node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
986 | 3 | Columns_(video_game):columns video game columns one many samegame/tetris -like tile-matching puzzle games appear great success late 1980s area play enclosed within tall rectangular playing area columns three different symbols differently-colored jewels appear one time top well fall bottom landing either floor top previously-fallen columns column falling player move left right also cycle positions symbols within column lands three symbols connected horizontal vertical diagonal line symbols disappear pile columns settles gravity resettlement causes three symbols align disappear cycle repeats occasionally special column multicolor magic jewel appears destroys jewels color one underneath columns fall faster rate player progresses goal game play long possible well fills jewels ends game players score 99,999 points ports game offer alternate game modes well flash columns involves mining way set number lines get flashing jewel bottom doubles allows two players work together well time trial involves racking many points possible within time limit columns first pack-in game sega game gear version slightly different sega genesis version soundtrack transposed rearranged due limitations handheld sound chip columns updated genesis version overall decoration less like cartoon game gear version instead artistically designed lastly game gear version feature let player change jewels fruit squares dice card shapes clubs diamonds spades many sequels spin-offs produced columns ii voyage time columns iii revenge columns columns '97 1 2 many compilations re-releases columns arcade collection sega ages vol 07 columns well columns made sega versions made available master system genesis sega cd game gear saturn dreamcast additional versions game also made available pc engine game boy advance playstation 2 super famicom version released japan via nintendo power service game boy color version specifically called columns gb osamu tezuka characters featured many characters kimba astroboy also featured slightly less known characters unico november 7 2006 columns released part game sega genesis collection playstation 2 later another release compilation playstation portable december 4 2006 title released nintendo virtual console 800 wii points also included sonic ultimate genesis collection playstation 3 xbox 360 recently game ported ios sega columns also cloned many times across different platforms tokuhiko uwabo composed music columns song clotho named greek moira name related greek flavor game art main songs titled atropos lathesis sic moirai reviewing game appearance sega arcade classics sega cd glenn rubenstein gave b+ describing like tetris bit better mega placed game number 34 top mega drive games time | [
10855,
8937,
3307,
7916,
5677,
8300,
10316,
5011,
10931,
4152,
11231
] | Test |
987 | 9 | Query_language:query language query languages data query languages dqls computer languages used make queries databases information systems broadly query languages classified according whether database query languages information retrieval query languages difference database query language attempts give factual answers factual questions information retrieval query language attempts find documents containing information relevant area inquiry examples include | [
5632,
8201,
6161,
10258,
2068,
6166,
1049,
5658,
8735,
9248,
8742,
10793,
10286,
4656,
11324,
8262,
9286,
72,
2632,
9290,
8788,
10326,
3159,
7767,
11362,
9828,
10340,
8808,
2669,
6775,
2681,
1146,
3196,
2688,
3712,
9345,
10389,
151,
3230,
... | Test |
988 | 4 | Torpig:torpig torpig also known anserin sinowal type botnet spread systems compromised mebroot rootkit variety trojan horses purpose collecting sensitive personal corporate data bank account credit card information targets computers use microsoft windows recruiting network zombies botnet torpig circumvents antivirus software use rootkit technology scans infected system credentials accounts passwords well potentially allowing attackers full access computer also purportedly capable modifying data computer perform man-in-the-browser attacks november 2008 estimated torpig stolen details 500,000 online bank accounts credit debit cards described one advanced pieces crimeware ever created torpig reportedly began development 2005 evolving point effectively evade detection host system antivirus software early 2009 team security researchers university california santa barbara took control botnet ten days time extracted unprecedented amount 70 gb stolen data redirected 1.2 million ips private command control server report goes great detail botnet operates ucsb research team ten-day takeover botnet torpig able retrieve login information 8,310 accounts 410 different institutions 1,660 unique credit debit card numbers victims u.s. 49 italy 12 spain 8 40 countries including cards visa 1,056 mastercard 447 american express 81 maestro 36 discover 24 initially great deal torpig spread attributable phishing emails tricked users installing malicious software sophisticated delivery methods developed since time use malicious banner ads take advantage exploits found outdated versions java adobe acrobat flash shockwave type drive-by download method typically require user click ad download may commence without visible indications malicious ad recognizes old software version redirects browser torpig download site complete installation infected computer master boot record mbr trojan restart computer main stage infection malware upload information computer twenty minutes time including financial data like credit card numbers credentials banking accounts well e-mail accounts windows passwords ftp credentials pop/smtp accounts | [
3072,
10756,
3724,
6797,
3473,
3347,
4883,
2325,
278,
9087,
3867,
9630,
10657,
3620,
2213,
4648,
939,
46,
9909,
10297,
3643,
1979,
444,
7739,
7996,
9664,
9791,
2114,
9154,
7364,
8133,
11583,
10952,
2508,
81,
8789,
10457,
7515,
3807,
8032,... | None |
989 | 9 | Lisp_Machines:lisp machines lisp machines inc. company formed 1979 richard greenblatt mit artificial intelligence laboratory build lisp machines based cambridge massachusetts 1979 lisp machine project mit originated headed greenblatt constructed 30 cadr computers various projects mit russell noftsker formerly administrator mit artificial intelligence lab years previously since started run small company convinced computers based artificial intelligence language lisp bright future commercially number ready customers anxious get machines similar ones seen mit greenblatt noftsker differing ideas structure financing proposed company greenblatt believed company could bootstrapped i.e financed practically scratch order flow customers willing pay advance would mean principals company would retain control noftsker favored conventional venture capital model raising considerable sum money investors control company two negotiated length neither would compromise ensuing discussions choice rent lab two factions february 1979 matters came head greenblatt believed proceeds construction sale machines could profitably reinvested funding company sided noftsker believing commercial venture fund-backed company better chance surviving commercializing lisp machines greenblatt proposed self-sustaining start-up went start symbolics inc. alexander jacobson consultant cdc trying put together ai natural language computer application came greenblatt seeking lisp machine group work eight months greenblatt disastrous conference noftsker yet produce anything alexander jacobson decided way greenblatt going actually start company build lisp machines jacobson needed pushed financially helped greenblatt launch company jacobson pulled together business plans board partner f. stephen wyle greenblatt newfound company named lisp machine inc. lmi funded mostly order flow including cdc orders via jacobson following parable-like story told lmi steven levy used first time 1984 levy account hackers large part based values hackers mit artificial intelligence laboratory among hackers richard stallman levy time called last true hacker noftsker started symbolics able pay salaries n't actually building equipment programmers work bargained patrick winston exchange allowing symbolics staff keep working mit symbolics would let mit use internally freely software symbolics developed unfortunately openness would later lead accusations intellectual property theft late 1970s early 1980s prevent software used competitors computers manufacturers stopped distributing source code began using copyright restrictive software licenses limit prohibit copying redistribution proprietary software existed shift legal characteristics software regarded consequence triggered u.s copyright act 1976 stated mit fellow brewster kahle companies delivered proprietary software richard stallman believed lmi unlike symbolics tried avoid hurting lab stallman proclaimed prospect charging money software crime humanity clarified years later blocking user freedom believes crime act charging copy software symbolics recruited remaining mit hackers including notable hacker bill gosper left ai lab symbolics forced greenblatt also resign ai lab citing mit policies two years mit ai lab 1982 end 1983 stallman singlehandedly duplicated efforts symbolics programmers order prevent gaining monopoly lab computers although lmi able benefit stallman freely available code last hackers lab later programmers would sign non-disclosure agreements share source code technical information software developers lisp machines inc. sold first lisp machines designed mit lmi-cadr series internal battles symbolics began selling cadr mit lab lm-2 symbolics hindered noftsker promise give greenblatt year head start severe delays procuring venture capital symbolics still major advantage none ai lab hackers gone work greenblatt solid 14 signed onto symbolics two ai lab people choose employed either richard stallman marvin minsky symbolics ended producing around 100 lm-2s sold 70,000 companies developed second-generation products based cadr symbolics 3600 lmi-lambda lmi managed sell around 200 3600 shipped year late expanded cadr widening machine word 36-bits expanding address space 28-bits adding hardware accelerate certain common functions implemented microcode cadr lmi-lambda came year 3600 1983 mostly upward compatible cadr source cadr microcode fragments could reassembled improvements instruction fetch hardware differences including use multiplier chip faster logic family cache memory lambda processor cards designed work nubus based engineering workstation originated steve ward group mit separate chain events developed western digital corporation allowed popular lambda 2x2 configuration whereby two machines shared one infrastructure considerable savings texas instruments ti joined fray investing lmi ran money purchasing relocating nubus engineering workstation unit western digital licensing lmi-lambda design later producing variant ti explorer symbolics continued develop 3600 family operating system genera produced ivory vlsi chip implementation symbolics architecture texas instruments shrunk explorer silicon explorer ii later microexplorer lmi abandoned cadr architecture developed k-machine lmi went bankrupt 1987 machine could brought market lmi reincarnated gigamos systems greenblatt one officers gigamos ownership canadian backer named guy montpetit bought assets lmi chapter 11 bankruptcy reorganization prior incorporation gigamos lmi developed new lisp machine called k-machine used risc-like architecture montpetit subsequently became embroiled 1989 canadian political scandal side-effect resulted seizure assets gigamos rendering company unable meet payroll according richard stallman dispute lmi symbolics inspired stallman start software development gnu operating system january 1984 free software foundation fsf october 1985 forerunners open-source-software movement gnu/linux operating system | [
4992,
2179,
7267,
7173,
6502,
7048,
7880,
5519,
80,
5360,
242,
7983,
10104,
4981,
9686,
823,
504,
377
] | Test |
990 | 7 | Apache_CarbonData:apache carbondata apache carbondata free open-source column-oriented data storage format apache hadoop ecosystem similar columnar-storage file formats available hadoop namely rcfile orc compatible data processing frameworks hadoop environment provides efficient data compression encoding schemes enhanced performance handle complex data bulk carbondata first developed huawei 2013 project submitted apache incubator june 2016 first official release two months later project top honors blackduck 2016 open source rookies year big data category since may 1 2017 apache carbondata top-level apache software foundation asf -sponsored project | [
10377,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
6943,
3877,
10661,
11303,
1327,
7983,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
7767,
8408,
9179,
7261,
... | None |
991 | 4 | William_Eldridge_Odom:william eldridge odom william eldridge odom june 23 1932 – may 30 2008 united states army lieutenant general served director national security agency president ronald reagan culminated 31-year career military intelligence mainly specializing matters relating soviet union retirement military became think tank policy expert university professor became known outspoken criticism iraq war warrantless wiretapping american citizens died apparent heart attack vacation home lincoln vermont early military career observed soviet military activities serving military liaison potsdam germany later taught courses russian history west point new york serving united states embassy moscow early 1970s visited republics union soviet socialist republics although constantly trailed kgb nonetheless managed smuggle large portion alexander solzhenitsyn archive including author membership card writers union second world war military citations solzhenitsyn subsequently paid tribute odom role memoir invisible allies 1995 upon returning united states resumed career west point taught courses soviet politics odom regularly stressed importance education military officers 1977 appointed military assistant zbigniew brzezinski hawkish assistant national security affairs president jimmy carter among primary issues focused american-soviet relations including salt nuclear weapons talks soviet invasion afghanistan iran hostage crisis presidential directives situation persian gulf terrorism hijackings executive order telecommunications policy 2 november 1981 12 may 1985 odom served army assistant chief staff intelligence 1985 1988 served director national security agency united states largest intelligence agency president ronald reagan odom senior fellow hudson institute specialized military issues intelligence international relations also adjunct professor yale university georgetown university taught seminar courses u.s. national security policy russian politics earned national reputation expert soviet military since 2005 argued u.s. interests would best served immediate withdrawal iraq called 2003 invasion worst strategic blunder history u.s. foreign policy also critical nsa warrantless wiretapping international calls said would n't happened watch odom also openly critical neocon influence decision go war pretty hard imagine us going iraq without strong lobbying efforts aipac nowiki /nowiki american israel public affairs committee nowiki /nowiki neocons think know good israel israel knows odom member military intelligence hall fame also member advisory council victims communism memorial foundation also published newspaper op-ed pieces new york times wall street journal washington post others | [
6017,
8726,
1189,
9517,
1838,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
7137,
3305,
7145,
2419,
6005,
6136,
766
] | None |
992 | 9 | Mobile_3D_Graphics_API:mobile 3d graphics api mobile 3d graphics api commonly referred m3g specification defining api writing java programs produce 3d computer graphics extends capabilities java version java platform tailored embedded devices mobile phones pdas object-oriented interface consists 30 classes used draw complex animated three-dimensional scenes m3g developed java community process jsr 184. current version m3g 1.1 version 2.0 development jsr 297 m3g designed meet specific needs mobile devices constricted terms memory processing power often lack fpu graphics hardware gpu api architecture allows implemented completely inside software take advantage hardware present device m3g provides two ways developers draw 3d graphics immediate mode retained mode immediate mode graphics commands issued directly graphics pipeline rendering engine executes immediately using method developer must write code specifically tells rendering engine draw animation frame camera set lights also associated scene necessarily part immediate mode possible display single objects well entire scenes worlds camera lights background parts scene retained mode always uses scene graph links geometric objects 3d world tree structure also specifies camera lights background higher-level information object—such geometric structure position appearance—is retained frame frame m3g standard also specifies file format 3d model data including animation data allows developers create content pcs loaded m3g mobile devices | [
4960,
10658,
3561,
5677,
9011,
1461,
2556
] | Test |
993 | 9 | Metadata_facility_for_Java:metadata facility java metadata facility java specification java defines api annotating fields methods classes particular attributes indicate processed specific ways development tools deployment tools run-time libraries specification developed java community process jsr 175 released part j2se 5.0 tiger | [
4960,
8262,
3562,
6860,
5677,
2804,
2556,
11582
] | None |
994 | 3 | Binary_Land:binary land famicom version 99 levels ending screen implemented game famicom version game players unite two penguins gurin male malon female love msx version features human boy human girl gameplay remains identical famicom version players control malon gurin simultaneously timer adding difficulty penguins move mirror images game features many different stages completing 17th stage players start stage 1 je te veux erik satie background music game levels upon uniting two penguins beethoven ode joy played top-down view utilized game similar method used adventures lolo standing way spiders birds creatures player must attack penguins spray cobwebs occupy cells playing field possibly slowing player long enough spider kill either gurin malon level arranged 10-by-15 grid vertical wall separating two penguins upper central cell free characters reach free cell always holds caged heart required complete level row walls surrounding player maze-like environment order make challenges difficult unbalanced offer different experience gurin malon gurin malon become trapped cobweb helpless player navigates maze crosses free cell enters penguin side maze free web spraycan player reach high enough score player asked put name list five highest scores session binary land unofficially translated chinese qì é xiānshēng màoxiǎn zhī lǚ another unofficial version translates final fantasy experience chocobos levels translated one early final fantasy dungeons | [
10931,
9006
] | None |
995 | 3 | Memory_dependence_prediction:memory dependence prediction memory dependence prediction technique employed high-performance out-of-order execution microprocessors execute memory access operations loads stores program order predict true dependencies loads stores instruction execution time predicted dependence information processor decide speculatively execute certain loads stores order preventing loads stores executing out-of-order keeping in-order later pipeline memory disambiguation techniques used determine loads stores correctly executed recover using memory dependence predictor keep dependent loads stores order processor gains benefits aggressive out-of-order load/store execution avoids many memory dependence violations occur loads stores incorrectly executed increases performance reduces number pipeline flushes required recover memory dependence violations see memory disambiguation article information memory dependencies memory dependence violations recovery general memory dependence prediction predicts whether two memory operations dependent interact accessing memory location besides using store load raw true memory dependence prediction out-of-order scheduling loads stores applications memory dependence prediction proposed see example memory dependence prediction optimization top memory dependence speculation sequential execution semantics imply stores loads appear execute order specified program however out-of-order execution instructions may possible execute two memory operations different order implied program possible two operations independent memory dependence speculation load may allowed execute store precedes speculation succeeds load independent store two instructions access different memory locations speculation fails load dependent upon store two accesses overlap memory first modern out-of-order designs memory speculation used benefits limited αs scope out-of-order execution increased tens instructions naive memory dependence speculation used naive memory dependence speculation load allowed bypass preceding store form speculation important weight benefits correct speculation penalty paid incorrect speculation scope out-of-order execution increases several tens instructions performance benefits naive speculation decrease retain benefits aggressive memory dependence speculation avoiding costs mispeculation several predictors proposed selective memory dependence prediction stalls specific loads certain violation may occur explicitly predict dependencies predictor may delay loads longer necessary hence result suboptimal performance fact cases performs worse naively speculating loads early possible often faster mispeculate recover wait preceding stores execute exact memory dependence prediction developed university wisconsin–madison specifically dynamic speculation synchronization delays loads long necessary predicting exact store load wait predictor predicts exact dependences store load pair synonym predictor groups together dependences share common load store instruction store sets predictor represents multiple potential dependences efficiently grouping together possible stores load may dependent upon store barrier predictor treats certain store instructions barriers subsequent load store operations allowed bypass specific store store barrier predictor explicitly predict dependencies predictor may unnecessarily delay subsequent yet independent loads memory dependence prediction applications beyond scheduling loads stores example speculative memory cloaking speculative memory bypassing use memory dependence prediction streamline communication values memory memory dependence prediction loads stores analogous branch prediction conditional branch instructions branch prediction branch predictor predicts way branch resolve known processor speculatively fetch execute instructions one paths branch later branch instruction executes determined branch instruction correctly predicted branch misprediction pipeline flush necessary throw away instructions speculatively fetched executed branch prediction thought two step process first predictor determines direction branch taken binary decision predictor determines actual target address similarly memory dependence prediction thought two step process first predictor determines whether dependence determines dependence | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
6181,
8231,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
604,
1122,
3175,
8815,
630,
8822,
6268,
3197,
7313,
6815,
8352,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
9911,
8890,
4286,
2241... | Validation |
996 | 9 | APT_(programming_language):apt programming language apt automatically programmed tool high-level computer programming language commonly used generate instructions numerically controlled machine tools douglas t. ross considered many father apt head newly created computer applications group servomechanisms laboratory mit 1956 led technical effort apt language system makes numerically controlled manufacturing possible early language used widely 1970s still standard internationally derivatives apt later developed apt used program numerically-controlled machine tools create complex parts using cutting tool moving space used calculate path tool must follow generate desired form apt special-purpose language predecessor modern cam systems created refined late 1950s early 1960s simplify task calculating geometry points tool must traverse space cut complex parts required aerospace industry direct result new numerical control technology becoming available time daunting task machinist engineer faced calculating movements machine complex parts capable development centered mit labs hosted numerical control milling machine projects apt also air force sponsored notable world first major cooperative programming venture combining government agencies universities 14-company team organized within aircraft industries association aerospace ind assoc. apt created graphical interfaces available relies text specify geometry toolpaths needed machine part original version created even fortran available first ansi standard later versions rewritten fortran u. s. government funded project apt placed public domain apt shares many similarities computer programming languages fortran general-purpose computer language takes source text converts statements instructions processed internally computer apt converts source statements programs driving numerically-controlled machine tools output apt processor may cl cutter location file run post-processor specific desired control machine pair resulting file run control machine generate tool motions machine actions commonly file form rs-274 format instructions commonly known g-code derivatives apt developed initially mainly allow programs run minicomputers instead mainframes included adapt ibm exapt germany uniapt initially united computing later used alongside unigraphics cadcam systems machine tool makers systems utilize elements apt day standards developers like step-nc took toolpath curves apt sources apt formed basis two early programming languages robotics rapt robot apt developed university edinburgh school informatics robex derivative exapt | [
4121,
10458,
4916
] | None |
997 | 7 | Cloud_Security_Alliance:cloud security alliance cloud security alliance csa not-for-profit organization mission “ promote use best practices providing security assurance within cloud computing provide education uses cloud computing help secure forms computing. ” csa 80,000 individual members worldwide csa gained significant reputability 2011 american presidential administration selected csa summit venue announcing federal government ’ cloud computing strategy csa formed december 2008 coalition individuals saw need provide objective enterprise user guidance adoption use cloud computing initial work product security guidance critical areas focus cloud computing put together wiki-style dozens volunteers 2014 chairman board csa dave cullinane vp global security privacy catalina marketing st petersburg florida former ciso ebay cullinane said application exposed internet allow people make money probed 2009 cloud security alliance incorporated nevada corporation achieved us federal 501 c 6 non-profit status registered foreign non-profit corporation washington csa works support number global policy makers focus cloud security initiatives including national institute standards technology nist european commission singapore government various data protection authorities march 2012 csa selected partner three europe ’ largest research centers cern embl esa launch helix nebula – science cloud cloud security alliance employs roughly sixty full-time contract staff worldwide several thousand active volunteers participating research working groups chapters time according csa member-driven organization chartered promoting use best practices providing security assurance within cloud computing providing education uses cloud computing help secure forms computing individuals interested cloud computing experience assist making secure receive complimentary individual membership based minimum level participation cloud security alliance network chapters worldwide chapters separate legal entities cloud security alliance operate within guidelines set cloud security alliance united states chapters may elect benefit non-profit tax shield cloud security alliance chapters encouraged hold local meetings participate areas research chapter activities coordinated cloud security alliance worldwide separate legal entities europe asia pacific called cloud security alliance europe scottish company united kingdom cloud security alliance asia pacific ltd singapore legal entity responsible overseeing cloud security alliance-related activities respective regions legal entities operate agreement cloud security alliance give oversight power separate boards directors companies limited guarantee managing directors members executive team cloud security alliance cloud security alliance 25+ active working groups key areas research include cloud standards certification education training guidance tools global reach driving innovation | [
6945,
774,
6344,
7600,
433,
1907,
3190,
11159,
7352
] | Test |
998 | 2 | List_of_products_based_on_FreeBSD:list products based freebsd many products based freebsd information products version freebsd based often difficult come since fact widely publicised | [
7552,
7425,
10202,
2180,
1400,
2564,
1927,
1801,
7561,
10761,
274,
8467,
9625,
1946,
4636,
11506,
2212,
6438,
10535,
684,
4908,
1071,
3248,
9009,
11698,
11573,
1718,
9784,
1465,
5177,
5819,
9277,
3006,
704,
3520,
11459,
3652,
9927,
6858,
... | Test |
999 | 4 | National_Information_Assurance_Training_and_Education_Center:national information assurance training education center national information assurance training education center niatec american consortium academic industry government organizations improve literacy awareness training education standards information assurance serves develop professionals ia expertise various disciplines ultimately contributes protection national information infrastructure niatec associated idaho state university national security agency center academic excellence information assurance education centers academic excellence niatec components plan establish federal cyber-corps defend cyber-based disruption attacks niatec active development training standards associated national institute standards technology special publication 800-16 committee national security systems instructions 4011 4012 4013 4014 4015 4016 dr. corey schou director niatec dr. james frost associate director group subscribes isc ² code ethics | [
3552,
612,
5636,
8613,
7528,
11567,
2558
] | Test |
1,000 | 3 | Skylake_(microarchitecture):skylake microarchitecture skylake codename used intel processor microarchitecture launched august 2015 succeeding broadwell microarchitecture skylake microarchitecture redesign using 14 nm manufacturing process technology predecessor serving tock intel tick–tock manufacturing design model according intel redesign brings greater cpu gpu performance reduced power consumption skylake cpus share microarchitecture kaby lake coffee lake cannon lake cpus skylake last intel platform windows earlier windows 10 officially supported microsoft although enthusiast-created modifications exist allow windows 8.1 earlier continue receive updates later platforms processors based skylake microarchitecture marketed 6th-generation core intel officially end life discontinued skylake lga 1151 cpus march 4 2019 skylake development processors banias dothan conroe sandy bridge ivy bridge primarily undertaken intel israel engineering research center haifa israel haifa development team worked project four years faced many challenges re-writing microarchitecture developing new concepts speed shift technology created processor 4.5 w 45 w mobile devices 91 w desktop devices skylake processors used power wide range devices fanless laptops way desktops skylake features companies able release laptop pcs half thick half heavy five years ago according intel september 2014 intel announced skylake microarchitecture intel developer forum san francisco volume shipments skylake cpus scheduled second half 2015 also skylake development platform announced available q1 2015 announcement intel also demonstrated two computers desktop mobile skylake prototypes first desktop testbed system running latest version 3dmark second computer fully functional laptop playing 4k video initial batch skylake cpu models 6600k 6700k announced immediate availability gamescom august 5 2015 unusually soon release predecessor broadwell suffered launch delays intel acknowledged 2014 moving 22 nm haswell 14 nm broadwell difficult process develop yet causing broadwell planned launch slip several months yet 14 nm production back track full production q3 2014 industry observers initially believed issues affecting broadwell would also cause skylake slip 2016 intel able bring forward skylake release shorten broadwell release cycle instead result broadwell architecture unusually short run officially intel supported overclocking k x versions skylake processors however later discovered non-k chips could overclocked modifying base clock value – process made feasible base clock applying cpu ram integrated graphics skylake beta uefi firmware updates motherboard vendors asrock prominently promoted name sky oc allowed base clock modified manner february 2016 however asrock firmware update removed feature february 9 2016 intel announced would longer allow overclocking non-k processors issued cpu microcode update removes function april 2016 asrock started selling motherboards allow overclocking unsupported cpus using external clock generator january 2016 microsoft announced would end support windows 7 windows 8.1 skylake processors effective july 17 2017 date critical updates two operating systems would released skylake users judged affect reliability os older hardware windows 10 would microsoft windows platform officially supported skylake well future intel cpu microarchitectures beginning skylake successor kaby lake terry myerson stated microsoft make large investment order reliably support skylake older versions windows future generations processors would require investments microsoft also stated due age platform would challenging newer hardware firmware device driver combinations properly run windows 7 march 18 2016 response criticism move primarily enterprise customers microsoft announced revisions support policy changing cutoff support non-critical updates july 17 2018 stating skylake users would receive critical security updates windows 7 8.1 end extended support august 2016 citing strong partnership oem partners intel microsoft stated would continue fully support 7 8.1 skylake end respective lifecycles addition enthusiast-created modification released disabled windows update check allowed windows 8.1 earlier continue updated later platforms linux kernel 4.10 skylake mobile power management reasonably good shape package c states supported seeing use case cause likely bugs system firmware particular computer might resolved updating bios user easily optimize power management beyond linux default settings powertop utility use lennart poettering systemd powertop provides service start computer auto-tune various settings reduce power usage linux 4.11 enables frame-buffer compression integrated graphics chipset default lowers power consumption battery runtime similar windows 10 possibly better improvements still made skylake fully supported openbsd 6.2 later including accelerated graphics like predecessor broadwell skylake available five variants identified suffixes skl-s x skl-x h skl-h u skl-u skl-y skl-s skl-x contain overclockable k x variants unlocked multipliers h u variants manufactured ball grid array bga packaging x variants manufactured land grid array lga packaging using new socket lga 1151 lga 2066 skylake x skylake used conjunction intel 100 series chipsets also known sunrise point major changes haswell skylake architectures include removal fully integrated voltage regulator fivr introduced haswell variants use discrete platform controller hub pch direct media interface dmi 2.0 replaced dmi 3.0 allows speeds 8 gt/s skylake u variants support one dimm slot per channel h variants support two dimm slots per channel skylake launch sales lifespan occur time ongoing sdram market transition ddr3 sdram memory gradually replaced ddr4 memory rather working exclusively ddr4 skylake microarchitecture remains backward compatible interoperating types memory accompanying microarchitecture support memory standards new so-dimm type capable carrying either ddr3 ddr4 memory chips called unidimm also announced skylake p variants reduced on-die graphics unit 12 execution units enabled instead 24 execution units direct counterparts see table contrast ivy bridge cpus p suffix used cpus completely disabled on-die video chipset enhancements include thunderbolt 3.0 sata express iris pro graphics direct3d feature level 12_1 128 mb l4 edram cache certain skus skylake line processors retires vga support supporting five monitors connected via hdmi 1.4 displayport 1.2 embedded displayport edp interfaces hdmi 2.0 4k 60 hz supported motherboards equipped intel ’ alpine ridge thunderbolt controller skylake instruction set changes include intel mpx memory protection extensions intel sgx software guard extensions future xeon variants also advanced vector extensions 3.2 avx-512f skylake-based laptops may use wireless technology called rezence charging wireless technologies communication peripherals many major pc vendors agreed use technology skylake-based laptops released end 2015 integrated gpu skylake variant supports windows directx 12 feature level 12_1 opengl 4.6 latest windows 10 driver update opengl 4.5 linux opencl 2.0 standards well modern hardware video encoding/decoding formats vp9 gpu accelerated decode vp8 hevc hardware accelerated 8-bit encode/decode gpu accelerated 10-bit decode intel also released unlocked capable overclocking mobile skylake cpus unlike previous generations skylake-based xeon e3 longer works desktop chipset supports socket requires either c232 c236 chipset operate short loops specific combination instruction use may cause unpredictable system behavior cpus hyperthreading microcode update issued fix issue skylake vulnerable spectre attacks fact vulnerable processors uses indirect branch speculation indirect branches also return prediction stack underflows pause latency increased dramatically cause issues older programs libraries using pause instructions skylake processors produced five main families u h x multiple configurations available within family common features mainstream desktop skylake cpus common features high performance skylake-x cpus see also server mobile mobile workstation processors e3 series server chips consist system bus 9 gt/s max memory bandwidth 34.1 gb/s dual channel memory unlike predecessor skylake xeon cpus require either c232 c236 chipset operate | [
7173,
4108,
9741,
5649,
2088,
1085,
2638,
597,
1119,
1122,
613,
7783,
4204,
8820,
630,
4217,
8325,
6797,
7313,
8851,
6804,
9391,
4276,
2237,
5309,
6339,
5844,
11487,
1260,
5356,
4334,
5871,
3317,
5883,
5380,
2821,
5386,
4886,
3352,
9500,
... | Test |
1,001 | 8 | Amazon_Mechanical_Turk:amazon mechanical turk amazon mechanical turk mturk crowdsourcing website businesses known requesters hire remotely located crowdworkers perform discrete on-demand tasks computers currently unable operated amazon web services owned amazon employers post jobs known human intelligence tasks hits identifying specific content image video writing product descriptions answering questions among others workers colloquially known turkers crowdworkers browse among existing jobs complete exchange rate set employer place jobs requesting programs use open application programming interface api limited mturk requester site april 2019 requesters could register 49 approved countries service initially conceived venky harinarayan us patent filed 2001 amazon coined term artificial artificial intelligence processes outsourcing parts computer program humans tasks carried much faster humans computers claimed jeff bezos responsible concept led amazon mechanical turk developed realize process name mechanical turk inspired turk 18th-century chess-playing automaton made wolfgang von kempelen toured europe beating napoleon bonaparte benjamin franklin later revealed machine automaton fact human chess master hidden cabinet beneath board controlling movements humanoid dummy likewise mechanical turk online service uses remote human labour hidden behind computer interface help employers perform tasks possible using true machine mturk launched publicly november 2 2005 following launch mechanical turk user base grew quickly early- mid-november 2005 tens thousands jobs uploaded system amazon internal tasks required human intelligence hit types expanded include transcribing rating image tagging surveys writing march 2007 reportedly 100,000 workers 100 countries increased 500,000 registered workers 190 countries january 2011 year techlist published interactive map pinpointing locations 50,000 mturk workers around world 2018 research demonstrated 100,000 workers available platform time around 2000 actively working user mechanical turk either worker contractor requester employer workers access dashboard displays three sections total earnings hit status hit totals workers set hours obligation accept particular task workers paid contractors rather employees n't file forms pay payroll taxes however benefit laws stipulating conditions regarding minimum wage overtime workers compensation workers must report income self-employment income average wage multiple microtasks assigned performed quickly one dollar hour task averaging cents workers postal address anywhere world payment completing tasks redeemed amazon.com via gift certificate gift certificates payment option available international workers apart india later transferred worker u.s. bank account requesters ask workers fulfill qualifications engaging task set test order verify qualification also accept reject result sent worker affects worker reputation april 2019 requesters paid amazon minimum 20 commission price successfully completed jobs increased amounts additional services requesters use amazon mechanical turk api programmatically integrate results work directly business processes systems employers set job must specify well specific details job want completed workers primarily located united states since platform inception demographics generally similar overall internet population us 2010 cash payments indian workers introduced gave new updated results demographics workers remained primarily within united states researcher behind statistics runs website showing worker demographics updated hourly may 2015 showed 80 workers located united states remaining 20 located elsewhere world india may 2019 showed approximately 60 workers located united states 40 located elsewhere world approximately 30 india since 2007 service used search prominent missing individuals first suggested search james kim body found technical progress made summer computer scientist jim gray disappeared yacht amazon werner vogels personal friend made arrangements digitalglobe provides satellite data google maps google earth put recent photography farallon islands mechanical turk front-page story digg attracted 12,000 searchers worked imaging professionals data search unsuccessful september 2007 similar arrangement repeated search aviator steve fossett satellite data divided 85 squared meter sections mechanical turk users asked flag images foreign objects might crash site evidence examined closely search also unsuccessful satellite imagery mostly within 50-mile radius crash site eventually found hikers year later 65 miles away beginning 2010 numerous researchers explored viability mechanical turk recruit subjects social science experiments thousands papers rely data collected mechanical turk workers published year including hundreds top ranked academic journals researchers generally found samples respondents obtained mechanical turk perfectly match relevant characteristics u.s. population 're wildly misrepresentative either general consensus among researchers service works best recruiting diverse sample less successful studies require precisely defined populations require representative sample population whole however concerns proprietary selection algorithm may prejudice results see research validity overall u.s. mturk population mostly female white somewhat younger educated u.s. population overall data collected jobs conducted since 2013 show u.s. population longer predominantly female workers currently slightly likely male cost mturk considerably lower means conducting surveys workers willing complete tasks less half u.s. minimum wage addition receiving growing interest social sciences mturk also used tool artistic creation one first artists work mechanical turk xtine burrough mechanical olympics 2008 endless om 2015 mediations digital labor another early work artist aaron koblin ten thousand cents 2008 supervised machine learning algorithms require large amounts human-annotated data trained successfully machine learning researchers hired workers mechanical turk produce datasets squad question answering dataset programmers developed various browser extensions scripts designed simplify process completing jobs amazon stated disapprove scripts completely automate process preclude human element concern task completion process e.g answering survey could gamed random responses resultant collected data could worthless accounts using so-called automated bots banned services extend capabilities mturk amazon makes available application programming interface api give users another access point mturk system mturk api lets programmer access numerous aspects mturk like submitting jobs retrieving completed work approving rejecting work 2017 amazon launched support aws software development kits sdk allowing nine new sdks available mturk users mturk accessible via api following languages python javascript java .net go ruby php c++ web sites web services use api integrate mturk work web applications providing users alternatives interface amazon built functions amazon mechanical turk provides platform processing images task well-suited human intelligence requesters created tasks asking workers label objects found image select relevant picture group pictures screen inappropriate content classify objects satellite images also crowdworkers completed tasks digitizing text images scanned forms filled hand companies large online catalogues use mechanical turk identify duplicates verify details item entries examples fixing duplicates identifying removing duplicates yellow pages directory listings online product catalog entries examples verifying details include checking restaurant details e.g phone number hours finding contact information web pages e.g author name email diversification scale personnel mechanical turk allow collecting amount information would difficult outside crowd platform mechanical turk allows requesters amass large number responses various types surveys basic demographics academic research uses include writing comments descriptions blog entries websites searching data elements specific fields large government legal documents companies use mechanical turk crowd labor understand respond different types data common uses include editing transcription podcasts translation matching search engine results validity research conducted mechanical turk worker pool questioned large part due proprietary method mechanical turk uses select workers since method selection shared researchers researchers know true demographics pool participants unclear whether mechanical turk uses fiscal political educational limiters selection process may invalidate surveys research done using mechanical turk worker pool mechanical turk widely criticized interactions use labour computer scientist jaron lanier notes design mechanical turk allows think people software components conjures sense magic pluck results cloud incredibly low cost survey done researchers university texas showed surveyed workers motivated enjoyment self-fulfillment. results may prejudiced mturk worker selection algorithms 2016 pew research study found quarter online gig workers like work mechanical turk limited employment opportunities live tasks typically simple repetitive users paid often cents complete criticized mechanical turk exploiting compensating workers true value task complete minimum payment amazon allows task one cent market tasks competitive tasks available form employment particularly less educated need provide lack opportunities many workers accept low compensation completion tasks study 3.8 million tasks completed 2,767 workers amazon mechanical turk showed “ workers earned median hourly wage 2 hour ” 4 percent workers earning 7.25 per hour since workers considered independent contractors protected fair labor standards act guarantees minimum wage 2018 increasing number workers competing site reduced total amount work available workers search tasks receive compensation receive additional compensation task takes longer estimated requester nation magazine said 2014 requesters taken advantage workers tasks rejecting submissions order avoid paying facebook–cambridge analytica data scandal mechanical turk one means covertly gathering private information massive database system paid persons dollar two install facebook connected app answer personal questions survey task work hire used demographic psychological research project might seemed purpose instead bait worker reveal personal information worker identity already collected facebook mechanical turk others criticized marketplace ability workers negotiate employers response growing criticisms payment evasion lack representation group developed third party platform called turkopticon allows workers give feedback employers allowing users avoid potentially shady jobs recommend superior employers another platform called dynamo created allow workers collect anonymously organize campaigns better work environment including guidelines academic requesters dear jeff bezos campaign amazon made harder workers enroll dynamo closing request account provided workers required code dynamo membership amazon installed updates prevent plugins identify high quality human intelligence tasks functioning website additionally worker complaints amazon payment system occasion stop working major issue workers requiring daily payments mturk comparable respects discontinued google answers service however mechanical turk general marketplace potentially help distribute kind work tasks world collaborative human interpreter chi philipp lenssen also suggested using distributed human intelligence help computer programs perform tasks computers well mturk could used execution engine chi russian search giant yandex developed similar system called yandex.toloka | [
8962,
8451,
519,
6027,
4236,
10893,
911,
1935,
4623,
8592,
2965,
8983,
2328,
4377,
8986,
2588,
5660,
10525,
11038,
6307,
11556,
9766,
5159,
2217,
6444,
8495,
3121,
9780,
7352,
10681,
2496,
4289,
11201,
1224,
5960,
8520,
10185,
4429,
590,
... | None |
1,002 | 3 | Rollerball_(video_game):rollerball video game pinball machine rendered rollerball composed four screens proportion would long two standard pinball tables real table graphics two four screens based various aspects new york city skyline topmost screen hereafter called bonus screen merely shows clouds blimp second screen main screen shows top empire state building third screen intermediate shows lower skyline statue liberty lowest final screen shows blue backdrop representing ocean main mode player launches ball directly main screen top small loop marked slot player sends ball loop slot machine display center screen cycles various penalties rewards given one three symbols eggplant pair cherries bell appears three times center slot loop open allowing player enter bonus screen pair kickback holes upper left main screen bumper proximity upper one lower one shoot ball straight relying curvature wall direct upper hole player lucky ball falls upper hole one two things happen kickback slot bonus screen empty ball transferred slot another ball released plunger enter play kickback slot already filled ball relaunched lower hole intermediate screen viable way returning main screen kickback hole upper left screen initially fires main screen entered switches directions every time used player gets three cherries main screen slot hole always shoot ball upwards otherwise chances score screen desirable place ball three sets three drop targets set three slots game begins light letter lit first slot one set three drop targets chosen marked flashing green light additionally bonus tally screen begins 3,000 points completing set drop targets increases bonus tally sending ball slot light lit one move light flipping flippers adds current tally player score lower screen however least desirable place ball officially drained screen however options still available player bonus screen player must shoot ball seven sensors letters phrase sky high written random forced order player must shoot ball flashing letter light activate passing non-flashing already activated letters effect done ball placed kickback hole top screen letters turn bumpers must hit numerous times remove start bonus game successfully finishing bonus gives player large sum points well extra ball first time completed increase bonus multiplier completion two sets four targets similar drop targets top corners bonus screen activated upper left targets labeled raise saver place stopper gap left wall left flipper apparatus upper right targets labeled open gate open kickback slot lower right corner locking ball kickback slot send ball play part two-ball multiball event bonus game enabled slot opened ball already locked locked ball kick entering ball back play ball passes flippers lower screen either side flippers drained end-of-ball bonus calculated tally current bonus kept gameplay shown lower screen bonus starts 1,000 points increased intervals 1,000 points play upon draining ball bonus counted 0 points added player score represent increase bonus multiplier count repeated bonus multiplier increased finishing bonus game receiving three cherries three bells main screen slot machine game ends three balls addition extra balls bonus screen drained typical final score around 300,000 points scoring 1,000,000 points enables credits final ball drained alternate mode two-player game called match play mode much smaller table one screen tall houses number buttons switches lower score player side various amounts four sensors middle table switch scores two players whenever become lit slot machine spun buttons outer walls bonus enacted hitting button top wall first player lose points loses two animals middle player area show emotion ecstasy sadness neutral indifference depending player score score margin two players japanese version left player animal elephant right player giraffe english version giraffe changed donkey likely reference republican democratic u.s. political parties | [
10931,
9006
] | Test |
1,003 | 3 | Stardust_(1987_video_game):stardust 1987 video game stardust top-scrolling shoot 'em developed spanish studio topo soft released uk kixx 1987 zx spectrum full version included sinclair user covertape 1991 also released amstrad cpc dos msx title screen included music composed pablo toledo music later re-used game bronx player controls small space ship called astrohunter flies surface series large enemy supercruisers way attack earth player must avoid destroy various ground targets free-flying drones order eventually reach array shield generators ship equipped gun improved collecting power-ups second weapon targets objects ground supercruisers passed astrohunter lands enemy starship pilot continues foot reach shield generators destroying generators pilot must returned ship escape | [
9006
] | Train |
1,004 | 7 | Twelve-Factor_App_methodology:twelve-factor app methodology twelve-factor app methodology methodology building software service applications best practices designed enable applications built portability resilience deployed web methodology drafted developers heroku first presented adam wiggins circa 2011 number commentators argued relevance twelve-factor app concept limited heroku twelve factors however cited baseline adapt extend since least 2014 guidelines least one open source project refer developers twelve factor app methodology principles good app design | [
1952,
4802,
467,
8495
] | None |
1,005 | 3 | Athlon:athlon athlon brand name applied series x86-compatible microprocessors designed manufactured advanced micro devices amd original athlon called athlon classic first seventh-generation x86 processor first desktop processor reach speeds one gigahertz ghz made debut june 23 1999 amd continued using athlon name 64-bit athlon 64 architecture athlon ii accelerated processing unit apu chips targeting socket am1 desktop soc architecture socket am4 zen microarchitecture athlon comes ancient greek athlon meaning sport contest prize contest place contest arena amd founder then-ceo jerry sanders aggressively pursued strategic partnerships engineering talent late 1990s build earlier successes pc market amd k6 line processors one major partnership announced 1998 paired amd semiconductor giant motorola co-develop copper-based semiconductor technology resulted k7 project first commercial processor utilize copper fabrication technology announcement sanders referred partnership creating virtual gorilla would enable amd compete intel fabrication capacity limiting amd financial outlay new facilities k7 design team led dirk meyer worked lead engineer dec multiple alpha microprocessors employment dec dec sold compaq 1998 company discontinued alpha processor development sanders approached many alpha engineering staff compaq/dec wound semiconductor business able bring nearly alpha design team k7 engineering design team thus consisted previously acquired nexgen k6 team already including engineers vinod dham nearly complete alpha design team august 1999 amd released athlon k7 processor working motorola amd able refine copper interconnect manufacturing production stage one year intel revised process permitted 180-nanometer processor production accompanying die-shrink resulted lower power consumption permitting amd increase athlon clock speeds 1 ghz range yields new process exceeded expectations permitting amd deliver high speed chips volume march 2000 athlon architecture also used ev6 bus licensed dec main system bus intel required licensing use gtl+ bus used slot 1 pentium ii later processors licensing ev6 bus used alpha line processors dec amd able develop chipsets motherboards avoid dependent licensing direct competitor internally athlon fully seventh generation x86 processor first kind like amd k5 k6 athlon dynamically buffers internal micro-instructions runtime resulting parallel x86 instruction decoding cpu out-of-order design like previous post-5x86 amd cpus athlon utilizes alpha 21264 ev6 bus architecture double data rate ddr technology means 100 mhz athlon front side bus actually transfers rate similar 200 mhz single data rate bus referred 200 mt/s superior method used intel pentium iii sdr bus speeds 100 mhz 133 mhz amd designed cpu robust x86 instruction decoding capabilities k6 enhance ability keep data in-flight athlon three decoders could potentially decode three x86 instructions six microinstructions per clock although somewhat unlikely real-world use critical branch predictor unit essential keeping pipeline busy enhanced compared board k6 deeper pipelining stages allowed higher clock speeds attained whereas amd k6-iii+ topped 570 mhz due short pipeline even built 180 nm process athlon capable clocking much higher amd ended long-time handicap floating point x87 performance designing super-pipelined out-of-order triple-issue floating point unit three units tailored able calculate optimal type instructions redundancy separate units possible operate one floating point instruction fpu huge step forward amd k6 fpu looked anemic compared intel p6 fpu athlon longer case 3dnow floating point simd technology present received revisions name change enhanced 3dnow additions included dsp instructions implementation extended mmx subset intel sse athlon cpu cache consisted typical two levels athlon first x86 processor 128 kb split level 1 cache 2-way associative cache separated 2×64 kb data instructions concept harvard architecture cache double size k6 already large 2×32 kb cache quadruple size pentium ii iii 2×16 kb l1 cache initial athlon slot later called athlon classic used 512 kb level 2 cache separate cpu processor cartridge board running 50 33 core speed done 250 nm manufacturing process large allow on-die cache maintaining cost-effective die size later athlon cpus afforded greater transistor budgets smaller 180 nm 130 nm process nodes moved on-die l2 cache full cpu clock speed amd athlon processor launched june 23 1999 general availability august '99 launched 500 mhz average 10 faster pentium iii clock business applications even faster ~20 gaming workloads athlon classic cartridge-based processor named slot similar intel cartridge slot 1 used pentium ii pentium iii used commonly available physical 242 pin connector used intel slot 1 processors rotated 180 degrees connect processor motherboard reversal served make slot keyed prevent installation wrong cpu athlon intel processors used fundamentally different incompatible signaling standards front-side bus cartridge assembly allowed use higher speed cache memory modules could put reasonably bundled motherboards time similar pentium ii katmai-based pentium iii athlon classic contained 512 kb l2 cache high-speed sram cache run divisor processor clock accessed via 64-bit bus known back-side bus allowing processor service system front side bus requests rest system cache accesses simultaneously versus traditional approach pushing everything front-side bus one limitation also afflicting intel pentium iii sram cache designs time incapable keeping athlon clock scalability due manufacturing limitations cache chips difficulty routing electrical connections cache chips became increasingly difficult reliably run external processor cache match processor speeds released—and fact became impossible thus initially level 2 cache ran half cpu clock speed 700 mhz 350 mhz cache faster slot-a processors compromise run 2/5 850 mhz 340 mhz cache 1/3 1 ghz 333 mhz cache later race 1 ghz 1000 mhz amd intel exacerbated bottleneck ever higher speed processors demonstrated decreasing gains overall performance—stagnant sram cache memory speeds choked improvements overall speed directly lead development integrating l2 cache onto processor remove dependence external cache chips amd integration cache onto athlon processor would later result athlon thunderbird slot-a athlons first multiplier-locked cpus amd partly done hinder cpu remarking done questionable resellers around globe amd older cpus could simply set run whatever clock speed user chose motherboard making trivial relabel cpu sell faster grade originally intended relabeled cpus always stable overclocked tested properly damaging amd reputation although athlon multiplier locked crafty enthusiasts eventually discovered connector pcb cartridge could control multiplier eventually product called goldfingers device created could unlock cpu named gold connector pads processor board attached commercial terms athlon classic enormous success—not merits also intel endured series major production design quality control issues time particular intel transition 180 nm production process starting late 1999 running mid-2000 suffered delays shortage pentium iii parts contrast amd enjoyed remarkably smooth process transition ample supplies available causing athlon sales become quite strong argon-based athlon contained 22 million transistors measured 184 mm fabricated amd slightly modified version cs44e process 0.25 µm complementary metal–oxide–semiconductor cmos process six levels aluminium interconnect pluto orion athlons fabricated 0.18 µm process second generation athlon thunderbird debuted june 5 2000 version athlon shipped traditional pin-grid array pga format plugged socket socket motherboard also shipped slot package sold speeds ranging 600 mhz 1.4 ghz athlon classics using slot package could clock 1 ghz major difference however cache design intel done replaced old katmai-based pentium iii much faster coppermine-based pentium iii amd replaced 512 kb external reduced-speed cache athlon classic 256 kb on-chip full-speed exclusive cache general rule cache improves performance faster cache improves still amd changed cache design significantly thunderbird core older athlon cpus cpu caching inclusive design data l1 duplicated l2 cache thunderbird moved exclusive design l1 cache contents duplicated l2 increases total cache size processor effectively makes caching behave large l1 cache slower region l2 fast region l1 athlon large l1 cache exclusive design turns l2 cache basically victim cache need high l2 performance size lessened amd kept 64-bit l2 cache data bus older athlons result allowed relatively high latency simpler l2 cache reduced possibility l2 cache causing clock scaling yield issues still instead 2-way associative scheme used older athlons thunderbird move efficient 16-way associative layout thunderbird amd successful product since am386dx-40 ten years earlier mainboard designs improved considerably time initial trickle athlon mainboard makers swollen include every major manufacturer amd new fab dresden came online allowing production increases process technology improved switch copper interconnects october 2000 athlon c introduced raising mainboard front-side bus speed 100 mhz 133 mhz 266 mt/s providing roughly 10 extra performance per clock b model thunderbird amd released third-generation athlon code-named palomino october 9 2001 athlon xp xp suffix interpreted mean extended performance also unofficial reference microsoft windows xp athlon xp marketed using pr system compared relative performance athlon utilizing earlier thunderbird core athlon xp launched speeds 1.33 ghz pr1500+ 1.53 ghz pr1800+ giving amd x86 performance lead 1800+ model less month later enhanced lead release 1600 mhz 1900+ subsequent 1.67 ghz athlon xp 2000+ january 2002 palomino first k7 core include full sse instruction set intel pentium iii well amd 3dnow professional roughly 10 faster thunderbird clock speed thanks part new simd functionality several additional improvements core enhancements k7 tlb architecture added hardware data prefetch mechanism take better advantage available memory bandwidth palomino also first socketed athlon officially supporting dual processing chips certified purpose branded athlon mp according articles posted hardwarezone possible mod athlon xp function mp connecting fuses opga although results varied motherboard used changes core layout also resulted palomino frugal electrical demands consuming approximately 20 less power predecessor thus reducing heat output comparatively well preceding athlon thunderbird capable clock speeds exceeding 1400 mhz power thermal considerations required reach speeds would made increasingly impractical marketable product thus palomino goals lowered power consumption resultant heat produced allowed amd increase performance within reasonable power envelope palomino design also allowed amd continue using 180 nm manufacturing process node core voltages thunderbird palomino core debuted earlier mobile market—branded mobile athlon 4 codename corvette distinctively used ceramic interposer much like thunderbird instead organic pin grid array package used later palomino processors fourth-generation athlon thoroughbred released june 10 2002 1.8 ghz athlon xp pr2200+ thoroughbred core marked amd first production 130 nm silicon resulting significant reduction die size compared 180 nm predecessor came two steppings revisions core commonly referred tbred-a cpuid:6 8 0 tbred-b cpuid:6 8 1 initial version later known simply direct die shrink palomino demonstrated amd successfully transitioned 130 nm process successful reducing production cost per processor unmodified palomino design demonstrate expected reduction heat clock scalability usually seen design shrunk smaller process result amd able increase thoroughbred-a clock speeds much palomino replace tbred-a sold versions 1333 mhz 1800 mhz able displace production-costly palomino amd lineup amd thus reworked thoroughbred design better match process node produced turn creating thoroughbred-b significant aspect redesign addition another ninth metal layer already quite complex eight-layered thoroughbred-a comparison competing pentium 4 northwood utilized six successor prescott seven layers addition layers improve performance gives flexibility chip designers routing electrical pathways within chip importantly thoroughbred core flexibility working around electrical bottlenecks prevented processor attaining higher clock speeds tbred-b offered startling improvement headroom tbred-a made popular overclocking tbred-a often struggled reach clock speeds 1.9 ghz tbred-b often could easily reach 2.3 ghz thoroughbred line received increased front side bus clock lifetime 133 mhz 266 mt/s 166 mhz 333 mt/s improving processor ability access memory i/o efficiency resulted improved per-clock performance amd shifted pr rating scheme accordingly making lower clock speeds equate higher pr ratings thoroughbred-b direct basis successor—the tbred-b additional 256 kb l2 cache 512 kb total became barton core fifth-generation athlon barton -core processors released early 2003 pr 2500+ 2600+ 2800+ 3000+ 3200+ operating higher clock rates thoroughbred -core processors marked higher pr featuring increased 512 kb l2 cache later models additionally supported increased 200 mhz 400 mt/s front side bus thorton core later variant barton half l2 cache disabled thus functionally identical thoroughbred-b core name thorton portmanteau thoroughbred barton time barton release northwood -based pentium 4 become competitive amd processors unfortunately amd simple increase size l2 cache 512 kb nearly impact intel pentium 4 line athlon architecture nearly cache-constrained pentium 4 athlon exclusive-cache architecture shorter pipeline made less sensitive l2 cache size barton saw increase several percent gained per-clock performance thoroughbred-b derived increased performance welcome sufficient overtake pentium 4 line overall performance pr also became somewhat inaccurate barton models lower clock rates given higher pr higher-clocked thoroughbred processors instances computational task benefit additional cache make loss raw clock speed created situations lower rated faster clocked thoroughbred would outperform higher-rated lower clocked barton barton also used officially introduce higher 400 mt/s bus clock socket platform used gain barton models efficiency increased pr however clear time intel quad-pumped bus scaling well amd double-pumped ev6 bus 800 mt/s bus used many later pentium 4 processors well athlon xp reach order reach bandwidth levels athlon xp bus would clocked levels simply unreachable point four-year-old athlon ev6 bus architecture scaled limit maintain exceed performance intel newer processors would require significant redesign k7 derived athlons replaced september 2003 athlon 64 family featured on-chip memory controller completely new hypertransport bus replace ev6 barton 130 nm thorton 130 nm mobile athlon xps athlon xp-m using given core physically identical equivalent desktop athlon xps counterpart differing configuration used achieve given performance level processors usually binned selected become mobile processor ability run given processor speed supplied lower desktop voltage results lower power consumption longer battery life reduced heat using normal desktop part additionally mobile xps feature multiplier-locked generally higher-rated maximum operating temperatures requirements intended better operation within tight thermal constraints within notebook pc—but also making attractive overclocking athlon xp-m replaced older mobile athlon 4 based palomino core athlon xp-m using newer thoroughbred barton cores athlon xp-m also offered compact micropga socket 563 version space constrained applications alternative larger socket like mobile k6-2+/iii+ predecessors cpus capable dynamic clock adjustment power optimization also reason unlocked multiplier system idle cpu clocks via lower bus multiplier selects lower voltage program demands computational resources cpu quickly latency returns intermediate maximum speed appropriate voltage meet demand technology marketed powernow similar intel speedstep power saving technique feature controlled cpu motherboard bios operating system amd later renamed technology cool n'quiet k8-based cpus athlon 64 etc introduced use desktop pcs well athlon xp-ms popular desktop overclockers well underclockers lower voltage requirement higher heat rating selected cpus essentially cherry picked manufacturing line best cores line cpus typically overclocked reliably desktop-headed counterparts also fact locked single multiplier significant simplification overclocking process barton core athlon xp-ms successfully overclocked high 3.1 ghz chips also liked undervolting ability undervolting process determining lowest voltage cpu remain stable given clock speed athlon xp-m cpus already rated running lower voltages desktop siblings better starting point lowering voltage even popular application use home theater pc systems due high performance low heat output resultant low vcore settings besides multiplier locked xp-ms curiously disabled multi processor operation thus could used place expensive athlon mp dual socket motherboards since boards generally lacked multiplier voltage adjustment normally supported 133 mhz fsb adjustments would still needed full speed operation one method modification known wire-modding involves connecting appropriate cpu pins cpu socket small lengths wire select appropriate multiplier typical overclock mobile 2500+ cpu 2.26 ghz 17x multiplier would result faster highest official 2800+ mp cpu running 2.13 ghz fastest supercomputers based athlonmp | [
3586,
3459,
3588,
5380,
8322,
6151,
8327,
9092,
10375,
5645,
3470,
6926,
528,
10260,
7963,
1053,
2719,
7712,
5541,
11047,
2094,
7983,
3892,
1461,
8125,
8126,
6463,
7744,
6978,
7234,
3142,
3911,
11080,
8523,
2764,
5326,
7247,
5329,
9044,
7... | Test |
1,006 | 4 | Cisco_Security_Agent:cisco security agent cisco security agent csa endpoint intrusion prevention system made originally okena formerly named stormwatch agent bought cisco systems 2003 software rule-based examines system activity network traffic determining behaviors normal may indicate attack csa offered replacement cisco ids host sensor announced end-of-life 21 february 2003 end life action result cisco acquisition okena inc. cisco security agent product line based okena technology would replace cisco ids host sensor product line entercept result end-of-life action cisco offered no-cost one-for-one product replacement/migration program cisco ids host sensor customers new cisco security agent product line intent program support existing ids host sensor customers choose migrate new cisco security agent product line cisco ids host sensor customers eligible migration program whether customer purchased cisco software application support sas service contract cisco ids host sensor products csa uses two three-tier client-server architecture management center 'mc management console contains program logic ms sql database backend used store alerts configuration information mc sql database may co-resident system agent installed desktops and/or servers protected agent communicates management center sending logged events management center receiving updates rules occur network world article dated 17 december 2009 stated cisco hinted end-of-life csa mars full article linked 11 june 2010 cisco announced end-of-life end-of-sale csa cisco offer replacement product | [
5612,
7983,
6834,
5245,
2558
] | Test |
1,007 | 6 | Midnight_Commander:midnight commander gnu midnight commander also known codice_1 command used start mouseless commander older versions free cross-platform orthodox file manager started miguel de icaza 1994 clone then-popular norton commander gnu midnight commander part gnu project licensed terms gnu general public license midnight commander console application text user interface main interface consists two panels display file system file selection done using arrow keys insert key used select files function keys perform operations renaming editing copying files later versions midnight commander additionally mouse support versions aware gpm x terminal emulators gnome terminal xterm support mouse reporting running inside x terminal versions update name window midnight commander runs allowed terminal emulator midnight commander features include ability view contents rpm package files work common archive formats simply another directory function ftp fish client midnight commander also includes editor called mcedit executed standalone program midnight commander using f4 key mcedit features include syntax highlighting many languages macros code snippets simple integration external tools automatic indentation mouse support clipboard ability work ascii hex modes users also option replace mcedit editor choice options menu configuration n't use internal edit midnight commander also rename groups files unlike number file managers rename one file time convenient manipulating large collections files e.g make conform new naming convention midnight commander also move files different directory time renames lets user specify original resulting file names using wildcard characters makes power regular expressions available renaming files convenient user interface addition user select whether use shell patterns globs automatic grouping wildcards features available using file rename/move menu selection pressing f1 would produce brief explanation options including examples use wildcards midnight commander based versatile text interfaces ncurses s-lang allow work regular console inside x terminal ssh connections rs-232 interface embedded devices kinds remote shells native support utf-8 locales unicode added 2009 development versions midnight commander version 4.7.0 mc unicode support | [
2050,
2180,
11654,
4493,
6797,
1939,
5397,
8857,
7450,
7325,
802,
3618,
7849,
11562,
7983,
7986,
5555,
9148,
5694,
10687,
576,
7364,
10822,
5703,
5833,
8147,
11221,
3674,
2010,
10464,
5096,
9579,
5612,
8304,
1394,
5619,
8436
] | None |
1,008 | 7 | FreshBooks:freshbooks freshbooks accounting software package developed marketed 2ndsite inc. freshbooks products geared mainly toward small medium-sized businesses offer cloud-based accounting applications send invoices clients bill time expertise company founded 2003 based toronto ontario canada company founded 2003 mike mcderment joe sawada mcderment previous internet marketing consulting business anicon company traces origins mcderment inadvertently losing invoice record overwriting 2003 sought new way manage accounting business product first eponymously named 2ndsite synonymous company company rebranded product 2006 freshbooks based toronto ontario canada freshbooks customers 160 countries july 23 2014 company announced raised 30 million usd first round institutional venture capital 2016 company unveiling new interface improved functionality load times app freshbooks offers subscription-based product includes invoicing accounts payable expense tracking time tracking retainers fixed asset depreciation purchase orders payroll integrations double-entry accounting industry-standard business management reporting financial data stored cloud single unified ledger allowing users access set books regardless location desktop mobile offers free api enables customers 3rd-party software vendors integrate external applications freshbooks freshbooks also supports multiple tax rates currencies also incorporates payroll feature projects feature freshbooks headquarters toronto canada operations north america europe australia founder mike mcderment chief executive officer company since inception 2003 2014 freshbooks raised series venture investment 30 million led venture capital firm oak investment partners participation georgian partners atlas venture 2017 company announced raised another 43 million funding accomplice georgian partners oak investment partners | [
7489,
1539,
5224,
11113,
7532,
10509,
1680,
467,
8307,
735
] | Test |
1,009 | 4 | Internet_Junkbuster:internet junkbuster internet junkbuster web proxy block ads cookies developed junkbusters corporation released gnu general public license however internet junkbuster updated since 1998 junkbusters.com web site longer maintained privoxy up-to-date filtering proxy based junkbuster code much powerful see also proxomitron windows-based web filter update dated november 2012 sorry junkbusters.com web site longer maintained says website article contains material infoanarchy | [
7965,
4725
] | Test |
1,010 | 4 | ISO_15292:iso 15292 iso 15292 information technology – security techniques – protection profile registration procedures establishes international registry operated afnor protection profiles packages used computer security evaluation common criteria framework format profiles packages specified iso 15408 iso 15292 assigns registered protection profiles packages labels form entry type-registration year-registration number example pp-2003-0001 | [
10752,
8854,
11036,
5149,
2206,
9245,
5413,
10413,
11056,
8627,
3126,
1079,
5816,
6593,
6977,
8904,
1610,
9290,
8524,
2519,
2904,
4058,
4064,
8421,
8426,
5614,
3447,
2045,
10238
] | Test |
1,011 | 2 | Matías_Duarte:matías duarte matías duarte born 7 december 1973 chilean computer interface designer google vice president design prior current role director android user experience android 3.0 honeycomb first release major elements design influence prior moving google work android duarte similar roles palm ’ webos helio ocean danger hiptop t-mobile sidekick duarte started career psycroft cowrote xbill brian wellington left psycroft 1996 time moved hyper image productions lead designer phase zero unreleased shooter game atari jaguar 1997 left hyper image productions moved magicarts filled role vice president design 1999 march 2000 duarte took role danger director design team 2002 wired 'industrial designer rave award work designing hiptop/sidekick august 2005 took role helio vice president experience design left shortly company acquired virgin mobile september 2007 duarte hired vice president palm inc. lead development palm ’ webos human interface user experience introduced design webos 2009 consumer electronics show may 2010 duarte hired google director android user experience working interface design android 3.0 aka honeycomb duarte earned bachelor science honors university maryland b.s computer science took additional concentrations study fine art art history managed student art gallery 1993 1996 university maryland duarte daughter june 2008 | [
2978,
7595,
3409,
921,
4479
] | None |
1,012 | 4 | Woo–Lam:woo–lam cryptography woo–lam refers various computer network authentication protocols designed simon s. lam thomas woo protocols enable two communicating parties authenticate identity exchange session keys involve use trusted key distribution center kdc negotiate parties symmetric-key public-key variants described however protocols suffer various security flaws part described inefficient compared alternative authentication protocols following notation used describe algorithm assumed parties know kdc public key original version protocol identifier formula_23 omitted lines 5 6 account fact formula_24 unique among nonces generated parties protocol revised authors spotted flaw algorithm | [
7,
4242,
3477,
2080,
2083,
9635,
2087,
4663,
8760,
5433,
5568,
10058,
6098,
8670,
6750,
2143,
2274,
8674,
6888
] | Train |
1,013 | 4 | Protection_mechanism:protection mechanism computer science protection mechanisms built computer architecture support enforcement security policies simple definition security policy set may use information computer system access matrix model first introduced 1971 generalized description operating system protection mechanisms separation protection security special case separation mechanism policy | [
8259,
4583,
9677,
7983,
6162,
10556,
11262
] | Validation |
1,014 | 3 | Kryo:kryo qualcomm kryo brand name series custom semi-custom arm-based cpus cpus implement armv8-a 64-bit instruction set serve successor older 32-bit krait core first announced september 2015 used snapdragon 820 soc kryo cores used parts big.little configuration two dual-core clusters case snapdragon 820 821 run different clock frequency similar cortex-a53 clusters work snapdragon 615 kryo 820/821 in-house custom armv8.0-a aarch64/aarch632 design based arm cortex design kryo 2xx series cpus derivative original kryo microarchitecture rather semi-custom design licensed arm ’ built arm cortex technology boc license kryo 2xx series cpus derivative arm cortex-a73 performance/gold cluster cortex-a53 efficiency/silver cluster big.little arrangement kryo 280 cpu announced along snapdragon 835 mobile platform november 2016 compared original kryo new kryo 280 core improved integer instructions per clock lower floating point instructions per clock however overall 835 praised reviewers offering significant performance efficiency advantage compared 820 exynos 8895 largely due improvements cpu scheduling dvfs systems kryo 260 cpu announced along snapdragon 660 mobile platform mid-range smartphone may 2017 kryo 260 cores also used snapdragon 636 snapdragon 665 kryo 250 cpu introduced snapdragon 632 mobile platform announced june 2018 also built 14 nm process similar kryo 260 differences size l2 cache qualcomm claims increased performance 40 compared snapdragon 625 uses cortex-a53 cores kryo 3xx series cpus features semi-custom gold silver cores derivative arm cortex-a75 cortex-a55 respectively arranged configurations dynamiq qualcomm first cpus support armv8.2-a dynamiq dynamiq allows flexibility cpu configuratoin including amounts cores/cache cpu clusters kryo 385 core announced part snapdragon 845 december 2017 qualcomm expected 25–30 increased performance task run high-performance cores 15 increase efficiency cores relative snapdragon 835 testing found significant advantages performance efficiency compared exynos 8895 9810 kryo 385 also used snapdragon 850 kryo 360 qualcomm upper mid-range semi-custom core introduced snapdragon 710 announced may 2018 kryo 360 also used snapdragon 670 712 kryo 4xx series cpus features semi-custom gold prime/gold silver cores derivative arm cortex-a76 cortex-a55 respectively arranged configurations dynamiq qualcomm reveal semi-custom cortex-a76 larger out-of-order execution window reorder buffer data prefetchers optimised floating point workloads kryo 495 cpu announced snapdragon 8cx 6 december 2018 qualcomm claims 8cx 60 efficient snapdragon 850 kryo 485 cpu announced snapdragon 855 5 december 2018 qualcomm claim 45 increase performance compared 845 kryo 385 testing found 855 outperformed 845 51 specint2006 61 specfp2006 39 power efficiency 855 also significantly efficient exynos 9820 kryo 470 cpu qualcomm upper mid-range semi-custom core introduced april 2019 snapdragon 730 730g kryo 460 cpu qualcomm mid-range semi-custom core introduced october 2018 snapdragon 675 | [
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
10361,
638,
644,
9863,
8842,
146,
659,
7833,
666,
5786,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
6391,
3835,
2814,
781,
5417,
81... | Test |
1,015 | 4 | Sandvine:sandvine sandvine incorporated networking equipment company based fremont california united states sandvine network policy control products designed implement broad network policies ranging censorship service creation billing congestion management security sandvine targets products consumer tier 1 tier 2 networks including cable dsl mobile sandvine formed august 2001 waterloo ontario canada team approximately 30 people recently closed cisco acquisition pixstream initial round vc funding launched company 20 million cdn subsequent round financing 19 million cdn completed may 2005 march 2006 sandvine completed initial public offering london aim exchange ticker 'sand october 2006 sandvine completed initial public offering toronto stock exchange ticker 'svc initial product sales focused congestion management operators struggled high growth broadband many operators shifted focus revenue generating services reducing operational expenditure june 2007 sandvine acquired cablematrix technologies packetcable multimedia pcmm -based pcrf enable broadband operators increase subscriber satisfaction delivering media-rich ip applications services sip telephony video streaming on-line gaming videoconferencing august 2015 sandvine acquired momac b.v. customer engagement technologies subscribers presented relevant message offer alert right time screen take immediate action february 2016 sandvine acquired assets teclo networks ag tcp optimization technology july 2017 sandvine shareholders accepted 562 million cdn takeover bid pni acquireco corp. affiliate francisco partners procera networks acquisition completed september 2017 sandvine shares ceased listed toronto stock exchange acquisition completed despite concerns raised ronald deibert director citizen lab munk school global affairs university toronto argued takeover required “ closer scrutiny ” federal government largely light activities done two francisco ’ portfolio companies notably procera networks part controversy technology alleged used spy turkish citizens march 2018 citizen lab published report showing strong evidence packetlogic devices sandvine could used deploy government spyware turkey redirect egyptian users affiliate ads citizen lab performed number tests contrasting behaviour network data traffic countries packetlogic device procured independently sandvine technology focuses policy management including control spam usage-based billing quality service p2p throttling use freebsd basis appliances rather identifying individual messages spam control based identifying sources spam behaviors using multiple smtp servers using multiple source ehlo domains large address books quality service control provided range media applications including video conferencing voip gaming p2p throttling focuses gnutella uses path cost algorithm reduce speeds still delivering content stateful policy management uses stateful deep-packet inspection packet spoofing allow networking device determine details p2p conversation including hash requested device determine optimal peer use substitute one selected p2p algorithm sitting middle imitating ends connection sending reset packets client server usage-based-billing includes pre-paid post-paid 3g 4g mobile access well fixed access according research citizen lab products sold sandvine used facilitate censorship internet egypt allegation company denies sandvine products used comcast united states limit number sessions internet traffic generated peer-to-peer file sharing software sandvine current traffic discrimination product fairshare described detail rfc according independent testing comcast injected reset packets peer-to-peer connections effectively caused certain limited number outbound connections immediately terminate method network management described ieee communications may 2000 article nonintrusive tcp connection admission control bandwidth management internet access link product whitepaper published sandvine confirms products configurable use session management capability prevent customers using bittorrent providing uploads peers close network affects uses bittorrent open-source project distribution patch distribution illegal downloads | [
4229,
998,
8172,
10417,
8696
] | None |
1,016 | 9 | Comparison_of_programming_languages_(strings):comparison programming languages strings comparison programming languages strings compares features string data structures text-string processing 52 various computer programming languages different languages use different symbols concatenation operator many languages use symbol though several deviate section compares styles declaring string literal expression interpolated string compiler/interpreter evaluates inserts result place escaped quotes means 'flag symbol used warn character flag used string rather ending string dual quoting means whenever quote used string used twice one discarded single quote used within string raw means compiler treats every character within literal exactly written without processing escapes interpolations many languages syntax specifically intended strings multiple lines languages syntax document heredoc token representing string put middle line code code continues starting token string content n't appear next line languages string content starts immediately starting token code continues string literal terminator | [
5760,
3462,
8582,
1931,
2062,
6414,
6160,
5521,
10510,
3736,
1435,
155,
7326,
11555,
3876,
5796,
428,
5677,
5806,
10413,
9008,
3762,
11442,
3765,
8502,
7479,
10043,
10684,
6718,
963,
8644,
8262,
11132,
5961,
1610,
1611,
9804,
3577,
8397,
... | None |
1,017 | 4 | Evasion_(network_security):evasion network security network security evasion bypassing information security device order deliver exploit attack form malware target network system without detection evasions typically used counter network-based intrusion detection prevention systems ips ids also used by-pass firewalls defeat malware analysis target evasions crash network security device rendering in-effective subsequent targeted attacks evasions particularly nasty well-planned implemented evasion enable full sessions carried forth packets evade ids attacks carried sessions happen right nose network service administrators security systems rendered ineffective well-designed evasion techniques way stealth fighter attack without detection radar defensive systems good analogy evasions system designed recognize keywords speech patterns phone system “ break system x ” simple evasion would use language english parties still understand wishfully language people possible talk various advanced targeted evasion attacks known since mid-1990s 1997 article mostly discusses various shell-scripting character-based tricks fool ids phrack magazine article technical report ptacek et al discusses tcp/ip protocol exploits evasions others recent discussions evasions include report kevin timm challenge protecting servers evasions model end-host operation network security device i.e. device able know target host would interpret traffic would harmful key solution protecting evasions traffic normalization ids/ips device lately discussions putting effort research evasion techniques presentation hack.lu discussed potentially new evasion techniques apply multiple evasion techniques by-pass network security devices singh abhishek evasions intrusion prevention detection systems virus bulletin retrieved 1 april 2010 | [
7491,
7560,
3473,
1429,
7578,
7515,
2430
] | None |
1,018 | 3 | Apache_Heron:apache heron apache heron distributed stream processing engine developed twitter according creators twitter scale diversity twitter data increased heron real-time analytics platform process streaming introduced sigmod 2015 | [
10377,
7567,
1296,
1047,
1913,
8217,
6555,
8860,
11161,
3877,
10661,
11303,
5677,
7983,
4919,
5047,
4538,
1851,
7485,
7742,
9789,
7233,
6338,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
8408,
9179,
7261,
990,
8799,
10719,
865,
11235,
... | Test |
1,019 | 9 | Agda_(programming_language):agda programming language agda dependently typed functional programming language originally developed ulf norell chalmers university technology implementation described phd thesis original agda system developed chalmers catarina coquand 1999 current version originally known agda 2 full rewrite considered new language shares name tradition agda also proof assistant based propositions-as-types paradigm unlike coq support tactics proofs written functional programming style language ordinary programming constructs data types pattern matching records let expressions modules haskell-like syntax system emacs atom interfaces also run batch mode command line agda based zhaohui luo unified theory dependent types utt type theory similar martin-löf type theory main way defining data types agda via inductive data types similar algebraic data types non-dependently typed programming languages definition peano numbers agda basically means two ways construct value type ℕ representing natural number begin codice_1 natural number codice_2 natural number codice_3 standing successor codice_2 natural number definition less equal relation two natural numbers first constructor codice_5 corresponds axiom zero less equal natural number second constructor codice_6 corresponds inference rule allowing turn proof codice_7 proof codice_8 value codice_9 proof one successor zero less equal two successor one parameters provided curly brackets may omitted inferred core type theory induction recursion principles used prove theorems inductive types agda dependently typed pattern matching used instead example natural number addition defined like way writing recursive functions/inductive proofs natural applying raw induction principles agda dependently typed pattern matching primitive language core language lacks induction/recursion principles pattern matching translates one distinctive features agda compared similar systems coq heavy reliance metavariables program construction example one write functions like agda codice_10 metavariable interacting system emacs mode show user expected type allow refine metavariable i.e. replace detailed code feature allows incremental program construction way similar tactics-based proof assistants coq programming pure type theory involves lot tedious repetitive proofs agda support tactics instead agda support automation via reflection reflection mechanism allows one quote program fragments – unquote – abstract syntax tree way reflection used similar way template haskell works another mechanism proof automation proof search action emacs mode enumerates possible proof terms limited 5 seconds one terms fits specification put meta variable action invoked action accepts hints e.g. theorems modules used whether action use pattern matching etc agda total language i.e. program must terminate possible patterns must matched without feature logic behind language becomes inconsistent becomes possible prove arbitrary statements termination checking agda uses approach foetus termination checker agda extensive de facto standard library includes many useful definitions theorems basic data structures natural numbers lists vectors library beta active development one notable features agda heavy reliance unicode program source code standard emacs mode uses shortcuts input codice_11 σ two compiler backends malonzo haskell one javascript | [
9345,
10145,
3876,
5796,
3462,
9320,
11641,
12,
5612,
7983,
11026,
11028,
3926,
4791,
2585,
8924,
8926,
6239
] | Test |
1,020 | 4 | Dancing_pigs:dancing pigs computer security dancing pigs term problem describes computer users attitudes computer security states users continue pick amusing graphic even receive warning security software potentially dangerous words users choose primary desire features without considering security dancing pigs generally used tech experts found articles term origin remark edward felten bruce schneier states bruce schneier expands remark follows mozilla security reviewers guide states widely publicized 2009 paper directly addresses dancing pigs quotation argues users behavior plausibly rational one study phishing found people really prefer dancing animals security study showed participants number phishing sites including one copied bank west home page schneier believes dancing pigs problem lead crime key threat said tactics might change ... security measures make tactics harder others easier underlying issue constant ignoring computer security inflict various types damage resulting significant losses | [
1315,
10756,
2558
] | None |
1,021 | 7 | Knack_Online_Database_Tools:knack online database tools knack formerly appnowgo software service company offers tools building online databases web applications knack founded 2010 used startup incubator dreamit philadelphia knack 100 remote company knack customers often move using microsoft excel spreadsheets google docs | [
467
] | None |
1,022 | 4 | Fish_DNA_barcoding:fish dna barcoding dna barcoding methods fish used identify groups fish based dna sequences within selected regions genome methods used study fish genetic material form environmental dna edna cells freely diffused water allows researchers identify species present body water collecting water sample extracting dna sample isolating dna sequences specific species interest barcoding methods also used biomonitoring food safety validation animal diet assessment assessment food webs species distribution detection invasive species fish research barcoding used alternative traditional sampling methods barcoding methods often provide information without damage studied animal aquatic environments unique properties affect genetic material organisms distributed dna material diffuses rapidly aquatic environments makes possible detect organisms large area sampling specific spot due rapid degradation dna aquatic environments detected species represent contemporary presence without confounding signals past dna-based identification fast reliable accurate characterization across life stages species reference libraries used connect barcode sequences single species used identify species present dna samples libraries reference sequences also useful identifying species cases morphological ambiguity larval stages edna samples barcoding methods used water management species composition used indicator ecosystem health barcoding metabarcoding methods particularly useful studying endangered elusive fish species detected without catching harming animals biomonitoring aquatic ecosystems required national international legislation e.g water framework directive marine strategy framework directive traditional methods time-consuming include destructive practices harm individuals rare protected species dna barcoding relatively cost-effective quick method identifying fish species aquatic environments presence absence key fish species established using edna water samples spatio-temporal distribution fish species e.g timing location spawning studied help discover e.g impacts physical barriers dam construction human disturbances dna tools also used dietary studies fish construction aquatic food webs metabarcoding fish gut contents feces identify recently consumed prey species however secondary predation must taken consideration early detection vital control removal non-indigenous ecologically harmful species e.g lion fish pterois sp atlantic caribbean metabarcoding edna used detect cryptic invasive species aquatic ecosystems barcoding metabarcoding approaches yield rigorous extensive data recruitment ecology geographic ranges fisheries resources methods also improve knowledge nursery areas spawning grounds benefits fisheries management traditional methods fishery assessment highly destructive gillnet sampling trawling molecular methods offers alternative non-invasive sampling example barcoding metabarcoding help identifying fish eggs species ensure reliable data stock assessment proven reliable identification via phenotypic characters barcoding metabarcoding also powerful tools monitoring fisheries quotas by-catch edna detect quantify abundance anadromous species well temporal distribution approach used develop appropriate management measures particular importance commercial fisheries globalisation food supply chains led increased uncertainty origin safety fish-based products barcoding used validate labelling products trace origin “ fish fraud ” discovered across globe recent study supermarkets state new york found 26.92 seafood purchases identifiable barcode mislabelled barcoding also trace fish species human health hazards related consumption fish biotoxins occasionally concentrated toxins move food chain one example relates coral reef species predatory fish barracuda detected cause ciguatera fish poisoning new associations fish poisoning detected use fish barcoding barcoding used conservation endangered species prevention illegal trading cites listed species large black market fish based products also aquarium pet trades protect sharks overexploitation illegal use detected barcoding shark fin soup traditional medicines aquatic environments special attributes need considered sampling fish edna metabarcoding seawater sampling particular interest assessment health marine ecosystems biodiversity although dispersion edna seawater large salinity negatively influences dna preservation water sample contain high amounts edna fish one week sampling free molecules intestinal lining skin cell debris main sources fish edna comparison marine environments ponds biological chemical properties alter edna detection small size ponds compared water bodies makes sensitive environmental conditions exposure uv light changes temperature ph factors affect amount edna moreover trees dense vegetation around ponds represent barrier prevents water aeration wind barriers also promote accumulation chemical substances damage edna integrity heterogeneous distribution edna ponds may affect detection fishes availability fish edna also dependent life stage activity seasonality behavior largest amounts edna obtained spawning larval stages breeding activity primer design crucial metabarcoding success studies primer development described cytochrome b 16s suitable target regions fish metabarcoding evans et.al 2016 described ac16s l2513/h2714 primer sets able detect fish species accurately different mesocosms another study performed valentini et.al 2016 showed l1848/h1913 primer pair amplifies region 12s rrna locus able reach high taxonomical coverage discrimination even short target fragment research also evidenced 89 sampling sites metabarcoding approach similar even higher traditional methods e.g electrofishing netting methods hänfling et.al 2016 performed metabarcoding experiments focused lake fish communities using 12s_f1/12s_r1 cytb_l14841/cytb_h15149 primer pairs whose targets located mitochondrial 12s cytochrome b regions respectively results demonstrate detection fish species higher using 12s primers cytb due persistence shorter 12s fragments ~100 bp comparison larger cytb amplicon ~460 bp general studies summarize special considerations primer design selection taken according objectives nature experiment number open access databases available researchers worldwide proper identification fish specimens dna barcoding methods relies heavily quality species coverage available sequence databases fish reference database electronic database typically contains dna barcodes images geospatial coordinates examined fish specimens database also contain linkages voucher specimens information species distributions nomenclature authoritative taxonomic information collateral natural history information literature citations reference databases may curated meaning entries subjected expert assessment included uncurated case may include large number reference sequences less reliable identification species fish-bol launched 2005 fish barcode life initiative fish-bol www.fishbol.org international research collaboration assembling standardized reference dna sequence library fish species concerted global research project goal collect assemble standardized dna barcode sequences associated voucher provenance data curated reference sequence library aid molecular identification fish species researchers wish contribute fish-bol reference library clear guidelines provided specimen collection imaging preservation archival well meta-data collection submission protocols fish-bol database functions portal barcode life data systems bold french polynesia fish barcoding base french polynesia fish barcoding database contains specimens captured several field trips organised participated criobe centre island research environmental observatory since 2006 archipelagos french polynesia classified specimen following information available scientific name picture date gps coordinate depth method capture size cytochrome oxidase c subunit 1 co1 dna sequence database searched using name genus species using part co1 dna sequence aquagene collaborative product developed several german institutions aquagene provides free access curated genetic information marine fish species database allows species identification dna sequence comparisons species characterized multiple gene sequences presently including standard co1 barcoding gene together cytb myh6 coming shortly rhod facilitating unambiguous species determination even closely related species high intraspecific diversity genetic data complemented online additional data sampled specimen digital images voucher number geographic origin additional resources reference databases general may also useful barcoding fish barcode life datasystem genbank barcoding/metabarcoding provides quick usually reliable species identification meaning morphological identification i.e taxonomic expertise needed metabarcoding also makes possible identify species organisms degraded part organism available powerful tool detection rare and/or invasive species detected despite low abundance traditional methods assess fish biodiversity abundance density include use gears like nets electrofishing equipment trawls cages fyke-nets gear show reliable results presence abundant species contrary rare native species well newly established alien species less likely detected via traditional methods leading incorrect absence/presence assumptions barcoding/metabarcoding also cases non-invasive sampling method provides opportunity analyze dna edna sampling living organisms fish parasites metabarcoding allows detection cryptic microscopic parasites aquatic environments difficult direct methods e.g identifying species samples microscopy parasites exhibit cryptic variation metabarcoding helpful method revealing application edna metabarcoding cost-effective large surveys many samples required edna reduce costs fishing transport samples time invested taxonomists cases requires small amounts dna target species reach reliable detection constantly decreasing prices barcoding/metabarcoding due technical development another advantage edna approach also suitable monitoring inaccessible environments results obtained metabarcoding limited biased frequency occurrence also problematic far species barcodes attached even though metabarcoding may overcome practical limitations conventional sampling methods still consensus regarding experimental design bioinformatic criteria application edna metabarcoding lack criteria due heterogeneity experiments studies conducted far dealt different fish diversities abundances types aquatic ecosystems numbers markers marker specificities another significant challenge method quantify fish abundance molecular data although cases quantification possible appears consensus extent molecular data meet aim fish monitoring detailed information dna barcoding different organisms found dna barcoding dna barcoding diet assessment algae dna barcoding microbial dna barcoding aquatic macroinvertebrate dna barcoding | [
897,
10102,
902
] | None |
1,023 | 7 | Mindbody_Inc.:mindbody inc. mindbody american software-as-a-service company headquartered san luis obispo california founded 2001 company provides cloud-based business management software wellness services industry mindbody serves 35 million consumers located 130 countries territories provides business management software online scheduling platforms 58,000 health wellness businesses globally company clients include bikram yoga new york health racquet club classpass one mindbody technology partners using mindbody api manage inventory classpass app mindbody originally known hardbody software latter co-founded blake beltram rick stollmeyer robert murphy 2000 company later incorporated mindbody 2001 2005 mindbody online launched later received first private funding round us 1 million november 2005 tech coast angels pasadena angels company first round institutional investment came april 2009 sum us 5.6 million catalyst investors company received investment august 2010 sum us 14 million bessemer venture partners catalyst investors initial portion us 11 million remaining us 3 million exercised time within 36 months received another round funding november 2012 us 35 million bessemer venture partners institutional venture partners catalyst investors february 2014 mindbody received final round private funding amount us 50 million bessemer venture partners institutional venture partners catalyst investors w capital partners montreux equity partners february 2015 mindbody acquired company fitness mobile apps undisclosed amount time acquisition company creating customizable applications ios android platforms mindbody went public june 2015 raising us 100 million capital october 2015 mindbody integrated mindbody connect app fitbit making possible app users connect fitbit activity trackers view personal activity data achieved workouts scheduled mindbody businesses september 2016 mindbody acquired healcode technology company designed web tools fitness wellness industry october 2016 mindbody integrated armour ’ myfitnesspal app make possible app users find book fitness classes throughout united states directly myfitnesspal december 24 2018 mindbody announced going acquired vista equity partners us 1.9 billion february 18 2019 vista equity partners completed acquisition company | [
467,
685
] | None |
1,024 | 4 | Lazy_FP_state_restore:lazy fp state restore lazy fpu state leak also referred lazy fp state restore lazyfp security vulnerability affecting intel core cpus vulnerability caused combination flaws speculative execution technology present within affected cpus certain operating systems handle context switching floating point unit fpu exploiting vulnerability local process leak content fpu registers belong another process vulnerability related spectre meltdown vulnerabilities publicly disclosed january 2018 announced intel 13 june 2018 discovered employees amazon cyberus technology sysgo besides used floating point arithmetic fpu registers also used purposes including storing cryptographic data using aes instruction set present many intel cpus means vulnerability may allow key material compromised floating point simd registers large used every task thread system make context switching faster common microprocessors support lazy state switching rather storing full state context switch operating system simply mark fpu available hopes switched-to task need operating system guessed correctly time saved guess wrong first fpu simd instruction cause trap operating system save state previous task load correct state current task out-of-order cpus fpu available condition detected immediately fact almost detected immediately may multiple fault-causing instructions executing simultaneously processor must take first fault encountered preserve illusion in-order execution information first available in-order retire stage processor speculatively executes instruction using previous task register contents following instructions later detects fpu available condition although architectural state reverted beginning faulting instruction possible use part fpu state address memory load triggering load processor cache exploitation follows pattern spectre-family vulnerabilities cache state architectural state cache affect speed correctness cache load undone address including part previous task register state later detected measuring time taken access different memory addresses possible exploit bug without actually triggering operating system traps placing fpu access shadow forced branch misprediction e.g using retpoline processor still speculatively execute code rewind mispredicted branch never actually execute operating system trap allows attack rapidly repeated quickly reading entire fpu simd register state possible mitigate vulnerability operating system hypervisor levels always restoring fpu state switching process contexts fix firmware upgrade required operating systems already lazily restore fpu registers default protecting operating systems affected hardware platforms even underlying hardware issue existed linux operating system using kernel 3.7 higher possible force kernel eagerly restore fpu registers using codice_1 kernel parameter also many system software vendors projects including linux distributions openbsd xen released patches address vulnerability | [
5636,
4117,
8726,
535,
9761,
4644,
4133,
1608,
3657,
8779,
4703,
8288,
8292,
8815,
1140,
10875,
3711,
8320,
5764,
2187,
4240,
2709,
1688,
2717,
9375,
9904,
9395,
8886,
3789,
4304,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
9460,
7418,
281... | Test |
1,025 | 2 | Resident_set_size:resident set size computing resident set size rss portion memory occupied process held main memory ram rest occupied memory exists swap space file system either parts occupied memory paged parts executable never loaded | [
9762,
4423,
6543,
5840,
7983,
11539,
9300,
86,
6616
] | Test |
1,026 | 2 | Olivier_Fourdan:olivier fourdan olivier fourdan creator xfce desktop environment development began end 1996 started career new technologies production engineer well web development embedded linux systems fourdan working red hat since 2007 interrupted 2 years intel 2013 2014 2017 active adoption wayland working many different components amongst gtk+ mutter gnome control center xwayland mesa | [
5644,
4367,
8848,
657,
10642,
1939,
2581,
3478,
6808,
7450,
6302,
7584,
802,
5410,
6691,
6947,
8354,
5931,
8364,
1717,
823,
2109,
11069,
10687,
10822,
8263,
843,
589,
6352,
4177,
11602,
8787,
4437,
6489,
3802,
4831,
9696,
11232,
9455,
779... | None |
1,027 | 0 | Marti_Hearst:marti hearst marti hearst professor school information university california berkeley early work corpus-based computational linguistics including first work automating sentiment analysis word sense disambiguation invented algorithm became known hearst patterns applies lexico-syntactic patterns recognize hyponymy isa relations high accuracy large text collections including early application wordnet algorithm widely used commercial text mining applications including ontology learning hearst also developed early work automatic segmentation text topical discourse boundaries inventing well-known approach called texttiling hearst research user interfaces search engine technology big data analytics early work user interfaces information visualization search user interfaces inventing tilebars query term visualization flamenco research project investigated developed widely used faceted navigation approach searching browsing web sites information collections wrote first academic book topic search user interfaces cambridge university press 2009 hearst edge foundation contributing author member usage panel american heritage dictionary english language hearst received b.a. m.s. ph.d. computer science u.c berkeley 2013 became fellow association computing machinery | [
8440,
538,
7724
] | Test |
1,028 | 2 | Brian_Fox_(computer_programmer):brian fox computer programmer brian j fox born 1959 american computer programmer entrepreneur consultant author free software advocate original author gnu bash shell announced beta june 1989 continued primary maintainer bash least early 1993 fox also built first interactive online banking software u.s. wells fargo 1995 created open source election system 2008 1985 fox worked richard stallman stallman newly created free software foundation fsf fox authored gnu bash gnu makeinfo gnu info gnu finger gnu echo readline history libraries also maintainer gnu emacs time made many contributions software created gnu project 1986 1994 2008 fox collaborated alan dechert brent turner create completely open source election system system coded together parker abercrombie demonstrated linuxworld conference moscone center san francisco august 5–7 2008 fox also founding member california association voting officials cavo national association voting officials navo not-for-profit organizations promote open source voting systems use public elections fox co-wrote new york times piece 2017 former cia head r. james woolsey advocating open source election systems means securing us elections russian interference fox also wrote amacs cut-down implementation emacs apple ii series fourth born family 6 siblings composer musician donal fox thaddeus fox sister ena fox daniel fox sister sara fox-ray lives santa barbara longtime partner lissa liggett three children son physicist educator herbert fox grandson artist daniel fox creator monopoly man | [
2050,
2180,
11654,
4493,
1939,
3350,
802,
3618,
5555,
9148,
10687,
10822,
5703,
5833,
8147,
3674,
2010,
10464,
10727,
9579,
8304,
1394,
8436
] | Test |
1,029 | 3 | Accumulator_(computing):accumulator computing computer central processing unit cpu accumulator register intermediate arithmetic logic results stored without register like accumulator would necessary write result calculation addition multiplication shift etc main memory perhaps read right back use next operation access main memory slower access register like accumulator technology used large main memory slower cheaper used register early electronic computer systems often split two groups accumulators without modern computer systems often multiple general purpose registers operate accumulators term longer common however number special-purpose processors still use single accumulator work simplify design mathematical operations often take place stepwise fashion using results one operation input next instance manual calculation worker weekly payroll might look something like computer program carrying task would follow basic sequence operations although values looked would stored computer memory early computers number hours would likely held punch card pay rate form memory perhaps magnetic drum multiplication complete result needs placed somewhere drum machine would likely back drum operation takes considerable time next operation read value back introduces another considerable delay accumulators dramatically improve performance systems like providing scratchpad area results one operation fed next one little performance penalty example basic weekly pay would calculated placed accumulator could immediately used income tax calculation removes one save one read operation sequence operations generally took tens hundreds times long multiplication accumulator machine also called 1-operand machine cpu accumulator-based architecture kind cpu although may several registers cpu mostly stores results calculations one special register typically called accumulator almost early computers accumulator machines high-performance supercomputers multiple registers mainframe systems gave way microcomputers accumulator architectures popular mos 6502 notable example many 8-bit microcontrollers still popular 2014 picmicro 8051 accumulator-based machines modern cpus typically 2-operand 3-operand machines additional operands specify one many general purpose registers also called general purpose accumulators used source destination calculations cpus considered accumulator machines characteristic distinguishes one register accumulator computer architecture accumulator architecture one would used implicit operand arithmetic instructions instance cpu might instruction like codice_1 adds value read memory location memaddress value accumulator placing result back accumulator accumulator identified instruction register number implicit instruction register specified instruction architectures use particular register accumulator instructions instructions use register numbers explicit operand specification system uses single memory store result multiple operations considered accumulator j. presper eckert refers even earliest adding machines gottfried leibniz blaise pascal accumulator-based systems percy ludgate first conceive multiplier-accumulator mac analytical machine 1909 historical convention dedicates register accumulator arithmetic organ literally accumulates number sequence arithmetic operations instructions example modern interpretation convention exists regarding names operations registers accumulator accumulator registers tradition e.g donald knuth 1973 hypothetical mix computer example uses two instructions called load accumulator register/memory e.g lda r store accumulator register/memory e.g sta r knuth model many instructions well 1945 configuration eniac 20 accumulators could operate parallel one could store eight decimal digit number add subtract number received ibm early binary scientific computers beginning vacuum tube ibm 701 1952 used single 36-bit accumulator along separate multiplier/quotient register handle operations longer results ibm 650 decimal machine one 10 digit accumulator ibm 7070 later transistorized decimal machine three accumulators 12-bit pdp-8 one first minicomputers use accumulators inspired many later machines pdp-8 one accumulator hp 2100 data general nova 2 4 accumulators nova created follow-on pdp-8 rejected favor would become pdp-11 nova provided four accumulators ac0-ac3 although ac2 ac3 could also used provide offset addresses tending towards generality usage registers pdp-11 introduced contemporary model general registers numbered r0-r7 adopted later cisc risc machines early 4-bit 8-bit microprocessors 4004 8008 numerous others typically single accumulators 8051 microcontroller two primary accumulator secondary accumulator second used instructions multiplying mul ab dividing div ab former splits 16-bit result two 8-bit accumulators whereas latter stores quotient primary accumulator remainder secondary accumulator b direct descendent 8008 8080 8086 modern ubiquitous intel x86 processors still uses primary accumulator eax secondary accumulator edx multiplication division large numbers instance mul ecx multiply 32-bit registers ecx eax split 64-bit result eax edx however mul div special cases arithmetic-logical instructions add sub cmp xor test may specify eight registers eax ecx edx ebx esp ebp esi edi accumulator i.e left operand destination also supported multiply upper half result required x86 thus fairly general register architecture despite based accumulator model 64-bit extension x86 x86-64 generalized 16 instead 8 general registers | [
3459,
5384,
7445,
8732,
4385,
9891,
5412,
6821,
11059,
1462,
9911,
8761,
3010,
6596,
1480,
9932,
8143,
3157,
1502,
1376,
6499,
5862,
3050,
5356,
2798,
5358,
1776,
4465,
5617,
499,
4596,
7281,
7421,
9599
] | Validation |
1,030 | 5 | Serial_Line_Internet_Protocol:serial line internet protocol serial line internet protocol also slip encapsulation internet protocol designed work serial ports router connections documented personal computers slip largely replaced point-to-point protocol ppp better engineered features require ip address configuration set established microcontrollers however slip still preferred way encapsulating ip packets due small overhead people refer successful widely used serial line internet protocol rick adams slip avoid confusion proposed protocols named slip protocols include much complicated appendix serial line interface protocol slip modifies standard tcp/ip datagram slip requires serial port configuration 8 data bits parity either eia hardware flow control clocal mode 3-wire null-modem uart operation settings slip provide error detection reliant upper layer protocols therefore slip satisfactory error-prone dial-up connection however still useful testing operating systems response capabilities load looking flood-ping statistics slip escape characters also required modem connections escape hayes command set allowing therefore pass binary data modems would recognize characters commands version slip header compression called compressed slip cslip compression algorithm used cslip known van jacobson tcp/ip header compression cslip effect data payload packet independent compression serial line modem used transmission reduces transmission control protocol tcp header twenty bytes seven bytes cslip effect user datagram protocol udp datagrams | [
10242,
9860,
3847,
6152,
649,
9992,
9868,
1297,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
2206,
10271,
9506,
9380,
2085,
9381,
3751,
3752,
10924,
562,
9779,
2996,
9909,
4918,
7865,
10171,
3133,
3006,
4797,
5181,
5437,
6082,
7364,
11332,
... | Test |
1,031 | 2 | Cray_Operating_System:cray operating system cray operating system cos succeeded chippewa operating system shipped earlier computer systems cdc 6000 series cdc 7600 cray research discontinued proprietary operating system cray-1 1976 cray x-mp supercomputers platforms main os replaced unicos late 1980s cos delivered cray assembly language cal cray fortran cft pascal cos written ex-control data employees command language internal organization bore strong resemblance scope operating system cdc 7600 exec*8 cdc earlier era/univac pedigree user jobs submitted cos via front-end computers via high-speed channel interface so-called station software front end stations typically large ibm control data mainframes however dec vax also popular front-end interactive use cos possible stations users simply submitted batch jobs disk-resident datasets used user program 'local individual job job completed local datasets would released space reclaimed order retain data jobs datasets explicitly made 'permanent magnetic tape datasets also supported cray systems equipped i/o subsystem cos also provided job scheduling checkpoint/restart facilities manage large workloads even across system downtimes scheduled unscheduled internally cos divided small message-passing exec number system task processors stp tasks stp task similar nature peripheral processor programs earlier control data operating systems however since cray machines peripheral processors main central processor executed operating system code source version 1.13 released public domain 1.17 available archive.org | [
9991,
1480,
7497,
8524,
7983,
6675,
3323,
11517
] | None |
1,032 | 2 | Instant-on:instant-on computers instant-on ability boot nearly instantly thus allowing go online use specific application without waiting pc traditional operating system launch instant-on technology today mostly used laptops netbooks nettops user boot one program instead waiting pc entire operating system boot instance user may want launch movie-playing program launch internet browser without needing whole operating system true instant-on machines atari st described booting article machines complete operating systems resident rom similar way bios function conventionally provided current computer architectures instant-on concept used results loading os legacy system dos small hard drive footprint latency inherent mechanical drive performance also eliminated using live usb live sd flash memory load systems electronic speeds orders magnitude faster instant-on operating system like used 1980s home computers commodore 64 offers many advantages standard modern operating system however comes price limited local functionality focusing web cloud services past consumer electronics manufacturers would emblazon radios television sets instant instant play decals series filament sets instant-on accomplished adding silicon diode across power switch keep tube filaments lit 50 power diode placed typical half wave rectifier day reverse-biased instant-on advantages included near-instant operation television radio potentially longer vacuum tube life disadvantages included energy consumption risk fire solid state consumer electronics inherently instant-on moniker survived early solid state era differentiate product vacuum-tube based brethren crts notable exception | [
2658,
5384,
1515,
8044,
3886,
7983,
4432,
5681,
7515,
10192,
823,
1400,
5721,
2811,
4637
] | Test |
1,033 | 8 | Angelfish_software:angelfish software angelfish software on-premises self-hosted web analytics application allows organizations monitor users interact websites web-based applications angelfish use web server logs javascript page tags create reports first released 2013 angelfish software created response google cancellation urchin lack options existed on-premises web analytics software angelfish popular solution tracking intranet sharepoint environments significant interest organizations required protect website visitor data due regulations use google analytics due data privacy concerns | [
4096,
6797,
823,
7983,
6576,
1943
] | Test |
1,034 | 1 | Doctrine_(PHP):doctrine php doctrine project doctrine set php libraries primarily focused providing persistence services related functionality prize projects object-relational mapper orm database abstraction layer built top one doctrine key features option write database queries doctrine query language dql object-oriented dialect sql entities doctrine 2 lightweight php objects contain persistable properties persistable property instance variable entity saved retrieved database doctrine ’ data mapping capabilities via entity manager implementation data mapper pattern doctrine 1.x follows active record pattern working data class corresponds database table instance programmer wanted create new user object database would longer need write sql queries instead could use following php code one feature doctrine low level configuration needed start project doctrine generate object classes existing database programmer specify relations add custom functionality generated classes need generate maintain complex xml database schemas seen many frameworks another key feature doctrine ability optionally write database queries oo object oriented sql dialect called dql doctrine query language inspired hibernate hql alternately querybuilder class doctrine_query doctrine 1.x allows one construct queries fluent interface interfaces provide developers powerful alternatives sql maintain flexibility still allow switching database back-ends without requiring code duplication writing queries explicitly however always necessary doctrine performs joins fetches related objects automatically small projects easily constructed without writing queries notable features doctrine doctrine started konsta vesterinen also known zyne- project initial commit made april 13 2006 project became mature adoption began pick long community active development receiving regular contributions among others google summer code project doctrine 1.0.0 released september 1 2008 first stable version doctrine 2.0 released december 22 2010 2.5 years dedicated development starting early 2008 doctrine influenced dozens projects many different people largest influences java orm hibernate activerecord ruby rails orm solutions implemented fully featured solution java ruby languages purpose doctrine project build equally powerful solution php language high-load websites maintain constant flow visitors doctrine orm used improve performance websites | [
3080,
9481,
6154,
9614,
9245,
2465,
5537,
7074,
10919,
5546,
2348,
5677,
10413,
7983,
3763,
190,
10048,
8644,
11259,
4171,
6860,
10587,
11357,
479,
3553,
7785,
7147,
5612,
10737,
4853,
9467,
2556,
7293
] | None |
1,035 | 1 | Connection_pool:connection pool software engineering connection pool cache database connections maintained connections reused future requests database required connection pools used enhance performance executing commands database opening maintaining database connection user especially requests made dynamic database-driven website application costly wastes resources connection pooling connection created placed pool used new connection established connections used new connection made added pool connection pooling also cuts amount time user must wait establish connection database web-based enterprise applications use application server handle connection pooling dynamic web pages without connection pooling open connections database services required close page done servicing particular request pages use connection pooling hand maintain open connections pool page requires access database simply uses existing connection pool establishes new connection pooled connections available reduces overhead associated connecting database service individual requests local applications need frequent access databases also benefit connection pooling open connections maintained local applications n't need service separate remote requests like application servers implementations connection pooling become complicated number available libraries implement connection pooling related sql query pooling simplifying implementation connection pools database-intensive applications administrators configure connection pools restrictions numbers minimum connections maximum connections idle connections optimize performance pooling specific problem contexts specific environments.. connection pooling supported ibm db2 microsoft sql server oracle mysql postgresql neo4j | [
9988,
10340,
72,
7022,
2804,
853,
11030,
8539
] | None |
1,036 | 5 | Jingle_(protocol):jingle protocol jingle extension extensible messaging presence protocol xmpp adds peer-to-peer p2p session control signaling multimedia interactions voice ip voip videoconferencing communications designed google xmpp standards foundation multimedia streams delivered using real-time transport protocol rtp needed nat traversal assisted using interactive connectivity establishment ice proposed jingle specification yet approved xmpp standards foundation draft standard meaning implementations encouraged protocol appropriate deployment production systems changes protocol possible becomes final standard libjingle library used google talk implement jingle released public bsd license implements current standard protocol older pre-standard version though instant messaging client remotevnc uses jingle one screen sharing means | [
10242,
5251,
3460,
5382,
4746,
11408,
3610,
3228,
10271,
3105,
9381,
9511,
1962,
5677,
9519,
8758,
1467,
6208,
8640,
1218,
6982,
6855,
2760,
1738,
2892,
3792,
3284,
4318,
3812,
4068,
6628,
9572,
9320,
7407,
3959,
7928,
10748
] | None |
1,037 | 1 | Toad_(software):toad software toad database management toolset quest software database developers database administrators data analysts use manage relational non-relational databases using sql toad products developers dbas run oracle sql server ibm db2 luw z/os sap mysql well toad product data preparation supports data platforms toad solutions enable data professionals automate processes minimize risks cut project delivery timelines jim mcdaniel aka toadman practicing oracle dba originally designed toad use mid-1990s called tool oracle application developers toad short mcdaniel made tool available others first shareware later freeware distributing freely internet user base grew effort maintenance development finally mcdaniel realized could longer dedicate substantial amounts time growing quantity software enhancement requests quest software established 1987 acquired toad october 1998 quest software acquired dell 2012 form dell software june 2016 dell announced sale software division including quest business francisco partners elliott management corporation october 31 2016 sale finalized november 1 2016 sale dell software francisco partners elliott management completed company re-launched quest software toad products currently part quest software portfolio | [
6850,
10340,
1560,
10413,
270,
3951,
9112,
4630,
10518,
1400,
9177,
5051,
4255
] | None |
1,038 | 2 | Virtual_CD-ROM_switching_utility:virtual cd-rom switching utility virtual cd-rom switching utilities programs disable virtual cd-rom drive found many devices virtual cd-rom switching utility mode switching tool controlling flip flop multiple device usb gear several new usb devices especially high-speed wireless wan equipment seems chipset qualcomm offering feature microsoft windows device drivers board plugged first time act like usb flash drive start installing device driver every consecutive plugging device driver switches mode internally storage device vanishes cases new device like usb modem shows wireless wan wwan gear maker option calls feature zerocd tm usb sniffing programs libusb possible eavesdrop communication ms windows device driver isolate command action switching reproduce thing rule linux bsd variants problem usb 3g modems two modes one mode usb flash drive mode modem typically ship windows device drivers sometimes mac device drivers well case seemingly seldom ever ship linux device drivers normally happens windows device starts usb flash drive hardware drivers installed responsible switching device modem mode use switch done via codes specific device controlling software pass command switch disk modem mode virtual cd-rom switching utility manages switch mode disk modem latter disconnects mounted disk containing software n't care wo n't work anyway crucially creates modem port/serial device usually /dev/ttyusb0 networkmanager approach adding virtual cd-rom software drivers 3g storage devices two problems presumably raises cost device may ship outdated software even viruses times up-to-date drivers anyway built operating systems systems implementing usb standard like gnu/linux 3g device usb serial port storage device ... usb storage device virtual cd-rom u3-compatible devices removed u3-tool utility 3g devices huawei support complete disabling virtual cd-rom device uses zerocd method means behaves usb cd-rom first connected virtual cd-rom inserted windows device drivers related cosmote control program windows device drivers installed special usb command sent device “ switch ” modem mode ozerocdoff temporarily disables zerocd usb option wwan modem new usb option wwan modem devices support cd-rom device holds needed windows device driver use wwan modem therefore firmware wwan modem announces usb enumeration process work virtual cd-rom device vendor name zoption device called zero-cd ozerocdoff solution switch zero-cd allow modem used modem usb_modeswitch virtual cd-rom switching utility version 1.0.3 upwards simple framework integrating switching udev device manager make fully automatic switch2modem designed switching 3g usb modem program works opensolaris huaweiaktbbo.c utility compiled re-creates usb communication used windows | [
1952,
1121,
11363,
9863,
6797,
8115,
2525
] | Train |
1,039 | 9 | AIMMS:aimms aimms acronym advanced interactive multidimensional modeling system prescriptive analytics software company offices netherlands united states china singapore two main product offerings provide modeling optimization capabilities across variety industries aimms prescriptive analytics platform allows advanced users develop optimization-based applications deploy business users aimms sc navigator launched 2017 built aimms prescriptive analytics platform provides configurable apps supply chain teams sc navigator provides supply chain analytics non-advanced users aimms b.v. founded 1989 mathematician johannes bisschop name paragon decision technology vision make optimization approachable building models rather programming bisschop ’ view modeling able build bridge people problems people helping solve problems aimms began software system designed modeling solving large-scale optimization scheduling-type problems aimms considered one five important algebraic modeling languages bisschop awarded informs impact prize work language 2003 aimms acquired small private equity firm led creation partnership program technical investment evolution platform 2011 company launched aimms pro way deploy applications end-users technical background quickly followed ability publish customize applications using browser decision support applications available device company grew 2017 recognized top b2b technology netherlands named one fastest growing companies netherlands second consecutive year along growing interest embedded advanced analytics supply chain management aimss developed aimms sc navigator platform allow supply chain analytics launched october 2017 three initial cloud-based apps supply chain network design sales operations planning data navigator 2018 added center gravity product lifecycle aimms prescriptive analytics platform consists algebraic modeling language integrated development environment editing models creating graphical user interface around models graphical end-user environment aimms linked multiple solvers aimms open solver interface supported solvers include cplex mosek fico xpress cbc conopt minos ipopt snopt knitro cp optimizer aimms features mixture declarative imperative programming styles formulation optimization models takes place declarative language elements sets indices well scalar multidimensional parameters variables constraints common algebraic modeling languages allow concise description problems domain mathematical optimization units measurement natively supported language compile- runtime unit analysis may employed detect modeling errors procedures control flow statements available aimms support re-use common modeling components aimms allows modelers organize model user model libraries aimms supports wide range mathematical optimization problem types uncertainty taken account deterministic linear mixed integer optimization models aimms specification additional attributes stochastic robust optimization techniques applied alongside existing deterministic solution techniques custom hybrid decomposition algorithms constructed using gmp system library makes available modeling level many basic building blocks used internally higher level solution methods present aimms matrix modification methods well specialized steps customizing solution algorithms specific problem types optimization solutions created aimms used either standalone desktop application embedded software component applications aimms prescriptive analytics platform used wide range industries including retail consumer products healthcare oil chemicals steel production agribusiness ge grid uses aimms modeling optimization engine energy market clearing software together ge grid aimms part analytics team midwest iso franz edelman award achievement operations research management sciences 2011 successfully applying operations research midwest iso energy market 2012 tnt express aimms customer franz edleman award modernizing operations reducing carbon footprint aimms platform also used dutch delta team develop implement new method calculating efficient levels flood protection netherlands edelman prize 2013 | [
5347,
5830,
329,
4042,
8113,
4019,
2804,
2901,
9915,
6718,
479
] | None |
1,040 | 1 | National_Recreation_Database:national recreation database national recreation database nrdb online database canadian parks recreation-related information maintained leisure information network lin national non-profit organization prime intent establishing repository unpublished “ grey ” literature contributed recreation profession national research database makes accessible previously unpublished sector-related literature tools encourage knowledge sharing development amongst canadian recreation leisure practitioners repository also serves awareness promotional tool sharing news trends sector endorsed interprovincial sport recreation council body federal/provincial/territorial government ministers responsible recreation sport active living nrdb continuously growing currently containing 10,000 documents additional 8,300 records program success stories news events job postings etc solicited recreation parks health-promotion quality life organizations across country typical database addition housing resources generates content virtually every page lin website specialized rss feeds subscribers customized content partner websites database visited 65,000 unique users annually download resources valued 3.6m including intended users contribute well retrieve relevant information database information available download cost user proper citation | [] | None |
1,041 | 7 | List_of_BPEL_engines:list bpel engines list notable business process execution language bpel business process model notation bpmn engines | [
2501,
8070,
8425,
10236,
5677,
6862,
3573,
3894,
4088,
5210,
3323,
1756,
7261
] | None |
1,042 | 2 | Rosetta_(software):rosetta software rosetta discontinued dynamic binary translator mac os x allowed many powerpc applications run certain intel-based macintosh computers without modification apple released rosetta 2006 changed instruction set architecture macintosh platform powerpc intel processor name rosetta reference rosetta stone discovery made possible comprehend translate egyptian hieroglyphs rosetta based quicktransit technology graphical user interface led apple describe rosetta amazing software 'll never see rosetta initially included mac os x v10.4.4 tiger version released first intel-based macintosh models rosetta installed default mac os x v10.6 snow leopard retained option via installer apple software update users need run powerpc applications rosetta neither included supported mac os x v10.7 lion later therefore lion later releases current macintosh platform support powerpc applications rosetta part mac os x intel operating systems prior lion translates g3 g4 altivec instructions however translate g5 instructions therefore applications rely g5-specific instruction sets must modified developers work rosetta-supported intel-based macs according apple applications heavy user interaction low computational needs word processors well suited translation via rosetta applications high computational needs autocad games adobe photoshop pre-existing powerpc versions apple pro media-production applications final cut pro motion aperture logic pro supported rosetta require crossgrade universal binary version work rosetta-supported intel-based macs rosetta support following reason rosetta reduced compatibility compared apple earlier 68k emulator ppcs lies within implementation rosetta user-level program intercept emulate user-level code older emulator integrated system much lower level 68k emulator given access lowest levels os level tightly connected mac os nanokernel ppc macs later used multiprocessing mac os 8.6 later means nanokernel able intercept powerpc interrupts translate 68k interrupts mixed mode switch necessary executing 68k code handle interrupts allowed lines 68k ppc code interspersed within binary fat application similar effect could likely achieved mac os x running rosetta within xnu apple instead chose implement rosetta user-level process avoid excessive debugging potential security issues | [
4615,
5647,
4112,
4122,
6700,
4657,
1074,
576,
9802,
5713,
3670,
4184,
2141,
4702,
3167,
2149,
8303,
6771,
2676,
9337,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
6849,
713... | Test |
1,043 | 2 | Broadcast_Driver_Architecture:broadcast driver architecture broadcast driver architecture bda microsoft standard digital video capture microsoft windows operating systems encompasses atsc dvb standards gives developers standardized method accessing tv tuner devices usually pci pci-e usb driver component microsoft tv technologies used hardware vendors create digital tv tuning devices windows also support new network types custom hardware functionality bda documented windows ddk driver development kit platform sdk ideally bda-compliant software compatible bda-compliant hardware applications using bda drivers include web tv windows built windows 98 windows windows xp media center edition mediaportal gb-pvr dvbviewer ulenet several third-party solutions broadcast driver architecture introduced windows 98 part windows driver model | [
10243,
10769,
9234,
11283,
1055,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
6797,
3224,
4771,
7846,
10414,
8391,
214,
9943,
9434,
2783,
736,
43... | Validation |
1,044 | 0 | N-gram:n-gram fields computational linguistics probability n -gram contiguous sequence n items given sample text speech items phonemes syllables letters words base pairs according application n -grams typically collected text speech corpus items words -grams may also called shingles using latin numerical prefixes n -gram size 1 referred unigram size 2 bigram less commonly digram size 3 trigram english cardinal numbers sometimes used e.g. four-gram five-gram computational biology polymer oligomer known size called k -mer instead n -gram specific names using greek numerical prefixes monomer dimer trimer tetramer pentamer etc. english cardinal numbers one-mer two-mer three-mer etc n -gram model type probabilistic language model predicting next item sequence form n − 1 –order markov model n -gram models widely used probability communication theory computational linguistics instance statistical natural language processing computational biology instance biological sequence analysis data compression two benefits n -gram models algorithms use simplicity scalability – larger n model store context well-understood space–time tradeoff enabling small experiments scale efficiently figure 1 shows several example sequences corresponding 1-gram 2-gram 3-gram sequences examples word-level 3-grams 4-grams counts number times appeared google n -gram corpus 3-grams 4-grams n -gram model models sequences notably natural languages using statistical properties n -grams idea traced experiment claude shannon work information theory shannon posed question given sequence letters example sequence ex likelihood next letter training data one derive probability distribution next letter given history size formula_1 0.4 b 0.00001 c 0 ... probabilities possible next-letters sum 1.0 concisely n -gram model predicts formula_2 based formula_3 probability terms formula_4 used language modeling independence assumptions made word depends last n − 1 words markov model used approximation true underlying language assumption important massively simplifies problem estimating language model data addition open nature language common group words unknown language model together note simple n -gram language model probability word conditioned number previous words one word bigram model two words trigram model etc described following categorical distribution often imprecisely called multinomial distribution practice probability distributions smoothed assigning non-zero probabilities unseen words n -grams see smoothing techniques n -gram models widely used statistical natural language processing speech recognition phonemes sequences phonemes modeled using n -gram distribution parsing words modeled n -gram composed n words language identification sequences characters/graphemes e.g letters alphabet modeled different languages sequences characters 3-grams sometimes referred trigrams generated good morning goo ood od mo mor forth counting space character gram sometimes beginning end text modeled explicitly adding _g _go ng_ g_ _ sequences words trigrams shingles generated dog smelled like skunk dog dog smelled dog smelled like smelled like like skunk skunk practitioners interested multiple word terms might preprocess strings remove spaces many simply collapse whitespace single space preserving paragraph marks whitespace frequently either element writing style introduces layout presentation required prediction deduction methodology punctuation also commonly reduced removed preprocessing frequently used trigger functionality n -grams also used sequences words almost type data example used extracting features clustering large sets satellite earth images determining part earth particular image came also successful first pass genetic sequence search identification species short sequences dna originated n -gram models often criticized lack explicit representation long range dependency explicit dependency range n − 1 tokens n -gram model since natural languages incorporate many cases unbounded dependencies wh-movement means n -gram model principle distinguish unbounded dependencies noise since long range correlations drop exponentially distance markov model reason n -gram models made much impact linguistic theory part explicit goal model dependencies another criticism made markov models language including n -gram models explicitly capture performance/competence distinction n -gram models designed model linguistic knowledge make claims even potentially complete models linguistic knowledge instead used practical applications practice n -gram models shown extremely effective modeling language data core component modern statistical language applications modern applications rely n -gram based models machine translation applications rely exclusively models instead typically also incorporate bayesian inference modern statistical models typically made two parts prior distribution describing inherent likelihood possible result likelihood function used assess compatibility possible result observed data language model used used part prior distribution e.g gauge inherent goodness possible translation even often component distribution handcrafted features various sorts also used example variables represent position word sentence general topic discourse addition features based structure potential result syntactic considerations often used features also used part likelihood function makes use observed data conventional linguistic theory incorporated features although practice rare features specific generative particular theories grammar incorporated computational linguists tend agnostic towards individual theories grammar issue using n-gram language models out-of-vocabulary oov words encountered computational linguistics natural language processing input includes words present system dictionary database preparation default language model estimated entire observed vocabulary used cases may necessary estimate language model specific fixed vocabulary scenario n-grams corpus contain out-of-vocabulary word ignored n-gram probabilities smoothed words vocabulary even observed nonetheless essential cases explicitly model probability out-of-vocabulary words introducing special token e.g unk vocabulary out-of-vocabulary words corpus effectively replaced special unk token n-grams counts cumulated option possible estimate transition probabilities n-grams involving out-of-vocabulary words n -grams also used efficient approximate matching converting sequence items set n -grams embedded vector space thus allowing sequence compared sequences efficient manner example convert strings letters english alphabet single character 3-grams get formula_5-dimensional space first dimension measures number occurrences aaa second aab forth possible combinations three letters using representation lose information string example strings abc bca give rise exactly 2-gram bc although ab bc clearly bc ca however know empirically two strings real text similar vector representation measured cosine distance likely similar metrics also applied vectors n -grams varying sometimes better results example z-scores used compare documents examining many standard deviations n -gram differs mean occurrence large collection text corpus documents form background vector event small counts g-score also known g-test may give better results comparing alternative models also possible take principled approach statistics n -grams modeling similarity likelihood two strings came source directly terms problem bayesian inference n -gram-based searching also used plagiarism detection n -grams find use several areas computer science computational linguistics applied mathematics used choose value n n -gram model necessary find right trade stability estimate appropriateness means trigram i.e triplets words common choice large training corpora millions words whereas bigram often used smaller ones problems balance weight infrequent grams example proper name appeared training data frequent grams also items seen training data given probability 0.0 without smoothing unseen plausible data sample one introduce pseudocounts pseudocounts generally motivated bayesian grounds practice necessary smooth probability distributions also assigning non-zero probabilities unseen words n -grams reason models derived directly n -gram frequency counts severe problems confronted n -grams explicitly seen – zero-frequency problem various smoothing methods used simple add-one laplace smoothing assign count 1 unseen n -grams see rule succession sophisticated models good–turing discounting back-off models methods equivalent assigning prior distribution probabilities n -grams using bayesian inference compute resulting posterior n -gram probabilities however sophisticated smoothing models typically derived fashion instead independent considerations field computational linguistics particular language modeling skip-grams generalization n -grams components typically words need consecutive text consideration may leave gaps skipped provide one way overcoming data sparsity problem found conventional n -gram analysis formally -gram consecutive subsequence length sequence tokens -skip -- gram length- subsequence components occur distance example input text set 1-skip-2-grams includes bigrams 2-grams addition subsequences syntactic n -grams n -grams defined paths syntactic dependency constituent trees rather linear structure text example sentence economic news little effect financial markets transformed syntactic n -grams following tree structure dependency relations news-economic effect-little effect-on-markets-financial syntactic n -grams intended reflect syntactic structure faithfully linear n -grams many applications especially features vector space model syntactic n -grams certain tasks gives better results use standard n -grams example authorship attribution another type syntactic n -grams part-of-speech n -grams defined fixed-length contiguous overlapping subsequences extracted part-of-speech sequences text part-of-speech n -grams several applications commonly information retrieval | [
5122,
8323,
264,
2440,
2059,
6798,
11538,
1044,
1941,
5399,
538,
3998,
3748,
2858,
7599,
10160,
4531,
4662,
3127,
2488,
8759,
10557,
3646,
6208,
6336,
586,
203,
3533,
5197,
6223,
10319,
8538,
5214,
5857,
1890,
5218,
7780,
4070,
4072,
1771... | Validation |
1,045 | 9 | Edinburgh_IMP:edinburgh imp edinburgh imp development atlas autocode initially developed around 1966-1969 edinburgh university scotland imp general-purpose programming language used heavily systems programming expressively imp extremely similar algol includes algol-style block structure reserved keywords datatypes arrays records adds algol-style languages string type akin flex array char built-in operators string manipulation character handling imp provides significant control storage mapping data plus commands addressing within parts words imp compilers offer compiler-generated run-time checks backtrace facility default even production code imp allows programmer inline machine language instructions imp source code early imp compilers developed english electric kdf9 icl system 4 univac 1108 ibm 360 dec pdp-9 dec pdp-15 ctl modular one computers imp used implement emas operating system later years version imp called imp77 developed peter robertson within computer science department edinburgh portable compiler brought imp even platforms 2002 imp77 language resurrected edinburgh computer history project intel x86 hardware running dos windows linux use edinburgh graduates ex-pats diverged imp imp77 later consolidated single language introduction imp80 standard supported implementations edinburgh regional computer centre imp80 also ported several platforms including intel actively use 1990s edinburgh imp unrelated later imp developed irons cdc 6600 main language used nsa many years | [
512,
1952,
486,
1610,
7983,
2650
] | None |
1,046 | 4 | Superfish:superfish superfish advertising company developed various advertising-supported software products based visual search engine company based palo alto california founded israel 2006 regarded part country download valley cluster adware companies superfish software described malware adware many sources software bundled various applications early 2010 lenovo began bundle software computers september 2014 february 20 2015 united states department homeland security advised uninstalling associated root certificate make computers vulnerable serious cyberattacks including interception passwords sensitive data transmitted browsers superfish founded 2006 adi pinhas michael chertok pinhas graduate tel aviv university 1999 co-founded vigilant technology “ invented digital video recording surveillance market ” according linkedin profile worked verint intelligence company analyzed telephone signals allegedly tapped verizon communication lines chertok graduate technion bar-ilan university 10 years experience large scale real-time data mining systems since founding superfish used team dozen phds primarily develop algorithms comparison matching images released first product windowshopper 2011 windowshopper immediately prompted large number complaints internet message boards users n't know software installed machines superfish initially received funding draper fisher jurvetson date raised 20 million mostly dfj vintage investment partners forbes listed company number 64 list america promising companies pinhas 2014 stated visual search replace keyboard ... visual search cases words describe see 2014 superfish products 80 million users may 2015 following lenovo security incident see distance fallout team behind superfish changed name moved activities justvisual.com users expressed concerns scans ssl-encrypted web traffic superfish visual search software pre-installed lenovo machines since least early december 2014 became major public issue however february 2015 installation included universal self-signed certificate authority certificate authority allows man-in-the-middle attack introduce ads even encrypted pages certificate authority private key across laptops allows third-party eavesdroppers intercept modify https secure communications without triggering browser warnings either extracting private key using self-signed certificate. ref name= komodia/superfish ssl validation broken /ref february 20 2015 microsoft released update windows defender removes superfish article slate tech writer david auerbach compares incident sony drm rootkit scandal said lenovo actions installing superfish one irresponsible mistakes established tech company ever made february 24 2015 heise security published article revealing certificate question would also spread number applications companies including say media lavasoft ad-aware web companion criticisms superfish software predated lenovo incident limited lenovo user community early 2010 apple mozilla firefox microsoft windows users expressed concerns online support discussion forums superfish software installed computers without knowledge bundled software ceo pinhas statement prompted lenovo disclosures maintained security flaw introduced superfish software directly attributable code rather appears third-party add-on introduced potential vulnerability know product identified source problem code authored tech company komodia deals among things website security certificates komodia code also present applications among parental-control software experts said komodia tool could imperil company program using code found within superfish fact komodia refers https-decrypting interception software ssl hijacker since least january 2011 use 100 corporate clients may jeopardize sensitive data lenovo customers also much larger base pc users superfish first product windowshopper developed browser add-on desktop mobile devices directing users hover browser images shopping web sites purchase similar products 2014 windowshopper approximately 100 million monthly users according xconomy high conversion sale rate soft goods superfish business model based receiving affiliate fees sale core technology superfish visualdiscovery installed man-in-the-middle proxy lenovo laptops injects advertising results internet search engines also intercepts encrypted ssl/tls connections 2014 superfish released new apps based image search technology | [
4478,
8674,
517,
106,
9771,
877,
6382,
5935,
6797,
10448,
10392,
7515,
4605,
510,
4863
] | Test |
1,047 | 3 | Apache_Apex:apache apex apache apex yarn-native platform unifies stream batch processing processes big data-in-motion way scalable performant fault-tolerant stateful secure distributed easily operable apache apex named top-level project apache software foundation april 25 2016 apache apex developed apache license 2.0 project driven san jose california-based start-up company datatorrent two parts apache apex apex core apex malhar apex core platform framework building distributed applications hadoop core apex platform supplemented malhar library connector logic functions enabling rapid application development input output operators provide templates sources sinks alluxio s3 hdfs nfs ftp kafka activemq rabbitmq jms cassandra mongodb redis hbase couchdb generic jdbc database connectors datatorrent developed platform since 2012 decided open source core became apache apex entered incubation august 2015 became apache software foundation top level project within 8 months datatorrent shuts may 2018 apex big data world conference apache apex first conference apex big data world took place 2017 held pune india mountain view california usa | [
10377,
8460,
7567,
1296,
2193,
6161,
1913,
8217,
6555,
8860,
11161,
3877,
10661,
11303,
5677,
1327,
7983,
7347,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
7364,
11201,
1222,
1991,
4294,
7750,
5066,
8139,
4944,
1363,
... | None |
1,048 | 7 | Cloud_manufacturing:cloud manufacturing cloud manufacturing cmfg new manufacturing paradigm developed existing advanced manufacturing models e.g. asp nm mgrid enterprise information technologies support cloud computing internet things iot virtualization service-oriented technologies advanced computing technologies transforms manufacturing resources manufacturing capabilities manufacturing services managed operated intelligent unified way enable full sharing circulating manufacturing resources manufacturing capabilities cmfg provide safe reliable high quality cheap on-demand manufacturing services whole lifecycle manufacturing concept manufacturing refers big manufacturing includes whole lifecycle product e.g design simulation production test maintenance concept cloud manufacturing initially proposed research group led prof. bo hu li prof. lin zhang china 2009. cloud manufacturing introduced cloud manufacturing type parallel networked distributed system consisting integrated inter-connected virtualized service pool manufacturing cloud manufacturing resources capabilities well capabilities intelligent management on-demand use services provide solutions kinds users involved whole lifecycle manufacturing cloud manufacturing divided two categories cmfg system various manufacturing resources abilities intelligently sensed connected wider internet automatically managed controlled using iot technologies e.g. rfid wired wireless sensor network embedded system manufacturing resources abilities virtualized encapsulated different manufacturing cloud services mcss accessed invoked deployed based knowledge using virtualization technologies service-oriented technologies cloud computing technologies mcss classified aggregated according specific rules algorithms different kinds manufacturing clouds constructed different users search invoke qualified mcss related manufacturing cloud according needs assemble virtual manufacturing environment solution complete manufacturing task involved whole life cycle manufacturing processes support cloud computing service-oriented technologies advanced computing technologies four types cloud deployment modes public private community hybrid clouds ubiquitous single point access resource ’ perspective kind manufacturing capability requires support related manufacturing resource type manufacturing capability related manufacturing resource comes two forms soft resources hard resources | [
5689,
4194,
11117,
9797
] | None |
1,049 | 3 | Replication_(computing):replication computing replication computing involves sharing information ensure consistency redundant resources software hardware components improve reliability fault-tolerance accessibility replication computing refer replication space time often linked scheduling algorithms access replicated entity typically uniform access single non-replicated entity replication transparent external user failure scenario failover replicas hidden much possible respect quality service qos computer scientists describe replication either one master replica designated process requests system using primary-backup master-slave scheme predominant high-availability clusters comparison replica process request distribute new state system using multi-primary multi-master scheme latter case form distributed concurrency control must used distributed lock manager load balancing differs task replication since distributes load different computations across machines allows single computation dropped case failure load balancing however sometimes uses data replication especially multi-master replication internally distribute data among machines backup differs replication saved copy data remains unchanged long period time replicas hand undergo frequent updates quickly lose historical state replication one oldest important topics overall area distributed systems data replication computation replication require processes handle incoming events processes data replication passive operate maintain stored data reply read requests apply updates computation replication usually performed provide fault-tolerance take operation one component fails cases underlying needs ensure replicas see events equivalent orders stay consistent states replica respond queries three widely cited models exist data replication properties performance database replication used many database management systems dbms usually master-slave relationship original copies master logs updates ripple slaves slave outputs message stating received update successfully thus allowing sending subsequent updates multi-master replication updates submitted database node ripple servers often desired introduces substantially increased costs complexity may make impractical situations common challenge exists multi-master replication transactional conflict prevention resolution synchronous eager replication solutions perform conflict prevention asynchronous lazy solutions perform conflict resolution instance record changed two nodes simultaneously eager replication system would detect conflict confirming commit abort one transactions lazy replication system would allow transactions commit run conflict resolution resynchronization resolution conflict may based timestamp transaction hierarchy origin nodes much complex logic decides consistently across nodes database replication becomes complex scales usually described two dimensions horizontal vertical horizontal scale-up data replicas vertical scale-up data replicas located greater physical distances problems raised horizontal scale-up alleviated multi-layer multi-view access protocol early problems vertical scale-up largely addressed improving internet reliability performance data replicated database servers information remains consistent throughout database system users tell even know server dbms using system said exhibit replication transparency active real-time storage replication usually implemented distributing updates block device several physical hard disks way file system supported operating system replicated without modification file system code works level block device driver layer implemented either hardware disk array controller software device driver basic method disk mirroring typical locally connected disks storage industry narrows definitions mirroring local short-distance operation replication extendable across computer network disks located physically distant locations master-slave database replication model usually applied purpose replication prevent damage failures disasters may occur one location – case events occur improve ability recover data replication latency key factor determines either far apart sites type replication employed main characteristic cross-site replication write operations handled either synchronous asynchronous replication main difference synchronous replication needs wait destination server write operation synchronous replication guarantees zero data loss means atomic write operations write operation considered complete acknowledged local remote storage applications wait write transaction complete proceeding work hence overall performance decreases considerably inherently performance drops proportionally distance minimum latency dictated speed light 10 km distance fastest possible roundtrip takes 67 μs whereas entire local cached write completes 10–20 μs asynchronous replication write operation considered complete soon local storage acknowledges remote storage updated small lag performance greatly increased case local storage failure remote storage guaranteed current copy data recent data may lost semi-synchronous replication typically considers write operation complete acknowledged local storage received logged remote server actual remote write performed asynchronously resulting better performance remote storage lag behind local storage guarantee durability i.e seamless transparency case local storage failure point-in-time replication produces periodic snapshots replicated instead primary storage intended replicate changed data instead entire volume less information replicated using method replication occur less-expensive bandwidth links iscsi t1 instead fiber optic lines many distributed filesystems use replication ensure fault tolerance avoid single point failure many commercial synchronous replication systems freeze remote replica fails loses connection – behaviour guarantees zero data loss – proceed operate locally losing desired zero recovery point objective techniques wide-area network wan optimization applied address limits imposed latency file-based replication conducts data replication logical level i.e individual data files rather storage block level many different ways performing almost exclusively rely software kernel driver specifically filter driver used intercept calls filesystem functions capturing activity occurs utilises type technology real-time active virus checkers employ level logical file operations captured like file open write delete etc kernel driver transmits commands another process generally network different machine mimic operations source machine like block-level storage replication file-level replication allows synchronous asynchronous modes synchronous mode write operations source machine held allowed occur destination machine acknowledged successful replication synchronous mode less common file replication products although solutions exist file-level replication solutions allow informed decisions replication based location type file example temporary files parts filesystem hold business value could excluded data transmitted also granular application writes 100 bytes 100 bytes transmitted instead complete disk block generally 4096 bytes substantially reduces amount data sent source machine storage burden destination machine drawbacks software-only solution include requirement implementation maintenance operating system level increased burden machine processing power similarly database transaction logs many file systems ability journal activity journal sent another machine either periodically real time streaming replica side journal used play back file system modifications one notable implementations microsoft system center data protection manager dpm released 2005 performs periodic updates offer real-time replication process comparing source destination file systems ensuring destination matches source key benefit solutions generally free inexpensive downside process synchronizing quite system-intensive consequently process generally runs infrequently one notable implementations rsync another example using replication appears distributed shared memory systems many nodes system share page memory usually means node separate copy replica page many classical approaches replication based primary-backup model one device process unilateral control one processes devices example primary might perform computation streaming log updates backup standby process take primary fails approach common replicating databases despite risk portion log lost failure backup might state identical primary transactions could lost weakness primary-backup schemes one actually performing operations fault-tolerance gained identical backup system doubles costs reason starting distributed systems research community began explore alternative methods replicating data outgrowth work emergence schemes group replicas could cooperate process acting backup also handling share workload computer scientist jim gray analyzed multi-primary replication schemes transactional model published widely cited paper skeptical approach dangers replication solution argued unless data splits natural way database treated n disjoint sub-databases concurrency control conflicts result seriously degraded performance group replicas probably slow function n gray suggested common approaches likely result degradation scales n³ solution partition data viable situations data actually natural partitioning key 1985–1987 virtual synchrony model proposed emerged widely adopted standard used isis toolkit horus transis ensemble totem spread c-ensemble phoenix quicksilver systems basis corba fault-tolerant computing standard virtual synchrony permits multi-primary approach group processes cooperates parallelize aspects request processing scheme used forms in-memory data provide linear speedups size group number modern products support similar schemes example spread toolkit supports virtual synchrony model used implement multi-primary replication scheme would also possible use c-ensemble quicksilver manner wandisco permits active replication every node network exact copy replica hence every node network active one time scheme optimized use wide area network wan | [
2051,
10258,
2068,
5658,
9248,
10272,
9762,
10793,
10286,
9782,
1594,
11324,
1086,
10302,
8772,
9286,
2632,
9290,
8788,
10326,
7767,
7256,
4194,
9828,
10340,
4710,
8295,
8808,
3692,
2669,
1136,
6769,
11377,
9844,
1142,
9335,
121,
1146,
7802... | None |
1,050 | 7 | Virtual_Object_System:virtual object system virtual object system vos computer software technology creating distributed object systems sites hosting vobjects typically linked computer network local area network internet vobjects may send messages vobjects network links remotely within host site locally perform actions synchronize state way vos may also called object-oriented remote procedure call system addition vobjects may number directed relations vobjects allows form directed graph data structures vos patent free implementation free software primary application focus vos general purpose multiuser collaborative 3d virtual environments virtual reality primary designer author vos peter amstutz | [
9441,
7983
] | Test |
1,051 | 9 | Reactive_programming:reactive programming computing reactive programming declarative programming paradigm concerned data streams propagation change paradigm possible express static e.g. arrays dynamic e.g. event emitters data streams ease also communicate inferred dependency within associated execution model exists facilitates automatic propagation changed data flow example imperative programming setting formula_1 would mean formula_2 assigned result formula_3 instant expression evaluated later values formula_4 formula_5 changed effect value formula_2 hand reactive programming value formula_2 automatically updated whenever values formula_4 formula_5 change without program re-execute statement formula_1 determine presently assigned value formula_11 another example hardware description language verilog reactive programming enables changes modeled propagate circuits reactive programming proposed way simplify creation interactive user interfaces near-real-time system animation example model–view–controller mvc architecture reactive programming facilitate changes underlying model reflected automatically associated view several popular approaches employed creation reactive programming languages specification dedicated languages specific various domain constraints constraints usually characterized real-time embedded computing hardware description another approach involves specification general-purpose languages include support reactivity approaches articulated definition use programming libraries embedded domain-specific languages enable reactivity alongside top programming language specification use different approaches results language capability trade-offs general restricted language associated compilers analysis tools able inform developers e.g. performing analysis whether programs able execute actual real time functional trade-offs specificity may result deterioration general applicability language variety models semantics govern family reactive programming loosely split along following dimensions reactive programming language runtimes represented graph identifies dependencies among involved reactive values graph nodes represent act computing edges model dependency relationships runtime employs said graph help keep track various computations must executed anew involved input changes value various abstract implementation approaches enable specification reactive programming flow data explicitly described employment graph common algorithms implementation level event reaction consists propagation across graph information characterizes existence change consequently computations affected change become outdated must flagged re-execution computations usually characterized transitive closure change associated source change propagation may lead update value graph sinks graph propagated information consist node complete state i.e. computation result involved node cases node previous output ignored another method involves delta propagation i.e incremental change propagation case information proliferated along graph edges consist delta describing previous node changed approach especially important nodes hold large amounts state data would otherwise expensive recompute scratch delta propagation essentially optimization extensively studied via discipline incremental computing whose approach requires runtime satisfaction involving view-update problem problem infamously characterized use database entities responsible maintenance changing data views another common optimization employment unary change accumulation batch propagation solution faster reduces communication among involved nodes optimization strategies employed reason nature changes contained within make alterations accordingly e.g two changes batch cancel thus simply ignored yet another available approach described invalidity notification propagation approach causes nodes invalid input pull updates thus resulting update outputs two principal ways employed building dependency graph propagating changes possible pick propagation orders value expression natural consequence source program illustrate easily example suppose codice_1 reactive value changes every second represent current time seconds consider expression codice_2 always greater codice_1 expression always evaluate true value unfortunately depend order evaluation codice_1 changes two expressions update codice_5 conditional first evaluates second invariant hold however conditional updates first using old value codice_2 new value codice_1 expression evaluate false value called glitch reactive languages glitch-free prove property usually achieved topologically sorting expressions updating values topological order however performance implications delaying delivery values due order propagation cases therefore reactive languages permit glitches developers must aware possibility values may temporarily fail correspond program source expressions may evaluate multiple times instance codice_8 may evaluate twice new value codice_1 arrives codice_2 updates topological sorting dependencies depends dependency graph directed acyclic graph dag practice program may define dependency graph cycles usually reactive programming languages expect cycles broken placing element along back edge permit reactive updating terminate typically languages provide operator like codice_11 used update mechanism purpose since codice_11 implies follows must evaluated next time step allowing current evaluation terminate reactive languages typically assume expressions purely functional allows update mechanism choose different orders perform updates leave specific order unspecified thereby enabling optimizations reactive language embedded programming language state however may possible programmers perform mutable operations make interaction smooth remains open problem cases possible principled partial solutions two solutions include reactive languages graph dependencies static i.e. graph fixed throughout program execution languages graph dynamic i.e. change program executes simple example consider illustrative example codice_1 reactive value every second value expression changes different reactive expression codice_14 depends therefore graph dependencies updates every second permitting dynamic updating dependencies provides significant expressive power instance dynamic dependencies routinely occur graphical user interface gui programs however reactive update engine must decide whether reconstruct expressions time keep expression node constructed inactive latter case ensure participate computation supposed active reactive programming languages range explicit ones data flows set using arrows implicit data flows derived language constructs look similar imperative functional programming example implicitly lifted functional reactive programming frp function call might implicitly cause node data flow graph constructed reactive programming libraries dynamic languages lisp cells python trellis libraries construct dependency graph runtime analysis values read function execution allowing data flow specifications implicit dynamic sometimes term reactive programming refers architectural level software engineering individual nodes data flow graph ordinary programs communicate reactive programming purely static data flows set statically dynamic data flows change execution program use data switches data flow graph could extent make static data flow graph appear dynamic blur distinction slightly true dynamic reactive programming however could use imperative programming reconstruct data flow graph reactive programming could said higher order supports idea data flows could used construct data flows resulting value data flow another data flow graph executed using evaluation model first ideally data changes propagated instantly assured practice instead might necessary give different parts data flow graph different evaluation priorities called differentiated reactive programming example word processor marking spelling errors need totally sync inserting characters differentiated reactive programming could potentially used give spell checker lower priority allowing delayed keeping data-flows instantaneous however differentiation introduces additional design complexity example deciding define different data flow areas handle event passing different data flow areas evaluation reactive programs necessarily based stack based programming languages evaluated instead data changed change propagated data derived partially completely data changed change propagation could achieved number ways perhaps natural way invalidate/lazy-revalidate scheme could problematic simply naively propagate change using stack potential exponential update complexity data structure certain shape one shape described repeated diamonds shape following structure a→b→a a→c→a n=1,2 ... problem could overcome propagating invalidation data already invalidated later re-validate data needed using lazy evaluation one inherent problem reactive programming computations would evaluated forgotten normal programming language needs represented memory data-structures could potentially make reactive programming highly memory consuming however research called lowering could potentially overcome problem side reactive programming form could described explicit parallelism could therefore beneficial utilizing power parallel hardware reactive programming principal similarities observer pattern commonly used object-oriented programming however integrating data flow concepts programming language would make easier express could therefore increase granularity data flow graph example observer pattern commonly describes data-flows whole objects/classes whereas object-oriented reactive programming could target members objects/classes stack-based evaluation model common object orientation also entirely suitable data-flow propagation occurrences tree feedback edges data structures could make program face exponential complexities relatively limited use low granularity rarely problem observer pattern practice possible fuse reactive programming ordinary imperative programming paradigm imperative programs operate upon reactive data structures set-up analogous constraint imperative programming however constraint imperative programming manages bidirectional constraints reactive imperative programming manages one-way dataflow constraints object-oriented reactive programming oorp combination object oriented programming reactive programming perhaps natural way make combination follows instead methods fields objects reactions automatically re-evaluate reactions depend modified illustration codice_15 introductory example using javascript jquery function seta // a=x+y integers seta // initial value x .css 'cursor 'pointer .click function oorp programming language maintains imperative methods would also fall category imperative reactive programming functional reactive programming frp programming paradigm reactive programming functional programming relatively new category programming languages uses constraints rules main programming concept consists reactions events keep constraints satisfied facilitate event-based reactions makes reactive programs instrumental correctness software example rule based reactive programming language ampersand founded relation algebra modern spreadsheet often cited example reactive programming problematic unqualified term spreadsheet may refer either confusion arises spreadsheet application 2 example reactive program program effectively defined underlying spreadsheet 1 typically reactive program semantically underlying spreadsheet 1 simply determines calculation set input cells set output cells thus could directly translated simple transformational calculation i.e function traditional programming language | [
9345,
3462,
6536,
9224,
6795,
6182,
9385,
7851,
10667,
8116,
1591,
2106,
10042,
4417,
10819,
9926,
3529,
2901,
3159,
5081,
7262,
4578,
228,
8430,
11125,
2680,
3705,
508
] | Train |
1,052 | 4 | Quick_Heal:quick heal quick heal technologies ltd security solutions provider headquartered pune india company formerly known cat computer services p ltd started computer service center 1995 company renamed quick heal technologies pvt ltd. 2007 company develops security software consumers servers cloud computing environments small medium enterprises sells products directly customers partner channel enterprise product offerings operate brand name seqrite companies products regularly tested features abilities compared similar products quick heal develops security suite quick heal total security uses bitdefender scanning engine quick heal founded 1995 cat computer services p ltd renamed 2007 quick heal technologies ltd listed bse nse 2010 quick heal received investment ₹ 60 crores sequoia capital new branch offices opened madurai tamil nadu 2012 offices opened japan us 2013 offices opened africa uae 2016 quick heal technologies acquired security firm junco technologies launch seqrite services 2016 quick heal technologies launched ipo valued company market value inr 1,500 crores | [
4480,
2049,
7809,
131,
5891,
1417,
3981,
10637,
4374,
156,
6431,
2721,
5924,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8615,
6834,
4403,
9523,
3382,
10166,
7103,
704,
9537,
7362,
10308,
4421,
202,
1355,
1994,
5069,
10574,
10708... | None |
1,053 | 3 | Extended_MMX:extended mmx extended mmx refers one two possible extensions mmx instruction set x86 included intel streaming simd extensions number new instructions extended functionality mmx amd incorporated subset extended mmx instructions athlon microarchitecture instructions commonly known extended mmx instructions instructions debuted may 1999 intel pentium iii processor part sse instruction set next month late june 1999 amd athlon processor released featured extended mmx instructions sse today extended mmx instructions notable common subset mmx extensions work across amd athlon sse-capable intel processors less commonly known extended mmx could also refer original cyrix emmi extended multi-media instructions instruction set developed cyrix implemented 6x86 mx mii line processors extended mmx instruction set 12 new instructions useful multimedia applications extensions enabled default requiring bios software enable emmi never given much support software developers acknowledged cyrix competitors certain intel sse instructions even share opcodes emmi instructions never implemented processors mii emmi instruction set included | [
1005,
499,
1915,
8125,
8126
] | Test |
1,054 | 5 | Universal_2nd_Factor:universal 2nd factor universal 2nd factor u2f open standard strengthens simplifies two-factor authentication 2fa using specialized universal serial bus usb near-field communication nfc devices based similar security technology found smart cards initially developed google yubico contribution nxp semiconductors standard hosted fido alliance usb devices communicate host computer using human interface device hid protocol essentially mimicking keyboard avoids need user install special hardware driver software host computer permits application software browser directly access security features device without user effort possessing inserting device communication established application exercises challenge–response authentication device using public-key cryptography methods secret unique device key manufactured device device key secured duplication degree social trust commercial manufacturer logically secured reverse-engineering counterfeiting robustness encryption physical possession u2f security keys supported google chrome since version 38 opera since version 40 u2f security keys used additional method two-step verification online services support u2f protocol including google dropbox github gitlab bitbucket nextcloud facebook others chrome firefox opera browsers supporting u2f natively microsoft enabled fido 2.0 support windows 10 windows hello login platform microsoft edge browser gained support u2f october 2018 windows update microsoft accounts including office 365 onedrive microsoft services yet u2f support mozilla integrated firefox 57 enabled default firefox 60 thunderbird 60 microsoft edge starting build 17723 support fido2 u2f standard undergone two major revisions additional specification documents may obtained fido web site u2f 1.0 proposed standard october 9 2014 starting point short-lived specification known fido 2.0 proposed standard september 4 2015 latter formally submitted world wide web consortium w3c november 12 2015 subsequently first working draft w3c web authentication webauthn standard published may 31 2016 webauthn standard revised numerous times since becoming w3c recommendation march 4 2019 meanwhile u2f 1.2 proposed standard april 11 2017 became starting point client authenticator protocol ctap proposed standard published september 27 2017 fido ctap complements w3c webauthn scope fido2 project webauthn ctap provide complete replacement u2f renamed ctap1 latest version fido2 standard webauthn protocol backwards-compatible via appid extension u2f-only security keys u2f protocol compatible webauthn-only authenticator authenticators support u2f webauthn webauthn clients support keys created via legacy u2f api | [
8584,
4623,
9745,
1945,
11418,
5918,
6316,
7212,
10801,
6975,
10566,
3271,
11221,
5078,
8674,
4326,
362,
9336,
124
] | None |
1,055 | 2 | Microsoft_Enterprise_Library:microsoft enterprise library microsoft enterprise library set tools programming libraries microsoft .net framework provides apis facilitate proven practices core areas programming including data access logging exception handling others enterprise library provided pluggable binaries source code freely used customized developers purposes also ships test cases quickstarts application block addresses specific cross-cutting concern provides highly configurable features results higher developer productivity application blocks enterprise library designed agnostic possible application architecture example logging application block may used equally web smart client service-oriented application patterns practices team produces number deliverables leverage enterprise library application blocks include web service software factory smart client software factory addition application blocks standard microsoft distribution enterprise library includes several versions microsoft enterprise library microsoft enterprise library 6 released april 2013 public announcements s.somasegar senior vp developer division grigori melnik enterprise library producer available new features include release also retired following 3 blocks details see release notes change log microsoft enterprise library 5.0 released april 2010 public announcement grigori melnik enterprise library producer available new features include note existing public apis v4.1 mostly supported list breaking changes see note several features demoed video note full change log see note optional update released may 2011 contains fixes unity interception file configuration source update required using silverlight integration pack need wcf ria services integration configuration tool support available via nuget http //www.microsoft.com/download/en/details.aspx id=6836 port microsoft enterprise library 5.0 silverlight includes following blocks public announcement http //blogs.msdn.com/b/agile/archive/2011/05/11/silverlight-integration-pack-for-microsoft-enterprise-library-5-0-released.aspx available individual blocks via nuget single download release enterprise library october 2008 service releases includes following application block software factory strong naming guidance package included release available separate download thus longer dependency guidance automation extensions gax detailed list changes see release enterprise library release enterprise library may 2008 includes following may 2007 enterprise library 3.1 released minor enhancements validation policy injection application blocks april 2007 enterprise library 3.0 released contains new application blocks new application block software factory designed simplify development new application blocks extensions new features providing better integration .net framework 3.0 3.0 release enterprise library contains following application blocks january 2006 new version enterprise library released targeted .net framework 2.0 significant change release configuration application block removed blocks updated use .net improved system.configuration capabilities release also included significant improvements logging application block much security application block removed due similar capabilities provided .net framework 2.0 .net 2.0 release enterprise library contained following application blocks two releases enterprise library released .net framework 1.1 first released january 2005 followed minor maintenance release june 2005 .net 1.1 releases enterprise library contained following application blocks ron jacobs microsoft evangelist described purpose enterprise library filling gaps .net development releases framework framework continues advance developers demanding productive development libraries time microsoft platforms evolve certain scenarios initially addressed enterprise library supported platforms case patterns practices team uses graceful retirement process deprecate parts explained microsoft continues promote enterprise library enterprise/line-of-business development even many microsoft products well projects within microsoft use extensively starting november 2013 microsoft fully opensourced enterprise library application blocks accept community contributions latest releases slab1.1 unity3.5 developed close collaboration community august 2015 microsoft posted handing unity dependency injection new owners pablo cibraro pedro wood new github repo time patterns practices enterprise library home web site codeplex announced remainder application blocks longer developed however source continue available | [
10243,
10769,
9234,
1043,
2083,
8227,
1577,
4143,
9263,
11316,
1077,
8246,
4174,
4178,
9813,
603,
2145,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
5259,
653,
6797,
3224,
4771,
7846,
10414,
8391,
214,
9943,
9434,
2783,
736,
4321,
637... | Validation |
1,056 | 4 | Solving_the_E-waste_Problem:solving e-waste problem solving e-waste problem step international initiative created develop solutions address issues associated waste electrical electronic equipment weee eminent players fields production reuse recycling electrical electronic equipment eee government agencies ngos well un organisations count among members step encourages collaboration stakeholders connected e-waste emphasising holistic scientific yet applicable approach problem waste electrical electronic equipment weee increasing every day volume weee becoming serious environmental problem yet become recognised greater public guarantee neutrality required give analysis recommendations necessary credibility step started starting period three years initiated united nations university unu promotion team wetzlar hewlett-packard step initiative official launch march 2007 “ one important aims step initiative elaborate set global guidelines treatment e-waste promotion sustainable material recycling ” press communiqué initiative initiative comprises five cooperating task forces addressing specific aspects e-waste covering entire life-cycle electric electronic equipment activities initiative places emphasis working policy-making bodies allow results research impact current practices step coordinated science research body un system united nations university unu long-term goal step “ develop – based scientific analysis – globally accepted standard refurbishment recycling e-waste herewith step ’ aim reduce dangers humans environment result inadequate irresponsible treatment practices advance resource efficiency. ” ruediger kuehr executive secretary step initiative achieve step conceives implements projects based results multidisciplinary dialogues projects seek develop sustainable solutions reduce environmental risk enhance development supreme body step initiative general assembly decides general direction development general assembly based memorandum understanding signed members states guiding principles step secretariat hosted unu bonn mandated accomplishment day-to-day managerial work initiative steering committee composed representatives key stakeholders monitors progress initiative core work accomplished five task forces tf “ policy ” “ redesign ” “ reuse ” “ recycle ” “ capacity building ” task forces conduct research analysis respective domains seek implement innovative projects tf 1 – policy aim task force assess analyse current governmental approaches regulations related weee starting analysis recommendations future regulating activities shall formulated tf2 – redesign task force works design eee focusing reduction negative consequences electrical electronic appliances throughout entire life cycle task force especially takes heed situation developing countries tf3 – reuse focus task force lies development sustainable transmissible principles standards reuse eee tf4 – recycle objective task force improve infrastructures systems technologies realize sustainable recycling global level tf5 – capacity building aim task force draw attention problems connected weee aim shall achieved making results research task forces stakeholders publicly available task force relies personal networks internet collaborative working tools etc guiding principles 1 step ’ work founded scientific assessments incorporates comprehensive view social environmental economic aspects e-waste 2 step conducts research entire life-cycle electronic electrical equipment corresponding global supply process material flows 3 step ’ research pilot projects meant contribute solution e-waste problems 4 step condemns illegal activities related e-waste including illegal shipments reuse/ recycling practices harmful environment human health 5 step seeks foster safe eco/energy-efficient reuse recycling practices around globe socially responsible manner quote website | [
5384,
9499,
7579
] | Test |
1,057 | 3 | Apple_A11:apple a11 apple a11 bionic 64-bit arm-based system chip soc designed apple inc. manufactured tsmc first appeared iphone 8 iphone 8 plus iphone x introduced september 12 2017 according apple chip two high-performance cores 25 faster apple a10 four high-efficiency cores 70 faster energy-efficient cores a10 a11 features apple-designed 64-bit armv8-a six-core cpu two high-performance cores 2.39 ghz called monsoon four energy-efficient cores called mistral monsoon cores 7-wide decode out-of-order superscalar design mistral cores 3-wide decode out-of-order superscalar design mistral cores based apple swift cores apple a6 a11 uses new second-generation performance controller permits a11 use six cores simultaneously unlike predecessor a10 a11 also integrates apple-designed three-core graphics processing unit gpu 30 faster graphics performance a10 embedded a11 m11 motion coprocessor a11 includes new image processor supports computational photography functions lighting estimation wide color capture advanced pixel processing a11 manufactured tsmc using 10 nm finfet process contains 4.3 billion transistors die 87.66 mm size 30 smaller a10 manufactured package package pop together 2 gb lpddr4x memory iphone 8 3 gb lpddr4x memory iphone 8 plus iphone x a11 also includes dedicated neural network hardware apple calls neural engine neural network hardware perform 600 billion operations per second used face id animoji machine learning tasks neural engine allows apple implement neural network machine learning energy-efficient manner using either main cpu gpu however third party apps use neural engine leading similar neural network performance older iphones bloomberg says neural engine fruit apple efforts improve ai team since 2015 report bloomberg apple secretive nature made difficult attract ai research scientists apple since recruited people multiple companies working ai published papers related ai research october 2016 apple hired russ salakhutdinov director ai research | [
9732,
7697,
4114,
9235,
11282,
6165,
11289,
7706,
8222,
2551,
38,
6183,
1576,
4139,
7211,
8237,
9774,
2097,
8250,
8253,
7745,
1090,
7747,
2635,
8783,
4180,
10838,
10840,
9312,
9826,
99,
8806,
8812,
6258,
10357,
10361,
4220,
10365,
638,
67... | Test |
1,058 | 3 | Programmable_interrupt_controller:programmable interrupt controller computing programmable interrupt controller pic device used combine several sources interrupt onto one cpu lines allowing priority levels assigned interrupt outputs device multiple interrupt outputs assert asserts order relative priority common modes pic include hard priorities rotating priorities cascading priorities pics often allow cascading outputs inputs pics typically common set registers interrupt request register irr in-service register isr interrupt mask register imr irr specifies interrupts pending acknowledgement typically symbolic register directly accessed isr register specifies interrupts acknowledged still waiting end interrupt eoi imr specifies interrupts ignored acknowledged simple register schema allows two distinct interrupt requests outstanding one time one waiting acknowledgement one waiting eoi number common priority schemas pics including hard priorities specific priorities rotating priorities interrupts may either edge triggered level triggered number common ways acknowledging interrupt completed eoi issued include specifying interrupt completed using implied interrupt completed usually highest priority pending isr treating interrupt acknowledgement eoi one best known pics 8259a included x86 pc modern times included separate chip x86 pc rather part motherboard southbridge chipset cases replaced newer advanced programmable interrupt controllers support interrupt outputs flexible priority schemas information intel apic found ia-32 intel architecture software developer manual volume 3a system programming guide part 1 chapter 10 freely available intel website | [
9861,
10183,
3272,
1515,
5457,
7445,
6806,
3255,
1176,
5529,
8090,
1660,
3294,
5823
] | None |
1,059 | 4 | F._Lynn_McNulty:f. lynn mcnulty lt. col. frederick “ f. ” lynn mcnulty 1939–2012 first director information systems security u.s. state department pioneer field cybersecurity characterized “ father ” u.s. federal information security peers eulogized tireless advocate security nation early persistent champion information security government mcnulty played key role influencing u.s. national security policy everything export controls commercial encryption products deployment key federal cybersecurity infrastructure repeatedly called testify cybersecurity matters u.s. house senate subcommittees according scmagazine.com ’ robert bigman mcnulty ’ contributions cybersecurity “ woven dna almost every government information security policy program ” security initiatives became model within federal government served basis computer security act 1987 june 15 2012 edition federal computer weekly identified mcnulty one key thought leaders field cybersecurity preceding quarter century fellow international information systems security consortium isc ² mcnulty recipient federal 100 award inducted information systems security association issa hall fame publications include f. lynn mcnulty “ encryption importance economic infrastructure security ” 9 duke journal comparative international law 427–450 1999 born alameda california mcnulty received b.a international affairs university california berkeley awarded 2 master degrees m.a international affairs san jose state m.p.a george washington university united states army reserve officer 1963 1999 frederick lynn mcnulty activated four years vietnam war late 1960s early 1970s mcnulty worked information security central intelligence agency retired government 1995 mcnulty died aggressive lymphoma 2012 buried arlington national cemetery late 2013 isc ² created mcnulty award one u.s. government information security leadership awards gisla f. lynn mcnulty honor f. lynn mcnulty tribute gisla recognize member u.s. federal information security community upholds mcnulty ’ legacy visionary innovator outstanding service commitment organization shall bestow first f. lynn mcnulty gisla october 2013 2014 f. lynn mcnulty posthumously awarded lifetime achievement award 17th annual bestowing awards excellence information security public policy rsa global information security conference san francisco california widow peggy mcnulty accepted award | [
7107
] | None |
1,060 | 3 | Rally-X:rally-x rally-x one namco first video games imported outside japan due business relations midway presented amusement machine operator union america trade show north america alongside namco pac-man william defender despite rumors executives claimed rally-x would successful namco marketing team heavily promoted game test run would gain much praise pac-man despite sales lower anticipated rally-x given positive reception standing amidst games genre contemporary home port game release msx japan rally-x would followed several sequels releases namco video game collections platforms cited early hit golden age arcade games item game special flag would make appearances plethora future video games including xevious gaplus super smash bros. nintendo 3ds wii u usually item grants extra life player drives blue car around multi-directional scrolling maze car automatically moves whichever direction joystick pushed runs wall turn continue every round ten flags scattered around maze player must collect clear round move next round flags increase value collected first 100 points second 200 third 300 also special flags indicated letter — player collects one value earned flags doubles rest round player dies however next flag value set back 100 double bonus lost collecting special first flag 10 flags one run maximum points player obtain round 11000 player also obtain fuel bonus round complete varies depending much fuel remaining according fuel gauge several red cars chase blue one around maze contact results losing life hit number cars begins three increases number throughout normal round eight first five appear bottom maze next three appear top maze however player smoke screen use red cars red car runs cloud smokescreen momentarily stunned still kill player contact amount time stunned decreases level still always cause red car chase blue car using alternate route using smokescreen uses small amount fuel using every 30 seconds almost ensure runs round finishes car limited amount fuel consumed time though normally sufficient last ten flags collected fuel runs car moves slowly smoke screen longer works quickly falls victim red cars player clear round without fuel remaining rare occurrence receive fuel bonus result also stationary rocks player must avoid rocks randomly distributed throughout maze increasing number game progresses unlike cars flags positions shown radar player careful rocks also kill player contact player careful get trapped rocks red cars happens escape third stage every fourth stage bonus stage challenging stage start player must collect flags normal way red cars maximum normal number red cars eight unable move player runs fuel red cars start moving player hits red car rock challenging stage ends player lose life player run lives game highest score day game tell 1980 battlezone defender pac-man shown alongside rally-x trade show sponsored amusement machine operators america believed rally-x would top money-earner defender went sell 60,000 units — disproving projections — cemented place video game history meanwhile pac-man went sell 350,000 worldwide arcade units became highest-grossing video game time game sequel new rally-x released 1981 offers slightly different color scheme easier gameplay special flag flashes radar fewer red cars new flag called lucky flag also added awards player bonus points amount fuel remaining collected car refueled round continues still flags remaining new rally-x manufactured greater numbers became popular least japan original game compilation arcade game namco classic collection vol 2 released 1996 includes version game enhanced graphics gameplay called rally-x arrangement multiplayer capability namco museum remix released october 23 2007 nintendo wii also features revamped version game known rally-x remix also included namco museum megamix another revamped sequel rally-x rumble released apple ios platform august 17 2011 rally-x later included namco museum volume 1 sony playstation 1995 namco museum 50th anniversary 2005 pac-man arcade party 30th anniversary compilation arcade game 2010 carbon copy game along one new rally-x also included compilation title namco classic collection vol 2 1996 rally-x included part microsoft revenge arcade jakks pacific ported rally-x namco collection tv game | [
11522,
9093,
2540,
9006,
10287,
1776,
10544,
10931,
6452,
5717,
8663,
3039
] | Test |
1,061 | 9 | FOCAL_(Hewlett-Packard):focal hewlett-packard focal forty-one calculator language language used program hp-41 range expandable science/engineering calculators hewlett-packard calculator programming languages 1980s focal program linear list instructions instruction step roughly correspond key key combination press thus correspond user would perform computation calculator paradigm made focal programming relatively easy newcomer program maintenance could nightmare besides use goto instructions—including going program step based value data register gto ind technique known computed goto — easily led spaghetti code program steps numbered starting 1 numbering intrinsic meaning change new instructions added removed middle program special instruction lbl used create label used user invoke program program target gto unconditional go-to xeq execute instruction simple focal program note contrary many programmable calculators focal step could stored memory one byte calculator memory could hold 2233 bytes program code reported program actually reached number steps | [
5384,
8554,
8910,
8503
] | Test |
1,062 | 5 | ProFTPD:proftpd proftpd short pro ftp daemon ftp server proftpd free open-source software compatible unix-like systems microsoft windows via cygwin along vsftpd pure-ftpd proftpd among popular ftp servers unix-like environments today compared focus e.g simplicity speed security proftpd primary design goal highly feature rich ftp server exposing large amount configuration options user proftpd includes number options available many ftp daemons configuration proftpd performed single main configuration file called /etc/proftpd/proftpd.conf due similarities configuration file apache http server intuitively understandable someone uses popular web server noticeable features proftpd comes command-line interface cli several third-party graphical user interfaces gui existing proftp users prefer cli like use combination especially comes example real-time monitoring current user actions file transmissions gui helpful superior cli existing guis proftpd selection | [
865,
7364,
6797,
6189,
7983,
5397,
2878
] | None |
1,063 | 3 | Might_and_Magic_II:_Gates_to_Another_World:might magic ii gates another world might magic ii gates another world also known might magic book two gates another world role-playing video game developed published new world computing 1988 sequel events adventurers helped corak defeat sheltem varn take gates another world located varn land cron central research observational nacelle land cron facing many problems brought encroachment sheltem adventurers must travel cron four elemental planes even time help corak stop sheltem flinging cron sun many ways might magic ii updated version original improved graphics help greatly navigation interface added several functions facilitated gameplay delay selector allowed faster slower response times spinning cursor input required features lacking might magic book one might magic book one player used six player-generated characters time total twenty-six characters could created thereafter stayed various inns across cron continue game continuity possible import characters developed first game additionally might magic 2 became first game series utilize hirelings predefined characters could extend party eight active characters hirelings controlled like regular characters required payment day pay increased level new features include two new character classes increased number spells introduction class upgrade quests twice number mini-quests also added secondary skills mountaineering necessary travelling mountainous regions linguist raising character intelligence necessary reading certain messages character could two secondary skills game introduced automap feature series activated training character cartographer skill perhaps peculiar development game numeric scope character levels could reach 255 2 -1 point could train without limit provided enough gold hit points could extended high 65535 2 -1 magic points 9999 nearly item bonus could added via enchantment bonus increased weapon damage attribute bonus dungeons dragons unlike ceiling bonuses 63 might magic 2 pitted player party one 255 monsters varying 1 hit point 64000 battles could consist 255 opponents might magic 2 remained battle-focused game many puzzles solved curiosities discovered cave sex-change device instance scattered land seemingly nonsensical colored messages eventually combines useful hints first game quests game require player solve puzzles rather look next hack slash battle time travel added though ramifications practically nil exception necessary fight final boss taverns feature humorous culinary selections various absurdities strewn ability get drunk much ale would result reduced abilities character stats increased annual circus requires collection cupie dolls play games character belong one eight classes class least one prime statistic character must equal exceed member class classes knights barbarians also special skills abilities six classes featured might magic book one secret inner sanctum available sequel knight must defeat dread knight paladin must slay frost dragon archer must stop baron wilfrey cleric reunite soul corak body sorcerer must release good evil wizards isle ancients robber addition two new classes introduced many aspects game standard rpgs time characters aging gameplay reaching old age ~75 would die randomly due natural causes spell reverses process usually fails resulting increasing character age opposed decreasing however paying visit health spa resort isle reduce character age ability travel past specifically nine different centuries although two seemed relevant main story two sidequest class-specific quests class-restricted areas forcing player split party use different combinations characters departure high fantasy flavour typical rpgs last dungeon requires pcs board spaceship solve encrypted message time limit order escape planet dragon reviewers gave game 4 5 stars 5 5 stars sega genesis version computer gaming world gave game mixed review noting several bugs 1.0 version reviewer scorpia also lamented simple plotline saying might magic ii seems swerved path boring monster mash/monty haul direction ever-more-powerful characters ever-more-powerful weapons fight ever-more-powerful monsters escalates realm ludicrous van caneghem later got revenge scorpia naming monster sequel 1991 magazine also reviewed sega genesis version stating easy play excellent graphics overemphasis combat made game workmanlike airless 1993 scorpia stated might magic ii good previous game many counts ... devoted hack slash crowd 1991 pc format placed might magic ii list 50 best computer games time | [
10931,
3069,
9006
] | Test |
1,064 | 4 | Comparison_of_packet_analyzers:comparison packet analyzers following tables compare general technical information several packet analyzer software utilities also known network analyzers packet sniffers please see individual products articles information basic general information software—creator/company license/price etc utilities run operating systems | [
7426,
6797,
1304,
5657,
7961,
2205,
6177,
1580,
7983,
823,
10935,
8121,
9151,
9665,
842,
461,
10705,
9939,
6997,
2006,
7895,
8922,
9440,
10343,
9320,
10349,
8944,
2292,
4085,
1399,
8700,
381
] | Test |
1,065 | 7 | Onshape:onshape onshape computer-aided design cad software system delivered internet via software service saas model makes extensive use cloud computing compute-intensive processing rendering performed internet-based servers users able interact system via web browser ios android apps onshape allows teams collaborate single shared design way multiple writers work together editing shared document via cloud services primarily focused mechanical cad mcad used product machinery design across many industries including consumer electronics mechanical machinery medical devices 3d printing machine parts industrial equipment onshape upgrades released directly web interface software require maintenance work user founded 2012 onshape based cambridge massachusetts usa offices singapore pune india leadership team includes several engineers executives originated solidworks popular 3d cad program runs windows computers onshape ’ co-founders include two former solidworks ceos jon hirschtick john mceleney onshape venture-backed company investments firms including andreessen horowitz commonwealth capital ventures new enterprise associates nea north bridge venture partners total venture funding currently amounts 169 million | [
4194,
7209,
6797,
7983,
823
] | Test |
1,066 | 4 | NIST_RBAC_model:nist rbac model nist rbac model standardized definition role-based access control although originally developed national institute standards technology standard adopted copyrighted distributed incits 359-2004 international committee information technology standards incits latest version incits 359-2012 managed incits committee cs1 2000 nist called unified standard rbac integrating rbac model published 1992 ferraiolo kuhn rbac framework introduced sandhu coyne feinstein youman 1996 proposal published sandhu ferraiolo kuhn presented acm 5th workshop role based access control following debate comment within rbac security communities nist made revisions proposed u.s. national standard rbac incits 2004 standard received ballot approval adopted incits 359-2004 sandhu ferraiolo kuhn later published explanation design choices model 2010 nist announced revision rbac incorporating features attribute-based access control abac | [
210,
8627
] | None |
1,067 | 2 | Wii_system_software:wii system software wii system software set updatable firmware versions software frontend wii home video game console updates downloaded via system internet connection wiiconnect24 discontinued allowed nintendo add additional features software new update became available nintendo sent message connected systems notifying available update several game discs first-party third-party games included system software updates players connected internet still update system additionally force upgrade requiring player perform update without new game played online games super smash bros. brawl mario kart wii come specific extra updates able receive posts game-specific addresses regardless version installed software install update wii firmware form ioses thought wii homebrew developers stand input output systems internal operating systems run separate arm architecture processor wii software nicknamed starlet wii homebrew community physically located inside graphics chip ati hollywood small part hollywood patent wii u indicates similar device simply named input/output processor control input output code running main processor ibm powerpc broadway processor wii hardware features exist gamecube accessed via arm nintendo releases new ios version except unusual circumstances example security updates block homebrew new ios replace ios already installed instead gets installed addition current ios versions native wii software including games distributed nintendo optical discs system menu virtual console games wiiware wii channels exception certain homebrew applications ios version hardcoded software software run ios hardcoded gets loaded wii loads software ios exist wii case disc-based software gets installed automatically user prompted downloaded software theoretically happen user access shop download software unless player ios versions require however homebrew used forcefully install run piece software required ios exist user brought back system menu nintendo created system new updates would unintentionally break compatibility older games side effect uses space wii internal nand flash memory ioses referred number theoretically 0 254 although many numbers skipped presumably development versions never completed one ios version run given time time ios running wii enters gamecube backward compatibility mode wii runs variant ios specifically gamecube games mios contains modified version gamecube ipl system provides graphical interface wii abilities games run directly broadway processor either directly interface hardware hardware common wii gamecube interface ios running arm architecture processor wii-specific hardware arm processor access screen therefore neither ios means piece software running everything seen screen comes software operating system firmware therefore version number reported wii actually version number system menu updates result change version number system menu updated example ioses channels side effect means impossible nintendo implement functions would affect games example in-game system menu similar xbox 360 in-game dashboard playstation 3 in-game xmb wii menu known internally system menu name user interface wii game console first thing seen system boots similar many video game consoles wii games example possible install applications netflix stream media without requiring disc wii wii menu let users access game no-game functions built-in applications called channels designed represent television channels six primary channels disc channel mii channel photo channel wii shop channel forecast channel news channel although latter two initially included became available via system updates functions provided channels wii used limited computer full-featured web browser digital photo viewer users also use channels create share cartoon-like digital avatars called miis download new games channels directly wii shop channel new channels include example everybody votes channel internet channel separate channels graphically displayed grid navigated using pointer capability wii remote users also rearrange channels satisfied channels originally organized menu wii system supports wireless connectivity nintendo ds handheld console additional accessories connectivity allows players use nintendo ds microphone touch screen inputs wii games pokémon battle revolution first example nintendo given game using nintendo ds-wii connectivity nintendo later released nintendo channel wii allowing users download game demos additional data nintendo ds like many video game consoles wii console able connect internet although required wii system function wii unique 16-digit wii code use wii non-game features internet connection enabled users able access established nintendo wi-fi connection service wireless encryption wep wpa tkip/rc4 wpa2 ccmp/aes supported aoss support added system menu version 3.0 nintendo ds nintendo charge playing via service 12-digit friend code system controls players connect one another service features console including virtual console wiiconnect24 several channels wii console also communicate connect wii systems self-generated wireless lan enabling local wireless multiplayer different television sets system also implements console-based software including wii message board one connect internet third-party devices well wii console also includes web browser known internet channel version opera 9 browser menus meant convenient way access web television screen although far offering comfortable user interface compared modern internet browsers virtual keyboard pops needed input wii remote acts like mouse making possible click anywhere screen navigate though web links however browser always handle features normal web pages although support adobe flash thus capable playing flash games third-party services online bbc iplayer also available wii via internet channel browser although bbc iplayer later relaunched separate bbc iplayer channel wii addition internet access including internet channel system updates may restricted parental controls feature wii original designs nintendo wii console specifically wii models made pre-2011 fully backward compatible gamecube devices including game discs memory cards controllers wii hardware ports gamecube memory cards peripherals slot-loading drive able accept read previous console discs gamecube games work wii without additional configuration gamecube controller required play gamecube titles neither wii remote classic controller functions capacity wii supports progressive-scan output 480p-enabled gamecube titles peripherals connected via set four gamecube controller sockets two memory card slots concealed removable flip-open panels console retains connectivity game boy advance e-reader game boy advance cable used manner gamecube however feature accessed select gamecube titles previously utilized also limitations backward compatibility example online lan features certain gamecube games available since wii serial ports nintendo gamecube broadband adapter modem adapter wii uses proprietary port video output incompatible nintendo gamecube audio/video cables composite video s-video component video rgb scart console also lacks gamecube footprint high-speed port needed game boy player support furthermore gamecube functions available compatible memory cards controllers could used playing gamecube game due fact wii internal memory would save gamecube data original device backward compatibility earlier nintendo products players enjoy massive selection older games console addition hundreds newer wii game titles however south korean units lack gamecube backward compatibility also redesigned wii family edition wii mini launched 2011 2013 respectively compatibility stripped nevertheless another service called virtual console allow users download older games prior nintendo platforms namely nintendo entertainment system super nes nintendo 64 onto wii console well games non-nintendo platforms genesis turbografx-16 list new wii channels released beyond four initial channels i.e disc channel mii channel photo channel wii shop channel included original consoles news channel forecast channel released part system updates separate downloads required january 30 2019 channels listed discontinued exception wii fit channel internet channel list features included wii system updates list updates releases wii channels § released part system update separate download required gaming platforms nintendo gaming platforms next generation gaming platforms generation | [
8584,
10761,
4364,
1148,
9640,
684,
4653,
4908,
2045,
8262,
2887,
9033,
6486,
10329,
10332,
1501,
6878,
607,
8937,
9964,
8700,
3323,
8316,
8829
] | Test |
1,068 | 3 | Virtual_DMA_Services:virtual dma services computing virtual dma services vds refer application programming interface allow dos win16 applications device drivers perform dma operations running protected virtual 8086 mode | [
6730,
1247
] | Validation |
1,069 | 4 | SQRL:sqrl sqrl pronounced squirrel secure quick reliable login formerly secure qr login draft open standard secure website login authentication software solution typically uses link scheme sqrl // optionally qr code user identifies via pseudonymous zero-knowledge proof rather providing user id password method thought impervious brute force password attack data breach shifts burden security away party requesting authentication closer operating system implementation possible hardware well user sqrl proposed steve gibson gibson research corporation october 2013 way simplify process authentication without risk revelation information transaction third party acronym sqrl coined steve gibson protocol drafted discussed analyzed in-depth community internet security enthusiasts news.grc.com newsgroups weekly podcast security october 2 2013 within two days airing podcast w3c google expressed interest working standard thesis sqrl analyzed found appears interesting approach terms envisioned user experience well underlying cryptography sqrl mostly combining well established cryptography novel way protocol answer problem identity fragmentation improves protocols oauth openid requiring third party broker transaction giving server secrets protect username password additionally provides standard freely used simplify login processes available password manager applications importantly standard open one company benefit owning technology according gibson website robust technology public domain security cryptography verified deliberately restricted commercial reasons sqrl design-inherent intentional phishing defenses mainly intended authentication anti-phishing despite anti-phishing properties protocol used website two components necessary implementation part web service implementation authenticates displays qr code specially crafted url according specifications protocol browser plugin mobile application read code order provide secure authentication sqrl client uses one-way functions user single master password decrypt secret master key generates combination site name comprising domain name optionally additional sub-site identifier example.com example.edu/chessclub sub- site-specific public/private key pair signs transaction tokens private key gives public key site verify encrypted data shared secrets compromise site could expose allow attacks accounts sites thing successful attacker could get public key would limited verifying signatures used site even though user unlocks master key single password never leaves sqrl client individual sites receive information sqrl process could used site number proof-of-concept implementations made various platforms including server php drupal c .net client android c .net java python also various server-end test debugging sites available sqrl currently used wickr single sign-on sso feature wickr pro steve gibson states sqrl open free solution unencumbered patents sqrl brought lot attention qr code based authentication mechanisms suggested protocol said patented earlier generally available royalty free use gibson says guys described patent completely different way sqrl operates would conflict sqrl patent superficially anything uses 2d code authentication seems similar ... superficially solutions details matter way sqrl operates entirely different details | [
2945,
1251,
7556,
3941,
8644,
10020,
6750,
8554,
11051,
5612,
5677,
7983,
10801,
5433,
5435,
3100,
5918,
6975
] | Test |
1,070 | 4 | Radio_jamming:radio jamming radio jamming deliberate jamming blocking interference authorized wireless communications united states radio jamming devices known jammers illegal use result large fines cases jammers work transmission radio signals disrupt communications decreasing signal-to-noise ratio concept used wireless data networks disrupt information flow common form censorship totalitarian countries order prevent foreign radio stations border areas reaching country jamming usually distinguished interference occur due device malfunctions accidental circumstances devices simply cause interference regulated differently unintentional 'jamming occurs operator transmits busy frequency without first checking whether use without able hear stations using frequency another form unintentional jamming occurs equipment accidentally radiates signal cable television plant accidentally emits aircraft emergency frequency originally terms used interchangeably nowadays radio users use term jamming describe deliberate use radio noise signals attempt disrupt communications prevent listening broadcasts whereas term interference used describe unintentional forms disruption far common however distinction still universally applied inadvertent disruptions see electromagnetic compatibility intentional communications jamming usually aimed radio signals disrupt control battle transmitter tuned frequency opponents receiving equipment type modulation enough power override signal receiver digital wireless jamming signals bluetooth wifi possible low power common types form signal jamming random noise random pulse stepped tones warbler random keyed modulated cw tone rotary pulse spark recorded sounds gulls sweep-through divided two groups obvious subtle obvious jamming easy detect heard receiving equipment usually type noise stepped tones bagpipes random-keyed code pulses music often distorted erratically warbling tones highly distorted speech random noise hiss recorded sounds various combinations methods may used often accompanied regular morse identification signal enable individual transmitters identified order assess effectiveness example china used jamming extensively still plays loop traditional chinese music jamming channels cf attempted jamming numbers stations purpose type jamming block reception transmitted signals cause nuisance receiving operator one early soviet attempt jamming western broadcasters used noise diesel generator powering jamming transmitter subtle jamming jamming sound heard receiving equipment radio receive incoming signals yet everything seems superficially normal operator often technical attacks modern equipment squelch capture thanks fm capture effect frequency modulated broadcasts may jammed unnoticed simple unmodulated carrier receiver locks larger carrier signal hence ignore fm signal carries information digital signals use complex modulation techniques qpsk signals robust presence interfering signals signal relies hand shaking transmitter receiver identify determine security settings method high-level transmission jamming device sends initiation data packets receiver begin state machine establish two-way data transmission jammer loop back beginning instead completing handshake method jams receiver infinite loop keeps trying initiate connection never completes effectively blocks legitimate communication bluetooth consumer radio protocols wifi built-in detectors transmit channel free simple continuous transmission given channel continuously stop transmitter transmitting hence jamming receiver ever hearing intended transmitter jammers work analysing packet headers depending source destination selectively transmitting end message corrupting packet world war ii ground radio operators would attempt mislead pilots false instructions language precisely spoofing attack jamming radar jamming also important disrupt use radar used guide enemy missiles aircraft modern secure communication techniques use methods spread spectrum modulation resist deleterious effects jamming jamming foreign radio broadcast stations often used wartime periods tense international relations prevent deter citizens listening broadcasts enemy countries however jamming usually limited effectiveness affected stations usually change frequencies put additional frequencies and/or increase transmission power jamming also occasionally used governments germany ww2 israel cuba iraq iran iraq iran war 1980–1988 china north south korea several latin american countries well ireland pirate radio stations radio nova united kingdom government used two coordinated separately located transmitters jam offshore radio ship radio north sea international coast britain 1970 occupied europe nazis attempted jam broadcasts continent bbc allied stations along increasing transmitter power adding extra frequencies attempts made counteract jamming dropping leaflets cities instructing listeners construct directional loop aerial would enable hear stations jamming netherlands aerials nicknamed moffenzeef english kraut sieve much cold war soviet eastern bloc jamming western broadcasters led power race broadcasters jammers alike repeatedly increased transmission power utilised highly directional antennas added extra frequencies known barrage frequency diversity broadcasting already heavily overcrowded shortwave bands extent many broadcasters directly targeted jammers including pro-soviet stations suffered rising levels noise interference radio free europe sister service radio liberty main target soviet jammers followed voice america bbc world service stations targeted soviet jammers extent rfe/rl/voa/bbc included deutsche welle occasionally vatican radio kol yisrael radio canada international jamming usually took place programming languages widely spoken eastern bloc countries e.g. russian polish czech lithuanian etc. programmes english major western languages rarely ever jammed intentionally also periods china soviet union jammed programmes soviet union also jammed albanian programmes times parts world impacted broadcasting practices others meanwhile listeners soviet union eastern bloc devised ingenious methods homemade directional loop antennas hear western stations noise radio propagation shortwave difficult predict reliably listeners sometimes found days/times jamming particularly ineffective radio fading due atmospheric conditions affecting jamming signals favouring broadcasts phenomenon sometimes dubbed twilight immunity days course reverse case also times jamming transmitters temporarily air due breakdowns maintenance soviets eastern bloc allies used two types jamming transmitter skywave jamming covered large area reasons described limited effectiveness groundwave jamming effective small area thus used in/near major cities throughout eastern bloc types jamming less effective higher shortwave frequencies 15 mhz however many radios soviet union n't cover higher bands skywave jamming usually accompanied morse signals order enable coded identification jamming station order soviet monitoring posts could assess effectiveness station 1987 decades generally refusing acknowledge jamming even taking place soviets finally stopped jamming western broadcasts exception rfe/rl continued jammed several months 1988 previously periods individual eastern bloc countries refrained jamming western broadcasts varied widely time country general outside soviet union bulgaria one prolific operators jamming transmitters eastern bloc east germany least western governments may occasionally considered jamming broadcasts eastern bloc stations generally accepted would pointless exercise ownership shortwave radios less common western countries soviet union due vast physical size country many domestic stations relayed shortwave practical way cover remote areas additionally western governments generally less afraid intellectual competition eastern bloc francoist spain dictatorship jammed decades radio españa independiente radio station communist party spain broadcast moscow 1941–1955 bucharest 1955–1977 important pirate radio spain regime considered threat since allowed citizens skip censorship local media money technological assistance jamming came united states however latin america instances communist radio stations radio venceremos jammed allegedly cia short lived instances britain jammed egyptian suez crisis greek prior cyprus gaining independence rhodesian stations 2002 china acquired standard short-wave radio-broadcasting equipment designed general public radio-broadcasting technical support thales broadcast multimedia former subsidiary french state-owned company thales group debates raised iran regarding possible health hazards satellite jamming iranian officials including health minister claimed jamming health risk humans however minister communication recently admitted satellite jamming 'serious effects called identification jamming stations put stop practice government generally denied involvement jamming claimed sent unknown sources according sources irgc organization behind satellite jamming iran russian armed forces since summer 2015 begun using multi-functional ew weapon system ukraine known borisoglebsk 2 postulated system defeated communications parts country including mobile telephony gps systems | [
6466,
4163,
3140,
1317,
615,
7400,
5020,
11272,
11695,
3088,
1169,
6000,
9233,
10417,
7541,
6170,
1692
] | Test |
1,071 | 6 | BSD_disklabel:bsd disklabel bsd-derived computer operating systems including netbsd openbsd freebsd dragonfly bsd related operating systems sunos disklabel record stored data storage device hard disk contains information location partitions disk disklabels introduced 4.3bsd-tahoe release disklabels usually edited using disklabel utility later versions freebsd renamed bsdlabel traditionally disklabel first sector disk however system works operating systems access disk unix systems comprehend disklabels world ibm pc compatibles disks usually partitioned using pc bios master boot record mbr partition table scheme instead bsd partitioning scheme nested within single primary mbr partition extended partitioning scheme nested within single primary partition extended boot records sometimes particularly freebsd primary mbr partitions referred slices subdivisions primary mbr partition nested bsd partitioning scheme described disklabel called partitions bsd disklabel contained within volume boot record primary mbr partition mbr partition ids primary partitions subdivided using bsd disklabels a5h 386bsd freebsd a6h openbsd a9h netbsd 6ch dragonfly bsd format similar goal extended partitions logical partition system used ms-dos windows linux pc hard drive bsd disklabel partitions ms-dos type logical partitions separate primary partitions freebsd bsd operating systems access bsd disklabel subdivided partition ms-dos type extended/logical partitions bsd disklabels traditionally contain 8 entries describing partitions convention labeled alphabetically h bsd variants since increased 16 partitions labeled p also convention partitions b c fixed meanings | [
1286,
1927,
10000,
274,
9625,
1946,
4636,
2212,
10535,
11698,
11573,
1718,
2744,
5177,
5819,
9151,
11459,
10436,
9671,
1993,
8266,
8395,
1361,
850,
7249,
7383,
10455,
6361,
9306,
4571,
6491,
7521,
1891,
1637,
998,
4073,
1515,
2415,
8816,
... | Test |
1,072 | 0 | Logic_form:logic form logic forms simple first-order logic knowledge representations natural language sentences formed conjunction concept predicates related shared arguments noun verb adjective adverb pronoun preposition conjunction generates predicate logic forms decorated word senses disambiguate semantics word two types predicates events marked e entities marked x shared arguments connect subjects objects verbs prepositions together example input/output might look like logic forms used natural language processing techniques question answering well inference database systems qa systems senseval-3 2004 introduced | [
1890,
7780,
11538,
2901,
9879
] | Validation |
1,073 | 2 | Virtual_printer:virtual printer computing virtual printer simulated device whose user interface api resemble printer driver connected physical computer printer document printed virtual printer instead physically printing paper material underlying software processes images pages way often resulting file produced images transmitted early 1960s b5500 master control program mcp operating system included virtual printers called printer backups form printer backup tapes pbt printer backup disks pbd ibm vm/370 operating system allows users spool virtual printer punch file another user read input provides basic means file transfer typical uses virtual printers include | [
2432,
3974,
1702,
3916,
10352,
5714,
1083
] | None |
1,074 | 2 | AirDrop:airdrop airdrop ad-hoc service apple inc. ios macos operating systems introduced mac os x lion mac os x 10.7 ios 7 enables transfer files among supported macintosh computers ios devices wi-fi bluetooth without using mail mass storage device prior os x yosemite os x 10.10 os x lion mountain lion mavericks os x 10.7–10.9 respectively airdrop protocol macos different airdrop protocol ios two therefore interoperable os x yosemite later support ios airdrop protocol used transfers mac ios device well two 2012 newer mac computers uses wi-fi bluetooth restriction size file airdrop accommodate ios 7 later airdrop accessed either tapping settings general airdrop swiping home screen control center wi-fi bluetooth automatically switched airdrop enabled utilized options controlling airdrop discovery devices include ios 7 later application implements airdrop support available share button airdrop subject number restrictions ios inability share music videos native apps macs running macos 10.7 greater airdrop available finder window sidebar macs running os x 10.8.1 later also accessed menu option go → airdrop pressing ++ wi-fi must turned order airdrop recognize device device must also airdrop selected finder window sidebar able transfer files furthermore files automatically accepted receiving user must accept transfer done improve security privacy running ios 7 later airdrop enabled unofficially ipad 3rd generation although supported default airdrop enabled jailbreaking device installing airdrop enabler 7.0+ cydia procedure supported apple running mac os x lion 10.7 later transfer files mac iphone ipad ipod touch following minimum requirements met ios devices airdrop supported ios 8 later running os x yosemite 10.10 later bluetooth wi-fi turned mac ios devices devices required connected wi-fi network airdrop uses tls encryption direct apple-created peer-to-peer wi-fi connection transferring files wi-fi radios source target devices communicate directly without using internet connection wi-fi access point technical details airdrop proprietary peer-to-peer wi-fi protocol called apple wireless direct link awdl reverse engineered resulting open source implementations published owl opendrop numerous reported cases ios device users airdrop privacy set “ everyone ” received unwanted files nearby strangers phenomenon termed cyber-flashing users full ability control airdrop settings limit send files options everyone contacts | [
10755,
9732,
4615,
1549,
5647,
7697,
1042,
11289,
6186,
4139,
6700,
4657,
8754,
9784,
8253,
576,
9802,
8783,
5713,
4180,
3670,
1623,
3672,
4184,
10838,
2141,
4702,
3681,
9826,
2149,
8806,
3691,
8303,
2673,
6771,
2676,
6264,
7292,
2686,
67... | Validation |
1,075 | 5 | Alpine_(email_client):alpine email client alpine free software email client developed university washington alpine rewrite pine message system adds support unicode features alpine meant suitable inexperienced email users demanding power users alpine learned exploration use context-sensitive help user interface customized alpine shares many common features console applications like rich set shortcut keys using keyboard instead mouse navigation operations fact operations alpine corresponding shortcut keys unlike console applications targeting developers experienced users often require users edit configuration file alpine lets users change configuration options within software makes alpine one easy learn console-based email clients alpine supports imap pop smtp nntp ldap protocols natively although support composing html email display emails html content text alpine read write folders several formats including maildir mbox mh format used mh message handling system mbx mix alpine includes editor pico pico stands pine composer includes commands basic editing files search replace spelling justifying text besides cut paste intuitive navigation commands however editor used compose messages alpine using editor configuration variable besides able set alternate editor users configure hundred variables options liking including setting configuration sending receiving e-mail different services incoming folders collection use personalities called roles alpine therefore user share address book different accounts alpine also sort individual folders several criteria including threading original sender recipient size alpine also allows users configure colors filters scores character set display among others configuration address books saved locally remote imap server accessible wherever alpine also handles encrypted signed messages using s/mime standard although alpine designed accessible beginners easily set advanced users screens alpine include built-in help quickly accessed ctrl-g command alpine 1.0 publicly released december 20 2007 4 august 2008 uw alpine team announced one release incorporating web alpine 2.0 would shift effort direct development consultation coordination role help integrate contributions community taken mean uw longer maintains alpine left development others june 2009 project named re-alpine created sourceforge used upstream patches maintainers august 2013 re-alpine project official announced december 21 2012 release re-alpine 2.03 last official release since january 2013 eduardo chappa active software developer formerly university washington released newer versions alpine site announcement made public usenet newsgroup comp.mail.pine major unix-like systems currently use primary upstream site march 17 2017 chappa announced release version 2.21 latest stable released version 2.21.9 released september 19 2017 recent developmental version 2.21.99999 released june 22 2019 alpine officially stands alternatively licensed program internet news email uw also referred apache licensed pine alpine licensed apache license version 2 november 29 2006 saw first public alpha release december 20 2007 milestone new approach since alpha test pine always non-public | [
1664,
9986,
3465,
1297,
3218,
9747,
5397,
11418,
9642,
2101,
9909,
3015,
10956,
6231,
7255,
5988,
9451,
11500,
10861,
9459,
3578,
8443,
7036,
2045
] | Test |
1,076 | 7 | Data_Format_Description_Language:data format description language data format description language dfdl often pronounced daff-o-dil published open grid forum proposed recommendation january 2011 modeling language describing general text binary data standard way dfdl model schema allows text binary data read parsed native format presented instance information set information set logical representation data contents independent physical format example two records could different formats one fixed-length fields uses delimiters could contain exactly data would represented information set dfdl schema also allows data taken instance information set written serialized native format dfdl descriptive prescriptive dfdl data format impose use particular data format instead provides standard way describing many different kinds data format approach several advantages allows application author design appropriate data representation according requirements describing standard way shared enabling multiple programs directly interchange data dfdl achieves building upon facilities w3c xml schema 1.0 subset xml schema used enough enable modeling non-xml data motivations approach avoid inventing completely new schema language make easy convert general text binary data via dfdl information set corresponding xml document educational material available form dfdl tutorial videos several hands-on dfdl labs dfdl created response need grid apis able understand data regardless source language needed capable modeling wide variety existing text binary data formats working group established global grid forum later became open grid forum 2003 create specification language.. decision made early base language subset w3c xml schema using xs appinfo annotations carry extra information necessary describe non-xml physical representations established approach already used today commercial systems dfdl takes approach evolves open standard capable describing many text binary data formats work continued language resulting publication dfdl 1.0 specification ogf proposed recommendation gfd.174 january 2011 latest revision gfd.207 published november 2014 obsoletes gfd.174 incorporates issues noted date also available html summary dfdl features available ogf issues specification tracked using redmine issue trackers implementations dfdl processors parse serialize data using dfdl schemas available presentation available describes ibm dfdl daffodil public repository dfdl schemas describe commercial scientific data formats established github dfdl schemas formats like un/edifact nacha iso8583 available free download take example following text data stream gives name age location person logical model data described following fragment xml schema document order names types cardinality fields expressed xml schema model additionally model physical representation data stream dfdl augments xml schema fragment annotations xs element xs sequence objects follows property attributes dfdl annotations express data represented ascii text format fields variable length delimited commas alternative compact syntax also provided dfdl properties carried non-native attributes xml schema objects goal dfdl provide rich modeling language capable representing text binary data format 1.0 release major step towards goal capability includes support | [
2688,
11457,
11332,
10471,
6483,
7935
] | Validation |
1,077 | 2 | Microsoft_Gadgets:microsoft gadgets microsoft gadgets lightweight single-purpose applications software widgets sit microsoft windows user computer desktop hosted web page according microsoft possible different types gadgets run different environments without modification currently case gadgets windows desktop sidebar hallmark feature windows vista windows 7 editions operating system subsequently microsoft deemed security vulnerabilities discontinued developing providing microsoft gadgets longer available time windows 8 10 rolled independent third party gadgets like rainmeter continue developed provided later versions windows microsoft gadgets also work windows xp service pack 3 needs alky applications web gadgets run web sites live.com windows live spaces live.com lets users add rss feeds order view news glance building microsoft start.com experimental page live.com customized web gadgets mini-applications serve almost purpose e.g mail readers weather reports slide shows search games etc. gadgets integrate windows live services including mail search favorites users create multiple site tabs customize different feeds gadgets layouts color schemes desktop gadgets desktop widgets small specialized applications generally designed simple tasks clocks calendars rss notifiers search tools also used control external applications windows media center panel sidebar found either right side default left side windows desktop windows vista operating system gadgets placed sidebar automatically aligned gadgets also placed elsewhere screen generally causes expand display information windows 7 sidebar removed although gadgets somewhat similarly aligned side screen gadgets toggled two sizes via button windows 7 windows sideshow new technology lets windows vista drive small auxiliary displays various form factors offering bite-size pieces information include displays embedded outside laptop lid detachable device enabling access information media even main system standby mode data also displayed cell phones network-connected devices via bluetooth connectivity options display updated number different kinds information contacts maps calendar email consulted mobile pc otherwise powered since underlying platform power-efficient run hundreds hours without draining notebook battery still providing always-on access data multimedia content sideshow coupled windows vista sidebar capability – sidebar gadgets easily ported compatible sideshow secondary display applications however hardware silicon providers also provide native capabilities allow richer multimedia applications text image audio video decode playback example notebook in-lid display could used mp3 player powered notebook battery providing hundreds hours playback time low power footprint sideshow platform maintains according microsoft gadgets discontinued serious vulnerabilities could exploited harm computer access computer files show objectionable content change behavior time attacker could even use gadget take complete control pc gadgets completely removed windows 8 however launch windows 10 widespread support gadgets led revival third-party enhancements new operating system adjusted take account including link gadgets sidebar windows control panel many hundreds available variety sources active development | [
10243,
9234,
1043,
540,
1055,
2083,
8227,
1577,
1581,
4143,
9263,
8246,
1098,
4178,
9813,
603,
4704,
617,
5225,
1656,
5754,
9340,
5761,
9348,
5765,
10886,
2183,
651,
5259,
653,
6797,
3224,
4771,
7846,
2221,
10414,
8391,
3283,
214,
9434,
... | None |
1,078 | 3 | Google_MillWheel:google millwheel google millwheel data-processing framework developed google building low-latency applications | [
5612,
11343,
7983
] | None |
1,079 | 7 | Cloud_Infrastructure_Management_Interface:cloud infrastructure management interface cloud infrastructure management interface cimi open standard api specification managing cloud infrastructure cimi goal enable users manage cloud infrastructure simple way standardizing interactions cloud environments achieve interoperable cloud infrastructure management service providers consumers developers cimi 1.1 registered international standard august 2014 joint technical committee 1 jtc 1 international organization standardization iso international electrotechnical commission iec cimi standard defined published distributed management task force dmtf includes cloud infrastructure management interface cimi model restful http-based protocol specification cimi xml schema cimi primer cimi uses cases whitepaper cimi aims provide single set interfaces cloud consumer use provision manage cloud infrastructure multiple clouds client code need adapted proprietary interfaces multiple vendors cimi described de jure standard change control standards body contrasting de facto standard typically one vendor change control interface everyone else reverse engineer inner workings expecting vendors embrace dual strategy delivering two offerings – one cimi compliant offering second proprietary offering allows proprietary functionality cimi scoped core iaas functionality deploying managing machines volumes networks monitoring systems group includes feature discovery mechanism find functions cloud provider supports including metadata describing capabilities resource constraints cimi model describes detail resources accessible cloud consumer maintained cloud provider relationships main entry point cimi consumer iaas provider cloud entry point data discovered iteratively model self-describing allows querying metadata e.g. discover extensions implemented model also extensible consumer provider model also defines serializations xml json resource cimi addresses management lifecycle infrastructure provided iaas provider creation deletion viewing alteration virtual machines networks storage start stop operations also defines resource operations creating machine images snapshots machines backup restore creation additional identical virtual machines cimi allows import ovf package create system machines cimi resources well export cimi system resources ovf package actual import export ovf packages handled underlying hypervisor management cimi implementation cimi currently supports rest architectural style using http interactions consumer providers mappings soap ws-man also considered protocol binding follows rest principles describes mapping http protocol verbs operations model request sent using http verb get post put delete includes message body either json xml format response uses standard http status code whose semantics interpreted context particular request made several adapters developed expose cimi api endpoint client applications consume translate api calls proprietary api calls supported target cloud provider following list cimi implementations cimi working group announced plug-fests improved interoperability cimi implementations | [
10752,
8854,
6168,
11036,
5149,
2206,
9245,
4771,
5413,
9766,
10413,
3502,
11056,
8627,
3126,
5816,
6977,
8904,
1610,
9290,
8524,
11344,
2519,
2904,
4058,
4064,
4194,
11235,
8421,
8426,
5614,
6511,
1010,
10486,
3447,
2045,
10238
] | Test |
1,080 | 2 | Bitrig:bitrig bitrig openbsd-based operating system targeted exclusively amd64 armv7 platforms longer developed work done merged back openbsd achievements included porting fuse/puffs support libc++ platform replace libstdc++ pie support amd64 ndb kernel support bitrig focused using modern tools git llvm/clang along focusing modern platforms aimed commercially friendly code base texinfo gnu tool base system gpt partitioning supported bitrig future plans included support virtualisation efi | [
7552,
5506,
2179,
1927,
4745,
10761,
2061,
9743,
8725,
5534,
1316,
684,
4908,
1839,
1718,
10422,
7483,
9151,
9153,
3651,
10436,
9671,
9927,
5067,
8395,
850,
6361,
9306,
10202,
3551,
607,
9320,
873,
9452,
5363,
633,
8316
] | Test |
1,081 | 5 | Host_model:host model computer networking host model option designing tcp/ip stack networking operating system like microsoft windows linux unicast packet arrives host ip must determine whether packet locally destined destination matches address assigned interface host ip stack implemented weak host model accepts locally destined packet regardless network interface packet received ip stack implemented strong host model accepts locally destined packets destination ip address packet matches ip address assigned network interface packet received weak host model provides better network connectivity example easy find packet arriving host using ordinary tools also makes hosts susceptible multihome-based network attacks strong host model provides better security ipv4 implementation microsoft windows versions prior windows vista uses weak host model windows vista windows server 2008 tcp/ip stack supports strong host model ipv4 ipv6 configured use default however also configured use weak host model ipv4 implementation linux defaults weak host model source validation reversed path specified rfc 1812 enabled rp_filter option distributions default quite strong host model defends class attacks typical multihomed hosts arp_ignore arp_announce also used tweak behaviour bsd defaults strong host model | [
5472,
8391,
5225,
2221,
6797,
7983,
823,
5531,
5469,
5470
] | Test |
1,082 | 1 | Database-as-IPC:database-as-ipc computer programming database-as-ipc anti-pattern database used message queue routine interprocess communication situation lightweight ipc mechanism sockets would suitable british computer scientist junade ali defined database-as-ipc anti-pattern using database schedule jobs queue tasks completed noting anti-pattern centres around using database temporary messages instead persistent data using database kind message passing extremely inefficient compared ipc methods often introduces serious long-term maintenance issues method enjoys measure popularity database operations widely understood proper ipc mechanisms | [] | None |
1,083 | 7 | Smartphone:smartphone smartphones class mobile phones multi-purpose mobile computing devices distinguished feature phones stronger hardware capabilities extensive mobile operating systems facilitate wider software internet including web browsing mobile broadband multimedia functionality including music video cameras gaming alongside core phone functions voice calls text messaging smartphones typically include various sensors leveraged software magnetometer proximity sensors barometer gyroscope accelerometer support wireless communications protocols bluetooth wi-fi satellite navigation early smartphones marketed primarily towards enterprise market attempting bridge functionality standalone personal digital assistant pda devices support cellular telephony limited bulky form short battery life immaturity wireless data services issues eventually resolved advances mosfet mos transistor lithium-ion battery mobile network technologies 2000s ntt docomo i-mode platform blackberry nokia symbian platform windows mobile began gain market traction models often featuring qwerty keyboards resistive touchscreen input emphasizing access push email wireless internet since unveiling iphone 2007 majority smartphones featured thin slate-like form factors large capacitive screens support multi-touch gestures rather physical keyboards offer ability users download purchase additional applications centralized store use cloud storage synchronization virtual assistants well mobile payment services improved hardware faster wireless communication due standards lte bolstered growth smartphone industry third quarter 2012 one billion smartphones use worldwide global smartphone sales surpassed sales figures feature phones early 2013 development smartphone enabled advances mosfet metal-oxide-silicon field-effect transistor semiconductor device fabrication mosfet mos transistor invented mohamed atalla dawon kahng bell labs 1959 basic building block computing devices smartphones mosfet scaling mos transistors get smaller decreasing power consumption enabled large-scale integration vlsi technology mos transistor counts integrated circuit chips increasing exponential pace predicted moore law continuous mosfet scaling eventually made possible build portable smart devices smartphones 1990s2000s typical smartphone built billions tiny mosfets 2019 used integrated circuits microprocessors memory chips power devices thin-film transistors tfts mobile displays advances mosfet power electronic technology also enabled development digital wireless mobile networks essential smartphone wide adoption power mosfet ldmos lateral diffused mos rf cmos radio frequency cmos devices led development proliferation digital wireless mobile networks 1990s advances mosfet technology leading increasing bandwidth 2000s essential elements wireless mobile networks built mosfets including mobile tranceivers base station modules routers rf power amplifiers telecommunication circuits rf circuits radio transceivers networks 2g 3g 4g another important enabling factor lithium-ion battery became indispensable energy source smartphones lithium-ion battery invented john goodenough rachid yazami akira yoshino 1980s commercialized sony asahi kasei 1991 advances mosfet technology enabling smaller integrated circuit chips improving wireless mobile networks ibm engineer frank canova realised chip-and-wireless technology becoming small enough use handheld devices first commercially available device could properly referred smartphone began prototype called angler developed canova 1992 ibm demonstrated november year comdex computer industry trade show refined version marketed consumers 1994 bellsouth name simon personal communicator addition placing receiving cellular calls touchscreen-equipped simon could send receive faxes emails included address book calendar appointment scheduler calculator world time clock notepad well visionary mobile applications maps stock reports news ibm simon manufactured mitsubishi electric integrated features wireless personal digital assistant pda cellular radio technologies building ibm simon also featured liquid-crystal display lcd pc card support internal hardware includes nec vadem vg230 system-on-a-chip soc sony hitachi random-access memory ram chips intel hitachi flash memory chips cirrus logic modem chips simon commercially unsuccessful particularly due bulky form factor limited battery life using nicad batteries rather lithium-ion battery used modern smartphones term smart phone smartphone coined year introduction simon appearing print early 1995 describing phonewriter communicator beginning mid-late 1990s many people mobile phones carried separate dedicated pda device running early versions operating systems palm os newton os symbian windows ce/pocket pc operating systems would later evolve early mobile operating systems smartphones era hybrid devices combined existing familiar pda oses basic phone hardware results devices bulkier either dedicated mobile phones pdas allowed limited amount cellular internet access pda mobile phone manufacturers competed reducing size devices bulk smartphones combined high cost expensive data plans plus drawbacks expansion limitations decreased battery life compared separate standalone devices generally limited popularity early adopters business users needed portable connectivity march 1996 hewlett-packard released omnigo 700lx modified hp 200lx palmtop pc nokia 2110 mobile phone piggybacked onto rom-based software support 640×200 resolution cga compatible four-shade gray-scale lcd screen could used place receive calls create receive text messages emails faxes also 100 dos 5.0 compatible allowing run thousands existing software titles including early versions windows august 1996 nokia released nokia 9000 communicator digital cellular pda based nokia 2110 integrated system based pen/geos 3.0 operating system geoworks two components attached hinge became known clamshell design display physical qwerty keyboard pda provided e-mail calendar address book calculator notebook applications text-based web browsing could send receive faxes closed device could used digital cellular telephone june 1999 qualcomm released pdq smartphone cdma digital pcs smartphone integrated palm pda internet connectivity subsequent landmark devices included 1999 japanese wireless provider ntt docomo launched i-mode new mobile internet platform provided data transmission speeds 9.6 kilobits per second access web services available platform online shopping ntt docomo i-mode used chtml language restricted aspects traditional html favor increasing data speed devices limited functionality small screens limited bandwidth allowed phones use slower data speeds available rise i-mode helped ntt docomo accumulate estimated 40 million subscribers end 2001 ranked first market capitalization japan second globally power would later wane face rise 3g new phones advanced wireless network capabilities japanese cell phones increasingly diverged global standards trends offer forms advanced services functionality mobile payments near-field communication nfc 1seg mobile television smartphones still rare outside japan introduction danger hiptop 2002 saw moderate success among u.s. consumers t-mobile sidekick later mid-2000s business users u.s. started adopt devices based microsoft windows mobile blackberry smartphones research motion american users popularized term crackberry 2006 due blackberry addictive nature outside u.s. japan nokia seeing success smartphones based symbian originally developed psion personal organisers popular smartphone os europe middle late 2000s initially nokia symbian smartphones focused business eseries similar windows mobile blackberry devices time 2006 onwards nokia started producing consumer-focused smartphones popularized entertainment-focused nseries 2010 symbian world widely used smartphone operating system 2000s common smartphones physical t9 numeric keypad qwerty keyboard either candybar sliding form factor smartphones resistive touchscreens allowed virtual keyboards handwriting input finger stylus thus also allowing easy entry asian characters 2007 lg prada first mobile phone released large capacitive touchscreen later year apple computer introduced iphone iphone also designed around large capacitive touchscreen added support multi-touch gestures interactions pinching zoom photos web pages phones notable abandoning use stylus keyboard keypad typical smartphones time favor capacitive touchscreen direct finger input input type invention touchscreen smartphone often attributed apple iphone n't first phone touchscreen although made smartphone know today something mainstream due company popularity us lesser extent worldwide made interacting smartphones touchscreen popular following iphone success despite high retail price us 500 smartphone manufacturers started use basic design iphone iphone first smartphone conventional terms ... platform device allows software installed year later followed platforms like palmos symbian windows mobile allowing apps installed apple app store online distribution platform present phone controlled monetized apple became common means smartphone software distribution installation first iphone also faced criticism supporting latest 3g wireless network standards praised hardware software design june 2007 release met heavy demand customers waiting lines outside apple store locations among first purchase screen-focused hardware phones centered around capacitive touchscreen stimulated software focus features web browser designed render full web pages opposed stripped wap services multimedia functionality videos online services maps apps key factor success form factor advantages design around capacitive touchscreen affected development another smartphone os platform android blackberry-like prototype device scrapped favor touchscreen device slide-out physical keyboard google engineers thought time touchscreen could completely replace physical keyboard buttons first android device htc dream released september 2008 although android adoption relatively slow first started gaining widespread popularity 2010 largely due functionality low price early 2012 dominated smartphone market share worldwide continues day android based around modified linux kernel makes linux widely used operating system worldwide also makes android widely used general purpose operating system worldwide apple iphones widespread rich developed countries relatively poor developing countries iphone high end android smartphone considered luxury and/or part social status android iphone devices popularized smartphone form factor based large capacitive touchscreen led decline earlier keyboard- keypad-focused platforms microsoft instance discontinued windows mobile started new touchscreen-oriented os scratch called windows phone nokia abandoned symbian partnered microsoft use windows phone smartphones windows phone became third-most-popular smartphone os replaced windows 10 mobile declined share become largely irrelevant less 0.5 smartphone market palm replaced palm os webos blackberry limited formerly known research motion known phones full qwerty keyboard screen made new platform based qnx blackberry 10 possible control device without press physical buttons mid-2010s almost smartphones touchscreen-only android iphone smartphones dominated market early 2010s larger smartphones screen sizes least 5.5 inches diagonal dubbed phablets began achieve popularity samsung galaxy note series gaining notably wide adoption 2013 huawei launched huawei mate series sports 6.1-inch hd 1280 x 720 ips+ lcd display considered quite large back day 2013 fairphone launched first socially ethical smartphone london design festival address concerns regarding sourcing materials manufacturing followed shiftphone 2015 late 2013 qsalpha commenced production smartphone designed entirely around security encryption identity protection companies began release smartphones incorporating flexible displays create curved form factors samsung galaxy round lg g flex october 2013 motorola mobility announced project ara concept modular smartphone platform would allow users customize upgrade phones add-on modules attached magnetically frame ara retained google following sale motorola mobility lenovo shelved 2016 year lg motorola unveiled smartphones featuring limited form modularity accessories lg g5 allowed accessories installed via removal battery compartment moto z utilizes accessories attached magnetically rear device first smartphone fingerprint reader motorola atrix 4g 2011 september 2013 iphone 5s unveiled first smartphone major u.s. carrier since atrix feature technology 2014 1440p displays began appear high-end smartphones 2015 sony released xperia z5 premium featuring 4k resolution display although images videos could actually rendered resolution software upscaled 1080p microsoft expanding upon concept motorola short-lived webtop unveiled functionality windows 10 operating system phones allows supported devices docked use pc-styled desktop environment major technologies began trend 2016 including focus virtual reality augmented reality experiences catered towards smartphones newly introduced usb-c connector improving lte technologies 2015 global median smartphone ownership 43 statista forecast 2.87 billion people would smartphones 2020 new trends smartphone displays began emerge 2017 lg samsung releasing flagship smartphones utilizing displays taller aspect ratios common ratio designs allow display larger diameter slimmer width 16:9 displays equivalent screen size another trend popularized year displays contained tab-like cut-outs top-centre—colloquially known notch —to contain front-facing camera sometimes sensors typically located along top bezel device designs allow edge-to-edge displays take nearly entire height device little bezel along top design characteristic popularized essential phone featured circular tab camera iphone x used wider tab contain camera facial scanning system 2018 first smartphones featuring fingerprint readers embedded within oled displays announced followed 2019 implementation using ultrasonic sensor samsung galaxy s10 2019 4.7-inches 5.5 inches become industry standard size companies abandoning smaller 4.7-inch displays smartphones foldable displays theorized possible manufacturing costs production processes feasible november 2018 startup company royole unveiled first commercially available foldable smartphone royole flexpai also month samsung presented prototype phone featuring infinity flex display developers conference smaller outer display cover larger tablet-sized display opened samsung stated also develop new polymer material coat display opposed glass early examples foldable phones manufacturers became subject rumors early 2019 samsung officially announced galaxy fold based previously-demonstrated prototype february 2019 originally-scheduled release late-april smartphones central processing units cpus similar computers optimised operate low power environments performance mobile cpu depends clock rate generally given multiples hertz also memory hierarchy challenges performance mobile phone cpus often appropriately given scores derived various standardized tests measure real effective performance commonly used applications one main characteristics smartphones screen depending device design screen fills nearly space device front surface many smartphone displays aspect ratio taller aspect ratios became common 2017 screen sizes measured diagonal inches phones screens larger 5.2 inches often called phablets smartphones screens 4.5 inches size commonly difficult use single hand since thumbs reach entire screen surface may need shifted around hand held one hand manipulated used place hands due design advances modern smartphones large screen sizes edge-to-edge designs compact builds improve ergonomics shift taller aspect ratios resulted phones larger screen sizes whilst maintaining ergonomics associated smaller 16:9 displays liquid-crystal displays common others ips led oled amoled displays displays integrated pressure-sensitive digitizers developed wacom samsung apple force touch system audio quality enhancing features voice lte hd voice appeared often available newer smartphones sound quality remain problem due design phone quality cellular network compression algorithms used long distance calls audio quality improved using voip application wifi cellphones small speakers user use speakerphone feature talk person phone without holding ear small speakers also used listen digital audio files music speech watch videos audio component without holding phone close ear end 2017 smartphone battery life become generally adequate however earlier smartphone battery life poor due weak batteries could handle significant power requirements smartphones computer systems color screens smartphone users purchase additional chargers use outside home work cars buying portable external battery packs external battery packs include generic models connected smartphone cable custom-made models piggyback onto smartphone case 2016 samsung recall millions galaxy note 7 smartphones due explosive battery issue consumer convenience wireless charging stations introduced hotels bars public spaces wide range accessories sold smartphones including cases screen protectors power charging cables wireless power stations usb on-the-go adapters connecting usb drives cases hdmi cable external monitor add-on batteries headphones combined headphone-microphones example allow person privately conduct calls device without holding ear bluetooth-enabled powered speakers enable users listen media smartphones wirelessly cases range relatively inexpensive rubber soft plastic cases provide moderate protection bumps good protection scratches expensive heavy-duty cases combine rubber padding hard outer shell cases book -like form cover user opens use device cover closed protects screen book -like cases additional pockets credit cards thus enabling people use wallets accessories include products sold manufacturer smartphone compatible products made manufacturers mobile operating system mobile os operating system phones tablets smartwatches mobile devices mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 85.9 percent running android 14.1 percent running ios negligible number smartphones running oses android alone popular popular desktop operating system windows general smartphone use even without tablets exceeds desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile app computer program designed run mobile device smartphone term app short-form term software application introduction apple app store iphone ipod touch july 2008 popularized manufacturer-hosted online distribution third-party applications software computer programs focused single platform huge variety apps including video games music products business tools point smartphone application distribution depended third-party sources providing applications multiple platforms getjar handango handmark pocketgear following success app store smartphone manufacturers launched application stores google android market later renamed google play store rim blackberry app world android-related app stores like f-droid february 2014 93 mobile developers targeting smartphones first mobile app development since 1996 smartphone shipments positive growth november 2011 27 photographs created taken camera-equipped smartphones september 2012 study concluded 4 5 smartphone owners use device shop online global smartphone sales surpassed sales figures feature phones early 2013 worldwide shipments smartphones topped 1 billion units 2013 38 2012 725 million comprising 55 share mobile phone market 2013 42 2012 q1 2016 first time shipments dropped 3 percent year year situation caused maturing china market 2011 samsung highest shipment market share worldwide followed apple 2013 samsung 31.3 market share slight increase 30.3 2012 apple 15.3 decrease 18.7 2012 huawei lg lenovo 5 significantly better 2012 figures others 40 previous years figure apple lost market share although shipment volume still increased 12.9 rest significant increases shipment volumes 36–92 q1 2014 samsung 31 share apple 16 q4 2014 apple 20.4 share samsung 19.9 q2 2016 samsung 22.3 share apple 12.9 q1 2017 idc reported samsung first placed 80 million units followed apple 50.8 million huawei 34.6 million oppo 25.5 million vivo 22.7 million samsung mobile business half size apple revenue apple business increased rapidly years 2013 2017 2012 university southern california study found unprotected adolescent sexual activity common among owners smartphones study conducted rensselaer polytechnic institute rpi lighting research center lrc concluded smartphones backlit devices seriously affect sleep cycles persons might become psychologically attached smartphones resulting anxiety separated devices smombie combination smartphone zombie walking person using smartphone paying attention walk possibly risking accident process increasing social phenomenon issue slow-moving smartphone users led temporary creation mobile lane walking chongqing china issue distracted smartphone users led city augsburg germany embed pedestrian traffic lights pavement many countries mobile phones used provide mobile banking services may include ability transfer cash payments secure sms text message kenya m-pesa mobile banking service example allows customers mobile phone operator safaricom hold cash balances recorded sim cards cash deposited withdrawn m-pesa accounts safaricom retail outlets located throughout country transferred electronically person person used pay bills companies branchless banking successful south africa philippines pilot project bali launched 2011 international finance corporation indonesian bank bank mandiri another application mobile banking technology zidisha us-based nonprofit micro-lending platform allows residents developing countries raise small business loans web users worldwide zidisha uses mobile banking loan disbursements repayments transferring funds lenders united states borrowers rural africa mobile phones use internet mobile payments first trialled finland 1998 two coca-cola vending machines espoo enabled work sms payments eventually idea spread 1999 philippines launched country first commercial mobile payments systems mobile operators globe smart mobile phones make mobile payments via direct mobile billing schemes contactless payments phone point sale support near field communication nfc enabling contactless payments nfc-equipped mobile phones requires co-operation manufacturers network operators retail merchants mobile phone use driving—including calling text messaging playing media web browsing gaming using mapping apps operating phone features—is common controversial since widely considered dangerous due known distracted driving distracted operating motor vehicle shown increase risk accidents september 2010 us national highway traffic safety administration nhtsa reported 995 people killed drivers distracted phones march 2011 us insurance company state farm insurance announced results study showed 19 drivers surveyed accessed internet smartphone driving many jurisdictions prohibit use mobile phones driving egypt israel japan portugal singapore handheld hands-free calling mobile phone uses speakerphone banned countries including uk france many us states use calling handheld phones banned hands-free use permitted 2011 study reported 90 college students surveyed text initiate reply read driving scientific literature danger driving sending text message mobile phone texting driving limited simulation study university utah found sixfold increase distraction-related accidents texting due complexity smartphones began grow introduced additional difficulties law enforcement officials attempting distinguish one usage another drivers using devices apparent countries ban handheld hands-free usage rather ban handheld use officials easily tell function phone used simply looking driver lead drivers stopped using device illegally call fact using device legally example using phone incorporated controls car stereo gps satnav 2010 study reviewed incidence phone use cycling effects behavior safety 2013 national survey us reported number drivers reported using phones access internet driving risen nearly one four study conducted university vienna examined approaches reducing inappropriate problematic use mobile phones using phones driving accidents involving driver distracted call phone begun prosecuted negligence similar speeding united kingdom 27 february 2007 motorists caught using handheld phone driving three penalty points added license addition fine £60 increase introduced try stem increase drivers ignoring law japan prohibits use phones driving including use hands-free devices new zealand banned handheld phone use since 1 november 2009 many states united states banned text messaging phones driving illinois became 17th american state enforce law july 2010 30 states banned texting driving kentucky becoming recent addition july 15 public health law research maintains list distracted driving laws united states database laws provides comprehensive view provisions laws restrict use mobile devices driving 50 states district columbia 1992 first law passed december 1 2010 dataset contains information 22 dichotomous continuous categorical variables including example activities regulated e.g. texting versus talking hands-free versus handheld calls web browsing gaming targeted populations exemptions patent war samsung apple started latter claimed original galaxy android phone copied interfaceand possibly hardwareof apple ios iphone 3gs also smartphone patents licensing litigation involving sony mobile google apple inc. samsung microsoft nokia motorola htc huawei zte among others conflict part wider patent wars multinational technology software corporations secure increase market share companies granted patent sue prevent competitors using methods patent covers since 2010s number lawsuits counter-suits trade complaints based patents designs market smartphones devices based smartphone oses android ios increased significantly initial suits countersuits rulings license agreements major events began 2009 smartphone market stated grow rapidly 2012 apps allows sending receiving facsimile fax smartphone including facsimile data composed raster bi-level graphics generated directly digitally document image file formats rise number mobile medical apps market place government regulatory agencies raised concerns safety use applications concerns transformed regulation initiatives worldwide aim safeguarding users untrusted medical advice smartphone malware easily distributed insecure app store often malware hidden pirated versions legitimate apps distributed third-party app stores malware risk also comes known update attack legitimate application later changed include malware component users install notified app updated well one three robberies 2012 united states involved theft mobile phone online petition urged smartphone makers install kill switches devices 2014 apple find iphone google android device manager locate disable wipe data phones lost stolen blackberry protect os version 10.3.2 devices rendered unrecoverable even blackberry operating system recovery tools incorrectly authenticated dissociated account leaked documents published wikileaks codenamed vault 7 dated 2013–2016 detail capabilities united states central intelligence agency cia perform electronic surveillance cyber warfare including ability compromise operating systems smartphones including ios android guidelines mobile device security issued nist many organizations conducting private in-person meeting least one site recommends user switch smartphone disconnect battery using smartphones late night disturb sleep due blue light brightly lit screen affects melatonin levels sleep cycles effort alleviate issues several apps change color temperature screen warmer hue based time day reduce amount blue light generated developed android ios 9.3 integrated similar system-level functionality known night shift amazon released feature known blue shade fire os bellini 5.0 later also theorized users addicted use phones especially go bed result ego depletion many people also use phones alarm clocks also lead loss sleep pocket cameras difficulty producing bokeh images nowadays smartphones dual-lens cameras produce bokeh effect easily even rearrange level bokeh shooting iphone 7 plus debuted dual-lens camera back smartphone advanced smartphones may come 'quad cameras two dual-lens cameras honor 9 lite smartphone back front smartphone 13mp main lens 2mp lens capturing depth information evercoss u50a max smartphone 4 cameras costs less 100 huawei p20 pro smartphone triple lenses back smartphone launched bokeh camera smartphone optical zoom first lens 40mp rgb second lens 20mp monochrome third lens 8mp rgb telephoto 3x zoom enhanced 5x combination optical zoom megapixel lens 40mp rgb produce undeteriorated optical+digital zoom digital zoom without loss quality | [
10242,
8196,
6,
2057,
2066,
2072,
10271,
6178,
4132,
40,
6186,
8237,
2111,
10303,
6212,
69,
6216,
8280,
10332,
8285,
97,
119,
6266,
8315,
8316,
4225,
4228,
8326,
10388,
10393,
154,
6301,
2208,
4259,
8355,
6310,
167,
10410,
8367,
2235,
4... | Test |
1,084 | 3 | Magical_Tree:magical tree konami included magical tree 1998 game anthology konami antiques msx collection vol 2 playstation player character indian brave stereotype wears tanned vest trousers headband feather player ascends magical tree hopping branch branch climbing vines ladders—while also dodging larvae owls lightning bolts player jump dangle branches earns points gathering apples arrows daggers coronets tree 2004 meters tall gauge tracks player altitude conclusion level game informs player much climb reach goal castle treetop ascent divided nine game levels player character dances conclusion level player clears ninth level curtain opens reveal castle top tree smiling crenels castle parapet young woman purple frock man wearing war bonnet end sequence game continues base tree | [
10931,
9006
] | Test |
1,085 | 3 | Intel_ADX:intel adx intel adx multi-precision add-carry instruction extensions intel arbitrary-precision arithmetic extension x86 instruction set architecture isa intel adx first supported broadwell microarchitecture instruction set extension contains two new instructions though codice_1 bmi2 also considered part large integer arithmetic support instructions efficient variants existing codice_2 instruction difference two new instructions affects one flag codice_2 signed addition may set overflow carry flags old-style x86 instruction also reset rest cpu flags two versions affecting different flags means two chains additions carry calculated parallel amd added support processors instructions starting ryzen | [
9092,
2821,
4491,
6924,
4237,
4622,
6038,
9369,
9500,
2088,
9391,
1972,
8120,
8506,
6971,
8125,
8126,
704,
833,
7234,
9541,
3142,
6730,
7755,
5326,
977,
2514,
5844,
9428,
8795,
3294,
2655,
1122,
7783,
1000,
9959,
10985,
9964,
5358,
9582,
... | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.