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 933, 2085, 3750, 3751, 3752, 8998, 9381, 10924, 562, 2996, 9909, 6651, 10171, 3133, 3006, 4797, 5181, 5437, 8386, 7364, 2887, 8265, 2509, 4687, 849, 69...
None
830
4
National_Software_Reference_Library:national software reference library national software reference library nsrl project national institute standards technology nist maintains repository known software file profiles file signatures use law enforcement organizations involved computer forensic investigations project supported united states department justice national institute justice federal bureau investigation fbi defense computer forensics laboratory dcfl u.s. customs service software vendors state local law enforcement also provides research environment computational analysis large sets files nsrl made three major elements nsrl collects software various sources computes message digests cryptographic hash values digests stored reference data set rds used identify known files digital media help alleviate much effort involved determining files important evidence computers file systems seized part criminal investigations although rds hashset contains malicious software steganography hacking tools contain illicit material e.g indecent images collection original software media maintained order provide repeatability calculated hash values ensuring admissibility data court 2004 nsrl released set hashes verifying evoting software part us election assistance commission electronic voting security strategy october 1 2013 reference data set version 2.42 contains 33.9 million unique hash values data set available cost public addition operating system application software library also collected numerous popular video game titles used part data forensics well partially serve video game preservation
[ 2437, 5010, 4500, 8469, 3099, 7968, 6177, 5284, 11182, 10290, 4789, 8635, 2494, 7369, 1994, 6475, 10189, 4049, 4956, 4834, 5475, 7525, 9319, 7160, 11642 ]
None
831
2
Darik's_Boot_and_Nuke:darik boot nuke darik boot nuke also known dban free open-source project hosted sourceforge program designed securely erase hard disk data permanently removed longer recoverable achieved overwriting data pseudorandom numbers generated mersenne twister isaac gutmann method quick erase dod short 3 passes dod 5220.22-m 7 passes also included options handle data remanence dban booted cd dvd usb flash drive diskless using preboot execution environment based linux supports pata ide scsi sata hard drives dban configured automatically wipe every hard disk sees system entire network systems making useful unattended data destruction scenarios dban exists x86 systems dban like methods data erasure suitable use prior computer recycling personal commercial situations donating selling computer september 2012 blancco finland announced acquisition dban recent version dban 2.30 released 4 june 2015 since time dban development seems ended official website used blancco market blancco drive eraser instead unofficial fork dban actively maintained dwipe program dban uses forked available standalone command line program called nwipe actively maintained nwipe incorporated free software rescue toolkit packages one system rescue toolkit
[ 1475, 3972, 8997, 2534, 11368, 7369, 7983, 9807, 3314, 499, 3572, 7090, 9086, 823, 10195, 9499, 6494 ]
None
832
7
Knowland_Group:knowland group knowland web-based software company provides business development products services hospitality industry knowland traces roots back small software engineering firm firm spent months developing entirely new kind hotel readerboard service heavily reliant web technology client industry client backed knowland ’ founders recognized hospitality industry ’ need higher standard market intelligence decided start hospitality field research service fall 2004 online readerboard service launched knowland signed first client holiday inn arlington va. september 2004 2005 company expanded 20 markets serving diverse clientele single multi-property clients end 2006 knowland 400 clients 60 markets tracked 200,000 events 2007 knowland introduced insight tool generates targeted sales leads details prospect ’ event booking history company also activated 7,000 square foot call center expand infrastructure customer support in-depth contact event research sales activities behalf customers event booking center employs research sales support professionals specialize cold calling become extension hotel clients ’ sales staff knowland launched target net meetings management sales force automation platform 2010 addition managing events start finish target net also generated sales leads opportunities product discontinued 2015 today knowland provider intuitive business intelligence products hospitality industry 3,000 client hotels 50,000 users globally knowland provider business development solutions hospitality industry target net insight readers cloud-based accessible computer connected internet target net salesforce automation meetings management tool allows hoteliers manage sales funnel start finish knowland longer sells target net product continues offer support clients already using insight search engine sales lead-generation tool gives hotel sales teams access database groups held millions meetings hotels conference centers 2014 knowland released insight 3.0 effort enhance insight platform transformed traditional search engine leads database customizable meeting intelligence tool event professionals insight 3.0 included new features anonymous reviews groups events ability follow groups properties people detailed group profiles receiving many unfavorable reviews clients regarding changes insight 3.0 release knowland launched insight 3.1 following year 2015 insight 3.1 designed almost entirely around user feedback release leveraged powerful enhanced search capabilities tool putting popular search features spotlight insight 3.1 made focus knowland technology less social media-influenced networking power raw historical data groups planners meetings contact information help clients optimize sales tactics readers online readerboard service offers daily reporting data groups hold meetings events hotels competitor properties readers combines online tool knowland ’ version traditional readerboard report addition telephone-verified contact information week approximately 400 field researchers take digital photos hotel readerboards photos uploaded night knowland database data made available online clients next morning new groups constantly added database detailed profiles created updated group april 2014 knowland released new data management process help maintain accuracy freshness information provided knowland group ranked 26th deloitte ’ 2010 technology fast 500β„’ list october 2010 list identifies fastest-growing technology media telecommunications life sciences clean technology companies north america rankings award based fiscal revenue growth 2005–2009 knowland grew 5,764 percent knowland ranked fifth 190 companies software industry largest industry recognized fast 500β„’ list knowland ranked first greater philadelphia fast 50 list target net knowland ’ sales force automation meetings management tool received 2010 product year award technology marketing corporation ’ customer interaction solutions magazine award given annually companies based vision leadership diligence
[ 4194, 2901 ]
Validation
833
3
Advanced_Vector_Extensions:advanced vector extensions advanced vector extensions avx also known sandy bridge new extensions extensions x86 instruction set architecture microprocessors intel amd proposed intel march 2008 first supported intel sandy bridge processor shipping q1 2011 later amd bulldozer processor shipping q3 2011 avx provides new features new instructions new coding scheme avx2 expands integer commands 256 bits introduces fused multiply-accumulate fma operations avx-512 expands avx 512-bit support using new evex prefix encoding proposed intel july 2013 first supported intel knights landing processor shipped 2016 avx uses sixteen ymm registers perform single instruction multiple pieces data see simd ymm register hold simultaneous operations math width simd registers increased 128 bits 256 bits renamed xmm0–xmm7 ymm0–ymm7 x86-64 mode ymm0–ymm15 legacy sse instructions still utilized via vex prefix operate lower 128 bits ymm registers avx introduces three-operand simd instruction format destination register distinct two source operands example sse instruction using conventional two-operand form b use non-destructive three-operand form c b preserving source operands avx three-operand format limited instructions simd operands ymm include instructions general purpose registers e.g eax support first appear avx2 alignment requirement simd memory operands relaxed new vex coding scheme introduces new set code prefixes extends opcode space allows instructions two operands allows simd vector registers longer 128 bits vex prefix also used legacy sse instructions giving three-operand form making interact efficiently avx instructions without need vzeroupper vzeroall avx instructions support 128-bit 256-bit simd 128-bit versions useful improve old code without needing widen vectorization avoid penalty going sse avx also faster early amd implementations avx mode sometimes known avx-128 avx instructions addition ones 256-bit extensions legacy 128-bit sse instructions usable 128-bit 256-bit operands cpus listed families support avx generally cpus commercial denomination core i3/i5/i7 support whereas pentium celeron cpus n't issues regarding compatibility future intel amd processors discussed xop instruction set gcc starting version 4.6 although 4.3 branch certain support intel compiler suite starting version 11.1 support avx visual studio 2010/2012 compiler supports avx via intrinsic /arch avx switch open64 compiler version 4.5.1 supports avx -mavx flag absoft supports -mavx flag pathscale supports via -mavx flag free pascal compiler supports avx avx2 -cfavx -cfavx2 switches version 2.7.1 vector pascal compiler supports avx via -cpuavx32 flag gnu assembler gas inline assembly functions support instructions accessible via gcc intel primitives intel inline assembler closely compatible gas although general handling local references within inline code assemblers masm vs2010 version yasm fasm nasm jwasm avx adds new register-state 256-bit wide ymm register file explicit operating system support required properly save restore avx expanded registers context switches following operating system versions support avx advanced vector extensions 2 avx2 also known haswell new instructions expansion avx instruction set introduced intel haswell microarchitecture avx2 makes following additions sometimes another extension using different cpuid flag considered part avx2 instructions listed page avx-512 512-bit extensions 256-bit advanced vector extensions simd instructions x86 instruction set architecture proposed intel july 2013 scheduled supported 2015 intel knights landing processor avx-512 instruction encoded new evex prefix allows 4 operands 7 new 64-bit opmask registers scalar memory mode automatic broadcast explicit rounding control compressed displacement memory addressing mode width register file increased 512 bits total register count increased 32 registers zmm0-zmm31 x86-64 mode avx-512 consists multiple extensions meant supported processors implementing instruction set consists following core extension avx-512f avx-512 foundation required implementations though current processors also support cd conflict detection computing coprocessors additionally support er pf 4vnniw 4fmaps vpopcntdq desktop processors support vl dq bw ifma vbmi vpopcntdq vpclmulqdq etc updated sse/avx instructions avx-512f use mnemonics avx versions operate 512-bit zmm registers also support 128/256 bit xmm/ymm registers avx-512vl byte word doubleword quadword integer operands avx-512bw/dq vbmi
[ 4108, 5645, 5649, 5663, 2088, 2094, 1085, 1087, 7234, 3142, 585, 8795, 1119, 2655, 1122, 7783, 4204, 4217, 4237, 6797, 10383, 7313, 8855, 9369, 1178, 2719, 6821, 9391, 2224, 9911, 2237, 2764, 5326, 3282, 5844, 9428, 7387, 3294, 8937, 1098...
Test
834
1
NaGISA:nagisa nagisa natural geography shore areas natural geography in-shore areas international collaborative effort aimed inventorying cataloguing monitoring biodiversity in-shore area named japanese word nagisa land meets sea apronym nagisa first project larger coml effort census marine life global participation actual field work actual procedures project involve inexpensive collection equipment easy universal participation equipment used photograph sampling sites actually take samples sites process samples site throughout world samples taken intertidal zone depth 10 meters optionally 20 meters depth samples processed organisms isolated analyzed catalogued information regarding kind number organisms analyzed sent global headquarters nagisa- university kyoto japan information collated ocean biogeographic information system obis website end goal larger coml effort find world oceans nagisa goal find world in-shore areas
[]
None
835
5
Asynchronous_transfer_mode:asynchronous transfer mode asynchronous transfer mode atm according atm forum telecommunications concept defined ansi itu formerly ccitt standards carriage complete range user traffic including voice data video signals atm developed meet needs broadband integrated services digital network defined late 1980s designed integrate telecommunication networks additionally designed networks must handle traditional high-throughput data traffic e.g. file transfers real-time low-latency content voice video reference model atm approximately maps three lowest layers iso-osi reference model network layer data link layer physical layer atm core protocol used sonet/sdh backbone public switched telephone network pstn integrated services digital network isdn use declining favour ip atm provides functionality similar circuit switching packet switching networks atm uses asynchronous time-division multiplexing encodes data small fixed-sized packets iso-osi frames called cells differs approaches internet protocol ethernet use variable sized packets frames atm uses connection-oriented model virtual circuit must established two endpoints actual data exchange begins virtual circuits may β€œ permanent ” i.e dedicated connections usually preconfigured service provider β€œ switched ” i.e set per-call basis using signaling disconnected call terminated use atm technology eventually largely superseded internet protocol ip -only technology wireless mobile atm never established significant foothold iso-osi reference model data link layer layer 2 basic transfer units generically called frames atm frames fixed 53 octets bytes length specifically called cells speech signal reduced packets forced share link bursty data traffic traffic large data packets matter small speech packets could made would always encounter full-size data packets normal queuing conditions cells might experience maximum queuing delays avoid issue atm packets cells small size addition fixed cell structure means atm readily switched hardware without inherent delays introduced software switched routed frames thus designers atm utilized small data cells reduce jitter delay variance case multiplexing data streams reduction jitter also end-to-end round-trip delays particularly important carrying voice traffic conversion digitized voice analogue audio signal inherently real-time process good job decoder codec needs evenly spaced time stream data items next data item available needed codec choice produce silence guess β€” data late useless time period converted signal already passed time design atm 155 mbit/s synchronous digital hierarchy sdh 135 mbit/s payload considered fast optical network link many plesiochronous digital hierarchy pdh links digital network considerably slower ranging 1.544 45 mbit/s us 2 34 mbit/s europe 155 mbit/s typical full-length 1,500 byte 12,000-bit data packet sufficient contain maximum-sized ip packet ethernet would take 77.42 Β΅s transmit lower-speed link 1.544 mbit/s t1 line packet would take 7.8 milliseconds queuing delay induced several data packets might exceed figure 7.8 ms several times addition packet generation delay shorter speech packet clearly unacceptable speech traffic needs low jitter data stream fed codec produce good-quality sound packet voice system produce low jitter number ways design atm aimed low-jitter network interface however cells introduced design provide short queuing delays continuing support datagram traffic atm broke packets data voice streams 48-byte chunks adding 5-byte routing header one could reassembled later choice 48 bytes political rather technical ccitt itu-t standardizing atm parties united states wanted 64-byte payload felt good compromise larger payloads optimized data transmission shorter payloads optimized real-time applications like voice parties europe wanted 32-byte payloads small size therefore short transmission times simplify voice applications respect echo cancellation european parties eventually came around arguments made americans france others held shorter cell length 32 bytes france would able implement atm-based voice network calls one end france requiring echo cancellation 48 bytes plus 5 header bytes 53 chosen compromise two sides 5-byte headers chosen thought 10 payload maximum price pay routing information atm multiplexed 53-byte cells instead packets reduced worst-case cell contention jitter factor almost 30 reducing need echo cancellers atm cell consists 5-byte header 48-byte payload payload size 48 bytes chosen described atm defines two different cell formats user–network interface uni network–network interface nni atm links use uni cell format atm uses pt field designate various special kinds cells operations administration management oam purposes delineate packet boundaries atm adaptation layers aal significant bit msb pt field 0 user data cell two bits used indicate network congestion general purpose header bit available atm adaptation layers msb 1 management cell two bits indicate type network management segment network management end-to-end resource management reserved future use several atm link protocols use hec field drive crc-based framing algorithm allows locating atm cells overhead beyond otherwise needed header protection 8-bit crc used correct single-bit header errors detect multi-bit header errors multi-bit header errors detected current subsequent cells dropped cell header errors found uni cell reserves gfc field local flow control/submultiplexing system users intended allow several terminals share single network connection way two integrated services digital network isdn phones share single basic rate isdn connection four gfc bits must zero default nni cell format replicates uni format almost exactly except 4-bit gfc field re-allocated vpi field extending vpi 12 bits thus single nni atm interconnection capable addressing almost 2 vps almost 2 vcs practice vp vc numbers reserved atm supports different types services via aals standardized aals include aal1 aal2 aal5 rarely used aal3 aal4 aal1 used constant bit rate cbr services circuit emulation synchronization also maintained aal1 aal2 aal4 used variable bitrate vbr services aal5 data aal use given cell encoded cell instead negotiated configured endpoints per-virtual-connection basis following initial design atm networks become much faster 1500 byte 12000-bit full-size ethernet frame takes 1.2 Β΅s transmit 10 gbit/s network reducing need small cells reduce jitter due contention consider makes case replacing atm ethernet network backbone increased link speeds alleviate jitter due queuing additionally hardware implementing service adaptation ip packets expensive high speeds specifically speeds oc-3 cost segmentation reassembly sar hardware makes atm less competitive ip packet sonet pos fixed 48-byte cell payload atm suitable data link layer directly underlying ip without need sar data link level since osi layer ip operates must provide maximum transmission unit mtu least 576 bytes sar performance limits mean fastest ip router atm interfaces stm16 stm64 actually compares pos operate oc-192 stm64 higher speeds expected future limits based segmentation reassembly sar slower congested links 622 mbit/s atm make sense reason asymmetric digital subscriber line adsl systems use atm intermediate layer physical link layer layer 2 protocol like ppp ethernet lower speeds atm provides useful ability carry multiple logical circuits single physical virtual medium although techniques exist multi-link ppp ethernet vlans optional vdsl implementations dsl used access method atm network allowing dsl termination point telephone central office connect many internet service providers across wide-area atm network united states least allowed dsl providers provide dsl access customers many internet service providers since one dsl termination point support multiple isps economic feasibility dsl substantially improved atm operates channel-based transport layer using virtual circuits vcs encompassed concept virtual paths vp virtual channels every atm cell 8- 12-bit virtual path identifier vpi 16-bit virtual channel identifier vci pair defined header vci together vpi used identify next destination cell passes series atm switches way destination length vpi varies according whether cell sent user-network interface edge network sent network-network interface inside network cells traverse atm network switching takes place changing vpi/vci values label swapping although vpi/vci values necessarily consistent one end connection concept circuit consistent unlike ip given packet could get destination different route others atm switches use vpi/vci fields identify virtual channel link vcl next network cell needs transit way final destination function vci similar data link connection identifier dlci frame relay logical channel number logical channel group number x.25 another advantage use virtual circuits comes ability use multiplexing layer allowing different services voice frame relay n* 64 channels ip vpi useful reducing switching table virtual circuits common paths another key atm concept involves traffic contract atm circuit set switch circuit informed traffic class connection atm traffic contracts form part mechanism quality service qos ensured four basic types several variants set parameters describing connection vbr real-time non-real-time variants serves bursty traffic non-real-time sometimes abbreviated vbr-nrt traffic classes also introduce concept cell-delay variation tolerance cdvt defines clumping cells time maintain network performance networks may apply traffic policing virtual circuits limit traffic contracts entry points network i.e user–network interfaces unis network-to-network interfaces nnis usage/network parameter control upc npc reference model given itu-t atm forum upc npc generic cell rate algorithm gcra version leaky bucket algorithm cbr traffic normally policed pcr cdvt alone whereas vbr traffic normally policed using dual leaky bucket controller pcr cdvt scr maximum burst size mbs mbs normally packet sar-sdu size vbr vc cells traffic virtual circuit exceeding traffic contract determined gcra network either drop cells mark cell loss priority clp bit identify cell potentially redundant basic policing works cell cell basis sub-optimal encapsulated packet traffic discarding single cell invalidate whole packet result schemes partial packet discard ppd early packet discard epd created discard whole series cells next packet starts reduces number useless cells network saving bandwidth full packets epd ppd work aal5 connections use end packet marker atm user-to-atm user auu indication bit payload-type field header set last cell sar-sdu traffic shaping usually takes place network interface card nic user equipment attempts ensure cell flow vc meet traffic contract i.e cells dropped reduced priority uni since reference model given traffic policing network gcra algorithm normally used shaping well single dual leaky bucket implementations may used appropriate atm build virtual circuits virtual paths either statically dynamically static circuits permanent virtual circuits pvcs paths permanent virtual paths pvps require circuit composed series segments one pair interfaces passes pvps pvcs though conceptually simple require significant effort large networks also support re-routing service event failure dynamically built pvps soft pvps spvps pvcs soft pvcs spvcs contrast built specifying characteristics circuit service contract two end points atm networks create remove switched virtual circuits svcs demand requested end piece equipment one application svcs carry individual telephone calls network telephone switches inter-connected using atm svcs also used attempts replace local area networks atm atm networks supporting spvps spvcs svcs use private network node interface private network-to-network interface pnni protocol pnni uses shortest-path-first algorithm used ospf is-is route ip packets share topology information switches select route network pnni also includes powerful summarization mechanism allow construction large networks well call admission control cac algorithm determines availability sufficient bandwidth proposed route network order satisfy service requirements vc vp network must establish connection two parties send cells atm called virtual circuit vc permanent virtual circuit pvc created administratively end points switched virtual circuit svc created needed communicating parties svc creation managed signaling requesting party indicates address receiving party type service requested whatever traffic parameters may applicable selected service call admission performed network confirm requested resources available route exists connection atm specifies following three layers atm became popular telephone companies many computer makers 1990s however even end decade better price/performance internet protocol-based products competing atm technology integrating real-time bursty network traffic companies fore systems focused atm products large vendors cisco systems provided atm option burst dot-com bubble still predicted atm going dominate however 2005 atm forum trade organization promoting technology merged groups promoting technologies eventually became broadband forum wireless atm mobile atm consists atm core network wireless access network atm cells transmitted base stations mobile terminals mobility functions performed atm switch core network known crossover switch similar msc mobile switching center gsm networks advantage wireless atm high bandwidth high speed handoffs done layer 2 early 1990s bell labs nec research labs worked actively field andy hopper cambridge university computer laboratory also worked area wireless atm forum formed standardize technology behind wireless atm networks forum supported several telecommunication companies including nec fujitsu mobile atm aimed provide high speed multimedia communications technology capable delivering broadband mobile communications beyond gsm wlans
[ 1541, 2701, 2206, 1955, 8355, 3751, 9137, 6834, 4918, 7865, 2912, 3168, 5472, 2532, 4331, 6512, 8432, 2802, 3318, 3323 ]
Validation
836
4
Science_DMZ_Network_Architecture:science dmz network architecture term science dmz refers computer subnetwork structured secure without performance limits would otherwise result passing data stateful firewall science dmz designed handle high volume data transfers typical scientific high-performance computing creating special dmz accommodate transfers typically deployed near local network perimeter optimized moderate number high-speed flows rather general-purpose business systems enterprise computing term science dmz coined collaborators us department energy esnet 2010 number universities laboratories deployed deploying science dmz 2012 national science foundation funded creation improvement science dmzs several university campuses united states science dmz network architecture support big data so-called information explosion discussed since mid 1960s recently term data deluge used describe exponential growth many types data sets huge data sets often need copied one location another using internet movement data sets magnitude reasonable amount time possible modern networks example take less 4 hours transfer 10 terabytes data 10 gigabit ethernet network path assuming disk performance adequate problem requires networks free packet loss middleboxes traffic shapers firewalls slow network performance businesses institutions use firewall protect internal network malicious attacks originating outside traffic internal network external internet must pass firewall discards traffic likely harmful stateful firewall tracks state logical connection passing rejects data packets inappropriate state connection example website would allowed send page computer internal network unless computer requested requires firewall keep track pages recently requested match requests responses firewall must also analyze network traffic much detail compared networking components routers switches routers deal network layer firewalls must also process transport application layers well additional processing takes time limits network throughput routers networking components handle speeds 100 billion bits per second gbps firewalls limit traffic 1 gbit/s unacceptable passing large amounts scientific data stateful firewall may necessary critical business data financial records credit cards employment data student grades trade secrets etc. science data requires less protection copies usually exists multiple locations less economic incentive tamper firewall must restrict access internal network allow external access services offered public web servers internal network usually accomplished creating separate internal network called dmz play term β€œ demilitarized zone external devices allowed access devices dmz devices dmz usually maintained carefully reduce vulnerability malware hardened devices sometimes called bastion hosts science dmz takes dmz idea one step farther moving high performance computing dmz specially configured routers pass science data directly designated devices internal network thereby creating virtual dmz security maintained setting access control lists acls routers allow traffic to/from particular sources destinations security enhanced using intrusion detection system ids monitor traffic look indications attack attack detected ids automatically update router tables resulting call remotely triggered blackhole rtbh science dmz provides well-configured location networking systems security infrastructure supports high-performance data movement data-intensive science environments data sets outgrown portable media default configurations used many equipment software vendors inadequate high performance applications components science dmz specifically configured support high performance applications facilitate rapid diagnosis performance problems without deployment dedicated infrastructure often impossible achieve acceptable performance simply increasing network bandwidth usually good enough performance problems caused many factors ranging underpowered firewalls dirty fiber optics untuned operating systems science dmz codification set shared best practicesβ€”concepts developed yearsβ€”from scientific networking systems community science dmz model describes essential components high-performance data transfer infrastructure way accessible non-experts scalable across size institution experiment primary components science dmz optional science dmz components include
[ 8998, 1607, 5608, 2985, 11502, 6364, 5245 ]
None
837
9
Language_for_Systems_Development:language systems development language systems development lsd programming language developed 1971 brown university ibm s/360 language also referred lsyd due negative connotations acronym lsd time lsd derived pl/i
[ 8502, 8262, 4998 ]
Test
838
4
AuthenTec:authentec authentec inc. semiconductor computer security mobile security identity management biometrics touch control solutions company based melbourne florida founded 1998 spun harris semiconductor authentec provided mobile security software licenses mobile manufacturing companies biometrics sensor technology fingerprint sensors nfc technology mobile computer manufacturers 27 july 2012 authentec acquired apple inc. 356 million
[ 10755, 9732, 1549, 7697, 11289, 4126, 6186, 6700, 1074, 9784, 8253, 576, 2558, 8783, 4180, 10838, 9826, 5733, 8806, 3691, 2676, 6264, 2686, 7806, 6783, 10878, 8842, 9356, 5784, 1177, 4251, 2207, 7327, 11430, 171, 2735, 3248, 4283, 7869, 7...
None
839
4
List_of_compact_discs_sold_with_Extended_Copy_Protection:list compact discs sold extended copy protection following compact discs sold sony bmg shipped computer software known extended copy protection xcp result microsoft windows computer used play cds likely xcp installed cause number serious security problems several security software vendors including microsoft regard xcp trojan horse spyware rootkit mac os x systems used play cds may affected similar program mediamax
[ 10756, 6797, 10448, 7957, 10392, 2558, 9791 ]
Validation
840
9
FLACC:flacc flacc implementation algol 68 programming language chris thomson colin broughton founded chion corporation developed marketed flacc full language algol 68 checkout compiler compiler run-time system conformed exactly revised report ran ibm 370 compatible mainframes included debugging features derived watfiv released 1977 chris student barry j. mailloux barry studied amsterdam mathematisch centrum 1966 adriaan van wijngaarden barry work algol 68 language established university alberta center algol 68-related activity according thomson decade later scanned documentation softwarepreservation.org
[ 1952, 8262, 6248, 1611, 7053, 9294, 7507 ]
None
841
5
Hot_Standby_Router_Protocol:hot standby router protocol computer networking hot standby router protocol hsrp cisco proprietary redundancy protocol establishing fault-tolerant default gateway version 1 protocol described 1998 rfc version 2 protocol protocol establishes association gateways order achieve default gateway failover primary gateway becomes inaccessible hsrp gateways send multicast hello messages gateways notify priorities gateway preferred current status active standby primary router highest configured priority act virtual router pre-defined gateway ip address respond arp nd request machines connected lan virtual mac address primary router fail router next-highest priority would take gateway ip address answer arp requests mac address thus achieving transparent default gateway failover virtual mac address xs represent group id hex hsrp routing protocol advertise ip routes affect routing table way hsrp ability trigger failover one interfaces router go useful dual branch routers single link back gateway link primary router goes backup router take primary functionality thus retain connectivity gateway version 2 protocol introduces stability scalability diagnostic improvements compatible version 1 hsrp rfc version 2 protocol
[ 5472, 6214, 7901, 649, 2954, 8073, 9640, 6993, 6834, 7411, 11413, 7702, 5437 ]
None
842
4
Wireshark:wireshark wireshark free open-source packet analyzer used network troubleshooting analysis software communications protocol development education originally named ethereal project renamed wireshark may 2006 due trademark issues wireshark cross-platform using qt widget toolkit current releases implement user interface using pcap capture packets runs linux macos bsd solaris unix-like operating systems microsoft windows also terminal-based non-gui version called tshark wireshark programs distributed tshark free software released terms gnu general public license wireshark similar tcpdump graphical front-end plus integrated sorting filtering options wireshark lets user put network interface controllers promiscuous mode supported network interface controller see traffic visible interface including unicast traffic sent network interface controller mac address however capturing packet analyzer promiscuous mode port network switch traffic switch necessarily sent port capture done capturing promiscuous mode necessarily sufficient see network traffic port mirroring various network taps extend capture point network simple passive taps extremely resistant tampering gnu/linux bsd macos libpcap 1.0.0 later wireshark 1.4 later also put wireless network interface controllers monitor mode remote machine captures packets sends captured packets machine running wireshark using tzsp protocol protocol used omnipeek wireshark dissects packets analyze packets captured remote machine time captured late 1990s gerald combs computer science graduate university missouri–kansas city working small internet service provider commercial protocol analysis products time priced around 1500 run company primary platforms solaris linux gerald began writing ethereal released first version around 1998 ethereal trademark owned network integration services may 2006 combs accepted job cace technologies combs still held copyright ethereal source code rest re-distributable gnu gpl used contents ethereal subversion repository basis wireshark repository however ethereal trademark changed name wireshark 2010 riverbed technology purchased cace took primary sponsor wireshark ethereal development ceased ethereal security advisory recommended switching wireshark wireshark several industry awards years including eweek infoworld pc magazine also top-rated packet sniffer insecure.org network security tools survey sourceforge project month august 2010 combs continues maintain overall code wireshark issue releases new versions software product website lists 600 additional contributing authors wireshark data capturing program understands structure encapsulation different networking protocols parse display fields along meanings specified different networking protocols wireshark uses pcap capture packets capture packets types networks pcap supports wireshark native network trace file format libpcap format supported libpcap winpcap exchange captured network traces applications use format including tcpdump ca netmaster also read captures network analyzers snoop network general sniffer microsoft network monitor capturing raw network traffic interface requires elevated privileges platforms reason older versions ethereal/wireshark tethereal/tshark often ran superuser privileges taking account huge number protocol dissectors called traffic captured pose serious security risk given possibility bug dissector due rather large number vulnerabilities past many allowed remote code execution developers doubts better future development openbsd removed ethereal ports tree prior openbsd 3.6 elevated privileges needed operations example alternative run tcpdump dumpcap utility comes wireshark superuser privileges capture packets file later analyze packets running wireshark restricted privileges emulate near realtime analysis captured file may merged mergecap growing file processed wireshark wireless networks possible use aircrack wireless security tools capture ieee 802.11 frames read resulting dump files wireshark wireshark 0.99.7 wireshark tshark run dumpcap perform traffic capture platforms require special privileges capture traffic need dumpcap run privileges neither wireshark tshark need run special privileges wireshark color packets based rules match particular fields packets help user identify types traffic glance default set rules provided users change existing rules coloring packets add new rules remove rules wireshark also used capture packets network simulation tools ns opnet modeler netsim
[ 3714, 6797, 4369, 4373, 5397, 7702, 5657, 6177, 418, 10788, 1064, 1580, 7983, 7984, 2739, 7989, 823, 2231, 4919, 8121, 5179, 700, 4797, 11321, 706, 6345, 461, 8653, 11006, 6992, 10705, 9939, 6997, 2006, 87, 7895, 7385, 4186, 8922, 9440, ...
Test
843
2
Kay_Sievers:kay sievers kay sievers computer programmer best known developing udev device manager linux systemd gummiboot efi boot loader kay sievers made major contributions linux hardware hotplug device management subsystems 2012 together harald hoyer sievers main driving force behind fedora merging /lib /bin /sbin file-system trees /usr simplification distributions arch linux since adopted kay sievers grew east germany nowadays resides berlin germany
[ 1026, 5644, 4367, 8848, 657, 10642, 1939, 2581, 3478, 6808, 7450, 6302, 7584, 802, 5410, 6691, 6947, 8354, 5931, 8364, 1717, 823, 2109, 11069, 10687, 10822, 8263, 589, 6352, 4177, 11602, 8787, 4437, 6489, 3802, 4831, 9696, 11232, 9455, 77...
Test
844
2
Text_Object_Model:text object model text object model tom microsoft windows api provides developers object-based rich text manipulation interfaces implemented com accessed microsoft word additionally richedit controls normally ship windows tom developed influenced heavily wordbasic macro language used within word vba word 95 previous releases tom developed alongside richedit technology present since version 1.0 richedit components api available option windows ce since 2.5 release richedit western languages least used pocket word time version 8.0 richedit shipped windows 8 added support opentype math retrieve implemented instance codice_1 interface top-level document interface codice_2 message may sent via sendmessage api obtain pointer codice_3 object also implements codice_1 interface tom may operate differently depending version richedit control interface retrieved richedit50w windows provide functionality standard richedit20w richedit20a controls like proper table support
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 4174, 4178, 9813, 603, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 3224, 4771, 7846, 10414, 8391, 214, 9943, 9434, 2783, 736, 432...
Validation
845
8
Web_tracking:web tracking web tracking practice operators websites collect share information particular user activity world wide web analysis individual user behaviour may used provide content relates implied preferences use web tracking controversial applied context private individual varying degrees subject legislation eu ecommerce directive uk data protection act done without knowledge user may considered breach browser security business-to-business context understanding visitor behaviour order identify buying intentions seen many commercial organisations effective way target marketing activities visiting companies approached on- offline marketing sales propositions relevant current requirements point view sales organisation engaging potential customer actively looking buy produce savings otherwise wasted marketing funds contrary popular belief browser privacy mode prevent tracking attempts usually blocks storage information visitor site cookies help however live data transmissions like various fingerprinting methods fingerprints easily de-anonymized
[ 3490, 2818, 5133, 6576, 10450, 9395, 119, 3643 ]
Test
846
9
JASS:jass jass jass2 sometimes said stand another scripting syntax scripting language provided event-driven api created blizzard entertainment used extensively games jass2 starcraft jass scripting events game world map creators use warcraft iii world editor starcraft editor create scripts triggers ai artificial intelligence custom maps campaigns blizzard entertainment replaced jass galaxy starcraft ii language provides extensive api gives programmers control nearly every aspect game world example execute simple gui functions giving orders units changing weather time day playing sounds displaying text player manipulating terrain jass also create powerful functions trackables detect mouse goes hits position getlocalplayer cause disconnects used improperly using handles getlocalplayer syntax similar turing delphi unlike languages case sensitive jass primarily uses procedural programming concepts though popular user-made modifications blizzard world editor program since added c++-like object-oriented programming features syntax jass following function creates string containing message hello world displays players want one player want print message 90 times show iterator syntax jass similar turing context free examples basic syntax shown jass statically-typed types separated two classes natives handles native types types considered non-native native types behave similarly primitive types programming languages handle types however behave like objects handle types often represent object within game units players special effects etc. similarly java treats objects variables parameters jass handle types treated values reality values nothing references handle objects becomes important dealing garbage collection handles properly cleaned cause significant performance issues additionally local variables properly dereference handles go scope nullified properly handle indices garbage collected eventually leak also references handles take memory space users may experience reduced performance nullified though much smaller scale another property handle types worth noting handle types treated children handle type children types children types handle variables may reference specific handle type children type example since patch 1.24b new handle-based type called agent introduced separate handle types objects deleted manually dynamic memory allocation handle types objects deleted automatically stack-based memory allocation example types unit rect destructable refer dynamic allocated objects extend type agent whereas types race alliancetype actually kind wrappers native type integer compared enumerated types still extend type handle primitive types type casting integer real string officially supported language jass supports implicit explicit type casting implicit casting occurs integer real example jass library provides several functions explicit type casting important property handle types related type casting since variables handles references treated treated integers instance handle assigned unique integer value essentially acts identifier handle therefore type casting handles integers although technically supported jass possible practice implicit casting handle types integer occur code written certain way example game ever reached line return h would fact actually cast handle integer return value however blizzard never intended jass used way jass compiler actually throw error warning programmer function n't returning correct type however jass programmers found exploited famous bug jass compiler syntax checker so-called return bug essentially compiler make sure last return statement function returns correct type therefore following code compiles without error used cast handles integers bug fixed patch 1.23b although completely fixed patch 1.24b users use new hashtable natives instead return bug counterparts bug fixed patch 1.24b another return bug discovered users known return nothing bug return nothing bug fixed blizzard patch 1.23c return nothing bug lets user get last value returned function even another type properly utilize bug desired return must made separate function return calling function made impossible jass supports one-dimensional arrays type excluding code syntax declare arrays access members array outlined code one limitation arrays jass returned functions passed parameters functions though array members may returned function returns unit u 0 may returned u array type unit 2009 return bug shown allow arbitrary code execution registered security vulnerability blizzard entertainment shortly thereafter released patch 1.24 fixed vulnerability jass bug patch deployed map contains script code returns bugs run properly maps using return bugs therefore need re-written use newly available hashtable natives patch currently applied battle.net servers vjass set user-made extensions jass introduces object-oriented programming features language structs encapsulation polymorphism strictly speaking vjass add anything jass library instead mostly uses jass arrays integers used indices extension relies custom-made compiler compiles vjass code strict jass code manner additional mods either world editor program warcraft iii required maps made using vjass code fully compatible copy game even without compiler originally convenient tool use vjass jass newgen pack jngp however jngp suffered lack maintenance leaving incompatible newer warcraft iii versions jngp superseded world editor extended wex work wex stopped also leaving incompatible newer warcraft iii versions jasshelper part warcraft iii allowing vjass used without third party tools jass interpreter warcraft iii version 1.23 n't check memory region boundaries allows execution arbitrary bytecode map meaning practically anything including malware viruses trojans etc engineered map executed infect computer blizzard entertainment aware issue applied temporary workaround games hosted battle.net also preparing permanent fix lan single-player games issue addressed release version 1.24 possible exploit i/o capabilities preload jass native commonly used preload files initialization prevent in-game lag indirectly run code computer certain builds windows operating system via writing batch files startup folder exploit rather limited however requires path impossible retrieve since reading environment variables impossible despite limitations possible use preload native along corresponding natives preloadgenend write files player computer preload exploit made secure officially supported feature warcraft iii files written using preload exploit stored user folder documents\warcraft iii\custommapdata windows cause harm preload exploit commonly used custom maps convenient persistent save/load systems sample code following function creates empty file redist\miles folder used interfere warcraft iii program files making warcraft iii error next run warcraft iii version 1.31 run using either jass2 lua virtual machine specified operate lua virtual machine jass code transpiled lua combined lua code make lua code file facilitate lua virtual machine declarations match jass2 declarations well helper userdata easily accurately emulate jass language features arrays converting code lua using single virtual machine possible jass lua code seamlessly interact allows custom map developers start using lua without manually port existing jass vjass code also avoids problems lack interoperation support increased overhead would occur jass2 lua virtual machines used time due vastly different larger language feature set lua jass2 virtual machine compatibility lua code developers wanting use lua code use lua virtual machine
[ 1952, 2304, 10145, 4777, 2316, 5677, 9871, 435, 9780, 11674 ]
Test
847
9
Visual_Basic:visual basic visual basic third-generation event-driven programming language microsoft component object model com programming model first released 1991 declared legacy 2008 microsoft intended visual basic relatively easy learn use visual basic derived basic enables rapid application development rad graphical user interface gui applications access databases using data access objects remote data objects activex data objects creation activex controls objects programmer create application using components provided visual basic program time community programmers developed third-party components programs written visual basic also use windows api requires external function declarations final release version 6 1998 known simply visual basic april 8 2008 microsoft stopped supporting visual basic 6.0 ide microsoft visual basic team still maintains compatibility visual basic 6.0 applications windows vista windows server 2008 including r2 windows 7 windows 8 windows 8.1 windows server 2012 windows 10 windows server 2016 windows server 2019 works program 2014 software developers still preferred visual basic 6.0 successor visual basic .net 2014 developers lobbied new version vb6 programming environment 2016 visual basic 6.0 technical impact award 19th annual d.i.c.e awards dialect visual basic visual basic applications vba used macro scripting language within several microsoft applications including microsoft office like basic programming language visual basic designed easy learning curve programmers create simple complex gui applications programming vb combination visually arranging components controls form specifying attributes actions components writing additional lines code functionality since vb defines default attributes actions components programmer develop simple program without writing much code programs built earlier versions suffered performance problems faster computers native code compilation made less issue though vb programs compiled native code executables version 5 still require presence around 1 mb runtime libraries core runtime libraries included default windows 2000 later extended runtime components still installed earlier versions windows 95/98/nt require runtime libraries distributed executable forms created using drag-and-drop techniques tool used place controls e.g. text boxes buttons etc form window controls attributes event handlers associated default values provided control created may changed programmer many attribute values modified run time based user actions changes environment providing dynamic application example code inserted form resize event handler reposition control remains centered form expands fill form etc inserting code event handler keypress text box program automatically translate case text entered even prevent certain characters inserted visual basic create executables exe files activex controls dll files primarily used develop windows applications interface database systems dialog boxes less functionality used provide pop-up capabilities controls provide basic functionality application programmers insert additional logic within appropriate event handlers example drop-down combination box automatically displays list user selects element event handler called executes code programmer created perform action list item alternatively visual basic component user interface instead provide activex objects programs via component object model com allows server-side processing add-in module runtime recovers unused memory using reference counting depends variables passing scope set nothing avoiding problem memory leaks possible languages large library utility objects language provides basic support object-oriented programming unlike many programming languages visual basic generally case-sensitiveβ€”though transforms keywords standard case configuration forces case variable names conform case entry symbol table string comparisons case sensitive default visual basic compiler shared visual studio languages c c++ nevertheless default restrictions ide allow creation targets windows model dlls threading models years developers bypassed restrictions visual basic builds upon characteristics basic visual basic 1.0 introduced 1991 drag drop design creating user interface derived prototype form generator developed alan cooper company called tripod microsoft contracted cooper associates develop tripod programmable form system windows 3.0 code name ruby relation later ruby programming language tripod include programming language microsoft decided combine ruby basic language create visual basic ruby interface generator provided visual part visual basic combined eb embedded basic engine designed microsoft abandoned omega database system ruby also provided ability load dynamic link libraries containing additional controls called gizmos later became vbx interface microsoft developed derivatives visual basic use scripting visual basic derived heavily basic subsequently replaced .net platform version derived languages earlier versions visual basic prior version 5 compiled code p-code p-code interpreted language runtime benefits p-code include portability smaller binary file sizes usually slows execution since runtime adds additional layer interpretation visual basic applications require microsoft visual basic runtime msvbvmxx.dll xx relevant version number either 50 60 msvbvm60.dll comes standard windows editions windows 98 windows 7 editions windows 7 include windows 95 machine would however require inclusion installer whichever dll needed program visual basic 5 6 compile code either native p-code either case runtime still required built functions forms management criticisms levelled visual basic editions prior vb.net include versions visual basic development environment 1.0 6.0 retired microsoft 2008 therefore longer supported associated runtime environments also unsupported except visual basic 6 core runtime environment microsoft officially supports lifetime windows 8 windows 10 third party components shipped visual studio 6.0 included support statement legacy visual basic components may still work newer platforms despite unsupported microsoft vendors documentation visual basic 6.0 application programming interface tools best covered last msdn release visual studio.net 2002 later releases msdn focused .net development significant parts visual basic 6.0 programming documentation removed language evolved support older code ended although vendor support visual basic 6 ended product never supported latest versions windows key parts environment still work newer platforms possible get subset development environment working 32-bit 64-bit versions windows vista windows 7 windows 8 windows 10 following code snippet displays message box saying hello world window loads private sub form_load end sub snippet makes counter moves 1 every second label timer control need added form work form closed integer overflow occurs option explicit dim count integer private sub form_load end sub private sub timer1_timer end sub
[ 9216, 2055, 6154, 7691, 10253, 4627, 22, 3613, 9245, 8227, 4136, 5677, 9263, 11315, 5684, 6709, 8246, 9780, 6718, 4160, 4674, 8262, 4173, 4174, 8273, 83, 603, 92, 7771, 6751, 608, 2656, 2658, 5733, 5225, 7274, 9330, 5747, 3705, 5754, 67...
None
848
1
Nadra:nadra national database registration authority nadra urdu Ω†Ψ§Ψ―Ψ±Ψ§ commonly called nadra independent autonomous agency ministry interior government pakistan regulates government databases statistically manages sensitive registration database national citizens pakistan nadra also responsible issuing computerized national identity cards citizens pakistan maintaining sensitive informational upgraded government databases securing national identities citizens pakistan stolen theft one largest government database institution employing 11,000 people 800 domestic offices five international offices also claims hold record maintaining largest biometric database citizens world codified second amendment Β§30 constitution pakistan 2000 constitution grants powers nadra enact civil registration sensitive databases pakistan citizens databases kept extreme secrecy security ensure safety citizen databases 2018 directed headed usman yousaf mobin chief technology officer nadra appointed chairman independence pakistan prime minister liaquat ali khan launched personal identity system pis program register manage issue national identification cards citizens pakistan muslim refugees settling pakistan changes carried election commission pakistan 1965 process voter registration hold nationwide 1965 presidential election 1969–70 amendments pis program continued election commission election commission supervised 1970 general elections 1971 war resulted east-pakistan gaining independence bangladesh new statistical database system needed ensure safety pakistan citizens well national security country questions raised pakistani bhutto regime introduced national registration act parliament pakistan establish authority issue photo ids registered pakistani citizens 1973 new database system codified second amendment Β§30 constitution pakistan perform contain statistical database citizens pakistan registration pakistan citizens statistic database government computer accounts started 1973 promulgation constitution country new program visioned started prime minister zulfikar ali bhutto 1973 parliamentary session bhutto stated parliament people pakistan due absence full statistical database people country country operating utter darkness government started issuing national identity card nic numbers citizens started establish government databases people government computers national database registration authority nadra established 10 march 2000 merging directorate general registration pakistan department created 1973 constitution national database organization ndo attached department ministry interior government pakistan created 1998 census nadra autonomous body operate independently mandate replace old directorate general registration computrised system registering 150 million citizens nadra launched multi-biometric national identity card project developed conformance international security documentation issuance practices year 2000 program replaced paper based personal identity system pakistan use since 1973 date 96 million citizens pakistan abroad utilized system allied services receive tamper-resistant iso standard identification documents computerised national identity card cnic computerised national identity card issued nadra pakistani citizens cnic introduced 2000 2012 89.5 million cnics issued cnic issued first age 18 pakistani law compulsory carry one however pakistani citizens cnic mandatory thus seen de facto necessity meaningful civic life pakistan pakistan adult citizens must register computerised national identity card cnic unique number upon reaching age 18 serves identification document authenticate individual identity citizen pakistan introduction cnic manual national identity cards nics issued citizens pakistan today government shifted existing records national identity cards nic central computerised database managed nadra new cnic machine-readable carry facial fingerprint information every citizen required nic number number required many activities getting driver licence passport registering vehicle receiving social insurance/zakat funding enrolling school college technical institute filing legal affidavit wiring funds paying taxes opening bank account getting utility connection electricity phone mobile phone water sewer natural gas etc however since births country registered pakistanis conduct activities described id cards 2007 nadra announced issued 60 million cnic c standing computerized numbers approximately one-third population authority issued 10 millionth cnic 11 february 2002 20 millionth 18 june 2002 30 millionth 22 december 2003 40 millionth 1 october 2004 50 millionth cnic 14 february 2006 unique 13-digit number assigned birth parents complete child birth registration form form rg-2 commonly known b-form child registration certificate crc national identity card nic number issued age 18 2001 nic numbers 11 digits long 2001-2002 authority started issuing 13-digit nic numbers along new biometric id cards first 5 digits based applicant locality next 7 random numbers last digit check digit even number females odd number males old manual nic numbers invalid 1 january 2004 id card following information legal name gender male female transgender father name husband name married females identification mark date birth national identity card number family tree id number current address permanent address date issue date expiry signature photo fingerprint thumbprint nadra also records applicant religion noted cnic nadra registered 90 women pakistan although nadra started issuing ultra modern scnic smart computerized national identity card information english urdu languages nadra introduced smart national identity card snic pakistan first national electronic identity card october 2012 pakistan snic contains data chip 36 security features snic complies icao standard 9303 iso standard 7816-4 snic used offline online identification voting pension disbursement social financial inclusion programmes services nadra aims replace 89.5 million cnics snics 2020 order address security concerns nadra incorporated 36 security features physical design card making one securest cards world card printed multiple layers layer security features chip encrypted extremely competent software developers nadra secure communication protocols determined read remote devices enable remote verification citizens match-on-card applet designed nadra citizen places card card reader reader first authenticate card return card verify authenticity reader verifications successful device ask finger lpc nadra card enable verifications individuals remotest parts pakistan say decade individual casts vote government may ascertain person casting vote indeed one electoral roll one thousands scenarios identity fraud prevention card empowers majority space chip made available private sector use products services might appear expensive private sector use card initially number citizens critical mass reached profitable private sector use secure universal platform order track nadra smart card tracking id consisting 12 digits sent 8400 example tracking id 108231064935 message sent 8400 get message request tracking id 108231064935 printing facility expected delivery 2 working days nadra started service online application nicop poc crc online data collected e.g fingerprints thumb impressions signatures online fee submitted debit credit card
[ 10572, 4631 ]
Test
849
5
Echo_Protocol:echo protocol echo protocol service internet protocol suite defined rfc 862 originally proposed testing measurement round-trip times ip networks host may connect server supports echo protocol using transmission control protocol tcp user datagram protocol udp well-known port number 7 server sends back identical copy data received unix-like operating systems echo server built inetd family daemons echo service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration various routers tcp udp port 7 echo protocol relaying icmp datagrams port 9 discard protocol also configured default proxy relay wake-on-lan wol magic packets internet hosts local network order wake remotely hosts must also network adapter configured accept wol datagrams router must proxy setting enabled possibly also configuration forwarding rules embedded firewall open ports internet side
[ 10242, 3847, 649, 9868, 4495, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 933, 2085, 3751, 3752, 8998, 9381, 10924, 562, 2996, 9909, 6651, 10171, 3133, 829, 3006, 4797, 5181, 5437, 8386, 7364, 2887, 8265, 2509, 4687, 6993, 58...
None
850
2
Matthew_Dillon:matthew dillon matthew dillon born 1966 american software engineer known amiga software contributions freebsd starting leading dragonfly bsd project since 2003 dillon studied electronic engineering computer science university california berkeley first became involved bsd 1985 also became known amiga programming c compiler dice work linux kernel founded worked best internet 1994 1997 contributing freebsd time diablo internet news transit program popular many isps 1997 dillon gained commit access freebsd code heavily contributed virtual memory subsystem amongst contributions concerned problems saw direction freebsd 5.x headed regards concurrency coupled fact dillon access freebsd source code repository revoked due falling-out freebsd developers started dragonfly bsd project 2003 implementing smp model using light-weight kernel threads dragonfly project also led development new userspace kernel virtualisation technique 2006 called virtual kernel originally ease development testing subsequent kernel-level features new file system called hammer created using b-trees hammer declared production-ready dragonfly 2.2 2009 subsequently hammer2 declared stable 2018 dragonfly 5.2 recently dillon gotten number headlines around cpu errata 2007 theo de raadt openbsd raised alarm around seriousness errata intel core 2 family cpus dillon independently evaluated intel errata overview intel core errata well suggesting several erratums serious warrant avoiding processor issues remain unfixed dillon since fan amd processors subsequently 2012 discovered brand-new deficiency amd processors existing erratum existed time matt continued work around cpu issues late 2018 presenting solutions tackle latest security vulnerabilities like meltdown subsequently adopted openbsd well matt frequent guest bsdtalk runtime show interviewed several times kerneltrap
[ 10761, 2061, 9743, 9236, 8725, 4636, 9249, 9762, 1071, 1080, 5177, 58, 9784, 3651, 7748, 8266, 5709, 5710, 7249, 9306, 607, 1637, 9320, 11370, 5743, 8816, 9844, 633, 8316, 9343, 2180, 4745, 5264, 2193, 3233, 2212, 684, 3248, 8369, 8373, ...
Validation
851
4
Christopher_Tarnovsky:christopher tarnovsky christopher tarnovsky born 20 april 1971 nyack new york integrated circuit reverse engineering specialist hacker come public attention tarnovsky diagnosis attention deficit hyperactivity disorder 1990s tarnovsky soldier united states army field intelligence security cryptography 2013 tarnovsky vice president semiconductor services ioactive 2001 directv client nds company majority owned rupert murdoch newscorp demanded tarnovsky kept away systems plaintiffs directv dish network nagrastar alleged tarnovsky hacking protections placed set-top box smart cards used lock transmission customers defaulted 1997 2007 tarnovsky worked nds developing copy protection technology 2002 canal plus french premium cable television commenced civil action nds tarnovsky tarnovsky alleged extracted source code seca card 26 march 1999 uploaded file sharing website jury later largely cleared nds tarnovsky 2008 tarnovsky dismissed nds copyright infringement employ tarnovsky denies accusation 2008 tarnovsky broke trusted platform module type chip used xbox 360 example tarnovsky required nine months study discover main contents module 2010 black hat washington dc conference tarnovsky described used acid electron microscope small conductive needles hack infineon sle66 cl pe chip
[ 2416, 4212, 7354, 4956, 10173 ]
Test
852
9
Kateryna_Yushchenko_(scientist):kateryna yushchenko scientist kateryna lohvynivna yushchenko december 8 1919 chigirin died august 15 2001 ukrainian computer information research scientist corresponding member ussr academy sciences 1976 member international academy computer science developed one world first high-level languages indirect address programming called address programming language period academic career yushchenko supervised 45 ph.d students professional achievements include yushchenko awarded two ussr state prizes ussr council ministers prize academician glushkov prize order princess olga yushchenko first woman ussr become doctor physical mathematical sciences programming kateryna lohvynivna yushchenko nΓ©e rvacheva born 1919 chyhyryn central ukraine started undergraduate studies kyiv university 1937 second world war attended central asian state university tashkent graduating 1942 war returned ukraine 1950 direction boris gnedenko obtained ph.d. institute mathematics ukrainian academy sciences period seven years yushchenko held position senior researcher kiev institute mathematics ukrainian ssr academy sciences 1950–57 1954 levedev laboratory first computer continental europe mesm created transferred institute mathematics yushchenko member joint group scholars operating mesm 1957 became director institute computer science ukrainian ssr academy sciences forty years service institute yushchenko created internationally notable scientific school theoretical programming yushchenko best known creation address programming language first fundamental advancement scientific school theoretical programming language provided free location program computer memory process working mesm became clear complex tasks difficult solve writing simple machine programs need develop high-level programming language problem absence appropriate translator better human/computer communication l.i kaluzhnin professor kyiv university taught course mathematical logic 1950-70s made significant advancement understanding problem formalized scheme interfacing program following development 1955 yushchenko developed programming language language-based two general principles computer work addressing software management creating convenient system concepts describing computer architecture system instructions language thus became means manipulation second-rank addresses yushchenko ’ contribution became first fundamental achievement soviet school theoretical programming well ahead creation first programming language fortran 1958 cobol 1959 algol 1960 yushchenko founder first soviet school theoretical programming 1970-1980 subject research theoretical programming formed major achievements school time creation algebraic grammar methods synthesis software 1990s efforts school theoretical programming concentrated study algebraic grammar-methods knowledge representation model computation friendly user interface designing developing databases knowledge bases decision support systems expert systems methods learning forty years research theoretical programming enriched formal-algorithmic apparatus subject research significantly expanded procedural languages methods knowledge representation form artificial intelligence tools developers application systems yushchenko worked probability theory algorithmic languages programming languages developing methods automated data processing systems prepare programmers yuschenko wrote educational series textbooks 1970s yuschenko held five copyright certificates developed eight state standards ukraine author 200 manuscripts including 23 monographs train aids part works two to-three editions translated 5 languages internationally including german czech hungarian french danish
[ 2901, 8262 ]
Validation
853
1
Database_connection:database connection database connection facility computer science allows client software talk database server software whether machine connection required send commands receive answers usually form result set connections key concept data-centric programming since dbms engines require considerable time connect connection pooling invented improve performance command performed database without open available connection connections built supplying underlying driver provider connection string way addressing specific database server instance well user authentication credentials example server=sql_box database=common user id=uid pwd=password connection built opened closed properties command time-out length transaction one exists set connection string composed set key/value pairs dictated data access interface data provider used many databases postgresql allow one operation performed time connection request data sql select statement sent database result set returned connection open available operations client finishes consuming result set databases like sql server 2005 later impose limitation however databases provide multiple operations per connection usually incur far overhead permit single operation task time database connections finite expensive take disproportionately long time create relative operations performed inefficient application create use close database connection whenever needs update database connection pooling technique designed alleviate problem pool database connections created shared among applications need access database application needs database access requests connection pool finished returns connection pool becomes available use applications connection object obtained connection pool often wrapper around actual database connection wrapper understands relationship pool hides details pool application example wrapper object implement close method called like close method database connection unlike method database connection method wrapper may actually close database connection instead return pool application need aware connection pooling calls methods wrapper object approach encourages practice opening connection application needed closing soon work done rather holding connection open entire life application manner relatively small number connections service large number requests also called multiplexing client/server architecture hand persistent connection typically used server state managed state includes server-side cursors temporary products connection-specific functional settings application failure occurs connection pool overflows occur connection pool use application requests connection example application may use connection long many clients attempt access web site one operations blocked simply inefficient
[ 2688, 11392, 2183, 9481, 4490, 1035, 10505, 6417, 10258, 10518, 11030, 4376, 9112, 7968, 290, 1314, 7461, 8742, 1703, 1964, 10413, 5550, 9263, 5808, 2994, 10418, 9527, 3768, 3004, 3388, 9661, 4416, 2369, 11457, 8006, 8518, 72, 2901, 9942, ...
None
854
2
Nokia_E66:nokia e66 nokia e66 slider smartphone nokia eseries range s60 platform third edition device slide action targeting business users successor nokia e65 shares many features e66 similar features nokia e71 handset lacks sufficient battery capacity day use full qwerty however e66 smaller size weighs less e66 also includes accelerometer new animations transition effects lacking e71 2.5 mm 3/32 audio port suitable traditional 3.5 mm 1/8 headphones plugs microusb port used charge mobile dial 0000 check firmware version
[ 1537, 4609, 8577, 3205, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 2208, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053...
Test
855
4
Zip_bomb:zip bomb zip bomb also known zip death decompression bomb malicious archive file designed crash render useless program system reading often employed disable antivirus software order create opening traditional viruses rather hijacking normal operation program zip bomb allows program work intended archive carefully crafted unpacking e.g virus scanner order scan viruses requires inordinate amounts time disk space memory modern antivirus programs detect whether file zip bomb avoid unpacking zip bomb usually small file ease transport avoid suspicion however file unpacked contents system handle one example zip bomb file 42.zip zip file consisting 42 kilobytes compressed data containing five layers nested zip files sets 16 bottom layer archive containing 4.3-gigabyte 4 294 967 295 bytes 3.99 gib file total 4.5 petabytes 4 503 599 626 321 920 bytes 3.99 pib uncompressed data file still available download various websites across internet many anti-virus scanners layers recursion performed archives help prevent attacks would cause buffer overflow out-of-memory condition exceed acceptable amount program execution time zip bombs often always rely repetition identical files achieve extreme compression ratios dynamic programming methods employed limit traversal files one file followed recursively level effectively converting exponential growth linear also zip files uncompressed yield identical copies sophisticated form zip bombs exploits specifications zip files deflate compression algorithm create bombs without use nested layers used 42.zip
[ 1474, 8930, 10210, 2213, 3525, 2251, 2095, 11444, 11351, 2423 ]
Test
856
7
UKFast:ukfast ukfast.net ltd business-to-business hosting company based manchester uk principally known managed hosting cloud services colocation business owns operates data centre complex trafford park manchester ukfast founded september 1999 welsh businessman lawrence jones partner gail jones 2007 company moved head office 28th floor city tower manchester acquired space 16th floor moving 2013 campus birley fields area hulme manchester 2013 firm launched ecloud range cloud hosting services whose hardware infrastructure reportedly cost Β£12 million build year business turned Β£23.4m year ending 31 december 2014 ukfast reported 24 per cent turnover increase Β£23.4m Β£28.9m 2011 2015 ukfast invested Β£25m capital expenditure projects including development four data centres flagship ukfast campus founder lawrence jones rejected reported Β£200m takeover bid 2014 amidst trend web hosting consolidation citing business still growing 2013 ukfast opened office glasgow 2015 opened office london 2018 30 stake ukfast sold private equity firm inflexion 2005 2009 ukfast six internet service providers association awards named best hosting provider four years running ukfast received data centre solutions awards ’ private cloud product year 2012 datacenterdynamics award innovation outsourcing 2013 year ukfast received national business awards employer year award institute customer service employee engagement strategy year awards ukfast also featured sunday times 100 best small companies work great place work institute ’ best workplaces lists placing 28th 12th respectively 2014 25th 5th respectively 2013 45th 7th respectively 2012
[]
Validation
857
4
ICloud_leaks_of_celebrity_photos:icloud leaks celebrity photos august 31 2014 collection almost 500 private pictures various celebrities mostly women many containing nudity posted imageboard 4chan later disseminated users websites social networks imgur reddit images initially believed obtained via breach apple cloud services suite icloud security issue icloud api allowed make unlimited attempts guessing victims passwords however access later revealed gained via spear phishing attacks event media outlets internet users referred names fappening portmanteau words fap β€”a slang term masturbationβ€”and film happening celebgate met varied reaction media fellow celebrities critics felt distribution images major invasion privacy subjects allegedly depicted subjects questioned authenticity leak also prompted increased concern analysts surrounding privacy security cloud computing services icloudβ€”with particular emphasis use store sensitive private information images obtained via online storage offered apple icloud platform automatically backing photos ios devices iphones apple later reported victims icloud account information obtained using targeted attack user names passwords security questions phishing brute-force guessing initially believed images obtained using exploit find iphone service court documents 2014 indicated one user created fake email account called appleprivacysecurity ask celebrities security information photos passed around privately least couple weeks public release august 31 claims unreleased photos videos exist daily mail cited anonymous posters 4chan deadspin stated ring hackers traders sellers operating months leading mass release hacker responsible leak described collector distributed leaked images image boards 4chan anon-ib exchange bitcoin ultimately images widely circulated online via channels including imgur tumblr celebrity gossip blogger perez hilton also re-posted photos blog soon took issued apology saying acted bad taste major center activity link-sharing website reddit subreddit created sharing photos single day amassed 100,000 followers reddit administrators criticized allowing take place alleged violation anti-doxing rules mckayla maroney claimed 18 time photos taken reddit staff took photos warned anyone re-posting underage photos liz lee circulating prior incident would permanently banned site could prosecuted distributing child pornography september 7 citing copyright issues reddit banned thefappening subreddit also saying workload dealing become much reddit banned another subreddit named fappening day original release contained photos videos 100 individuals allegedly obtained file storage hacked icloud accounts including leakers claimed a-list celebrities shortly photos leaked several affected celebrities issued statements either confirm deny photos authenticity celebrities confirmed photos authenticity include jennifer lawrence confirmed publicist kate upton husband justin verlander confirmed upton lawyer mary elizabeth winstead confirmed twitter jessica brown findlay confirmed spokesman kaley cuoco confirmed via instagram kirsten dunst also criticized icloud service jill scott confirmed twitter one leaked photos stating another fake celebrities denied photos authenticity include ariana grande yvonne strahovski olympic gymnast mckayla maroney initially denied images authenticity twitter later confirmed photos legitimate also stating underage time taken victoria justice denied photos authentic later stated twitter pursuing legal actions found leak massive invasion privacy privacy celebrities affected leak reports october indicated nick hogan first male star directly targeted hackers however hogan denied pictures authenticity according security expert nik cubrilovic addition photographs personal information text messages calendars address books phone call logs data stored phones backed service also likely stolen september 20 2014 second batch similar private photos additional celebrities leaked hackers september 26 2014 third batch also leaked dubbed fappening 3 actress lena dunham pleaded twitter people view pictures saying violat es women okay actress emma watson condemned release photos also accompanying comments social media show lack empathy actors seth rogen lucas neff also spoke hackers people posted pictures justin verlander pitcher detroit tigers told media prior game cleveland indians keeps private life private would rather focus tigers race kansas city royals al central title distraction teammates security analysts stated breach could prevented use two-factor authentication forbes writer recommended turning icloud photo stream feature uploads photos taken ios device icloud servers automatically entirely incident given many names including fappening portmanteau happening fap internet slang term masturbation celebgate reference watergate scandal term fappening received criticism journalists like radhika sanghani daily telegraph toyin owoseje international business times said term trivialized leak also according sanghani made light severe situation articles used term extensively describe event including headlines interview wall street journal apple ceo tim cook stated response leaks company planned take additional steps protect privacy security icloud users future notifications provided whenever data restored device via icloud logging icloud via web browser addition existing notifications user icloud password changed additionally apple broaden encourage use two-factor authentication future versions software operating systems then-upcoming ios 8 conclusion emphasized want everything protect customers outraged jennifer lawrence contacted authorities publicist stated authorities prosecute anyone posts leaked images forbes columnist joseph steinberg questioned whether reactions law enforcement technology providers indicated celebrities treated differently ordinary americans case law enforcement may illegal october 1 2014 google threatened lawsuit lawyer martin singer 100 million behalf unnamed victims leaks alleging google refused respond requests images removed platforms including blogger youtube failing act expeditiously responsibly remove images knowingly accommodating facilitating perpetuating unlawful conduct interview vanity fair lawrence called leak sex crime sexual violation added anybody looked pictures 're perpetuating sexual offense cower shame view contrasted another victim hack emily ratajkowski told gq lot people victims hack said anyone looks pictures feel guilty n't think fair 'm sure anyone googles necessarily criminal think people stole photos fbi said aware allegations concerning computer intrusions unlawful release material involving high profile individuals addressing matter similarly apple stated investigating whether security breach icloud service responsible leaked photographs per company commitment user privacy september 2 2014 apple reported leaked images result compromised accounts using targeted attack user names passwords security questions practice become common internet october 2014 fbi searched house chicago seized several computers cell phones storage drives tracking source hacking attack ip address linked individual named emilio herrera related search warrant application mentioned eight victims initials a.s. c.h. h.s. j.m. o.w. a.k. e.b. a.h. supposedly point stolen photos abigail spencer christina hendricks hope solo jennette mccurdy olivia wilde anna kendrick emily browning amber heard according law enforcement officials herrera one several people investigation fbi carried various searches across country march 2016 36-year-old ryan collins lancaster pennsylvania agreed plead guilty one count unauthorized access protected computer obtain information resulting 18-month sentence victims named court documents numerous media outlets connected collins case fappening investigation found collins phished sending e-mails victims looked like came apple google warning victims accounts might compromised asking account details victims would enter passwords collins gained access accounts downloading e-mails icloud backups october 2016 collins sentenced 18 months prison august 2016 28-year-old edward majerczyk chicago illinois agreed plead guilty similar phishing scheme although authorities believe worked independently accused selling images posting online january 24 2017 majerczyk sentenced nine months prison ordered pay 5,700 restitution cover counseling services one unnamed celebrity victim emilio herrera also chicago first named press 2014 pleaded guilty one count unauthorized access protected computer obtain information october 2017 herrera accessed accounts unnamed celebrities others accused involved leaking sharing photos videos obtained sentenced 16 months jail march 2018 april 2018 26-year-old george garofano north branford connecticut pleaded guilty one count unauthorized access protected computer obtain information garofano attorney said led phishing scheme criminals august 29 2018 federal court sentenced garofano eight months prison october 22 2018 christopher brannan former virginia teacher became fifth man convicted relation hacking brannan pled guilty federal charges aggravated identity theft unauthorized access protected computer phishing expedition hacked 200 people addition celebrity victims brannan targeted underage sister-in-law well teachers students school used teach brannan sentenced 34 months prison march 1 2019
[ 1024, 5636, 9732, 4117, 8726, 535, 9761, 4644, 4133, 1087, 1608, 3657, 8779, 4703, 8288, 4194, 8292, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 9904, 9395, 8886, 3789, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 10477, 9460, 741...
Test
858
4
Dropper_(malware):dropper malware dropper kind trojan designed install sort malware virus backdoor etc target system malware code contained within dropper single-stage way avoid detection virus scanners dropper may download malware target machine activated two stage
[ 3555, 10756, 2213, 9832, 107, 6059, 7515, 7739, 3867, 1662 ]
Test
859
3
Sony_Toshiba_IBM_Center_of_Competence_for_the_Cell_Processor:sony toshiba ibm center competence cell processor sony toshiba ibm center competence cell processor first center competence dedicated promotion development sony toshiba ibm cell microprocessor eight-core multiprocessor designed using principles parallelism memory latency center part georgia institute technology college computing headed david a. bader according ibm center intended build community programmers broaden industry support cell processor far program resulted two workshops involved detailed lectures training various basic cell programming concepts deployed cluster 28 ibm bladecenter qs20 servers 14 blades student faculty use
[ 9472, 10368, 643, 9091, 3077, 10761, 11657, 5006, 6799, 1784, 9508, 9126, 6311, 9512, 684, 306, 1587, 7218, 9397, 6072, 8120, 10040, 1985, 10749, 1091, 9543, 6909, 5450, 6732, 10316, 3025, 6738, 342, 8792, 6873, 1115, 4060, 3677, 607, 944...
Test
860
1
Database_caching:database caching database caching process included design computer applications generate web pages on-demand dynamically accessing backend databases applications deployed multi-tier environments involve browser-based clients web application servers backend databases middle-tier database caching used achieve high scalability performance three tier architecture application software tier data storage tier different hosts throughput application limited network speed limitation minimized database application tier commercial database software makes extensive use system resources always practical application database host case light-weight database application used cache data commercial database management system database caching improves scalability distributing query workload backend multiple cheap front-end systems allows flexibility processing data example data platinum customers cached ordinary customers caching improve availability data providing continued service applications depend cached tables even backend server unavailable another benefit improved data access speeds brought locality data smoothing load peaks avoiding round-trips middle-tier data-tier
[ 2688, 1801, 9481, 10505, 10258, 10518, 4376, 9112, 7968, 290, 1314, 2339, 7461, 8742, 8871, 5550, 5808, 10418, 7347, 9527, 3768, 3004, 9661, 9663, 4416, 2369, 5441, 11457, 10565, 8518, 72, 10700, 853, 2901, 9942, 9177, 987, 9183, 11362, 1...
None
861
3
Cosmic_Soldier_(video_game):cosmic soldier video game game introduced dialog conversation system player recruit allies speaking choose whether kill spare enemy engage enemies conversation similar later famous megami tensei battles fought turn-based style game also displayed nudity title screen 1987 sequel cosmic soldier psychic war released msx2 computer japan ms-dos platform west changed turn-based combat predecessor unique tug war style real-time combat system battles clash energy party enemy player needing push energy towards enemy strike able use shield block suction ability absorb opponent power game also improves upon conversation system predecessor closely resembles one megami tensei released around time
[ 10931, 9166, 9006 ]
Test
862
7
Gemstone_(database):gemstone database gemstone/s computer software application framework first available programming language smalltalk object database proprietary commercial software gemstone systems founded march 1 1982 servio logic build database machine based set theory model ian huang instigated founding technology adviser ceo sampoerna holdings putera sampoerna recruiting frank bouton president cofounder floating point systems inc dr. michael mulder vice president engineering group manager advanced processor design sperry univac principal architect univac 1180 mainframe steve ivy vice president operation senior manager tektronix leonard yuen vice president business development development manager ibm db2 database dr. george copeland chief architect senior staff engineer advanced development group tektronix steve redfield chief engineer chief engineer intel 80286 microprocessor alan purdy staff engineer tektronix bob bretl software engineering manager tektronix signal processing systems allen otis also tektronix john telford software engineering manager electro scientific industries monty williams servio logic renamed gemstone systems inc. june 1995 firm developed first hardware prototype 1982 shipped first software product gemstone 1.0 1986 engineering group resides beaverton oregon three original cofounding engineers bob bretl allen otis monty williams retired firm since start gemstone owners pioneered implementing distributed computing business systems many information system features associated java ee implemented earlier gemstone gemstone visualwave early web application server platform visualwave visualworks owned cincom gemstone played important sponsorship role smalltalk industry council time ibm backing visualage smalltalk owned instantiations inc. major transition gemstone smalltalk continued gemstone/s various c++ java products scalable multitier architecture distributed computing systems evolved gemstone/j product turn gave rise gemfire early example data fabric complex event processing cep event stream processing esp data virtualization distributed caching may 6 2010 springsource division vmware announced entered definitive agreement acquire gemstone may 2 2013 gemtalk systems acquired gemstone/s platform pivotal software emc vmware spin-off .. gemfire remained pivotal big data division product available standalone also integrated cloud foundry paas pivotal cloud cache gemstone builds programming language smalltalk gemstone systems serve mission-critical applications gemstone frameworks still see interest web services service-oriented architectures recent revival interest smalltalk occurred result use generate javascript e-commerce web pages web application frameworks seaside web framework systems based object databases common based orm object-relational mapping frameworks toplink hibernate application framework market jboss bea weblogic somewhat analogous gemstone
[ 9345, 5380, 3462, 7175, 6153, 8201, 4107, 5518, 9467, 3219, 9245, 5409, 10020, 5677, 7983, 823, 4811, 6860, 2901, 1112, 1382, 11625, 9323, 5356, 5612, 3323, 511 ]
Test
863
2
Linux_on_z_Systems:linux z systems linux ibm z linux z short previously linux z systems collective term linux operating system compiled run ibm mainframes especially ibm z ibm linuxone servers similar terms imply meaning linux zenterprise linux zseries linux/390 linux/390x etc terms zlinux z/linux also sometimes used terms discouraged ibm create implication ibm-offered ibm-distributed version linux incorrect zlinux without slash also incorrect software software nomenclature involves slash z/vm z/os z/vse etc hardware z900 z13 etc linux ibm z originated two separate efforts port linux ibm system/390 servers first effort bigfoot project developed linas vepstas late 1998 early 1999 independent distribution since abandoned ibm published collection patches additions linux 2.2.13 kernel december 18 1999 start today mainline linux z formal product announcements quickly followed 2000 including integrated facility linux ifl engines think blue linux early mainframe distribution consisting mainly red hat packages added ibm kernel commercial linux distributors introduced mainframe editions quickly initial kernel work start ibm involvement linux patches ibm z included object code oco modules without source code soon ibm replaced oco modules open source modules linux z free software gnu general public license according ibm may 2006 1,700 customers running linux mainframes virtualization required default ibm z option run linux z without degree virtualization first 64-bit mainframe models z900 z800 included non-virtualized basic mode first layer virtualization provided processor resource system manager pr/sm deploy one logical partitions lpars lpar supports variety operating systems including linux ibm z hypervisor called z/vm also run second layer virtualization lpars create many virtual machines vms resources assigned lpars support kvm z another hypervisor option linux applications lpar access data applications lpars cics ibm db2 ims linux mainframe subsystems running physical mainframe utilize hipersockets – fast memory-only tcp/ip connections compared tcp/ip standard network interface cards nics also known open system adapters osas mainframes hipersockets improve end-user responsiveness reduce network latency processing overhead security since network connection intercept reliability since network connection lose zec12 zbc12 later models hipersocket concept extended beyond physical machine boundary via rdma converged ethernet roce adapter facilitate secure high speed inter-system communication applications lpar system thus use hipersockets communicate applications lpar b system b ensure security performance attributes beginning linux kernel version 4.1 released early 2015 linux z available 64-bit operating system compatible z/architecture mainframes previously linux z also available 31-bit operating system compatible older model mainframes introduced prior 2000 z900 model however newer 64-bit linux kernel 64-bit linux z distributions still backward compatible applications compiled 31-bit linux z historically linux kernel architecture designations s390 s390x distinguish 31-bit 64-bit linux z kernels respectively s390 also refers generally one linux z kernel architecture linux runs standard general purpose mainframe cps central processors well ifls integrated facility linux ifls mainframe processors dedicated running linux either natively hypervisor z/vm kvm z microcode restricts ifls running traditional workloads z/os physically identical ibm z processors ifls typically less expensive acquire ibm cps linux z gives flexibility running linux advantages fault-tolerant mainframe hardware capable 90,000 i/o operations per second mean time failure mtbf measured decades using virtualization numerous smaller servers combined onto one mainframe gaining benefits centralization cost reduction still allowing specialized servers instead paravirtualization ibm mainframes use full virtualization permits workload density far greater paravirtualization combining full virtualization hardware plus lightweight virtual machine containers run linux isolation somewhat similar concept docker result platform supports virtual servers single footprint also lower operating costs additional savings seen reduced need floor space power cooling networking hardware infrastructure needed support data center ibm mainframes allow transparent use redundant processor execution steps integrity checking important critical applications certain industries banking.. mainframes typically allow hot-swapping hardware processors memory ibm z provides fault tolerance key components including processors memory i/o interconnect power supply channel paths network cards others internal monitoring possible problems detected problem components designed switched without even failing single transaction rare event failure firmware automatically enable spare component disable failing component notify ibm dispatch service representative transparent operating system allowing routine repairs performed without shutting system many industries continue rely mainframes considered best option terms reliability security cost linux z generally appropriate premises small businesses would fewer 10 distributed linux servers although expensive per-processor licensed software quickly reduce rule thumb software vendors including ibm treat highly virtualized ifls like non-virtualized processors platforms licensing purposes words single ifl running scores linux instances still typically counts one ordinary cpu cpu price software licensing test development quality assurance training redundant production server instances run one ifl ifls needed peak demand performance capacity thus beyond minimum threshold linux z quickly become cost-advantageous factoring labor software costs cost equation linux z always well understood controversial many businesses governments difficulty measuring much less basing decisions software labor costs costs outage security breaches acquisition costs often visible small non-scalable servers cheap nonetheless non-acquisition costs less real usually far greater hardware acquisition prices also individual users departments within larger businesses governments sometimes difficulty sharing computing infrastructure resources matter citing loss control server centralization linux z provides might reward cooperation better service lower costs say cooperation always easily accomplished within corporate bureaucracy linux z also supports less expensive disk storage devices z/os linux require ficon escon attachment although z/os may use disk space efficiently balance due hardware-assisted database compression common z/os smaller number operating system instances z/os typically requires also operational advantages using ficon-attached storage linux z example support z/vm live guest relocation mainframe characteristics designed business workloads transaction processing especially conjunction concurrent high volume batch processing large database management mainframe design traditionally emphasizes balanced performance computing elements including input/output implemented via channel i/o mainframes offload i/o system accounting non-core computing tasks main cpus much possible z/architecture additionally offloads cryptographic calculations example single ibm z13 machine 141 processor cores available configure ifls however every machine also 27 additional main cores 2 spares 1 firmware support remainder running system accounting i/o support tasks addition i/o adapter typically two powerpc processors z13 supports hundreds i/o adapters also separate processors handling memory cache control tasks environmental monitoring internal interconnections examples historically mainframes general linux z particular execute cpu-intensive single task computations notably high performance compared certain platforms notable exceptions cryptographic calculations examples included scientific simulations weather forecasting molecular modeling supercomputers including linux-based supercomputers excel workloads bifurcation mainframes platforms significantly blurred recent years starting introduction 2008 system z10 machine based quad-core 4.4 ghz processors hardware decimal floating point mainframe processor technology continued evolve especially introduction ibm linuxone ibm z13 models 2015 ibm started promoting mainframes ideal platforms run real-time analytics computationally intensive tasks mainframes historically run well ibm sold x86 server product line lenovo 2014 mainframes provide graphics sound adapters ill-suited digital media editing computer-aided design cad except perhaps support roles e.g content storage parts inventories metadata management security services etc like versions linux linux z governed gpl free software license complete linux z source code available numerous parties free equal basis architectural support part main linux kernel effort ibm assigns several programmers community effort ibm means participant though obstacles running linux z distribution ibm z system ibm routinely tests three particular linux z distributions red hat suse starting 2015 canonical ubuntu linux notable linux z distributions include debian fedora slackware centos gentoo nearly every free open-source software package available linux generally available linux z including apache http server samba software jboss postgresql mysql php python programming language concurrent versions system cvs gnu compiler collection gcc llvm perl rust among many others red hat suse offer mainline support distributions running linux z 2015 canonical announced plans offer official support distribution starting early 2016 ibm global services also offers support contracts including 24x7 coverage standard linux software applications readily available pre-compiled including popular closed-source enterprise software packages websphere db2 oracle databases applications sap r/3 sap erp ibm java developer kit jdk name ibm offers resources developers wishing target linux z linux z supports unicode ascii like linux distributionβ€”it ebcdic-based operating system however convenience linux able read kernel parameters ebcdic z/vm takes advantage capability porting linux applications linux z fairly straightforward potential issues include endianness linux z big-endian reliance non-portable libraries particularly source code available programs easily cross compiled z/architecture binaries non-mainframe linux systems least three software-based ibm z mainframes emulators
[ 6148, 7173, 10780, 10273, 3618, 5677, 7217, 10803, 7733, 573, 10817, 5220, 9829, 10340, 6248, 2168, 5755, 2172, 2179, 1668, 7812, 8326, 10883, 3720, 9361, 2195, 10389, 9370, 1694, 4255, 7848, 8879, 6325, 1219, 6852, 8388, 710, 6342, 3791, ...
None
864
1
Partial_index:partial index databases partial index also known filtered index index condition applied includes subset rows table allows index remain small even though table may rather large extreme selectivity suppose transaction table entries start status active may pass statuses p pending w worked reaching final status f point longer likely processed postgresql useful partial index might defined index would bother storing millions rows reached final status f would allow queries looking transactions still need work efficiently search via index similarly partial index used index rows column null benefit column usually null index would allow following query read updated tuples necessary condition index criterion stonebraker paper presents number examples indexes similar following sql server type index called filtered index partial indexes supported postgresql since version 7.2 released february 2002 sqlite supports partial indexes since version 3.8.0 mongodb supports partial indexes latest release v3.2 mysql version 8.0 support partial indexes mysql term partial index sometimes used refer prefix indexes truncated prefix value stored index another technique reducing index size
[ 5546, 7022, 10737, 9075, 10389, 11030, 2456, 8539 ]
Test
865
8
Apache_HTTP_Server:apache http server apache http server colloquially called apache free open-source cross-platform web server software released terms apache license 2.0 apache developed maintained open community developers auspices apache software foundation vast majority apache http server instances run linux distribution current versions also run microsoft windows wide variety unix-like systems past versions also ran openvms netware os/2 operating systems including ports mainframes originally based ncsa httpd server development apache began early 1995 work ncsa code stalled apache played key role initial growth world wide web quickly overtaking ncsa httpd dominant http server remained popular since april 1996 2009 became first web server software serve 100 million websites estimated serve 29 active websites ranked 2nd nginx 32 32 top million websites ranked 2nd 33 number explanations origin apache name offered years inception apache project 1995 official documentation stated april 2000 interview brian behlendorf one creators apache said since 2013 apache foundation explained origin name apache running unix process name httpd short http daemon apache supports variety features many implemented compiled modules extend core functionality range authentication schemes supporting server-side programming languages perl python tcl php popular authentication modules include mod_access mod_auth mod_digest mod_auth_digest successor mod_digest sample features include secure sockets layer transport layer security support mod_ssl proxy module mod_proxy url rewriting module mod_rewrite custom log files mod_log_config filtering support mod_include mod_ext_filter popular compression methods apache include external extension module mod_gzip implemented help reduction size weight web pages served http modsecurity open source intrusion detection prevention engine web applications apache logs analyzed web browser using free scripts awstats/w3perl visitors virtual hosting allows one apache installation serve many different websites example one computer one apache installation could simultaneously serve codice_1 codice_2 codice_3 etc apache features configurable error messages dbms-based authentication databases content negotiation supports several graphical user interfaces guis supports password authentication digital certificate authentication source code freely available anyone adapt server specific needs large public library apache add-ons detailed list features provided instead implementing single architecture apache provides variety multiprocessing modules mpms allow run either process-based mode hybrid process thread mode event-hybrid mode order better match demands particular infrastructure choice mpm configuration therefore important compromises performance must made apache designed reduce latency increase throughput relative simply handling requests thus ensuring consistent reliable processing requests within reasonable time-frames delivering static pages apache 2.2 series considered significantly slower nginx varnish address issue apache developers created event mpm mixes use several processes several threads per process asynchronous event-based loop architecture implemented apache 2.4 series performs least well event-based web servers according jim jagielski independent sources however independent significantly outdated benchmarks show still half fast nginx e.g apache http server codebase relicensed apache 2.0 license previous 1.1 license january 2004 apache http server 1.3.31 2.0.49 first releases using new license openbsd project like change continued use pre-2.0 apache versions effectively forking apache 1.3.x purposes initially replaced nginx soon made replacement openbsd httpd based relayd project version 1.1 apache license 1.1 approved asf 2000 primary change 1.0 license 'advertising clause section 3 1.0 license derived products longer required include attribution advertising materials documentation version 2.0 asf adopted apache license 2.0 january 2004 stated goals license included making license easier non-asf projects use improving compatibility gpl-based software allowing license included reference instead listed every file clarifying license contributions requiring patent license contributions necessarily infringe contributor patents apache http server project collaborative software development effort aimed creating robust commercial-grade feature-rich freely available source code implementation http web server project jointly managed group volunteers located around world using internet web communicate plan develop server related documentation project part apache software foundation addition hundreds users contributed ideas code documentation project apache 2.4 dropped support beos tpf even older platforms
[ 5641, 2060, 9229, 7695, 6161, 5139, 1556, 7702, 1047, 8217, 5660, 10780, 2596, 1062, 11303, 8745, 44, 7212, 10284, 1583, 10800, 4658, 6714, 9789, 7742, 10815, 64, 7233, 7750, 4171, 595, 7252, 8281, 2138, 4186, 7261, 8799, 8294, 7784, 5738...
None
866
2
NetInfo:netinfo netinfo system configuration database nextstep mac os x versions mac os x v10.4 tiger netinfo replaces unix system configuration files though still present running machine single user mode unix apis wrap around netinfo instead netinfo stores system wide network-type configuration information users groups binary databases mac os x machine application specific settings stored plist files netinfo introduced nextstep version 0.9 replaced unix system configuration files sun microsystems network information service yellow pages next computers immediately caused controversy much unfavorable netinfo unique next computers although next later licensed netinfo xedoc australian software company produced netinfo unix systems dns queries went netinfo led situation basic tasks translating unix uid user name string would complete netinfo stalled dns lookup first possible disable netinfo use unix system files nextstep version 2 disabling netinfo also disabled dns support thus next computers became notorious locking user everyday tasks dns server stopped responding mac os x version netinfo remedied many problems due early problems netinfo never took world unix system configuration apple moved away using netinfo towards ldap particularly mac os x server mac os x v10.4 last version support netinfo beginning mac os x v10.5 netinfo completely phased replaced new local search node named dslocal files located /var/db/dslocal/ standard property list xml-based files netinfo database stored /private/var/db/netinfo/local.nidb/ accessed root viewed modified application programming interface netinfo manager utility command line tools niutil netinfo completely removed mac os x 10.5 netinfo-based command line tools also phased replaced tools also netinfo manager removed netinfo stores following data
[ 5985, 9665, 5093, 168, 5492, 2901, 6651, 4571, 7806 ]
Test
867
0
Morphological_parsing:morphological parsing morphological parsing natural language processing process determining morphemes given word constructed must able distinguish orthographic rules morphological rules example word 'foxes decomposed 'fox stem 'es suffix indicating plurality generally accepted approach morphological parsing use finite state transducer fst inputs words outputs stem modifiers fst initially created algorithmic parsing word source dictionary complete modifier markups another approach use indexed lookup method uses constructed radix tree often-taken route breaks morphologically complex languages advancement neural networks natural language processing became less common use fst morphological analysis especially languages lot available training data languages possible build character-level language models without explicit use morphological parser orthographic rules general rules used breaking word stem modifiers example would singular english words ending -y pluralized end -ies contrast morphological rules contain corner cases general rules types rules used construct systems morphological parsing morphological rules exceptions orthographic rules used breaking word stem modifiers example would one normally pluralizes word english adding suffix word 'fish change pluralized contrast orthographic rules contain general rules types rules used construct systems morphological parsing applications morphological processing include machine translation spell checker information retrieval
[ 1890, 7780, 3998 ]
None
868
2
OS/360_and_successors:os/360 successors os/360 officially known ibm system/360 operating system discontinued batch processing operating system developed ibm then-new system/360 mainframe computer announced 1964 heavily influenced earlier ibsys/ibjob input/output control system iocs packages one earliest operating systems require computer hardware include least one direct access storage device although os/360 discontinued successor operating systems including virtual storage mvs 64-bit z/os still run maintain application-level compatibility ibm announced three different levels os/360 generated tapes sharing code ibm eventually renamed options made significant design changes users often coined nicknames e.g. big os os/mft none names official recognition ibm major operating system system/360 hardware dos/360 os/360 public domain downloaded freely well run actual system/360 hardware executed free hercules emulator runs unix unix-like systems including gnu/linux solaris macos well windows os/360 turnkey cds provide pregenerated os/360 21.8 systems ready run hercules ibm originally intended system/360 one batch-oriented operating system os/360 capable running machines small 32 kib also intended supply separate timesharing operating system tss/360 system/360 model 67 least two accounts ibm eventually decided produce simpler batch-oriented operating systems ibm introduced series stop-gaps prevent system/360 hardware sales collapsingβ€”first bos/360 basic operating system smallest machines 8k byte memories tos/360 tape operating system machines least 16k byte memories tape drives finally dos/360 disk operating system became mainstream operating system ancestor today widely used z/vse ibm released three variants os/360 pcp primary control program stop-gap could run one job time 1966 mft multiprogramming fixed number tasks mid-range machines mvt multiprogramming variable number tasks top end mft mvt used least 1981 decade successors launched division mft mvt arose storage limitations scheduling constraints initially ibm maintained mft mvt simply two configurations os/360 control program although later ibm described separate versions os/360 ibm originally wrote os/360 assembly language later ibm wrote os/360 code new language basic systems language bsl derived pl/i large amount tso code release 20 written bsl tss/360 late unreliable ibm canceled although ibm later supplied three releases tss/370 prpq time cp-67 running well enough ibm offer without warranty timesharing facility large customers three options offered similar facilities porting applications usually required minimal effort versions ibm program products application utility software ran text mostly treats pcp mft mvt simply new names original sss mss mps although design changes also text distinguish m65mp mvt officially pcp mft mvt separate operating systems os/360 install-time configuration optionsβ€”in today words three different variants os nucleus scheduler however quite different behavior memory requirements users commonly consider de facto separate operating systems refer early os/360 os/mft os/mvt respectively mft differs mvt mainly way manages memory installing mft customers specify fixed number partitions areas memory fixed boundaries application programs run simultaneously primary control program pcp intended machines small memories similar mft one partition experience indicated advisable install os/360 systems less 128 kib memory although limited production use possible much smaller machines 48 kib memory ibm dropped pcp option final releases os/360 leaving mft ii mvt required memory also referred sys=min macro expansions system-dependent multiprogramming fixed number tasks mft intended serve stop-gap multiprogramming variable number tasks mvt intended target configuration os/360 became available 1967 early versions mvt many problems simpler mft continued used many years introducing new system/370 machines virtual memory 1972 ibm developed mft 2 os/vs1 last system particular line first version mft shared much code architecture pcp limited four partitions cumbersome run multiple partitions many installations used houston automatic spooling priority hasp mitigate complexity mft version ii mft-ii shared much control program scheduler code mvt much flexible run maximum number partitions increased 52 later modifications mft-ii added sub-tasking fixed number tasks longer fixed although number partitions remain limitation experience indicated advisable install mft systems less 256 kib memory 1960s quite large amount also referred sys=int macro expansions system-dependent multiprogramming variable number tasks mvt sophisticated three available configurations os/360 control program one two available configurations final releases mvt intended largest machines system/360 family introduced 1964 become available 1967 early versions many problems simpler mft continued used many years experience indicated advisable install mvt systems less 512 kib memory mvt treated memory used operating system single pool contiguous regions could allocated required unlimited number simultaneous application systems programs scheme flexible mft principle used memory efficiently liable fragmentation one could find although enough spare memory total run program divided separate chunks none large enough system/360 lacked memory relocation hardware memory compaction could used reduce fragmentation facility called rollout/rollin could swap running job secondary storage make memory available another job rolled-out job would however rolled-in original memory locations became available 1971 time sharing option tso use mvt added part release 20.1 tso became widely used program development provided editor ability submit batch jobs notified completion view results without waiting printed reports debuggers programming languages used system/360 tso os/360 communicated terminals using telecommunications access method tcam tcam name suggests ibm hoped would become standard access method data communications fact tcam os/vs2 used almost entirely tso largely superseded virtual telecommunications access method vtam mid-to-late 1970s also referred sys=vms invocations macros system-dependent model 65 multiprocessing m65mp variant mvt runs 360/65 multisystem mode m65mp traps use set system mask ssm instruction serialize disabled code two cpus part m65mp system behavior interfaces mvt system keyword parameter sys=vms included m65mp well uniprocessor mvt pcp mft mvt provide similar facilities point view application programs features available mft mvt system/370 announced 1970 offered essentially facilities system/360 4 times processor speeds similarly priced system/360 cpus 1972 ibm announced system/370 advanced functions main item future sales system/370 would include virtual memory capability could also retro-fitted existing system/370 cpus hence ibm also committed delivering enhanced operating systems could support use virtual memory ibm provided os/360 sysgen option s/370 support support dat os/vs1 successor mft offers similar facilities several additions e.g. res virtual memory vsam see initially available independent component release icr later integrated os/vs1 base ibm released fairly minor enhancements os/vs1 1983 1984 announced would aix/370 aix/esa dppx ix/370 os/vs1 tss/370 system/370 operating systems modern descendants os/vs2 release 1 mvt plus virtual memory vsam see version eventually renamed os/vs2 svs single virtual storage os/vs2 release 2 also known mvs multiple virtual storage introduced svs intended stepping stone mvt mvs historical interest today 1974 ibm released described os/vs2 release 2 really new operating system upwards-compatible os/vs2 release 1 supervisor new system largely rewritten new dialect bsl pl/s bsl pl/s dialects pl/i extensions designed transcribe assembly language code including privileged instructions needed control computer whole time-sensitive os components os dispatcher ios notably among many others remained coded assembly language enhanced os/vs ifox00 assembler older os/360 ieuasm assembler new version noticeable feature supported multiple virtual address spaces different applications thought using range virtual addresses new system virtual memory facilities mapped different ranges real memory addresses application address space consists 3 areas operating system one instance shared jobs application area unique application shared virtual area used various purposes including inter-job communication ibm promised application areas would always least 8mb approach eliminated risk memory fragmentation present mvt svs improved system internal security new system rapidly became known mvs multiple virtual storages original os/vs2 became known svs single virtual storage ibm accepted terminology labelled mvs successors mvs/ xxx mvs introduced new approach workload management allowing users define performance targets high-priority batch jobs enabled users give systems work without affecting performance highest-priority jobs mvs ibm first mainstream operating system system/370 support ibm called tightly coupled multiprocessing 2 later 12 ibm mainframes 16 amdahl mainframes cpus shared concurrent access memory single copy operating system peripheral devices providing greater processing power degree graceful degradation one cpu failed fortunately became increasingly rare event system time rose hours days years initially mvs supplied job queue manager called jes2 job entry subsystem 2 descended hasp houston automatic spooling priority also supported remote job entry workstations located elsewhere jes2 manage jobs one cpu might tightly coupled multiprocessor system 1976 ibm provided another option jes3 job entry subsystem 3 descendant asp attached support processor allows one cpu manage single job queue feeding work several physically distinct cpus therefore allows one operator console manage work cpus note jes1 job queue manager os/vs1 see ibm hoped virtual storage access method vsam would replace earlier sequential indexed direct access methods provided improved versions vsam formats became basis ibm database management systems ims/vs db2 usually esds actual data storage ksds indexes vsam also provides new implementation catalog facility enables applications access files name without needing know disk drive vsam datasets must defined vsam catalog used non-vsam datasets also listed vsam catalog mvs master catalog must vsam catalog catalogs originally provided os/360 form cvols mvs added separate catalog structure vsam later ibm added third type catalog known icf catalog ibm removed support cvol vsam catalogs 2000 since y2k-compliant hence z/os icf catalogs supported 1974 ibm announced systems network architecture meant reduce cost running large networks terminals mainly using communications lines much efficiently available ibm virtual memory operating systems since mainframe software component vtam available operating systems 1977 ibm announced mvs/system extensions program product i.e cost extra money improved mvs performance descendants mvs still used latest descendants system/360 system/390 zseries renamed os/390 system/390 64-bit version zseries named z/os data taken ibm 360 operating systems release history system/370 market chronology products services
[ 6148, 6675, 8213, 10273, 7217, 10803, 7733, 2616, 573, 2625, 8262, 9811, 3669, 8290, 5220, 9829, 6248, 7272, 2168, 2172, 2179, 10883, 6797, 7312, 9361, 1176, 9370, 7836, 7848, 8879, 10415, 6325, 9921, 1219, 8388, 6342, 7881, 8393, 10958, ...
Validation
869
3
Communications_Processor_Module:communications processor module communications processor module cpm component motorola 68000 family quicc motorola/freescale semiconductor powerpc/power isa powerquicc microprocessors designed provide features related imaging communications microprocessor delegate input/output processing example sending receiving data via serial interface communications processor module microprocessor perform functions input/output functions require quick response processor example due precise timing requirements data transmission cpm performing operations main microprocessor free perform tasks cpm features risc microcontroller communication processor separate actual central processing unit ip core risc microcontroller communicates core using dual-ported ram special command configuration event registers well via interrupts motorola 68302 integrated multiprotocol processor featured risc processor controlled either microcode rom downloadable firmware various forms microcode shipped different applications example support signaling system 7 communications centronics parallel interface motorola 68360 quicc first design feature communications processor module offering microcode ss7 isdn applications specifications microcontroller programming interface generally shipped customers possible run 68360 slave mode use cpm part chip example m68360quads-040 board 68040 cpu master coupled 68360 cpm slave cpu 68360 processor disabled cpm used later powerquicc series powerpc- power isa-based processors early designs like mpc860 used virtually cpm previous 68360 quicc processors typical features cpm include
[ 6914, 4868, 7173, 3846, 4743, 10501, 7305, 5642, 1548, 1933, 3472, 1170, 7065, 1563, 1309, 4897, 3493, 6949, 6311, 8102, 1321, 9391, 10543, 4017, 5297, 11447, 8120, 9020, 1725, 1983, 10945, 10180, 5457, 8530, 3540, 342, 9302, 11613, 6878, ...
Test
870
3
MC68340:mc68340 mc68340 high-performance 32-bit microprocessor direct memory access dma mc68340 one series components motorola m68300 family members family include mc68302 mc68330 mc68331 mc68332 mc68f333
[]
None
871
5
Daytime_Protocol:daytime protocol daytime protocol service internet protocol suite defined 1983 rfc 867 intended testing measurement purposes computer networks host may connect server supports daytime protocol either transmission control protocol tcp user datagram protocol udp port 13 server returns ascii character string current date time unspecified format unix-like operating systems daytime server usually built inetd xinetd daemon service usually enabled default may enabled adding following lines file /etc/inetd.conf telling inetd reload configuration example output may
[ 10242, 3847, 649, 9868, 7695, 3218, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 933, 2085, 3750, 3751, 3752, 9381, 10924, 562, 2996, 9909, 6651, 10171, 3133, 829, 3006, 4797, 5181, 5437, 7364, 2887, 8265, 2509, 4687, 849, 6993, 584...
Validation
872
9
Bayesian_inference_using_Gibbs_sampling:bayesian inference using gibbs sampling bayesian inference using gibbs sampling bugs software package performing bayesian inference using markov chain monte carlo based gibbs sampling bugs used following software
[ 2457, 9926 ]
Test
873
2
Bob_Fabry:bob fabry bob fabry computer science professor university california berkeley conceived idea obtaining darpa funding radically improved version unix started computer systems research group
[ 7552, 5506, 1927, 4745, 10761, 2061, 9743, 8725, 5534, 1316, 684, 4908, 1839, 1718, 1080, 9151, 9153, 3651, 7748, 10436, 9927, 8395, 850, 6361, 9306, 10202, 3551, 607, 9320, 9452, 5492, 633, 8316 ]
None
874
0
Computational_lexicology:computational lexicology computational lexicology branch computational linguistics concerned use computers study lexicon narrowly described scholars amsler 1980 use computers study machine-readable dictionaries distinguished computational lexicography properly would use computers construction dictionaries though researchers used computational lexicography synonymous computational lexicology emerged separate discipline within computational linguistics appearance machine-readable dictionaries starting creation machine-readable tapes merriam-webster seventh collegiate dictionary merriam-webster new pocket dictionary 1960s john olney et al system development corporation today computational lexicology best known creation applications wordnet computational processing researchers increased time use computational lexicology applied ubiquitously text analysis 1987 amongst others byrd calzolari chodorow developed computational tools text analysis particular model designed coordinating associations involving senses polysemous words computational lexicology contributed understanding content limitations print dictionaries computational purposes i.e clarified previous work lexicography sufficient needs computational linguistics work computational lexicologists almost every portion print dictionary entry studied ranging many computational linguists disenchanted print dictionaries resource computational linguistics lacked sufficient syntactic semantic information computer programs work computational lexicology quickly led efforts two additional directions first collaborative activities computational linguists lexicographers led understanding role corpora played creating dictionaries computational lexicologists moved build large corpora gather basic data lexicographers used create dictionaries acl/dci data collection initiative ldc linguistic data consortium went path advent markup languages led creation tagged corpora could easily analyzed create computational linguistic systems part-of-speech tagged corpora semantically tagged corpora created order test develop pos taggers word semantic disambiguation technology second direction toward creation lexical knowledge bases lkbs lexical knowledge base deemed dictionary computational linguistic purposes especially computational lexical semantic purposes information print dictionary totally explicated meanings words appropriate links senses many began creating resources wished dictionaries created use computational analysis wordnet considered development newer efforts describing syntactic semantic information framenet work fillmore outside computational linguistics ontology work artificial intelligence seen evolutionary effort build lexical knowledge base ai applications optimizing production maintenance extension computational lexicons one crucial aspects impacting nlp main problem interoperability various lexicons frequently incompatible frequent situation merge two lexicons fragments lexicons secondary problem lexicon usually specifically tailored specific nlp program difficulties used within nlp programs applications respect various data models computational lexicons studied iso/tc37 since 2003 within project lexical markup framework leading iso standard 2008 amsler robert 1980 ph.d. dissertation structure merriam-webster pocket dictionary university texas austin
[ 416, 1890, 7780, 2948, 586, 11056, 7839 ]
Validation
875
7
OpenLava:openlava openlava open source workload job scheduling software cluster computers openlava derived early version platform lsf configuration file syntax api cli kept unchanged therefore openlava mostly compatible platform lsf openlava based utopia research project university toronto openlava licensed gnu general public license v2 2007 platform computing part ibm released platform lava 1.0 simplified version platform lsf 4.2 code licensed gnu general public license v2 platform lava additional releases v1.0 discontinued 2011 2011 former platform computing employee david bigagli created openlava 1.0 forking code platform lava june 2011 openlava 1.0 code committed github january 2012 openlava 2.0 released feature enhancements bug fixes november 2013 openlava 2.2 released april 2015 openlava 3.0 released november 2015 openlava 3.1 released february 2016 openlava 3.2 released may 2016 openlava 3.3 released october 2016 openlava 4.0 released commercial support longer available see 2014 number former platform computing employees founded teraproc inc. contributes development provides commercial support openlava commercially supported openlava contains add-on features community based openlava project.. october 2016 ibm filed lawsuit alleging copyright infringement trade secrets misappropriation teraproc complaint accused company founders taking β€œ confidential proprietary source code ibm spectrum lsf product left used basis competitive product openlava david bigagli teraproc employee started openlava project posted notice github announcing downloads openlava disabled dmca takedown notice sent ibm lawyers bigagli later announced source code openlava 3.0 4.0 would taken source code 2.2 would restored order regain github repository openlava.org website claiming dmca claim fraudulent september 18 2018 us courts found favor ibm issued permanent injunction teraproc agents
[ 7983, 9040, 11221, 823, 3449, 3323, 2045 ]
None
876
3
AMD_RDNA_Architecture:amd rdna architecture radeon dna rdna codename gpu microarchitecture accompanying instruction set developed amd gpus successor gcn microarchitecture/instruction set first product lineup featuring rdna radeon rx 5000 series video card launched july 7 2019 architecture also planned used mobile products upcoming next generation game consoles sony microsoft likely risc simd rather simt microarchitecture going manufactured fabricated tsmc 7 nm finfet graphics chips used navi series amd radeon graphics cards architecture features new processor design although first details released amd computex keynote hints aspects previous graphics core next gcn architecture present feature multi-level cache hierarchy improved rendering pipeline support gddr6 memory completely redesigned non-hybrid architecture planned successor rumor starting architecture one biggest changes rdna width wavefront fundamental group work gcn iterations 64 threads wide meaning 64 threads bundled together single wavefront execution rdna drops native 32 threads wide time amd expanded width simds 16 slots 32 aka simd32 meaning size wavefront matches simd size rdna also introduces working primitive shaders feature present hardware vega architecture difficult get real-world performance boost thus amd never enabled primitive shaders rdna compiler-controlled display controller rdna updated support display stream compression 1.2a allowing output 4k 240 hz hdr 4k 120 hz hdr 8k 60 hz gpuopen hosts pdf-document aiming describe environment organization program state amd β€œ rdna ” generation devices details instruction set microcode formats native family processors accessible programmers compilers rdna instruction set owned amd also owns x86-64 instruction set rdna instruction set basically gcn instruction set several changes architectural changes affect code scheduled
[ 1952, 9057, 2850, 2339, 3204, 3586, 1510, 10658, 4332, 5356, 398, 2935, 9391, 407, 344, 11130, 11485 ]
None
877
4
Adware:adware adware advertising-supported software software generates revenue developer automatically generating online advertisements user interface software screen presented user installation process software may generate two types revenue one display advertisement another pay-per-click basis user clicks advertisement software may implement advertisements variety ways including static box display banner display full screen video pop-up ad form 2003 microsoft encyclopedia security sources use term adware differently software installs system without knowledge displays advertisements user browses internet i.e. form malware software developers offer software free charge rely revenue advertising recoup expenses generate income also offer version software fee without advertising software functions may designed analyze user location internet sites user visits present advertising pertinent types goods services featured legitimate software advertising functions integrated bundled program adware usually seen developer way recover development costs generate revenue cases developer may provide software user free charge reduced price income derived presenting advertisements user may allow motivate developer continue develop maintain upgrade software product use advertising-supported software business becoming increasingly popular third business executives 2007 survey mckinsey company planning using ad-funded software within following two years advertisement-funded software also one business models open-source software software offered advertising-supported mode paid advertisement-free mode latter usually available online purchase license registration code software unlocks mode purchase download separate version software software authors offer advertising-supported versions software alternative option business organizations seeking avoid paying large sums software licenses funding development software higher fees advertisers examples advertising-supported software include adblock plus acceptable ads windows version internet telephony application skype amazon kindle 3 family e-book readers versions called kindle special offers display advertisements home page sleep mode exchange substantially lower pricing 2012 microsoft advertising division microsoft advertising announced windows 8 major release microsoft windows operating system would provide built-in methods software authors use advertising support business model idea considered since early 2005 support advertising popular business model software service saas web notable examples include email service gmail google apps g suite products social network facebook microsoft also adopted advertising-supported model many social software saas offerings microsoft office live service also available advertising-supported mode view federal trade commission staff appears general agreement software considered spyware downloaded installed computer without user knowledge consent however unresolved issues remain concerning consumers need told software installed computers consent adequate instance distributors often disclose end-user license agreement additional software bundled primary software panelists commenters view disclosure sufficient infer consent installation bundled software term adware frequently used describe form malware malicious software presents unwanted advertisements user computer advertisements produced adware sometimes form pop-up sometimes unclosable window term used way severity implication varies sources rate adware irritant others classify online threat even rate seriously computer viruses trojans precise definition term context also varies adware observes computer user activities without consent reports software author called spyware however adware operates legally adware manufacturers even sued antivirus companies blocking adware programs developed detect quarantine remove advertisement-displaying malware including ad-aware malwarebytes anti-malware spyware doctor spybot – search destroy addition almost commercial antivirus software currently detect adware spyware offer separate detection module new wrinkle adware using stolen certificates disables anti-malware virus protection technical remedies available adware also discovered certain low-cost android devices particularly made small chinese firms running allwinner systems-on-chip even cases adware code embedded deep files stored system boot partitions removal involves extensive complex modifications firmware
[ 3072, 5636, 10245, 10756, 9227, 7694, 9233, 9746, 1046, 6679, 9242, 2075, 8735, 9761, 9256, 9771, 8752, 2611, 4661, 10297, 3643, 7228, 7739, 3135, 1088, 9791, 4165, 2630, 9803, 10323, 6744, 6241, 106, 107, 119, 10872, 4732, 5245, 6786, 57...
None
878
3
SPARCclassic:sparcclassic sparcstation classic workstation introduced sun microsystems november 1992 based sun4m architecture enclosed lunchbox chassis sparcstation classic incorporates single 50 mhz microsparc processor sparcstation classic three banks two dsimm slots official maximum configuration uses 16mb modules first bank also hold 32mb modules giving maximum 128mb memory sparcstation classic hold one internal 3.5-inch 50-pin single ended fast-narrow scsi drive floppy also supports external scsi devices ide/atapi support sparcstation classic comes on-board amd lance ethernet chipset providing 10baset networking standard 10base2 10base5 via aui transceiver openboot rom able boot network using rarp tftp like sparcstation systems ssc holds system information mac address serial number nvram battery chip dies system able boot following operating systems run sparcstation classic sparcstation classic designed entry-level workstation lower price point sparcstation lx lower-end cg3 framebuffer rather lx accelerated cg6 sparcclassic also features 8-bit audio opposed 16-bit audio lx motherboards two systems otherwise similar use chassis july 1993 sun introduced sparcclassic x stripped-down sparcclassic marketed x terminal shipped local storage either 4 8 mb memory rather running solaris sparcclassic x loaded ran special software network sun offered upgrade kit full workstation included hard drive additional memory
[ 9665, 9955, 10436, 10595, 11440, 823, 1788 ]
Test
879
2
Glenda_Schroeder:glenda schroeder glenda schroeder american software engineer noted implementing first command-line user interface shell publishing one earliest research papers describing electronic mail systems working member staff mit computation center 1965 early operating system command-line interfaces implemented part resident monitor programs could easily replaced 1964 mit computation center staff member louis pouzin developed runcom tool executing command scripts allowing argument substitution pouzin coined term shell describe technique using commands like programming language wrote paper describing implement idea multics operating system pouzin returned native france 1965 schroeder developed first multics shell assistance unnamed man general electric schroeder multics shell predecessor unix shell still use today working pat crisman louis pouzin also described early e-mail system called mail allow users compatible time-sharing system ctss mit send notifications others backups files user messages would added local file called mail box would β€œ private ” mode owner could read delete messages proposed uses proto-email system communication ctss notify users files backed discussion authors ctss commands communication command authors ctss manual editor service made possible leave messages users computer idea allow users send messages computers developed later ray tomlinson 1971
[ 8879, 7983, 11442, 6772, 7325 ]
None
880
4
Extended_Access_Control:extended access control extended access control eac set advanced security features electronic passports protects restricts access sensitive personal data contained rfid chip contrast common personal data like bearer ’ photograph names date birth etc protected basic mechanisms sensitive data like fingerprints iris images must protected preventing unauthorized access skimming chip protected eac allow sensitive data read encrypted channel authorized passport inspection system eac introduced icao optional security feature additional basic access control restricting access sensitive biometric data electronic mrtd general idea given chip must contain chip-individual keys must processing capabilities additional key management required however icao leaves actual solution open implementing states several different proposed implementations mechanism must retain backward-compatibility legacy basic access control bac mandatory eu countries european commission described technology used protect fingerprints member states e-passports deadline member states start issuing fingerprint-enabled e-passports set 28 june 2009 specification selected eu e-passports prepared german federal office information security bsi technical report tr-03110 several countries implement eac eac defined eu two requirements chip terminal authentication chip authentication specification defines handheld device cap reader smart card slot decimal keypad display capable displaying least 12 characters chip authentication ca two functions chip authentication add-on basic access control bac protection skimming eavesdropping terminal authentication ta used determine whether inspection system allowed read sensitive data e-passport mechanism based digital certificates come format card verifiable certificates document verifier certificate granted country verification certificate authority cvca certificates domestic foreign document verifiers certificates typically issued medium amounts time half month 3 months cvca generated country typically valid 6 months 3 years
[ 10600, 1501, 10685, 10207 ]
None
881
4
3-subset_meet-in-the-middle_attack:3-subset meet-in-the-middle attack 3-subset meet-in-the-middle hereafter shortened mitm attack variant generic meet-in-the-middle attack used cryptology hash block cipher cryptanalysis 3-subset variant opens possibility apply mitm attacks ciphers trivial divide keybits two independent key-spaces required mitm attack 3-subset variant relaxes restriction key-spaces independent moving intersecting parts keyspaces subset contains keybits common two key-spaces original mitm attack first suggested article diffie hellman 1977 discussed cryptanalytic properties des argued keysize des small reapplying des multiple times different keys could solution key-size however advised using double-des suggested triple-des minimum due mitm attacks double-des susceptible mitm attack des could easily split two subciphers first second des encryption keys independent one another thus allowing basic mitm attack reduces computational complexity formula_1 formula_2 many variations emerged since diffie hellman suggested mitm attacks variations either makes mitm attacks effective allows used situations basic variant 3-subset variant shown bogdanov rechberger 2011 shown use cryptanalysis ciphers lightweight block-cipher family ktantan general mitm attacks attack split two phases key-reducing phase key-verification phase first phase domain key-candidates reduced applying mitm attack second phase found key-candidates tested another plain-/ciphertext pair filter away wrong key key-reducing phase attacked cipher split two subciphers formula_3 formula_4 independent keybits normal mitm attacks instead conform limitation keybits two subciphers independent 3-subset attack allows splitting cipher two subciphers bits allowed used subciphers done splitting key three subsets instead namely carry mitm attack 3 subsets bruteforced individually according procedure key-candidate found key-reducing phase tested another plain-/ciphertext pair done simply seeing encryption plaintext p yields known ciphertext c. usually pairs needed makes 3-subset mitm attack little data complexity following example based attack done rechberger bogdanov ktantan cipher-family naming-conventions used paper also used example attack reduces computational complexity ktantan32 formula_17 formula_18 compared bruteforce attack computational complexity formula_17 2014 still practical break attack thus computationally feasible goes ktantan48 ktantan64 complexities seen end example attack possible due weaknesses exploited ktantan bit-wise key-schedule applicable ktantan32 ktantan48 ktantan64 since variations uses key-schedule applicable related kantan family block-ciphers due variations key-schedule ktantan kantan ktantan lightweight block-cipher meant constrained platforms rfid tags cryptographic primitive aes would either impossible given hardware expensive implement invented canniere dunkelman knezevic 2009 takes block size either 32 48 64 bits encrypts using 80-bit key 254 rounds round utilizes two bits key selected key schedule round key preparation attack weaknesses key schedule ktantan allows 3-subset mitm attack identified since two key-bits used round diffusion key per round small safety lies number rounds due structure key-schedule possible find large number consecutive rounds never utilized certain key-bits precisely authors attack found characteristics key-schedule used staging 3-subset mitm attack able split cipher two blocks independent key-bits parameters attack thus one may notice problem step 1.3 key-reducing phase possible directly compare values formula_11 formula_13 formula_11 calculated end round 111 formula_13 calculated start round 131 mitigated another mitm technique called partial-matching authors found calculating forwards intermediate value formula_11 backwards intermediate value formula_13 round 127 8 bits still unchanged formula_11 formula_13 probability one thus compared part state comparing 8 bits 8 bits round 127 ktantan32 10 bits round 123 47 bits round 131 ktantan48 ktantan64 respectively yields false positives nothing increases complexity attack noticeably ktantan32 requires average 2 pairs find key-candidate due false positives matching part state intermediate values ktantan48 ktantan64 average still requires one plain-/ciphertext pair test find correct key-candidates results taken article rechberger bogdanov best attack ktantan anymore best attack 2011 contributed wei rechberger guo wu wang ling improved upon mitm attack ktantan family arrived computational complexity formula_37 4 chosen plain-/ciphertext pairs using indirect partial-matching splice cut mitm techniques
[ 7556, 2567, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 4389, 10662, 169, 11185, 2357, 10806, 1847, 9528, 2110, 9541, 10315, 6863, 8273, 7635, 212, 9556, 10963, 11349, 2265, 7643, 9697, 8674, 229, 618, 1898, 1654, 7161, 7034, 892 ]
Validation
882
0
TeLQAS:telqas telqas telecommunication literature question answering system experimental question answering system developed answering english questions telecommunications domain telqas includes three main subsystems online subsystem offline subsystem ontology online subsystem answers questions submitted users real time online process telqas processes question using natural language processing component implements part-of-speech tagging simple syntactic parsing online subsystem also utilizes inference engine order carry necessary inference small elements knowledge offline subsystem automatically indexes documents collected focused web crawler web ontology server along api used knowledge representation main concepts classes ontology created domain experts classes however instantiated automatically offline components
[ 113, 11538, 7780, 5399 ]
Test
883
9
Don_Syme:syme syme australian computer scientist principal researcher microsoft research cambridge u.k designer architect f programming language described reporter regarded original new face computer languages since bjarne stroustrup developed c++ early 1980s earlier syme created generics .net common language runtime including initial design generics c programming language along others including andrew kennedy later anders hejlsberg kennedy syme dachuan yu also formalized widely used system holds ph.d. university cambridge member wg2.8 working group functional programming co-author book expert f 3.0 past also worked formal specification interactive proof automated verification proof description languages 2015 honored silver medal royal academy engineering
[ 3876, 1236, 4791, 8057, 8059 ]
Train
884
3
Accra_Declaration:accra declaration accra declaration confirmed support two main healthcare interoperability standards open source community support major open source advocates allowed free unfettered access core healthcare interoperability standards resulted substantial increase usage international healthcare modelling standards development organisation ihmsdo earlier placed intellectual property ip hl7 dicom standards ihe profiles public domain creative commons licence declaration signed may 2015 ihmsdo standards implementation meeting ghana
[ 2948, 11126 ]
None
885
3
The_Battle_For_Midway:battle midway battle midway turn-based strategy video game developed published personal software services first released united kingdom france msx 1984 re-released amstrad cpc commodore 64 zx spectrum 1985 second instalment strategic wargames series game set battle midway pacific ocean theatre world war ii revolves around united states navy attacking large imperial japanese fleet stationed midway atoll retaliation attack pearl harbour game player assumes control american forces must eliminate japanese forces around atoll air naval combat battle midway received largely negative reviews upon release criticised incompatibility black white television sets game accessible limited range colours easy difficulty gameplay also criticised game turn-based strategy focuses naval battles battle midway initiated response japanese attack pearl harbour player commands three american task forces two united states navy forces one united states air force unit stationed midway atoll objective game defeat three attacking imperial japanese naval forces american task force aircraft carrier whereas japanese four player begins game two american search aircraft used locate track attacking japanese forces main attacking japanese force located player must send available air units engage combat air combat takes place real time may take minute travel time launched aircraft carrier aircraft run fuel time crash refuelled carrier game contains elements arcade gameplay automatically enable player comes contact enemy arcade sequences involves player utilising anti-air machine gun order shoot japanese aircraft game ends four japanese aircraft carriers destroyed personal software services founded coventry england gary mays richard cockayne 1981 company known creating games featured historic war battles conflicts theatre europe bismark falklands '82 company partnership french video game developer ere informatique published localised versions products united kingdom 1986 cockayne took decision alter products release 16-bit machines found smaller 8-bit computers zx spectrum lacked processing power larger strategy games decision falsely interpreted pulling spectrum market video game journalist phillipa irving following years successful sales throughout mid 1980s personal software services experienced financial difficulties cockayne admitted retrospective interview took eye ball company acquired mirrorsoft february 1987 later dispossessed company due strains debt upon release battle midway packaged exclusive ring-binder manual detailing nature battle midway later re-released part strategic wargames compilation cassette known conflicts 2 published personal software services game received negative reviews upon release angus ryall crash criticised game incompatibility black white television sets stating despite growing british economy ryall expected developers designed games lowest common denominator gwyn hughes sinclair criticised tactical elements game light stating success player depends dexterity brainpower clare edgely sinclair user praised game historical accuracy however felt late release comparison wargames made battle midway feel ordinary reviewer computer stated game flawed attempt recreate famous battle midway despite admitting contained nice touches reviewer australian commodore review praised game wide range features save load functions however criticised menu designs insufficiently integrated arcade sequences calling poor two reviewers spectrum criticised combat sequences reliance speed pressing keys instead use strategy one reviewer considered game sophisticated however reviewer viewed game slow pace graphics negatively despite criticism ryall praised real time element game accessibility saying battle midway current standards reviewer amstrad action praised game accurate reproduction events different levels speed however criticised easy predictability japanese forces reviewer amtix stated game suffered average graphics poor sound also questioned inclusion arcade sequences reviewer 64 recommended battle midway beginners genre despite stating simple game reviewer commodore horizons called enthralling game
[ 2460, 9006 ]
Validation