node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
1,086 | 5 | X.400:x.400 x.400 suite itu-t recommendations define standards data communication networks message handling systems mhs — commonly known email one time designers x.400 expecting predominant form email role taken smtp-based internet e-mail despite widely used within organizations core part microsoft exchange server 2006 variants continue important military aviation contexts first x.400 recommendations published 1984 red book substantially revised version published 1988 blue book new features added 1992 white book subsequent updates although x.400 originally designed run adaptation allow operation tcp/ip rfc 1006 become popular way run x.400 developed cooperation iso x.400-series recommendations specify osi standard protocols exchanging addressing electronic messages companion f.400-series recommendations define message handling services built message handling systems mhs well access mhs public services late 1990s itu-t consolidated recommendations f.400 x.400 published itu-t f.400/x.400 06/1999 recommendation message handling system service overview x.400-series recommendations define technical aspects mhs itu-t rec x.402 iso/iec 10021-2 defines overall system architecture mhs itu-t rec x.411 iso/iec 10021-4 defines message transfer service mts functional component message transfer agent mta itu-t rec x.413 iso/iec 10021-5 defines message store itu-t recommendations provide specific terms descriptions system entities procedures example messages email exchanged among people referred interpersonal messaging ipm electronically structured business documents e.g. invoices purchase orders dispatch advice etc exchanged among trading partners ’ computers fall edi protocols message handling distributed information processing task integrates two related subtasks message transfer message storage itu-t recommendations define specific protocols wide range communication tasks example p1 protocol used explicitly communication among mtas p3 user agent mta p7 user agent message store 1994 version p7 enhanced provide folders message store allow storage submitted messages provide many automatic actions auto-foldering correlation replies delivery reports receipt notifications submitted messages x.400 message content standards defined communication user agents modelled conceptual protocols treat p1 p3/p7 providing underlying reliable transport message contents message content standard interpersonal messaging ipm defined itu-t rec x.420 iso/iec 10021-7 named p2 red book extended version ipm blue book given content-type 22 p2 version 2 often referred informally p22 although term used standards message content standard edi defined itu-t rec f.435 iso/iec 10021-8 itu-t rec x.435 iso/iec 10021-9 informally referred p35 voice messaging content type defined itu-t recs f.440 x.440 exchange server 2007 use mta object x.400 connector must use mta gone exchange server 2007 longer x.400 default proxy e-mail addresses exchange server 2007 important features x.400 include structured addressing asn.1 binary code enabling multimedia content predating efficient mime integrated security capabilities x.400 inter-domain relay services assumed itu run ptts x.400 incorporated fields automated transfer messages x.400 ptt services telex facsimile physical postal mail iso later added open routing standards itu-t rec x.412 iso/iec 10021-10 itu-t rec x.404 iso/iec 10021-11 initial misconception x.400 required ptt relay services coupled ptt volume-based charges factors inhibited widespread uptake x.400 late 1980s many major countries committed osi stack via gosip government open systems interconnection profiles united states form 1990 nist federal information processing standard fips 146 turn major computer vendors committed producing osi-compliant products including x.400 microsoft exchange server developed time period internally based x.400/x.500 initial release equally happy dispatch messages via messaging api mapi x.400 simple mail transfer protocol smtp practice however poorly produced seldom put operation north america many large defense contractors universities also already committed internet tcp/ip standards including smtp email x.400 still used applications military intelligence services aviation mainly x.400 functions integrity security developed deployed much earlier smtp counterparts s/mime pgp smtp-tls similar reasons sometimes used transmission edi messages applications europe south america asia x.400 quite widely implemented especially edi services x.400 extended use military applications see mmhs aviation see amhs one core issues x.400 attempted address failure email properly delivered address specified correctly time addressing formats varied platform platform difficult users know properly type error caused delivery fail outright contrast real postal service even partial addresses would routed dead letter office attempt deliver even information missing wrong solve problem x.400 address scheme included several redundant fields could used help deliver message instance separate fields first last name well initials server identified multiple fields including company organization name well country idea address misspelt name company instance would still contain enough information person name country message properly routed time believed email would provided large service providers often national telephone companies meant long message reached service provider indicated administration management domain admd portion address system would likely know user question service provider likely national scope simply providing right country code could enough information route message properly however model fails email services provided user company organization service provider known case national-scale database users improper organization name enough cause fail dominant model today companies use internal server even commonly use provider like gmail invisible outside organization even users model admd unknown organization multi-part addressing system also led format complex users sure fields important tended provide could made trivial things like printing address business card typing email client difficult simpler systems like found smtp unwieldiness addressing format believed many one factor lack success x.400 x.400 address technically referred originator/recipient address two purposes x.400 address consists several elements including standards originally specify email addresses written instance business card even whether field identifiers upper lower case character sets allowed rfc 1685 specified one encoding based 1993 draft itu-t recommendation f.401 looked like 1984 two forms address formats 1988 x.400 recommendations four forms addressing delineated 1984 form 1 variant 1 format renamed mnemonic o/r address 1984 form 1 variant 3 form 2 format combined renamed terminal o/r address new forms introduced numeric o/r form variation form 1 variant 2 postal o/r address first large-scale use conducted u.s. military communication contract 1992 1997 confusion caused x.400 addressing format led creation x.500 standard directory services idea create hierarchical standardized email address directory replication distribution functionality allowed multiple organizations produce single public directory instance administration management domain service provider could optionally upload directory shared x.500 server allow database searched x.400 user agents email creation thereby avoiding needing know anything address recipient name sort organizational name like company unfortunately x.500 protocol proved every bit complex unwieldy x.400 led creation lightweight directory access protocol ldap standardized simple subset x.500 protocols suitable use end-user software searching addresses ldap widely used directory services like microsoft active directory additionally goal providing universal address database fundamentally flawed time proposed era national telecommunications companies like bell canada france télécom people names phone numbers considered public information already collected directories form phone book extending email addresses seemed obvious however simply case 1980s time email often associated business government users organizations treated addresses valuable even confidential reason organizations share information anyone else rfc2693 put imagine cia adding directory agents world-wide x.500 pool | [
929,
4194,
10886,
8202,
8283,
334,
1297,
9909,
10238,
6651,
1049,
5531,
6110
] | Validation |
1,087 | 5 | Bitcoin:bitcoin bitcoin ₿ cryptocurrency decentralized digital currency without central bank single administrator sent user user peer-to-peer bitcoin network without need intermediaries transactions verified network nodes cryptography recorded public distributed ledger called blockchain bitcoin invented unknown person group people using name satoshi nakamoto released open-source software 2009 bitcoins created reward process known mining exchanged currencies products services research produced university cambridge estimates 2017 2.9 5.8 million unique users using cryptocurrency wallet using bitcoin bitcoin criticized use illegal transactions high electricity consumption price volatility thefts exchanges reputable economists stating zero price bitcoin also used investment although several regulatory agencies issued investor alerts bitcoin domain name bitcoin.org registered 18 august 2008 31 october 2008 link paper authored satoshi nakamoto titled bitcoin peer-to-peer electronic cash system posted cryptography mailing list nakamoto implemented bitcoin software open-source code released january 2009 nakamoto identity remains unknown 3 january 2009 bitcoin network created nakamoto mined first block chain known genesis block embedded coinbase block text times 03/jan/2009 chancellor brink second bailout banks note references headline published times interpreted timestamp comment instability caused fractional-reserve banking receiver first bitcoin transaction cypherpunk hal finney created first reusable proof-of-work system rpow 2004 finney downloaded bitcoin software release date 12 january 2009 received ten bitcoins nakamoto early cypherpunk supporters creators bitcoin predecessors wei dai creator b-money nick szabo creator bit gold 2010 first known commercial transaction using bitcoin occurred programmer laszlo hanyecz bought two papa john pizzas ₿10,000 blockchain analysts estimate nakamoto mined one million bitcoins disappearing 2010 handed network alert key control code repository gavin andresen andresen later became lead developer bitcoin foundation andresen sought decentralize control left opportunity controversy develop future development path bitcoin contrast perceived authority nakamoto contributions early proof-of-concept transactions first major users bitcoin black markets silk road 30 months existence beginning february 2011 silk road exclusively accepted bitcoins payment transacting 9.9 million bitcoins worth 214 million 2011 price started 0.30 per bitcoin growing 5.27 year price rose 31.50 8 june within month price fell 11.00 next month fell 7.80 another month 4.77 litecoin early bitcoin spin-off altcoin appeared october 2011 many altcoins created since 2012 bitcoin prices started 5.27 growing 13.30 year 9 january price risen 7.38 crashed 49 3.80 next 16 days price rose 16.41 17 august fell 57 7.10 next three days bitcoin foundation founded september 2012 promote bitcoin development uptake 2013 prices started 13.30 rising 770 1 january 2014 march 2013 blockchain temporarily split two independent chains different rules due bug version 0.8 bitcoin software two blockchains operated simultaneously six hours version transaction history moment split normal operation restored majority network downgraded version 0.7 bitcoin software selecting backward compatible version blockchain result blockchain became longest chain could accepted participants regardless bitcoin software version split mt gox exchange briefly halted bitcoin deposits price dropped 23 37 recovering previous level approximately 48 following hours us financial crimes enforcement network fincen established regulatory guidelines decentralized virtual currencies bitcoin classifying american bitcoin miners sell generated bitcoins money service businesses msbs subject registration legal obligations april exchanges bitinstant mt gox experienced processing delays due insufficient capacity resulting bitcoin price dropping 266 76 returning 160 within six hours bitcoin price rose 259 10 april crashed 83 45 next three days 15 may 2013 us authorities seized accounts associated mt gox discovering registered money transmitter fincen us 23 june 2013 us drug enforcement administration listed ₿11.02 seized asset united states department justice seizure notice pursuant 21 u.s.c § 881 marked first time government agency seized bitcoin fbi seized ₿30,000 october 2013 dark web website silk road arrest ross william ulbricht bitcoins sold blind auction united states marshals service venture capital investor tim draper bitcoin price rose 755 19 november crashed 50 378 day 30 november 2013 price reached 1,163 starting long-term crash declining 87 152 january 2015 5 december 2013 people bank china prohibited chinese financial institutions using bitcoins announcement value bitcoins dropped baidu longer accepted bitcoins certain services buying real-world goods virtual currency illegal china since least 2009 2014 prices started 770 fell 314 year july 30 2014 wikimedia foundation started accepting donations bitcoin 2015. prices started 314 rose 434 year 2016 prices rose 998 1 january 2017 prices started 998 2017 rose 13,412.44 1 january 2018 reaching time high 19,783.06 17 december 2017 china banned trading bitcoin first steps taken september 2017 complete ban started 1 february 2018 bitcoin prices fell 9,052 6,914 5 february 2018 percentage bitcoin trading chinese renminbi fell 90 september 2017 less 1 june 2018 throughout rest first half 2018 bitcoin price fluctuated 11,480 5,848 1 july 2018 bitcoin price 6,343 price january 1 2019 3,747 72 2018 81 since all-time high bitcoin prices negatively affected several hacks thefts cryptocurrency exchanges including thefts coincheck january 2018 coinrail bithumb june bancor july first six months 2018 761 million worth cryptocurrencies reported stolen exchanges bitcoin price affected even though cryptocurrencies stolen coinrail bancor investors worried security cryptocurrency exchanges unit account bitcoin system bitcoin ticker symbols used represent bitcoin btc xbt unicode character ₿ small amounts bitcoin used alternative units millibitcoin mbtc satoshi sat named homage bitcoin creator satoshi smallest amount within bitcoin representing bitcoins one hundred millionth bitcoin millibitcoin equals bitcoins one thousandth bitcoin 100,000 satoshis bitcoin blockchain public ledger records bitcoin transactions implemented chain blocks block containing hash previous block genesis block chain network communicating nodes running bitcoin software maintains blockchain transactions form payer x sends bitcoins payee z broadcast network using readily available software applications network nodes validate transactions add copy ledger broadcast ledger additions nodes achieve independent verification chain ownership network node stores copy blockchain every 10 minutes new group accepted transactions called block created added blockchain quickly published nodes without requiring central oversight allows bitcoin software determine particular bitcoin spent needed prevent double-spending conventional ledger records transfers actual bills promissory notes exist apart blockchain place bitcoins said exist form unspent outputs transactions transactions defined using forth-like scripting language transactions consist one inputs one outputs user sends bitcoins user designates address amount bitcoin sent address output prevent double spending input must refer previous unspent output blockchain use multiple inputs corresponds use multiple coins cash transaction since transactions multiple outputs users send bitcoins multiple recipients one transaction cash transaction sum inputs coins used pay exceed intended sum payments case additional output used returning change back payer input satoshis accounted transaction outputs become transaction fee though transaction fees optional miners choose transactions process prioritize pay higher fees miners may choose transactions based fee paid relative storage size absolute amount money paid fee fees generally measured satoshis per byte sat/b size transactions dependent number inputs used create transaction number outputs blockchain bitcoins registered bitcoin addresses creating bitcoin address requires nothing picking random valid private key computing corresponding bitcoin address computation done split second reverse computing private key given bitcoin address mathematically unfeasible users tell others make public bitcoin address without compromising corresponding private key moreover number valid private keys vast extremely unlikely someone compute key-pair already use funds vast number valid private keys makes unfeasible brute force could used compromise private key able spend bitcoins owner must know corresponding private key digitally sign transaction network verifies signature using public key private key never revealed private key lost bitcoin network recognize evidence ownership coins unusable effectively lost example 2013 one user claimed lost 7,500 bitcoins worth 7.5 million time accidentally discarded hard drive containing private key 20 bitcoins believed lost would market value 20 billion july 2018 prices ensure security bitcoins private key must kept secret private key revealed third party e.g data breach third party use steal associated bitcoins around 980,000 bitcoins stolen cryptocurrency exchanges regarding ownership distribution 16 march 2018 0.5 bitcoin wallets 87 bitcoins ever mined mining record-keeping service done use computer processing power miners keep blockchain consistent complete unalterable repeatedly grouping newly broadcast transactions block broadcast network verified recipient nodes block contains sha-256 cryptographic hash previous block thus linking previous block giving blockchain name accepted rest network new block must contain proof-of-work pow system used based adam back 1997 anti-spam scheme hashcash pow requires miners find number called nonce block content hashed along nonce result numerically smaller network difficulty target proof easy node network verify extremely time-consuming generate secure cryptographic hash miners must try many different nonce values usually sequence tested values ascending natural numbers 0 1 2 3 ... meeting difficulty target every 2,016 blocks approximately 14 days roughly 10 min per block difficulty target adjusted based network recent performance aim keeping average time new blocks ten minutes way system automatically adapts total amount mining power network 1 march 2014 1 march 2015 average number nonces miners try creating new block increased 16.4 quintillion 200.5 quintillion proof-of-work system alongside chaining blocks makes modifications blockchain extremely hard attacker must modify subsequent blocks order modifications one block accepted new blocks mined time difficulty modifying block increases time passes number subsequent blocks also called confirmations given block increases successful miner finding new block allowed rest network reward newly created bitcoins transaction fees reward amounted 12.5 newly created bitcoins per block added blockchain plus transaction fees payments processed block claim reward special transaction called coinbase included processed payments bitcoins existence created coinbase transactions bitcoin protocol specifies reward adding block halved every 210,000 blocks approximately every four years eventually reward decrease zero limit 21 million bitcoins reached 2140 record keeping rewarded solely transaction fees words nakamoto set monetary policy based artificial scarcity bitcoin inception total number bitcoins could never exceed 21 million new bitcoins created roughly every ten minutes rate generated drops half every four years circulation computing power often bundled together pooled reduce variance miner income individual mining rigs often wait long periods confirm block transactions receive payment pool participating miners get paid every time participating server solves block payment depends amount work individual miner contributed help find block wallet stores information necessary transact bitcoins wallets often described place hold store bitcoins due nature system bitcoins inseparable blockchain transaction ledger wallet correctly defined something stores digital credentials bitcoin holdings allows one access spend bitcoin uses public-key cryptography two cryptographic keys one public one private generated basic wallet collection keys several modes wallets operate inverse relationship regards trustlessness computational requirements third-party internet services called online wallets offer similar functionality may easier use case credentials access funds stored online wallet provider rather user hardware result user must complete trust online wallet provider malicious provider breach server security may cause entrusted bitcoins stolen example security breach occurred mt gox 2011 physical wallets store credentials necessary spend bitcoins offline simple paper printout private key paper wallet paper wallet created keypair generated computer internet connection private key written printed onto paper erased computer paper wallet stored safe physical location later retrieval bitcoins stored using paper wallet said cold storage 2014 interview quadrigacx founder gerald cotten explained company stored customer funds paper wallets safe deposit boxes send money ’ need go back bank every time want put money send money bitcoin app directly paper wallets keep safe way cameron tyler winklevoss founders gemini trust co. exchange reported cut paper wallets pieces stored envelopes distributed safe deposit boxes across united states system theft one envelope would neither allow thief steal bitcoins deprive rightful owners access physical wallets also take form metal token coins private key accessible security hologram recess struck reverse side security hologram self-destructs removed token showing private key accessed originally tokens struck brass base metals later used precious metals bitcoin grew value popularity coins stored face value high ₿1000 struck gold british museum coin collection includes four specimens earliest series funded bitcoin tokens one currently display museum money gallery 2013 utahn manufacturer tokens ordered financial crimes enforcement network fincen register money services business producing funded bitcoin tokens another type physical wallet called hardware wallet keeps credentials offline facilitating transactions hardware wallet acts computer peripheral signs transactions requested user must press button wallet confirm intended make transaction hardware wallets never expose private keys keeping bitcoins cold storage even used computers may compromised malware first wallet program simply named bitcoin sometimes referred satoshi client released 2009 satoshi nakamoto open-source software version 0.5 client moved wxwidgets user interface toolkit qt whole bundle referred bitcoin-qt release version 0.9 software bundle renamed bitcoin core distinguish underlying network bitcoin core perhaps best known implementation client alternative clients forks bitcoin core exist bitcoin xt bitcoin unlimited parity bitcoin 1 august 2017 hard fork bitcoin created known bitcoin cash bitcoin cash larger block size limit identical blockchain time fork 24 october 2017 another hard fork bitcoin gold created bitcoin gold changes proof-of-work algorithm used mining developers felt mining become specialized bitcoin decentralized researchers pointed trend towards centralization although bitcoin sent directly user user practice intermediaries widely used bitcoin miners join large mining pools minimize variance income transactions network confirmed miners decentralization network requires single miner mining pool obtains 51 hashing power would allow double-spend coins prevent certain transactions verified prevent miners earning income six mining pools controlled 75 overall bitcoin hashing power 2014 mining pool ghash.io obtained 51 hashing power raised significant controversies safety network pool voluntarily capped hashing power 39.99 requested pools act responsibly benefit whole network 70 hashing power 90 transactions operating china according researchers parts ecosystem also controlled small set entities notably maintenance client software online wallets simplified payment verification spv clients bitcoin pseudonymous meaning funds tied real-world entities rather bitcoin addresses owners bitcoin addresses explicitly identified transactions blockchain public addition transactions linked individuals companies idioms use e.g. transactions spend coins multiple inputs indicate inputs may common owner corroborating public transaction data known information owners certain addresses additionally bitcoin exchanges bitcoins traded traditional currencies may required law collect personal information heighten financial privacy new bitcoin address generated transaction wallets similar software technically handle bitcoins equivalent establishing basic level fungibility researchers pointed history bitcoin registered publicly available blockchain ledger users may refuse accept bitcoins coming controversial transactions would harm bitcoin fungibility example 2012 mt gox froze accounts users deposited bitcoins known stolen blocks blockchain originally limited 32 megabytes size block size limit one megabyte introduced satoshi nakamoto 2010 eventually block size limit one megabyte created problems transaction processing increasing transaction fees delayed processing transactions satoshi nakamoto stated white paper root problem conventional currencies trust required make work central bank must trusted debase currency history fiat currencies full breaches trust according european central bank decentralization money offered bitcoin theoretical roots austrian school economics especially friedrich von hayek book denationalisation money argument refined hayek advocates complete free market production distribution management money end monopoly central banks according new york times libertarians anarchists attracted idea early bitcoin supporter roger ver said first almost everyone got involved philosophical reasons saw bitcoin great idea way separate money state economist describes bitcoin techno-anarchist project create online version cash way people transact without possibility interference malicious governments banks david golumbia says ideas influencing bitcoin advocates emerge right-wing extremist movements liberty lobby john birch society anti-central bank rhetoric recently ron paul tea party-style libertarianism steve bannon owns good stake bitcoin considers disruptive populism takes control back central authorities revolutionary however researchers looking uncover reasons interest bitcoin find evidence google search data linked libertarianism bitcoin digital asset designed work peer-to-peer transactions currency bitcoins three qualities useful currency according economist january 2015 hard earn limited supply easy verify per researchers bitcoin functions payment system currency economists define money store value medium exchange unit account according economist 2014 bitcoin functions best medium exchange however debated 2018 assessment economist stated cryptocurrencies met none three criteria according research cambridge university 2.9 million 5.8 million unique users used cryptocurrency wallet 2017 bitcoin number users grown significantly since 2013 300,000–1.3 million users addition characterized cryptocurrency bitcoin also characterized payment system overwhelming majority bitcoin transactions take place cryptocurrency exchange rather used transactions merchants delays processing payments blockchain ten minutes make bitcoin use difficult retail setting prices usually quoted units bitcoin many trades involve one sometimes two conversions conventional currencies merchants accept bitcoin payments may use payment service providers perform conversions 2017 2018 bitcoin acceptance among major online retailers included three top 500 u.s. online merchants five 2016 reasons decline include high transaction fees due bitcoin scalability issues long transaction times bloomberg reported largest 17 crypto merchant-processing services handled 69 million june 2018 411 million september 2017 bitcoin actually usable retail transactions high costs inability process chargebacks according nicholas weaver researcher quoted bloomberg high price volatility transaction fees make paying small retail purchases bitcoin impractical according economist kim grauer however bitcoin continues used large-item purchases sites overstock.com cross-border payments freelancers vendors bitcoins bought digital currency exchanges per researchers little sign bitcoin use international remittances despite high fees charged banks western union compete market south china morning post however mentions use bitcoin hong kong workers transfer money home 2014 national australia bank closed accounts businesses ties bitcoin hsbc refused serve hedge fund links bitcoin australian banks general reported closing bank accounts operators businesses involving currency 10 december 2017 chicago board options exchange started trading bitcoin futures followed chicago mercantile exchange started trading bitcoin futures 17 december 2017 winklevoss twins purchased bitcoin 2013 washington post reported claim owned 1 bitcoins existence time methods investment bitcoin funds first regulated bitcoin fund established jersey july 2014 approved jersey financial services commission forbes named bitcoin best investment 2013 2014 bloomberg named bitcoin one worst investments year 2015 bitcoin topped bloomberg currency tables according bitinfocharts.com 2017 9,272 bitcoin wallets 1 million worth bitcoins exact number bitcoin millionaires uncertain single person one bitcoin wallet venture capitalists peter thiel founders fund invested million bitpay purchase bitcoins instead fund bitcoin infrastructure provides payment systems merchants exchanges wallet services etc 2012 incubator bitcoin-focused start-ups founded adam draper financing help father venture capitalist tim draper one largest bitcoin holders winning auction 30,000 bitcoins time called mystery buyer company goal fund 100 bitcoin businesses within 2–3 years 10,000 20,000 6 stake investors also invest bitcoin mining according 2015 study paolo tasca bitcoin startups raised almost 1 billion three years q1 2012 – q1 2015 price bitcoins gone cycles appreciation depreciation referred bubbles busts 2011 value one bitcoin rapidly rose us 0.30 us 32 returning us 2 latter half 2012 2012–13 cypriot financial crisis bitcoin price began rise reaching high us 266 10 april 2013 crashing around us 50 29 november 2013 cost one bitcoin rose peak us 1,242 2014 price fell sharply april remained depressed little half 2013 prices us 600 time bitcoin developers gavin andresen mike hearn warned bubbles may occur according mark t. williams bitcoin volatility seven times greater gold eight times greater p 500 18 times greater us dollar bitcoin decentralized nature trading online exchanges located many countries regulation bitcoin difficult however use bitcoin criminalized shutting exchanges peer-to-peer economy given country would constitute de facto ban legal status bitcoin varies substantially country country still undefined changing many regulations bans apply bitcoin probably extend similar cryptocurrency systems according library congress absolute ban trading using cryptocurrencies applies eight countries algeria bolivia egypt iraq morocco nepal pakistan united arab emirates implicit ban applies another 15 countries include bahrain bangladesh china colombia dominican republic indonesia iran kuwait lesotho lithuania macau oman qatar saudi arabia taiwan u.s. commodity futures trading commission issued four customer advisories bitcoin related investments july 2018 warning emphasized trading cryptocurrency often speculative risk theft hacking fraud december 2017 advisory warned virtual currencies risky u.s. securities exchange commission also issued warnings may 2014 investor alert warned investments involving bitcoin might high rates fraud investors might solicited social media sites earlier investor alert warned use bitcoin ponzi schemes european banking authority issued warning 2013 focusing lack regulation bitcoin chance exchanges would hacked volatility bitcoin price general fraud self-regulatory organization finra north american securities administrators association issued investor alerts bitcoin official investigation bitcoin traders reported may 2018 u.s. justice department launched investigation possible price manipulation including techniques spoofing wash trades traders u.s. u.k south korea possibly countries investigated brett redfearn head u.s. securities exchange commission division trading markets identified several manipulation techniques concern march 2018 u.s. federal investigation prompted concerns possible manipulation futures settlement dates final settlement price cme bitcoin futures determined prices four exchanges bitstamp coinbase itbit kraken following first delivery date january 2018 cme requested extensive detailed trading information several exchanges refused provide later provided limited data commodity futures trading commission subpoenaed data exchanges state provincial securities regulators coordinated north american securities administrators association investigating bitcoin scams icos 40 jurisdictions academic research published journal monetary economics concluded price manipulation occurred mt gox bitcoin theft market remains vulnerable manipulation history hacks fraud theft involving bitcoin dates back least 2011 research john m. griffin amin shams 2018 suggests trading associated increases amount tether cryptocurrency associated trading bitfinex exchange account half price increase bitcoin late 2017 j.l van der velde ceo bitfinex tether denied claims price manipulation bitfinex tether ever engaged sort market price manipulation tether issuances used prop price bitcoin coin/token bitfinex bank international settlements summarized several criticisms bitcoin chapter v 2018 annual report criticisms include lack stability bitcoin price high energy consumption high variable transactions costs poor security fraud cryptocurrency exchanges vulnerability debasement forking influence miners economist wrote 2015 criticisms unfair predominantly shady image may compel users overlook capabilities blockchain technology also due fact volatility bitcoin changing time bitcoin along cryptocurrencies described economic bubble least eight nobel memorial prize economic sciences laureates including robert shiller joseph stiglitz richard thaler noted keynesian economist paul krugman wrote new york times column criticizing bitcoin calling bubble fraud professor nouriel roubini new york university called bitcoin mother bubbles central bankers including former federal reserve chairman alan greenspan investors warren buffett george soros stated similar views business executives jamie dimon jack bitcoin criticized amount electricity consumed mining economist estimated even miners used modern facilities combined electricity consumption would 166.7 megawatts 1.46 terawatt-hours per year end 2017 global bitcoin mining activity estimated consume one four gigawatts electricity politico noted even high-end estimates bitcoin total consumption levels amount 6 total power consumed global banking sector even bitcoin consumption levels increased 100 fold today levels bitcoin consumption would still amount 2 global power consumption lower costs bitcoin miners set places like iceland geothermal energy cheap cooling arctic air free bitcoin miners known use hydroelectric power tibet quebec washington state austria reduce electricity costs miners attracted suppliers hydro quebec energy surpluses according university cambridge study much bitcoin mining done china electricity subsidized government various journalists economists central bank estonia voiced concerns bitcoin ponzi scheme april 2013 eric posner law professor university chicago stated real ponzi scheme takes fraud bitcoin contrast seems like collective delusion july 2014 report world bank concluded bitcoin deliberate ponzi scheme june 2014 swiss federal council examined concerns bitcoin might pyramid scheme concluded since case bitcoin typical promises profits lacking assumed bitcoin pyramid scheme july 2017 billionaire howard marks referred bitcoin pyramid scheme bitcoin vulnerable theft phishing scamming hacking around 980,000 bitcoins stolen cryptocurrency exchanges use bitcoin criminals attracted attention financial regulators legislative bodies law enforcement media united states fbi prepared intelligence assessment sec issued pointed warning investment schemes using virtual currencies u.s. senate held hearing virtual currencies november 2013 u.s. government claimed bitcoin used facilitate payments related russian interference 2016 united states elections several news outlets asserted popularity bitcoins hinges ability use purchase illegal goods nobel-prize winning economist joseph stiglitz says bitcoin anonymity encourages money laundering crimes open hole like bitcoin nefarious activity go hole government allow also said regulate could n't engage money laundering crimes demand bitcoin regulating abuses going regulate existence exists abuses 2014 researchers university kentucky found robust evidence computer programming enthusiasts illegal activity drive interest bitcoin find limited support political investment motives australian researchers estimated 25 bitcoin users 44 bitcoin transactions associated illegal activity estimated 24 million bitcoin users primarily using bitcoin illegal activity held 8 billion worth bitcoin made 36 million transactions valued 72 billion charles stross 2013 science fiction novel neptune brood universal interstellar payment system known bitcoin operates using cryptography stross later blogged reference intentional saying wrote neptune brood 2011 bitcoin obscure back figured enough name recognition useful term interstellar currency 'd clue people networked digital currency 2014 documentary rise rise bitcoin portrays diversity motives behind use bitcoin interviewing people use include computer programmer drug dealer 2016 documentary banking bitcoin introduction beginnings bitcoin ideas behind cryptocurrency today september 2015 establishment peer-reviewed academic journal ledger announced covers studies cryptocurrencies related technologies published university pittsburgh journal encourages authors digitally sign file hash submitted papers timestamped bitcoin blockchain authors also asked include personal bitcoin address first page papers | [
3713,
8574,
8706,
8068,
1925,
9859,
8331,
3982,
4624,
1683,
4883,
535,
9240,
10522,
1435,
9375,
5024,
9248,
10658,
11684,
10154,
7085,
3886,
1970,
10110,
3508,
8244,
4280,
3642,
10875,
574,
1087,
3904,
833,
5438,
8514,
708,
5956,
1222,
58... | Test |
1,088 | 4 | Web_threat:web threat web threat threat uses world wide web facilitate cybercrime web threats use multiple types malware fraud utilize http https protocols may also employ protocols components links email im malware attachments servers access web benefit cybercriminals stealing information subsequent sale help absorb infected pcs botnets web threats pose broad range risks including financial damages identity theft loss confidential information/data theft network resources damaged brand/personal reputation erosion consumer confidence e-commerce online banking type threat related information technology risk i.e risk affecting gained increasing impact society due spread processes web threats divided two primary categories based delivery method – push pull push-based threats use spam phishing fraudulent means lure user malicious often spoofed website collects information and/or injects malware push attacks use phishing dns poisoning pharming means appear originate trusted source precisely-targeted push-based web threats often referred spear phishing reflect focus data gathering attack spear phishing typically targets specific individuals groups financial gain push-based web threats malware authors use social engineering enticing subject lines reference holidays popular personalities sports pornography world events hot topics persuade recipients open email follow links malicious websites open attachments malware accesses web pull-based web threats often referred “ drive-by ” threats experts commonly “ drive-by downloads ” journalists general public since affect website visitor cybercriminals infect legitimate websites unknowingly transmit malware visitors alter search results take users malicious websites upon loading page user ’ browser passively runs malware downloader hidden html frame iframe without user interaction giorgio maone wrote 2008 today ’ malware runs mostly runs windows ’ commonest executable platform tomorrow ’ likely run web reason like web already huge executable platform start thinking way security perspective growth web threats result popularity web – relatively unprotected widely consistently used medium crucial business productivity online banking e-commerce well everyday lives people worldwide appeal web 2.0 applications websites increases vulnerability web web 2.0 applications make use ajax group web development programming tools used creating interactive web applications rich internet applications users benefit greater interactivity dynamic websites also exposed greater security risks inherent browser client processing september 2008 malicious hackers broke several sections businessweek.com redirect visitors malware-hosting websites hundreds pages compromised malicious javascript pointing third-party servers august 2008 popular social networking sites hit worm using social engineering techniques get users install piece malware worm installs comments sites links fake site users follow link told need update flash player installer installs malware rather flash player malware downloads rogue anti-spyware application antispy spider may 2008 websites worldwide compromised malicious javascript initially half million websites worldwide infected sql injection leveraged zlob variant downloaded additional trojan onto users ’ pcs websites china taiwan singapore compromised followed shortly thereafter humanitarian government news sites uk israel asia attack compromised websites led variety redirects download trojan september 2017 visitors tv network showtime website found website included coinhive code automatically began mining monero cryptocurrency without user consent coinhive software throttled use twenty percent visiting computer cpu avoid detection shortly discovery publicized social media coinhive code removed showtime declined comment multiple news articles unknown showtime inserted code website intentionally addition cryptomining code result website compromise coinhive offers code websites requires user consent prior execution less 2 percent coinhive implementations use code german researchers defined cryptojacking websites executing cryptomining visiting users computers without prior consent 1 every five hundred websites hosting cryptomining script cryptojacking persistent web threat conventional approaches failed fully protect consumers businesses web threats viable approach implement multi-layered protection—protection cloud internet gateway across network servers client web threat solution | [
3072,
6786,
899,
5636,
5764,
7044,
9591,
10245,
10756,
9227,
9356,
9102,
7441,
8978,
4863,
4883,
4245,
278,
9233,
10392,
1690,
3867,
9242,
10141,
5281,
9761,
10915,
2213,
8998,
9256,
939,
300,
9727,
9771,
1970,
4023,
10297,
3643,
6588,
77... | None |
1,089 | 8 | Kiwix:kiwix kiwix free open-source offline web browser created emmanuel engelhart renaud gaudin 2007 first launched allow offline access wikipedia since expanded include projects wikimedia foundation well public domain texts project gutenberg available 100 languages kiwix included several high-profile projects smuggling operations north korea encyclopedic access cuba google impact challenge recipient bibliothèques sans frontières founder emmanuel engelhart sees wikipedia common good saying contents wikipedia available everyone even without internet access launched kiwix project becoming wikipedia editor 2004 emmanuel engelhart became interested developing offline versions wikipedia initiated 2003 trigger project 2012 kiwix grant wikimedia france build kiwix-plug deployed universities eleven countries known afripedia project february 2013 kiwix sourceforge project month award open source award 2015 software designed offline reader web content used computers without internet connection computers slow expensive connection avoid censorship also used traveling e.g plane train users first download kiwix download content offline viewing kiwix compression saves disk space bandwidth english-language wikipedia pictures fits usb stick 54 gb may 2016 16 gb pictures content files compressed zim format makes smaller leaves easy index search selectively decompress zim files opened kiwix looks behaves like web browser kiwix offers full text search tabbed navigation option export articles pdf html http server version called kiwix-serve allows computer host kiwix content make available computers network computers see ordinary website kiwix-plug http server version plug computers often used provide wi-fi server kiwix uses deprecated xulrunner mozilla application framework localised translatewiki.net plans replace list content available kiwix available download including language-specific sublists content loaded kiwix since 2014 wikipedia versions available download various different languages english wikipedia full version containing pictures well alternative version containing text downloaded archive servers updated every two ten months depending size file english wikipedia update frequency thus substantially lower bzip2 database downloads wikimedia foundation besides wikipedia content wikimedia foundation wikisource wikiquote wikivoyage wikibooks wikiversity also available offline viewing various different languages november 2014 zim version open texts forming part project gutenberg made available besides public domain content works licensed creative commons license available download well example offline versions ubuntu wiki containing user documentation ubuntu operating system zim editions ted conference talks videos crash course available kiwix archive zim file formats kiwix installed desktop computer stand-alone program installed tablet smartphone create wlan environment raspberry plug software development project kiwix directly involved deployment projects however third party organisations use software component projects examples include kiwix formerly available native package managers linux distributions however kiwix currently available package databases due xulrunner program kiwix depends deprecated mozilla removed package databases kiwix available sugar archlinux linux distributions also available android kiwix available microsoft store google play apple ios app store since 2015 series customized apps also released medical wikipedia phet simulations two largest | [
225,
1089,
5343,
934,
9063,
3881,
5067,
237,
7983,
8627,
10900,
823,
1849,
6618,
1083,
8413,
3743
] | Test |
1,090 | 3 | PowerBook_160:powerbook 160 powerbook 160 portable computer released apple computer along powerbook 145 powerbook 180 october 1992 time constituted mid-range model replacing previous powerbook 140 processing power powerbook 160 sold may 1994 case design powerbook 180 shipped less powerful 25 mhz motorola 68030 cpu fpu identically low-end 145 however powerbook 160 came diagonal passive matrix lcd screen first time capable displaying 4-bit grayscale 160 180 first powerbooks add external color video port like macintosh portable well increasing maximum ram 14 mb powerbooks introduced new power saving feature allowed processors run slower 16 mhz rate speed original 140 powerbook 160 40mb scsi hard disk drive configurable 80 120mb 165 added 33 mhz processor larger standard hard drive along powerbook 145b would last true 100 series powerbooks last apple laptop include two serial printer modem ports entry level descendant powerbook 150 would continue sell another year though used 140 case design internals actually based powerbook duo powerbook 190 100-series powerbook name used powerbook 5300 motherboard case well 165c pictured identical 165 except included 68882 fpu passive matrix color lcd capable displaying 256 colors apple first powerbook color display result thicker color display exterior case lid redesigned closely resembling used powerbook duo series powerbook 180c used case modification | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
4180,
10838,
10840,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
7299,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
7869,
8893,
8896,
4807,
4810,
... | None |
1,091 | 3 | PlayStation_2_accessories:playstation 2 accessories various accessories playstation 2 video game console produced sony well third parties include controllers audio video input devices like microphones video cameras cables better sound picture quality dualshock 2 analog controller scph-10010 standard controller playstation 2 almost identical original dualshock controller original playstation console minor changes buttons l3 r3 analog feature analog pressure sensitivity connecting cable slightly longer original dualshock black rather grey connector squarer dualshock 2 printed top controller features two levels vibration feedback logitech cordless action controller officially licensed wireless controller playstation 2 made logitech features inputs found standard dualshock 2 controller i.e ten analog pressure-sensitive buttons l1 r1 l2 r2 start select three digital button l3 r3 analog mode button two analog sticks buttons pressure-sensitive controller compatible games require dualshock 2 controller also features two vibration motors haptic feedback compatible dualshock/dualshock 2 enabled games power saving measure vibration may turned user way button controller face powered two aa batteries communicates console using proprietary 2.4 ghz rf protocol wireless way dongle connects ps2 controller port similar manner nintendo wavebird wireless controller like logitech cordless action controller logitech cordless controller officially licensed wireless playstation 2 controller made logitech features buttons including analog functionality standard dualshock 2 controller compatible games requiring dualshock 2 powered two aa batteries power-saving measure vibration function turned communicates console via wireless dongle connects ps2 controller port uses proprietary 2.4 ghz rf technology sega saturn ps2 controller controller ps2 based around sega saturn type-2/japanese style controller controller officially licensed sony sega first version released black exclusively japan 2005 second version produced color purple part joint venture sega capcom coincide launch vampire darkstalkers collection japan connector almost identical original saturn controller minor changes place original saturn start button indented playstation style start select buttons additionally reset stop play/pause rewind fast-forward labels x z l r buttons removed labels corresponding playstation buttons added listed http //uk.playstation.com/ps2/peripherals/detail/item285752/driving-force e2 84 a2-gt/ various microphones available use playstation 2 rhythm games sony singstar karaoke games harmonix rock band series singstar microphones available wired wireless varieties connect console via usb certain ps2 games dance pad compatible allows player follow alongside game actions player must perform usually found games dance revolution games buzz buzzers special controllers designed specifically buzz quiz game series controllers feature large red buzzer buttons four smaller coloured buttons answer selection wired wireless versions available come bundled buzz games four-buzzer set acts single usb device connects usb port playstation 2 wireless versions connect via usb dongle dongle able support 4 wireless buzzers time second dongle required additional buzzers 8 player games wired wireless versions buzzers compatible playstation 2 playstation 3 big button controllers available xbox 360 heavily resemble buzzers many respects fulfil function dvd remote control infra-red remote control playstation 2 designed allow easier control dvd movies first remote scph-10150 came bundled scph-10170 infra-red receiver dongle scph-10160 attached one playstation 2 controller ports dongle needed later ps2 models beginning scph-500xx slimline ps2 models scph-700xx scph-900xx feature integrated ir port two different models dvd remote control released minor differences first released scph-10150 second scph-10420 functionally visually identical apart addition eject reset/power buttons however eject button work ps2 models scph-100xx -500xx slimline playstation 2 models motorized disc tray eject versions remote feature standard ps2 buttons addition dvd playback controls various a/v cables made available playstation 2 offer varying levels picture quality additionally ps2 features toslink port facilitates output digital s/pdif audio 2-channel lpcm 5.1-channel dolby digital 5.1-channel dts latter two available dvd playback encoded disk ps2 compatible playstation playstation 3 cables use av-multi port rfu adapter scph-1122 rf modulator cable carries mono audio video 576i/50 hz pal 480i/60 hz ntsc via rf signal connects using tv aerial plug similar rfu adapter cable available playstation av cable scph-10500 included ps2 carries dual-channel stereo audio composite video 576i/50 hz pal 480i/60 hz ntsc identical composite cables available playstation playstation 3 consoles pal territories also come bundled composite/stereo scart adapter block facilitate connection scart enabled tvs merely adapter provides quality improvement direct composite connection s-video cable scph-10060u/97030 carries dual-channel stereo audio s-video 576i/50 hz pal 480i/60 hz ntsc provides clearer picture standard av cable av adaptor video connector scph-10130 break-out box provides additional av-multi port well composite s-video stereo audio connectors allow connection av receiver similar device euro av cable scph-10142 scart cable capable carrying 576i/50 hz 480i/60 hz using rgb standard well standard stereo audio composite video provides clearer picture either s-video composite signals use euro av cable ps2 must set rgb mode options component av cable scph-10490 cable capable carrying 576i/50 hz 480i/60 hz using ypp rgb standards well standard stereo audio via rca connectors provides clearer picture either s-video composite signals also required games support video modes progressive scan 480p 1080i ps1 games output 240p cable may cause compatibility issues newer tv's.to use component av cable ps2 must set ypp mode options d-terminal cable identical component cable connector sold japan uses japanese d-terminal standard playstation 2 vga cable carries rgbhv video via vga connector compatible progressive scan games ps2 linux since ps2 output separate sync sync green must used instead may incompatible monitors memory card 8 mb scph-10020 magic gate used store settings eyetoy video messages savegames official sony memory cards available size 8 mb memory card came black crimson red ocean blue later sony partnered third-party accessories company katana make memory cards came 16 mb 32 mb memory cards officially licensed products playstation 2 logo says magic gate third party memory cards available 128 mb multitap playstation 2 allows four controllers four memory cards attached single controller port memory card slot 8 controllers memory cards may attached console one time using two multitaps simultaneously certain multitaps work specific ps2 models due slight differences slot placement scph-10090 designed fit original consoles scph-70120 instead designed slim consoles eyetoy digital camera device similar webcam playstation 2 originally eyetoys manufactured logitech known logicool japan later models manufactured namtai eyetoy mainly used playing specifically-designed eyetoy games also used capture images videos also compatible playstation 3 ps2 headset connects via usb 1.1 front console headset commonly used online multiplayer games however also used karaoke style games voice control enhance immersive experience single player games 3.5mm audio stereo splitter transfer audio playstation 2 output devices including headphones headset speakers playstation 2 network adapter optional accessory internet multiplayer compatible games although ps2 slim one built ps2 fat network adapter needed purchased official sony playstation 2 usb keyboard mouse came bundled part linux playstation 2 turns non slim ps2 linux computer standard usb keyboard mouse work addition linux kit handful games used keyboard mouse mouse trackball vertical stand attached playstation 2 console allow stand vertically three different versions available scph-10040 original large consoles scph-70110 slimline scph-700xx consoles scph-90110 slimline scph-900xx consoles horizontal stand attached base original fat playstation 2 consoles add height style | [
10368,
643,
9091,
3077,
11398,
10761,
6799,
9508,
6311,
9512,
684,
306,
1587,
9543,
10056,
6732,
10316,
6738,
6873,
859,
4060,
5215,
607,
359,
8937,
3824,
5746,
7028,
7801,
8316,
6781
] | Test |
1,092 | 7 | Limnu:limnu limnu online whiteboarding app founded 2015 david debry david hart primarily used educators businesses sketch ideas digital boards via ipad users invite others view edit boards | [] | Test |
1,093 | 4 | Open_Information_Security_Maturity_Model:open information security maturity model open group information security management maturity model o-ism3 information security management framework provides approach designing planning implementing governing information security management systems original motivation behind o-ism3 development narrow gap theory practice information security management systems trigger idea linking security management maturity models o-ism3 strove keep clear number pitfalls previous approaches project looked capability maturity model integration iso 9000 cobit itil standards found potential improvement several fields linking security business needs using process based approach providing additional details implementation suggesting specific metrics preserving compatibility current security management standards open group provides o-ism3 free charge organisations internal noncommercial purposes | [
6360,
5373,
8975
] | Validation |
1,094 | 4 | Control-flow_integrity:control-flow integrity control-flow integrity cfi general term computer security techniques prevent wide variety malware attacks redirecting flow execution program associated techniques include code-pointer separation cps code-pointer integrity cpi stack canaries shadow stacks vtable pointer verification related implementations available clang microsoft control flow guard return flow guard google indirect function-call checks reuse attack protector rap control flow guard cfg first released windows 8.1 update 3 kb3000850 november 2014 developers add cfg programs adding codice_1 linker flag program linking visual studio 2015 newer windows 10 creators update windows 10 version 1703 windows kernel compiled cfg windows kernel uses hyper-v prevent malicious kernel code overwriting cfg bitmap cfg operates creating per-process bitmap set bit indicates address valid destination performing indirect function call application checks destination address bitmap destination address bitmap program terminates makes difficult attacker exploit use-after-free replacing object contents using indirect function call execute payload protected indirect function calls codice_2 function called performs following steps several generic techniques bypassing cfg | [
1954,
642,
6754,
4582,
1103,
4562,
2262,
9655,
7515,
2558
] | Validation |
1,095 | 9 | Unified_Expression_Language:unified expression language java unified expression language special purpose programming language mostly used java web applications embedding expressions web pages java specification writers expert groups java web-tier technologies worked unified expression language first included jsp 2.1 specification jsr-245 later specified jsr-341 part java ee 7 expression language started part javaserver pages standard tag library jstl originally called spel simplest possible expression language expression language el scripting language allowed access java components javabeans jsp since jsp 2.0 used inside jsp tags separate java code jsp allow easier access java components java code years expression language evolved include advanced functionality included jsp 2.0 specification scripting made easier web-content designers little practically knowledge core java language scripting language made jsp scripting language true sense el jsp consisted special tags like scriptlets expressions etc within java code written explicitly el web-content designer needs know make proper calls core java methods el syntactically semantically similar javascript expressions el also liberated programmer know particularities values actually accessed codice_1 mean depending codice_4 either codice_5 codice_6 codice_7 etc development jsp 2.0 javaserver faces technology released also needed expression language expression language defined jsp 2.0 specification n't satisfy needs development jsf technology obvious limitations expressions evaluated immediately jsf components could invoke methods server-side objects powerful language created following new features new expression language worked well purposes jsf developers problems integrating jsp el jsf el conflicts incompatibilities unified expression language initiative started unify expression languages jsp 2.1 expression languages jsp 2.0 jsf 1.1 merged single unified expression language el 2.1 version 3.0 expression language unified longer deemed necessary developed jsr independent jsp jsf specifications jsr-341 new features added notably el equivalents java 8 streams lambda expressions new unified el union jsp jsf expression languages addition features already available jsp el unified el following features shows simple example unified el used within jstl c tag expression calls method parameter | [
9988,
3462,
3341,
10526,
10020,
5677,
6067,
2106,
3517,
6334,
3518,
3008,
10559,
11582,
9926,
1095,
3278,
3920,
1363,
4959,
3558,
1128,
3560,
9834,
3954,
9590
] | None |
1,096 | 8 | UTM_parameters:utm parameters urchin tracking module utm parameters five variants url parameters used marketers track effectiveness online marketing campaigns across traffic sources publishing media introduced google analytics predecessor urchin consequently supported out-of-the-box google analytics utm parameters url identify campaign refers traffic specific website attributes browser website session sessions campaign attribution window expires parameters parsed analytics tools used populate reports example url utm parameters highlighted question mark codice_1 utm parameters url identify marketing campaign refers traffic specific website define append relevant utm parameters appropriate urls marketers routinely use simple spreadsheet-based automated utm builder tools including google analytics url builder websites equivalent chrome extension hyperlink followed contains url utm parameters web analytics software destination website interprets parameter information attributes browser website session sessions campaign attribution window expired default six months google analytics utm parameters passed urls parsed analytics tools google analytics adobe analytics data used populate standard custom analytics reports web analytics software may attribute parameters browser current subsequent sessions campaign window expired five different utm parameters may used order | [
4096,
10579,
5524,
4797
] | Test |
1,097 | 8 | Web_Single_Sign-On_Interoperability_Profile:web single sign-on interoperability profile web single sign-on interoperability profile web services federated identity specification published microsoft sun microsystems defines interoperability ws-federation liberty alliance protocols | [
9665,
10020,
7878,
5303,
2013
] | Validation |
1,098 | 2 | Features_new_to_Windows_Vista:features new windows vista compared previous versions microsoft windows new features windows vista numerous covering aspects operating system include new technical features new aspects security safety new networking features new i/o technologies additional management features premium editions windows vista include redesigned user interface visual style named windows aero authentic energetic reflective open aero intended cleaner aesthetically pleasing previous windows versions including glass-like transparencies window animations windows aero also features new default font segoe ui slightly larger size streamlined style wizards change tone phrasing dialogs control panels addition windows aero visual style windows vista home basic exclusively includes windows vista standard theme hardware requirements windows aero therefore uses desktop window manager desktop composition include ability generate live thumbnails running applications allow transparency window frame result 3d effects features associated live thumbnails included theme included versions windows vista basic theme use desktop composition geared towards lower-end machines able use desktop window manager theme comparable windows xp luna theme finally vista includes windows classic windows standard themes similar classic themes windows 2000 windows xp windows aero available windows vista home basic starter editions although desktop window manager included windows vista home basic windows vista start menu undergone major changes taskbar icon longer labeled start instead windows pearl orb top level start menu windows xp two columns menu choices default configuration run printers options appear however items added start menu one chief additions windows vista search pane box users may begin typing immediately contents start menu indexed searchable besides global search index indexing turned search box returns results on-the-fly users type allows start menu act fast powerful application launcher start menu search also doubles run command previous versions windows simply typing command execute run command also added separately right column start menu another major change start menu windows vista longer presents programs menu horizontally expanding cascading list utilizes entire screen space instead nested folder view fixed size list submenus single items appears left column contents back button subfolders expand collapse vertically within list single-clicked tree-like fashion similar windows explorer single items appear top folders appear bottom hovering mouse folder open folder needs clicked limitation new start menu subfolders inside programs menu opened simply searching double clicking also programs installed vertical scroll bar appears two columns dynamically changing icon showing user display picture default present top right column changes users hover item reflect item icon power button action configurable power options control panel though default setting put computer sleep mode users quickly lock user account pressing lock button additional power account related actions listed sub-menu appears small arrow next lock button clicked like windows xp windows vista allows users switch back previous version start menu first introduced windows 95 windows explorer task panel removed integrating relevant task options toolbar favorites pane left contains commonly accessed folders prepopulated search folders seven different views available view files folders namely list details small icons medium icons large icons extra large icons tiles file folder actions cut copy paste undo redo delete rename properties built dropdown menu appears organize button clicked also possible change layout explorer window using organize button users select whether display classic menus search pane preview pane reading pane and/or navigation pane document properties available common 'open 'save dialog boxes easier add metadata author subject document metadata viewed edited details pane shows bottom explorer window navigation pane contains list common folders favorites quick navigation also show folder layout entire hard drive subset contain real folders well virtual ones default contains links folders documents publicly shared folder well virtual folders search present saved virtual folders lists recently changed documents preview pane used preview contents document including viewing pictures size larger thumbnails shown folder listing sampling contents media file without opening additional program explorer show preview image format necessary codec authored using windows imaging component installed also application installs preview handlers like office 2007 documents edited preview pane windows explorer also contains modifications visualization files computer new addition windows explorer details pane displays metadata information relating currently selected file folder windows vista introduces newer ithumbnailprovider interface shows thumbnails details pane well large icon views furthermore different imagery overlaid thumbnails give information file picture frame around thumbnail image file filmstrip video file thumbnails zoomed preview panel allows see thumbnails sorts files view contents documents similar way preview email messages outlook without opening files new intelligent algorithm creation video thumbnails chooses random frame inside video ensures thumbnail black xp showed first frame usually black address bar modified present breadcrumbs view shows full path current location clicking location path hierarchy takes user level instead repeatedly pressing back button pressing button roughly analogous possible prior windows vista pressing small down-arrow next back selecting folder list previously accessed folders makes one level button obsolete removed also possible navigate subfolder current folder using arrow right last item click space right copy edit path manually many microsoft-made windows vista applications menu bar hidden default pressing alt key makes menu bar appear free used space drives shown horizontal indicator bars check boxes allow selection multiple files items grouped clicking group header selects items group multiple groups files also selected clicking group headers holding ctrl icons windows vista visually realistic illustrative icons scalable size 256 × 256 pixels required icon sizes optional sizes document icons show actual document contents several media types distinguished icon overlays video audio photos icons zoomed using gradual slider holding ctrl key using mouse scroll wheel optimize reduce size large icons icons may stored compressed pngs maintain backward compatibility earlier versions windows larger sized icons use lossless png windows explorer includes significant changes previous versions windows terms organization column headers available explorer views allow filtering sorting grouping stacking combined integrated desktop search explorer allows users find organize files new ways stacks stacks view groups files according criterion specified user stacks clicked filter files shown windows explorer windows explorer also sorts files on-the-fly automatically renamed pasted details pane also allows change textual metadata author title files support within windows explorer new type metadata called tags allows users add descriptive terms documents easier categorization retrieval files support open metadata allowing users define new types metadata files box windows vista supports microsoft office documents audio files metadata support file types however added writing property handlers unlike previous versions windows metadata stored inside file always travel file however initially users able add metadata file types moving copying files windows explorer displays full source destination path size number items transfer speed megabytes per second mb/s conflict error encountered terminate copy move delete operation rather file skipped rest files processed end operation errors presented user resolution options available two files name option available rename file previous versions windows options either replace destination file cancel process user also choose apply action conflicts also first time windows processing dates moving trees somewhat consistent every folder subfolder obtained three dates new time operation nature operation file system level create destination folders move files delete origin folders moved folders vista preserve creation modification dates access date gets time operation external data storage device unexpectedly disengaged accidentally removed copying files onto user given chance retry operation without restarting file copy operation beginning gives user chance reconnect external data storage device involved retry operation renaming file even extensions displayed explorer highlights filename without selecting extension renaming multiple files quicker pressing tab automatically renames existing file folder opens file name text field next file renaming shift+tab allow renaming manner upwards case file use locked another application windows explorer informs users close application retry file operation also new interface codice_1 introduced api developers use let applications switch main window application file open simply close file file use dialog running application exposes operations means codice_1 interface windows explorer upon encountering locked file allows user close file switch application dialog box common issue previous windows versions competing applications common tasks tried associate default certain file type using custom user interface default application information particular file type stored registry per-machine basis resulting applications changing another user default program one user defaults changed application querying several different registry values launched windows vista onwards file type associations protocol handlers set per-user basis using new default programs api meaning default programs file types tasks different individual user api calling common user interface applications longer need maintain file association ui default programs api gives applications programmatic way check discover default applications restore single registered defaults query owner specific default file association/protocol launch default programs ui specific application clear per user associations applications need registered install time part default programs windows vista premium ready pcs using alt+tab switch open windows preview open window appears instead program icon addition windows flip 3d enables users flip cascading stack open windows using mouse scroll wheel much like apple cover flow windows stacked rotated 3d provide views simultaneously keyboard shortcuts makes flip 3d disappear releasing ++ keeps flip 3d visible releasing ++ flip open windows backwards window buttons taskbar show thumbnail image window mouse hovers button windows ultimate extras optional features offered users windows vista ultimate accessible windows update include windows dreamscene utility allows videos used desktop backgrounds mui packs windows sound schemes games bitlocker enhancements windows vista features system-wide integrated search called instant search also known windows search instant search designed run significantly faster offers customized search capabilities search boxes added throughout explorer user interface start menu open/save dialog boxes several applications included windows vista default instant search indexes small number folders start menu names files opened documents folder user e-mail beyond searching files search works help control panel networking control panel example typing firewall instantly return applets system firewall natural language search enables queries e-mail user sent week music mozart also supported optional feature search engine uses indexing allow quick display results given search advanced options allow user choose file type indexed properties properties file contents start menu search also doubles run command previous versions windows simply typing command execute indexed search platform based microsoft windows desktop search 3.0 windows search version 4.0 vista sp2 allowing third-party applications e.g microsoft outlook 2007 use indexing platform store metadata perform searches windows vista windows xp windows desktop search redistributable installed contrast search engine windows xp takes time display results user finished typing search string windows vista search allows users add multiple filters continually refine search results file contains word 'example also possible search across rss atom feeds straight windows explorer windows search uses ifilters used windows desktop search well ifilter interface implemented software makers files created applications better integrated search indexing programs searching also done box bottom start menu possible start program typing name example calc start calculator word start microsoft word mail open windows mail web address start default browser particular site default search engine even folder name filename network share name also ability save searches search folder opening folder execute specific search automatically display results normal folder search folder xml file stores search query including search operators well files accessed search run saved query string results presented virtual folder windows vista also supports query composition saved search called scope nested within query string another search windows vista also features enhanced file content search non-indexed locations whereby files scanned processed ifilters would used indexing therefore offering consistent results indexed non-indexed searches well ability third parties add support additional file formats content searched windows sidebar new panel placed either left right-hand side screen user place desktop gadgets small applets designed specialized purpose displaying weather sports scores gadgets also placed parts desktop desired dragging default windows vista ships 11 gadgets calendar clock contacts cpu meter currency conversion feed headlines notes picture puzzle slide show stocks weather additional gadgets published microsoft web site offered microsoft-created user-submitted gadgets gallery feature removed security reasons gadgets written using combination dhtml visual layout jscript vbscript functional code xml file defining gadget metadata author name description etc gadget distributed zip file .gadget extension displaying gadget using dhtml allows gadget used microsoft live.com windows live spaces sites alternatively windows vista gadget detect wpf available take advantage graphical abilities display differently web version internet explorer 7 adds support tabbed browsing atom rss internationalized domain names search box phishing filter anti-spoofing url engine fine-grained control activex add-ons thumbnails open tabs single window called quick tabs page zoom tab groups tab groups make possible open folder favorites tabs single click importing bookmarks cookies web browsers also supported additionally proper support png images transparency well improvements fixes css html rendering windows rss platform offers native rss support developer apis windows vista internet explorer operates special protected mode runs browser security sandbox access rest operating system file system except temporary internet files folder feature aims mitigate problems whereby newly discovered flaws browser activex controls hosted inside allowed hackers subversively install software user computer typically spyware internet explorer 7 windows vista also exclusively supports advanced encryption standard aes key lengths 256 bits outlined rfc 3268 certificate revocation checking using online certificate status protocol tls implementation also updated support extensions outlined rfc 3546 notable server name indication support internet explorer 7 additionally features update wininet api new version better support ipv6 handles hexadecimal literals ipv6 address also includes better support gzip deflate compression communication web server compressed thus require less data transferred internet explorer protected mode support wininet exclusive windows vista later windows versions windows media player 11 features revised interface media library presented without category trees prominent earlier versions rather selecting category left pane contents appear right graphical manner thumbnails—a departure textual presentation information missing album art added directly placeholders library though program re-renders album art imported way 1:1 pixel ratio 200x200 resolution jpeg images views music pictures video recorded tv separate chosen individually navigation bar entries pictures video show thumbnails search upgraded much faster windows media player 11 windows vista home premium ultimate editions supports mmc-5 driver commands aacs content protection scheme well udf file system required blu-ray hd dvd playback however codecs required playback hd dvd blu-ray video included vc-1 mpeg-2 video decoders well dolby digital ac-3 5.1 audio decoder included windows vista home premium ultimate editions h.264 video multichannel surround sound audio standards still require third party decoders features windows media player 11 include certain features media sharing windows media player 11 available windows vista later example windows media player 11 windows vista also connect remote media libraries available windows xp version windows media center windows vista available home premium ultimate editions upgraded significantly including considerable overhaul user interface button main menu contains sections music videos tv gets encased box selected selection submenu comes extending horizontally options selected entries presented grid-like structure item identified album art audio file thumbnail image picture video tv recording related options different views music collection music selected extend horizontally along top grid similarly items identified suggestive artwork grid displaying items also extended horizontally selected item enlarged compared rest features windows media center include windows vista includes internet information services iis version 7 refactored modular architecture integrated .net extensibility instead monolithic server features services iis 7 core web server engine modules offering specific functionality added engine enable features writing extensions iis 7 using isapi deprecated favor module api much iis functionality built api developers much control request process possible prior versions significant change previous versions iis web server configuration information stored solely xml configuration files instead metabase server global configuration file provides defaults virtual web document root subdirectory thereof may contain web.config containing settings augment override defaults changes files take effect immediately marks significant departure previous versions whereby web interfaces machine administrator access required change simple settings default document active modules security/authentication iis 7 also features completely rewritten administration interface takes advantage modern mmc features task panes asynchronous operation configuration asp.net fully integrated administrative interface backup restore center also known windows backup status configuration replaces ntbackup although windows nt backup restore utility available download backup restore center operates two modes backup restore selected files b complete pc backup using complete pc backup incremental snapshots stored external hard disk optical media complete system restored protect hardware failure severe software damage automatic scheduling file backups available vista home basic complete pc backup available vista home basic home premium windows mail replaces outlook express email client previous windows versions incorporates phishing filter like one found ie7 well bayesian junk mail filtering updated monthly via windows update also e-mail messages stored individual files rather binary database reduce frequent corruption make messages searchable real-time backing restoring account setup information configuration mail store made easier however omit features outlook express identities block sender usenet access windows mail replaced windows live mail windows contacts new unified contact personal information management application replaces windows address book wab based new xml based file format contact appears individual .contact file features extensibility apis integration applications store custom information related contacts including display pictures legacy *.wab format open standard *.vcf vcard *.csv comma separated values file formats also supported windows calendar calendar application newly included windows vista supports popular icalendar format well sharing subscribing publishing calendars webdav-enabled web servers network shares windows fax scan available business ultimate enterprise editions windows vista integrated faxing scanning application users send receive faxes fax email scanned documents forward faxes email attachments computer replaces enhances 'fax services component available optional component windows xp connecting scanner fax-capable modem computer users preview documents scanning choose directly fax email scanned documents user interface resembles 'windows mail preview pane tree views etc windows meeting space replacement netmeeting peer-to-peer p2p collaboration application users share applications entire desktop users local network internet windows meeting space allows sharing desktop co-workers distribution collaborative editing documents passing notes participants windows meeting space automatically finds users using people near technology uses ws-discovery see users local network paint new features crop function undo limit raised 3 10 wordpad supports text services framework using windows speech recognition implemented therefore possible dictate text wordpad similar applications support richedit sound recorder rewritten supports recording clips length saving wma however saving wav format supported except n editions windows vista snipping tool first introduced experience pack windows xp tablet pc edition 2005 screen-capture tool allows taking screen shots called snips windows rectangular areas free-form areas snips annotated saved image file html page e-mailed magnifier accessibility tool uses wpf turn uses vector images render content result rendered magnified image sharp pixelated however applies wpf applications non-wpf applications still magnified traditional way also due change introduced wpf 3.5 sp1 functionality lost .net framework 3.5 sp1 installed microsoft also released magnification api allow assistive technology applications use magnifier engine windows photo gallery photo video library management application import digital cameras tag rate individual pictures including custom metadata based extensible metadata platform also allows basic editing images adjusting color exposure resizing cropping red-eye reduction printing slideshows pan fade effects also created burnt dvd allows custom metadata added images videos enables searching attributes also supports raw image format natively open organize image format image codecs installed windows imaging component images videos may viewed windows photo gallery viewer options zoom pan losslessly rotate images pause play videos bring info pane view edit metadata photo video icc v4 color profiles embedded images also supported photo print wizard improved offer lot customizability upgraded version windows live photo gallery allows upload share photos videos online part windows live services windows movie maker supports smooth direct3d-based effects transitions editing outputting hd video importing recorded dvr-ms format videos well burning output movie cd windows vista home premium ultimate editions import hdv video camcorders output video windows dvd maker creating dvd-video discs new effects transitions added windows vista movie maker versions require pixel shader hardware support windows dvd maker dvd creation application applications also pass xml file dvd maker authoring burning games minesweeper solitaire hearts freecell spider solitaire updated rewritten take advantage windows vista new graphics capabilities also included new games namely purble place chess titans mahjong titans inkball game previously available windows xp tablet pc edition included also played using mouse pinball dropped september 2008 users ultimate edition windows vista also download texas hold 'em poker microsoft tinker windows ultimate extras beginning early 2002 microsoft announcement trustworthy computing initiative great deal work gone making windows vista secure operating system predecessors internally microsoft adopted secure development lifecycle underlying ethos secure design secure default secure deployment new code windows vista developed sdl methodology existing code reviewed refactored improve security significant discussed security features included windows vista include user account control kernel patch protection bitlocker drive encryption mandatory integrity control digital rights management tcp/ip stack security improvements address space layout randomization encrypting file system cryptography improvements additionally windows vista includes range parental controls give owners computer set tools limit accounts computer improved windows firewall supports inbound outbound packet filtering ipv6 connection filtering detailed configurable rules policies windows vista contains range new technologies features intended help network administrators power users better manage systems notable changes include complete replacement ntldr based windows preinstallation environment completely rewritten image-based deployment mechanisms significantly improved task scheduler revamped event logging infrastructure windows recovery environment support per-application remote desktop sessions new diagnostic health monitoring system administration tools range new group policy settings covering many new features previous versions iis included windows xp hard limits concurrent connections defined web servers iis 7.0 windows vista limit number connections allowed limit workloads based active concurrent requests 10 desktop window manager new windowing system handles drawing content screen instead windows drawing directly video card memory buffers contents instead rendered back-buffers technically direct3d surfaces arranged appropriate z-order displayed user drawing method uses significantly video memory traditional window-drawing method used previous versions windows required enough memory contain composite currently visible windows given time entire contents windows stored video memory user move windows around screen smoothly without tearing artifacts visible operating system asks applications redraw newly visible parts windows features new windows vista live thumbnail window previews flip 3d implemented dwm users need directx 9 capable video card able use desktop window manager machines ca n't use dwm fall back basic theme use screen drawing methods similar windows xp desktop window manager included editions windows vista except starter edition windows vista includes new version direct3d called direct3d 10 adds scheduling memory virtualization capabilities graphics subsystem forgoes current directx practice using capability bits indicate features active current hardware instead direct3d 10 defines minimum standard hardware capabilities must supported display system direct3d 10 compatible microsoft goal create environment developers designers assured input provide rendered exactly fashion supported graphics cards recurring problem directx 9 model different video cards produced different results thus requiring fixes keyed specific cards produced developers according microsoft direct3d 10 able display graphics 8 times faster directx 9.0c new improved windows display driver model wddm addition direct3d 10 incorporates microsoft high-level shader language 4.0 however direct3d 10 backward compatible like prior versions directx game compatible direct3d 10 direct3d 9 games would need developed apis one version direct3d 9 targeting windows versions prior windows vista another version using direct3d 10 targeting windows vista windows vista however contain backward-compatible direct3d 9 implementation direct3d 10 api introduces unified vertex shader pixel shader also supports geometry shaders operate entire geometric primitives points lines triangles allow calculations based adjacent primitives well output geometry shader passed directly onwards rasterizer interpolation pixel shading written vertex buffer known 'stream fed back beginning pipeline d3d10 functionality requires wddm new graphics hardware graphics hardware pre-emptively multithreaded allow multiple threads use gpu turns also provide paging graphics memory version direct3d 9 available windows vista called direct3d 9ex modified api also uses wddm allows direct3d 9 applications access features available windows vista cross-process shared surfaces managed graphics memory prioritization resources text anti-aliasing advanced gamma functions device removal management deprecation directx apis windows vista direct3d features overhaul directx sdk mentions apis deprecated directinput directplay deprecated components removed directsound therefore directmusic lack hardware abstraction emulated software directmusic kernel mode synthesizer supplies directmusic components high-resolution timer removed windows vista introduces directx video acceleration dxva 2.0 enhances implementation video pipeline adds host ddis including capture ddi video capture ddis shares dxva 1.0 also enhanced support hardware acceleration operations also ddi functions directly available callers need mediated video renderer pipelines simply decoding media without rendering post-processing rendering without decoding also created features require windows display driver model drivers windows vista also introduces new video renderer available media foundation component directshow filter called enhanced video renderer evr evr designed work desktop window manager dxva 2.0 supports enhanced video renderer video renderer windows vista dxva integrates media foundation allows dxva pipelines exposed media foundation transforms mfts even decoder pipelines post-processing pipelines exposed mfts used media foundation topology loader create full media playback pipeline dxva 1.0 emulated using dxva 2.0 windows imaging component wic new extensible imaging framework allows applications supporting framework automatically get support installed codecs graphics file formats windows presentation foundation applications also automatically support installed image codecs third party developers write image codecs specific image file formats default windows vista ships jpeg tiff gif png bmp hd photo codecs codecs raw image formats used generally high-end digital cameras also supported manner windows explorer windows photo gallery windows photo gallery viewer based new framework thus view organize images format necessary codecs installed hd photo previously known windows media photo photographic still image file format introduced windows vista supports features high dynamic range imaging lossy well lossless compression 32-bpp fixed floating point representation transparency rgb cmyk n-channel color spaces radiance rgbe embedded icc color profiles multiple images per file support exif xmp metadata formats preferred image format xps documents windows vista features windows color system wcs platform color management goal obtain color consistency across various software hardware including cameras monitors printers scanners different devices interpret colors differently according software hardware configurations result must properly calibrated reproduce colors consistently across different devices wcs aims make process color calibration automatic transparent evolution icc color profiles windows color system based completely new color infrastructure translation engine cite backed new color processing pipeline supports bit-depths 32 bits per pixel multiple color channels 3 alternative color spaces high dynamic range coloring using technology named kyuanos developed canon color processing pipeline allows device developers add gamut mapping algorithm pipeline customize color response device new pipeline also uses floating point calculations minimize round-off losses inherent integer processing color pipeline finishes processing colors cite engine applies color transform according color profile specific device ensure output color matches expected wcs features explicit support lcd well crt monitors projectors printers imaging devices provides customized support wcs uses color profiles according cie color appearance model recommendation ciecam02 defined using xml define color representation actually translates visible color icc v4 color profiles also supported windows photo gallery photo viewer windows imaging component hd photo format xps print path xps documents support color management significant changes made windows vista mobile computing windows vista aims simplify detection configuration installation external displays projectors introducing standardized setup procedure interface wddm architecture windows vista enables hot plug detection external displays alerts new transient multimon manager tmm external display connected system presents aero wizard interface configuration setup display previous versions windows installation routines displays often varied based hardware configurations function keys specific manufacturer requirements typically required separate software interfaces possible tmm also saves user preferences individual displays improve mobility scenarios preferences restored display reconnected different time location aforementioned improvements intended enable display connectivity experience provides ease use observed plug play peripherals windows vista also includes window management improvements applications respond changing monitor environments example monitor disconnected window occupies display operating system move window back primary display remains visible application developers also respond changing monitor conditions presentation active windows vista disables idle sleep timers system notifications may optionally enable variety settings specified user presentation settings users may customize include ability disable screen saver adjust volume levels temporarily display specific background image display and/or change position automatically enable presentation settings individual display configurations windows vista also introduces aero wizard interface detection connection networked projectors operating system automatically search projectors connected local network users manually enter address projector connect devices profile web services aims simplify configuration installation management network projectors networked devices windows vista aims simplify power management schemes presenting clear names power schemes reducing total number default power schemes following three addition battery meter interface notification area aims provide enhanced discoverability power schemes windows vista providing single-click access default schemes link change additional power management settings via power options control panel applet also included microsoft stated aforementioned changes windows vista result confusion caused power schemes previous versions windows numerous difficult discover often included names confused users example users would frequently select minimal power management scheme desired preserve battery life scheme actually minimized power savings designed maximize performance windows vista allows fine-grained control power settings setting power saving mode wireless adapters usb selective suspend pci express link state power management processor state etc. also allows configuring power settings specific scenarios sharing media files giving presentation adaptive display mode indexing files windows vista also supports usb selective suspend wider range class drivers previous versions windows belonging bluetooth classes portable devices video classes beginning service pack 1 windows vista turn periodic vsync interrupt counting cpu screen refreshed new graphics mouse activity result significant energy savings windows vista sleep mode default power state desktop computers mobile pcs laptops sleep mode replaces standby mode seen previous versions windows ensure sleep mode transitions reliable windows vista default allow applications drivers veto sleep process vetoing sleep process—which prevents operating system idling sleep responding sleep requests users—was significant source power transition failures previous versions windows often resulted decreased battery life overheated systems potential data loss eventual user distrust power-saving capabilities development windows vista microsoft indicated would allow sleep process vetoed operating system subsequent investigations company revealed capability frequently abused application developers however administrators still enable veto functionality group policy windows vista introduces new hybrid sleep power-saving mode combines hibernation sleep mode functionality active hybrid sleep saves information computer memory hibernation file disk instead turning computer initiates sleep mode traditionally systems lose power sleep mode also lose data resident memory however since systems resume hybrid sleep retrieving information hibernation file disk offer benefits quickly resuming sleep mode improved reliability event power loss hybrid sleep enabled default desktop computers typically include uninterruptible power supply disabled default laptops mobile devices typically carry additional power source battery hybrid sleep requires compatible wddm driver windows vista introduces new away mode power management feature allows machine conserve power performing background tasks recording streaming media files across devices systems functionality essentially allows pc operate manner similar consumer electronics device enabled away mode turns pc display mutes audio filters access input devices allowing remain otherwise operational background tasks away mode provides power-saving benefits disables features necessary desired operation media streaming microsoft emphasized primarily developed entertainment media scenarios intended replacement traditional power-saving modes windows hotstart formerly windows direct also known direct media mode enables user immediately launch application startup resume press button wireless receiver events designed provide instant feature availability traditionally associated mobile devices cell phones portable media players hotstart enables microsoft referred appliance-like availability allowing pc take number roles based type application launched—a pc boots multimedia application example essentially function dedicated media device original equipment manufacturers customize hotstart hardware implementation functionality users may also customize application launch functionality windows registry instead launching multimedia application user example configure hotstart button form input instantly launch e-mail application hotstart enables direct immediate access application multimedia result power savings windows vista includes nine new western latin greek cyrillic font families optimized cleartype four new asian segoe-like fonts added windows vista supports languages previous versions windows usually asian e.g khmer lao addition windows vista enterprise ultimate editions allow installing additional languages using mui packs instead install language unicode font character support also improved windows vista also supports custom locales allowing users create locale data use applications using locale builder tool | [
10243,
11270,
5643,
4624,
9744,
11283,
537,
540,
3102,
4127,
2593,
4130,
7713,
8227,
3109,
8740,
9762,
11301,
1577,
4138,
6697,
8747,
1581,
4141,
10281,
4146,
4658,
4148,
1077,
2101,
10812,
3648,
582,
7754,
10828,
4173,
4174,
10829,
9808,
... | None |
1,099 | 9 | Eugene_McDonnell:eugene mcdonnell eugene edward mcdonnell october 18 1926 – august 17 2010 computer science pioneer long-time contributor programming language siblings apl j graduate brooklyn technical high school serving infantry corporal u.s. army world war ii attended university kentucky graduating 1949 summa cum laude elected phi beta kappa awarded first year graduate fellowship harvard university studied comparative literature particularly dante ’ divine comedy studying poems robert frost noticed first two poems frost book west-running brook spring pools freedom moon discuss reflecting rhyme schemes two reflect aabcbc cbcbaa met frost delighted find committed 193 lines john milton lycidas memory first work ibm design ibm ’ first time-sharing system became early host ivsys iverson system predecessor apl 1968 became colleague ken iverson used iverson notation apl named active earliest days apl holds 3 september 1968 information transfer control system allowing communication two users 1978 left ibm joined i. p. sharp associates retiring therefrom 1990 ibm mcdonnell devised notation signum circle functions apl designed complex floor function proposed extension gcd lcm iverson responsible including hooks forks j result zero divided zero j proposed 1976 1987 iverson award mcdonnell publisher apl press producing source book apl apl quote quad early years editor principal contributor recreational apl column apl quote-quad many years wrote dozens play j columns vector journal british apl association contributed sloane on-line encyclopedia integer sequences member jane austen society north america jasna gave talk classical persuasion jasna meeting lake louise 1993 active bay area jane austen group wrote topical index dierdre le faye edition austen letters seen republic pemberley website mcdonnell died peacefully home palo alto august 17 2010 | [
9993,
1178,
8987,
667,
10668,
4921,
9019,
11075,
8262,
7630,
3323,
2519,
1883,
11099,
9825,
11625,
4331,
2670,
8695,
505,
2939
] | Test |
1,100 | 2 | GPUTILS:gputils gputils frequently written gputils gpl-licensed set tools pic microcontroller comprising assembler disassembler linker object file viewer available various flavors unix mac os x microsoft windows gpasm gnu pic assembler originally developed james bowman released version 0.0.3 july 13 1998 craig franklin extended gpasm entire suite assembler- linker-related tools renamed project gputils releasing gputils 0.0.4 march 4 2001 project currently maintained david barnett gputils created craig franklin james bowman currently primarily supported molnár károly recently supported borut ražem past supported david barnett scott dattalo marko kohtala | [
477,
6664,
5612,
6797,
7983,
5492,
7445,
3386,
2045
] | None |
1,101 | 4 | Open-source_software_security:open-source software security open-source software security measure assurance guarantee freedom danger risk inherent open-source software system variety models metrics measure security system methods used measure security software systems argued system vulnerable potential vulnerability discovered patch created measuring number days vulnerability vulnerability fixed basis determined security system caveats approach every vulnerability equally bad fixing lot bugs quickly might better finding taking little bit longer fix taking account operating system effectiveness fix poisson process used measure rates different people find security flaws open closed source software process broken number volunteers n paid reviewers n. rates volunteers find flaw measured λ rate paid reviewers find flaw measured λ expected time volunteer group expected find flaw 1/ n λ expected time paid group expected find flaw 1/ n λ comparing large variety open source closed source projects star system could used analyze security project similar morningstar inc. rates mutual funds large enough data set statistics could used measure overall effectiveness one group example system follows coverity collaboration stanford university established new baseline open-source quality security development completed contract department homeland security utilizing innovations automated defect detection identify critical types bugs found software level quality security measured rungs rungs definitive meaning change coverity releases new tools rungs based progress fixing issues found coverity analysis results degree collaboration coverity start rung 0 currently go rung 2 project analyzed coverity ’ scan infrastructure representatives open-source software come forward results rung 1 collaboration coverity development team software analyzed subset scanning features prevent development team overwhelmed 11 projects analyzed upgraded status rung 2 reaching zero defects first year scan projects include amanda ntp openpam openvpn overdose perl php postfix python samba tcl number podcasts cover open-source software security | [
3969,
7810,
132,
6276,
8582,
10631,
7561,
394,
10255,
916,
11418,
4636,
3229,
9245,
5663,
546,
1315,
292,
4777,
3114,
4011,
7980,
5677,
2864,
692,
2228,
823,
7223,
2236,
6718,
9151,
10687,
6338,
8644,
3654,
5703,
7626,
10442,
10344,
8909,... | Test |
1,102 | 7 | Enomaly_Inc:enomaly inc enomaly inc. founded 2004 developer system software virtualization management cloud computing headquartered toronto ontario canada initially founded open source consulting company reuven cohen george bazos lars forsberg company quickly grew open source consultancy system integrator one first focused emerging cloud computing space richard reiner joined enomaly chairman ceo march 2009 company among first provide self-service infrastructure-as-a-service iaas platform first version launched 2005 open source platform called enomalism later renamed ecp made available commercially closed sourced enomaly current software called elastic computing platform service provider edition ecp/spe released july 2009 allows web hosts service providers offer public facing iaas cloud services customers means similar amazon ec2 enomaly offers cloud infrastructure capabilities established carriers service hosting providers turn use existing physical data center offer combination cloud services dedicated hosting services customers november 2010 enomaly launched spotcloud.com described first commodity style clearinghouse marketplace unused cloud computing capacity according spotcloud site service built google app engine enomaly ecp platform well cloud infrastructure platforms near future spotcloud easy use structured cloud capacity marketplace service providers sell excess computing capacity wide array buyers resellers enomaly core product ecp used numerous service providers foundation cloud computing offerings includes | [
6153,
4236,
10893,
911,
1935,
4623,
8592,
2965,
2328,
4377,
8986,
6307,
9766,
5159,
6444,
8495,
3121,
7352,
2496,
4289,
1224,
8520,
4429,
7248,
1362,
467,
9682,
6367,
4194,
11646,
5732,
10090,
3819,
7660,
8439,
2170,
5499,
253,
8446
] | Validation |
1,103 | 4 | Return-oriented_programming:return-oriented programming return-oriented programming rop computer security exploit technique allows attacker execute code presence security defenses executable space protection code signing technique attacker gains control call stack hijack program control flow executes carefully chosen machine instruction sequences already present machine memory called gadgets gadget typically ends return instruction located subroutine within existing program and/or shared library code chained together gadgets allow attacker perform arbitrary operations machine employing defenses thwart simpler attacks return-oriented programming advanced version stack smashing attack generally types attacks arise adversary manipulates call stack taking advantage bug program often buffer overrun buffer overrun function perform proper bounds checking storing user-provided data memory accept input data store properly data written onto stack excess data may overflow space allocated function variables e.g. locals stack diagram right overwrite return address address later used function redirect control flow back caller overwritten control flow diverted location specified new return address standard buffer overrun attack attacker would simply write attack code payload onto stack overwrite return address location newly written instructions late 1990s major operating systems offer protection attacks microsoft windows provided buffer-overrun protections 2004 eventually operating systems began combat exploitation buffer overflow bugs marking memory data written non-executable technique known executable space protection enabled machine would refuse execute code located user-writable areas memory preventing attacker placing payload stack jumping via return address overwrite hardware support later became available strengthen protection data execution prevention adversary execute maliciously injected instructions typical buffer overflow overwrites contents data section memory marked non-executable defeat return-oriented programming attack inject malicious code rather uses instructions already present called gadgets manipulating return addresses typical data execution prevention defend attack adversary use malicious code rather combined good instructions changing return addresses therefore code used would marked non-executable widespread implementation data execution prevention made traditional buffer overflow vulnerabilities difficult impossible exploit manner described instead attacker restricted code already memory marked executable program code linked shared libraries since shared libraries libc often contain subroutines performing system calls functionality potentially useful attacker likely candidates finding code assemble attack return-into-library attack attacker hijacks program control flow exploiting buffer overrun vulnerability exactly discussed instead attempting write attack payload onto stack attacker instead chooses available library function overwrites return address entry location stack locations overwritten obeying applicable calling conventions carefully pass proper parameters function performs functionality useful attacker technique first presented solar designer 1997 later extended unlimited chaining function calls rise 64-bit x86 processors brought change subroutine calling convention required first argument function passed register instead stack meant attacker could longer set library function call desired arguments manipulating call stack via buffer overrun exploit shared library developers also began remove restrict library functions performed functions particularly useful attacker system call wrappers result return-into-library attacks became much difficult mount successfully next evolution came form attack used chunks library functions instead entire functions exploit buffer overrun vulnerabilities machines defenses simpler attacks technique looks functions contain instruction sequences pop values stack registers careful selection code sequences allows attacker put suitable values proper registers perform function call new calling convention rest attack proceeds return-into-library attack return-oriented programming builds borrowed code chunks approach extends provide turing complete functionality attacker including loops conditional branches put another way return-oriented programming provides fully functional language attacker use make compromised machine perform operation desired hovav shacham published technique 2007 demonstrated important programming constructs simulated using return-oriented programming target application linked c standard library containing exploitable buffer overrun vulnerability return-oriented programming attack superior attack types discussed expressive power resistance defensive measures none counter-exploitation techniques mentioned including removing potentially dangerous functions shared libraries altogether effective return-oriented programming attack although return-oriented programming attacks performed variety architectures shacham paper majority follow-up work focus intel x86 architecture x86 architecture variable-length cisc instruction set return-oriented programming x86 takes advantage fact instruction set dense random sequence bytes likely interpretable valid set x86 instructions therefore possible search opcode alters control flow notably return instruction 0xc3 look backwards binary preceding bytes form possibly useful instructions sets instruction gadgets chained overwriting return address via buffer overrun exploit address first instruction first gadget first address subsequent gadgets written successively onto stack conclusion first gadget return instruction executed pop address next gadget stack jump conclusion gadget chain continues third chaining small instruction sequences attacker able produce arbitrary program behavior pre-existing library code shacham asserts given sufficiently large quantity code including limited c standard library sufficient gadgets exist turing-complete functionality automated tool developed help automate process locating gadgets constructing attack binary tool known ropgadget searches binary looking potentially useful gadgets attempts assemble attack payload spawns shell accept arbitrary commands attacker address space layout randomization also vulnerabilities according paper shacham et al aslr 32-bit architectures limited number bits available address randomization 16 32 address bits available randomization 16 bits address randomization defeated brute force attack minutes 64-bit architectures 40 bits 64 available randomization 2016 brute force attack 40-bit randomization possible unlikely go unnoticed also randomization defeated de-randomization techniques even perfect randomization leakage memory contents help calculate base address dll runtime according paper checkoway et al possible perform return-oriented-programming x86 arm architectures without using return instruction 0xc3 x86 instead used carefully crafted instruction sequences already exist machine memory behave like return instruction return instruction two effects firstly searches four-byte value top stack sets instruction pointer value secondly increases stack pointer value four x86 architecture sequences jmp pop instructions act return instruction arm sequences load branch instructions act return instruction since new approach use return instruction negative implications defense defense program checks several returns also several jump instructions attack may detected g-free technique developed kaan onarlioglu leyla bilge andrea lanzi davide balzarotti engin kirda practical solution possible form return-oriented programming solution eliminates unaligned free-branch instructions instructions like ret call attackers use change control flow inside binary executable protects free-branch instructions used attacker way g-free protects return address similar xor canary implemented stackguard checks authenticity function calls appending validation block expected result found g-free causes application crash number techniques proposed subvert attacks based return-oriented programming rely randomizing location program library code attacker accurately predict location instructions might useful gadgets therefore mount successful return-oriented programming attack chain one fairly common implementation technique address space layout randomization aslr loads shared libraries different memory location program load although widely deployed modern operating systems aslr vulnerable information leakage attacks approaches determine address known library function memory attacker successfully determine location one known instruction position others inferred return-oriented programming attack constructed randomization approach taken relocating instructions and/or program state registers stack objects program separately instead library locations requires extensive runtime support software dynamic translator piece randomized instructions back together runtime technique successful making gadgets difficult find utilize comes significant overhead another approach taken kbouncer modifies operating system verify return instructions actually divert control flow back location immediately following call instruction prevents gadget chaining carries heavy performance penalty effective jump-oriented programming attacks alter jumps control-flow-modifying instructions instead returns w^x also called data execution prevention/dep no-execute/nx security feature pages processes memory may either writable executable w^x alone provide perfect protection memory-based vulnerabilities aslr technologies provide advanced protection memory based vulnerabilities w^x first implemented openbsd 2003 structured exception handler overwrite protection feature windows protects common stack overflow attacks especially attacks structured exception handler small embedded systems proliferating due expansion internet things need protection embedded systems also increasing using instruction based memory access control ib-mac implemented hardware possible protect low-cost embedded systems malicious control flow stack overflow attacks protection provided separating data stack return stack however due lack memory management unit embedded systems hardware solution applied embedded systems 2010 jinku li et al proposed suitably modified compiler could completely eliminate return-oriented gadgets replacing codice_1 instruction sequence codice_2 codice_3 instruction sequence codice_4 codice_5 represents immutable tabulation legitimate return addresses program codice_6 represents specific index table prevents creation return-oriented gadget returns straight end function arbitrary address middle another function instead gadgets return legitimate return addresses drastically increases difficulty creating useful gadgets li et al claimed return indirection technique essentially de-generalizes return-oriented programming back old style return-into-libc proof-of-concept compiler included peephole optimization phase deal certain machine instructions happen contain return opcode opcodes immediate operands codice_7 armv8.3-a architecture introduces new feature hardware level takes advantage unused bits pointer address space cryptographically sign pointer addresses jumping pointer signature checked error occurs check fails notably latest iphone a12 chips upgraded armv8.3 make use pacs | [
642,
6797,
1554,
3603,
6550,
1820,
7983,
5040,
9911,
5176,
2367,
11584,
1094,
3270,
2638,
1745,
4562,
8787,
3286,
9435,
5354,
499,
372,
6653,
9854
] | Train |
1,104 | 7 | Zettabox:zettabox zettabox pan-european online cloud storage team-sharing tool created co-founders james kinsella robert mcneal company ’ operational headquarters located prague whilst sales marketing decisions headed london time zettabox founded total amount worldwide data saved networks surpassed 1,000 exabytes entered new era sizing storage – zettabytes 1 x 1021 cloud team sharing storage market heavily dominated american-domiciled companies dropbox box.com zettabox launched european alternative launch coincided news impending general data protection regulation part digital single market strategy requires companies business europe know data stored able communicate information customers recently 2018 2019 series privacy violations facebook social media companies renewed calls greater scrutiny largest companies use misuse users data zettabox described ‘ example genuinely european cloud storage solution ’ “ eu data protection reform big data factsheet ” european commission cited zettabox first major pan-european alternative us-based cloud storage products like google drive dropbox | [
1801,
9901,
4623
] | Test |
1,105 | 4 | Contact_analysis_(cryptanalysis):contact analysis cryptanalysis cryptanalysis contact analysis study frequency certain symbols precede follow symbols method used aid breaking classical ciphers contact analysis based fact sample written language certain symbols appear adjacent symbols varying frequencies moreover frequencies roughly almost samples language even distribution symbols differs significantly normal true regardless whether symbols used words letters ciphers properties natural language plaintext preserved ciphertext potential exploited ciphertext-only attack although sense contact analysis considered type frequency analysis discussions frequency analysis concern simple probabilities symbols text formula_1 formula_2 contact analysis based conditional probability certain letters precede succeed letters formula_3 formula_4 even formula_5 formula_6 formula_7 subsets alphabet used frequency analysis based first-order statistics contact analysis based second third-order statistics | [
8674,
11241,
9615,
5487,
9617,
1941
] | None |
1,106 | 2 | Prelink:prelink computing prebinding also called prelinking method optimizing application load times resolving library symbols prior launch computer programs consist code requires external shared libraries execute libraries normally integrated program run time loader process called dynamic linking dynamic linking advantages code size management drawbacks well every time program run loader needs resolve find relevant libraries since libraries move around memory performance penalty resolution penalty increases additional library needing resolution prelinking reduces penalty resolving libraries advance afterward resolution occurs libraries changed since prelinked following perhaps upgrade mac os stores executables mach-o file format mac os x performs prebinding optimizing stage installing system software certain applications prebinding changed times within mac os x series 10.2 prebinding happened installation procedure aforementioned optimizing stage 10.2 10.3 os checked prebinding launch time applications first time application ran would prebound making subsequent launches faster could also manually run os-level installs 10.4 os libraries prebound 10.5 later apple replaced prebinding dyld shared cache mechanism provided better os performance linux prelinking accomplished via prelink program free program written jakub jelínek red hat elf binaries performance results mixed seems aid systems large number libraries kde prelink run -r option randomly select address base libraries loaded makes difficult perform return-to-libc attack system addresses used unique system reason prelink kernel facilities supplying address space layout randomization aslr libraries used conjunction prelink without defeating purpose prelink forcing dynamic linker perform relocations program load time stated prelink per-process library address randomization used conjunction order avoid completely removing security enhancement prelink supplies randomization however help general information leak caused prelink attackers ability read certain arbitrary files target system discover libraries loaded privileged daemons often libc enough common library used return-to-libc attacks reading shared library file libc attacker local access discover load address libc every application system since programs link libc libc library file always readable attacker local access may gather information address space higher privileged processes local access may commonly gained shell accounts web server accounts allow use cgi scripts may read output file system directory traversal vulnerabilities used attackers without accounts cgi script vulnerabilities available prelink often run periodically typically every two weeks address given library chance changing time prelink often used incremental mode already prelinked libraries altered unless absolutely necessary library may change base address prelink re-run gives address derived half-life period prelink run also note new version library installed addresses changes jakub jelínek points position independent executables pie ignore prelinking red hat enterprise linux fedora recommends network suid programs built pie facilitate secure environment occasionally prelinking cause issues application checkpoint restart libraries like codice_1 well libraries like openmpi use codice_1 internally specifically checkpointing program one host trying restart different host restarted program may fail segfault due differences host-specific library memory address randomization | [
10176,
1922,
2339,
8966,
6664,
5065,
9854,
3386,
9455,
2804,
823,
5176,
2138,
4926,
8447
] | Test |
1,107 | 2 | Mythbuntu:mythbuntu mythbuntu discontinued media center operating system based ubuntu integrated mythtv media center software main function install programs included ubuntu following principles fellow linux distributions linhes mythdora mythbuntu designed simplify installation mythtv home theater pc mythbuntu installed mythtv setup program begins configured frontend media viewer backend media server combination two mythbuntu aimed keep close ties ubuntu thus allowing changes moved upstream greater benefit ubuntu community due close link ubuntu easy conversions desktop standalone mythbuntu installations possible development cycle mythbuntu originally followed ubuntu releases occurring every six months starting 12.04 mythbuntu releases tracked ubuntu lts long-term support releases release approximately every two years 4 november 2016 development team announced end mythbuntu separate distribution citing insufficient developers team continue maintain mythbuntu software repository announcement advised new users install another ubuntu distribution install mythtv repository mythbuntu uses xfce desktop interface default users install ubuntu-desktop kubuntu-desktop xubuntu-desktop mythbuntu control centre allowing users get default interfaces flavors ubuntu software included release media-related software vlc amunix rhythmbox mythbuntu control centre provides gui used configure system user select kind system backend frontend wish installed inside control centre user perform common actions installing plugins mythtv configuring mysql database setting passwords installing drivers codecs mythtv updates enabled well switching latest release version development branch mythtv configuration remote controls range utilities small programs performed within program mythbuntu used install full mythtv system single device acting client server front-end software required visual elements gui utilised common user find play manipulate media files back end server media files tuners database actually stored combined front-and-back-end system may advantage portability standalone device dependent separate server gaming console alternatively mythbuntu used install mythtv client front-end-only system might useful users already central storage server home central storage device act mythtv server mythtv front-end client software installed devices low-power hardware mythbuntu also run directly cd-rom without installation provided network connection pc mythtv back-end server using server separate one front-end units offers ability use multiple clients simultaneous access single repository shared media files server used would generally hardware relatively high specification kept outside main living room entertainment area home another advantage ability move potentially noisy hardware living room low-noise high-performance hardware expensive mythbuntu ubuntu derivative offers easy single-click conversion ubuntu mythbuntu means user longer needs type command line daunting new users hunt packages various package managers | [
9253,
11305,
4147,
56,
59,
4673,
3654,
3664,
1110,
4192,
3685,
9324,
10860,
2671,
3189,
5755,
4219,
11388,
8837,
1674,
6797,
10394,
673,
3745,
1700,
3245,
7854,
2738,
4790,
8907,
5343,
6371,
4841,
6890,
7913,
6380,
7920,
5363,
9971,
9461,... | None |
1,108 | 4 | Cloudbric:cloudbric cloudbric cloud-based web security provider based seoul south korea offers waf ddos protection ssl solution protects websites sql injection cross-site scripting identity theft website defacement application layer ddos attacks early 2015 cloudbric launched in-house venture penta security systems inc. idea creating cloud web security service/web application firewall accessible first started in-house project grew global service december 1 2017 cloudbric corporation became company time spin-off cloudbric acquired 27 idcs internet data centers 50 partnerships 8,000 user sign-ups november 2017 cloudbric launched cloudbric labs collection free web security resources services available use integration users across web currently consists blackipedia ip reputation service threat index database web vulnerabilities wafer waf evaluator tests performance accuracy may 2018 cloudbric unveiled plans launch reverse ico initiative working product cloudbric plans build web security offerings introduction decentralized user-led security platform cloudbric ’ pricing model based monthly website traffic rather premium service features meaning users access cloudbric ’ comprehensive suite web security services default cloudbric ’ waf operates proxy detect filter malicious attacks requiring customers change website domain name system dns | [
899,
4198,
2887,
7688,
331,
7352
] | Validation |
1,109 | 6 | Sticky_bit:sticky bit computing sticky bit user ownership access right flag assigned files directories unix-like systems directory sticky bit set filesystem treats files directories special way file owner directory owner root user rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files modern function sticky bit introduced 4.3bsd 1986 found modern unix-like systems sticky bit introduced fifth edition unix 1974 use pure executable files set instructed operating system retain text segment program swap space process exited speeds subsequent executions allowing kernel make single operation moving program swap real memory thus frequently-used programs like editors would load noticeably faster one notable problem stickied programs replacing executable instance patching required removing sticky bit executable executing program exiting flush cache replacing binary executable restoring sticky bit currently behavior operative hp-ux unixware solaris appears abandoned 2005 4.4-lite release bsd retained old sticky bit behavior subsequently dropped openbsd release 3.7 freebsd release 2.2.1 version linux ever supported traditional behavior common use sticky bit directories residing within filesystems unix-like operating systems directory sticky bit set filesystem treats files directories special way file owner directory owner root rename delete file without sticky bit set user write execute permissions directory rename delete contained files regardless file owner typically set codice_1 directory prevent ordinary users deleting moving users files feature introduced 4.3bsd 1986 today found modern unix-like systems addition solaris solaris 2.5 defines special behavior sticky bit set non-executable files files accessed cached kernel usually set swap files prevent access file flushing important data system cache also used occasionally benchmarking tests sticky bit also set automounter indicate file mounted yet allows programs like ls ignore unmounted remote files sticky bit set using chmod command set using octal mode 1000 symbol already used setuid bit example add bit directory codice_3 one would type chmod +t /usr/local/tmp make sure directory standard codice_4 permissions one could also type chmod 1777 /usr/local/tmp clear use chmod -t /usr/local/tmp chmod 0777 /usr/local/tmp latter also reset codice_4 directory standard permissions unix symbolic file system permission notation sticky bit represented letter final character-place replacing would otherwise x instance solaris 8 codice_1 directory default sticky-bit set shows sticky-bit set file directory without execution bit set others category non-user-owner non-group-owner indicated capital replacing would otherwise | [
5120,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
5179,
11323,
8772,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
1193,
7344,
2230,
5816,
8379,
1212,
8380,
10951,
9420,
... | Test |
1,110 | 2 | KaOS:kaos kaos linux distribution built scratch specific focus qt kde although kaos currently based linux kernel developers constantly evaluating illumos kernel say future switch wish first version kaos released kdeos 2013 prevent confusion distribution name desktop environment kde name changed kaos september 2013 kaos distributed via iso image exclusively supports 64-bit processors idea behind kaos create tightly integrated rolling transparent distribution modern desktop build scratch specific focus focus one de kde plasma one toolkit qt one architecture x86_64 plus focus evaluating selecting suitable tools applications phoronix wrote 2016 overall quite pleased niche distribution kaos easy install quickly running bleeding-edge kde plasma 5 stack overall fun pleasant hours spent kaos fossmint stated 2017 kaos modern open-source beautifully designed qt kde-focused linux distro rolling release ships kde plasma default desktop environment uses pacman package manager 3-group structure repository github fact rolling release means never need worry future updates moment version installed like case ubuntu like would need consider whether perform clean installation another “ major version ” hectic geek reviewed kaos 2014 wrote distribution fast included necessary applications jesse smith distrowatch weekly wrote review kaos 2014.04 smith said features kaos worked well robert rijkhoff reviewed kaos 2017.09 distrowatch weekly said kaos seems trying little bit hard different zdnet wrote hands-on review kaos 2014.06 dedoimedo reviewed kaos 2014.12 jack wallen linux.com stated opinion kaos 2016 said distribution beautiful | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
8857,
10394,
6301,... | None |
1,111 | 4 | Blue_team_(computer_security):blue team computer security blue team group individuals perform analysis information systems ensure security identify security flaws verify effectiveness security measure make certain security measures continue effective implementation part united states computer security defense initiative red teams developed exploit malicious entities would harm result blue teams developed design defensive measures red team activities incident occur within organization blue team perform following six steps handle situation preparation computer security incident blue team perform hardening techniques operating systems throughout organization blue team must always mindful network perimeter including traffic flow packet filtering proxy firewalls intrusion detection systems blue teams employ wide range tools allowing detect attack collect forensic data perform data analysis make changes threat future attacks mitigate threats tools include siem software supports threat detection security incident response performing real-time data collection analysis security events type software also uses data sources outside network including indicators compromise ioc threat intelligence | [
11429,
4198,
9688,
3614,
10858,
11188,
11198,
184,
11611,
2558
] | Test |
1,112 | 9 | GNU_Smalltalk:gnu smalltalk gnu smalltalk implementation smalltalk programming language gnu project implementation unlike smalltalk environments uses text files program input interprets contents smalltalk code way gnu smalltalk acts like interpreter rather environment traditional smalltalk manner gnu smalltalk includes bindings many free software libraries including sqlite libsdl cairo gettext expat examples work gnu smalltalk 3.0 later versions classic hello world example basic smalltalk code constructing using array constructing using hash parameter-passing block closure returning closures method using block send info back caller invoke method passing block iterating enumerations arrays using blocks method inject accept parameter block iterates member list performing function retaining aggregate analogous foldl function functional programming languages example first pass block receives 10 argument inject sum 1 first element array element returns 11 11 becomes sum next pass added 3 get 14 14 added 5 finally return 19 blocks work many built-in methods using enumeration block square numbers 1 10 following code defines class named person deriving magnitude automatically defines comparison methods except one codice_1 addition one codice_2 sort age note override way object printed/displayed default share programmer-print user-display representation overriding codice_3 prints three names reverse age order exception raised codice_4 call optional message added exception also codice_5 raises different kind exception actually wrappers actual exception raising method codice_6 exceptions handled codice_7 blocks course catch particular exceptions subclasses possible use exception object made available handler clause exit resume first block exiting default also mentioned explicitly | [
2050,
2180,
11654,
2955,
4493,
6413,
1939,
3859,
7325,
1822,
5409,
802,
3618,
6694,
5546,
8621,
7983,
5555,
823,
9148,
10687,
708,
8262,
5703,
10822,
5833,
8147,
3674,
2010,
862,
10464,
11625,
4459,
9323,
9579,
8304,
1394,
5492,
8436,
332... | Test |
1,113 | 4 | Shatter_attack:shatter attack computing shatter attack programming technique employed hackers microsoft windows operating systems bypass security restrictions processes session shatter attack takes advantage design flaw windows message-passing system whereby arbitrary code could injected running application service session makes use message loop could result privilege escalation exploit shatter attacks became topic intense conversation security community august 2002 publication chris paget paper titled exploiting design flaws win32 api privilege escalation paper coined term shatter attack explained process application could execute arbitrary code another application could occur windows allows unprivileged applications send messages message loops higher-privileged application messages address callback function application address space parameter attacker manages put string memory higher-privileged application say pasting shellcode edit box known location could send wm_timer messages callback function parameters set point attacker string weeks publication paper microsoft responded noting paper correct situation exists correctly describe effect ... paper errs claiming flaw windows reality flaw lies specific highly privileged service design services within interactive desktop peers levy requests upon result services interactive desktop effectively privileges commensurate highly privileged service december 2002 microsoft issued patch windows nt 4.0 windows 2000 windows xp closed avenues exploitation partial solution however fix limited services included windows could exploited using technique underlying design flaw still existed could still used target applications third-party services windows vista microsoft aimed solve problem two ways first local users longer log session 0 thus separating message loop logged-in user session high-privilege system services loaded session 0 second new feature called user interface privilege isolation uipi introduced whereby processes protected shatter attacks assigning integrity level process attempts send messages process higher integrity level fail even processes owned user however interactions processes different integrity levels prevented uipi internet explorer 7 example uses uipi feature limit extent rendering components interact rest system way sessions instantiated redesigned windows vista windows server 2008 provide additional protection shatter attacks local user logins moved session 0 session 1 thus separating user processes system services could vulnerable creates backward compatibility issues however software designed assumption service running session logged-in user support view windows vista windows server 2008 introduced windows service called interactive services detection enables access dialogs created interactive services appear interactive user shown dialog box offered ability switch session 0 access dialog box capability removed windows 10 creators update | [
3852,
6028,
6797,
7717,
7983,
3250,
3704,
10828,
8015,
10835,
5465,
93,
1501,
5087,
2147,
1254,
2027,
8299,
8045,
6520,
10110
] | None |
1,114 | 4 | David_A._Wagner:david a. wagner david a. wagner born 1974 professor computer science university california berkeley well-known researcher cryptography computer security member election assistance commission technical guidelines development committee tasked assisting eac drafting voluntary voting system guidelines also member accurate project wagner received a.b mathematics princeton university 1995 m.s computer science berkeley 1999 ph.d. computer science berkeley 2000 published two books 90 peer-reviewed scientific papers notable achievements include | [
4320,
10146,
1315,
7556,
2567,
618,
1847,
6863,
3984,
11505,
1683,
1173,
1941,
1783,
9214,
10329,
7643,
2558
] | Test |
1,115 | 3 | IBM_BladeCenter:ibm bladecenter ibm bladecenter ibm blade server architecture replaced flex system x86 division later sold lenovo 2014 introduced 2002 based engineering work started 1999 ibm bladecenter relatively late blade server market differed prior offerings offered range x86 intel server processors input/output i/o options february 2006 ibm introduced bladecenter h switch capabilities 10 gigabit ethernet infiniband 4x web site called blade.org available blade computing community 2009 2012 replacement flex system introduced original ibm bladecenter later marketed bladecenter e 14 blade slots 7u power supplies upgraded life chassis original 1200 1400 1800 2000 2320 watt bladecenter e co-developed ibm intel included bladecenter telecommunications company version original ibm bladecenter available either ac dc 48 v power 8 blade slots 8u uses switches blades regular bladecenter e. keep nebs level 3 etsi compliant special network equipment-building system nebs compliant blades available upgraded bladecenter design high-speed fabric options fits 14 blades 9u backwards compatible older bladecenter switches blades bladecenter ht telecommunications company version ibm bladecenter h available either ac dc 48 v power 12 blade slots 12u uses switches blades regular bladecenter h. keep nebs level 3 etsi compliant special nebs compliant blades available targets mid-sized customers offering storage inside bladecenter chassis separate external storage needs purchased also use 110 v power north american market used outside datacenter running 120v total chassis capacity reduced modules based x86 processors intel 2008 features 2002-6 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features features features similar hs22 features features features blade model targeted workstation market features blade model targeted server virtualization market features modules based x86 processors amd features blade model use high-speed i/o bladecenter h also backwards compatible regular bladecenter features upgraded model ls21 features blade model use high-speed io option bladecenter h backwards compatible regular bladecenter features upgraded model ls41 features modules based powerpc- power isa-based processors ibm features blade model high-speed io option bladecenter h backwards compatible regular bladecenter features features features features features features features similar ps700 think two ps701 tied together back-to-back forming double-wide blade features similar ps701 think two ps703 tied together back-to-back forming double-wide blade modules based cell processors ibm features features features themis computer announced blade around 2008 ran sun solaris operating system sun microsystems module one ultrasparc t2 64 threads 1.2 ghz 32 gb ddr2 sdram processor memory developed conjunction cloudshield features ibm roadrunner supercomputer used custom module called triblade 2008 2013 expansion blade connects two qs22 modules 8 gb ram via four pcie x8 links ls21 module 16 gb ram two links qs22 also provides outside connectivity via infiniband 4x ddr adapter makes total width four slots single triblade three triblades fit one bladecenter h chassis bladecenter total four switch modules two switch module bays take ethernet switch ethernet pass-though use switch module bays daughtercard needs installed blade needs provide required san ethernet infiniband myrinet function mixing different type daughtercards bladecenter chassis allowed gigabit ethernet switch modules produced ibm nortel cisco systems blade network technologies produced switches later purchased ibm cases speed internal bladecenter blades non-blocking external gigabit ethernet ports vary four six either copper optical fiber variety san switch modules produced qlogic cisco mcdata acquired brocade brocade ranging speeds 1 2 4 8 gbit fibre channel speed san switch blade determined lowest-common-denominator blade hba daughtercard san switch external port counts vary two six depending switch module infiniband switch module produced cisco speed blade infiniband daughtercard switch limited ib 1x 2.5 gbit externally switch one ib 4x one ib 12x port ib 12x port split three ib 4x ports giving total four ib 4x ports total theoretical external bandwidth 40 gbit two kinds pass-through module available copper pass-through fibre pass-through copper pass-through used ethernet fibre pass-through used ethernet san myrinet bridge modules compatible bladecenter h bladecenter ht function like ethernet san switches bridge traffic infiniband advantage operating system blade everything seems normal regular ethernet san connectivity inside bladecenter everything gets routed infiniband high-speed switch modules compatible bladecenter h bladecenter ht blade needs function must high-speed daughtercard installed different high-speed daughtercards mixed bladecenter chassis 10 gigabit ethernet switch module available blade network technologies allowed 10 gbit/s connection blade outside bladecenter several infiniband options | [
9472,
9090,
643,
5767,
3472,
5273,
6311,
10543,
4017,
306,
6834,
8625,
10417,
823,
6072,
7863,
2877,
1985,
9665,
1480,
5322,
3025,
6738,
2394,
1115,
859,
3677,
9445,
10985,
4587,
499,
6004,
1784,
3323,
8700,
6909
] | Validation |
1,116 | 9 | Translational_Backus–Naur_form:translational backus–naur form translational backus–naur form tbnf translational bnf refers backus–naur form formal grammar notation used define syntax computer languages algol ada c++ cobol fortran java perl python many others tbnf goes beyond bnf extended bnf ebnf grammar notation defines syntax language also defines structure abstract syntax tree ast created memory output intermediate code generated thus tbnf defines complete translation process input source code intermediate code specification output intermediate code optional case still get automatic ast creation ability define structure grammar tbnf concept first published april 2006 paper sigplan notices special interest group acm sample grammar specified tbnf given input running translator generated grammar would produce output | [
10560,
1956,
4293,
8582,
428,
3960
] | Test |
1,117 | 3 | Mooers's_law:mooers law mooers law empirical observation behavior made american computer scientist calvin mooers 1959 observation made relation information retrieval interpretation observation used commonly throughout information profession within outside original context mooers argued information risk languishing unused due effort required assimilate also fallout could arise discovery information conflicts user personal academic corporate interests interacting new information user runs risk proving work incorrect even irrelevant instead mooers argued users prefer remain state safety new arguments ignored attempt save potential embarrassment reprisal supervisors commonly used interpretation mooers law considered derivation principle least effort first stated george kingsley zipf interpretation focuses amount effort expended use understand particular information retrieval system information seeker gives law often paraphrased increase focus retrieval system interpretation painful troublesome comes using retrieval system | [
2273
] | None |
1,118 | 6 | File_virtualization:file virtualization computing file virtualization field storage virtualization operating computer file level involves uniting multiple storage devices single logical pool file vital part file area network fan network file management nfm concepts virtualization designs primary driver behind file virtualization desire shield users administrators complexity underlying storage environment goals include simplified management efficient capacity usage allocation reduced management costs network file management nfm data storage management-related category identified defined 2004 several prominent data storage analysts term used interchangeably nas virtualization file virtualization among data storage industry press analysts system administrators basic idea nfm rapid ongoing growth file data capacity enterprise networks led massive management complexity accelerating operating costs nfm concept creating virtualization layer clients file servers nas devices creating abstraction layer system administrators may simplify management multiple storage devices including non-disruptive movement data servers preserving client access path pathname policies automating placement data according changing needs ability discover analyze report server file usage | [
2432,
5178,
3909,
9844,
9625,
8410
] | Test |
1,119 | 3 | Tiger_Lake_(microarchitecture):tiger lake microarchitecture tiger lake intel cpu microarchitecture based second-generation 10nm process node named 10nm+ replace ice lake tiger lake slated include quad-core 9 w tdp 25 w tdp models power 2020 project athena laptops | [
3459,
5380,
2821,
3973,
8325,
9095,
5386,
9611,
4108,
9741,
398,
5649,
7313,
5523,
6804,
8851,
4886,
9111,
3352,
9500,
5883,
2088,
10669,
9391,
10675,
4276,
1461,
10548,
2237,
5309,
8125,
8126,
833,
6339,
5444,
9541,
1998,
2638,
977,
2514... | Test |
1,120 | 3 | Nobunaga's_Ambition_(video_game):nobunaga ambition video game player may choose four campaign scenarios including battle east beginning 1560 daimyo power struggles 1560 ambition untamed 1571 road towards unification 1582 scenario player must allocate resources raise capable military force provide productive economy support military civilian expansion support peasants order sustain respect loyalty gameplay taken turns turn map view corresponding season turn battle corresponding day player may achieve victory numerous means among forcing enemy retreat destroying enemy command unit outlasting invading force prolonging battles opposing force exhausted supplies player make many choices campaign according evan brooks computer gaming world one may transfer soldiers fiefs go war increase taxes causes decrease peasant loyalty may lead rebellion transfer rice gold another fief raise level flood control decreases productivity make non-aggression pact arrange marriage cultivate increases productivity decreases peasant loyalty use merchant buy/sell rice borrow funds purchase weapons recruit military soldiers ninja train army increases fighting efficiency spy rival expand town increases taxes collected decreases peasant loyalty give food/rice peasants/soldiers raise morale steal peasants rival daimyos allocate military strength recuperate even daimyo get sick turn controlled fief computer administration pass turn hint one idea train troops north america game positively reviewed computer gaming world reviewer evan brooks gave four stars five introduced game detailed economic diplomatic political military simulation unification japan sixteenth century praised graphics among best reviewer ever seen ibm 5x10 hex map battles noted used role-playing game elements including assigning various statistics selected persona time system turn represents year daimyo ages eventually dies old age multiplayer option stated thoroughly enjoyed nobunaga ambition concluded highly recommended rating compute similarly praised ibm pc version calling one best strategic war games ever designed personal computer citing game play user interface documentation console versions lukewarm reception reviewing snes version gamepro praised control interface combat system opined game essentially offers nothing set apart koei previous historical simulators rated genesis version similarly saying like koei games nobunaga easy-to-use detailed menu-driven interface activates load complex commands | [
4706,
10316,
9006,
10999
] | Test |
1,121 | 5 | Modem:modem modem portmanteau modulator-demodulator hardware device converts data format suitable transmission medium transmitted computer computer historically telephone wires modem modulates one carrier wave signals encode digital information transmission demodulates signals decode transmitted information goal produce signal transmitted easily decoded reliably reproduce original digital data modems used almost means transmitting analog signals light-emitting diodes radio common type modem one turns digital data computer modulated electrical signal transmission telephone lines demodulated another modem receiver side recover digital data modems generally classified maximum amount data send given unit time usually expressed bits per second symbol bit sometimes abbreviated bps rarely bytes per second symbol b modems also classified symbol rate measured baud baud unit denotes symbols per second number times per second modem sends new signal example itu v.21 standard used audio frequency-shift keying two possible frequencies corresponding two distinct symbols one bit per symbol carry 300 bits per second using 300 baud contrast original itu v.22 standard could transmit receive four distinct symbols two bits per symbol transmitted 1,200 bits sending 600 symbols per second 600 baud using phase-shift keying news wire services 1920s used multiplex devices satisfied definition modem however modem function incidental multiplexing function commonly included history modems modems grew need connect teleprinters ordinary phone lines instead expensive leased lines previously used current loop–based teleprinters automated telegraphs 1941 allies developed voice encryption system called sigsaly used vocoder digitize speech encrypted speech one-time pad encoded digital data tones using frequency shift keying mass-produced modems united states began part sage air-defense system 1958 year word modem first used connecting terminals various airbases radar sites command-and-control centers sage director centers scattered around united states canada sage modems described bell labs conforming newly published bell 101 dataset standard ran dedicated telephone lines devices end different commercial acoustically coupled bell 101 110 baud modems 201a 201b data-phones synchronous modems using two-bit-per-baud phase-shift keying psk 201a operated half-duplex 2,000 bit/s normal phone lines 201b provided full duplex 2,400 bit/s service four-wire leased lines send receive channels running set two wires famous bell 103a dataset standard also introduced 1962 provided full-duplex service 300 bit/s normal phone lines frequency-shift keying used call originator transmitting 1,070 1,270 hz answering modem transmitting 2,025 2,225 hz readily available 103a2 gave important boost use remote low-speed terminals teletype model 33 asr ksr ibm 2741 reduced modem costs introducing originate-only 113d answer-only 113b/c modems many years bell system maintained monopoly use phone lines devices could connected however fcc seminal carterfone decision 1968 fcc concluded electronic devices could connected telephone system long used acoustic coupler since handsets supplied western electric thus standard design acoustic couplers relatively easy build acoustically coupled bell 103a-compatible 300 bit/s modems common 1970s well-known models included novation cat anderson-jacobson latter spun in-house project stanford research institute sri international even lower-cost option pennywhistle modem designed built using parts electronics scrap surplus stores december 1972 vadic introduced va3400 notable full-duplex operation 1,200 bit/s phone network like 103a used different frequency bands transmit receive november 1976 introduced 212a modem compete vadic similar design used lower frequency set transmission one could also use 212a 103a modem 300 bit/s according vadic change frequency assignments made 212 intentionally incompatible acoustic coupling thereby locking many potential modem manufacturers 1977 vadic responded va3467 triple modem answer-only modem sold computer center operators supported vadic 1,200-bit/s mode 212a mode 103a operation hush-a-phone decision applied mechanical connections carterfone decision 1968 led fcc introducing rule setting stringent t-designed tests electronically coupling device phone lines opened door direct-connect modems plugged directly phone line rather via handset however cost passing tests considerable acoustically coupled modems remained common early 1980s rapidly falling prices electronics late 1970s led increasing number direct-connect models around 1980 spite directly connected modems generally operated like earlier acoustic versions – dialing phone-control operations completed hand using attached handset small number modems added ability automatically answer incoming calls automatically place outgoing call single number even limited features relatively rare limited special models lineup flexible solutions needed third party dialers used automate calling normally using separate serial port communicate dialer would control modem private electrical connection introduction microcomputer systems internal expansion slots made first software-controllable modems common slot connections gave computer complete access modem memory input/output i/o channels allowed software send commands modem data led series popular modems s-100 bus apple ii computers could directly dial phone answer incoming calls hang phone basic requirements bulletin board system bbs seminal cbbs created s-100 machine hayes internal modem number similar systems followed next major advance modems hayes smartmodem introduced 1981 smartmodem otherwise standard 103a 300 bit/s direct-connect modem attached small microcontroller watched data stream certain character strings representing commands allowed data commands sent single serial port now-standard hayes command set included instructions picking hanging phone dialing numbers answering calls among others similar commands offered internal modems unlike smartmodem could connected computer rs-232 port practically every microcomputer built introduction smartmodem made communications much simpler easily accessed provided growing market vendors licensed hayes patents competed price adding features 1980s number new higher-speed modems first 1,200 2,400 bit/s greatly improved responsiveness online systems made file transfer practical led rapid growth online services large file libraries turn gave reason modem rapid update modems led similar rapid increase bbs use helped fact bbss could control modem simply sending strings rather talking device driver different every direct-connect modem 300 bit/s modems used audio frequency-shift keying send data system stream 1s 0s computer data translated sounds easily sent phone lines bell 103 system originating modem sends 0s playing 1,070 hz tone 1s 1,270 hz answering modem transmitting 0s 2,025 hz 1s 2,225 hz frequencies chosen carefully range suffers minimum distortion phone system harmonics 1,200 bit/s faster systems phase-shift keying used system two tones one side connection sent similar frequencies 300 bit/s systems slightly phase voiceband modems generally remained 300 1,200 bit/s v.21 v.22 mid-1980s v.22bis 2,400-bit/s system similar concept 1,200-bit/s bell 212 signaling introduced u.s. slightly different one europe limited available frequency range meant symbol rate 1,200 bit/s modems still 600 baud symbols per second bit rate increases achieved defining four eight distinct symbols allowed encoding two three bits per symbol instead 1 use smaller shifts drawback making symbol vulnerable interference improvements phone line quality time helped compensate late 1980s modems could support standards 2,400-bit/s operation becoming common many standards also introduced special purposes commonly using high-speed channel receiving lower-speed channel sending one typical example used french minitel system user terminals spent majority time receiving information modem minitel terminal thus operated 1,200 bit/s reception 75 bit/s sending commands back servers three u.s. companies became famous high-speed versions concept telebit introduced trailblazer modem 1984 used large number 36 bit/s channels send data one-way rates 18,432 bit/s single additional channel reverse direction allowed two modems communicate much data waiting either end link modems could change direction fly trailblazer modems also supported feature allowed spoof uucp g protocol commonly used unix systems send e-mail thereby speed uucp tremendous amount trailblazers thus became extremely common unix systems maintained dominance market well 1990s usrobotics usr introduced similar system known hst although supplied 9,600 bit/s early versions least provided larger backchannel rather offer spoofing usr instead created large market among fidonet users offering modems bbs sysops much lower price resulting sales end users wanted faster file transfers hayes forced compete introduced 9,600 bit/s standard express 96 also known ping-pong generally similar telebit pep hayes however offered neither protocol spoofing sysop discounts high-speed modems remained rare common feature high-speed modems concept fallback speed hunting allowing communicate less-capable modems call initiation modem would transmit series signals wait remote modem respond would start high speeds get progressively slower response thus two usr modems would able connect 9,600 bit/s user 2,400 bit/s modem called usr would fall back common 2,400 bit/s speed would also happen v.32 modem hst modem connected used different standard 9,600 bit/s would fall back highest commonly supported standard 2,400 bit/s applies v.32bis 14,400 bit/s hst modem would still able communicate 2,400 bit/s echo cancellation next major advance modem design local telephone lines use wires send receive data results small amount outgoing signal reflected back useful people talking phone provides signal speaker voice making system however reflected signal causes problems modem unable distinguish signal remote modem echo signal earlier modems split signal frequencies answer originate modem could ignore signals frequency range using transmission even improvements phone system allowing higher speeds splitting available phone signal bandwidth still imposed half-speed limit modems echo cancellation eliminated problem call setup negotiation period modems send series unique tones listen return phone system measure total delay time set local delay loop time connection completed send signals phone lines normal also delay inverted signal returning echo meets inverted version coming delay line cancels echo allowed modems use full spectrum available doubling speed additional improvements introduced via quadrature amplitude modulation qam encoding system previous systems using phase shift keying psk encoded two bits sometimes three per symbol slightly delaying advancing signal phase relative set carrier tone qam used combination phase shift amplitude encode four bits per symbol transmitting 1,200 baud produced 4,800 bit/s v.27ter standard working base rate 2,400 baud produced 9,600 bit/s v.32 carrier frequency 1,650 hz systems many years engineers considered rate limit data communications telephone networks introduction higher-speed systems also led digital fax machine 1980s digital faxes simply image format sent high-speed commonly 14.4 kbit/s modem software running host computer convert image fax format sent using modem software one time add-on since become largely universal first 9,600 bit/s modem developed 1968 sold 20,000 high error rates 1980 gottfried ungerboeck ibm zurich research laboratory applied channel coding techniques search new ways increase speed modems results astonishing conveyed colleagues 1982 agreed publish landmark paper theory information coding applying parity check coding bits symbol mapping encoded bits two-dimensional diamond pattern ungerboeck showed possible increase speed factor two error rate new technique called mapping set partitions known trellis modulation error correcting codes encode code words sets bits way far case error still closest original word confused another thought analogous sphere packing packing pennies surface two bit sequences one another easier correct minor errors dave forney introduced trellis diagram landmark 1973 paper popularized viterbi algorithm practically modems operating faster 9600 bit/s decode trellis-modulated data using viterbi algorithm v.32 modems operating 9600 bit/s expensive starting enter market early 1990s v.32bis standardized rockwell international chip division developed new driver chip set incorporating standard aggressively priced supra inc. arranged short-term exclusivity arrangement rockwell developed suprafaxmodem 14400 based introduced january 1992 399 less half price slower v.32 modems already market led price war end year v.32 dead never really established v.32bis modems widely available 250 v.32bis successful older high-speed standards little recommend usr fought back 16,800 bit/s version hst introduced one-off 19,200 bit/s method referred v.32ter neither non-standard modem sold well interest proprietary improvements destroyed lengthy introduction 28,800 bit/s v.34 standard waiting several companies decided release hardware introduced modems referred v.fast order guarantee compatibility v.34 modems standard ratified 1994 manufacturers forced use flexible parts generally dsp microcontroller opposed purpose-designed asic modem chips itu standard v.34 represents culmination joint efforts employs powerful coding techniques including channel encoding shape encoding mere four bits per symbol 9.6 kbit/s new standards used functional equivalent 6 10 bits per symbol plus increasing baud rates 2,400 3,429 create 14.4 28.8 33.6 kbit/s modems rate near theoretical shannon limit calculated shannon capacity narrowband line formula_1 formula_2 linear signal-to-noise ratio narrowband phone lines bandwidth 3,000 hz using formula_3 snr 30 db capacity approximately 30 kbit/s late 1990s rockwell-lucent usrobotics introduced competing technologies based upon digital transmission used telephony networks standard digital transmission modern networks 64 kbit/s networks use part bandwidth remote office signaling e.g hang phone limiting effective rate 56 kbit/s ds0 new technology adopted itu standards v.90 common modern computers 56 kbit/s rate possible central office user site downlink united states government regulation limits maximum power output resulting maximum data rate 53.3 kbit/s uplink user central office still uses v.34 technology 33.6 kbit/s usrobotics began work technology first calling x2 56k twice speed 28k modems usrobotics held 40-percent share retail modem market rockwell international held 80-percent share modem chipset market concerned shut market rockwell began work rival 56k technology joined lucent motorola called k56flex flex technologies reached market around february 1997 although problems k56flex modems noted product reviews july within six months worked equally well variations dependent local connection characteristics retail price 56k modems us 200 compared 100 33k modems separate equipment required internet service providers isps support incompatible technologies costs varying depending whether current equipment could upgraded half isps offered 56k support october 1997 consumer sales relatively low usrobotics rockwell attributed conflicting standards international telecommunication union itu announced draft new 56 kbit/s standard v.90 february 1998 strong industry support incompatible either existing standard amalgam designed allow types modem converted firmware upgrade v.90 standard approved september 1998 widely adopted isps consumers later v.92 digital pcm technique applied increase upload speed maximum 48 kbit/s expense download rates 48 kbit/s upstream rate would reduce downstream low 40 kbit/s due echo telephone line avoid problem v.92 modems offer option turn digital upstream instead use 33.6 kbit/s analog connection order maintain high digital downstream 50 kbit/s higher v.92 also adds two features first ability users call waiting put dial-up internet connection hold extended periods time answer call second feature ability quickly connect one isp achieved remembering analog digital characteristics telephone line using saved information reconnecting v.42 v.42bis v.44 standards allow modem transmit data faster basic rate would imply instance 53.3 kbit/s connection v.44 transmit 53.3 × 6 320 kbit/s using pure text however compression ratio tends vary due noise line due transfer already-compressed files zip files jpeg images mp3 audio mpeg video points modem sending compressed files approximately 50 kbit/s uncompressed files 160 kbit/s pure text 320 kbit/s value situations small amount memory modem buffer used hold data compressed sent across phone line order prevent overflow buffer sometimes becomes necessary tell computer pause datastream accomplished hardware flow control using extra lines modem–computer connection computer set supply modem higher rate 320 kbit/s modem tell computer start stop sending data telephone-based 56k modems began losing popularity internet service providers netzero/juno netscape others started using pre-compression increase throughput maintain customer base server-side compression operates much efficiently on-the-fly compression done modems compression techniques application-specific jpeg text exe etc. website text images flash executables compacted approximately 4 12 30 respectively drawback approach loss quality causes image content become pixelated smeared isps employing approach often advertise accelerated dial-up accelerated downloads integrated opera amazon silk web browsers using server-side text image compression winmodem softmodem stripped-down modem replaces tasks traditionally handled hardware software case modem simple interface codec code decode digital signal softmodems cheaper traditional modems fewer hardware components however software interpreting modem tones sent softmodem uses system resources online gaming real concern another problem lack cross-platform compatibility meaning non-windows operating systems linux often equivalent driver operate modem values maximum values actual values may slower certain conditions example noisy phone lines complete list see companion article list device bandwidths baud one symbol per second symbol may encode one data bits 1994 software publishers association found although 60 computers us households modem 7 households went online cea study 2006 found dial-up internet access declining u.s 2000 dial-up internet connections accounted 74 u.s. residential internet connections united states demographic pattern dial-up modem users per capita less mirrored canada australia past 20 years dial-up modem use u.s. dropped 60 2003 2006 stood 36 voiceband modems popular means internet access u.s. advent new ways accessing internet traditional 56k modem losing popularity dial-up modem still widely used customers rural areas dsl cable satellite fiber optic service available unwilling pay companies charge 2012 annual report aol showed still collects around us 700 million fees dial-up users three million people adsl asymmetric digital subscriber line modems recent development limited telephone voiceband audio frequencies standard twisted-pair telephone cable short distances carry signals much higher frequencies cable maximum frequency rating adsl broadband takes advantage capability however adsl performance gradually declines telephone cable length increases limits adsl broadband service subscribers within relatively short distance telephone exchange cable modems use infrastructure originally intended carry television signals therefore designed outset carry higher frequencies single cable carry radio television signals time broadband internet service without interference newer types broadband modems also available including satellite modems power line modems consumers know networking routers broadband became available however many people knew modem connected computer internet telephone line take advantage consumers familiarity modems companies called devices broadband modems rather using less familiar terms adapter interface transceiver bridge fact broadband modems fit definition modem use complex waveforms carry digital data use advanced technology dial-up modems typically modulate demodulate hundreds channels simultaneously use much wider channels dial-up modems direct broadcast satellite wifi mobile phones use modems communicate wireless services today modern telecommunications data networks also make extensive use radio modems long distance data links required systems important part pstn also common use high-speed computer network links outlying areas fibre economical even cable installed often possible get better performance make parts system simpler using radio frequencies modulation techniques cable coaxial cable large bandwidth signal attenuation becomes major problem high data rates baseband digital signal used using modem much larger amount digital data transmitted single wire digital cable television cable internet services use radio frequency modems provide increasing bandwidth needs modern households using modem also allows frequency-division multiple access used making full-duplex digital communication many users possible using single wire wireless modems come variety types bandwidths speeds wireless modems often referred transparent smart transmit information modulated onto carrier frequency allow many simultaneous wireless communication links work simultaneously different frequencies transparent modems operate manner similar phone line modem cousins typically half duplex meaning could send receive data time typically transparent modems polled round robin manner collect small amounts data scattered locations easy access wired infrastructure transparent modems commonly used utility companies data collection smart modems come media access controllers inside prevents random data colliding resends data correctly received smart modems typically require bandwidth transparent modems typically achieve higher data rates ieee 802.11 standard defines short range modulation scheme used large scale throughout world wifi wimax standards use wireless mobile broadband modems operating microwave frequencies modems use mobile telephone system gprs umts hspa evdo wimax etc known mobile broadband modems sometimes also called wireless modems wireless modems embedded inside laptop appliance external external wireless modems connect cards usb modems mobile broadband cellular routers connect card pc card expresscard slides pcmcia/pc card/expresscard slot computer usb wireless modems use usb port laptop instead pc card expresscard slot usb modem used mobile broadband internet also sometimes referred dongle cellular router may external datacard aircard slides cellular routers allow datacards usb modems cellular routers may modems definition contain modems allow modems slid difference cellular router wireless modem cellular router normally allows multiple people connect since route data support multi-point multi-point connections modem designed one connection gsm wireless modems come integrated sim cardholder i.e. huawei e220 sierra 881 etc models also provided microsd memory slot and/or jack additional external antenna huawei e1762 sierra wireless compass 885 cdma evdo versions use r-uim cards use electronic serial number esn instead cost using wireless modem varies country country carriers implement flat rate plans unlimited data transfers caps maximum limits amount data transferred per month countries plans charge fixed rate per data transferred—per megabyte even kilobyte data downloaded tends add quickly today content-filled world many people pushing flat data rates faster data rates newest wireless modem technologies umts hspa evdo wimax also considered broadband wireless modems compete broadband modems end april 2011 worldwide shipments usb modems surpassed embedded 3g 4g modules 3:1 usb modems easily discarded embedded modems could start gain popularity tablet sales grow incremental cost modems shrinks 2016 ratio may change 1:1 like mobile phones mobile broadband modems sim locked particular network provider unlocking modem achieved way unlocking phone using 'unlock code devices referred broadband modems residential gateways integrating functions modem network address translation nat router ethernet switch wifi access point dhcp server firewall among others residential gateway offer so-called bridged mode disables built-in routing function makes device function similarly plain modem bridged mode separate rfc 1483 bridging dc-bus powerline modem provide communication noisy power lines speeds 1.3mbit/s using ordinary uart lin spi protocols modems used connect fiber optic network known optical network units onus fiber optic systems upgraded use quadrature amplitude modulation modulator demodulator separate components rather single assembly modems 16qam uses 16-point constellation send four bits per symbol speeds usually order 200 400 gigabits per second 64qam uses 64-point constellation send six bits per symbol although suppliers announced components announcements installation rare speeds 65 terabits per second observed although name modem seldom used case modems also used high-speed home networking applications especially using existing home wiring one example g.hn standard developed itu-t provides high-speed 1 gbit/s local area network using existing home wiring power lines phone lines coaxial cables g.hn devices use orthogonal frequency-division multiplexing ofdm modulate digital signal transmission wire phrase null modem used describe attaching specially wired cable serial ports two personal computers basically transmit output one computer wired receive input true computers software used modems procomm minicom could used null modem connection voice modems regular modems capable recording playing audio telephone line used telephony applications see voice modem command set details voice modems type modem used fxo card private branch exchange pbx systems compare v.92 | [
4609,
2057,
1038,
1550,
7188,
6165,
6681,
5664,
2598,
6697,
7723,
5681,
1083,
7739,
10303,
3140,
4679,
1098,
10316,
5201,
1618,
4691,
1621,
3168,
10853,
7271,
117,
119,
6783,
639,
6787,
10381,
10894,
4244,
8857,
7325,
5281,
1194,
5809,
68... | Test |
1,122 | 3 | Intel_MPX:intel mpx intel mpx memory protection extensions set extensions x86 instruction set architecture compiler runtime library operating system support intel mpx brings increased security software checking pointer references whose normal compile-time intentions maliciously exploited runtime due buffer overflows intel mpx introduces new bounds registers new instruction set extensions operate registers additionally new set bound tables store bounds beyond fit bounds registers mpx uses four new 128-bit bounds registers codice_1 codice_2 storing pair 64-bit lower bound lb upper bound ub values buffer upper bound stored ones complement form codice_3 create bounds codice_4 check upper bound performing conversion architecture includes two configuration registers codice_5 codice_6 user space codice_7 kernel mode status register codice_8 provides memory address error code case exception two-level address translation used storing bounds memory top layer consists bounds directory bd created application startup bd entry either empty contains pointer dynamically created bounds table bt turn contains set pointer bounds along linear addresses pointers bounds load codice_9 store codice_10 instructions transparently perform address translation access bounds proper bt entry intel mpx introduced part skylake microarchitecture intel goldmont microarchitecture also supports intel mpx study examined detailed cross-layer dissection mpx system stack comparison three prominent software-based memory safety systems addresssanitizer safecode softbound presents following conclusions addition review concluded mpx production ready addresssanitizer better option review kostya serebryany google addresssanitizer developer similar findings another study exploring scope spectre meltdown security vulnerabilities discovered meltdown used bypass intel mpx using bound range exceeded br hardware exception according publication searchers able leak information flush+reload covert channel out-of-bound access array safeguarded mpx system proof concept publicly disclosed | [
7173,
9739,
2066,
7699,
5655,
10779,
10781,
5154,
6181,
8231,
2088,
3630,
6705,
7218,
1085,
2623,
2113,
7234,
3142,
2638,
8795,
2655,
3175,
7783,
8815,
6268,
3197,
4237,
7313,
9369,
6815,
5793,
6818,
6821,
7852,
9391,
2224,
2226,
7858,
10... | None |
1,123 | 2 | NeXT_Introduction:next introduction next introduction sub-titled introduction next generation computers education lavish invitation-only gala launch event next computer also called next computer system described multimedia extravaganza held louise m. davies symphony hall san francisco california wednesday october 12 1988 event ran 9:30am till 12 noon attendees given unique launch event poster steve jobs departed apple three years prior event sank sight emerging 1986 unveil next logo early 1987 announce h. ross perot invested 20 million next inc otherwise steve jobs shunned public appearances computer-industry events avoid comment publicly new company activities re-emerged launch described subtlety hollywood première first major public appearance since leaving apple jobs hired multimedia artist george coates stage unveiling time considered event launch new computer also new steve jobs jobs telling audience great back 3000 invitations sent educators software developers reporters launch event single apple employee invited company rented davies symphony hall supposedly good acoustics show dsps allowed cube play full stereo sound machine played duet one symphony ’ violinists jobs opened show purpose built animation built next ui architect keith ohlfs demonstrating history computer interfaces multi-tasking capabilities next computer following day 13th october saw follow-up event next day selected educators software developers invited 100 registration fee send four key individuals attend first public technical overview next computer held san francisco hilton event gave developers interested developing next software insight software architecture object-oriented programming developing next computer luncheon speaker steve jobs program designed experienced developers provided technical overview next software architecture development environment launch event replicated venues following days locations boston ’ symphony hall university california riverside attendee received agenda day launch poster given delegates launch event measured 37 17 printed heavy poster paper poster design consisted next computer screen keyboard mouse laser printer also incorporated next logo designed paul rand text october 12 1988 computing advances next level | [
2282,
7806
] | None |
1,124 | 9 | Categorical_abstract_machine:categorical abstract machine categorical abstract machine cam model computation programs preserves abilities applicative functional compositional style based techniques applicative computing notion categorical abstract machine arose mid-1980s took place computer science kind theory computation programmers represented cartesian closed category embedded combinatory logic cam transparent sound mathematical representation languages functional programming machine code optimized using equational form theory computation using cam various mechanisms computation recursion lazy evaluation emulated well parameter passing call name call value theory cam preserves advantages object approach towards programming computing main current implementation ocaml added class inheritance dynamic method dispatch caml categorical abstract machine language variants metalanguage ml notable type-inference one implementation approaches functional languages given machinery based supercombinators sk-machine d. turner notion cam gives alternative approach structure cam consists syntactic semantic computational constituents syntax based de bruijn ’ notation overcomes difficulties using bound variables evaluations similar p. landin ’ secd machine coverage cam gives sound ground syntax semantics theory computation comprehension arises influenced functional style programming | [
10403,
1947,
6536,
1523,
7386,
10043
] | Validation |
1,125 | 4 | Message_submission_agent:message submission agent message submission agent msa mail submission agent computer program software agent receives electronic mail messages mail user agent mua cooperates mail transfer agent mta delivery mail uses esmtp variant simple mail transfer protocol smtp specified rfc 6409 many mtas perform function msa well also programs specially designed msas without full mta functionality historically internet mail mta msa functions use port number 25 official port msas 587 mta accepts user incoming mail msa accepts user outgoing mail separation mta msa functions produces several benefits one benefit msa since interacting directly author mua correct minor errors message format missing date message-id fields address missing domain name and/or immediately report error author corrected sent recipients mta accepting message another site reliably make kinds corrections error reports generated mta reach author message already sent one benefit dedicated port number 587 always possible users connect domain submit new mail combat spam including spam sent unwittingly victim botnet many isps institutional networks restrict ability connect remote mtas port 25 accessibility msa port 587 enables nomadic users example working laptop continue send mail via preferred submission servers even within others networks using specific submission server requirement sender policies signing practices enforced another benefit separating mta msa functions makes easier mta deny relaying refuse mail addressed recipient domain served locally strategy used isps prevent sending spam virus infected client computers contrast msa must generally accept mail recipient internet though accepts mail authors authorized use msa established identity msa via authentication times mail submission acceptance incoming mail usually accomplished using protocol server ability send mail arbitrary destinations without authentication allowed spammers use mtas means distributing spam since single message transaction request mta relay message large number recipients also made difficult trace message origin yet another benefit msas mtas different policies filtering spam msas require authentication form username password provided author messages received msa therefore traceable author direct relationship msa held accountable actions allows msa either spam filtering permissive spam filtering mta exists purpose accepting incoming email domains difficult establish trust mail sent arbitrary domains generally direct relationship domains via trust even identity established absence trust mta must generally rely heuristics third-party reputation services distinguish spam legitimate traffic mechanisms history error-prone separation msa mta therefore avoids use unreliable spam recognition mechanisms mail submission increases probability legitimate mail delivered successfully recent email clients use port 587 default older ones still propose port 25 users change port number manually latter case also possible mua may automatically discover server provides msa given domain looking srv records domain domain example.com publish record like rfc 6409 requires clients authorized authenticated use mail submission service e.g. described smtp-auth esmtpa means radius public key certificates mostly obsolete pop smtp msa must check submitted mail syntactically valid conforms relevant site policies rfc 6409 contains optional features | [
2848,
8386,
4009,
8202,
10058,
5421,
3246,
9744,
6993,
8337,
4883,
9909,
10167,
472,
4793,
8671
] | Test |
1,126 | 2 | Apache_Mynewt:apache mynewt apache mynewt modular real-time operating system connected internet things iot devices must operate long times power memory storage constraints free open-source software incubating apache software foundation source code distributed apache license 2.0 permissive license conducive commercial adoption open-source software apache mynewt real-time operating system rich set libraries intended make prototyping deploying managing 32-bit microcontroller based iot devices easy highly composable allow building embedded system applications e.g. locks medical devices industrial iot across different types microcontrollers name mynewt wordplay english word minute meaning small kernel 6 kb size os designed connectivity comes full implementation bluetooth low energy 4.2 stack addition ble supporting bluetooth 4.2 compliant security features except privacy various utilities default file system console shell logs stats etc. image size approximately 96 kb nordic nrf51822 bluetooth soc size metric excludes boot loader image core operating system supports features utilities include first network stack available mynewt bluetooth low energy called nimble complies bluetooth core specification 4.2 nimble includes host controller components access controller source code makes ble performance highly configurable example ble throughput adjusted changing connection intervals data packet size packet queue size etc use case requiring large number concurrent connections similarly configured provided adequate ram allocated example applications demonstrate use available services included package operating system designed cross-platform use embedded systems devices microcontrollers includes board support packages following project includes newt tool command-line interface cli based smart source package manager system embedded systems development also allows composing builds specified packages compiler options generating images digital signatures finally downloading debugging firmware different targets | [
2179,
6276,
10883,
7818,
7445,
9366,
7319,
2201,
1435,
9628,
9762,
4773,
4777,
10030,
7983,
2224,
4668,
6207,
321,
7234,
7235,
10561,
1221,
8262,
9927,
6985,
9162,
5067,
341,
10590,
6624,
5603,
5220,
1253,
1126,
5612,
6128,
10482,
2804,
1... | Validation |
1,127 | 5 | Multilink_Procedure:multilink procedure multilink procedure mlp subscription-time selectable option exists added upper sublayer data link layer operating packet layer multiplicity single data link protocol functions slps data link layer multilink procedure mlp must perform functions accepting packets packet layer distributing packets across available dce dte slps transmission dte dce slps respectively resequencing packets received dte dce slps delivery dte dce packet layer respectively mlp extension lapb allows multiple physical links thus providing better throughput device multiple lapb links implement mlp upper-layer management protocol allocate frames links mlp sees multiple lapb links pool links transmitting information higher-layer protocols frames higher-level software need aware multiple links exist mlp layer handles distributing frames among links thus gives upper layers full access links | [
2912,
5021,
10647
] | Test |
1,128 | 8 | Java_API_for_XML_Web_Services:java api xml web services java api xml web services jax-ws java programming language api creating web services particularly soap services jax-ws one java xml programming apis part java ee platform jax-ws 2.2 specification jsr 224 defines standard java- to-wsdl mapping determines wsdl operations bound java methods soap message invokes wsdl operation java-to-wsdl mapping determines java method gets invoked soap message mapped method ’ parameters mapping also determines method ’ return value gets mapped soap response jax-ws uses annotations introduced java se 5 simplify development deployment web service clients endpoints part java web services development pack jax-ws used java se starting version 6 jax-ws 2.0 replaced jax-rpc api java platform enterprise edition 5 leans towards document style web services api provides core project metro inside glassfish open-source application server community oracle corporation jax-ws also one foundations wsit | [
4740,
9988,
8070,
3341,
10526,
8096,
10020,
5677,
7983,
6067,
6328,
2106,
1851,
3517,
3518,
6334,
3008,
9665,
11582,
1095,
3278,
3920,
4688,
4959,
4960,
1250,
3558,
3560,
8425,
3562,
9834,
5612,
3954,
10486,
10877
] | Validation |
1,129 | 7 | Grammarly:grammarly grammarly online grammar checking spell checking plagiarism detection platform english language developed grammarly inc software first released july 2009 grammarly proofreading resources check 250 grammar rules grammarly app automatically detects potential grammar spelling punctuation word choice style mistakes writing grammarly algorithms flag potential issues text suggest context-specific corrections grammar spelling wordiness style punctuation plagiarism available via browser extension chrome safari firefox edge grammarly available app ios android premium service available monthly annual payment developed 2009 ukrainians alex shevchenko max lytvyn kiev backend grammar engine written common lisp app owned grammarly inc san francisco area california 2018 security bug discovered desktop web browser extension version grammarly allowed websites access everything user ever typed grammarly editor bug rapidly fixed grammarly said evidence security vulnerability used access customers ’ account data october 2018 grammarly announced support google docs | [
5636,
7780,
4326,
8204,
5325,
2062,
5078,
9241,
735
] | Test |
1,130 | 9 | Frink_(programming_language):frink programming language frink computer programming language according creator language designed make physical calculations simple help ensure answers come right make tool really useful real world tracks units measure feet meters kilograms watts etc calculations allowing mix units measure transparently helps easily verify answers make sense frink named professor frink recurring character animated television series simpsons | [
9345,
3462,
8582,
10387,
1435,
9245,
7326,
3876,
4777,
5677,
6074,
6718,
8644,
8262,
5833,
8524,
7889,
11219,
2519,
477,
6502,
10470,
11625,
8554,
10991,
5872,
3960,
3705,
7292,
2045
] | Validation |
1,131 | 9 | O-Matrix:o-matrix o-matrix matrix programming language mathematics engineering science financial analysis marketed harmonic software language designed use high-performance computing o-matrix provides integrated development environment matrix-based scripting language environment includes mathematical statistical engineering visualization functions set analysis functions designed development complex computationally intensive scientific mathematical engineering applications integrated environment provides mode largely compatible version 4 matlab language commercial product mathworks certain features matlab non-numeric data types structures cell arrays objects error handling try/catch nested anonymous functions missing o-matrix o-matrix environment includes virtual machine o-matrix language enable re-distribution applications | [
8262,
10145,
9780,
7326
] | Test |
1,132 | 2 | EuroLinux:eurolinux eurolinux campaigning organisation promotes open source software free software europe opposed european union proposals introduce laws software patents also known eurolinux alliance umbrella organisation linux user groups europe describes eurolinux alliance free information infrastructure open coalition commercial companies non-profit associations united promote protect vigorous european software culture based copyright open standards open competition open source software linux corporate members sponsors eurolinux develop sell software free semi-free non-free licenses operating systems linux mac os microsoft windows eurolinux organised public eu campaign software patents signed 300,000 people members include ffii april aful ael european linux user group lug umbrella associations | [
7983,
6797,
823
] | Test |
1,133 | 9 | Robert_Fourer:robert fourer robert fourer born september 2 1950 scientist working area operational research management science currently president ampl optimization inc professor emeritus industrial engineering management sciences northwestern university robert fourer recognized designer popular modeling language mathematical programming called ampl together david m. gay brian kernighan awarded 1993 orsa/csts prize computer science technical section operations research society america writings design mathematical programming systems ampl modeling language robert fourer also awarded guggenheim fellowship natural sciences 2002 ampl modeling language mathematical programming 2nd ed 2003 david gay brian kernighan | [
9915
] | None |
1,134 | 7 | Kubity:kubity kubity cloud-based 3d communication tool works desktop computers web smartphones tablets augmented reality gear virtual reality glasses kubity powered proprietary 3d crystallization engine called paragone prepares 3d file transfer mobile devices kubity practical applications architecture interior design engineering product design film video games among others majority users create 3d models using sketchup autodesk revit software kubity products include kubity pro plugin sketchup revit kubity go mobile application ios android kubity compatible across many platforms devices operating systems including ios android firefox chrome windows macos linux kubity created paris-based software company kubity s.a.s. designs develops cloud-based visual communication tools 3d models founded 2012 group software engineers urban projects developer united around simple idea create way anyone anywhere simply intuitively explore 3d models smartphones computers order bring architects engineers designers together clients around 3d model essential develop interactive platform supported multiple desktop mobile devices instantaneous fluid 3d navigation specifications place 15 engineers fused together several technologies 3d design data compression decimation rendering optimization web mobile transfer virtual reality headset integration january 2014 first public kubity prototype 1.0 amethyst launched small group beta testers plug-in allowed users import 3d models sketchup browser global release announced april 2014 sketchup basecamp vail colorado may 2015 kubity launched web application worked using webgl technology 2.0 citrine first time users able drag drop sketchup file web browser without install plug-in december 2015 kubity launched mobile application app store iphone ipod ipad well google play android devices 3.0 druzy november 2016 kubity launched support oculus rift htc vive 4.0 emerald beginning november 2017 kubity launched full suite rollout mobile applications six months included kubity ar augmented reality kubity vr virtual reality kubity mirror remote presentations screen mirroring 5.0 feldspar september 2018 one-click plugin sketchup revit kubity pro along mobile-first revamp kubity go launched allowing pro-to-go device pairing automatic mobile sync 6.0 gypsum early 2019 kubity go application updated include fully integrated ar vr screen mirroring functionalities killing dedicated companion apps kubity ar kubity vr kubity mirror process 7.0 heliotrope kubity powered proprietary 3d crystallization engine known paragone technology developed kubity s.a.s paragone takes constrained information 3d file runs blockwave algorithm also developed kubity s.a.s blockwave multiphase optimization algorithm combines 3d design data compression decimation rendering optimization web mobile transfer mixed reality headset integration create crystallized universal format original file one phase blockwave algorithm based quadric-based polygonal surface simplification algorithm performed using predefined heuristics associated plurality simplified versions 3d model version associated predefined level detail adapted user specific end device blockwave extracts data content geometry textures sets quadrics top original 3d model identifies pairs adjacent tops linked vertices algorithm uses local collapsing operator top-plan error metric obtain fixed number faces maximum defined error 3d meshing simplified replacing two points one deleting degrading faces updating adjacent relations decimation completed texture optimization set using texture target parameters allowing maximized gpu memory improve computing time texture encoding completed crystallized universal 3d file easily opened user-specific end device played across kubity suite tools real-time rendering user converts crystallizes 3d file exporting kubity pro plugin crystallization adds features like ar/vr cinematic fly-through tour well assigns model dedicated qr code 3d model exported kubity pro automatically synced kubity go user mobile device accessed explored shared others without internet connection user models managed one place kubity go models renamed password-protected shared played developed using apple arkit google arcore technology kubity ar maps environment room detecting horizontal planes like tables floors track place 3d objects blending digital objects information environment kubity ar allows users interact 3d models true augmented reality built-in communication features allows users instantly share 3d models anyone text email social media direct device-to-device qr code platform support ar supports devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 ar android requires android 7.0 later access google play store full list compatible devices found arcore developer website vr allows users explore sketchup models revit projects on-the-go right mobile device using google cardboard samsung gear vr glasses-free magic window feature kubity vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well mobile virtual reality headset samsung gear vr samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ screen mirroring allows user sync sender device receiver webpage mirror.kubity.com control sender device give remote presentation 3d model devices easily synced entering six-digit number displayed receiving computer kubity 3d communication tool sketchup models revit projects designed work together desktop plugin mobile app user downloads installs plugin sync mobile device plugin using kubity go mobile application model exported kubity 3d crystallization engine automatically optimizes 3d integrates augmented virtual reality features creates secure crystallized format original file kubity go mobile app kubity pro paired kubity pro account display exported sketchup revit models seamlessly across devices allow immersive ar/ vr experiences remote presentations device-to-device share on-the-go access features include cinematic tour walk mode clay mode share augmented reality virtual reality screen mirroring kubity pro plugin available sketchup extension warehouse autodesk app store kubity go free download app store google play ios kubity application compatible devices running version 9.0 higher android kubity compatible devices running version 4.4 “ kit kat ” higher web version kubity applications currently support web browsers compatible webgl2 mozilla firefox google chrome ar compatible devices running ios11 including iphone se iphone 6s iphone 6s plus iphone 7 iphone 7 plus iphone 8 iphone x ipad pro models ipad 2017 android devices requires android 7.0 later access google play store vr compatible google cardboard viewers cardboard compatible devices including clip-on style vr glasses like homido mini well samsung gear vr oculus go samsung gear vr supports galaxy s6 galaxy s6 edge galaxy s6 edge+ samsung galaxy note 5 galaxy s7 galaxy s7 edge galaxy s8 galaxy s8+ samsung galaxy note fan edition samsung galaxy note 8 samsung galaxy a8/a8+ 2018 samsung galaxy s9/galaxy s9+ technology developed kubity used products created kubity s.a.s including rvt2skp pro — plugin revit allows users export revit file sketchup file 2vr — dedicated plugin sketchup revit allows instant 3d exploration 1:1 scale immersive desktop vr compatible oculus rift htc vive | [
4194,
6186,
6797,
7983,
8754,
1427,
5078,
823
] | Test |
1,135 | 1 | DaDaBIK:dadabik dadabik no-code low-code development platform written php quickly creating crud create read update delete database front-end sophisticated database-driven web application without coding database management systems currently supported mysql postgresql sqlite starting version 9.2 microsoft sql server dadabik originally released 2001 sourceforge gnu general public license eugenio tacchini supported mysql version 4.5 release june 2012 license changed gpl proprietary dadabik 1.0 license requires payment downloading prohibits redistribution old gpl code dadabik v. 4.x removed official website sourceforge project still distributed freely current version moment 9.1 monterosso downloaded official website version 6 introduced new features including possibility add custom hand-coded php pages dadabik application version 8 lerici important milestone development dadabik new responsive front-end introduced together many new features including graph reports generation calculated fields hooks smart installation dadabik tries automatically configure application according database schema new license dadabik license v. 2.0 also introduced version 9 monterosso another important milestone development dadabik dadabik 9 allows build web application without coding starting excel csv ods file v.9 could build dadabik application starting database several new features help power users develop complex applications also introduced including custom buttons dashboards layout hooks new license dadabik license v. 2.1 also introduced version 9.2 introduced support microsoft sql server current last release 9.4 monterosso released july 23 2019 original author still main developer behind core code simone magnaschi takes care ux e ui design group mother tongue users handle translation/localization front-end available 22 languages main features forms customization e.g labels different types html input field content check lookup fields master/details view files upload calculated fields hooks graph report generation export csv checking possible duplication insertions authentication authorization restrictions view/update/delete e-mail notices dadabik used several big organizations like university cambridge università cattolica del sacro cuore considered one popular php database tools dadabik recursive acronym stands dadabik database interfaces kreator | [
8644,
5546,
5612,
7022,
7983,
11030,
9177,
8539
] | Test |
1,136 | 1 | Perst:perst perst open source dual license object-oriented embedded database management system odbms java programming language c programming language versions compact perst implemented smart phones running android windows phone wp7 operating systems perst launched 2003 russia designed achieve high-performance tightly integrating database programming language perst directly stores data language objects 2006 mcobject llc based issaquah wa took development perst continues offer free downloads added commercial license options perst first written java ported c although originally designed desktop- server-based software perst also found usage providing database management mobile applications running devices smartphones mobile devices typically hardware constraints limited ram cpu cycles available non-standard database systems operating requirements support java silverlight windows phone 7 mobile platform currently available versions perst perst .net perst java perst lite perst java perst lite bundled single software distribution perst .net supports c versions 1.0 2.0 source code support specific c 2.0 features template classes provided compile time compatible standard compact .net frameworks well silverlight operate microsoft windows phone 7 wp7 windows embedded compact formerly windows ce perst java supports j2se/j2ee versions 1.3 1.4 well j2se/j2ee version 5 compatible android smartphone environment perst lite perst java implementation runs devices blackberry smartphones based java j2me mobile device platform memory footprint approximately 30 percent smaller standard perst perst engine ’ size 5,000 lines source code run time random-access memory ram needs range 30k 300k perst transactions support acid properties atomicity consistency isolation durability automatic recovery perst provides subset sql filtering elements container class access stored objects perst implements specialized collection classes including facilitate changes existing database design database schema perst implements “ lazy ” database schema evolution object instance loaded database class descriptor compared format class application identical object changed object converted stored new format “ eager ” schema evolution format changes would sweep database proscout demo midlet using perst lite java environment demonstration discrete note-taking facility sports recruiter originally implemented blackberry also deployed nokia s60 mcobject provides demo app crm system using perst .net including fully text-searchable contact database runs desktop browser silverlight andy wigley appamundi ported demo app windows phone described project series blog postings users redistribute and/or modify perst terms gnu general public license version 2 later published free software foundation individuals organizations wish comply gpl commercial license available mcobject | [
2304,
8201,
3219,
2456,
1049,
2208,
11559,
10921,
5677,
10413,
7983,
1083,
10048,
10693,
8262,
7246,
2383,
479,
3560,
3561,
3562,
5612,
5103,
6769,
3573
] | None |
1,137 | 3 | AMD_10h:amd 10h amd family 10h k10 microprocessor microarchitecture amd based k8 microarchitecture though reports k10 canceled first third-generation opteron products servers launched september 10 2007 phenom processors desktops following launching november 11 2007 immediate successors k8 series processors athlon 64 opteron 64-bit sempron commonly perceived pc community time use codename k8 amd k8 athlon 64 processor family amd longer uses k-nomenclatures originally stood kryptonite since k-nomenclature naming convention beyond k8 appeared official amd documents press releases beginning 2005 name k8l first coined charlie demerjian one writers inquirer back 2005 used wider community convenient shorthand according amd official documents processor family termed amd next generation processor technology microarchitecture also referred stars codenames desktop line processors named stars constellations initial phenom models codenamed agena toliman video interview giuseppe amato confirmed codename k10 revealed inquirer codename k8l referred low-power version k8 family later named turion 64 k10 official codename microarchitecture amd refers family 10h processors successor family 0fh processors codename k8 10h 0fh refer main result cpuid x86 processor instruction hexadecimal numbering 0fh h represents hexadecimal numbering equals decimal number 15 10h equals decimal 16 k10h form sometimes pops improper hybrid k code family identifier number 2003 amd outlined features upcoming generations microprocessors k8 family processors various events analyst meetings including microprocessor forum 2003 outlined features deployed next-generation microprocessors follows april 13 2006 henri richard amd executive vice president chief officer marketing sales acknowledged existence new microarchitecture interview june 2006 amd executive vice president henri richard another interview digitimes commented upcoming processor developments july 21 2006 amd president chief operating officer coo dirk meyer senior vp marty seyer confirmed launch date new microprocessors revision h new microarchitecture slated middle 2007 contain quad core version servers workstations high-end desktops well dual core version consumer desktops revision h opterons shipped 2007 thermal design power 68 w. august 15 2006 launch first socket f dual-core opterons amd announced firm reached final design stage tape-out quad-core opteron parts next stages testing validation sampling follow several months june 29 2007 amd stated server processors codenamed barcelona ship august 2007 corresponding server systems partners ship september year august 13 reported ship dates first barcelona processors set september 10 2007 announced opteron 2348 2350 core frequencies 1.9 ghz 2.0 ghz november 2007 amd stopped delivery barcelona processors bug translation lookaside buffer tlb stepping b2 discovered could rarely lead race condition thus system lockup patch bios software worked around bug disabling cache page tables connected 5 20 performance penalty kernel patches would almost completely avoid penalty published linux april 2008 new stepping b3 brought market amd including fix bug plus minor enhancements november 2006 reports leaked upcoming desktop part codenames agena agena fx core speeds parts range 2.4 ghz 2.9 ghz respectively 512 kb l2 cache core 2 mb l3 cache using hypertransport 3.0 tdp 125 w. recent reports single core variants codenamed spica dual core without l3 cache codenamed kuma rana respectively available microarchitecture amd analyst day 2006 december 14 2006 amd announced official timeline server desktop mobile processors servers segment amd unveil two new processors based architecture codenamed barcelona budapest 8/4/2-way 1-way servers respectively second half 2007 hypertransport 3.0 socket am2+ unveiled designed specific implementation aforementioned consumer quad core desktop chip series naming convention changes city names middle 2007 stars constellations agena addition amd quad fx platform immediate successor support high end enthusiast dual-processor versions chip codenamed agena fx updates processors line amd quad fx platform server chips codenamed barcelona new desktop quad core series feature shared l3 cache 128-bit floating point fp units enhanced microarchitecture agena native quad-core processor desktop kuma dual-core variant follow q3 rana dual-core version shared l3 cache expected end year information upcoming chip codenamed montreal server roadmap using mcm technique two shanghai cores total 12 mb l3 cache codenamed amd k10.5 desktop variant shanghai codenamed ridgeback afterwards release products based bulldozer cores optimized integrated graphics core amd accelerated processing unit native octal-core 8 core server architecture codenamed sandtiger bobcat core optimized low-power operations computex 2007 early june new information regarding naming schemes upcoming amd microprocessors emerged additional letters indicating performance power envelope precede 4 digit model number model numbers new line processors apparently changed pr ratings used predecessors athlon 64 series processors except phenom fx series suggested follow nomenclature athlon 64 fx series reported dailytech model numbers alpha-numeric format aa- aa alphabetical letters first letter indicating processor class second indicating typical tdp power envelope character series indicator varies branding see table last three characters model number higher numbers indicating greater performance much information known details model numbers processors divided three segments premium intermediate value premium segment model numbers processor class g intermediate segment b value level l discovered web asrock website similarly three levels tdp 65w 65w less 65w indicated letters p e respectively november 2007 amd removed letters model names x2/x3/x4 monikers depicting number cores processor leaving four digit model number first character sole identification processor family sempron remained using le prefix follows november 30 2006 amd live demonstrated native quad core chip known barcelona first time public running windows server 2003 64-bit edition amd claims 70 scaling performance real world loads better performance intel xeon 5355 processor codenamed clovertown details regarding first revision next generation amd microprocessor architecture surfaced web including clock speeds january 24 2007 amd executive vice president randy allen claimed live tests regard wide variety workloads barcelona able demonstrate 40 performance advantage comparable intel xeon codenamed clovertown dual-processor 2p quad-core processors expected performance floating point per core would approximately 1.8 times k8 family clock speed may 10 2007 amd held private event demonstrating upcoming processors codenamed agena fx chipsets one demonstrated system amd quad fx platform one radeon hd 2900 xt graphics card upcoming rd790 chipset system also demonstrated real-time converting 720p video clip another undisclosed format 8 cores maxed 100 tasks also due similar time frame sister microarchitecture focus lower power consumption chips mobile platforms well small form factor features microarchitecture contain specialized features mobile optimized crossbar switch memory controller on-die components link power management hypertransport 3.0 others time amd simply dubbed new mobile core without giving specific codename december 2006 analyst day executive vice president marty seyer announced new mobile core codenamed griffin launched 2008 inherited power optimizations technologies k10 microarchitecture based k8 design late 2007 second quarter 2008 modification core fabricated 45 nm process node enhancements fb-dimm support direct connect architecture 2.0 enhanced reliability availability serviceability ras probably processor die platform also add support i/o virtualization pci express 2.0 10 gigabit nic larger caches however reports suggested fb-dimm support dropped future roadmaps majority amd products since popularity low also fb-dimm future industry standard called question article published inquirer corroborates earlier reports timeline cited article according report three iterations server processor core one named barcelona due q2 2007 new cpu core components well microarchitecture built old hypertransport 2.0 infrastructure second budapest single socket systems using socket am2+ socket am3 hypertransport 3.0 third codenamed shanghai update server chip based 45 nm process probably also hypertransport 3.0 ddr3 implementation due q1-q2 2008 amd september 17 2007 announced three core triple-core processor also released phenom brand lineup codenamed toliman amd official replied interview product benefitted ati technologies add fuses quad-core processor shutting one four cores become triple-core processor technique popular making one mainstream gpu cores single high-end gpu core blowing parts circuit save r costs targeting markets time ago triple-core processor still see specifications quad-core variants naming processor lineup according amd branding scheme named phenom triple-core 8000 series processor line focused amd called fourth market segment high-end mainstream segment beside value mainstream performance segments interview betanews targeted customers processors willing pay performance required much processing power required gamers system builders single core sempron variants low-end market dual-core athlon variants mid-range market quad-core phenom quad-core 9000 series phenom fx variants seen high-end market time frame 2008 amd introduce deneb fx replacement amd quad fx platform well deneb mainstream propos regor also replace kuma rana lower market segments socket am2+ named late 2006 might actually original am3 socket naming conventions changed next generation consumer desktop socket capable ddr3 socket am3 amd introduced microprocessors manufactured 65 nm feature width using silicon-on-insulator soi technology since release k10 coincides volume ramp manufacturing process servers produced socket f 1207 later 1207-pin socket infrastructure server socket amd near-term roadmap desktop parts come socket am2 socket am2+ amd announced technology analyst day use continuous transistor improvement cti shared transistor technology stt would finally lead implementation silicon-germanium-on-insulator sgoi 65 nm process cpus later processors manufactured using 45nm soi technology apu k10 processors manufactured using 32nm soi technology starting 45nm immersion lithography used k8 family known particularly sensitive memory latency since design gains performance minimizing use on-die memory controller integrated cpu increased latency external modules negates usefulness feature ddr2 ram introduces additional latency traditional ddr ram since dram internally driven clock one quarter external data frequency opposed one half ddr however since command clock rate ddr2 doubled relative ddr latency-reducing features e.g additive latency introduced common comparisons based cas latency alone sufficient example socket am2 processors known demonstrate similar performance using ddr2 sdram socket 939 processors utilize ddr-400 sdram k10 processors support ddr2 sdram rated ddr2-1066 1066 mhz desktop k10 processors am2+ supporting ddr2 am3 k10 processor supports ddr2 ddr3 am3 motherboards ddr2 ddr3 slots mean fit types time part ddr3 lynx desktop processors support ddr3 use fm1 socket also reported several sources anandtech inquirer geek.com microprocessors implementing microarchitecture feature doubling width sse execution units cores help major improvements memory subsystem load re-ordering improved prefetch mechanisms well doubled instruction fetch load expected increase suitability processor scientific high-performance computing tasks potentially improve competitiveness intel xeon core 2 itanium 2 contemporary microprocessors many improvements computational throughput core listed characteristics microarchitecture include following amd released limited edition deneb-based processor extreme overclockers partners fewer 100 manufactured 42 officially represents four cores running 2 ghz also reference answer life universe everything hitchhiker guide galaxy first generation desktop apus based k10 microarchitecture released 2011 models provide graphics capability lynx athlon ii sempron x2 models two generations k10-based processors servers opteron 65 nm 45 nm amd discontinued development k10 based cpus thuban choosing focus fusion products mainstream desktops laptops bulldozer based products performance market however within fusion product family apus first generation a4 a6 a8-series chips llano apus continued use k10-derived cpu cores conjunction radeon graphics core k10 derivatives phased production introduction trinity-based apus 2012 replaced k10 cores apu bulldozer-derived cores family 11h microarchitecture mixture k8 k10 designs lower power consumption laptop marketed turion x2 ultra later replaced completely k10-based designs family 12h microarchitecture derivative k10 design note media discussions listed ascending date publication | [
3586,
8322,
5380,
8452,
9092,
6151,
3464,
4872,
8327,
9475,
6924,
5645,
398,
6926,
10375,
7963,
2719,
6815,
9122,
5541,
9126,
8231,
2088,
6184,
11047,
2094,
11183,
6705,
8629,
823,
9400,
8125,
8126,
6978,
7234,
11331,
9157,
11080,
2764,
5... | Validation |
1,138 | 2 | Opkg:opkg opkg open package management lightweight package management system based upon ipkg written c resembles advanced packaging tool apt /dpkg operation intended use embedded linux devices used capacity openembedded openwrt projects opkg originally forked ipkg openmoko project recently development opkg moved old google code repository yocto project actively maintained opkg packages use codice_1 extension | [
4225,
11525,
2310,
10760,
2955,
7435,
7181,
7947,
9487,
2448,
788,
1813,
8213,
10900,
6680,
8476,
6301,
5670,
4775,
7847,
6828,
6446,
7983,
1842,
823,
2872,
6583,
3131,
5819,
10172,
190,
3649,
10817,
9671,
5067,
3918,
463,
3667,
6227,
430... | Test |
1,139 | 4 | IDN_homograph_attack:idn homograph attack internationalized domain name idn homograph attack way malicious party may deceive computer users remote system communicating exploiting fact many different characters look alike i.e. homographs hence term attack although technically homoglyph accurate term different characters look alike example regular user example.com may lured click link latin character replaced cyrillic character а kind spoofing attack also known script spoofing unicode incorporates numerous writing systems number reasons similar-looking characters greek ο latin cyrillic о assigned code incorrect malicious usage possibility security attacks registration homographic domain names akin typosquatting forms attacks use similar-looking name established domain fool user major difference typosquatting perpetrator attracts victims relying natural human typographical errors manually entering url homograph spoofing perpetrator deceives victims presenting visually indistinguishable hyperlinks indeed would rare accident web user type e.g. cyrillic letter within otherwise english word citibank cases registration typosquatting homograph spoofing pairs l/i i/j 0/o close together keyboards depending typeface may difficult impossible distinguish early nuisance kind pre-dating internet even text terminals confusion l lowercase letter l 1 number one capital letter vowel 0 number zero typewriters pre-computer era even combined ell one users type lowercase l number one needed zero/oh confusion gave rise tradition crossing zeros computer operator would type correctly unicode may contribute greatly combining characters accents several types hyphen-alikes etc. often due inadequate rendering support especially smaller fonts sizes wide variety fonts even earlier handwriting provided rich opportunities confusion notable example etymology word zenith translation arabic samt included scribe confusing ni common medieval blackletter connect vertical columns letters n u making difficult distinguish several row latter well rn rri rn rri confusion still possible human eye even modern advanced computer technology intentional look-alike character substitution different alphabets also known various contexts example faux cyrillic used amusement attention-grabber volapuk encoding cyrillic script represented similar latin characters used early days internet way overcome lack support cyrillic alphabet another example vehicle registration plates cyrillic domestic usage cyrillic script countries latin international driving letters registration plates issued greece limited using letters greek alphabet homoglyphs latin alphabet european union regulations require use latin letters ascii several characters pairs characters look alike known homographs homoglyphs spoofing attacks based similarities known homograph spoofing attacks example 0 number letter l lowercase l uppercase typical example hypothetical attack someone could register domain name appears almost identical existing domain goes somewhere else example domain rnicrosoft.com begins r n examples g00gle.com looks much like google.com fonts using mix uppercase lowercase characters googie.com capital small l looks much like google.com fonts paypal target phishing scam exploiting using domain paypai.com certain narrow-spaced fonts tahoma default address bar windows xp placing c front j l produce homoglyphs cl cj ci g multilingual computer systems different logical characters may identical appearances example unicode character u+0430 cyrillic small letter а look identical unicode character u+0061 latin small letter lowercase used english hence codice_1 cyrillic version instead codice_2 latin version problem arises different treatment characters user mind computer programming viewpoint user cyrillic а within latin string latin difference glyphs characters fonts however computer treats differently processing character string identifier thus user assumption one-to-one correspondence visual appearance name named entity breaks internationalized domain names provide backward-compatible way domain names use full unicode character set standard already widely supported however system expanded character repertoire dozen characters single alphabet many thousands characters many scripts greatly increased scope homograph attacks opens rich vein opportunities phishing varieties fraud attacker could register domain name looks like legitimate website letters replaced homographs another alphabet attacker could send e-mail messages purporting come original site directing people bogus site spoof site could record information passwords account details passing traffic real site victims may never notice difference suspicious criminal activity occurs accounts december 2001 evgeniy gabrilovich alex gontmakher technion israel published paper titled homograph attack described attack used unicode urls spoof website url prove feasibility kind attack researchers successfully registered variant domain name microsoft.com incorporated cyrillic characters problems kind anticipated idn introduced guidelines issued registries try avoid reduce problem example advised registries accept characters latin alphabet country unicode characters advice neglected major tlds february 7 2005 slashdot reported exploit disclosed 3ric johanson hacker conference shmoocon web browsers supporting idna appeared direct url nowiki http //www.pаypal.com/ /nowiki first character replaced cyrillic а site well known payment site paypal actually led spoofed web site different content popular browsers continued problems properly displaying international domain names april 2017 following alphabets characters used spoofing attacks please note obvious common given artistic license much risk spoofer take getting caught possibilities far numerous listed cyrillic far commonly used alphabet homoglyphs largely contains 11 lowercase glyphs identical nearly identical latin counterparts cyrillic letters а с е о р х у optical counterparts basic latin alphabet look close identical c e p x y. cyrillic з ч б resemble numerals 3 4 6 italic type generates homoglyphs дтпи дтпи дтпи standard type resembling dmnu fonts д used since italic form resembles lowercase g however mainstream fonts д instead resembles partial differential sign ∂ capital letters counted авсеніјкморѕтх substitute abcehijkmopstx addition capitals lowercase cyrillic homoglyphs cyrillic non-russian problematic letters і ј j ԛ q ѕ ԝ w ү ғ f ԍ g bear resemblance cyrillic ӓёїӧ also used idn spoofed fake äëïö komi de ԁ shha һ palochka ӏ izhitsa ѵ bear strong resemblance latin h l v letters either rare archaic widely supported standard fonts included wgl-4 attempting use could cause ransom note effect greek alphabet omicron ο sometimes nu ν appear identical latin alphabet letter lowercase used urls fonts italic type feature greek alpha α looking like latin list increases close matches also allowed greek εικηρτυωχγ eiknptuwxy using capital letters list expands greatly greek αβεηικμνορτχυζ looks identical latin abehikmnoptxyz greek αγβεηκμοπρτφχ looks similar cyrillic агвенкмопртфх cyrillic л л greek λ certain geometric sans-serif fonts greek letters κ о look similar cyrillic к о besides greek τ φ similar cyrillic т ф fonts greek δ resembles cyrillic б serbian alphabet cyrillic а also italicizes latin counterpart making possible substitute alpha vice versa lunate form sigma ϲϲ resembles latin cc cyrillic сс idn spoofed greek beta β substitute german esszet ß fonts fact code page 437 treats equivalent greek sigma ς ç accented greek substitutes όίά usually used óíá many fonts last alpha resembling italic type also armenian alphabet contribute critical characters several armenian characters like օ ո ս well capital տ լ often completely identical latin characters modern fonts symbols like ա resemble cyrillic ш. beside symbols look alike ցհոօզս look like ghnoqu յ resembles j albeit dotless ք either resemble p f depending font however use armenian problematic standard fonts feature armenian glyphs whereas greek cyrillic scripts standard fonts windows prior windows 7 rendered armenian distinct font sylfaen supports armenian mixing armenian latin would appear obviously different using font sylfaen unicode typeface known ransom note effect current version tahoma used windows 7 supports armenian previous versions furthermore font differentiates latin g armenian ց two letters armenian ձշ also resemble number 2 յ resembles 3 another վ sometimes resembles number 4 hebrew spoofing generally rare three letters alphabet reliably used samekh ס sometimes resembles vav diacritic וֹ resembles heth ח resembles letter n. less accurate approximants alphanumerics also found usually accurate enough use purposes foreign branding substitution furthermore hebrew alphabet written right left trying mix left-to-right glyphs may cause problems chinese language problematic homographs many characters exist traditional regular script simplified chinese characters .org domain registering one variant renders unavailable anyone .biz single chinese-language idn registration delivers variants active domains must domain name server registrant .hk .香港 also adopts policy unicode scripts homographs found include number forms roman numerals cjk compatibility enclosed cjk letters months certain abbreviations latin certain digraphs currency symbols mathematical alphanumeric symbols alphabetic presentation forms typographic ligatures two names differ accent one character may look similar instance wíkipedia.org wikipedia.org dot first replaced acute accent top-level domain registries wíkipedia.tld xn -- wkipedia-c2a.tld wikipedia.tld two different names may held different registrants one exception .ca reserving plain-ascii version domain prevents another registrant claiming accented version name unicode includes many characters displayed default zero-width space general icann prohibits domain characters registered regardless tld september 2017 security researcher ankit anubhav discovered idn homograph attack attackers registered adoḅe.com deliver betabot trojan simplest defense web browsers support idna similar mechanisms users turn whatever support browsers could mean blocking access idna sites generally browsers permit access display idns punycode either way amounts abandoning non-ascii domain names additional defense internet explorer 7 firefox 2.0 opera 9.10 include phishing filters attempt alert users visit malicious websites.. april 2017 several browsers including chrome firefox opera displaying idns consisting purely cyrillic characters normally punycode allowing spoofing attacks chrome tightened idn restrictions version 59 prevent attack methods defense extend within browser homographic urls house malicious software still distributed without displayed punycode e-mail social networking web sites without detected user actually clicks link fake link show punycode clicked point page already begun loading browser malicious software may already downloaded onto computer television station kboi-tv raised concerns unknown source registering name completely anonymous registered domain name homographic spread april fool day joke regarding governor idaho issuing supposed ban sale music justin bieber icann implemented policy prohibiting potential internationalized tld choosing letters could resemble existing latin tld thus used homograph attacks proposed idn tlds .бг bulgaria .укр ukraine .ελ greece rejected stalled perceived resemblance latin letters three serbian .срб mongolian .мон later accepted three-letter tld considered safer two-letter tld since harder match normal latin iso-3166 country domains although potential match new generic domains remains generic domains far expensive registering second- third-level domain address making cost-prohibitive try register homoglyphic tld sole purpose making fraudulent domains would draw icann scrutiny russian registry operator coordination center tld ru accepts cyrillic names top-level domain .рф forbidding mix latin greek characters however problem .com gtlds remains open | [
2945,
4163,
8584,
10103,
4956
] | Test |
1,140 | 4 | Spoiler_(security_vulnerability):spoiler security vulnerability spoiler security vulnerability modern computer central processing units use speculative execution exploits side-effects speculative execution improve efficiency rowhammer related memory cache attacks according reports modern intel core cpus vulnerable attack amd stated processors vulnerable spoiler issued common vulnerabilities exposures id | [
1024,
5636,
4389,
8815,
1776,
2709,
9435,
2558,
575
] | None |
1,141 | 3 | PC_Open_Architecture_Developers'_Group:pc open architecture developers group pc open architecture developers group oadg japanese consortium major japanese personal computer manufacturers sponsored ibm 1990s successfully guided japan personal computer manufacturing companies time standardising ibm pc-compatible open architecture advent ibm pc 1981 united states many different varieties designs personal computer examples era include tandy radioshack commodore machines based upon different computer architecture software programs ran compatible machine designed japan except msx situation continued well early 1990s three japan major electronics manufacturers nec sharp fujitsu also designed unique personal computers although nec nec 9801 time successful american computer manufacturer ibm entered japanese market ibm 5550 computer japanese-language-capable computers time however special requirements terms processor capability screen size ibm jx project emphasizing compatibility ibm pc enjoyed limited success whole situation felt many hindering healthy growth japanese computer industry particularly since domestic overseas software vendors develop test support many different software programs run many different kinds personal computers sold japan ibm developed operating software dos/v japan licensed japanese pc manufacturers promote ibm pc architecture dos/v worked ibm sponsored consortium named pc open architecture developers group oadg 1991 made public internal architecture interfaces height enterprise consortium included amongst members major japanese pc manufactures toshiba hitachi overseas manufacturers acer taiwan dell united states together strove develop unified architecture also produced number dos/v-compatible application software programs participated major computer shows time microsoft computer operating system windows 95 arrived 1995 ibm pc architecture using dos/v already predominant force japan 2003 membership included following companies | [
10273,
8355,
8900,
9006,
9137,
6419,
1400,
3323,
10749
] | None |
1,142 | 1 | Shard_(database_architecture):shard database architecture database shard horizontal partition data database search engine individual partition referred shard database shard shard held separate database server instance spread load data within database remains present shards appears single shard shard server acts single source subset data horizontal partitioning database design principle whereby rows database table held separately rather split columns normalization vertical partitioning differing extents partition forms part shard may turn located separate database server physical location numerous advantages horizontal partitioning approach since tables divided distributed multiple servers total number rows table database reduced reduces index size generally improves search performance database shard placed separate hardware multiple shards placed multiple machines enables distribution database large number machines greatly improving performance addition database shard based real-world segmentation data e.g. european customers v. american customers may possible infer appropriate shard membership easily automatically query relevant shard disadvantages include main section disadvantages practice sharding complex although done long time hand-coding especially rows obvious grouping per example often inflexible desire support sharding automatically terms adding code support identifying candidates sharded separately consistent hashing technique used sharding spread large loads across multiple smaller services servers distributed computing used separate load multiple servers either performance reliability reasons shard approach may also useful horizontal partitioning splits one tables row usually within single instance schema database server may offer advantage reducing index size thus search effort provided obvious robust implicit way identify partition particular row found without first needing search index e.g. classic example 'codice_1 'codice_2 tables zip code already indicates found sharding goes beyond partitions problematic table way across potentially multiple instances schema obvious advantage would search load large partitioned table split across multiple servers logical physical multiple indexes logical server splitting shards across multiple isolated instances requires simple horizontal partitioning hoped-for gains efficiency would lost querying database required instances queried retrieve simple dimension table beyond partitioning sharding thus splits large partitionable tables across servers smaller tables replicated complete units also sharding related shared nothing architecture—once sharded shard live totally separate logical schema instance physical database server data center continent ongoing need retain shared access shards unpartitioned tables shards makes replication across multiple servers easy simple horizontal partitioning also useful worldwide distribution applications communications links data centers would otherwise bottleneck also requirement notification replication mechanism schema instances unpartitioned tables remain closely synchronized application demands complex choice architecture sharded systems approaches range making effectively read-only updates rare batched dynamically replicated tables cost reducing distribution benefits sharding many options sharding database table optimized locally causes premature complexity sharding used options optimization inadequate introduced complexity database sharding causes following potential problems historical complications do-it-yourself sharding addressed independent software vendors provided automatic sharding database context recognize term shard likely derived either one two sources computer corporation america system highly available replicated data utilized redundant hardware facilitate data replication opposed horizontal partitioning critically acclaimed 1997 mmorpg video game ultima online 8 guinness world records designated time one 100 greatest video games produced time richard garriott creator ultima online recollects term coined production phase attempted create self-regulating virtual ecology system whereby players may leverage new internet access revolutionary technology time interact harvest in-game resources although virtual ecology functioned intended in-house testing natural balance failed almost instantaneously due players killing every living wildlife across playable area faster spawning system could operate garriott production team attempted mitigate issue separating global player base separate sessions rewriting part ultima online fictional connection end defeat antagonist mondain also led creation multiverse shards modification provided garriott team fictional basis needed justify creating copies virtual environment however game sharp rise critical acclaim also meant new multiverse virtual ecology system quickly overwhelmed well several months testing garriott team decided abandon feature altogether stripped game functionality today term shard refers deployment use redundant hardware across database systems | [
3328,
8195,
7175,
9225,
10250,
3990,
10518,
2456,
1049,
1178,
6809,
11552,
6433,
7841,
9893,
11178,
4530,
6458,
3004,
6850,
3909,
7499,
6860,
333,
11343,
337,
4817,
7767,
4696,
8408,
2011,
6124,
7022,
9075,
1142,
3323,
4861
] | None |
1,143 | 4 | Joanna_Rutkowska:joanna rutkowska joanna rutkowska polish computer security researcher primarily known research low-level security stealth malware founder qubes os security-focused desktop operating system became known security community black hat briefings conference las vegas august 2006 rutkowska presented attack vista kernel protection mechanism also technique dubbed blue pill used hardware virtualization move running os virtual machine subsequently named one five hackers put mark 2006 eweek magazine research topic original concept blue pill published another researcher ieee oakland may 2006 name vmbr following years rutkowska continued focus low-level security 2007 demonstrated certain types hardware-based memory acquisition e.g firewire based unreliable defeated later 2007 together team member alexander tereshkin presented research virtualization malware 2008 rutkowska team focused xen hypervisor security 2009 together team member rafal wojtczuk presented attack intel trusted execution technology intel system management mode april 2007 rutkowska founded invisible things lab warsaw poland company focuses os vmm security research provides various consulting services 2009 blog post coined term evil maid attack detailing method accessing encrypted data disk compromising firmware via external usb flash drive 2010 rafal wojtczuk began working qubes os security-oriented desktop xen distribution utilizes fedora linux initial release qubes 1.0 completed september 3 2012 available free download main concept security compartmentalization using domains implemented lightweight xen virtual machines isolate various subsystems compartment referred qube operates separate hardware level virtual machine project refers reasonably secure operating system received endorsements numerous privacy security experts fairly unique capabilities design informed research proven vulnerabilities trusted compute base tcb unaddressed common desktop operating systems published seminal works systems trustability recently intel x86 considered harmful state considered harmful proposal stateless laptop rutkowska invited esteemed presenter security conferences chaos communication congress black hat briefings hitb rsa conference risk eusecwest gartner security summit | [
2275,
3495,
4841,
6254,
7983,
7377,
6644,
823,
4956,
2558,
9791
] | None |
1,144 | 8 | Topsite_Templating_System:topsite templating system topsite templating system open source templating system written python programming language designed allow simple melding python code static content apart allowing static content combined python code single file topsite templating system possesses features topsite templating system sometimes informally referred 'topsite possible confusion occur topsite templating system regards common uses term 'topsite warez community site ranking system topsite www known top site list author topsite templating system asserts collision terms purely coincidental avoid confusion suggests topsite templating system cited full form acronym tts term 'topsite | [
8554,
2804
] | None |
1,145 | 9 | Pascal_Script:pascal script pascal script scripting language based programming language pascal facilitates automated runtime control scriptable applications server software implemented free scripting engine includes compiler interpreter byte code pascal script supports majority object pascal constructs making partly compatible delphi free pascal gnu pascal initially developed carlo kok cajscript renamed innerfuse pascal script version 2.23 software taken remobjects renamed remobjects pascal script offered open source software delphi ide beginning version 2.07 cajscript ported free pascal since 2017 pascal script included standard component lazarus ide pascal script used installer scripts inno setup open source setup engine using pascal script may provide additional flexibility installation uninstallation e. g. adding new wizard pages calling dlls providing custom behaviour install conditions pascal script also used server-side scripting pascal server pages maxbox scripter studio inbuild delphi engine renamer batch-oriented automated file renaming tool windows expanded macros written pascal script release version 1.2 lazarus ide began include pascal script engine available form several components additionally lazarus standard packages including synedit tachart support pascal script ide may extended using macros written pascal script increasingly reported applications pascal script science technology include scada robotics education pascal script started 2000 cajscript 1.0 soon superseded cajscript 2.0 later called innerfuse pascal script 2.0 version 2.0 interpreted scripts ran disadvantage every piece code reparsed every time script engine went pascal script 3.0 changed new model compiler runtime completely separated used custom byte code format represent compiled script compiled script contained bare minimum required execute code later carlo kok joined remobjects renamed remobjects pascal script maintained remobjects software fork pascal script maintained sources lazarus ide lazarus free pascal teams ported pascalscript intel processors additional architectures including powerpc arm | [
512,
9345,
10506,
6797,
6414,
8082,
11411,
6558,
5663,
1952,
428,
7983,
9008,
9780,
823,
7479,
8510,
8524,
9714,
499,
4341,
8700
] | Test |
1,146 | 1 | Object-relational_database:object-relational database object-relational database ord object-relational database management system ordbms database management system dbms similar relational database object-oriented database model objects classes inheritance directly supported database schemas query language addition pure relational systems supports extension data model custom data types methods object-relational database said provide middle ground relational databases object-oriented databases object-relational databases approach essentially relational databases data resides database manipulated collectively queries query language extreme oodbmses database essentially persistent object store software written object-oriented programming language programming api storing retrieving objects little specific support querying basic need object-relational database arises fact relational object database individual advantages drawbacks isomorphism relational database system mathematical relation allows exploit many useful techniques theorems set theory types databases useful matter comes data complexity mismatch application dbms object oriented database model allows containers like sets lists arbitrary user-defined datatypes well nested objects brings commonality application type systems database type systems removes issue impedance mismatch object databases unlike relational provide mathematical base deep analysis basic goal object-relational database bridge gap relational databases object-oriented modeling techniques used programming languages java c++ visual basic .net c however popular alternative achieving bridge use standard relational database systems form object-relational mapping orm software whereas traditional rdbms sql-dbms products focused efficient management data drawn limited set data-types defined relevant language standards object-relational dbms allows software developers integrate types methods apply dbms ordbms like odbms oodbms integrated object-oriented programming language characteristic properties ordbms 1 complex data 2 type inheritance 3 object behavior complex data creation sql ordbmss based preliminary schema definition via user-defined type udt hierarchy within structured complex data offers additional property type inheritance structured type subtypes reuse attributes contain additional attributes specific subtype another advantage object behavior related access program objects program objects must storable transportable database processing therefore usually named persistent objects inside database relations persistent program object relations object identifier oid points addressed proper relational system although sql standard implementations impose arbitrary restrictions additional complexity object-oriented programming oop object behavior described methods object functions methods denoted one name distinguished type parameters type objects attached method signature oop languages call polymorphism principle briefly defined one interface many implementations oop principles inheritance encapsulation related methods attributes method inheritance included type inheritance encapsulation oop visibility degree declared example codice_1 codice_2 codice_3 access modifiers object-relational database management systems grew research occurred early 1990s research extended existing relational database concepts adding object concepts researchers aimed retain declarative query-language based predicate calculus central component architecture probably notable research project postgres uc berkeley spawned two products tracing lineage research illustra postgresql mid-1990s early commercial products appeared included illustra illustra information systems acquired turn acquired ibm omniscience omniscience corporation acquired oracle corporation became original oracle lite unisql unisql inc. acquired kcoms ukrainian developer ruslan zasukhin founder paradigma software inc. developed shipped first version valentina database mid-1990s c++ sdk next decade postgresql become commercially viable database basis several current products maintain ordbms features computer scientists came refer products object-relational database management systems ordbmss many ideas early object-relational database efforts largely become incorporated sql:1999 via structured types fact product adheres object-oriented aspects sql:1999 could described object-relational database management product example ibm db2 oracle database microsoft sql server make claims support technology varying degrees success rdbms might commonly involve sql statements sql databases allow crafting custom functions would allow query appear object-relational database one might see something like user-defined data-types expressions codice_4 object-relational model offer another advantage database make use relationships data easily collect related records address book application additional table would added ones hold zero addresses customer using traditional rdbms collecting information user address requires join query object-relational database appears simply | [
5632,
8201,
2068,
4630,
1049,
5658,
9248,
10793,
5677,
10286,
4155,
11324,
11327,
9286,
2632,
9290,
8788,
10326,
7767,
8291,
9828,
10340,
3176,
8808,
2669,
3196,
2688,
10389,
4255,
1697,
6822,
4263,
10413,
9397,
7868,
11457,
6850,
2246,
278... | Validation |
1,147 | 2 | Incompatible_Timesharing_System:incompatible timesharing system incompatible timesharing system time-sharing operating system developed principally mit artificial intelligence laboratory help project mac name jocular complement mit compatible time-sharing system ctss software developed technically influential far beyond core user community remote guest tourist access easily available via early arpanet allowing many interested parties informally try features operating system application programs software environment major influence hacker culture described steven levy book development initiated late 1960s majority mit ai lab staff time disagreed direction taken project mac multics project started mid-1960s particularly decisions inclusion powerful system security name chosen tom knight joke name earliest mit time-sharing operating system compatible time-sharing system dated early 1960s simplifying system compared multics authors able quickly produce functional operating system lab written assembly language originally digital equipment corporation pdp-6 computer majority development use later pdp-10 although used intensively 1986 continued operate mit 1990 1995 stacken computer club sweden introduced many then-new features environment seen users philosophically significantly different provided operating systems time wide-open philosophy collaborative community direct forerunner free open-source software open-design wiki movements emacs editor macros editor originally written instantiation collection teco programs called macros later operating systems written common language systems example c language unix zetalisp lisp machine system gnu ‘ info help system originally emacs subsystem later written complete standalone system unix-like machines several important programming languages systems developed including maclisp precursor zetalisp common lisp microplanner implemented maclisp mdl became basis infocom programming environment scheme among significant influential software subsystems developed macsyma symbolic algebra system probably important terry winograd shrdlu program developed computer game zork also originally written richard greenblatt mac hack vi top-rated chess program years first display graphical board representation default top-level command interpreter pdp-10 machine language debugger ddt usual text editor teco later emacs written teco ddt teco implemented simple dispatch tables single-letter commands thus true syntax task manager called peek local spelling turist artifact six-character filename identifier limitations traceable six sixbit encoded characters fitting single 36-bit pdp-10 word turist may also pun alan turing pioneer theoretical computer science less-complimentary term luser also applied guest users especially repeatedly engaged clueless vandalous behavior jargon file started combined effort people machines mit stanford university sail document described much terminology puns culture two ai labs related research groups direct predecessor hacker dictionary | [
2560,
6155,
2062,
6675,
7187,
7188,
10776,
25,
4637,
9762,
4643,
6180,
5158,
7217,
10803,
9784,
10809,
576,
577,
2625,
8262,
1613,
6221,
80,
3160,
10333,
97,
11363,
6760,
10856,
8298,
9835,
6772,
7285,
4727,
2168,
9335,
634,
3197,
1150,
... | Test |
1,148 | 2 | Xbox_360_system_software:xbox 360 system software xbox 360 system software xbox 360 dashboard updateable software operating system xbox 360 formerly resided 16 mb file system however starting nxe update storage became requirement rectified either hard drive installed one later revisions console adequate flash storage embedded within console system software access maximum 32 mb system memory otherwise known random access memory updates downloaded xbox live service directly xbox 360 subsequently installed microsoft also provided ability download system software updates respective official xbox website pcs storage media update installed system xbox 360 game system allows users download applications add functionality dashboard apps required user signed valid xbox live gold account order use features advertised given app 2.0.16756.0 update apps require xbox live gold subscription access although app may subscription able use exception early apps microsoft added partners develop apps xbox 360 system since new xbox experience nxe dashboard update 2008 following success xbox one preview program launched 2014 march 2015 microsoft announced xbox 360 preview program public microsoft released xbox 360 console november 22 2005 whole year earlier sony playstation 3 nintendo wii advantage lead microsoft able experiment various customization options consumer ’ individual consoles ability customize way console looked various themes fit front sides something different home console users system xbox 360 dashboard ability multiple profiles password console user able customize dashboard exactly fit unique style premium themes available purchase xbox live marketplace apart default styles originally five tabs sections known blades xbox 360 menu namely marketplace xbox live games media system scrolling left right section would different-colored background signifying unique area users also option change sections one background color well 2008 however gaming scene changed dramatically competitions playstation 3 wii new xbox dashboard titled new xbox experience nxe launched features major changes user interface functionalities new user interface navigation system similar windows media center contained new pop-up/in-game live guide using redesigned version blades interface tabbed interface featured five blades also users able create personalized avatars essentially mini characters furthermore selecting avatar required xbox live service two years later microsoft launched new dashboard set release microsoft kinect adding fresh new user interface touch silver late 2011 system update came complete new user interface metro-style design inspired windows phone many enhancements included update pushed system modernized interface improved features pushed envelope social gaming media xbox 360 console primarily designed play games like video game consoles used media player similar playstation 3 sony xbox 360 media center capabilities built relatively easy set xbox 360 users also copy videos directly hard drive play via usb stick two ways watch videos xbox 360 first download videos xbox live marketplace videos available free others paid microsoft control videos available xbox live marketplace second stream videos windows media center pc using xbox 360 media center extender way users control videos want watch however restrictions kind video playback specifically supports playback dvr-ms mpeg-1 mpeg-2 wmv videos every xbox 360 play dvd movies box using built-in dvd drive additional parts necessary although user may control everything optional remote improvements experience xbox 360 original xbox including ability upscale image look better progressive scan another feature dvd output xbox 360 produces smoother output playing movies televisions support high definition although using dedicated dvd player would offer even features sound quality xbox 360 system software includes built software emulation support original xbox game system software emulation achieved downloadable emulation profiles require hard drive original xbox games supported last reported update compatibility list 2007 support since discontinued adding new titles 400 titles list covers big name titles requirement backwards compatibility users hard drive xbox 360 specifically official microsoft-brand xbox 360 hard drive contrast xbox 360 successor xbox one console backward compatible launch applying november 2015 new xbox one experience system update also supports select group xbox 360 games using software emulator similar xbox 360 backward compatibility feature however also notable differences ways emulations—unlike xbox 360 emulation original xbox xbox one emulation xbox 360 games specifically patched instead need repackaged xbox one format starting nxe dashboard november 2008 larry hryb known xbox live major nelson team members hosted new segment using microsoft connect allow members xbox live community get chance preview next dashboard small bug fixes minor improvements included preview program limited major releases nxe kinect metro released november years 2009 preview program returned august rather november summer update preview program incentive enrollment started either march/april august/september depending major dashboard release planned applicants notified later 2 weeks enrollment date new preview program dashboard launching consoles early 24 hours acceptance preview program invitation users invited friends using invite friends page xbox preview dashboard app friends already program xbox preview dashboard app place preview participants give feedback program get latest news change console enrollment settings report problems users decide n't want get preview updates anymore opt xbox preview dashboard app details preview program located xbox official website first version xbox 360 system software 2.0.1888.0 released november 22 2005 shipped original xbox 360 consoles although version numbered 2.0 available product launch course next years saw continuous updates system software early updates version 2.0.4532.0 released october 31 2006 added supports 1080p video output external hd dvd drive attachment version 2.0.7357.0 released november 19 2008 first major upgrade system software titled new xbox experience added many new features including completely redesigned gui included changes menu system featuring 3d style vibe options sections new sound effects menus notification sounds remain support 1440×900 1680×1050 16:10 resolutions letterboxed vga hdmi using dvi well abilities preview themes setting disable notifications new messages chat requests etc mute notification sound change qwerty keyboard place alphabetical keyboard subsequent system software updates major upgrade continued add although usually numerically smaller new features make changes including bugfixes example new features introduced version 2.0.8498.0 released august 11 2009 addition display discovery allow console override factory settings hdtv resolutions refresh rates well discovering best possible resolution refresh rates hdtv capable displaying selected hdtvs version 2.0.12611.0 released november 1 2010 also added features ability install game updates hdd select games visual refresh incorporate elements microsoft metro design style also featured new boot screen animation redesigned xbox 360 orb ribbons new anti-piracy 2.5 scheme newly released games also added version later updated anti-piracy 2.6 version 2.0.13599.0 released july 19 2011 version 2.0.14699.0 released december 6 2011 introduced redesigned interface fresh new take platform half decade changes enhancements releases version 2.0.16197.0 released october 16 2012 typically minor usually bugfixes mandatory update prepared subsequent growth service system software still constantly updated gaming platforms next generation gaming platforms generation | [
8576,
2179,
6787,
10761,
4364,
6797,
8976,
3857,
3477,
3610,
5406,
10273,
8098,
9762,
1067,
684,
4908,
7983,
321,
8262,
9033,
2380,
6476,
9166,
4305,
4051,
9812,
342,
6486,
9434,
607,
5600,
740,
8423,
9448,
8937,
9194,
8316,
8829,
2943
] | Test |
1,149 | 3 | SGI_IndyCam:sgi indycam indycam small fixed-focus camera intended sit top monitor sgi systems sgi originally distributed indy workstation also connect indigo2 video option designed video conferencing thus optimized office landscape bright fluorescent lighting indycam superseded moosecam 02cam indycam continued used among small group sgi hobbyists | [
7234,
6243,
5380,
10051,
5898,
6858,
5356,
9932,
7311,
5523,
5076,
3764,
1398,
11447,
5272,
7001,
221
] | Test |
1,150 | 2 | Live_CD:live cd live cd also live dvd live disc live operating system complete bootable computer installation including operating system runs directly cd-rom similar storage device computer memory rather loading hard disk drive live cd allows users run operating system purpose without installing making changes computer configuration live cds run computer without secondary storage hard disk drive corrupted hard disk drive file system allowing data recovery cd dvd drives steadily phased-out live cds become less popular replaced live usbs equivalent systems written onto usb flash drives added benefit write-able storage functionality live cd also available bootable live usb flash drive external hard disk drive connected usb many live cds offer option persistence writing files hard drive usb flash drive many linux distributions make iso images available burning cd dvd open source operating systems used free commercial software windows go requires license use many live cds used data recovery computer forensics disk imaging system recovery malware removal tails operating system aimed preserving privacy anonymity users allowing work sensitive documents without leaving record computer hard drive computers except earliest digital computers built form minimal built-in loader loads program succession programs storage medium operate computer initially read-only medium punched tape punched cards used initial program load introduction inexpensive read-write storage read-write floppy disks hard disks used boot media introduction audio compact disc adapted use medium storing distributing large amounts computer data data may also include application operating-system software sometimes packaged archived compressed formats later seen convenient useful boot computer directly compact disc often minimal working system install full system onto hard drive read-write optical discs either mass-produced read-only discs write-once discs used purpose first compact disc drives personal computers generally much slow run complex operating systems computers designed boot optical disc operating systems came distributed compact discs either boot floppy cd would boot specifically install onto hard drive world first oldest non-linux live cd fm towns os first released 1989 release macintosh system 7 1991 yggdrasil linux 1992 although early developers users distributions built top linux kernel could take advantage cheap optical disks rapidly declining prices cd drives personal computers linux distribution cds distros generally treated collection installation packages must first permanently installed hard disks target machine however case distributions built top linux kernel free operating system meeting resistance consumer market perceived difficulty effort risk involved installing additional partition hard disk parallel existing operating system installation term live cd coined typical pc ram large enough 52x speed cd drives cd burners widespread among pc owners finally became convenient practical boot kernel run x11 window manager gui applications directly cd without disturbing os hard disk new different situation linux operating systems updates/upgrades released quickly different distributions versions offered online especially users burning cds first linux-based 'live cd yggdrasil linux first released beta form 1992~1993 ceased production 1995 though practice functionality hampered due low throughput contemporary cd-rom drives demolinux released 1998 first linux distribution specially designed live cd linuxcare bootable business card first released 1999 first live cd focus system administration first distributed bootable business card form factor finnix first released 2000 oldest live cd still production knoppix debian-derived linux distribution released 2003 found popularity rescue disk system primary distribution right since 2003 popularity live cds increased substantially partly due linux live scripts remastersys made easy build customized live systems popular linux distributions include live cd variant cases also preferred installation medium live cds made many different uses designed demonstrate test drive particular operating system usually linux another free open source operating system software tested run particular single use without interfering system setup data system functioning normally due operating system software issues made available example data recovered machine active virus infection without virus process active causing damage virus removed defences removal bypassed although live cds load memory free optical drive uses loading data cd-rom still slower typical hard drive boot rarely default large live cd images smaller live cd images loading filesystem directly ram provide significant performance boost ram much faster hard drive uses less power experienced users operating system may also use live cd determine whether extent particular operating system version compatible particular hardware configuration certain peripherals way know beforehand computer peripheral work buying live cd used troubleshoot hardware especially hard drive fails generally recovery disc case problems live cds save user-created files windows partition usb drive network drive accessible media live backup cds create image drives back files without problems due open files inconsistent sets additional uses include several live cds dedicated specific type applications according requirements thematic user communities cds tailored needs applications subject including general knowledge tutorial specifications trial data topics covers sub topics e.g administration breaks firewall rescue security etc type live cds cases particular live dvd covers one topic packaging software appliance installable live cd live iso often beneficial single image run real hardware types virtual machines allows developers avoid complexities involved supporting multiple incompatible virtual machine images formats focus lowest common denominator instead typically booting machine live cd appliance either runs non-persistent demo mode installs user request available storage device files live cd iso image accessed microsoft windows disk image emulator daemon tools unix variants mounting loop device later versions windows i.e windows 8 later software available earlier versions allow iso mounted volume mounting live cd filesystem software live cd run directly without booting chrooting mounted filesystem live cd iso image also mounted virtual machine software virtualbox vmware workstation converted live usb using syslinux special tools automate process live cd initialization user typically may resort using one boot codes change booting behavior vary distribution distribution often accessed upon first boot screen one function keys live cds come installation utility launchable desktop icon optionally install system hard drive usb flash drive live cds access information internal and/or external hard drives diskettes usb flash drives live cds usually distributed read-only media requiring either copying rewriteable media i.e hard drive cd writer complete remastering install additional software however exceptions puppy linux recorded open multisession medium changes made use files created programs installed preferences customised written new session boot medium persisting subsequent boots term live cd came used cd containing operating system software could run without installation host computer operating systems used live include amigaos 4 amithlon aros freebsd freedos classic mac os macos microsoft windows installation repair discs os/2 reactos netbsd openbsd minix 3 plan 9 bell labs morphos opensolaris belenix others based solaris maintenance versions microsoft windows bootable cd bartpe windows pe microsoft diagnostics recovery toolset dart previously known emergency repair disk commander erd commander first personal computer operating system cd support live operations might amigaos could booted cd amiga cdtv 1990.. earlier examples live os course operating systems used floppy widely spread dos unlike previous operating systems optical media though linux os/2 live cds specifically designed run without installation onto media like hard disk drive live cd concept meant promote linux showcase abilities free open source operating system conventional personal computers microsoft windows already installed pc bootable compact disc generally conforms el torito specification introduced 1994 many linux based live cds use compressed filesystem image often cloop compressed loopback driver squashfs compressed filesystem generally doubling effective storage capacity although slowing application start resulting environment quite rich typical knoppix systems include around 1,200 separate software packages live cds reputation supporting advanced auto-configuration plug-and-play functionality came necessity avoid requiring user configure system time boots make easily usable new operating system read-only file system cd-rom drawback unable save current working data reason read-only file system often merged temporary writable file system form ram disk often default linux directories codice_1 containing users personal files configuration files codice_2 containing variable data kept ramdisk system updates frequently puppy linux live cds allow configuration added files written used later sessions modern live cds read-only file system merged ram drive using transparent techniques unionfs aufs ewf boot loaders like syslinux boot iso files usb memory devices live cds able detect use wide variety hardware including network cards graphic cards etc realtime often using facilities udev hotplug hal udisk etc.. common part distributions based linux kernel 2.6 | [
2560,
3073,
5120,
6150,
3079,
6155,
9740,
2064,
4113,
8209,
6675,
7187,
8725,
8214,
10776,
25,
4637,
11297,
9762,
4643,
6180,
5158,
551,
7217,
10803,
9784,
10809,
4154,
7739,
8254,
9791,
576,
2625,
8772,
5190,
3147,
6221,
9806,
9807,
3160... | Test |
1,151 | 6 | FreeFileSync:freefilesync freefilesync free open-source program used file synchronization available windows linux os x project backed donations donors get additional features auto-updater parallel sync portable version silent installation freefilesync works comparing one multiple folders content date file size subsequently synchronizing content according user-defined settings addition supporting local file systems network shares freefilesync able sync ftp ftps sftp mtp devices earlier versions packaged opencandy adware module many antivirus software vendors classify malware since release version 10.0 april 2018 software ad-free 13 november 2018 norton considers freefilesync installer malware blocks installation latest release compatible mac os x 10.7.5 freefilesync_8.4_mac_os_x https //freefilesync.org/archive.php cnet.com staff praised software quoting best software far business | [
5380,
2213,
5356,
6797,
7983,
823,
7515
] | Test |
1,152 | 9 | Global_variable:global variable computer programming global variable variable global scope meaning visible hence accessible throughout program unless shadowed set global variables known global environment global state compiled languages global variables generally static variables whose extent lifetime entire runtime program though interpreted languages including command-line interpreters global variables generally dynamically allocated declared since known ahead time languages variables global global default modern languages variables limited scope generally lexical scope though global variables often available declaring variable top level program languages however global variables exist generally modular programming languages enforce module structure class-based object-oriented programming languages enforce class structure interaction mechanisms global variables called global environment see also global state mechanisms global environment paradigm contrasted local environment paradigm variables local shared memory therefore interactions reconducted message passing global variables used extensively pass information sections code share caller/callee relation like concurrent threads signal handlers languages including c file defines implicit namespace eliminate problems seen languages global namespace though problems may persist without proper encapsulation without proper locking mutex code using global variables thread-safe except read values protected memory environment variables facility provided operating systems within os shell ksh unix bash linux command.com dos cmd.exe windows kind variable instance unix related systems ordinary variable becomes environment variable codice_1 keyword used program code shells access api calls codice_2 codice_3 local process set means open two terminal windows two different processes running shell change value environment variable one window change seen window child process created inherits environment variables values parent process usually program calls another program first creates child process forking child adjusts environment needed lastly child replaces program called child processes therefore use environment variables communicate peers avoiding action distance problem number non-structured languages early versions basic cobol fortran 1956 provide global variables fortran ii 1958 introduced subroutines local variables common keyword accessing global variables usage common fortan continued fortan 77 influenced later languages pl/sql named common groups globals behave somewhat like structured namespaces variables also global default forth lua perl shells c language codice_4 keyword however variables declared outside function file scope meaning visible within file variables declared file scope visible declaration end compilation unit codice_5 file unless shadowed like-named object nearer scope local variable implicitly external linkage thus visible codice_5 file compilation unit containing declarations also every compilation unit linked form complete program external linkage however sufficient variable use files compilation unit correctly access global variable need know type accomplished declaring variable file using codice_7 keyword declared file may defined one codice_7 declarations often placed shared header file since common practice .c files project include least one codice_9 file standard header file codice_10 example making codice_11 variable accessible modules project global access mechanism judged problematic disabled using codice_12 keyword restricts variable file scope cause attempts import codice_7 raise compilation linking error example global variable c variable external one need pass parameter use function besides main belongs every function module output languages like java n't global variables java variables local variables fields class hence variables scope either class method java static fields also known class variables exist independently instances class one copy shared among instances hence public static fields used many purposes global variables languages similar sharing behavior php codice_4 keyword number unusual ways using global variables variables declared outside functions file scope purposes widest scope however accessible inside functions unless imported codice_4 keyword i.e. keyword accesses global variables declare however predefined variables known superglobals always accessible arrays general purpose one codice_16 superglobal contains variables defined function scope changes elements change original variables additions create new variables superglobals codice_17 codice_18 widely used web programming | [
2048,
2817,
386,
8582,
2062,
655,
3856,
10510,
3990,
5783,
9497,
7325,
7326,
9245,
10148,
5029,
7847,
4777,
11571,
2102,
823,
6335,
2627,
5059,
8644,
5065,
6349,
335,
9561,
10075,
8289,
9700,
7398,
7933,
8554,
9454,
4592,
3313,
5492,
3960... | Test |
1,153 | 3 | Cloud_Master:cloud master chuka taisen horizontal scrolling shooter released arcade taito 1988 version sega master system later released cloud master pc engine version game titled famicom version titled chuuka taisen available us nintendo player controls mike chen floating cloud maneuvering around screen shooting balls energy flying enemies powerups collected stronger faster firepower parts game stage doors give player opportunity buy special bomb types collectible credits stage mini-boss big boss throughout stages player restarts certain checkpoints losing life 2008 starfish sd company founded former hot-b employees bought rights taito developed remake released nintendo wii title monkey king journey begins dubbed shin chuuka taisen michael meimei bouken japan | [
10931
] | None |
1,154 | 5 | Go-Back-N_ARQ:go-back-n arq go-back-n arq specific instance automatic repeat request arq protocol sending process continues send number frames specified window size even without receiving acknowledgement ack packet receiver special case general sliding window protocol transmit window size n receive window size 1 transmit n frames peer requiring ack receiver process keeps track sequence number next frame expects receive sends number every ack sends receiver discard frame exact sequence number expects either duplicate frame already acknowledged out-of-order frame expects receive later resend ack last correct in-order frame sender sent frames window detect frames since first lost frame outstanding go back sequence number last ack received receiver process fill window starting frame continue process go-back-n arq efficient use connection stop-and-wait arq since unlike waiting acknowledgement packet connection still utilized packets sent words time would otherwise spent waiting packets sent however method also results sending frames multiple times – frame lost damaged ack acknowledging lost damaged frame following frames window even received without error re-sent avoid selective repeat arq used examples assume infinite number sequence request numbers things keep mind choosing value n | [
2752,
5071,
2640,
4918,
2203
] | Test |
1,155 | 4 | Proof_of_secure_erasure:proof secure erasure computer security proof secure erasure pose proof erasure remote attestation protocol embedded device proves verifying party erased overwritten writable memory purpose make sure malware remains device typically new software installed device verifying party may called verifier device erased prover verifier must know device writable memory size trusted source device must allowed communicate parties execution protocol proceeds follows verifier constructs computational problem solved reasonable time using less specified amount memory sends device device responds solution verifier checks correctness simplest implementation verifier sends random message large device memory device expected store device received complete message required send back security approach obvious includes transfer huge amount data twice size device memory halved device responds hash message prevent device computing fly without actually storing message hash function parametrized random value sent device message avoiding huge data transfer requires suitable stated overview computational problem whose description short dziembowski et al achieve constructing call − δ ε -uncomputable hash function computed quadratic time using memory size memory size − δ computed negligible probability ε. karvelas kiayias claim designed first pose quasilinear time sublinear communication complexity proof space protocol similar proof secure erasure require prover dedicate specific amount memory convince verifier nevertheless important differences design considerations purpose proof space similar proof work verifier time complexity must small property may useful proof secure erasure well fundamental usefulness proof secure erasure hand requires prover unable convince verifier using less specified amount memory even may useful protocol however proof space harmed prover may succeed even significantly less space | [
7515,
2558
] | Test |
1,156 | 1 | U1DB:u1db u1db cross-platform cross-device syncable database application programming interface api allows applications store json documents synchronize machines devices u1db schemaless document-oriented database api need contain pre-defined list fields implemented language platform using data store backend u1db created canonical scaling issues couchdb previously used ubuntu one service problems implementing service millions users time providing good performance large server farms well tablets smart phones defining interface api allowed implement data synchronization service using different languages data stores platform | [
9828,
3462,
10470,
5546,
8554,
5677,
5560,
1435,
2045
] | Test |
1,157 | 4 | Certificate_Transparency:certificate transparency certificate transparency ct internet security standard open source framework monitoring auditing digital certificates standard creates system public logs seek eventually record certificates issued publicly trusted certificate authorities allowing efficient identification mistakenly maliciously issued certificates 2011 reseller certificate authority comodo attacked certificate authority diginotar compromised calling attention existing flaws certificate authority ecosystem accelerating work various mechanisms prevent monitor unauthorized certificate issuance ben laurie adam langley emilia kasper began work open source framework combat issues year submitted first draft standard ietf internet draft 2012 code-name sunlight one problems digital certificate management fraudulent certificates take long time spotted reported revoked browser vendors certificate transparency would help making impossible certificate issued domain without domain owner knowing certificate transparency require side channel communication validate certificates competing technologies online certificate status protocol ocsp convergence certificate transparency also operates without need trust third party certificate transparency depends verifiable certificate transparency logs log appends new certificates ever-growing merkle hash tree seen behaving correctly log must log may accept certificates yet fully valid certificates expired monitors act clients log servers monitors check logs make sure behaving correctly inconsistency used prove log behaved correctly signatures log data structure merkle tree prevent log denying misbehavior auditors also act clients log servers certificate transparency auditors use partial information log verify log partial information google launched first certificate transparency log march 2013 september 2013 digicert became first certificate authority implement certificate transparency google chrome began requiring certificate transparency newly issued extended validation certificates 2015 began requiring certificate transparency certificates newly issued symantec june 1 2016 found issued 187 certificates without domain owners knowledge cloudflare announced ct named nimbus march 23 2018 | [
513,
517,
1288,
9744,
1683,
1688,
1946,
9117,
3742,
2083,
8358,
8615,
11693,
11569,
9394,
7736,
9281,
9412,
3657,
5834,
10831,
11345,
2003,
5590,
474,
3805,
7264,
9569,
8674,
7139,
3941,
10341,
5107,
501,
1526,
2169,
3707,
8956,
510,
4863... | Test |
1,158 | 3 | Motorola_68451:motorola 68451 mc68451 motorola freescale memory management unit mmu primarily used conjunction motorola mc68010 microprocessor mc68451 supported 16mb address space provided mc68000 mc68010 support memory management protection memory unauthorized access block size variable usually used segment-based memory management supported mapping 96 memory segments pages variable size logical physical addresses allow segments pages simultaneous use 3 mc68451 mmus officially supported combination mc68010 mc68451 permitted realization virtual memory earlier mc68000 possible due design error way mc68000 treated memory access errors i.e processor state could always properly restored page fault limitation 96 segment table entries made systems based mc68010 mc68451 slow often modify segment table due small size companies e.g h. berthold ag therefore used 12 mc68451 mmus together others e.g sun microsystems used proprietary mmus instead mc68451 small massachusetts workstation company apollo computer used two 68000 processors running concurrently one running single instruction behind processor fault occurred cpus could switch places second cpu could take processing virtual memory page swapped | [
7299,
3844,
4868,
7302,
10501,
7305,
3467,
1548,
6415,
1809,
11539,
2073,
7065,
7709,
8102,
5297,
11314,
11447,
8761,
6715,
1983,
9665,
10945,
3017,
4046,
336,
8530,
3540,
3932,
3936,
7269,
9964,
8048,
3185,
10224,
5235,
7286,
3319,
8058,
... | None |
1,159 | 9 | BBN_LISP:bbn lisp bbn lisp also stylized bbn-lisp dialect lisp programming language bolt beranek newman inc. cambridge massachusetts based l. peter deutsch implementation lisp pdp-1 called basic pdp-1 lisp developed 1960 1964 time language expanded became separate dialect 1966 bbn lisp notable predecessor interlisp | [
4992,
10752,
11269,
3334,
6919,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
6556,
3869,
10012,
2335,
6047,
8226,
4516,
5031,
9128,
5803,
2225,
10547,
11255,
311,
6840,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4550,
8262,
7880,
8908,
... | Test |
1,160 | 5 | Wireless_Transport_Layer_Security:wireless transport layer security wireless transport layer security wtls security protocol part wireless application protocol wap stack sits wtp wdp layers wap communications stack wtls derived tls wtls uses similar semantics adapted low bandwidth mobile device main changes wtls superseded wap wireless application protocol 2.0 standard end-to-end transport layer security specification wtls uses modern cryptographic algorithms common tls allows negotiation cryptographic suites client server incomplete list mentioned client server negotiate cryptographic suite happens session started briefly client sends list supported algorithms server chooses suite refuses connection standard mandate support algorithm endpoint either client server needs interoperable endpoint may need implement every algorithm including covered intellectual property rights | [
10656,
1285,
11240,
479,
5875,
9367,
4863
] | Test |
1,161 | 7 | Data_farming:data farming data farming process using designed computational experiments “ grow ” data analyzed using statistical visualization techniques obtain insight complex systems methods applied computational model data farming differs data mining following metaphors indicate miners seek valuable nuggets ore buried earth control hard extract nuggets surroundings ... similarly data miners seek uncover valuable nuggets information buried within massive amounts data data-mining techniques use statistical graphical measures try identify interesting correlations clusters data set farmers cultivate land maximize yield manipulate environment advantage using irrigation pest control crop rotation fertilizer small-scale designed experiments let determine whether treatments effective similarly data farmers manipulate simulation models advantage using large-scale designed experimentation grow data models manner easily lets extract useful information ... results reveal root cause-and-effect relationships model input factors model responses addition rich graphical statistical views relationships nato modeling simulation task group documented data farming process final report msg-088 data farming uses collaborative processes combining rapid scenario prototyping simulation modeling design experiments high performance computing analysis visualization iterative loop-of-loops science design experiments doe around century pioneered r.a. fisher agricultural studies many classic experiment designs used simulation studies however computational experiments far fewer restrictions real-world experiments terms costs number factors time required ability replicate ability automate etc consequently framework specifically oriented toward large-scale simulation experiments warranted people conducting computational experiments long computers around term “ data farming ” recent coined 1998 conjunction marine corp ’ project albert small agent-based distillation models type stochastic simulation created capture specific military challenges models run thousands millions times maui high performance computer center facilities project albert analysts would work military subject matter experts refine models interpret results initially use brute-force full factorial gridded designs meant simulations needed run quickly studies required high-performance computing even small number factors limited number levels could investigated due curse dimensionality seed center data farming naval postgraduate school also worked closely project albert model generation output analysis creation new experimental designs better leverage computing capabilities maui facilities recent breakthroughs designs specifically developed data farming found among others series international data farming workshops held since 1998 seed center data farming international data farming workshop 1 occurred 1991 since 16 workshops taken place workshops seen diverse array representation participating countries canada singapore mexico turkey united states international data farming workshops operate collaboration various teams experts recent workshop held 2008 saw 100 teams participating teams data farmers assigned specific area study robotics homeland security disaster relief different forms data farming experimented utilized group pythagoras abm logistics battle command model agent-based sensor effector model absem | [
2818,
3880,
522,
6131,
8085
] | None |
1,162 | 2 | ILBM:ilbm interleaved bitmap ilbm image file format conforming interchange file format iff standard format originated amiga platform ibm-compatible systems files format related pbm planar bitmap format typically encountered games late 1980s early 1990s either amiga ports graphical assets designed amiga machines characteristic feature format stores bitmaps form interleaved bit planes gives format name reflects way amiga graphics hardware natively reads graphics data memory simple form compression supported make ilbm files compact amiga files associated particular file extension though started used pc systems extensions systematically used employed .lbm occasionally .bbm extension ilbm implementation iff file format consisting number consecutive chunks whose order extent varied chunk different function basic format means program read decode every chunk file ones wants deal ones understand ilbm files usually contain enough information allow displayed image editing program including image dimensions palette pixel data files designed act palettes paint programs pixel data left blank merged another image makes much flexible also much complex formats bmp ilbms bmhd chunk 'vital chunks must appear body chunk chunks appearing body considered 'extra many programs leave unread unchanged bmhd chunk specifies image displayed usually first chunk inside form defines image height/width drawn screen display various screen resolutions image compressed content chunk follows body chunk usually last chunk file largest ilbm files body chunk stores actual image data interleaved bitplanes optional mask row bitplanes appear first 1 n followed mask plane image uncompressed line made codice_1 16-bit values i.e one bit per pixel rounded nearest multiple 16-bits compressed line compressed individually always multiple 16-bits long compressed pbm files body chunk simpler uncompressed continuous stream bytes containing image data image compressed row data bitplane compressed individually including mask data present compression variety rle compression using flags decoded follows compression routine best encode 2 byte repeat run replicate run except preceded followed literal run case best merge three one literal run always encode 3 byte repeats replicate runs camg chunk specifically commodore amiga computer stores long viewport mode lets specify amiga display modes like dual playfield hold modify surprisingly rare outside amiga games need convert display files might contain meaningful camg chunks see 'notes working ilbm files cmap chunk contains image palette consists 3-byte rgb values colour used byte 0 255 inclusive chunk codice_2 bytes long number colours palette codice_3 chunk optional default palette used present possible fewer entries expected e.g 7 colours 4-plane '16 colour bitmap example remember odd number colours per iff specification chunk padded one byte make even number bytes long pad byte included chunk length field colour range chunk 'nonstandard used electronic arts deluxe paint program identify contiguous range colour registers shade range colour cycling zero crng chunks ilbm file appear body chunk deluxe paint normally writes 4 crng chunks ilbm user asks save picture commodore graphicraft program uses ccrt colour cycling range timing chunk contains cycleinfo structure like crng nonstandard chunk data similar crng chunk program would probably use one two methods expressing colour cycle data could write want communicate information deluxepaint graphicraft optional property dest way control scatter zero source bitplanes deeper destination image readers may ignore dest low order depth number bits planepick planeonoff planemask correspond one-to-one destination bitplanes bit 0 bitplane 0 etc higher order bits ignored 1 bits planepick mean put next source bitplane bitplane number 1 bits equal numplanes 0 bits mean put corresponding bit planeonoff bitplane bits planemask gate writing destination bitplane 1 bits mean write bitplane 0 bits mean leave bitplane alone normal case dest chunk equivalent codice_4 remember color numbers formed pixels destination bitmap depth planes deep source bitmap numplanes planes deep optional grab chunk locates handle hotspot image relative upper left corner e.g. used mouse cursor paint brush optional sprt chunk indicates image intended sprite thus mask plane transparent colour n't fullscreen handled depends program using image data stored sprite order used many programs place sprite foreground sprite order 1 appears behind one order 0 etc optional tiny chunk contains small preview image various graphics programs including deluxe paint compressed similar format body chunk sometimes ilbm file contains colour map image data often used store palette colours applied image separately case body chunk empty numplanes field bmhd chunk 0 ilbm files contain 'true-colour information rather indexed colours so-called 'deep images files cmap chunk usually 24 32 bitplanes standard ordering bitplanes put least significant bit red component first r0 r1 r2 r3 r4 r5 r6 r7 g0 g1 g2 g3 g4 g5 g6 g7 b0 b1 b2 b3 b4 b5 b6 b7 32 bit planes last 8 bit planes alpha channel r0 r1 ... r7 g0 ... g7 b0 ... b6 b7 a0 a1 a2 a3 a4 a5 a6 a7 image containing colour map 8 bitplanes may greyscale image i0 i1 i2 i3 i4 i5 i6 i7 ilbm file contains camg chunk bit 7 set i.e 0x80 hexadecimal file expects make use ehb extra half-brite mode amiga chipset colour map 32 entries image 6 bitplanes significant bitplane regarded flag unset use lower 5 bits index colour map usual flag set use lower 5 bits index colour map actual colour used half bright achieved shifted rgb components colour one bit right alternatively create colour map 64 entries copy lower 32 entries upper half converting half brightness use 6 bitplanes colour index pbm images exist extra half-brite mode ilbm file contains camg chunk bit 11 set i.e 0x800 hexadecimal file expects make use ham hold-and-modify mode amiga chipset ham6 format colour map 16 entries image 6 possibly 5 bitplanes ham8 format colour map 64 entries image 8 possibly 7 bitplanes last two bitplanes odd number bitplanes assume extra bitplane always 0 control flags indicate use first 4 6 bitplanes first pixel scanline modification pixel modify use image border colour note using 4 bits modify colour component use 4 bits upper 4 bits component lower 4 bits avoid reducing overall colour gamut using 6 bits less important still put 2 significant bits modification bits least significant two bits colour component pbm images exist hold modify mode utilities work ilbm bbm files rather dated macpaint deluxe paint irfanview allows viewing files free non commercial use work linux netpbm convert images ilbm ppm format back commander keen dreams series games compressed standalone ilbm images used title screens game read ilbm chunks images edited deluxepaint imported directly game files | [
1347,
6408,
9100,
432,
6129,
8627,
8628
] | Test |
1,163 | 4 | Phoenix_Labs:phoenix labs phoenix labs formerly methlabs software developing community founded tim leonard ken mcclelland best known peerguardian open-source software program optimized use personal firewall file sharing networks group originally organized work peerguardian program leonard created 2003 response shutdown audiogalaxy file sharing site name methlabs came leonard handle 'method late 2004 group added blocklist.org website designed allow users interactively manage block ip addresses certain organisations companies phoenix labs formed september 2005 following dispute members methlabs team according phoenix labs press release series threats incidents forced group methlabs.org website press release attributed action team member responsibility finances server control based information participants internet news sources identified person using nickname cerberius cerberius reportedly disputed charges domain hijacking described situation revolt method members group decided could get methlabs.com domain back decided took suggestions new name irc channel user named 'bizzyb0t came name phoenixlabs.org represent group reborn rising ashes peerguardian peerguardian 2 free open source programs developed capable blocking incoming outgoing connections based ip blocklists purpose block several organizations including riaa mpaa using file sharing networks fasttrack bittorrent system also advertising spyware government educational ranges depending upon user preferences programs developed phoenix labs xs file-sharing hub client deepdelete program erasing files securely make extremely difficult recover latter longer development | [
11073,
8753,
1172,
9496,
10392
] | Test |
1,164 | 4 | Port_forwarding:port forwarding computer networking port forwarding port mapping application network address translation nat redirects communication request one address port number combination another packets traversing network gateway router firewall technique commonly used make services host residing protected masqueraded internal network available hosts opposite side gateway external network remapping destination ip address port number communication internal host port forwarding allows remote computers example computers internet connect specific computer service within private local-area network lan typical residential network nodes obtain internet access dsl cable modem connected router network address translator nat/napt hosts private network connected ethernet switch communicate via wireless lan nat device external interface configured public ip address computers behind router hand invisible hosts internet communicate private ip address configuring port forwarding network administrator sets aside one port number gateway exclusive use communicating service private network located specific host external hosts must know port number address gateway communicate network-internal service often port numbers well-known internet services port number 80 web services http used port forwarding common internet services may implemented hosts within private networks typical applications include following administrators configure port forwarding gateway operating system linux kernels achieved packet filter rules iptables netfilter kernel components bsd macos operating systems prior yosemite os 10.10.x implement ipfirewall ipfw module macos operating systems beginning yosemite implement packet filter pf module used gateway devices port forward may implemented single rule translate destination address port linux kernels dnat rule source address port case left unchanged used machines default gateway network source address must changed address translating machine packets bypass translator connection fail port forward implemented proxy process application layer firewalls socks based firewalls via tcp circuit proxies packets actually translated data proxied usually results source address port number changed proxy machine.. usually one private hosts use specific forwarded port one time configuration sometimes possible differentiate access originating host source address unix-like operating systems sometimes use port forwarding port numbers smaller 1024 created software running root user running superuser privileges order bind port may security risk host therefore port forwarding used redirect low-numbered port another high-numbered port application software may execute common operating system user reduced privileges universal plug play protocol upnp provides feature automatically install instances port forwarding residential internet gateways upnp defines internet gateway device protocol igd network service internet gateway advertises presence private network via simple service discovery protocol ssdp application provides internet-based service may discover gateways use upnp igd protocol reserve port number gateway cause gateway forward packets listening socket port forwarding divided following specific types local remote dynamic port forwarding local port forwarding common type port forwarding used let user connect local computer another server i.e forward data securely another client application running computer secure shell ssh client using local port forwarding firewalls block certain web pages able bypassed connections ssh client forwarded via ssh server intended destination server ssh server configured redirect data specified port local host runs ssh client secure tunnel specified destination host port local port computer ssh client port forwarded port computer client wants connect destination host port configured connect forwarded port rather directly destination host port connection established ssh client listens forwarded port directs data sent applications port secure tunnel ssh server server decrypts data redirects destination host port command line “ -l ” specifies local port forwarding destination server two port numbers need included port numbers less 1024 greater 49150 reserved system programs work specific source ports part source port number used uses local port forwarding form port forwarding enables applications server side secure shell ssh connection access services residing ssh client side addition ssh proprietary tunnelling schemes utilize remote port forwarding general purpose words remote port forwarding lets users connect server side tunnel ssh another remote network service located tunnel client side use remote port forwarding address destination server tunnel client side two port numbers must known port numbers chosen depend application used remote port forwarding allows computers access applications hosted remote servers two examples dynamic port forwarding dpf on-demand method traversing firewall nat use firewall pinholes goal enable clients connect securely trusted server acts intermediary purpose sending/receiving data one many destination servers dpf implemented setting local application ssh socks proxy server used process data transmissions network internet programs web browsers must configured individually direct traffic proxy acts secure tunnel another server proxy longer needed programs must reconfigured original settings manual requirements dpf often used connection established dpf used provide additional security user connected untrusted network since data must pass secure tunnel another server forwarded original destination user protected packet sniffing may occur lan dpf powerful tool many uses example user connected internet coffee shop hotel otherwise minimally secure network may wish use dpf way protecting data dpf also used bypass firewalls restrict access outside websites corporate networks | [
10631,
9868,
6541,
8080,
1814,
5405,
8998,
6579,
823,
8386,
7364,
328,
3150,
6351,
3792,
7121,
10341,
9455,
8308,
5749,
1273
] | None |
1,165 | 7 | Jumbune:jumbune jumbune juhm-b-yoon open-source multi-module framework intended hadoop mapreduce developers cluster administrators designed monitor profile analyse validate hadoop job cluster jumbune provides complete view whole hadoop cluster jobs one go framework comprises various modules helps admins monitor cluster node system-level fine grained statistics option mark frequently monitored stats favorites fetch refreshed results specified interval time selection trends specific stats also available simple easy utility helps mapreduce developers find discrepancies errors hdfs data user may check data violations various categories like data type null values regular expression values provides developers code level control flow statistics mapreduce job user may apply regex validations user defined validation classes per validations applied jumbune flow debugger checks flow key value data mapper reducer respectively enables developers understand resources creating bottleneck mapreduce phases thatare consuming time estimated requires optimization achieve efficient job performance | [
7983,
5677,
823
] | Test |
1,166 | 7 | Browser-based_computing:browser-based computing browser-based computing term denoting use web browsers perform computing tasks opportunities computing web noted far back 1997 computing web described 2000 applications include distributed computing web workers illustrated crowdprocess use browser stack qmachine embedding web applications semantic hypermedia components signaling server peer-to-peer networks set via webrtc browser-based computing complements cloud computing reduce server-side computational load often using cloud-hosted restful web services | [
8640,
4194
] | Test |
1,167 | 8 | Xenu's_Link_Sleuth:xenu link sleuth xenu xenu link sleuth computer program checks websites broken hyperlinks written tilman hausherr proprietary software available charge program named xenu galactic ruler scientology scripture link sleuth runs microsoft windows link verification performed links appear codice_1 tags well images frames plug-ins backgrounds local image maps style sheets scripts java applets program follows links pages checks links pages also possible check entire site broken links one session xenu displays continuously updated list urls sorted according different criteria program uses simple no-frills user-interface help users understand certain web sites structured program support ssl web sites xenu link sleuth software called fastest link-checking software pc magazine amazingly fast accurate university wyoming newsletter software used testing tool usability study grand valley state university xenu link sleuth also cited rossett astd e-learning handbook zhong intelligent technologies information analysis gerrard risk-based e-business testing reynolds complete e-commerce book slocombe max hits websites work george abc seo well german books italian books | [
1723,
6797,
7983
] | Test |
1,168 | 2 | Lightweight_Kernel_Operating_System:lightweight kernel operating system lightweight kernel lwk operating system one used large computer many processor cores termed parallel computer massively parallel high-performance computing hpc system particularly sensitive operating system overhead traditional multi-purpose operating systems designed support wide range usage models requirements support range needs large number system processes provided often inter-dependent computing overhead processes leads unpredictable amount processor time available parallel application common parallel programming model referred bulk synchronous parallel model often employs message passing interface mpi communication synchronization events made specific points application code one processor takes longer reach point processors everyone must wait overall finish time increased unpredictable operating system overhead one significant reason processor might take longer reach synchronization point others custom lightweight kernel operating systems currently used fastest computers world help alleviate problem ibm blue gene line supercomputers runs various versions cnk operating system cray xt4 cray xt5 supercomputers run compute node linux sandia national laboratories almost two-decade commitment lightweight kernels high-end hpc systems sandia university new mexico researchers began work sunmos intel paragon early 1990s operating system evolved puma cougar catamount operating systems deployed asci red red storm sandia continues work lwks new r effort called kitten design goals operating systems lwk implementations vary strive provide applications predictable maximum access central processing unit cpu system resources achieve simplified algorithms scheduling memory management usually included system services e.g. daemons limited absolute minimum available services job launch constructed hierarchical fashion ensure scalability thousands nodes networking protocols communication nodes system also carefully selected implemented ensure scalability one example portals network programming application programming interface api lightweight kernel operating systems assume access small set nodes running full-service operating systems offload necessary services login access compiling environments batch job submission file i/o restricting services absolutely necessary streamlining provided overhead sometimes called noise lightweight operating system minimized allows significant predictable amount processor cycles given parallel application since application make consistent progress processor reach synchronization points faster ideally time lost wait time reduced | [
1795,
6179,
1480,
7497,
10411,
1933,
7983,
1776,
8242,
7382,
3323
] | Train |
1,169 | 1 | Mass_surveillance:mass surveillance mass surveillance intricate surveillance entire substantial fraction population order monitor group citizens surveillance often carried local federal governments governmental organisations organizations like nsa fbi may also carried corporations either behalf governments initiative depending nation laws judicial systems legality permission required engage mass surveillance varies single indicative distinguishing trait totalitarian regimes also often distinguished targeted surveillance mass surveillance often cited necessary fight terrorism prevent crime social unrest protect national security control population conversely mass surveillance equally often criticized violating privacy rights limiting civil political rights freedoms illegal legal constitutional systems another criticism increasing mass surveillance could lead development surveillance state electronic police state civil liberties infringed political dissent undermined cointelpro-like programs state could referred totalitarian state 2013 practice mass surveillance world governments called question edward snowden ‘ 2013 global surveillance disclosure reporting based documents snowden leaked various media outlets triggered debate civil liberties right privacy digital age mass surveillance considered global issue privacy international 2007 survey covering 47 countries indicated increase surveillance decline performance privacy safeguards compared previous year balancing factors eight countries rated 'endemic surveillance societies eight china malaysia russia scored lowest followed jointly singapore united kingdom jointly taiwan thailand united states best ranking given greece judged 'adequate safeguards abuse many countries throughout world already adding thousands surveillance cameras urban suburban even rural areas example september 2007 american civil liberties union aclu stated danger tipping genuine surveillance society completely alien american values potential dark future every move every transaction every communication recorded compiled stored away ready examined used us authorities whenever want 12 march 2013 reporters without borders published special report internet surveillance report included list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights five countries placed initial list bahrain china iran syria vietnam bahrain one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights level internet filtering surveillance bahrain one highest world royal family represented areas internet management sophisticated tools disposal spying subjects online activities dissidents news providers closely monitored surveillance increasing china one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights internet access china owned controlled state communist party many foreign journalists china said take granted telephones tapped email monitored tools put place filter monitor internet collectively known great firewall china besides usual routing regulations allow access ip address particular domain name blocked great firewall makes large-scale use deep packet inspection dpi technology monitor block access based keyword detection great firewall ability dynamically block encrypted connections one country main isps china unicom automatically cuts connection soon used transmit encrypted content monitoring system developed china confined great firewall monitoring also built social networks chat services voip private companies directly responsible chinese authorities surveillance networks ensure banned messages circulated qq application owned firm tencent allows authorities monitor detail exchanges internet users seeking certain keywords expressions author message identified user number qq application effectively giant trojan horse since march 2012 new legislation requires new users micro-blogging sites register using name telephone number skype one world popular internet telephone platforms closely monitored skype services china available local partner tom media group chinese-language version skype known tom-skype slightly different downloadable versions countries report opennet initiative asia says everyday conversations captured servers interception storage conversation may triggered sender recipient name keywords occur conversation 30 january new york times reported target attacks chinese government first breach took place 13 september 2012 newspaper preparing publish article fortune amassed family outgoing prime minister wen jiabao newspaper said purpose attacks identify sources supplied newspaper information corruption among prime minister entourage wall street journal cnn also said targets cyber attacks china february twitter disclosed accounts 250,000 subscribers victims attacks china similar carried new york times mandiant company engaged nyt secure network identified source attacks group hackers called advanced persistent threat 1 unit people liberation army operating 12-story building suburbs shanghai hundreds possibly thousands staff direct support chinese government newest form mass surveillance china social credit system citizens businesses given deducted good behavior points depending choices digital revolution one world biggest mass surveillance operations carried stasi secret police former east germany time state collapsed 1989 stasi built estimated civilian network 300,000 informants approximately one fifty population monitored even minute hints political dissent among citizens many west germans visiting friends family east germany also subject stasi spying well many high-ranking west german politicians persons public eye east german citizens well aware government spying led culture mistrust touchy political issues discussed comfort four walls closest friends family members widely maintaining façade unquestioning followership public right privacy highly developed area law europe data protection directive regulates processing personal data within european union comparison us data protection law comparable instead us regulates data protection sectoral basis since early 2012 european union working general data protection regulation replace data protection directive harmonise data protection privacy law 20 october 2013 committee european parliament backed measure enacted could require american companies seek clearance european officials complying united states warrants seeking private data vote part efforts europe shield citizens online surveillance wake revelations far-reaching spying program u.s. national security agency european union justice rights commissioner viviane reding said question arisen whether large-scale collection processing personal information us surveillance programmes necessary proportionate meet interests national security eu also asking us changes us legislation match legal redress offered europe american citizens europe go courts feel rights infringed europeans without right residence america eu us arrangement implement international safe harbor privacy principles struck european court justice new framework transatlantic data flows called eu-us privacy shield adopted july 2016 april 2014 european court justice declared invalid eu data retention directive court said violates two basic rights respect private life protection personal data legislative body european union passed data retention directive 15 december 2005 requires telecommunication operators retain metadata telephone internet telecommunication services periods less six months two years date communication determined eu member state upon request make data available various governmental bodies access information limited investigation serious crimes warrant required access undertaken seventh framework programme research technological development fp7 science society multidisciplinary mission oriented mass surveillance activities example indect hide funded european commission association industrial partners indect project intelligent information system supporting observation searching detection security citizens urban environment develops intelligent urban environment observation system register exchange operational data automatic detection recognition intelligent processing information abnormal behaviour violence main expected results indect project hide homeland security biometric identification personal detection ethics research project funded european commission within scope seventh rtd framework programme fp7 consortium coordinated emilio mordini explored ethical privacy implications biometrics personal detection technologies focusing continuum personal detection authentication identification mass surveillance 2002 german citizens tipped wiretapping software error led phone number allocated german secret service listed mobile telephone bills indian parliament passed information technology act 2008 debate giving government fiat power tap communications without court order warrant section 69 act states section 69 empowers central government/state government/ authorized agency intercept monitor decrypt information generated transmitted received stored computer resource necessary expedient interest sovereignty integrity india defence india security state friendly relations foreign states public order preventing incitement commission cognizable offence investigation offence india setting national intelligence grid called natgrid would fully set may 2011 individual data ranging land records internet logs air rail pnr phone records gun records driving license property records insurance income tax records would available real time oversight uid unique identification authority india given every indian february 2011 government would able track people real time national population registry citizens established 2011 census fingerprints iris scans would taken along gps records household per initial plan access combined data given 11 agencies including research analysis wing intelligence bureau enforcement directorate national investigation agency central bureau investigation directorate revenue intelligence narcotics control bureau several states within india already installed cctv surveillance systems face matching capabilities using biometrics aadhaar andhra pradesh telangana using information linked aadhaar across different agencies create 360-degree profile person calling integration information hub states planning follow model iran one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved naturally active efforts news providers government runs controls almost country institutions regulating managing legislating telecommunications supreme council cyberspace headed president ahmadinejad established march 2012 determines digital policy construction parallel iranian internet high connection speed fully monitored censored almost complete tools used iranian authorities monitor control internet include data interception tools capable deep packet inspection interception products leading chinese companies zte huawei use products provided huawei mobin net leading national provider mobile broadband used analyze email content track browsing history block access sites products zta sold telecommunication company iran tci offer similar services plus possibility monitoring mobile network european companies source spying data analysis tools products designed ericsson nokia siemens networks later trovicor use companies sold sms interception user location products mobile communication company iran irancell iran two biggest mobile phone companies 2009 used identify iranian citizens post-election uprising 2009 use israeli surveillance devices also detected iran network traffic management surveillance device netenforcer provided israel denmark resold iran similarly us equipment found way iran via chinese company zte july 2018 malaysian police announced creation malaysian internet crime children investigation unit micac equipped real-time mass internet surveillance software developed united states tasked monitoring malaysian internet users focus pornography child pornography system creates data library users includes details ip addresses websites locations duration frequency use files uploaded downloaded struggling drug trafficking criminal groups decades mexico strengthening military mass surveillance approximately half population mexico support democracy form government believe authoritarian system better social matters solved relevance political beliefs may make easier mass surveillance take spread within country necessarily mean end democratic institutions whole—such free elections permanence critical mass media—but means strengthening mechanisms exercising power exclude dialogue transparency social agreement developing intelligence agencies mexico radar means security according 2004 report government netherlands carries clandestine wire-taps intercepts country per capita world dutch military intelligence service mivd operates satellite ground station intercept foreign satellite links also facility eavesdrop foreign high-frequency radio traffic attained nickname ‘ surveillance state ’ north korea government complete control forms telecommunications internet routine sent prison camp communicating outside world government enforces restrictions around types appliances north koreans may home case radio tv sets pick signals nearby south korea china russia attempt mask way government actively spies citizens north korea increasing number citizens smartphones however devices heavily controlled used censor observe everything north koreans phones reuters reported 2015 koryolink north korea official mobile phone network around 3 million subscribers country 24 million obviously order digital data draw citizens must access phones things online sorm sorm-2 laws enable complete monitoring communication electronic traditional eight state agencies without warrant laws seem conflict article 23 constitution russia states 2015 european court human rights ruled legislation violated article 8 european convention human rights zakharov v. russia yarovaya law required storage unconditional access private communication data law enforcement singapore known city sensors singapore surveillance structure spreads widely closed-circuit television public areas even around neighbourhood internet monitoring/ traffic monitoring use surveillance metadata government initiatives singapore sim card registration mandatory even prepaid card singapore government rights access communication data singapore largest telecompany singtel close relations government singapore laws broadly phrased allow government obtain sensitive data text-messages email call logs web surfing history people without need court permission installation mass surveillance cameras singapore effort act deterrence terror attacks also public security loan sharks illegal parking part singapore smart nation initiative build network sensors collect connect data city life including citizen movement singapore government rolled 1000 sensors ranging computer chips surveillance cameras track almost everything singapore air quality public safety 2014 2016 bid increase security singapore police force installed 62,000 police cameras 10,000 housing development board hdb blocks covering lifts multi-storey car parks rising security concerns number cctv cameras public areas monitoring public transport system commercial/ government buildings singapore set increase 2018 singapore government would rolling new advanced surveillance systems starting singapore maritime borders new panoramic electro-optic sensors put place north south coasts monitoring 360-degree view area tethered unmanned aerial vehicle uav also operational used search rescue operations including hostage situations public order incidents according 2017 report privacy international spain may part group 21 european countries withholding information also known data retention 2014 many defense lawyers tried overturn multiple cases used mass storage evidence convict according european agency fundamental rights prior 2009 national defence radio establishment fra limited wireless signals intelligence sigint although left largely unregulated december 2009 new legislation went effect allowing fra monitor cable bound signals passing swedish border communications service providers legally required confidentiality transfer cable communications crossing swedish borders specific interaction points data may accessed court order fra contested since change legislation mainly public perception change would enable mass surveillance fra categorically deny allegation allowed initialize surveillance direct access communication lines sigint authorized special court meet set narrow requirements something minister defence sten tolgfors quoted saying render debate mass surveillance invalid due architecture internet backbones nordic area large portion norwegian finnish traffic also affected swedish wiretapping syria one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights syria stepped web censorship cyber-monitoring country civil war intensified least 13 blue coat proxy servers use skype calls intercepted social engineering techniques phishing malware attacks use failed coup attempt june 15 2016 led authoritarian shift uses mass surveillance suppress opposite views digital surveillance part everyday life due box government puts turkish citizens increasingly difficult release academic knowledge beyond turkish government wants released digital physical strong hold knowledge goes regime today surveillance academicians goes along state oppression turkey hard say happen next years turkey become increasingly authoritarian centralization state power along digitalization expands scope state surveillance digitalization centralization state power closely related regime power becomes prominent conjuncture national security terrorism turkey main explanations world topic although clearly happening according report human rights joint platform published february 23 2017 nine months period state emergency number dismissed academicians reached 4,811 increasing 7,619 addition academicians working universities closed failed coup attempt extended surveillance turkey helped control population massive scale state surveillance united kingdom formed part public consciousness since 19th century postal espionage crisis 1844 sparked first panic privacy citizens however 20th century electronic surveillance capabilities grew wartime signal intelligence pioneering code breaking 1946 government communications headquarters gchq formed united kingdom united states signed bilateral ukusa agreement 1948 later broadened include canada australia new zealand well cooperation several third-party nations became cornerstone western intelligence gathering special relationship uk usa growth internet development world wide web series media reports 2013 revealed recent programs techniques involving gchq tempora use capabilities controlled laws made uk parliament particular access content private messages interception communication must authorized warrant signed secretary state addition european union data privacy law applies uk law uk exhibits governance safeguards well use electronic surveillance investigatory powers tribunal judicial oversight body intelligence agencies ruled december 2014 legislative framework united kingdom breach european convention human rights however tribunal stated february 2015 one particular aspect data-sharing arrangement allowed uk intelligence services request data us surveillance programs prism upstream contravention human rights law prior two paragraphs additional information providing details procedures safeguards disclosed public december 2014 december 2014 ruling investigatory powers tribunal found legislative framework united kingdom permit mass surveillance gchq collects analyses data bulk practice mass surveillance report privacy security published intelligence security committee parliament also came view although found past shortcomings oversight said legal framework simplified improve transparency view supported independent reports interception communications commissioner however notable civil liberties groups continue express strong views contrary plan appeal ruling european court human rights others criticised viewpoints turn regulation investigatory powers act 2000 rip ripa significant piece legislation granted regulated powers public bodies carry surveillance investigation 2002 uk government announced plans extend regulation investigatory powers act least 28 government departments would given powers access metadata citizens web e-mail telephone fax records without warrant without subject knowledge protection freedoms act 2012 includes several provisions related controlling restricting collection storage retention use information government databases supported three major political parties uk parliament passed data retention investigatory powers act july 2014 ensure police security services retain existing powers access phone internet records superseded investigatory powers act 2016 comprehensive statute made public number previously secret powers equipment interference bulk retention metadata intelligence agency use bulk personal datasets enables government require internet service providers mobile phone companies maintain records content customers internet connections 12 months addition created new safeguards including requirement judges approve warrants authorised secretary state come force act informed two reports david anderson qc uk independent reviewer terrorism legislation question trust 2015 report bulk powers review 2016 contains detailed appraisal 60 case studies operational case powers often characterised mass surveillance may yet require amendment consequence legal cases brought court justice european union european court human rights many advanced nation-states implemented laws partially protect citizens unwarranted intrusion human rights act 1998 data protection act 1998 united kingdom laws require formal warrant private data may gathered government uk member european union participates programs subject eu policies directives surveillance vast majority video surveillance cameras uk operated government bodies private individuals companies especially monitor interiors shops businesses according 2011 freedom information act requests total number local government operated cctv cameras around 52,000 entirety uk prevalence video surveillance uk often overstated due unreliable estimates requoted example one report 2002 extrapolated small sample estimate number cameras uk 4.2 million 500,000 london reliable estimates put number private local government operated cameras united kingdom around 1.85 million 2011 historically mass surveillance used part wartime censorship control communications could damage war effort aid enemy example world wars every international telegram united states sent companies western union reviewed us military wars surveillance continued programs black chamber following world war project shamrock following world war ii cointelpro projects conducted u.s. federal bureau investigation fbi 1956 1971 targeted various subversive organizations including peaceful anti-war racial equality activists albert einstein martin luther king jr billions dollars per year spent agencies national security agency nsa federal bureau investigation fbi develop purchase implement operate systems carnivore echelon narusinsight intercept analyze immense amount data traverses internet telephone system every day since september 11 2001 terrorist attacks vast domestic intelligence apparatus built collect information using nsa fbi local police state homeland security offices military criminal investigators intelligence apparatus collects analyzes stores information millions american citizens many accused wrongdoing mail isolation control tracking program u.s postal service photographs exterior every piece paper mail processed united states — 160 billion pieces 2012 u.s. postmaster general stated system primarily used mail sorting images available possible use law enforcement agencies created 2001 following anthrax attacks killed five people sweeping expansion 100-year-old program called mail cover targets people suspected crimes fbi developed computer programs magic lantern cipav remotely install computer system order monitor person computer activity nsa gathering information financial records internet surfing habits monitoring e-mails also performed extensive analysis social networks myspace prism special source operation system legally immunized private companies cooperate voluntarily u.s. intelligence collection according register fisa amendments act 2008 specifically authorizes intelligence agencies monitor phone email communications u.s. citizens week without obtaining warrant one parties outside u.s. prism first publicly revealed 6 june 2013 classified documents program leaked washington post guardian american edward snowden communications assistance law enforcement act calea requires u.s. telecommunications internet service providers modify networks allow easy wiretapping telephone voip broadband internet traffic early 2006 usa today reported several major telephone companies providing telephone call records u.s. citizens national security agency nsa storing large database known nsa call database report came heels allegations u.s. government conducting electronic surveillance domestic telephone calls without warrants 2013 existence hemisphere project provides telephone call data federal agencies became publicly known traffic cameras meant help enforce traffic laws intersections may used law enforcement agencies purposes unrelated traffic violations cameras allow identification individuals inside vehicle license plate data collected time stamped cross reference data used police department homeland security funding networks surveillance cameras cities towns part efforts combat terrorism new york city police department infiltrated compiled dossiers protest groups 2004 republican national convention leading 1,800 arrests modern surveillance united states thought wartime effort snowden disclosed depth information national security agency june 2013 constant development improvements internet technology made easier mass surveillance take hold revelations allow critical commentators raise questions scrutinize implementation use abuse networking technologies devices software systems partake “ global surveillant assemblage ” bogard 2006 collier ong 2004 haggerty ericson 2000 murakami wood 2013 nsa collected millions verizon user telephone records 2013-2014 nsa also collected data google facebook program called 'prism journalists snowden published nearly 7,000 top-secret documents since yet information disclosed seems less 1 entire information access every individual private records seems directly contradict fourth amendment vietnam one five countries reporters without borders march 2013 list state enemies internet countries whose governments involved active intrusive surveillance news providers resulting grave violations freedom information human rights country 16 service providers directly indirectly controlled vietnamese communist party industry leader vietnam posts telecommunications group controls 74 per cent market state-owned viettel enterprise vietnamese armed forces fpt telecom private firm accountable party depends market leaders bandwidth service providers major instruments control surveillance bloggers monitored government frequently undergo man-in-the-middle attacks designed intercept data meant sent secure https sites allowing passwords communication intercepted according july 2012 freedom house report 91 percent survey respondents connected internet mobile devices government monitors conversations tracks calls activists reactionaries result digital revolution many aspects life captured stored digital form concern expressed governments may use information conduct mass surveillance populations commercial mass surveillance often makes use copyright laws user agreements obtain typically uninformed 'consent surveillance consumers use software related materials allows gathering information would technically illegal performed government agencies data often shared government agencies thereby practice defeating purpose privacy protections one common forms mass surveillance carried commercial organizations many people willing join supermarket grocery loyalty card programs trading personal information surveillance shopping habits exchange discount groceries although base prices might increased encourage participation program programs like google adsense opensocial increasing pool so-called web gadgets social gadgets google-hosted services many web sites internet effectively feeding user information sites visited users also social connections google facebook also keep information although acquisition limited page views within facebook data valuable authorities advertisers others interested profiling users trends web site marketing performance google facebook others increasingly becoming guarded data reach increases data becomes inclusive making valuable new features like geolocation give even increased admission monitoring capabilities large service providers like google also enabled track one physical movements users using mobile devices especially syncing without user interaction google gmail service increasingly employing features work stand-alone application also might activate web browser even active synchronizing feature mentioned google i/o 2009 developer conference showing upcoming html5 features google others actively defining promoting 2008 world economic forum davos google ceo eric schmidt said arrival truly mobile web offering new generation location-based advertising set unleash 'huge revolution mobile world congress barcelona 16 february 2010 google presented vision new business model mobile operators trying convince mobile operators embrace location-based services advertising google advertising provider would mean every mobile operator using location-based advertising service would revealing location mobile customers google organizations like electronic frontier foundation constantly informing users importance privacy considerations technologies like geolocation computer company microsoft patented 2011 product distribution system camera capture device monitors viewers consume product allowing provider take remedial action actual viewers match distribution license reporters without borders march 2013 special report internet surveillance contained list corporate enemies internet companies sell products liable used governments violate human rights freedom information five companies initial list amesys france blue coat systems u.s. gamma group uk germany hacking team italy trovicor germany list exhaustive likely expanded future surveillance state country government engages pervasive surveillance large numbers citizens visitors widespread surveillance usually justified necessary national security prevent crime acts terrorism may also used stifle criticism opposition government examples early surveillance states include former soviet union former east germany large network informers advanced technology base computing spy-camera technology states today technologies mass surveillance use databases pattern recognition software cross-correlate information obtained wire tapping including speech recognition telecommunications traffic analysis monitoring financial transactions automatic number plate recognition tracking position mobile telephones facial recognition systems like recognize people appearance gait dna profiling etc development smart cities seen increased adoption surveillance technologies governments although primary purpose surveillance cities use information communication technologies improve urban environment implementation technology number cities resulted increased efficiencies urban infrastructure well improved community participation sensors systems monitor smart city infrastructure operations activities aim help run efficiently example city could use less electricity traffic run smoothly fewer delays citizens use city safety hazards dealt faster citizen infractions rules prevented city infrastructure power distribution roads traffic lights example dynamically adjusted respond differing circumstances development smart city technology also led increase potential unwarranted intrusions privacy restrictions upon autonomy widespread incorporation information communication technologies within daily life urban residents results increases surveillance capacity states extent individuals may unaware information accessed access occurs purpose possible conditions could give rise development electronic police state shanghai amsterdam san jose dubai barcelona madrid stockholm new york cities use various techniques smart city technology electronic police state state government aggressively uses electronic technologies record collect store organize analyze search distribute information citizens electronic police states also engage mass government surveillance landline cellular telephone traffic mail email web surfing internet searches radio forms electronic communication well widespread use video surveillance information usually collected secret crucial elements politically based long government afford technology populace permit used electronic police state form continual use electronic mass surveillance result constant low-level fear within population lead self-censorship exerts powerful coercive force upon populace seventeen factors judging development electronic police state suggested electronic police state 2008 national rankings list includes factors apply forms police states use identity documents police enforcement go considerably beyond emphasize use technology gather process information collected concept monitored government collects large audience curious citizens mass surveillance prominently featured wide array books films media advances technology last century led possible social control internet conditions late capitalism many directors writers enthralled potential stories could come mass surveillance perhaps iconic example fictional mass surveillance george orwell 1949 novel nineteen eighty-four depicts dystopian surveillance state works focus mass surveillance | [
2818,
1930,
5133,
3599,
3088,
1169,
3858,
9233,
10002,
1941,
1692,
8735,
5024,
1189,
1317,
3111,
3495,
3880,
8104,
11046,
9260,
3629,
1070,
9901,
11695,
10417,
3637,
6455,
10935,
10557,
11198,
10303,
3520,
3521,
197,
3703,
6344,
4937,
7759,... | Train |
1,170 | 3 | NXP_LPC:nxp lpc lpc family 32-bit microcontroller integrated circuits nxp semiconductors formerly philips semiconductors lpc chips grouped related series based around 32-bit arm processor core cortex-m4f cortex-m3 cortex-m0+ cortex-m0 internally microcontroller consists processor core static ram memory flash memory debugging interface various peripherals earliest lpc series based intel 8-bit 80c51 core february 2011 nxp shipped one billion arm processor-based chips recent lpc families based arm cores nxp semiconductors licenses arm holdings adds peripherals converting design silicon die nxp vendor shipping arm cortex-m core dual in-line package lpc810 dip8 0.3-inch width lpc1114 dip28 0.6-inch width following tables summarize nxp lpc microcontroller families lpc4xxx series based arm cortex-m4f core lpc4300 series two three arm cores one arm cortex-m4f one two arm cortex-m0 lpc4350 chips pin-compatible lpc1850 chips lpc4330-xplorer development board available nxp summary series lpc4000 series based single arm cortex-m4f processor core lpc408x chips pin-compatible lpc178x chips summary series lpc3xxx series based arm926ej-s core first 90 nm arm9 family lpc3200 series based arm926ej-s processor core lpc3100 series based arm926ej-s processor core lpc3154 used nxp implement lpc-link debugger lpcxpresso boards lpc3180 core operates 208 mhz features interfaces sdram usb 2.0 full-speed nand flash secure digital sd i²c lpc2000 series based 1.8-volt arm7tdmi-s core operating 80 mhz together variety peripherals including serial interfaces 10-bit adc/dac timers capture compare pwm usb interface external bus options flash memory ranges 32 kb 512 kb ram ranges 4 kb 96 kb nxp two related series without lpc name lh7 series based arm7tdmi-s arm720t cores lh7a series based arm9tdmi core lpc2900 series based arm968e-s processor core lpc2400 series based arm7tdmi-s processor core lpc2300 series based arm7tdmi-s processor core lpc2364/66/68 lpc2378 full-speed usb 2.0 devices 2 interfaces 10/100 ethernet mac lqfp100 lqfp144 packages multiple peripherals supported including 10-bit 8-channel adc 10-bit dac lpc2200 series based arm7tdmi-s processor core lpc2100 series based arm7tdmi-s processor core lpc2141 lpc2142 lpc2144 lpc2146 lpc2148 full-speed usb 2.0 devices lqfp64 packages multiple peripherals supported including one two 10-bit adcs optional 10-bit dac nxp lpc1000 family consists six series microcontrollers lpc1800 lpc1700 lpc1500 lpc1300 lpc1200 lpc1100 lpc1800 lpc1700 lpc1500 lpc1300 series based cortex-m3 arm processor core lpc1200 lpc1100 based cortex-m0 arm processor core nxp lpc1800-series based arm cortex-m3 core lpc1850 pin-compatible lpc4350 parts available packages tbga100 lqfp144 bga180 lqfp208 bga256 lpc4330-xplorer development board available nxp apple m7 m8 motion co-processor chips likely based lpc1800 series lpc18a1 lpc18b1 nxp lpc1700-series based arm cortex-m3 core lpc178x pin-compatible lpc408x parts available packages lqfp80 lqfp100 tfbga100 lqfp144 tfbga180 lqfp208 tfbga208 lpc1769-lpcxpresso development board available nxp mbed lpc1768 board also available emcrafts lpc-lnx-evb lpc1788 based board μclinux available nxp lpc1500-series based arm cortex-m3 core available packages lqfp48 lqfp64 lqfp100 lpc1549-lpcxpresso development board available nxp along motor control kit nxp lpc1300-series based arm cortex-m3 core available packages hvqfn33 lqfp48 lqfp64 lpc1343-lpcxpresso lpc1347-lpcxpresso development board available nxp nxp lpc1200-family based arm cortex-m0 core consists 2 series lpc1200 lpc12d00 available packages lqfp48 lqfp64 lqfp100 lpc1227-lpcxpresso development board available nxp nxp lpc1100-family based arm cortex-m0 core consists 8 series lpc1100 miniature lpc1100 x l lpc1100lv lpc11a00 lpc11c00 lpc11d00 lpc11e00 lpc11u00 lpc1100 series primarily targets ultra tiny footprint available package wlcsp16 2.17 mm x 2.32 mm lpc1104-lpcxpresso development board available nxp lpc1100 x l-series consists three subseries lpc111x lpc111xl lpc111xxl lpc111xl lpc111xxl include power profiles windowed watchdog timer configurable open-drain mode lpc1110xl adds non-maskable interrupt nmi 256-byte page flash erase function lpc1114-lpcxpresso lpc1115-lpcxpresso development board available nxp summary series lpc1100lv series primarily targets low operating voltage range 1.65 1.95 volt power i²c limited 400 khz available two power supply options 1.8 volt single power supply wlcsp25 hvqfn24 packages 1.8 volt core 3.3 volt io/analog dual power supply 5 volt tolerant i/o hvqfn33 package available packages wlcsp25 2.17 mm × 2.32 mm hvqfn24 hvqfn33 lpc11a00 series primarily targets analog features 10-bit adc 10-bit dac analog comparators analog voltage reference temperature sensor eeprom memory available packages wlcsp20 2.5 mm x 2.5 mm hvqfn33 5 mm x 5 mm hvqfn33 7 mm x 7 mm lqfp48 lpc11c00 series primarily targets bus features one mcan controller lpc11c22 lpc11c24 parts include on-chip high-speed transceiver available package lqfp48 lpc11c24-lpcxpresso development board available nxp lpc11d00 series primarily targets lcd display features 4 x 40 segment lcd driver available package lqfp100 lpc11e00 series primarily targets eeprom memory smart card features lpc11u00 series primarily targets usb features usb 2.0 full-speed controller first cortex-m0 integrated drivers rom series pin-compatible lpc134x series lpc11u14-lpcxpresso development board available nxp mbed lpc11u24 board also available nxp lpc800 microcontroller family based cortex-m0+ arm processor core unique features include pin switch matrix state configurable timer clockless wake-up controller single-cycle gpio dip8 package lpc812-lpcxpresso development board available nxp summary series lpc900 series legacy devices based 8-bit 80c51 processor core lpc700 series legacy devices based 8-bit 80c51 processor core lpcxpresso boards sold nxp provide quick easy way engineers evaluate microcontroller chips lpcxpresso boards jointly developed nxp code red technologies embedded artists lpcxpresso board following common features following lpcxpresso boards exist following mbed boards exist following baseboards compatible lpcxpresso mbed boards lpc microcontrollers rom'ed bootloader supports loading binary image flash memory using one peripherals varies family since lpc bootloaders support loading uart peripheral boards connect uart rs-232 usb-to-uart adapter ic thus universal method program lpc microcontrollers microcontrollers requires target board way enable/disable booting rom'ed bootloader i.e jumper switch button amount documentation arm chips daunting especially newcomers documentation microcontrollers past decades would easily inclusive single document chips evolved documentation grown total documentation especially hard grasp arm chips since consists documents ic manufacturer nxp semiconductors documents cpu core vendor arm holdings typical top-down documentation tree manufacturer website manufacturer marketing slides manufacturer datasheet exact physical chip manufacturer detailed reference manual describes common peripherals aspects physical chip family arm core generic user guide arm core technical reference manual arm architecture reference manual describes instruction set nxp additional documents evaluation board user manuals application notes getting started guides software library documents errata see external links section links official nxp arm documents | [
7170,
11395,
3467,
6797,
398,
6925,
8720,
10767,
659,
7445,
7065,
666,
5786,
4508,
9371,
4773,
38,
9638,
682,
4139,
2862,
11054,
2224,
11314,
11447,
9913,
2874,
8253,
5823,
6207,
8383,
7234,
7235,
9155,
10945,
9928,
2635,
5963,
8268,
9163... | Validation |
1,171 | 7 | Kami_(app):kami app kami formerly known notable pdf auckland-based cloud-based company known document files reader editor collaborative tool also available google marketplace headquartered auckland kami founded 2012 alliv samson jordan thoms hengjie wang sam altman investor kami built upon html5 app browsers make easy approachable tool working online 2014 kami announced management partnering google google work partner program order target education users online use kami targets facilitate web users chrome extension allows users annotate pdf files .docx .pptx image files within browser basic task tool make online documents easily usable real life applications app leverages easy read edit approach documents thus replacing outdated arduous printing marking scanning processes kami finds uniqueness provision web services editing pdf documents local level result tool able offer offline editing enhance value application company management plans extend tool compatibility formats autocad photoshop extension includes introduction relevant annotation tools support desired document extensions app | [
8627,
8413
] | Validation |
1,172 | 4 | PeerGuardian:peerguardian peerguardian free open source program developed phoenix labs capable blocking incoming outgoing connections based ip blacklists aim use block peers torrent download visibility peer connection using ip lists system also capable blocking custom ranges depending upon user preferences windows version program discontinued favor applications phoenix labs encourage current peerguardian users migrate peerblock based peerguardian 2 development peerguardian started late 2002 led programmer tim leonard first public version released 2003 time music industry started sue individual file sharing users change previous stance would target consumers copyright infringement lawsuits original peerguardian 1.0 programmed visual basic quickly became popular among p2p users despite blocking common tcp protocol known high ram cpu usage connected p2p networks december 2003 downloaded 1 million times original version released free source code made available open source license due version 1.0 blocking tcp ports peerguardian.net shifted bluetack.co.uk protowall blocklist manager b.i.m.s hosts manager developed 7 months development february 2005 version 2 peerguardian released beta development version 2.0 led cory nelson aimed resolve many shortcomings version 1 version 2 enabled support protocols tcp udp icmp etc multiple block lists automatic updates installation procedure also simplified longer requiring system restart driver installation speed resource inefficiencies fixed re-designing re-coding version 2.0 c++ consume less processing power memory desktop firewall software windows version 2.0 installed kernel-level filter windows 2000 later giving application direct access windows networking stack improving performance support windows vista ipv6 release candidate phase may 2009 blacklist stored number different formats binary formats known p2b created release first beta version peerguardian 2 order create smallest possible blocklist original format peerguardian version 1.x simple plaintext format unfortunately meant lists became large cost lot bandwidth distribute heralding construction smaller binary formats format follows example format also used emule safepeer vuze plugin protowall ktorrent transmission since least 2006 p2p blocklist used peerguardian provided bluetack internet security solutions bluetack name member original peerguardian team owned previous domain peerguardian.net created block list manager used maintain list bluetack.co.uk developed application called bluetack internet management system b.i.m.s would spider whois servers create map internet ip addresses database admins site seraphielx moore firstaid tozanno deathangel r00ted would search names anti-p2p companies set status code entry make blocklists would downloaded blocklist manager import peerguardian protowall applications would block anti-p2p traffic accessing download would also obtain logs people sent letters downloading illegal software music videos figure list belong flag entry safe peerguardian developers state control bluetack list promote link alternative lists criticized overly broad blocking based unsubstantiated evidence peerguardian acknowledges battlefield 2 blizzard steam arenanet connectivity blocked creates problems many online gaming users aware peerguardian break game connectivity thus directed read manual blocklist manager application users add sites safe list allowing continue using games websites without interference peerguardian 2007 bluetack/peerguardian 2 criticized blocking denis.stalker.h3q.com second largest bittorrent tracker december 2007 anti-p2p address claiming maintainers whose tracking software opentracker also used pirate bay conspiring mpaa mediadefender maintainers members chaos computer club ccc long-standing association hackers freedom information activists also briefly run tracker ccc network bluetack also blocked ccc accusing anti-p2p work threat file sharers others pointed fact ccc publicly defending p2p years even called boycotting music industry protest file sharing lawsuits although ip addresses government business entities easily added list ip addresses blocked means peerguardian block access government business using undocumented ip address identify people engaged copyright infringement possibly unlawful activity peerguardian lite derivative peerguardian 2 made consume little cpu ram possible ui options consists single tray icon longer developed latest version released april 22 2005 also open-source allowing future derivatives party developers reported online peerguardian lite continued project program peerblock peerguardian lite users recommended around 2008 switch peerblock peerblock options uses almost little cpu peerguardian lite besides original criticism version 1 slow buggy criticism peerguardian around actual technique used block peers critics pointed blocklists open public thus parties may wish circumvent peerguardian actively check list see ip addresses blocked blocklists also managed public fool-proof method checking reporting ip address range bad checking blocked ip addresses still remain bad list relies public make submissions thus vulnerable attack see section blocklist management issues vista 64 bit windows 7 64 bit listed application compatibility require work around involving disabling driver signing may require degree computer skill | [
1792,
2049,
4480,
2563,
1163,
6797,
11029,
9496,
3482,
1436,
4511,
5407,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
5178,
11577,
9279,
8640,
5057,
1858,
10433,
708,
11073,
2118,
4814,
847,
9423,
4561,
712... | Test |
1,173 | 4 | Truncated_differential_cryptanalysis:truncated differential cryptanalysis cryptography truncated differential cryptanalysis generalization differential cryptanalysis attack block ciphers lars knudsen developed technique 1994 whereas ordinary differential cryptanalysis analyzes full difference two texts truncated variant considers differences partially determined attack makes predictions bits instead full block technique applied safer idea skipjack e2 twofish camellia crypton even stream cipher salsa20 | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1941,
4128,
4389,
10662,
169,
11185,
8627,
8628,
2357,
10806,
1847,
9528,
2110,
9541,
10315,
6863,
4561,
8273,
7635,
212,
9556,
10963,
11349,
2265,
1114,
7643,
9697,
8674,
229,
618,
1898,
881,
1654,... | Test |
1,174 | 1 | Distributional–relational_database:distributional–relational database distributional–relational database word-vector database database management system dbms uses distributional word-vector representations enrich semantics structured data distributional word-vectors automatically built automatically large-scale corpora enrichment supports construction databases embed large-scale commonsense background knowledge operations distributional-relational models applied construction schema-agnostic databases databases users query data without aware schema semantic search schema-integration inductive abductive reasoners well different applications semantically flexible knowledge representation model needed main advantage distributional–relational models purely logical semantic web models fact core semantic associations automatically captured corpora contrast definition manually curated ontologies rule knowledge bases distributional–relational models first formalized mechanism cope vocabulary/semantic gap users schema behind data scenario distributional semantic relatedness measures combined semantic pivoting heuristics support approximation user queries expressed vocabulary data expressed vocabulary dataset designer model database symbols entities relations embedded distributional semantic space geometric interpretation latent explicit semantic space geometric aspect supports semantic approximation entities different databases query term database entity distributional relational model becomes double layered model semantics structured data provides fine-grained semantics intended database designer extended distributional semantic model contains semantic associations expressed broader use models support generalization closed communication scenario database designers users live context e.g organization open communication scenario e.g different organizations web creating abstraction layer users specific representation conceptual model | [
4713,
10452
] | Test |
1,175 | 3 | PIC_instruction_listings:pic instruction listings pic instruction set refers set instructions microchip technology pic dspic microcontroller supports instructions usually programmed flash memory processor automatically executed microcontroller startup picmicro chips harvard architecture instruction words unusual sizes originally 12-bit instructions included 5 address bits specify memory operand 9-bit branch destinations later revisions added opcode bits allowing additional address bits instruction set tables follow register numbers referred f constants referred k bit numbers 0–7 selected b bit selects destination 0 indicates w 1 indicates result written back source register f. c z status flags may set based result otherwise unmodified add subtract rotate instructions set c also set dc digit carry flag carry bit 3 bit 4 useful bcd arithmetic memory operands also referred registers simply general-purpose storage ram locations reserved special function registers except single accumulator called codice_1 almost registers memory-mapped even registers like program counter alu status register exceptions memory-mapped return address stack tri-state registers used configure gpio pins instruction set contain conditional branch instructions instead contains conditional skip instructions cause following instruction ignored conditional skip followed unconditional branch performs conditional branch skip instructions test bit register alu status register one possibility memory operands specified absolute address location fixed compile time provide indirect addressing pair special function registers provided mechanism also allows 256 bytes memory addressed even instruction set allows 5- 7-bit memory operands models registers special function registers plus ram fit instruction provide multiple banks memory use one two mechanisms accessing pic processors 256 words program use paged memory internal program counter return stack wide necessary address memory low 8 bits visible software codice_5 pc low register additional codice_6 pc latch high register modified software operation specify full destination address 9-bit codice_7 8-bit write pc register fills additional high bits corresponding part pclath pic18 processors extend beyond 16 bits pclatu register supply bits 16–23 † extended instruction available enhanced baseline pics models 16f527 16f570 mcv20a interrupt support 4-level stack include instructions models also include movlb elan microelectronics corp. make series picmicro-like microcontrollers 13-bit instruction word instructions mostly compatible mid-range 14-bit instruction set limited 6-bit register address 16 special-purpose registers 48 bytes ram 10-bit 1024 word program space 10-bit program counter accessible r2 reads access low bits writes clear high bits exception tbl instruction modifies low byte preserving bits 8 9 7 accumulator-immediate instructions renumbered relative 14-bit picmicro fit 3 opcode bits rather 4 well additional software interrupt instruction additional miscellaneous instructions changes terminology picmicro option register called control register picmicro tris registers 1–3 called i/o control registers 5–7 equivalents obvious † instruction unique em78 instruction set pic equivalent models support multiple rom ram banks manner similar pic microcontrollers also 15-bit variant instruction set almost identical except register numbers enlarged 8 bits call jump addresses enlarged 12 bits differences second generation 15-bit instruction set includes several additional instructions † em89f768n operands results special registers ‡ em88f794n mtf213 mtf351 devices feature 14-bit wide code memory improved 8 level deep call stack instruction set differs little baseline devices 2 additional opcode bits allow 128 registers 2048 words code directly addressed additional miscellaneous instructions two additional 8-bit literal instructions add subtract mid-range core available majority devices labeled pic12 pic16 enhanced mid-range core devices introduce deeper hardware stack additional reset methods 14 additional instructions c programming language optimizations particular two codice_8 codice_9 codice_10 two corresponding codice_2 register pairs codice_12 codice_13 special instructions use codice_14 registers like address registers variety addressing modes holtek make numerous 8-bit microcontrollers 14-bit instruction word equivalent non-enhanced mid-range core instruction encodings fit 14 bits provide 7-bit operand addresses models 4k 8k words program rom provide 15- 16-bit wide rom extend basic 11-bit destination address using bits 14–15 instruction bits 11–12 address models extend 7-bit ram addresses using bit 14 instruction bit 7 operand address instruction format identical microchip opcodes assigned different order manufacturer uses different instruction mnemonics accumulator called acc rather w destination specified suffix instruction mnemonic rather operand addition opcode assignment semantic differences instructions several operations added 14-bit picmicro repertoire 2000 microchip introduced pic18 architecture unlike 17 series proven popular large number device variants presently manufacture contrast earlier devices often programmed assembly c become predominant development language pic18 12-bit ram address space divided 16 pages 256 bytes 8-bit codice_15 field determines address combination codice_16 bit 4-bit bank select register codice_17 codice_16=0 codice_17 ignored codice_15 field sign-extended range 0x000–0x07f global ram 0xf80–0xfff special function registers codice_16=1 codice_15 field extended codice_17 generate 12-bit address pic18 extends codice_2/codice_3 mechanism used previous picmicro processors indirect addressing two ways first provides three file select registers codice_14 registers 12 bits long split two 8-bit portions codice_27 codice_28 access corresponding codice_29 register codice_9 codice_31 acts alias addressed byte second addressing modes three one codice_29 register five one used determines addressing mode also instructions directly load fsr pair 12-bit address codice_46 instruction moves byte two 12-bit addresses 2001 microchip introduced dspic series chips entered mass production late 2004 microchip first inherently 16-bit microcontrollers pic24 devices designed general purpose microcontrollers dspic devices include digital signal processing capabilities addition instructions come two main varieties one like classic one-operand pic instructions operation w0 value specified f register i.e first 8k ram destination select bit selecting updated result w registers memory-mapped f operand may specify w register form new pic24 specifies three w register operands two allow 3-bit addressing mode specification register offset addressing mode available codice_48 instruction ww register may used register offset source destination instructions use encoding unsigned 5-bit immediate source instead operands codice_49 codice_50 access program memory indirect modes allowed refer addresses code memory instructions 2 words long second word nop includes 16 bits additional immediate operand | [
6821,
9739,
11499,
3630,
9044,
7445,
5911,
10013
] | Test |
1,176 | 3 | Inter-processor_interrupt:inter-processor interrupt inter-processor interrupt ipi special type interrupt one processor may interrupt another processor multiprocessor system interrupting processor requires action processor actions might requested include m65mp option os/360 used direct control feature s/360 generate interrupt another processor s/370 successors including z/architecture signal processor instruction provides formalized interface ibm pc compatible computers use advanced programmable interrupt controller apic ipi signalling often performed using apic cpu wishes send interrupt another cpu stores interrupt vector identifier target local apic interrupt command register icr local apic message sent via apic bus target local apic therefore issues corresponding interrupt cpu multiprocessor system running microsoft windows processor may interrupt another processor following reasons addition ones listed ipis given irql 29 | [
1058,
868,
3272,
10508,
6797,
5457,
6129,
9105,
7607,
5529,
1660,
3294,
5823
] | Validation |
1,177 | 2 | AirPrint:airprint airprint feature apple inc. macos ios operating systems printing via wireless lan wi-fi either directly airprint-compatible printers non-compatible shared printers way computer running microsoft windows linux macos airprint require printer-specific drivers originally intended ios devices connected via wi-fi network thus required wi-fi access point however introduction airprint macos desktop platform 2012 macs connected network via ethernet connection could also print using airprint protocol—not connected via wi-fi direct wi-fi connection device printer supported default appeared 'hp eprint wireless direct airprint feature following ipad introduction 2010 user concerns raised product inability print least supported apple solution apple founder ceo steve jobs reportedly replied user request printing email come may 2010 airprint fall 2010 introduction part ios 4.2 gave iphones ipads printing capability first time airprint mac computers introduced mac os x lion release launch twelve printers airprint compatible hp photosmart plus e-all-in-one series july 2014 number grown 1,100 compatible printer models two dozen different manufacturers current list found apple support site related technology covered us patent 20110194123 printer supports driverless printing number software solutions allow non-airprint printers used ios devices configuring support intermediary system accessible via wi-fi connected printer since airprint driverless configuration compensates printer lack native airprint support using drivers intermediary system instead simplest solution platforms create new bonjour service tricks ios clients believing 're talking airprint device many blog posts commercial software products exist accomplish well open source solutions linux works many cases airprint extension internet printing protocol ipp many printers already support either directly result shared intermediary system typically cups mac/linux printing system approach limited however airprint-specific components protocol missing lead compatibility issues unexpected results software packages address completely translating two dialects ipp avoiding compatibility issues re-share printers using airprint service name microsoft windows free paid solutions macos bonjour service exists enables airprint support legacy printers commercial macos software purpose includes netputing handyprint ecamm printopia gnu/linux distributions airprint support automatic cups default printing subsystem since version 1.4.6 trisquel 5 ubuntu 11.04 cups servers version 1.4.6 dns based service discovery also configured manually adding dns-sd printer service discovery records name server number 3rd party solutions available apple app store elsewhere allow printing legacy printers directly via application helper netgear genie mac os x 10.6 windows xp vista 7 8 genie permits shared network attached printer made accessible via airprint application free customers current netgear routers printopia pro commercial solution designed allow airprint work large business education networks offers features useful large organizations including centralized management directory integration allows airprint operate across subnets requires server running mac os x 10.7 later one server potentially serve entire organization | [
10755,
9732,
1549,
5647,
7697,
11289,
6186,
4139,
6700,
1074,
8754,
9784,
8253,
576,
8783,
4180,
10838,
1623,
3672,
3681,
9826,
8806,
3691,
2673,
6264,
7806,
2686,
6783,
10878,
6797,
5784,
4251,
3228,
2207,
11430,
171,
2735,
3248,
7857,
4... | None |
1,178 | 1 | Kdb+:kdb+ kdb+ column-based relational time series database tsdb in-memory imdb abilities developed marketed kx systems database commonly used high-frequency trading hft store analyze process retrieve large data sets high speed kdb+ ability handle billions records analyzes data within database database available 32-bit 64-bit versions several operating systems financial institutions use kdb+ analyze time series data stock commodity exchange data database also used time-sensitive data applications including commodity markets energy trading telecommunications sensor data log data machine computer network usage monitoring kdb+ high-performance column-store database designed process store large amounts data commonly accessed data pushed random-access memory ram faster access data disk storage created financial institutions mind database developed central repository store time series data supports real-time analysis billions records kdb+ ability analyze data time responds queries similar structured query language sql columnar databases return answers queries efficient way row-based database management systems kdb+ dictionaries tables nanosecond time stamps native data types used store time series data core kdb+ built-in programming language q concise expressive query array language dialect language apl q manipulate streaming real-time historical data kdb+ uses q aggregate analyze data perform statistical functions join data sets supports sql queries vector language q built speed expressiveness eliminates need looping structures kdb+ includes interfaces c c++ java c python 1998 kx systems released kdb database built language k written arthur whitney 2003 kdb+ released 64-bit version kdb 2004 kdb+ tick market database framework released along kdb+ taq loader new york stock exchange nyse taq data kdb+ created arthur whitney building prior work array languages april 2007 kx systems announced releasing version kdb+ mac os x time kdb+ also available operating systems linux windows solaris september 2012 version 3.0 released optimized intel upgraded processors support websockets globally unique identifiers guid universally unique identifiers uuid intel advanced vector extensions avx streaming simd extensions 4 sse4 4.2 sandy bridge processors time allowed enhanced support kdb+ system june 2013 version 3.1 released benchmarks 8 times faster older versions | [
3,
5380,
9993,
6797,
3219,
667,
8987,
2088,
10668,
5677,
10413,
7983,
823,
4921,
9019,
833,
9286,
1099,
7630,
2383,
5073,
2901,
2519,
7767,
1883,
11099,
9825,
8695,
11625,
8554,
4331,
5356,
9834,
2670,
1142,
1399,
505,
3323,
2045
] | Test |
1,179 | 4 | Automated_threat:automated threat automated threat type computer security threat computer network web application characterised malicious use automated tools internet bots automated threats popular internet complete large amounts repetitive tasks almost cost execute owasp automated threat handbook provides threat ontology list classifying automated threats enumerated | [
2558,
612,
9293,
2262
] | Test |
1,180 | 9 | David_Gries:david gries david gries born 26 april 1939 flushing queens new york american computer scientist cornell university united states primarily known books science programming 1981 logical approach discrete math 1993 fred b. schneider currently associate dean undergraduate programs cornell university college engineering research interests include programming methodology related areas programming languages programming language semantics logic son paul gries co-author introductory textbook computer programming using python professor teaching stream department computer science university toronto gries graduated queens college 1960 spent following two years working programmer-mathematician u.s naval weapons laboratory met wife elaine gries earned master degree mathematics university illinois urbana-champaign 1963 illinois gries worked manfred paul ruediger wiehle write full algol compiler ibm 7090 computer earned dr. rer nat 1966 munich university technology studying friedrich l. bauer joseph stoer gries assistant professor stanford university 1966–1969 became associate professor cornell university ithaca new york spent next 30 years including stint chair computer science department 1982–1987 guggenheim fellowship 1984–1985 spent 1999–2002 university georgia athens returned cornell january 2003 author co-author editor seven textbooks 75 research papers david gries currently lives ithaca new york gries recipient four major educator awards computer science holds two honorary doctorates among first ten cornell faculty awarded cornell weiss presidential fellowship contributions undergraduate education 1994 inducted fellow association computing machinery co-authoring axiomatic proof technique parallel programs | [
512,
3529,
726,
1783,
5496
] | Validation |
1,181 | 3 | Fixstars_Solutions:fixstars solutions fixstars solutions inc software services company specializing multi-core processors particularly nvidia gpu cuda environment ibm power7 cell also specialize solid-state drives currently manufacture world largest sata drives early part 2010 fixstars developed strong relationship nvidia focused linux distribution gpu computing yellow dog enterprise linux cuda first enterprise linux os optimized gpu computing offers end users developers integrators faster reliable less complex gpu computing experience november 11 2008 japanese company fixstars announced acquired essentially terra soft assets terra soft former founder ceo kai staats appointed coo fixstars new american subsidiary fixstars solutions based irvine california fixstars solutions retained terra soft product line staff regional offices loveland colorado terra soft provided software services powerpc/power isa linux os platform former terra soft solutions produced yellow dog linux ydl yellow dog enterprise linux included cluster construction tools customers included argonne sandia lawrence livermore los alamos national labs several department defense contractors including boeing lockheed martin saic u.s. airforce navy army nasa many top universities around world including california institute technology mit stanford university apple value-added reseller ibm business partner terra soft solutions provided turnkey build-to-order desktop workstations servers high performance computing clusters terra soft made yellow dog linux distribution solely powerpc/power isa optimizing distributions altivec cell terra soft first support variety apple computers linux pre-installed unique license apple apple abandoned powerpc cpus favor intel core chips terra soft able concentrate high-performance computing cell broadband engine working closely ibm sony playstation 3 products 2006 terra soft contracted sony provide linux operating system playstation 3 used several university researchers inexpensive powerful cluster compute node today fixstars tokyo japan carries forward yellow dog linux yellow dog enterprise linux product line primary focus heterogeneous multi-core cpus cell broadband engine nvidia gpu | [
6311,
8937,
10985,
7983,
306,
10675,
8120,
8700
] | Test |
1,182 | 4 | Hacker_Halted:hacker halted hacker halted global series computer information security conferences presented ec-council objective hacker halted conferences raise international awareness towards increased education ethics security event currently 14th year also present hacker halted ec-council h cker halted academy trainings workshops led ec-council instructors trainers hacker halted malaysia held 2004 2007 2018 new delhi hacker halted conference held egypt 13 14 december 2018 hacker halted dubai held 2005 2006 dubai united hacker halted singapore held 2005 singapore hacker halted mexico held 2005 mexico hacker halted japan held november 11 2008 tokyo japan hacker halted usa held 2008 myrtle beach south carolina hacker halted usa held september 20–24 2009 miami florida hilton head hotel include events include capture flag event hacker halted usa held 2010 miami hacker halted usa held miami 25 27 october 2011 theme 2011 stop data leaks secure code hacker halted usa held miami october 29–31 2012 hacker halted usa held atlanta 2013 2014 2015 2016 2017 2018 hacker halted usa 2019 returns atlanta ga talks include tracks include hacker halted usa 2009 launch hacker halted academy hacker halted academy series classes presented ec-council partners many classes include ec-council training certification including certified ethical hacker licensed penetration tester well vendor specific certification including certified information systems security professional cissp nsa nsa information security assessment methodology iam /information security evaluation methodology iem training | [
3112,
7449,
10307,
357
] | Test |
1,183 | 3 | Amazon_(video_game):amazon video game amazon interactive fiction graphic adventure game game published telarium formerly known trillium 1984 written michael crichton best-selling novelist director michael crichton computer hobbyist taught programming language basic early 1980s programmer stephen warady artist david durand began developing apple ii graphic adventure game based crichton novel congo sometimes programmed game sequences warady converted much faster assembly language worked project 18 months crichton found publisher spinnaker software approached adapting novels telarium division new bookware games author revealed game amazing spinnaker signed contract late 1983 crichton realize however already sold adaptation rights congo another party team revised game renamed amazon moving setting africa south america changing diamond mine emerald mine novel amy talking gorilla became paco talking parrot game mostly complete telarium able port commodore 64 amazon release crichton later said disappointed game due technological limitations time development amazon best-selling telarium title many 100,000 copies sold majority likely commodore 64 computer gaming world praised rarely used animated graphics crichton cooperation designers stating cohesive manner game storyline unfolds reflects crichton skill writer james delson family computing reviewed apple ii version wrote game limited graphics choice delson also noted game difficulty wrote patience virtue game necessity german reviewers recognized suspenseful atmospheric elaborated prose storyline graphics text parser got score sehr gut good | [
9166,
477,
9006,
6407
] | None |
1,184 | 9 | Interpress:interpress interpress page description language developed xerox parc based forth programming language earlier graphics language called jam parc unable commercialize interpress two creators chuck geschke john warnock left xerox formed adobe systems produced similar language called postscript interpress used xerox printers supported xerox ventura publisher interpress also used output format parc interscript system editable word processor format rich text documents | [
3904,
10280,
8763,
8628
] | Validation |
1,185 | 7 | Grid_MP:grid mp grid mp commercial distributed computing software package developed sold univa formerly known united devices privately held company based primarily austin texas formerly known metaprocessor prior release version 4.0 however letters mp grid mp officially stand anything grid mp provides job scheduling prioritization user security restrictions selective application exclusion user-activity detection time-of-day execution controls grid mp used manage computational devices consisting corporate desktop pcs departmental servers dedicated cluster nodes computational devices arranged device groups organizational security administrative control grid mp demonstrated capable managing grids large numbers nodes use infrastructure grid.org world community grid projects world community grid project migrated open-source berkeley open infrastructure network computing software 2007 despite ability scale seamlessly hundreds thousands device nodes also suitable smaller clusters enterprise servers workstations mp grid services interface simply mgsi offers web service api via soap xml-rpc protocols http enables developers back-end application services access manipulate objects within system access api objects access controlled security restricted per-object basis since mgsi web service protocol programming language soap xml-rpc library available used interface although commonly c++ java perl php used web-based mp management console simply mpmc provides administrators simplified easy-to-use interface monitor system activity control security settings manage system objects mpmc written php programming language uses mgsi web service interactions system mp agent known ud agent versions 4.0 software agent must installed computer participate grid mp installation running jobs mp agent installed computer officially recognized grid mp device grid mp enterprise version 5.5 mp agent supported following platforms | [
9602,
8582,
6797,
1806,
2064,
6421,
1304,
10020,
5677,
7983,
823,
5956,
8644,
7134,
5356,
499,
2804,
10486,
1399,
3449,
8700
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.