node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
1,786 | 3 | Solbourne_Computer:solbourne computer solbourne computer inc. originally vendor computer systems based longmont colorado united states first 52 owned matsushita late 1980s early 1990s company produced range computer workstations servers based sparc microprocessor architecture largely compatible sun microsystems sun-4 systems notable supporting symmetric multiprocessing time sun produced multiprocessor systems even sun produced multiprocessor systems sunos uses asymmetric multiprocessing model rather os/mp symmetric multiprocessing model sun would adopt symmetric multiprocessing release solaris 2.0 1992 due cost engineering producing new systems compete sun increasingly competitive hardware offerings loss symmetric multiprocessing distinguishing feature 1994 solbourne left computer hardware business grumman systems support corporation taking support solbourne customers 2000 1994 walt pounds assumed role ceo solbourne solbourne headquarters moved boulder colorado point july 2008 solbourne focused providing consulting services solutions based oracle applications associated technologies solbourne established strong reputation oracle e-business suite community become dominant provider consulting services state local oracle e-business suite customers july 11 2008 solbourne closed transaction sell substantially company assets deloitte consulting solbourne management team 100 professionals joined deloitte ’ enterprise applications technology integration human capital service areas solbourne range comprises following solbourne systems run os/mp modified version sunos 4.1 supporting multiprocessor systems final release os/mp 4.1d corresponding sunos 4.1.3. work done porting openbsd solbourne idt workstations | [
9665,
10436,
2895,
1399,
9438
] | Test |
1,787 | 3 | Flappy:flappy flappy first appeared sharp x1 home computer 1983 debut soon followed conversions number popular japanese computers early 1980s including nec line pcs fujitsu fm series ports msx computer line family computer released 1985. db-soft produced sequel difficult puzzles called king flappy benefit anyone managed clear original 200 levels sides game calls nintendo game boy port released exclusively japan 1990 published victor musical industries beautiful planet blue star home-planet young boy named flappy invaded dark emperor ngalo-ngolo proud inhabitants blue star wanting neither war invasion self-destruct along planet path self-determination flappy however boarded onto escape capsule headed neighboring planet seviras father survives capsule sees fragments exploded blue star rain incessantly planet seviras wandering aimlesslessly planet seviras flappy reaches oasis suddenly hears voice sky saying 'gather fragments blue star blue stones blue area gathered ... flappy believing miracle occurred begins journey gather blue stones gravity gaps floors wandering enemies stand way flappy reaching goal flappy pick throw sleeping mushrooms enemies knock drop stones crush permanently however many obstacles along way brick walls must work way around brown stones crush also crush fall holes dead angles blue stone becomes irretrievable falls moving enemies game features two enemies unicorns ebira unicorns green creatures move mostly-repetitive horizontal patterns ebira red crab-like enemies word ebi japanese term shellfish relentlessly chase flappy horizontally vertically ebira tend mimic flappy movements flappy must careful avoid charged persistent ebira floppy beyond floppy clones apple ii | [
9006,
9137,
7622
] | None |
1,788 | 3 | MicroSPARC:microsparc microsparc code-named tsunami microprocessor implementing sparc v8 instruction set architecture isa developed sun microsystems low-end microprocessor intended low-end workstations embedded systems microprocessor developed sun floating-point unit fpu licensed meiko scientific contained 800,000 transistors two derivatives microsparc microsparc-ii microsparc-iiep microsparc-iiep 100 mhz microsparc-ii integrated pci controller embedded systems developed fabricated lsi logic sun microprocessor used sun javastation network computer | [
9090,
9731,
1801,
4235,
1809,
4241,
1818,
8863,
1707,
2731,
10926,
3247,
11440,
8625,
6322,
1461,
4664,
4285,
6464,
7104,
9665,
2895,
3919,
597,
2269,
9955,
7270,
11626,
878,
5358,
1776,
11636,
1399,
5375
] | None |
1,789 | 4 | Fluentd:fluentd fluentd cross platform open-source data collection software project originally developed treasure data written primarily ruby programming language fluentd big data tool semi- un-structured data sets like apache kafka analyzes event logs application logs clickstreams according suonsyrjä mikkonen core idea fluentd unifying layer different types log inputs outputs fluentd available linux mac osx windows fluentd created sadayuki furuhashi project mountain view-based firm treasure data written primarily ruby source code released open-source software october 2011 company announced 5 million funding 2013 fluentd one data collection tools recommended amazon web services 2013 said similar apache flume scribe google cloud platform bigquery recommends fluentd default real-time data-ingestion tool uses google customized version fluentd called google-fluentd default logging agent | [
961,
3269,
7983,
7248,
564,
11221,
823,
9245
] | Test |
1,790 | 2 | Panos_(operating_system):panos operating system panos discontinued computer operating system developed acorn computers 1980s released 1985 ran 32016 second processor bbc micro acorn cambridge workstation systems essentially architecture based 32-bit ns32016 cpu acw bbc micro-based i/o processor access i/o processor ns32016 firmware kernel called pandora panos ran ns32016 rudimentary single-user operating system written modula-2 provided simple command line interpreter text editor access dfs adfs nfs file systems via i/o processor targeted academic scientific user community came bundled compilers fortran 77 c pascal lisp programming languages following list commands supported panos command line interpreter | [
9762,
6502,
4679,
7847,
8262,
3722,
8524,
10862,
7983,
1750,
11033,
1849,
9978,
5435,
2045,
6558,
5759
] | None |
1,791 | 3 | Ntoskrnl.exe:ntoskrnl.exe computing ntoskrnl.exe short windows nt operating system kernel executable also known kernel image provides kernel executive layers microsoft windows nt kernel space responsible various system services hardware abstraction process memory management thus making fundamental part system contains cache manager executive kernel security reference monitor memory manager scheduler dispatcher system binary native application linked codice_1 instead containing standard 'start entry point its-own function calls architecture-independent kernel initialization function ntoskrnl.exe linked codice_1 linked codice_3 codice_4 codice_5 requires static copy c runtime objects depends executable usually 2mb size overall four kernel image files revision windows two kernel image files windows system multiprocessor uniprocessor files selected install time pae non-pae files selected boot.ini bcd option according routines ntoskrnl use prefixes names indicate component ntoskrnl defined following table lists kernel receives control gets pointer structure parameter structure passed bootloader contains information hardware path registry file kernel parameters containing boot preferences options change behavior kernel path files loaded bootloader codice_6 registry hive nls character encoding conversion vga font definition structure retrieved using kernel debugger downloading microsoft symbol database x86 architecture kernel receives system already protected mode gdt idt tss ready since know address one load one one fill pcr structure main entry point ntoskrnl.exe performs system dependent initialization calls system independent initialization enters idle loop modern operating systems use interrupts instead i/o port polling wait information devices x86 architecture interrupts handled interrupt dispatch table idt device triggers interrupt interrupt flag flags register set processor hardware looks interrupt handler table entry corresponding interrupt number turn translated irq pic chips modern hardwares apic interrupt handlers usually save subset state registers handling restore back original values done interrupt table contains handlers hardware interrupts software interrupts exceptions ia-32 versions kernel one example software interrupt handler many idt table entry 2e hexadecimal 46 decimal used assembly language codice_7 system calls real implementation entry points internal subroutine named per symbol information published microsoft codice_8 newer versions different mechanisms making use codice_9 instruction x86-64 codice_10 instruction used instead one notable feature nt interrupt handling interrupts usually conditionally masked based priority called irql instead disabling irqs via interrupt flag permits various kernel components carry critical operations without necessarily blocking services peripherals devices microsoft windows divides virtual address space two regions lower part starting zero instantiated separately process accessible user kernel mode application programs run processes supply code runs user mode upper part accessible kernel mode exceptions instantiated system-wide ntoskrnl.exe mapped region several kernel mode components region also contains data used kernel mode code kernel mode heaps file system cache entire physical memory ram address range broken many small usually 4 kb blocks properties block stored structures called page table entries managed os accessed processor hardware page tables organized tree structure physical page number top-level table stored control register 3 cr3 windows registry repository configuration settings information operating system software applications thought filesystem optimized small files however accessed file system-like semantics rather specialized set apis implemented kernel mode exposed user mode registry stored disk several different files called hives one system hive loaded early boot sequence provides configuration information required time additional registry hives providing software-specific user-specific data loaded later phases system initialization user login respectively list drivers loaded disk retrieved codice_11 key current control set key codice_6 registry hive key stores device drivers kernel processes user processes collectively called services stored mixed place initialization upon driver load request kernel transverses tree looking services tagged kernel services | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
3620,
8740,
1577,
10281,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
602,
603,
9819,
3170,
622,
9839,
4210,
5234,
7796,
1656,
6265,
7290,
4731,
10879,
8841,
67... | Test |
1,792 | 4 | Context-based_access_control:context-based access control context-based access control cbac feature firewall software intelligently filters tcp udp packets based application layer protocol session information used intranets extranets internets cbac configured permit specified tcp udp traffic firewall connection initiated within network needing protection words cbac inspect traffic sessions originate external network however example discusses inspecting traffic sessions originate external network cbac inspect traffic sessions originate either side firewall basic function stateful inspection firewall without cbac traffic filtering limited access list implementations examine packets network layer transport layer however cbac examines network layer transport layer information also examines application-layer protocol information ftp connection information learn state tcp udp session allows support protocols involve multiple channels created result negotiations ftp control channel multimedia protocols well protocols ftp rpc sql*net involve multiple control channels cbac inspects traffic travels firewall discover manage state information tcp udp sessions state information used create temporary openings firewall access lists allow return traffic additional data connections permissible sessions sessions originated within protected internal network cbac deep packet inspection hence termed ios firewall cbac also provides following benefits | [
4480,
2049,
2563,
8838,
6797,
8210,
1172,
11413,
9496,
3482,
1436,
4511,
3616,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
10924,
4912,
8753,
10417,
823,
569,
5178,
11577,
9279,
5057,
1858,
10433,
7364,
5573,
2118,
11073,
4814,
... | Train |
1,793 | 5 | ALCAP:alcap control plane protocol transport layer 3rd generation umts networks called alcap access link control application part alcap defined 3gpp equivalent itu recommendation q.2630.2 basic functionality alcap multiplexing different users onto one aal2 transmission path using channel ids cids used umts access network utran along atm ipbcp use ip links core network alcap makes possible 248 channels multiplexed onto one aal2 bearer access link control application part alcap alcap protocol used control plane transport layer umts charge managing multiplexing users atm aal2 virtual connections alcap specified iub iur iu circuit switched domain interfaces protocol used interfaces atm-based itu-t q.2630.2 standard aal type 2 signalling protocol capability set 2 chosen alcap protocol history iub iur interfaces alcap specified 3gpp ts 25.426 iu interface alcap specified 3gpp ts 25.414 protocol dependencies | [] | None |
1,794 | 8 | Dark_social_media:dark social media dark social media dark social dark traffic social shares contain digital referral information source idea generally used web analytics well online advertising contrary sharing social networking service like facebook done publicly dark social done privately irc channels emails sms simply copy-and-paste ways private sharing confuse deep web dark social media content traffic online sharing sharing activities often come name direct typed/bookmarked similar form today web analytic services 2014 believed dark social consisted 69 sharing activities globally whereas facebook holds 23 however exact nature dark social media still unknown word dark name suggests unknown can't-see heart concept like dark energy astronomy alexis madrigal curious traffic really coming site worked atlantic grew time web built knew ways share information big name sites like facebook lead believe large portion web traffic coming “ bookmarked ” “ typed ” sources led believe help web analytics firm chartbeat able quantify traffic something much meaningful article wrote brought usage term dark social dark social also known direct social dark traffic however alexis madrigal ’ term dark social widely used dark social media perceived differently looking desktop computers vs mobile computers 2014 almost 50 total external mobile traffic dark social traffic meaning traffic referrer showing coming contrast one-third external desktop traffic dark social 2014 two years alexis madrigal wrote original post dark social started notice dark social traffic could come mobile devices well madrigal mentioned since october 2015 facebook changed algorithm mobile app resulted media publisher receiving 100 traffic meantime also noticed atlantic company used work received lot dark social traffic facebook mobile traffic alexis madrigal later performed experiment confirm theory dark social traffic boost indeed facebook mobile app found referrer links facebook ’ mobile app ’ always pass destination website creates dark social traffic mobile devices updated charbeat report also confirmed part dark social traffic generated facebook mobile app users addition facebook mobile app dark social traffic also come reddit mobile app gmail instant messaging apps well one radiumone ’ report published february 2016 dark side mobile sharing company stated found 84 online traffic coming dark social channels date furthermore also showed dark social traffic 62 mobile devices 38 desktops rise smart phones mobile apps largely increased dark social traffic mobile devices last years amount dark social traffic mobile devices jumps 53 2014 62 2016 dark social traffic comes desktops decreases 47 2014 38 2016 dark social traffic consists mostly one-to-one messaging non-dark channels facebook messenger snapchat rather commonly used one-to-many methods example sharing twitter feed facebook wall traditional analytics tools rely upon links shared private messaging methods may include referral tags analytics tool simply appear though came direct traffic could include referral tags copy pasted another non-dark social channel referral tags always carried private messaging becomes impossible tell person sharing dark traffic originally obtained content another referral method directly copy-pasting link makes difficult marketers understand effective social media marketing strategy make changes accordingly combat lack transparency websites include attractive ways share links simply copy-pasting another application example sites implement highly visible share buttons copy-paste button buttons share link referral tag directly dark social channel like whatsapp facebook messenger email rules also made within traditional analytics tools filter dark social traffic include direct links exclude n't referred homepage analytics tools also beginning incorporate ability distinguish dark social copy-paste based traffic types traffic invisible web also known deep web dark social referring web traffic analyzed invisible web referring websites data indexed search engines essence kinds information invisible general population internet dark social data found web analytics software see traffic originates invisible web data show using search engines like google search microsoft bing hidden results unintentional dark web associated dark social invisible web mainly hidden nature dark web data data intentionally hidden internet involved wish remain anonymous interest shares content share psychology dark social sharing found people share three reasons dark social sharing allows individualism people able freely express choosing what- whom- share rather broadcasting everything “ friends. ” dark social sharing creates “ personal ” channel sharing elevates builds personal relationships even defying geographical boundaries dark social sharing allows people feel helpful trend interesting sharing smaller intimate social circle sharer gets knowledgeable within groups giving street cred email im common sources dark social sharing facebook may actually part cause increase dark social-through chatting messaging services sources dark social reddit stumbleupon twitter tumblr linkedin google+ whatsapp viber kwik firechat om livetext evidence pew research age accounts sharing darkly sharing means tracked easier baby boomers born 1946-1964 gen xers born 1965-1981 commonly share email word mouth fact gen xers heaviest users email considered dark social millennials born 1982-1995 younger tend toward social media sharing applications often reported dark addition sharing professionally darkly linkedin requires upwards 15 hours week impact certain platforms also attract types populations blogs lgbt communinty | [
6576,
5182
] | Test |
1,795 | 2 | SUNMOS:sunmos sunmos sandia/unm operating system operating system jointly developed sandia national laboratories computer science department university new mexico goal project started 1991 develop highly portable yet efficient operating system massively parallel-distributed memory systems sunmos uses single-tasking kernel provide demand paging takes control nodes distributed system application loaded running manage available memory node use full resources provided hardware applications started controlled process called yod runs host node yod runs sun frontend ncube 2 service node intel paragon sunmos developed reaction heavy weight version osf/1 ran single-system image paragon consumed 8-12 mb 16 mb available node leaving little memory available compute applications comparison sunmos used 250 kb memory per node additionally overhead osf/1 limited network bandwidth 35 mb/s sunmos able use 170 mb/s peak 200 mb/s available ideas sunmos inspired puma multitasking variant ran i860 paragon among extensions puma portals api scalable high performance message passing api intel ported puma portals pentium pro based asci red system named cougar cray ported cougar opteron based cray xt3 renamed catamount version catamount released public named opencatamount 2009 catamount lightweight kernel selected r 100 award | [
9665,
6179,
7432,
10411,
7983,
1168,
8242,
118,
86
] | Test |
1,796 | 2 | Network_Utility:network utility network utility application included macos provides variety tools used related computer network information gathering analysis network utility shows information network connections including mac address interface ip addresses assigned speed status count data packets sent received count transmission errors collisions available services tools found network utility examples network utility help network utility uses tools supplied unix directories functions however port scan uses unix executable resources folder stroke found network utility.app/contents/resources/stroke | [
4615,
8204,
5647,
1042,
6700,
4657,
1074,
576,
9802,
5713,
3670,
4184,
2141,
4702,
2149,
8303,
6771,
2676,
9343,
3719,
10888,
11402,
8852,
1686,
7318,
3228,
2207,
1699,
5292,
8877,
1710,
3766,
2232,
9912,
9406,
1729,
6849,
713,
9418,
3790... | None |
1,797 | 4 | Chosen-ciphertext_attack:chosen-ciphertext attack chosen-ciphertext attack cca attack model cryptanalysis cryptanalyst gather information obtaining decryptions chosen ciphertexts pieces information adversary attempt recover hidden secret key used decryption formal definitions security chosen-ciphertext attacks see example michael luby mihir bellare et al number otherwise secure schemes defeated chosen-ciphertext attack example el gamal cryptosystem semantically secure chosen-plaintext attack semantic security trivially defeated chosen-ciphertext attack early versions rsa padding used ssl protocol vulnerable sophisticated adaptive chosen-ciphertext attack revealed ssl session keys chosen-ciphertext attacks implications self-synchronizing stream ciphers well designers tamper-resistant cryptographic smart cards must particularly cognizant attacks devices may completely control adversary issue large number chosen-ciphertexts attempt recover hidden secret key clear whether public key cryptosystems withstand chosen ciphertext attack initial breakthrough work moni naor moti yung 1990 suggested mode dual encryption integrity proof known naor-yung encryption paradigm work made understanding notion security chosen ciphertext attack much clearer open research direction constructing systems various protections variants attack cryptosystem vulnerable chosen-ciphertext attack implementers must careful avoid situations adversary might able decrypt chosen-ciphertexts i.e. avoid providing decryption oracle difficult appears even partially chosen ciphertexts permit subtle attacks additionally issues exist cryptosystems rsa use mechanism sign messages decrypt permits attacks hashing used message signed better approach use cryptosystem provably secure chosen-ciphertext attack including among others rsa-oaep secure random oracle heuristics cramer-shoup first public key practical system secure symmetric encryption schemes known authenticated encryption primitive based symmetric encryption gives security chosen ciphertext attacks first shown jonathan katz moti yung chosen-ciphertext attacks like attacks may adaptive non-adaptive adaptive chosen-ciphertext attack attacker use results prior decryptions inform choices ciphertexts decrypted non-adaptive attack attacker chooses ciphertexts decrypted without seeing resulting plaintexts seeing plaintexts attacker longer obtain decryption additional ciphertexts specially noted variant chosen-ciphertext attack lunchtime midnight indifferent attack attacker may make adaptive chosen-ciphertext queries certain point attacker must demonstrate improved ability attack system term lunchtime attack refers idea user computer ability decrypt available attacker user lunch form attack first one commonly discussed obviously attacker ability make adaptive chosen ciphertext queries encrypted message would safe least ability taken away attack sometimes called non-adaptive chosen ciphertext attack non-adaptive refers fact attacker adapt queries response challenge given ability make chosen ciphertext queries expired full adaptive chosen-ciphertext attack attack ciphertexts may chosen adaptively challenge ciphertext given attacker stipulation challenge ciphertext may queried stronger attack notion lunchtime attack commonly referred cca2 attack compared cca1 lunchtime attack practical attacks form rather model important use proofs security chosen-ciphertext attacks proof attacks model impossible implies realistic chosen-ciphertext attack performed practical adaptive chosen-ciphertext attack bleichenbacher attack pkcs 1 numerous cryptosystems proven secure adaptive chosen-ciphertext attacks proving security property based algebraic assumptions additionally requiring idealized random oracle assumption example cramer-shoup system secure based number theoretic assumptions idealization number subtle investigations also established practical scheme rsa-oaep secure rsa assumption idealized random oracle model | [
9058,
9156,
11241,
11119,
177,
9745,
1941,
1688,
8286,
3774,
4639
] | None |
1,798 | 3 | Comparison_of_instruction_set_architectures:comparison instruction set architectures instruction set architecture isa abstract model computer also referred architecture computer architecture realization isa called implementation isa permits multiple implementations may vary performance physical size monetary cost among things isa serves interface software hardware software written isa run different implementations isa enabled binary compatibility different generations computers easily achieved development computer families developments helped lower cost computers increase applicability reasons isa one important abstractions computing today isa defines everything machine language programmer needs know order program computer isa defines differs isas general isas define supported data types state main memory registers semantics memory consistency addressing modes instruction set set machine instructions comprises computer machine language input/output model early decades computing computers used binary decimal even ternary contemporary computers almost exclusively binary computer architectures often described n -bit architectures today n often 8 16 32 64 sizes used actually strong simplification computer architecture often less natural datasizes instruction set hardware implementation may different many architectures instructions operating half and/or twice size respective processors major internal datapaths examples 8080 z80 mc68000 well many others type implementations twice wide operation typically also takes around twice many clock cycles case high performance implementations 68000 instance means 8 instead 4 clock ticks particular chip may described 32-bit architecture 16-bit implementation external databus width often useful determine width architecture ns32008 ns32016 ns32032 basically 32-bit chip different external data buses ns32764 64-bit bus used 32-bit registers width addresses may may different width data early 32-bit microprocessors often 24-bit address system/360 processors number operands one factors may give indication performance instruction set three-operand architecture allow computed one instruction two-operand architecture allow computed one instruction two instructions need executed simulate single three-operand instruction architecture may use big little endianness configurable use either little endian processors order bytes memory least significant byte multi-byte value lowest-numbered memory location big endian architectures instead order significant byte lowest-numbered address x86 architecture well several 8-bit architectures little endian risc architectures sparc power powerpc mips originally big endian arm little endian many including arm configurable endianness applies processors allow individual addressing units data bytes smaller basic addressable machine word usually number registers power two e.g 8 16 32 cases hardwired-to-zero pseudo-register included part register files architectures mostly simplify indexing modes table counts integer registers usable general instructions moment architectures always include special-purpose registers program pointer pc counted unless mentioned note architectures sparc register window architectures count indicates many registers available within register window also non-architected registers register renaming counted note common type architecture load-store synonym register register meaning instructions access memory except special – load register – store register – possible exceptions atomic memory operations locking table compares basic information instruction sets implemented cpu architectures | [
7173,
9739,
2066,
7699,
5655,
10779,
8732,
10781,
6181,
8231,
2088,
10796,
3630,
6705,
7218,
2623,
2113,
7234,
3142,
2638,
7770,
9309,
1122,
7269,
3175,
7783,
8815,
7281,
630,
8822,
6268,
3197,
7820,
7313,
663,
9369,
6815,
8352,
5793,
681... | Validation |
1,799 | 9 | Gauche_(Scheme_implementation):gauche scheme implementation gauche r7rs scheme implementation designed scripting production environment intended allow programmers system administrators write scripts support daily operations quick startup built-in system interface native multilingual support key design goals gauche free software bsd license primarily developed shiro kawai | [
10083,
8262,
10347,
5612,
7983,
9780,
10012
] | Validation |
1,800 | 0 | Genetic_fuzzy_systems:genetic fuzzy systems genetic fuzzy systems fuzzy systems constructed using genetic algorithms genetic programming mimic process natural evolution identify structure parameter comes automatically identifying building fuzzy system given high degree nonlinearity output traditional linear optimization tools several limitations therefore framework soft computing genetic algorithms gas genetic programming gp methods used successfully identify structure parameters fuzzy systems fuzzy systems fundamental methodologies represent process linguistic information mechanisms deal uncertainty imprecision instance task modeling driver parking car involves greater difficulty writing concise mathematical model description becomes detailed however level difficulty much using simple linguistic rules fuzzy remarkable attributes fuzzy systems widely successfully applied control classification modeling problems mamdani 1974 klir yuan 1995 pedrycz gomide 1998 although simplistic design identification fuzzy system rather complex task comprises identification input output variables b rule base knowledge base c membership functions mapping parameters usually rule base consists several if-then rules linking input output simple rule fuzzy controller could temperature hot cooling high numerical impact/meaning rule depends membership functions hot high shaped defined construction identification fuzzy system divided structure b parameter identification fuzzy system structure fuzzy system expressed input output variables rule base parameters fuzzy system rule parameters defining membership functions aggregation operator implication function mapping parameters related mapping crisp set fuzzy set vice versa bastian 2000 much work done develop adapt methodologies capable automatically identifying fuzzy system numerical data particularly framework soft computing significant methodologies proposed objective building fuzzy systems means genetic algorithms gas genetic programming gp given high degree nonlinearity output fuzzy system traditional linear optimization tools limitations genetic algorithms demonstrated robust powerful tool perform tasks generation fuzzy rule base optimization fuzzy rule bases generation membership functions tuning membership functions cordón et al. 2001a tasks considered optimization search processes within large solution spaces bastian hayashi 1995 yuan zhuang 1996 cordón et al. 2001b genetic algorithms powerful tools identify fuzzy membership functions pre-defined rule base limitation especially also comes identify input output variables fuzzy system given set data genetic programming used identify input variables rule base well involved membership functions fuzzy model bastian 2000 last decade multi-objective optimization fuzzy rule based systems attracted wide interest within research community practitioners based use stochastic algorithms multi-objective optimization search pareto efficiency multiple objectives scenario instance objectives simultaneously optimize accuracy complexity accuracy interpretability recent review field provided work fazzolari et al 2013 addition 1 provides up-to-date continuously growing list references subject | [] | None |
1,801 | 3 | Computer_data_storage:computer data storage digvijay singh computer data storage often called storage memory technology consisting computer components recording media used retain digital data core function fundamental component computers central processing unit cpu computer manipulates data performing computations practice almost computers use storage hierarchy puts fast expensive small storage options close cpu slower larger cheaper options farther away generally fast volatile technologies lose data power referred memory slower persistent technologies referred storage even first computer designs charles babbage analytical engine percy ludgate analytical machine clearly distinguished processing memory babbage stored numbers rotations gears ludgate stored numbers displacements rods shuttles distinction extended von neumann architecture cpu consists two main parts control unit arithmetic logic unit alu former controls flow data cpu memory latter performs arithmetic logical operations data without significant amount memory computer would merely able perform fixed operations immediately output result would reconfigured change behavior acceptable devices desk calculators digital signal processors specialized devices von neumann machines differ memory store operating instructions data computers versatile need hardware reconfigured new program simply reprogrammed new in-memory instructions also tend simpler design relatively simple processor may keep state successive computations build complex procedural results modern computers von neumann machines modern digital computer represents data using binary numeral system text numbers pictures audio nearly form information converted string bits binary digits value 1 0 common unit storage byte equal 8 bits piece information handled computer device whose storage space large enough accommodate binary representation piece information simply data example complete works shakespeare 1250 pages print stored five megabytes 40 million bits one byte per character data encoded assigning bit pattern character digit multimedia object many standards exist encoding e.g. character encodings like ascii image encodings like jpeg video encodings like mpeg-4 adding bits encoded unit redundancy allows computer detect errors coded data correct based mathematical algorithms errors generally occur low probabilities due random bit value flipping physical bit fatigue loss physical bit storage ability maintain distinguishable value 0 1 due errors inter intra-computer communication random bit flip e.g. due random radiation typically corrected upon detection bit group malfunctioning physical bits always specific defective bit known group definition depends specific storage device typically automatically fenced-out taken use device replaced another functioning equivalent group device corrected bit values restored possible cyclic redundancy check crc method typically used communications storage error detection detected error retried data compression methods allow many cases database represent string bits shorter bit string compress reconstruct original string decompress needed utilizes substantially less storage tens percents many types data cost computation compress decompress needed analysis trade-off storage cost saving costs related computations possible delays data availability done deciding whether keep certain data compressed security reasons certain types data e.g. credit-card information may kept encrypted storage prevent possibility unauthorized information reconstruction chunks storage snapshots generally lower storage hierarchy lesser bandwidth greater access latency cpu traditional division storage primary secondary tertiary off-line storage also guided cost per bit contemporary usage memory usually semiconductor storage read-write random-access memory typically dram dynamic ram forms fast temporary storage storage consists storage devices media directly accessible cpu secondary tertiary storage typically hard disk drives optical disc drives devices slower ram non-volatile retaining contents powered historically memory called core memory main memory real storage internal memory meanwhile non-volatile storage devices referred secondary storage external memory auxiliary/peripheral storage primary storage also known main memory internal memory prime memory often referred simply memory one directly accessible cpu cpu continuously reads instructions stored executes required data actively operated also stored uniform manner historically early computers used delay lines williams tubes rotating magnetic drums primary storage 1954 unreliable methods mostly replaced magnetic core memory core memory remained dominant 1970s advances integrated circuit technology allowed semiconductor memory become economically competitive led modern random-access memory ram small-sized light quite expensive time particular types ram used primary storage also volatile i.e lose information powered shown diagram traditionally two sub-layers primary storage besides main large-capacity ram main memory directly indirectly connected central processing unit via memory bus actually two buses diagram address bus data bus cpu firstly sends number address bus number called memory address indicates desired location data reads writes data memory cells using data bus additionally memory management unit mmu small device cpu ram recalculating actual memory address example provide abstraction virtual memory tasks ram types used primary storage volatile uninitialized start computer containing storage would source read instructions order start computer hence non-volatile primary storage containing small startup program bios used bootstrap computer read larger program non-volatile secondary storage ram start execute non-volatile technology used purpose called rom read-only memory terminology may somewhat confusing rom types also capable random access many types rom literally read updates possible however slow memory must erased large portions re-written embedded systems run programs directly rom similar programs rarely changed standard computers store non-rudimentary programs rom rather use large capacities secondary storage non-volatile well costly recently primary storage secondary storage uses refer historically called respectively secondary storage tertiary storage secondary storage also known external memory auxiliary storage differs primary storage directly accessible cpu computer usually uses input/output channels access secondary storage transfer desired data primary storage secondary storage non-volatile retaining data power shut modern computer systems typically two orders magnitude secondary storage primary storage secondary storage less expensive modern computers hard disk drives hdds solid-state drives ssds usually used secondary storage access time per byte hdds ssds typically measured milliseconds one thousandth seconds access time per byte primary storage measured nanoseconds one billionth seconds thus secondary storage significantly slower primary storage rotating optical storage devices cd dvd drives even longer access times examples secondary storage technologies include usb flash drives floppy disks magnetic tape paper tape punched cards ram disks disk read/write head hdds reaches proper placement data subsequent data track fast access reduce seek time rotational latency data transferred disks large contiguous blocks sequential block access disks orders magnitude faster random access many sophisticated paradigms developed design efficient algorithms based upon sequential block access another way reduce i/o bottleneck use multiple disks parallel order increase bandwidth primary secondary memory secondary storage often formatted according file system format provides abstraction necessary organize data files directories also providing metadata describing owner certain file access time access permissions information computer operating systems use concept virtual memory allowing utilization primary storage capacity physically available system primary memory fills system moves least-used chunks pages swap file page file secondary storage retrieving later needed lot pages moved slower secondary storage system performance degraded tertiary storage tertiary memory level secondary storage typically involves robotic mechanism mount insert dismount removable mass storage media storage device according system demands data often copied secondary storage use primarily used archiving rarely accessed information since much slower secondary storage e.g 5–60 seconds vs. 1–10 milliseconds primarily useful extraordinarily large data stores accessed without human operators typical examples include tape libraries optical jukeboxes computer needs read information tertiary storage first consult catalog database determine tape disc contains information next computer instruct robotic arm fetch medium place drive computer finished reading information robotic arm return medium place library tertiary storage also known nearline storage near online formal distinction online nearline offline storage example always-on spinning hard disk drives online storage spinning drives spin automatically massive arrays idle disks maid nearline storage removable media tape cartridges automatically loaded tape libraries nearline storage tape cartridges must manually loaded offline storage off-line storage computer data storage medium device control processing unit medium recorded usually secondary tertiary storage device physically removed disconnected must inserted connected human operator computer access unlike tertiary storage accessed without human interaction off-line storage used transfer information since detached medium easily physically transported additionally case disaster example fire destroys original data medium remote location probably unaffected enabling disaster recovery off-line storage increases general information security since physically inaccessible computer data confidentiality integrity affected computer-based attack techniques also information stored archival purposes rarely accessed off-line storage less expensive tertiary storage modern personal computers secondary tertiary storage media also used off-line storage optical discs flash memory devices popular much lesser extent removable hard disk drives enterprise uses magnetic tape predominant older examples floppy disks zip disks punched cards storage technologies levels storage hierarchy differentiated evaluating certain core characteristics well measuring characteristics specific particular implementation core characteristics volatility mutability accessibility addressability particular implementation storage technology characteristics worth measuring capacity performance non-volatile memory retains stored information even constantly supplied electric power suitable long-term storage information volatile memory requires constant power maintain stored information fastest memory technologies volatile ones although universal rule since primary storage required fast predominantly uses volatile memory dynamic random-access memory form volatile memory also requires stored information periodically reread rewritten refreshed otherwise would vanish static random-access memory form volatile memory similar dram exception never needs refreshed long power applied loses content power supply lost uninterruptible power supply ups used give computer brief window time move information primary volatile storage non-volatile storage batteries exhausted systems example emc symmetrix integrated batteries maintain volatile storage several minutes utilities hdparm sar used measure io performance linux full disk encryption volume virtual disk encryption andor file/folder encryption readily available storage devices hardware memory encryption available intel architecture supporting total memory encryption tme page granular memory encryption multiple keys mktme sparc m7 generation since october 2015.. commonly used data storage media semiconductor magnetic optical paper still sees limited usage fundamental storage technologies all-flash arrays afas proposed development semiconductor memory uses semiconductor-based integrated circuits store information semiconductor memory chip may contain millions tiny transistors capacitors volatile non-volatile forms semiconductor memory exist modern computers primary storage almost exclusively consists dynamic volatile semiconductor memory dynamic random-access memory since turn century type non-volatile semiconductor memory known flash memory steadily gained share off-line storage home computers non-volatile semiconductor memory also used secondary storage various advanced electronic devices specialized computers designed early 2006 notebook desktop computer manufacturers started using flash-based solid-state drives ssds default configuration options secondary storage either addition instead traditional hdd magnetic storage uses different patterns magnetization magnetically coated surface store information magnetic storage non-volatile information accessed using one read/write heads may contain one recording transducers read/write head covers part surface head medium must moved relative another order access data modern computers magnetic storage take forms early computers magnetic storage also used optical storage typical optical disc stores information deformities surface circular disc reads information illuminating surface laser diode observing reflection optical disc storage non-volatile deformities may permanent read media formed write media reversible recordable read/write media following forms currently common use magneto-optical disc storage optical disc storage magnetic state ferromagnetic surface stores information information read optically written combining magnetic optical methods magneto-optical disc storage non-volatile sequential access slow write fast read storage used tertiary off-line storage 3d optical data storage also proposed light induced magnetization melting magnetic photoconductors also proposed high-speed low-energy consumption magneto-optical storage paper data storage typically form paper tape punched cards long used store information automatic processing particularly general-purpose computers existed information recorded punching holes paper cardboard medium read mechanically later optically determine whether particular location medium solid contained hole technologies allow people make marks paper easily read machine—these widely used tabulating votes grading standardized tests barcodes made possible object sold transported computer readable information securely attached group bits malfunction may resolved error detection correction mechanisms see storage device malfunction requires different solutions following solutions commonly used valid storage devices device mirroring typical raid designed handle single device failure raid group devices however second failure occurs raid group completely repaired first failure data lost probability single failure typically small thus probability two failures raid group time proximity much smaller approximately probability squared i.e. multiplied database tolerate even smaller probability data loss raid group replicated mirrored many cases mirroring done geographically remotely different storage array handle also recovery disasters see disaster recovery secondary tertiary storage may connect computer utilizing computer networks concept pertain primary storage shared multiple processors lesser degree large quantities individual magnetic tapes optical magneto-optical discs may stored robotic tertiary storage devices tape storage field known tape libraries optical storage field optical jukeboxes optical disk libraries per analogy smallest forms either technology containing one drive device referred autoloaders autochangers robotic-access storage devices may number slots holding individual media usually one picking robots traverse slots load media built-in drives arrangement slots picking devices affects performance important characteristics storage possible expansion options adding slots modules drives robots tape libraries may 10 100,000 slots provide terabytes petabytes near-line information optical jukeboxes somewhat smaller solutions 1,000 slots robotic storage used backups high-capacity archives imaging medical video industries hierarchical storage management known archiving strategy automatically migrating long-unused files fast hard disk storage libraries jukeboxes files needed retrieved back disk | [
2051,
2066,
2073,
29,
2077,
8231,
8233,
8235,
8236,
2104,
4154,
8254,
2113,
6210,
8266,
2127,
4183,
10327,
4193,
10340,
4221,
4235,
6286,
4241,
4248,
6296,
8352,
4257,
2212,
2217,
6322,
4285,
4286,
10429,
2241,
6338,
2243,
10436,
8395,
10... | Test |
1,802 | 9 | Ajax_(programming):ajax programming ajax also ajax short asynchronous javascript xml set web development techniques using many web technologies client side create asynchronous web applications ajax web applications send retrieve data server asynchronously background without interfering display behavior existing page decoupling data interchange layer presentation layer ajax allows web pages extension web applications change content dynamically without need reload entire page practice modern implementations commonly utilize json instead xml ajax single technology rather group technologies html css used combination mark style information webpage modified javascript dynamically display—and allow user interact with—the new information built-in xmlhttprequest object since 2017 new fetch function within javascript commonly used execute ajax webpages allowing websites load content onto screen without refreshing page ajax new technology different language existing technologies used new ways early-to-mid 1990s web sites based complete html pages user action required complete new page loaded server process inefficient reflected user experience page content disappeared new page appeared time browser reloaded page partial change content re-sent even though information changed placed additional load server made bandwidth limiting factor performance 1996 iframe tag introduced internet explorer like object element load fetch content asynchronously 1998 microsoft outlook web access team developed concept behind xmlhttprequest scripting object appeared xmlhttp second version msxml library shipped internet explorer 5.0 march 1999 functionality xmlhttp activex control ie 5 later implemented mozilla safari opera browsers xmlhttprequest javascript object microsoft adopted native xmlhttprequest model internet explorer 7 activex version still supported internet explorer microsoft edge utility background http requests asynchronous web technologies remained fairly obscure started appearing large scale online applications outlook web access 2000 oddpost 2002 google made wide deployment standards-compliant cross browser ajax gmail 2004 google maps 2005 october 2004 kayak.com public beta release among first large-scale e-commerce uses developers time called xml http thing increased interest ajax among web program developers term ajax publicly used 18 february 2005 jesse james garrett article titled ajax new approach web applications based techniques used google pages 5 april 2006 world wide web consortium w3c released first draft specification xmlhttprequest object attempt create official web standard latest draft xmlhttprequest object published 6 october 2016 term ajax come represent broad group web technologies used implement web application communicates server background without interfering current state page article coined term ajax jesse james garrett explained following technologies incorporated since however number developments technologies used ajax application definition term ajax xml longer required data interchange therefore xslt longer required manipulation data javascript object notation json often used alternative format data interchange although formats preformatted html plain text also used variety popular javascript libraries including jquery include abstractions assist executing ajax requests asynchronous html http ahah involves using xmlhttprequest retrieve x html fragments inserted directly web page example simple ajax request using get method written javascript get-ajax-data.js send-ajax-data.php many developers dislike syntax used xmlhttprequest object following workarounds created popular javascript library jquery implemented abstractions enable developers use ajax conveniently although still uses xmlhttprequest behind scenes following client-side implementation example using 'ajax method jquery also implements 'get method allows code written concisely .get 'send-ajax-data.php .done function data .fail function data fetch new native javascript api although yet fully supported browsers gaining momentum popular way execute ajax according google developers documentation fetch makes easier make web requests handle responses older xmlhttprequest fetch 'send-ajax-data.php // es7 async/await example async function doajax doajax seen fetch relies javascript promises | [
9732,
6154,
9229,
1556,
3604,
6176,
7713,
3626,
7212,
10284,
4658,
1083,
64,
4171,
5198,
5199,
8289,
4707,
4198,
7784,
9834,
113,
9841,
119,
124,
5765,
6791,
1674,
148,
5784,
1698,
1203,
8883,
7862,
4797,
5311,
7871,
6338,
1223,
11466,
... | None |
1,803 | 4 | File_inclusion_vulnerability:file inclusion vulnerability file inclusion vulnerability type web vulnerability commonly found affect web applications rely scripting run time issue caused application builds path executable code using attacker-controlled variable way allows attacker control file executed run time file include vulnerability distinct generic directory traversal attack directory traversal way gaining unauthorized file system access file inclusion vulnerability subverts application loads code execution successful exploitation file inclusion vulnerability result remote code execution web server runs affected web application attacker use remote code execution create web shell web server used website defacement remote file inclusion rfi occurs web application downloads executes remote file remote files usually obtained form http ftp uri user-supplied parameter web application local file inclusion lfi similar remote file inclusion vulnerability except instead including remote files local files i.e files current server included execution issue still lead remote code execution including file contains attacker-controlled data web server access logs php main cause due use unvalidated user-input filesystem function includes file execution notable codice_1 codice_2 statements vulnerabilities attributed novice programmers familiar capabilities php programming language php language directive enabled allows filesystem functions use url retrieve data remote locations directive codice_3 php versions 4.3.4 codice_4 since php 5.2.0 php 5.x directive disabled default prior versions enabled default exploit vulnerability attacker alter variable passed one functions cause include malicious code remote resource mitigate vulnerability user input needs validated used consider php script includes file specified request php form method= get /form developer intended read codice_5 codice_6 alter application behavior display language user choice possible inject another path using codice_7 parameter best solution case use whitelist accepted language parameters strong method input validation whitelist used rely upon input filtering validation passed-in path make sure contain unintended characters character patterns however may require anticipating possible problematic character combinations safer solution use predefined switch/case statement determine file include rather use url form parameter dynamically generate path javaserver pages jsp scripting language include files execution runtime following script vulnerable file inclusion vulnerability server side include uncommon typically enabled default web server server-side include used gain remote code execution vulnerable web server following code vulnerable remote-file inclusion vulnerability doctype html html head title test file /title /head body -- include file= user_language -- /body /html code xss vulnerability rather including new file executed server | [
2432,
2945,
5888,
899,
5636,
522,
4494,
11154,
1429,
5397,
9762,
10412,
5682,
10492,
4797,
7364,
8644,
331,
10959,
225,
612,
4198,
7526,
119,
3708
] | None |
1,804 | 2 | TOPS-10:tops-10 tops-10 system timesharing total operating system-10 discontinued operating system digital equipment corporation dec pdp-10 decsystem-10 mainframe computer family launched 1967 tops-10 evolved earlier monitor software pdp-6 pdp-10 computers renamed tops-10 1970 tops-10 supported shared memory allowed development one first true multiplayer computer games game called decwar text-oriented star trek type game users terminals typed commands fought real time tops-10 also home original multi user dungeon mud fore runner today mmorpgs another groundbreaking application called forum application perhaps first so-called cb simulator allowed users converse one another known chat room application showed potential multi-user communication led development compuserve chat application tops-10 robust application programming interface api used mechanism called uuo unimplemented user operation uuos implemented operating system calls way made look like machine instructions monitor call api much ahead time like operating system made system programming decsystem-10s simple powerful tops-10 scheduler supported prioritized run queues appended process onto queue depending priority system also included user file device independence following list commands supported tops-10 pdp-6 monitor software first released 1964 support pdp-10 ka10 processor added monitor release 2.18 1967 tops-10 name first used 1970 release 5.01 release 6.01 may 1974 first tops-10 implement virtual memory demand paging enabling programs larger physical memory run release 7.00 onwards symmetrical multiprocessing available opposed master/slave arrangement used final release tops-10 7.04 1988 hobbyists entitled set use tops-10 hobbyist license easiest way hobbyist run tops-10 acquire suitable emulator operating system image tops-10 may also generated archived original distribution tapes paul allen maintained several publicly accessible historic computer systems including decsystem-2065 running tops-10 request account try running tops-10 original equipment tops-10 assembler macro-10 bundled tops-10 distribution following programming languages implemented tops-10 layered products following programming languages implemented tops-10 contributions decus members following major user utilities implemented tops-10 ms-dos heavily influenced tops-10 identical elements include three character long file extensions several standard extensions eg exe txt asterisk wildcard usage slash character switch separator | [
512,
2560,
2,
6155,
6675,
7187,
7189,
10776,
25,
8729,
4637,
9759,
9762,
4643,
6180,
5158,
7217,
10803,
9784,
10809,
576,
2625,
3650,
8262,
4684,
6221,
3160,
10333,
97,
11363,
6760,
10856,
8298,
9835,
7285,
4727,
2168,
9335,
634,
1147,
... | None |
1,805 | 9 | Mallard_BASIC:mallard basic mallard basic basic interpreter cp/m written locomotive software supplied amstrad pcw range small business computers zx spectrum +3 version cp/m plus acorn bbc micro z80 second processor 1980s standard industry practice bundle basic interpreter microcomputers pcw followed practice primarily wordprocessor business use dedicated wp also ran cp/m operating system though existing implementations basic cp/m digital research cbasic third-party zbasic followed earlier 1970s model compilers fed source code prepared separate text editor mallard like traditional micro rom basic integrated editor tailored pcw non-standard 90-column screen although pcw actually excellent monochrome graphics support time specification closely comparable hercules graphics card pc mallard basic graphics support whatsoever instead locomotive optimised business use instance full isam random-access file support making easier write database applications also optimised speed named lner a4 class 4468 mallard locomotive fastest steam locomotive world displaying company fondness railway-oriented nomenclature instance see company name fact locomotive name came phrase run like train theme used name mallard basic locomotive product named anything railway-oriented acorn version designed simply run compact software small business accounting products acorn including target z80 second processor small businesses mallard major innovation designed specifically acorn addition jetsam b*-tree keyed access filing system give similar superior features miksam product compact originally designed around graphics could implemented loading gsx extension cp/m cumbersome basic programmers lack graphics support rectified several basic toolkits popular lightning extended basic leb—see external links patched mallard basic replacing redundant let keyword leb could followed wide variety parameters allow sophisticated graphics time drawn screen saved disc printed et cetera probably widespread mallard application ever rped text editor supplied pcw name short roland perry editor program put together quickly roland perry amstrad executive running computer product development realised cp/m-80 came usable full-screen editor users requirement edit configuration files problem apparent dos plus ms-dos supplied ibm-compatible amstrad computers rped machines written 8086 assembler mallard basic pc version mallard basic still available locoscript software ms-dos program run windows disc version licence full introduction reference manual | [
3718,
7691,
9997,
786,
11412,
22,
3736,
3481,
9881,
797,
1952,
3233,
11683,
5925,
8101,
4136,
10666,
8494,
303,
7343,
7983,
11315,
4409,
315,
7355,
7486,
7870,
4160,
4674,
6596,
10750,
712,
8393,
9166,
847,
1879,
92,
11229,
2915,
9188,
... | Test |
1,806 | 7 | United_Devices:united devices united devices inc. privately held commercial distributed computing company focused use grid computing manage high-performance computing systems enterprise cluster management products services allowed users allocate workloads computers devices throughout enterprises aggregating computing power would normally go unused operated name univa ud time merging univa september 17 2007 founded 1999 austin texas united devices began distributed computing expertise distributed.net seti home although original technical staff organizations remained years april 2001 grid.org formally announced philanthropic non-profit website demonstrate benefits internet-based large scale grid computing later 2002 help ud ntt data launched similar internet-based cell computing project targeting japanese users 2004 ibm united devices worked together start world community grid project another demonstration internet-based grid computing august 2005 united devices acquired paris-based gridxpert company added synergy product lineup 2006 company acknowledged seeing industry shift using grid computing compute-intensive applications towards data center automation business application optimization partly response market shifts reorganization grid.org shut april 27 2007 completing mission demonstrate viability benefits large-scale internet-based grid computing september 17 2007 company announced would merge lisle illinois-based univa operate new name univa ud combined company would offer open source solutions based around globus toolkit continuing sell existing grid products support existing customers june 26 2008 united devices client software world community grid finished role completely relayed boinc 2001 2007 united devices operated series public projects grid.org website part philanthropic effort also acted marketing tool helping spread awareness grid mp product demonstrating platform scalability costs associated operating past projects grid.org financially sponsored part companies including microsoft intel ibm april 27 2007 united devices closed grid.org cancer research project announcement completed mission demonstrate viability benefits large-scale internet-based grid computing | [
11353,
1185,
9602,
5956,
3282,
6421,
2710,
2040,
3449,
7802,
3323
] | Test |
1,807 | 5 | NCSA_Telnet:ncsa telnet ncsa telnet implementation telnet protocol created university illinois urbana-champaign national center supercomputing applications 1986 continuously developed 1995 initial implementation ran mac os microsoft ms-dos provided basic dec vt102 terminal emulation well support multiple simultaneous connections internal ftp server time ncsa telnet first implementation telnet macintosh pc provided ability connect multiple hosts simultaneously time program evolved added features revisions user interface support tektronix 4010/4014 vector terminal emulation protocol downloading viewing raster images added 1987 short-lived version sun microsystems sunos released although pc version ncsa telnet lost popularity microsoft windows widespread use macintosh version remained use throughout 1990s basic tool connectivity academic commercial installations ncsa telnet originally used built-in tcp/ip protocol stack communicate network standard apis became available network communication program adapted use methods notably apple mactcp however built-in stack one completely independently developed tcp/ip stacks use time continued ship software years ncsa telnet released open source software although term yet coined time spawned number spin-off products including | [
1664,
6657,
3971,
7943,
8584,
9736,
6028,
6171,
9757,
10910,
7713,
679,
10791,
9908,
4661,
3639,
5054,
9665,
7364,
10436,
10057,
7885,
9166,
4310,
5078,
6231,
2777,
8281,
4326,
11112,
8169,
8557,
494,
6133,
4345,
8443,
637
] | None |
1,808 | 7 | Entera:entera entera middleware product introduced mid-1990s open environment corporation oec early implementation three-tiered client–server model|client–server model development model entera viewed business software collection services rather monolithic application entera designed allow companies build manage large multinational information systems preserving existing investments skill sets hardware software systems multi-tiered architecture solved problems inherent first generation client/server application development including lack scalability software maintenance|manageability application security vendor lock-in entera built industry-standard distributed computing infrastructures supported variety programming language management framework origination oec oec ’ purchase borland software rights entera acquired ecube systems llc 2003 today entera nxtera still used fortune 1000 companies several countries developed maintained marketed ecube systems 1992 open environment corporation “ oec ” located cambridge massachusetts released middleware product called “ oec toolkit. ” product eventually would become known “ entera ” first middleware product sold application server platform subsequent years company added entera three-tier application monitoring called appminder transaction processing system called entera fx next nine years oec sold tens millions dollars worth entera least 300 fortune 1000 customers 1995 oec went public completing initial public offering nasdaq stock exchange ticker continuing develop entera two primary versions software developed transmission control protocol tcp version distributed computing environment dce latter based dcs cell directory service dce endpoint mapper dce threads computer science |threads despite various challenges dce version entera became popular ibm customer base simplified complexity dce development time oec developers began work fourth version entera aimed unifying tcp dce versions used dce endpoint mapper provide stability increased performance newer version implemented multithreading software |multithreading broker persistence prior acquisition oec developed number products including oec toolkit encompass netminder entera workbench oec3270 appminder entera ole entera fx 1996 year going public oec acquired borland borland continued invest entera software peaked popularity time 300 fortune 1000 companies using entera worldwide post-buyout transition phase original entera development team underwent changes entera 4.0 released prematurely causing problems use replacement entera 3.2 borland responded releasing version 4.1 proved stable version 2000 stable version 4.2.1 released next years borland sold hundreds copies entera new former entera customers time borland also developed professional services organizations capable working diverse programming environments november 1997 borland announced acquisition visigenic software vsgn corba vendor developer visibroker visibroker overlapped entera ’ capabilities adding support java programming language |java programming language object computer science |object-orientation degree complexity distributed computing following year borland refocused efforts targeting enterprise applications development spent less time developing entera turned attention visibroker borland changed name inprise fusion “ integrating enterprise. ” new aim integrate borland ’ tools including delphi programming language |delphi c++builder jbuilder visigenic ’ cobra-based visibroker c++ java efforts concentrated visigenic software borland unsuccessfully attempted switch entera users visibroker ultimately discontinuing active development entera 2001 even experiencing growth within customer base borland quietly reallocated entera development resources borland licensed rights entera ecube systems llc 2002 provide migration path existing clients enable development entera platform ecube systems started former oec borland engineers architects still wanted develop product ecube systems continues support develop existing entera installations today latest version entera called nxtera added new technology models allows interoperability contemporary middleware technologies including messaging platforms web service standards soap rest july 2009 micro focus acquired borland 75 million february 2012 micro focus ecube systems announced cooperation delivery middleware consulting today ecube micro focus collaborate variety middleware projects category middleware category distributed computing | [
8122,
2948,
10020,
8262,
7175,
10924,
5677,
10486,
7802,
5404
] | Test |
1,809 | 3 | Sun-1:sun-1 sun-1 first generation unix computer workstations servers produced sun microsystems launched may 1982 based cpu board designed andy bechtolsheim graduate student stanford university funded darpa sun-1 systems ran sunos 0.9 port unisoft uniplus v7 port seventh edition unix motorola 68000 microprocessor window system early sun-1 workstations servers used original sun logo series red u laid square rather familiar purple diamond shape used later first sun-1 workstation sold solo systems may 1982 sun-1/100 used original lucasfilm editdroid non-linear editing system sun 1 workstation based stanford university sun workstation designed andy bechtolsheim advised vaughan pratt forest baskett graduate student co-founder sun microsystems heart design multibus cpu memory video display cards cards used sun-1 workstation second-generation design private memory bus allowing memory expanded 2 mb without performance degradation sun 68000 board introduced 1982 powerful single-board computer combined 10 mhz motorola 68000 microprocessor sun designed memory management unit mmu 256 kb zero wait state memory parity 32 kb eprom memory two serial ports 16-bit parallel port intel multibus ieee 796 bus interface single multibus form factor using motorola 68000 processor tightly coupled sun-1 mmu sun 68000 cpu board able support multi-tasking operating system unix included advanced sun designed multi-process two-level memory management unit facilities memory protection code sharing demand paging memory sun-1 mmu necessary motorola 68451 mmu always work correctly 68000 could always restore processor state page fault cpu board included 256 kb memory could replaced augmented two additional memory cards total 2 mb although memory cards used multibus form factor used multibus interface power memory access via smaller private p2 bus synchronous private memory bus allowed simultaneous memory input/output transfers also allowed full performance zero wait state operation memory installing first 1 mb expansion board either 256 kb memory cpu board first 256 kb expansion board disabled on-board i/o included dual serial port uart 16-bit parallel port serial ports implemented intel 8274 uart later nec d7201c uart serial port wired data communications equipment dce port full modem control also console port graphical display installed system serial port b wired data terminal equipment dte port modem control serial ports could also used terminal ports quite often allowing 3 people use one workstation although two graphical displays 16-bit parallel port special purpose port connecting 8-bit parallel port keyboard 8-bit parallel port optical mouse workstations graphical displays parallel port never used general purpose parallel printer port cpu board included fully compatible multibus ieee 796 bus asynchronous bus accommodated devices various transfer rates maintaining maximum throughput 20 address lines could address 1 mb multibus memory 1 mb i/o locations although i/o devices decoded first 64 kb address space sun cpu board fully supported multi-master functionality allowed share multibus dma devices keyboard micro switch 103sd30-2 keytronic p2441 german market memory-mapped bit-mapped frame buffer graphics board resolution 1024×1024 pixels 1024×800 displayed monitor graphics board included hardware accelerate raster operations ball model hd17h 17-inch video display monitor used ethernet board available originally implementing 3 mbit/s xerox parc ethernet specification later upgraded 3com 10 mbit/s version interphase smd 2180 disk controller could installed connect four fujitsu 84 mb m2313k cdc 16.7 mb 8.35 mb fixed 8.35 mb removable 9455 lark drives boards installed 6 7-slot multibus card cage later documentation shows 13- 19-inch color display available color frame buffer resolution 640×512 pixels 640×480 displayed monitor board could display 256 colors palette 16 million ½-inch 9-track reel-to-reel tape drives qic-02 ¼-inch cartridge tape drives also added offering also second generation sun-1 cpu board referred sun-1.5 cpu board sun-1 systems upgraded sun-2 multibus cpu boards identified u suffix model number | [
3328,
9090,
9731,
1158,
1801,
4235,
8207,
4241,
4114,
9363,
5141,
2710,
1818,
8863,
7072,
9343,
8994,
1316,
10789,
1707,
2731,
5677,
3247,
9137,
6322,
2871,
4664,
4285,
6464,
7104,
6338,
9665,
10051,
10436,
8007,
1480,
2895,
3919,
597,
32... | Test |
1,810 | 6 | ECryptfs:ecryptfs ecryptfs enterprise cryptographic filesystem package disk encryption software linux implementation posix-compliant filesystem-level encryption layer aiming offer functionality similar gnupg operating system level part linux kernel since version 2.6.19 ecryptfs package included ubuntu since version 9.04 used implementing ubuntu encrypted home directory feature ecryptfs derived erez zadok cryptfs uses variant openpgp file format encrypted data extended allow random access storing cryptographic metadata including per-file randomly generated session key individual file also encrypts file directory names makes internally longer average one third reason needs uuencode encrypted names eliminate unwanted characters resulting name lowers maximum usable byte name length original file system entry depending used file system lead four times fewer characters example asian utf-8 file names | [
5120,
2050,
6669,
3598,
10257,
6677,
5142,
8214,
9762,
5158,
3629,
11323,
9281,
8772,
8283,
4708,
9836,
7789,
7794,
5749,
9333,
6263,
9335,
9343,
4746,
7818,
8331,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
7344,
2230,
5... | Test |
1,811 | 7 | ShowDocument:showdocument showdocument online web application allows multiple users conduct web meetings upload share review documents remote locations service developed hbr labs company established 2007 users collaborate review documents real time annotations text visible users accessible co-editing idea every user able annotate cause conflicts within sessions main navigation options presenter control given different user well earlier version application contrast allowed users navigate edit causing system drop incomplete edits possible draw write virtual whiteboard stream youtube video group full synchronization feature also exists co-browsing google maps entering open session application done given code number sending\receiving link email message different file formats uploaded saved either online offline pdf pdf file text edited text edited separate text editor although platform contains text chat intended replace instant messaging software extensive messaging features application paid free version free version limitations audio video options disabled number participants limited sessions time-limited showdocument first developed 2007 september 8 2009 hbr labs released new version included features secure online document storage mobile device support | [
7983,
8627,
6797,
823
] | None |
1,812 | 8 | Wt_(web_toolkit):wt web toolkit wt pronounced witty open-source widget-centric web framework c++ programming language api resembling qt framework although developed boost incompatible mixed qt also using widget-tree event-driven signal/slot system wt design goal benefit stateful component model used desktop-applications apis applied web development—instead traditional mvc model–view–controller design pattern rather using mvc level web page pushed level individual components library uses desktop software development process support web-specific features including one unique features wt abstraction layer browser rendering model library uses ajax communicating browsers compatible using plain html-form post-backs user agents using progressive bootstrap-method user interface rendered plain html document first provided support browser automatically upgraded use ajax increased interactivity way wt definition popularity c/c++ embedded system environments wt often used devices consequence highly optimized performance detailed overview see features section official website hello world program wt | [
1920,
1666,
3462,
8582,
1802,
4490,
2062,
9614,
2576,
9491,
148,
6941,
9245,
10526,
10654,
803,
3876,
8739,
2470,
9128,
4777,
8618,
2603,
5165,
2222,
7983,
4529,
7987,
692,
8883,
5048,
7608,
6074,
190,
8639,
9666,
1347,
1348,
8644,
4550,
... | None |
1,813 | 2 | List_of_software_package_management_systems:list software package management systems list software package management systems categorized first package format binary source code hybrid operating system family following package management systems distribute apps binary package form i.e. apps compiled ready installed use following package management systems distribute source code apps either user must know compile packages come script automates compilation process example gobolinux recipe file contains information download unpack compile install package using compile tool cases user must provide computing power time needed compile app legally responsible consequences compiling package following unify package management several linux sometimes unix variants based concept recipe file wide variety package management systems common use today proprietary software operating systems handling installation proprietary free packages | [
2560,
2050,
10760,
5644,
7181,
2062,
1555,
5139,
8213,
9237,
6680,
10780,
4637,
9245,
3618,
5155,
5670,
9257,
7722,
5677,
1584,
9266,
3131,
6718,
3649,
10817,
8772,
3667,
6227,
2134,
3162,
2658,
11363,
6244,
6763,
9324,
8303,
1138,
2168,
... | Validation |
1,814 | 4 | X-Wrt:x-wrt x-wrt discontinued set packages patches provide web interface linux distribution openwrt based haserl nothing x window system allows web based management openwrt device originally created package openwrt white russian present found openwrt trunk webif package newer features dual-band support may present 31 october 2013 x-wrt homepage moved google code x-wrt extension openwrt end-user openwrt prior release 8.09 minimal web-management console whereas x-wrt supplied enhanced web-management console webif² 40 control status pages router webif² pages include graphical traffic system status monitoring pages control status network wireless security controls provided data logging booting cron nvram file editing linux package management snmp backup restore firmware upgrade wan vlan wi-fi wep wpa wds mac filtering firewall port forwarding dhcp dnsmasq hostnames ip control routing upnp qos dyndns wol openvpn pptp hotspots | [
2825,
5387,
1164,
1436,
3366,
7082,
3885,
686,
7983,
2228,
2996,
3133,
3007,
10303,
10433,
5959,
9927,
5322,
5067,
11086,
7887,
10451,
9048,
10329,
5978,
1754,
10332,
2811
] | Test |
1,815 | 4 | Steven_Murdoch:steven murdoch steven james murdoch security researcher computer science department university college london research covers privacy-enhancing technology internet censorship anonymous communication particular tor also known discovering several vulnerabilities emv bank chipcard payment system chip pin murdoch educated university cambridge completing phd computer security supervised markus kuhn 2008 | [
7652,
2558,
1783
] | None |
1,816 | 1 | Flyway_(software):flyway software flyway open source database migration tool flyway based around seven basic commands migrate clean info validate undo baseline repair migrations written sql database-specific syntax pl/sql t-sql etc supported java advanced data transformations dealing lobs command-line client java api also works android migrating database application startup maven plugin gradle plugin plugins available spring boot dropwizard grails play sbt ant griffon grunt ninja supported databases oracle sql server db2 mysql including amazon rds aurora mysql mariadb percona xtradb postgresql including amazon rds heroku aurora postgresql cockroachdb redshift informix h2 hsql derby sqlite sap hana sybase ase phoenix firebird flyway received 11,500,000 downloads 2018 alone january 2015 flyway placed adopt section thoughtworks technology radar june 2019 flyway acquired redgate | [
270,
11030,
8217,
4255,
5546,
1579,
5677,
9389,
7983,
8495,
10413,
10681,
9661,
6850,
5960,
8539,
10340,
8683,
5612,
7022,
7157,
4604,
9471
] | None |
1,817 | 7 | Feng_Office_Community_Edition:feng office community edition feng office community edition formerly opengoo open-source collaboration platform developed supported feng office opengoo community fully featured online office suite similar set features online office suites like g suite microsoft office live zimbra libreoffice online zoho office suite application downloaded installed server feng office could also categorized collaborative software personal information manager software feng office community edition main features include project management document management contact management e-mail time management text documents presentations created edited online files uploaded organized shared independent file formats organization information feng office community edition done using workspaces tags application presents information stored using different interfaces lists dashboards calendar views feng office community edition distributed gnu affero general public license version 3 feng office uses php javascript ajax extjs mysql technology several open source projects served basis development activecollab last open sourced release used initial code base includes ckeditor online document editing server could run operating system system needs following packages client side user required use modern web browser opengoo started degree project faculty engineering university republic uruguay project presented championed software engineer conrado viña software engineers marcos saiz ignacio de soto developed first prototype thesis professors eduardo fernández tomás laurenzo served tutors conrado ignacio marcos founded opengoo community remain active members core developers thesis approved highest score currently second project opengoo university developed students fernando rodríguez ignacio vázquez juan pedro del campo project aims build open source web-based spreadsheet december 2009 opengoo name changed feng office community edition | [
865,
9347,
8644,
3462,
3690,
3691,
5612,
6797,
7022,
7983,
11372,
9010,
119,
823,
11418,
2046,
6367
] | Test |
1,818 | 3 | SuperSPARC:supersparc supersparc microprocessor implements sparc v8 instruction set architecture isa developed sun microsystems 33 40 mhz versions introduced 1992 supersparc contained 3.1 million transistors fabricated texas instruments ti miho japan 0.8 micrometre triple-metal bicmos process two derivatives supersparc supersparc+ supersparc-ii supersparc+ developed remedy design flaws limited supersparc clock frequency thus performance supersparc-ii introduced 1994 major revision improvements enabled microprocessor reach 85 mhz desktop systems 90 mhz heavily cooled sparcserver-1000e supersparc-ii replaced 1995 64-bit ultrasparc implementation 64-bit sparc v9 isa | [
9090,
9731,
1801,
4235,
1809,
4241,
8863,
1707,
2731,
10926,
3247,
6322,
4664,
4285,
6464,
7104,
9665,
4172,
2895,
3919,
597,
2269,
9955,
7270,
11626,
5358,
1776,
11636,
630,
1399,
11129,
1788
] | Test |
1,819 | 8 | Qwiki:qwiki qwiki new york city based startup automated video production company qwiki released iphone app automatically turns pictures videos user camera roll movies share company initial product ipad application created video summaries 3 million search terms downloaded 3 million times named apple best search reference application 2011 integrating technology bing search engine launching video creation tools major publishers cooperation abc news company launched qwiki iphone received apple editor choice mentioned honoree 2013 webby two categories time inc. named qwiki one “ 10 nyc startups watch ” 2013 company investors include cofounders facebook youtube groupon co-founders qwiki inc. louis monier founder altavista search engine doug imbruce qwiki acquired yahoo july 2 2013 reported 50 million qwiki launched alpha testing mode january 24 2011 winning techcrunch disrupt award 2010 soon google offered buy qwiki 100-150 million declined january 2011 qwiki raised 8 million series financing round led primarily facebook co-founder eduardo saverin investors included jawed karim co-founder youtube pradeep sindhu co-founder juniper networks institutional investors included lerer media ventures tugboat ventures contour venture partners individual investor syndicate arranged new york city-based felix investments january 24 2011 qwiki launched public alpha march 2011 qwiki raised additional 1 million groupon lightbank co-founders brad keywell eric lefkofsky bringing total raised date 10.5 million april 2011 qwiki released ipad app version service application additional feature present web version lets user browse google maps displays qwiki annotations certain points linked content relevant locations seven weeks launch qwiki app downloaded 500,000 times february 2012 qwiki relocated new york city bay area offices order closer major media organizations may 2012 qwiki launched new platform bloggers online publishers including partnership abc news television network used qwiki technology abcnews.com goodmorningamerica.com june 2012 bing announced would display qwiki videos bing search pages wikipedia users able play qwikis without leaving search february 2013 qwiki iphone launched app store editors choice app downloaded 125k times first 6 days launch may 2013 time inc. named qwiki one 10 nyc startups watch 2013 july 2013 yahoo acquires qwiki 50 million september 2014 yahoo announced qwiki would close november 1 | [
6539,
8735,
9732,
735
] | Test |
1,820 | 2 | Executable_space_protection:executable space protection computer security executable-space protection marks memory regions non-executable attempt execute machine code regions cause exception makes use hardware features nx bit no-execute bit cases software emulation features however technologies somehow emulate supply nx bit usually impose measurable overhead using hardware-supplied nx bit imposes measurable overhead burroughs 5000 offered hardware support executable-space protection introduction 1961 capability remained successors least 2006 implementation tagged architecture word memory associated hidden tag bit designating code data thus user programs write even read program word data words executed operating system mark writable regions memory non-executable may able prevent stack heap memory areas executable helps prevent certain buffer-overflow exploits succeeding particularly inject execute code sasser blaster worms attacks rely part memory usually stack writeable executable attack fails many operating systems implement available executable space protection policy list systems alphabetical order technologies ordered newest oldest technologies summary gives major features technology supports summary structured technology supplying architecture independent emulation functional processors n't hardware supported supported line processors allow grey-area method explicit nx bit n't exist yet hardware allows one emulated way android 2.3 later architectures support non-executable pages default including non-executable stack heap initial support nx bit x86-64 ia-32 processors support first appeared freebsd -current june 8 2004 freebsd releases since 5.3 release linux kernel supports nx bit x86-64 ia-32 processors support modern 64-bit processors made amd intel transmeta via support feature 64-bit mode x86-64 cpus added 2004 andi kleen later year ingo molnar added support 32-bit mode 64-bit cpus features part linux kernel mainline since release kernel version 2.6.8 august 2004 availability nx bit 32-bit x86 kernels may run 32-bit x86 cpus 64-bit ia-32-compatible cpus significant 32-bit x86 kernel would normally expect nx bit amd64 ia-64 supplies nx enabler patch assures kernels attempt use nx bit present desktop linux distributions fedora ubuntu opensuse enable highmem64 option default default kernels required gain access nx bit 32-bit mode pae mode required use nx bit causes boot failures pre-pentium pro including pentium mmx celeron pentium processors without nx support processors support pae amd k6 earlier transmeta crusoe via c3 earlier geode gx lx vmware workstation versions older 4.0 parallels workstation versions older 4.0 microsoft virtual pc virtual server support pae guest fedora core 6 ubuntu 9.10 later provide kernel-pae package supports pae nx nx memory protection always available ubuntu systems hardware support ran 64-bit kernel 32-bit server kernel 32-bit pae desktop kernel linux-image-generic-pae ubuntu 9.10 later also provides pae mode needed hardware nx cpu feature systems lack nx hardware 32-bit kernels provide approximation nx cpu feature via software emulation help block many exploits attacker might run stack heap memory non-execute functionality also present non-x86 processors supporting functionality many releases red hat kernel developer ingo molnar released linux kernel patch named exec shield approximate utilize nx functionality 32-bit x86 cpus.the exec shield patch released linux kernel mailing list may 2 2003 rejected merging base kernel involved intrusive changes core code order handle complex parts emulation exec shield legacy cpu support approximates nx emulation tracking upper code segment limit imposes cycles overhead context switches intents purposes immeasurable legacy cpus without nx bit exec shield fails protect pages code segment limit mprotect call mark higher memory stack executable mark memory limit executable well thus situations exec shield schemes fails cost exec shield low overhead exec shield checks two elf header markings dictate whether stack heap needs executable called pt_gnu_stack pt_gnu_heap respectively exec shield allows controls set binary executables libraries executable loads library requiring given restriction relaxed executable inherit marking restriction relaxed pax nx technology emulate nx functionality use hardware nx bit pax works x86 cpus nx bit 32-bit x86 linux kernel still ship pax may 2007 patch must merged manually pax provides two methods nx bit emulation called segmexec pageexec segmexec method imposes measurable low overhead typically less 1 constant scalar incurred due virtual memory mirroring used separation execution data accesses segmexec also effect halving task virtual address space allowing task access less memory normally could problem task requires access half normal address space rare segmexec cause programs use system memory i.e ram restricts much access 32-bit cpus becomes 1.5 gb rather 3 gb pax supplies method similar exec shield approximation pageexec speedup however higher memory marked executable method loses protections cases pax falls back older variable-overhead method used pageexec protect pages cs limit may become quite high-overhead operation certain memory access patterns pageexec method used cpu supplying hardware nx bit hardware nx bit used thus significant overhead incurred pax supplies mprotect restrictions prevent programs marking memory ways produce memory useful potential exploit policy causes certain applications cease function disabled affected programs pax allows individual control following functions technology binary executable pax ignores pt_gnu_stack pt_gnu_heap past pax configuration option honor settings option removed security reasons deemed useful results pt_gnu_stack normally attained disabling mprotect restrictions program normally mprotect stack load may always true situations fails simply disabling pageexec segmexec effectively remove executable space restrictions giving task protections executable space non-pax system macos intel supports nx bit cpus supported apple mac os x 10.4.4 – first intel release – onwards mac os x 10.4 supported nx stack protection mac os x 10.5 64-bit executables nx stack heap w^x protection includes x86-64 core 2 later 64-bit powerpc g5 macs netbsd 2.0 later december 9 2004 architectures support non-executable stack heap architectures per-page granularity consist alpha amd64 hppa i386 pae powerpc ibm4xx sh5 sparc sun4m sun4d sparc64 architectures support region granularity i386 without pae powerpc macppc architectures benefit non-executable stack heap netbsd default use software emulation offer features architectures technology openbsd operating system known w^x marks writable pages default non-executable processors support 32-bit x86 processors code segment set include part address space provide level executable space protection openbsd 3.3 shipped may 1 2003 first include w^x solaris supported globally disabling stack execution sparc processors since solaris 2.6 1997 solaris 9 2002 support disabling stack execution per-executable basis added starting windows xp service pack 2 2004 windows server 2003 service pack 1 2005 nx features implemented first time x86 architecture executable space protection windows called data execution prevention dep windows xp server 2003 nx protection used critical windows services exclusively default x86 processor supported feature hardware nx features turned automatically windows xp/server 2003 default feature supported x86 processor protection given early implementations dep provided address space layout randomization aslr allowed potential return-to-libc attacks could feasibly used disable dep attack pax documentation elaborates aslr necessary proof-of-concept produced detailing method dep could circumvented absence aslr may possible develop successful attack address prepared data corrupted images mp3s known attacker microsoft added aslr functionality windows vista windows server 2008 platform dep implemented automatic use pae kernel 32-bit windows native support 64-bit kernels windows vista dep works marking certain parts memory intended hold data nx xd bit enabled processor understands non-executable windows version vista whether dep enabled disabled particular process viewed processes/details tab windows task manager windows implements software dep without use nx bit microsoft safe structured exception handling safeseh properly compiled applications safeseh checks exception raised program execution exception handler one defined application originally compiled effect protection attacker able add exception handler stored data page unchecked program input nx supported enabled default windows allows programs control pages disallow execution api well section headers pe file api runtime access nx bit exposed win32 api calls virtualalloc ex virtualprotect ex page may individually flagged executable non-executable despite lack previous x86 hardware support executable non-executable page settings provided since beginning pre-nx cpus presence 'executable attribute effect documented function result programmers used properly pe file format section specify executability execution flag existed since beginning format standard linkers always used flag correctly even long nx bit windows able enforce nx bit old programs assuming programmer complied best practices applications work correctly nx actually enforced cases problems microsoft .net runtime problems nx bit updated microsoft xbox although cpu nx bit newer versions xdk set code segment limit beginning kernel .data section code point normal circumstances starting version 51xx change also implemented kernel new xboxes broke techniques old exploits used become tsr however new versions quickly released supporting new version fundamental exploit unaffected code written executed runtime—a jit compiler prominent example—the compiler potentially used produce exploit code e.g using jit spray flagged execution therefore would trapped return-oriented programming allow attacker execute arbitrary code even executable space protection enforced | [
642,
8066,
5380,
6151,
6664,
3472,
1298,
3603,
8609,
8867,
1702,
9854,
6829,
9646,
7983,
5040,
5176,
2878,
2367,
1474,
7234,
3142,
3270,
6345,
1103,
4562,
725,
7421,
7134,
6754,
10851,
8167,
8551,
4841,
4074,
10603,
5356,
5871,
7920,
8944... | Test |
1,821 | 4 | Seal_(emblem):seal emblem seal device making impression wax clay paper medium including embossment paper also impression thus made original purpose authenticate document wrapper one modern envelope cover container package holding valuables objects seal-making device also referred seal matrix die imprint creates seal impression rarely sealing impression made purely relief resulting greater pressure paper high parts matrix touch seal known dry seal cases ink another liquid liquefied medium used another color paper traditional forms dry seal design seal matrix intaglio cut flat surface therefore design impressions made relief raised surface design impression reverse mirror-image matrix especially important script included design often case paper embossed behind matrix impression read way matrix impression relief however engraved gems often carved relief called cameo context giving counter-relief intaglio impression used seals process essentially mould seals always given single impression essentially flat surface medieval europe two-sided seals two matrices often used institutions rulers towns bishops kings make two-sided fully three-dimensional impressions wax tag piece ribbon strip parchment running pendent seal impressions dangled documents authenticated attachment tag sewn otherwise attached single-sided seals treated way jurisdictions consider rubber stamps specified signature-accompanying words seal l.s abbreviation locus sigilli place seal legal equivalent i.e equally effective substitute seal united states word seal sometimes assigned facsimile seal design monochrome color may used variety contexts including architectural settings flags official letterheads thus example great seal united states among uses appears reverse one-dollar bill several seals u.s. states appear respective state flags europe although coats arms heraldic badges may well feature contexts well seals seal design entirety rarely appears graphical emblem used mainly originally intended impression documents study seals known sigillography sphragistics seals used earliest civilizations considerable importance archaeology art history ancient mesopotamia carved engraved cylinder seals stone materials used could rolled along create impression clay could repeated indefinitely used labels consignments trade goods purposes normally hollow presumed worn string chain round neck many images often finely carved writing others ancient egypt seals form signet-rings see including names kings found tend show names hieroglyphics recently seals come light south arabia datable himyarite age one example shows name written aramaic yitsḥaq bar ḥanina engraved reverse read correctly impression beginning 3rd millennium bc middle ages seals various kinds production aegean islands mainland greece early minoan age formed soft stone ivory show particular characteristic forms middle minoan age new set seal forms motifs materials appear hard stone requires new rotary carving techniques late bronze age time par excellence lens-shaped seal seal ring continued archaic classical hellenistic periods form pictorial engraved gems major luxury art form became keenly collected king mithridates vi pontus first major collector according pliny elder collection fell booty pompey great deposited temple rome engraved gems continued produced collected 19th century pliny also explained significance signet ring time ring worn little finger known yinzhang china injang korea inshō japan ấn giám ấn chương vietnam seals used east asia form written identification since qin dynasty 221 bc– seals han dynasty impressed soft clay tang dynasty red ink made cinnabar normally used even modern times seals often known chops local colloquial english still commonly used instead handwritten signatures authenticate official documents financial transactions individuals organizations official seals often multiple seals different sizes styles different situations east asian seals usually bear names people organizations represented also bear poems personal mottoes sometimes types seals large seals bear names mottoes used authenticate official documents seals important east asia foreigners frequently conduct business also commission engraving personal seals east asian seals carved variety hard materials including wood soapstone sea glass jade east asian seals traditionally used red oil-based paste consisting finely ground cinnabar contrasts black ink traditionally used ink brush red chemical inks commonly used modern times sealing documents seal engraving considered form calligraphy east asia like ink-brush calligraphy several styles engraving engraving styles emulate calligraphy styles many styles highly stylized characters represented seal difficult untrained readers identify seal engravers considered artists past several famous calligraphers also became famous engravers seals carved famous engravers owned famous artists political leaders become valuable historical works art seals commissioned individuals carved artists every seal unique engravers often personalize seals create materials seals styles engraving typically matched personalities owners seals traditional modern conservative expressive seals sometimes carved owners zodiac animals tops seals seals also sometimes carved images calligraphy sides although utilitarian instrument daily business east asia westerners non-asians seldom see asian seals except asian paintings calligraphic art traditional paintings taiwan china japan korea rest east asia watercolor paintings silk paper surface red ink seals adhere east asian paintings often bear multiple seals including one two seals artist seals owners paintings east asian seals predecessors block printing direct line descent seals used ancient world used medieval post-medieval europe used legal contexts western world present day seals historically often impressed sealing wax often simply described wax middle ages generally comprised compound two-thirds beeswax one-third kind resin post-medieval period resin ingredients came dominate early middle ages seals lead properly bullae latin common use east west notable exception documents bulls issued papal chancery leaden authentications fell favour western christendom byzantine emperors sometimes issued documents gold seals known golden bulls wax seals used fairly regular basis western royal chanceries end 10th century england wax seals survived earlier date norman conquest although earlier matrices known recovered archaeological contexts earliest gold double-sided matrix found near postwick norfolk dated late 7th century next oldest mid-9th-century matrix bishop ethilwald probably æthelwold bishop east anglia practice sealing wax gradually moved social hierarchy monarchs bishops great magnates petty knights end 12th century ordinary freemen middle 13th century also came used variety corporate bodies including cathedral chapters municipalities monasteries etc. validate acts executed name traditional wax seals continue used certain high-status ceremonial documents 20th century gradually superseded many contexts inked dry embossed seals rubber stamps many instruments formerly required seals validity e.g deeds covenants unusual countries west private citizens use seals central eastern europe however east asia signature alone considered insufficient authenticate document kind business managers well many book-keepers employees personal seals normally containing text name position applied letters invoices issued similar documents europe today plastic self-inking stamps notaries also still use seals daily basis least britain registered notary individual personal seal registered authorities includes name pictorial emblem often animal—the combination found many seals ancient greece seals used primarily authenticate documents specifically carry legal import two main ways seal may attached document may applied directly face paper parchment applied seal may hang loose pendent seal pendent seal may attached cords ribbons sometimes owner livery colors two ends strip tag parchment threaded holes slots cut lower edge document document often folded double point plica provide extra strength alternatively seal may attached narrow strip material document case usually parchment sliced folded tail tongue detached object cases help ensure authenticity maintaining integrity relationship document seal prevent seal reuse forger tries remove applied seal document almost certainly break pendent seal easily detached cutting cords strips parchment forger would great difficulty attaching another document least cords parchment normally knotted inside seal would almost certainly break middle ages majority seals pendent attached legal instruments letters patent i.e open letters conferring rights privileges intended available view case important transactions agreements seals parties arrangement well witnesses might attached document executed would carry several seals governments still attach pendent seals letters patent applied seals contrast originally used seal document closed say document would folded seal applied way item could opened without seal broken applied seals used letters close letters intended recipient parcels indicate whether item opened tampered since left sender well providing evidence item actually sender forgery post-medieval period seals came commonly used way private letters letter writer would fold completed letter pour wax joint formed top page impress ring seal matrix governments sometimes sent letters citizens governmental seal eyes known letters secret wax seals might also used letterlocking techniques ensure intended recipient would read message general seals longer used ways except ceremonial purposes however applied seals also came used legal instruments applied directly face document need break use continues historically majority seals circular design although ovals triangles shield-shapes patterns also known design generally comprised graphic emblem sometimes always incorporating heraldic devices surrounded text legend running around perimeter legend often consisted merely words seal name owner either latin local vernacular language latin word sigillum frequently abbreviated simple occasionally legend took form motto middle ages became customary seals women ecclesiastics given vesica pointed oval shape central emblem often standing figure owner case ecclesiastical seals saint medieval townspeople used wide variety different emblems seals included image relating work sealing wax naturally yellowish pale brownish tone could also artificially colored red green many intermediary variations medieval royal chanceries different colours wax customarily used different functions departments state distinguish grants decrees made perpetuity ephemeral documents matrices pendent seals sometimes accompanied smaller counter-seal would used impress small emblem reverse impression cases seal counter-seal would kept two different individuals order provide element double-checking process authentication sometimes large official seal might custody chancery officials would need counter-sealed individual whose name applied monarch mayor town counter-seal might carried person perhaps secured chain cord later take form signet-ring would necessarily smaller pendent seals double-sided elaborate equally-sized obverses reverses impression would formed pressing sandwich matrices wax firmly together means rollers later lever-press screw press certain medieval seals complex still involving two levels impression side wax would used create scene three-dimensional depth death seal-holder sign continuity son heir might commission new seal employing symbols design-elements used father likely practice factor emergence hereditary heraldry western europe 12th century use seal men wealth position common christian era high functionaries church adopted habit incidental allusion one st. augustine letters 217 victorinus indicates used seal practice spread seems taken granted king clovis beginning merovingian dynasty later ecclesiastical synods require letters bishop seal given priests reason lawfully quit proper diocese ruling enacted chalon-sur-saône 813 pope nicholas century complained bishops dôle reims contra morem contrary custom sent letters unsealed custom bishops possessing seals may date assumed pretty general british museum collection earliest bishop seals preserved william de st-calais bishop durham 1081–96 st. anselm archbishop canterbury 1093–1109 seals also affixed architectural engineering construction documents land survey drawings certify identity licensed professional supervised development depending authority jurisdiction project seals may embossed signed stamped signed certain situations computer generated facsimile original seal validated digital certificate owned professional may attached security protected computer file identities professional seals determine legal responsibility errors omissions cases financial responsibility correction well territory responsibility e.g state minnesota jurisdictions especially canada legal requirement professional engineer seal documents accordance engineering profession act regulations professional engineers may also legally entitled seal document prepare seal identifies work performed direct supervision licensed professional engineer assures document recipient work meets standards expected experienced professionals take personal responsibility judgments decisions importance seal means authentication necessitated authority passed new hands old seal destroyed new one made pope dies first duty cardinal camerlengo obtain possession ring fisherman papal signet see broken similar practice prevailed middle ages often alluded historians seems matter ceremony example death robert holy island bishop durham 1283 chronicler robert greystones reports burial seal publicly broken presence master robert avenel matthew paris gives similar description breaking seal william trumpington abbot st albans 1235 practice less widely attested case medieval laypeople certainly occurred occasion particularly 13th 14th centuries silver seal matrices found graves 12th-century queens france probably deliberately buried means cancelling king james ii england dethroned glorious revolution 1688/9 supposed thrown great seal realm river thames flight france order ensure machinery government would cease function unclear much truth story certainly seal recovered james successors william iii mary used great seal matrix fairly crudely adapted – possibly quite deliberately order demonstrate continuity government related practice destruction found among blacksmiths touchmark stamp used hot metal show made destroyed upon death signet rings flat bezel usually wider rest hoop decorated normally intaglio leave raised relief impression design ring pressed onto soft sealing wax similar material used since ancient times personal seal individual recent times design generally crest made engraving either metal engraved gems generally semiprecious agate frequent material especially carnelian banded agate like sardonyx banding makes impression contrast ground smaller classical engraved gems probably originally worn signet rings seals necklace metal signet rings also cast may cheaper yields weaker material wearing signet rings latin signum meaning sign goes back ancient egypt distinctive personal signature developed antiquity documents needed seal seal pharaoh mentioned book genesis genesis 41:42 removing signet ring hand pharaoh put joseph hand arrayed garments fine linen put gold chain around neck although less common today rarely actually used intended purpose seals signet rings still worn especially among armigerous european cultures used attest authority bearer ring also seen symbol power one explanation inclusion regalia certain monarchies death pope destruction signet ring prescribed act clearing way sede vacante subsequent election new pope signet rings also used souvenir membership attribute e.g. class ring typically bear coat arms crest school alternative one stone one may also initials engraved sign personal stature less noble classes began wearing using signet rings early 13th century 17th century signet rings fell favor upper levels society replaced means mounting carrying signet 18th century though signet rings became popular 19th century men classes wore since least 16th century also pseudo-signet rings engraving reversed mirror image impression read correctly rings used since antiquity spy identification espionage world war ii us air force personnel would privately purchase signet rings hidden compartment would hold small compass hidden message mi9 purchased number signet rings regent street jewelers used conceal compasses expression seal approval refers formal approval regardless whether involves seal external marking authoritative person institute also part formal name certain quality marks | [
8357,
4711,
4935,
9576,
9334,
5433,
3231
] | Test |
1,822 | 9 | Evince:evince evince document viewer pdf postscript djvu tiff xps dvi formats designed gnome desktop environment developers evince intended replace multiple gnome document viewers single simple application evince motto sums project aim simply document viewer gnome releases included evince since gnome 2.12 september 2005 evince code consists mainly c small part code interfaces poppler written c++ large number linux distributions – including ubuntu fedora linux mint – include evince default document-viewer evince free open-source software subject requirements gnu general public license version 2 later evince faq highlights meaning word evince show express something clearly evince began rewrite gpdf support programmers started find unwieldy maintain evince quickly surpassed functionality gpdf replaced gpdf ggv september 2005 release gnome 2.12 one time windows version evince included valo-cd collection best windows programs evince incorporates integrated search displays number results found highlights results page users optionally display left sidebar viewer thumbnails pages assist page navigation within document documents support indices evince gives option showing document index quickly moving one section another evince show two pages time left right offers full-screen slide-show views evince allows selection text pdf files allows users highlight copy text documents made scanned images pdf includes ocr data evince used obey drm restrictions pdf files may prevent copying printing converting pdf files however made optional turned default gconf since version 3.18.2 evince allows text highlight annotations documents evince supports many different single multi-page document formats | [
11394,
2955,
6413,
1295,
8848,
9872,
10255,
3859,
7450,
6691,
6694,
8621,
7983,
8627,
8628,
9908,
823,
1471,
3649,
708,
2886,
3015,
73,
9418,
2513,
4177,
1112,
5095,
7913,
4459,
10352,
3828,
3189,
2045
] | Test |
1,823 | 3 | Oak_Ridge_National_Laboratory:oak ridge national laboratory oak ridge national laboratory ornl american multiprogram science technology national laboratory sponsored u.s. department energy doe administered managed operated ut–battelle federally funded research development center ffrdc contract doe established 1942 ornl largest science energy national laboratory department energy system size annual budget ornl located oak ridge tennessee near knoxville ornl scientific programs focus materials neutron science energy high-performance computing systems biology national security ornl partners state tennessee universities industries solve challenges energy advanced materials manufacturing security physics laboratory home several world top supercomputers including world powerful supercomputer ranked top500 summit leading neutron science nuclear energy research facility includes spallation neutron source high flux isotope reactor ornl hosts center nanophase materials sciences bioenergy science center consortium advanced simulation light-water reactors oak ridge national laboratory managed ut–battelle limited liability partnership university tennessee battelle memorial institute formed 2000 purpose annual budget us 1.65 billion 80 department energy remainder various sources paying use facilities 2012 4,400 staff working ornl 1,600 directly conducting research additional 3,000 guest researchers annually five campuses department energy oak ridge reservation national laboratory y-12 national security complex east tennessee technology park formerly oak ridge gaseous diffusion plant oak ridge institute science education developing oak ridge science technology park although four facilities unrelated national laboratory total area reservation 150 square kilometres 58 sq mi lab takes 18 square kilometres 7 sq mi town oak ridge established army corps engineers part clinton engineer works 1942 isolated farm land part manhattan project war advanced research government managed site university chicago metallurgical laboratory 1943 construction clinton laboratories completed later renamed oak ridge national laboratory site chosen x-10 graphite reactor used show plutonium created enriched uranium enrico fermi colleagues developed world second self-sustaining nuclear reactor fermi previous experiment chicago pile-1 x-10 first reactor designed continuous operation end world war ii demand weapons-grade plutonium fell reactor laboratory 1000 employees longer involved nuclear weapons instead used scientific research 1946 first medical isotopes produced x-10 reactor 1950 almost 20,000 samples shipped various hospitals demand military science fallen dramatically future lab uncertain management lab contracted us government monsanto however withdrew 1947 university chicago re-assumed responsibility december 1947 union carbide carbon co. already operated two facilities oak ridge took control laboratory alvin weinberg named director research ornl 1955 director laboratory 1950 oak ridge school reactor technology established two courses reactor operation safety almost 1000 students graduated much research performed ornl 1950s relating nuclear reactors form energy production propulsion electricity reactors built 1950s rest ornl history combined another project world first light water reactor principles neutron moderation fuel cooling ordinary water direct ancestor modern nuclear power stations us military funded much development nuclear-powered submarines ships us navy us army contracted portable nuclear reactors 1953 heat electricity generation remote military bases reactors designed ornl produced american locomotive company used greenland panama canal zone antarctica united states air force usaf also contributed funding three reactors lab first computers first particle accelerators ornl designed tested nuclear-powered aircraft 1954 proof-of-concept proposed usaf fleet long-range bombers although never flew provision radionuclides x-10 medicine grew steadily 1950s isotopes available ornl western source californium-252 ornl scientists lowered immune systems mice performed world first successful bone marrow transplant early 1960s large push ornl develop nuclear-powered desalination plants deserts met sea provide water project called water peace backed john f. kennedy lyndon b. johnson presented 1964 united nations conference increases cost construction falling public confidence nuclear power caused plan fail health physics research reactor built 1962 used radiation exposure experiments leading accurate dosage limits dosimeters improved radiation shielding 1964 molten-salt reactor experiment began construction reactor operated 1966 1969 six months time move u-235 u-233 fuel proved viability molten salt reactors also producing fuel reactors byproduct reaction high flux isotope reactor built 1965 highest neutron flux reactor time improved upon work x-10 reactor producing medical isotopes well allowing higher fidelity materials research researchers biology division studied effects chemicals mice including petrol fumes pesticides tobacco late 1960s cuts funding led cancellation plans another particle accelerator united states atomic energy commission cut breeder reactor program two-thirds leading downsizing staff 5000 3800 1970s prospect fusion power strongly considered sparking research ornl tokamak called ormak made operational 1971 first tokamak achieve plasma temperature 20 million kelvin success fusion experiments enlarged renamed ormak ii 1973 however experiments ultimately failed lead fusion power plants us atomic energy commission required improved safety standards early 1970s nuclear reactors ornl staff wrote almost 100 requirements covering many factors including fuel transport earthquake resistance 1972 aec held series public hearings emergency cooling requirements highlighted safety requirements became stringent ornl involved analysing damage core three mile island nuclear generating station accident 1979 also 1972 peter mazur biologist ornl froze liquid nitrogen thawed implanted mouse embryos surrogate mother mouse pups born healthy technique popular livestock industry allows embryos valuable cattle transported easily prize cow multiple eggs extracted thus vitro fertilisation many offspring would naturally possible 1974 alvin weinberg director lab 19 years replaced herman postma fusion scientist 1977 construction began 6 metre 20 foot superconducting electromagnets intended control fusion reactions project international effort three electromagnets produced us one japan one switzerland final remaining european states experimentation continued 1980s 1980s brought changes ornl focus efficiency became paramount accelerated climate simulation chamber built applied varying weather conditions insulation test efficacy durability faster real time materials research heat resistant ceramics use truck high-tech car engines performed building upon materials research began nuclear reactors 1950s 1987 high temperature materials laboratory established ornl industry researchers cooperated ceramic alloy projects materials research budget ornl doubled initial uncertainty regarding reagan economic policy less government expenditure 1981 holifield heavy ion research facility 25 mv particle accelerator opened ornl time holifield widest range ion species twice powerful accelerators attracting hundreds guest researchers year department energy concerned pollution surrounding ornl began clean-up efforts burial trenches leaking pipes contaminated groundwater beneath lab radiation tanks sitting idle full waste estimates total cost clean-up hundreds millions us dollars five older reactors subjected safety reviews 1987 ordered deactivated reviews complete 1989 high flux isotope reactor restarted us supply certain medical isotopes depleted 1989 former executive officer american association advancement science alvin trivelpiece became director ornl remained role 2000 1992 whistleblower charles varnadore filed complaints ornl alleging safety violations retaliation superiors administrative law judge ruled varnadore favor secretary labor robert reich overturned ruling however varnadore case saw prime contractor martin marietta cited safety violations ultimately led additional whistleblower protection within doe january 2019 ornl announced major breakthrough capacity automate pu-238 production helped push annual production 50 grams 400 grams moving closer nasa goal 1.5 kilograms per year 2025 order sustain space exploration programs housing built oak ridge located townsite along stores necessary buildings housing segregated separate dorms single men women houses available marrieds dorms tended overcrowded four sinks forty-two women townsite replaced modern city oak ridge ornl conducts research development activities span wide range scientific disciplines many research areas significant overlap researchers often work two fields listed laboratory major research areas described briefly laboratory long history energy research nuclear reactor experiments conducted since end world war ii 1945 availability reactors high-performance computing resources emphasis improving efficiency nuclear reactors present programs develop efficient materials accurate simulations aging reactor cores sensors controls well safety procedures regulatory authorities energy efficiency electricity technologies program eeetp aims improve air quality us reduce dependence foreign oil supplies three key areas research electricity manufacturing mobility electricity division focuses reducing electricity consumption finding alternative sources production buildings account 39 us electricity consumption 2012 key area research program aims create affordable carbon-neutral homes 2020 research also takes place higher efficiency solar panels geothermal electricity heating lower cost wind generators economic environmental feasibility potential hydro power plants fusion another area history research ornl dating back 1970s fusion energy division pursues short-term goals develop components high temperature superconductors high-speed hydrogen pellet injectors suitable materials future fusion research much research behaviour maintenance plasma takes place fusion energy division understanding plasma physics crucial area developing fusion power plant us iter office ornl partners princeton plasma physics laboratory savannah river national laboratory us contribution iter project 9.1 expected excess us 1.6 billion throughout contract oak ridge national laboratory biological research covers genomics computational biology structural biology bioinformatics bioenergy program aims improve efficiency stages biofuel process improve energy security united states program aims make genetic improvements potential biomass used formulate methods refineries accept diverse range fuels improve efficiency energy delivery power plants end users center molecular biophysics conducts research behaviour biological molecules various conditions center hosts projects examine cell walls biofuel production use neutron scattering analyse protein folding simulate effect catalysis conventional quantum scale three neutron sources ornl high flux isotope reactor hfir oak ridge electron linear accelerator orela spallation neutron source hfir provides neutrons stable beam resulting constant nuclear reaction whereas orela sns produce pulses neutrons particle accelerators hfir went critical 1965 used materials research major source medical radioisotopes since 2013 hfir provides world highest constant neutron flux result various upgrades part us non-proliferation effort hfir scheduled switch highly enriched uranium 90 weapons grade low-enriched 3–4 2020 last reactor us berkelium used produce world first sample tennessine produced high flux isotope reactor part international effort hfir likely operate approximately 2060 reactor vessel considered unsafe continued use spallation neutron source sns particle accelerator highest intensity neutron pulses man-made neutron source sns made operational 2006 since upgraded 1 megawatts plans continue 3 megawatts high power neutron pulses permit clearer images targets meaning smaller samples analysed accurate results require fewer pulses oak ridge national laboratory conducts research materials science range areas 2002 2008 ornl partnered caterpillar inc. cat form new material diesel engines withstand large temperature fluctuations new steel named cf8c plus based conventional cf8c stainless steel added manganese nitrogen result better high–temperature properties easier cast similar cost 2003 partners received r 100 award r magazine 2009 received award excellence technology transfer federal laboratory consortium commercialisation steel high-temperature materials lab ornl permits researchers universities private companies government initiatives use facilities lab available free results published private research permitted requires payment separate lab shared equipment user facility one three doe sponsored facilities nano-scale microscopy tomography facilities center nanophase materials sciences cnms researches behaviour fabrication nanomaterials center emphasises discovery new materials understanding underlying physical chemical interactions enable creation nanomaterials 2012 cnms produced lithium-sulfide battery theoretical energy density three five times greater existing lithium ion batteries oak ridge national laboratory provides resources us department homeland security defense programs global security nonproliferation gs n program develops implements policies us based international prevent proliferation nuclear material program developed safeguards nuclear arsenals guidelines dismantling arsenals plans action nuclear material fall unauthorised hands detection methods stolen missing nuclear material trade nuclear material us russia gs n work overlaps homeland security programs office providing detection nuclear material nonproliferation guidelines areas concerning department homeland security include nuclear radiological forensics chemical biological agent detection using mass spectrometry simulations potential national hazards throughout history oak ridge national laboratory site various supercomputers home fastest several occasions 1953 ornl partnered argonne national laboratory build oracle oak ridge automatic computer logical engine computer research nuclear physics chemistry biology engineering oracle 2048 words 80 kibit memory took approximately 590 microseconds perform addition multiplications integers 1960s ornl also equipped ibm 360/91 ibm 360/65 1995 ornl bought intel paragon based computer called intel paragon xp/s 150 performed 154 gigaflops ranked third top500 list supercomputers 2005 jaguar built cray xt3-based system performed 25 teraflops received incremental upgrades xt5 platform performed 2.3 petaflops 2009 recognised world fastest november 2009 november 2010 summit built oak ridge national laboratory 2018 benchedmarked 122.3 petaflops june 2018 summit stands world fasted clocked supercomputer 202,752 cpu cores 27,648 nvidia tesla gpus 250 petabytes storage since 1992 national center computational sciences nccs overseen high performance computing ornl manages oak ridge leadership computing facility contains machines 2012 jaguar upgraded xk7 platform fundamental change gpus used majority processing renamed titan titan performs 17.59 petaflops holds number 1 spot top500 list november 2012 computers include 77 node cluster visualise data larger machines output exploratory visualization environment research science technology everest visualisation room 10 3 metre 30 10 ft wall displays 35 megapixel projections smoky 80 node linux cluster used application development research projects refined tested smoky running larger machines titan 1989 programmers oak ridge national lab wrote first version parallel virtual machine pvm software enables distributed computing machines differing specifications pvm free software become de facto standard distributed computing jack dongarra ornl university tennessee wrote linpack software library linpack benchmarks used calculate linear algebra standard method measuring floating point performance supercomputer used top500 organisation | [
2176,
3328,
5767,
7432,
10508,
11661,
10641,
6950,
1454,
2236,
8134,
1480,
1611,
2135,
11613,
11618,
1638,
2664,
8813,
6518
] | None |
1,824 | 9 | Move_assignment_operator:move assignment operator c++ programming language move assignment operator codice_1 used transferring temporary object existing object move assignment operator like c++ operators overloaded like copy assignment operator special member function move assignment operator explicitly defined compiler generates implicit move assignment operator c++11 newer parameter move assignment operator rvalue reference type object defines move assignment operator move assignment operator different move constructor move assignment operator called existing object move constructor called object created operation thereafter object data longer valid overload move assignment operator signature function must operator= data successfully overload move assignment operator following conditions must met consider following move assignment operator simple string class class string | [
1952
] | Test |
1,825 | 6 | Semantic_file_system:semantic file system semantic file systems file systems used information persistence structure data according semantics intent rather location current file systems allows data addressed content associative access traditional hierarchical file-systems tend impose burden example sub-directory layout contradicting user perception files would stored tag-based interface alleviates hierarchy problem enables users query data intuitive fashion semantic file systems raise technical design challenges indexes words tags elementary signs sort created constantly updated maintained cached performance offer desired random multi-variate access files addition underlying mostly traditional block-based filesystem research specifications implementations | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
7225,
11323,
8772,
1109,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
5293,
7344,
2230,
5816,
1... | Test |
1,826 | 9 | Von_Neumann_programming_languages:von neumann programming languages von neumann language programming languages high-level abstract isomorphic copies von neumann architectures current programming languages fit description likely consequence extensive domination von neumann computer architecture past 50 years differences fortran c even java although considerable ultimately constrained three based programming style von neumann computer example java objects executed parallel asynchronous message passing attribute-based declarative addressing java would group isomorphism von neumann programming languages architectures following manner john backus asserted assignment statements von neumann languages split programming two worlds first world consists expressions orderly mathematical space potentially useful algebraic properties computation takes place second world consists statements disorderly mathematical space useful mathematical properties structured programming seen limited heuristic apply space though backus claimed exists computer science vicious cycle long-standing emphasis von neumann languages continued primacy von neumann computer architecture dependency made non-von neumann languages uneconomical thus limited development lack widely available effective non-von neumann languages deprived computer designers motivation intellectual foundation needed develop new computer architectures examples non -von neumann languages apl fp fl j lucid ngl zpl mercury plankalkül many modern processors contain multiple processing cores multi-threaded programming usually efficient way use computational power single program modern processors highly optimized techniques including out-of-order execution complex logic detect done without violating von neumann semantics logical programming model separate instruction data caches widely used making hardware modified harvard architecture logic detect cases optimization fails able slowly execute self-modifying code specialized processors including gpus wide mimd devices general-purpose cpus commonly multiple cores one fast enough many programs fast enough without parallelizing single tasks threads commonly used deal asynchronous inputs outputs especially gui general-purpose cpus technically mimd devices usually hardware designed ground mimd programming referred mimd many widely used programming languages c c++ java ceased strictly von neumann adding support parallel processing form threads however categorically non -von neumann languages also functional languages achieved widespread use | [
9345,
5029,
3910,
6950,
2216,
8262,
10603,
5677,
2670,
6926,
5168,
3960,
2519,
1976,
2045
] | Test |
1,827 | 4 | Nitro_Zeus:nitro zeus nitro zeus project name well funded comprehensive cyber attack plan created mitigation strategy stuxnet malware campaign aftermath unlike stuxnet loaded onto system design phase affect proper operation nitro zeus objectives built system design phase unbeknownst system users built-in feature allows assured effective cyber attack system users information existence raised research interviews carried alex gibney zero days documentary film proposed long term widespread infiltration major iranian systems would disrupt degrade communications power grid vital systems desired cyber attackers achieved electronic implants iranian computer networks project seen one pathway alternatives full-scale war requirement type plan iran nuclear deal signed though functioning implants iran critical scada infrastructure systems likely removed | [
3843,
4689,
7515,
107
] | Test |
1,828 | 2 | Bruce_Ellis:bruce ellis bruce ellis born 1960 nicknamed brucee computer scientist bell labs 1980s 90s educated university sydney australia earned first class honours university medal worked basser branch unix 32v work continued bell labs involved development later research versions unix software blit terminal plan 9 bell labs inferno operating systems well ventures network processing froggie recreationally also dabbled computer go computational linguistics rob pike responsible infamous mark v shaney early 1980s leaving bell labs consulting lecturing around world working ozinferno operating system continuation work done research version inferno currently living sydney works include mash shell 64 bit support plan 9 crosscompilers suite various postscript interpreters currently used commercial printer manufacturers currently chief software architect rangboom working plan9 emulation environment 9ee disparate platforms | [
1890,
5492
] | Train |
1,829 | 4 | ObserveIT:observeit observeit insider threat management software company observeit provides insider threat security solutions including employee monitoring user activity monitoring behavioral analytics policy enforcement digital forensics 1,700 customers 87 countries company software deployed primarily financial services healthcare manufacturing tech services telco retail markets co-founders gaby friedlander avi amos founded observeit israel 2006 observeit initially focused remote vendor monitoring expanded monitor potential vendor contractor employee insider threats goal software help organizations streamline insider threat incident investigation process prevent data loss 2014 bain capital ventures invested 20 million observeit opened u.s. headquarters boston leadership ceo mike mckee observeit recently released version 7.5 software april 2006 observeit monitors “ invisible component ” infrastructure – people april 2010 lieberman software observeit partner monitor audit privileged access activity within enterprise january 2012 fujitsu partners observeit bring seamless security monitoring applications enterprises hong kong macau november 2013 observeit unveils observeit 5.6.8 april 2014 observeit appoints paul brady ceo september 2014 observeit releases v5.7 april 2015 observeit receives three awards 2015 security industry global excellence awards may 2015 observeit launches cloudthreat amazon web services security solution september 2015 network world new product week february 2016 observeit introduces first software prevent insider threat march 2018 observeit releases v7.5 | [
9929
] | Test |
1,830 | 9 | John_C._Mitchell:john c. mitchell john clifford mitchell professor computer science courtesy electrical engineer stanford university published area programming language theory computer security john c. mitchell vice provost teaching learning stanford university mary gordon crary family professor computer science electrical engineering stanford university co-director stanford computer security lab professor courtesy education member steering committee stanford university cyber initiative mitchell vice provost stanford university since 2012 first inaugural vice provost online learning broader role teaching learning mitchell direction office vice provost teaching learning vptl advancing teaching learning faculty-driven initiatives research transforming education stanford classrooms beyond mitchell first research project online learning started 2009 six undergraduate students built stanford courseware innovative platform expanded support interactive video discussion courseware served foundation initial flipped classroom experiments stanford helped inspire first massive open online courses moocs stanford captured worldwide attention 2011 office vice provost online learning established august 2012 mitchell served john l. hennessy — stanford university 10th president — special assistant educational technology chaired faculty committee established initial priorities stanford developed intellectual property guidelines publicly released online courses help build faculty experience catalogue online material vice provost mitchell launched faculty seed grant program summer 2012 program helped faculty across campus transform stanford campus courses release public courses world generating informed discussion debate among faculty process addition supporting delivery digital course content vptl engineering team working expand features lagunita stanford instance open-source release edx platform mitchell team partnership edx announced release open edx june 2013 open-source hosting platform providing customizable alternative colleges universities supporting open educational research innovation stanford online courses generating wealth course participant data collaboration stanford centers scholarship lytics lab jointly supervised mitchell mitchell stevens candace thille graduate school education vptl playing key role evaluating educational outcomes improving online learning based data-driven research iterative design may 2014 mitchell team issued comprehensive report share benchmark information institutions higher education mitchell holds b.s stanford university m.s ph.d. massachusetts institute technology mit served editorial board ten academic journals acted consultant advisor numerous companies spent sabbaticals newton institute mathematical science coverity inc. mitchell author two books 170 research papers among most-cited scholars computer science together gordon plotkin noted connection existential types abstract data types mitchell early computer science research focused programming analysis design played pivotal role developing type theory foundation programming languages view dominant field past 15 years research focused computer security developing analysis methods improving network protocol security authorization access control web security privacy mitchell forefront web network security research education decade helped train thousands students programming languages hundreds expert-level professionals area cyber-security efforts resulted development concepts used popular java programming language improved security widely used wireless networking protocols contributed security architecture chrome browser components modern web august 2012 mitchell appointed stanford president john l. hennessy vice provost online learning newly created position responsible overseeing stanford online learning initiatives | [
6306,
8262,
1783,
10031,
6160,
5585,
3767,
3643,
2558
] | Test |
1,831 | 7 | Talygen_Business_Intelligence:talygen business intelligence talygen business intelligence officially talygen inc. software development company palo alto known eponymous web based business automation software first gained publicity january 2014 pc magazine included list top ten tools small biz ces 2014 idea behind software product described charming frankfurter allgemeine talygen business intelligence company flagship product software tool draws cloud technology perform customer relationship management expense accounting manage leave sic many administrative issues enterprises | [
4194
] | Test |
1,832 | 2 | Microsoft_Surface:microsoft surface microsoft surface series touchscreen-based personal computers interactive whiteboards running microsoft windows operating system designed developed microsoft devices manufactured pegatron designed premium devices set examples windows oems comprises six generations hybrid tablets 2-in-1 detachable notebooks convertible desktop all-in-one interactive whiteboard various accessories unique form factors exception first-generation surface surface 2 surface pcs use intel processors compatible microsoft windows 10 operating system surface family features six main lines devices microsoft first announced surface event june 18 2012 presented former ceo steve ballmer milk studios los angeles surface first major initiative microsoft integrate windows operating system hardware first pc designed distributed solely microsoft first surface device surface line marketed surface windows rt time announced steven sinofsky former president windows windows live second surface line based intel architecture spearheaded surface pro marketed surface windows 8 pro time demoed michael angiulo corporate vp sinofsky initially stated pricing first surface would comparable arm devices pricing surface pro would comparable current ultrabooks later ballmer noted sweet spot bulk pc market 300 800 microsoft revealed pricing began accepting preorders 2012 surface tablet october 16 2012 delivery 10/26 device launched alongside general availability windows 8 october 26 2012 surface pro became available following year february 9 2013 devices initially available microsoft stores retail online availability later expanded vendors november 2012 ballmer described distribution approach surface modest november 29 year microsoft revealed pricing 64 gb 128 gb versions surface windows 8 pro tablet would go sale february 9 2013 united states canada launch event set held february 8 2013 cancelled last minute due february 2013 nor'easter 128gb version tablet sold day release though less demand 64gb version much smaller available storage capacity supplies lower cost unit almost tight september 23 2013 microsoft announced surface 2 surface pro 2 feature hardware software updates original surface 2 launched october 22 2013 alongside surface pro 2 four days general availability windows 8.1 later microsoft launched variation surface 2 lte connectivity network march 18 2014 microsoft announced redesigned surface pro 3 may 20 2014 went sale june 20 2014 following year march 30 2015 announced surface 3 compact version surface pro 3 september 8 2015 microsoft announced surface enterprise initiative partnership accenture avanade dell inc. hp enable customers enjoy benefits windows 10 part partnership dell resell surface pro products business enterprise channels offer existing enterprise services including pro support warranty configuration deployment surface pro devices sells microsoft announced next generation surface pro 4 new surface book hybrid laptop microsoft october 2015 event new york october 10 2015 microsoft began shipping surface hub devices march 25 2016 june 2016 microsoft confirmed production surface 3 would stop december year replacement product announced reports suggest may consequence intel discontinuing broxton iteration atom processor october 26 2016 microsoft event surface studio surface book performance base announced wheel accessory surface dial announced well became available november 10 2016 immediately following announcement surface laptop microsoftedu event may 2 2017 microsoft build 2017 developer conference microsoft announced fifth-generation surface pro special event shanghai may 23 2017 october 17 2017 microsoft announced surface book 2 adding 15 model line updating internal components may 15 2018 microsoft announced surface hub 2 featuring new rotating hinge ability link multiple hubs together june 2018 microsoft announced surface go 400 surface tablet 10-inch screen 64 128 gb storage first two generations surface lines features 10.6 cleartype full hd display 16:9 aspect ratio release third generation surface surface pro microsoft increased screen sizes respectively 3:2 aspect ratio designed comfort use portrait orientation fourth generation increased screen screens feature multi-touch technology 10 touch-points scratch-resistance gorilla glass generations surface pro third generation surface also features active pen included box models display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense surface orientation switch portrait landscape orientation modes surface built-in applications support screen rotation four directions including upside-down three buttons first three generation surface including capacitive windows button near display opens start screen two physical buttons sides power volume fourth generation removed capacitive windows button screen surface front rear cameras resolution increased 3.5/8 5/5 megapixels latest generation surface surface pro respectively first generation surface uses quad-core nvidia tegra 3 arm architecture opposed intel x64 architecture therefore shipped windows rt written arm architecture second generation surface 2 added nvidia tegra 4 architecture limited surface surface 2 apps windows store recompiled arm release surface 3 microsoft switched surface line intel x64 architecture architecture found surface pro line surface 3 uses braswell atom x7 processor surface pro line microsoft uses intel x64 architecture run software designed microsoft windows surface pro surface pro 2 one processor variant core i5 though surface pro runs ivy bridge iteration surface pro 2 runs haswell iteration surface pro 3 added haswell core i3 core i7 variants surface devices released six internal storage capacities 32 64 128 256 512 gb 1 tb release third generation 32 gb model discontinued models also feature microsdxc card slot located behind kickstand allow use memory cards 200 gb surface devices different amount non-replaceable ram ranging 2 32 gb attached motherboard left right side surface tablet full-size usb port mini displayport micro-hdmi port older models magnetic charging port micro-usb charging port surface 3 surface devices 3.5mm headphone/microphone jack devices feature accessory spine cover port along bottom changed dimensions ports moved different locations throughout various generations surface tablets beginning surface pro 3 microsoft moved fin-style connector called surface connect charge device surface devices come wi-fi models generations also feature wi-fi cellular support cellular variants however support circuit-switched voice calls texts allowing data connectivity cellular models micro-sim slot bottom device next type cover connecting pins exterior earlier generations surface 2012 tablet pro pro 2 made vapormg magnesium alloy giving semi-glossy black durable finish microsoft calls dark titanium originally design surface feature full vapormg design production models ditched went vapormg coating later devices moved towards matte gray finish showing actual magnesium color semi-transparent top coating surface laptop available four colors platinum graphite gold burgundy cobalt blue surface surface pro lines feature kickstand flips back device prop allowing device stood angle hands-free according microsoft great watching movies video chatting typing documents according reviewers kickstand uncomfortable use one lap means device wo n't fit shallow desks first generation kickstand set 22 degrees angle position second generation added 55 degrees angle position according microsoft makes device comfortable type lap surface 3 features three angle positions 22 44 60 degrees surface pro 3 first device continuous kickstand set angles 22 150 degrees fifth-generation surface pro microsoft added additional 15 degrees rotation hinge bringing widest possible angle 165 degrees microsoft calls studio mode october 6 2015 microsoft unveiled surface book 2-in-1 detachable mechanically attached durable hardware keyboard became first surface device marketed laptop instead tablet device teardrop design surface book microsoft calls dynamic fulcrum hinge allows device support heavier notebook/screen portion surface studio uses zero-gravity hinge placed multiple angles standing drafting table position 20 degrees another unique aspect surface book available discrete graphics adapter contained keyboard module module detached surface book running case system automatically switches integrated graphics tablet unit october 26 2016 microsoft unveiled additional configuration called surface book performance base upgraded processor longer battery life second generation surface book 2 announced october 17 2017 introducing upgraded ceramic hinge stability lighter overall weight distribution 15-inch model added line may 3 2017 microsoft unveiled surface laptop non-detachable version surface book claiming thinnest touch-enabled lcd panel kind permanently attached hardware keyboard comes four colors uses kind fabric type cover accessories tablets device comes newly announced windows 10 operating system enables faster boot times expense ability download install programs web instead microsoft store users switch fully enabled version windows 10 free october 26 2016 microsoft announced 28-inch all-in-one desktop pc surface studio device claims thinnest lcd ever made all-in-one pc components including processor surround-sound system located compact base screen mounted upon via flexible four-point hinge design allows screen fold 20-degree angle physical interaction user comes windows 10 anniversary update preinstalled optimized windows 10 creators update released april 2017 january 21 2015 microsoft introduced new device category surface family surface hub 84-inch 120 hz 4k 55-inch 1080p multi-touch multi-pen wall-mounted all-in-one device aimed collaboration videoconferencing use businesses device runs variant windows 10 operating system surface devices except surface surface 2 models sold since july 29 2015 ship windows 10 operating system also july 2016 older models shipped windows 8.1 eligible free upgrade windows 10 original surface surface 2 models use windows rt special version windows 8 designed devices arm processors upgraded windows 10 however several major updates made available initial release include windows rt 8.1 rt 8.1 update 1 rt 8.1 august update rt 8.1 update 3 older arm-based models surface compatible windows 10 received several new features including new start menu similar found early preview builds windows 10 surface pro 4 onward surface devices support windows hello facial biometric authentication box cameras ir-sensors surface pro 3 utilize surface pro 4 type cover fingerprint id gain windows hello support windows 10 user interface two modes desktop mode tablet mode keyboard connected surface windows 10 runs desktop mode absent windows 10 runs tablet mode running tablet mode start menu apps run full screen running apps hidden taskbar back button appears swiping top closes app swiping left evokes task view swiping right evokes action center several included apps updated windows 10 mail people camera calendar microsoft edge xbox app onenote photos voice recorder phone companion calculator scan alarms clock microsoft store apps include maps movies tv groove music microsoft solitaire collection msn apps money news weather sports surface devices come preloaded onenote app taking handwritten notes windows 10 also features text input panel handwriting recognition automatically converts handwriting text microsoft edge browser features inking function allows handwritten annotations directly webpages microsoft ported office suite use windows 10 devices including surface devices running windows 10 screen size devices exceed 10 inches apps require office 365 subscription edit documents although needed view print surface devices internal microphone speakers optimized cortana personal assistant feature included windows 10 devices third-party applications designed pen touch interaction surface mind include drawboard pdf sketchable prior release windows 10 surface pro 3 microsoft made surface hub app available allowed adjustment pen pressure sensitivity button functions surface hub app renamed surface following launch surface hub device additionally toggles control sound quality disable capacitive windows button surface 3 pro 3 devices included surface pro 3 surface pen based n-trig technology microsoft added capability launch onenote lock screen without logging pressing purple button top pen microsoft added sections windows 10 settings ability control functions buttons surface pen one function launch onenote press top button surface pro 4 pen introduction surface dial microsoft added wheel settings section settings app windows 10 devices windows 10 anniversary update added ability adjust shortcuts pen buttons performed microsoft offer several surface accessories bluetooth connected devices among surface pen keyboard covers surface dial two main versions keyboard covers connect via accessory spine surface tablets discontinued touch cover ever-evolving type cover feature multi-touch trackpad full qwerty keyboard pre-defined action keys place function row though function row still accessible via function button covers made various soft-touch materials connect surface polycarbonate spine pogo pins microsoft sells surface pen active-digitzer pen separate surface included surface tablets fifth-generation surface pro removed surface pen designed integrate inking capabilities windows including onenote windows ink workspace surface dial introduced alongside surface studio computer wheel designed work on-screen surface studio fifth-generation surface pro previous surface pro devices updated support well 2013 microsoft announced going design covers surface accessory spine code named blades based touch cover 2 sensors product shipped surface music cover surface music kit app october 2012 microsoft aired first commercial directed jon chu surface product line first 30-second commercial surface movement focus windows rt version first generation surface detachable keyboard kickstand first aired dancing stars commercial break 2014 microsoft announced five-year 400 million deal national football league surface became official tablet computer brand nfl part partnership special ruggedized surface pro 2 devices issued teams use sidelines allowing coaches players view annotate footage previous plays partnership initially hampered television commentators erroneously referred devices ipad several occasions microsoft since stated coached commentators properly referring devices on-air january 11 2016 microsoft announced collaboration pow wow includes group artists around world utilizes various surface devices surface pro 4 surface book create total 17 murals artists filmed using surface devices explain integrate surface workflow final products posted youtube accompanies post microsoft devices blog february 17 2016 microsoft announced alongside us department defense plans upgrade windows 10 approved surface devices certified use defense information systems agency unified capabilities approved products list surface book surface pro 4 surface pro 3 surface 3 approved multifunction mobile devices thus meeting necessary requirements security compatibility systems reviews first-generation surface rt critics ranged broadly hardware received mostly positive reviews software overall experience mixed wired reviewer mathew honan stated one exciting pieces hardware ’ ever used extremely well-designed meticulous even tablets likely confuse many microsoft ’ longtime customers techcrunch matt buchanan buzzfeed gizmodo recommended purchasing tablet gizmodo mentioned issues high price tag described similar inferior ipad also praised hardware saying 'll appreciate every time pick turn simple joyful experience david pogue new york times praised hardware criticized software verge described technology fulfilling role laptop tablet half well devices market adding whole thing honestly perplexing warner crocker got ta mobile described frustratingly confusing farhad manjoo slate noted shortcomings puzzling given much time microsoft spent developing device neil mcallister noted lack compelling case switch ipad windows rt device price point apple already strong network effect app developers windows developers ported offerings arm processor surface rt worse battery life similar devices first-generation surface pro shorter battery life original arm-based surface due part full hd screen intel core i5 processor surface pro 3 received positive reviewers david pogue suggested upshot hardly thickness weight penalty kickstand type cover let transform 1.8-pound tablet actual fast luxury laptop pogue said surface pro 3 form factor works well tablet contrast surface pro 2 whose bulk weight limited appeal tablet pogue also stated new multi-stage kickstand 3:2 screen aspect ratio new type cover 3 detachable keyboard made competent laptop another advantage surface pro 3 considered tablet faa tsa despite hardware makes capable running x86 windows programs advantageous air travel since tablet used takeoff landing tablet left bag going tsa scanner machine neither apply laptop suggested surface pro 3 comes closest microsoft tablet pc concept company founder bill gates announced 2001 first surface become credible laptop replacement time magazine included microsoft surface pro 3 list 25 best inventions 2014 surface 3 non-pro received generally positive reviews computer critics praised microsoft shift arm architecture toward x86 therefore windows rt regular windows os noted well designed chassis accessories produced quality materials overall premium feeling use less powerful surface 3 lighter cheaper alternative surface pro 3 importantly surface 3 could compete high-end android ipad tablets advantage device running full desktop os instead mobile os similar price reviewers also note 37 gb total storage space low-end surface 3 available user close competitor low-end ipad air 2 12.5 gb user-available storage space price common downsides relatively low battery life slower performance compared devices intel core processors high price since accessories like surface pen type cover included surface first announced critics noted device represented significant departure microsoft company previously relied exclusively third-party oems produce devices running windows began shifting towards first-party hardware model similarities apple steve ballmer said like xbox surface example sort hardware products microsoft release future original equipment manufacturers oems whose products traditionally run microsoft operating systems positive responses release surface hp lenovo samsung dell applauded microsoft decision create tablet pc said relationships microsoft changed john solomon senior vice president hp said microsoft basically making leadership statement showing possible tablet space acer founder stan shih said believed microsoft introduced hardware order establish market would withdraw favor oems however others believe oems left sidelined perception microsoft new tablet would replace products acer chairman jt wang advised microsoft please think twice microsoft acknowledged surface may affect commitment partners windows platform need surface market arm-compatible version windows questioned analysts recent developments pc industry intel amd introduced x86-based system-on-chip designs windows 8 atom clover trail temash respectively response growing competition arm licensees particular intel claimed clover trail-based tablets could provide battery life rivaling arm devices test pc world samsung clover trail-based ativ smart pc shown battery life exceeding first gen arm-based surface peter bright ars technica argued windows rt clear purpose since power advantage arm-based devices nowhere near clear-cut two years ago users would better purchasing office 2013 removed features licensing restrictions office rt sales first generation surface meet microsoft expectations led price reductions sales incentives march 2013 bloomberg reported inside sources surface sales behind expectations particularly arm-based surface model microsoft originally projected sales 2 million surface units final quarter 2012 total 1.5 million surface devices sold since launch surface pro accounting 400,000 sales expensive surface pro intel cpu makes full-fledged windows laptop pc despite compromises successful compared oems first-generation windows 8 ultrabook hybrids larger and/or expensive july 2013 steve ballmer revealed surface n't sold well hoped reported microsoft made loss due lackluster surface sales concurrently microsoft cut price first-gen surface rt worldwide 30 u.s. price falling followed price cut august revealed even marketing costs exceed sales august 4 2013 cost surface pro cut 100 giving entry price 799 several law firms sued microsoft accusing company misleading shareholders sales first-gen arm based surface tablet calling unmitigated disaster first two years sales microsoft lost almost two billion dollars poor sales arm-based surface tablet credited continuing market dominance microsoft competitors tablet market particularly apple ipad retained dominance due app store offering tablet-optimized applications oems opted produce tablets running google android came wide variety sizes prices albeit mixed success among oems google play second-largest selection tablet applications contrast limited amount software designed specifically surface operating system windows rt selection even weaker windows phone indeed oems reported customers felt intel-based tablets appropriate use business environments compatible much widely available x86 programs windows rt microsoft subsequent efforts focused upon refining surface pro making viable competitor premium ultra-mobile pc category ultrabooks macbook air discontinuing development arm-powered surface devices surface 3 non-pro intel x86 cpu albeit lower performance surface pro 3 resultant surface pro 3 succeeded garnering great interest surface line making surface business profitable first time fiscal year q1 2015 later q2 surface division sales topped 1 billion surface division scored 888 million q4 2015 despite overall loss 2.1 billion microsoft 117 year-over-year growth thanks steady commercial performance surface pro 3 launch mainstream model surface 3 first quarter fiscal year 2018 surface division posted best earnings performance date users microsoft support forum reported touch covers splitting seam connects tablet exposing wiring microsoft spokesperson stated company aware issue would offer free replacements affected defect users reported issues audio randomly stuttering muting surface tablet use wi-fi connectivity issues also reported firmware updates attempted fix problem released users still reported problems like blue screen errors watching video crash display driver microsoft acknowledged bug windows key always work promised fix latest update promised fix issue able fix original surface pro microsoft acknowledged issues encountered users stylus pen including intermittent pen failures older applications complete pen support due different apis used surface pro stylus drivers latter case microsoft indicated working software vendors ensure better compatibility later models beginning surface pro 3 n-trig digital pen digitizer system attained high pen compatibility older applications thanks regularly updated optional wintab driver issues also experienced slow wi-fi connectivity device properly returning standby ifixit awarded surface pro worst ever repairability rating ceo kyle wiens claims due incompetence rather deliberate design choices | [
3586,
6150,
5649,
3605,
5666,
7215,
2101,
8757,
10303,
582,
2635,
9812,
4704,
10338,
617,
7796,
6265,
6797,
10388,
10900,
3224,
7838,
6827,
7354,
2237,
7359,
4289,
194,
10957,
4816,
740,
4326,
3304,
9448,
5356,
9964,
1776,
259,
4356,
1152... | None |
1,833 | 2 | MOAP:moap moap mobile oriented applications platform software platform ntt docomo foma service mobile phones two versions moap | [
7938,
6276,
7812,
8326,
11271,
4360,
4493,
2195,
11155,
1813,
7063,
11545,
10780,
1694,
3618,
8355,
4132,
5290,
4011,
9646,
9137,
10674,
10802,
823,
9660,
1216,
5824,
7617,
10817,
10053,
199,
5067,
7246,
8147,
6748,
1761,
9443,
4841,
6505
] | None |
1,834 | 5 | Lunascape:lunascape lunascape web browser developed lunascape corporation tokyo japan unusual contains three rendering engines gecko used mozilla firefox webkit used apple safari trident used microsoft internet explorer feature common avant web browser user switch layout engines seamlessly lunascape available windows android platforms well ipad iphone lunascape released october 2001 founders college browser became popular hidekazu kondo established lunascape corporation august 2004 pursuing phd hidekazu kondo became ceo lunascape corporation additionally lunascape selected exploratory software project commissioned japanese government company branched united states june 2008 based sunnyvale california lunascape introduced browser internationally december 2008 | [
513,
6657,
9736,
2579,
6171,
2076,
9757,
7713,
10791,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
5205,
6231,
8281,
6747,
6237,
1642,
9834,
9841,
115,
9843,
119,
4728,
637,
1664,
2182,
11418,
10910,
8351,
7340,
9394,
9908,
... | Test |
1,835 | 5 | Zeta-TCP:zeta-tcp zeta-tcp refers set proprietary transmission control protocol tcp algorithms targeted improve end-to-end performance tcp regardless whether peer zeta-tcp tcp protocol stack words compatible existing tcp algorithms designed implemented appex networks corporation zeta-tcp offers following improvements primarily tcp stack implementations today use tcp new reno variations tcp sack rfc3517 congestion avoidance algorithm new reno-based algorithms loss-based loss-based algorithms treat packet losses sole indication congestions network internet since evolved assumption often overkill today congestion loss constantly descending advancement technologies relatively random loss due properties media e.g. wireless/fading channels wireline noises/cross-talk connectivity flaws software bugs etc. increasing congestion detected false-alarmed new reno shrinks congestion window cwnd sharply causing plunge sending rate one major reasons tcp based applications often barely able utilize fraction subscribed bandwidth today especially rtt large tcp vegas variations notably fast tcp base congestion prodications rtt measurement latency-based algorithms overcome problems loss-based ones usually realistic reflection congestions network latency-based algorithms limitations zeta-tcp attempts tackle problem combining strength latency-based loss-based algorithms constantly measures rtt variation loss rate variation calculates likelihood congestions different cwnd backoff schemes applied based likelihood level highest level applies backoff scheme new reno already proven effective stable many years massive deployment packet losses real network environment rarely spread evenly rather tend happen close tcp related rfcs new reno sack etc explicitly defined first loss detected high confidence however detection losses tcp enters fast recovery mode sack permitted efficient rfc3517 popular operating systems implementations equally suboptimal zeta-tcp introduced simple effective algorithm calculate loss probability every unack'd/unsack 'd packet packet retransmitted loss probability surpassed certain threshold rule applies retransmission decision every packet therefore zeta-tcp able minimize number retransmitted packets improving bandwidth utilization lab tests also confirmed zeta-tcp retransmitted much fewer packets tcp implementations loss rate zeta-tcp also developed mechanism accurately detect packet loss earliest possible time suspects loss likely happen early-detection usually save rtt two retransmission algorithms focus accelerating outgoing traffic reverse control attempts address incoming issues reverse control monitors quality connections inbound data executes algorithm hint peer transmit fast connection quality good algorithm also makes good effort accurately identify real packet losses abnormal situations order avoid triggering unnecessary fast recoveries reverse-controlled inbound acceleration heuristic inbound speed really controlled sender i.e. peer hint peer send faster tcp stacks take hint others n't also quite often sender side content server instance rate limiting mechanism acceleration effect capped addition acceleration reverse control also limit inbound rate unlike acceleration putting brake inbound traffic effective accurate tcp flow control mechanism inbound rate limiting zeta-tcp lays foundation inbound flow control appex ipeq time writing zeta-tcp implemented software modules linux netfilter kernel module microsoft windows 10 xp related windows server versions ndis im filter/ndis lwf wince appex chose modify protocol stack intercept tcp flows apply algorithms on-the-fly nonintrusive way implement algorithms intended wider acceptance drawback added overhead processing reality overhead negligible comparison performance gains | [
7017,
10924,
112,
6524,
9021,
10079
] | None |
1,836 | 4 | EJBCA:ejbca ejbca free software public key infrastructure pki certificate authority software package maintained sponsored swedish for-profit company primekey solutions ab holds copyright codebase project source code available terms lesser gnu general public license system implemented java ee designed platform independent fully clusterable permit greater degree scalability typical similar software packages multiple instances ejbca run simultaneously sharing database containing current certificate authorities cas permits instance software access ca software also supports use hardware security module hsm provides additional security larger-scale installations would use multiple instances ejbca running cluster fully distributed database separate cluster third cluster hsms keeping different ca keys ejbca supports many common pki architectures single server distributed ras external validation authority example architecture illustrated ejbca supports running unlimited number cas levels cas single installation build complete infrastructure several within one instance ejbca certificate validation choice using x.509 crls ocsp rfc6960 ejbca software includes separate registration authority ra front end run instance ca distributed external ras communication ca ra using outgoing network connections insulate ca less trusted networks ra typically placed use common uncommon algorithms pki rsa ecdsa dsa sha-1 sha-2 compliant nsa suite b cryptography ejbca support x.509v3 certificates card verifiable certificates cvc bsi tr-03110 certificates compliant standards rfc5280 ca/browser forum eidas icao 9303 eac 2.10 iso 18013 amendment 2 edl using standard pkcs 11 api use pkcs 11 compliant hsms protect cas ’ ocsp responders ’ private keys ejbca designed integration mind standard protocols supported cmp scep est acme well web services using integration apis possible integrate ejbca certificate factory exposing native user interfaces build pki capacity issuing billions certificates rate several hundreds per second | [
513,
517,
3560,
5834,
5612,
5677,
7983,
5200,
7985,
10831,
11387,
7231
] | None |
1,837 | 9 | ActivePerl:activeperl activeperl distribution perl activestate formerly part sophos windows macos linux solaris aix hp-ux main editions available including community free development use several paid tiers enterprise includes support oem licensing includes version perl package manager ppm installing packages cpan etc windows version includes active scripting component windows script host wsh called perlscript isapi module embedding within internet information services iis perlscript initially solely activex scripting engine produced company activestate use microsoft internet information services iis allows programmers use perl-based code addition place vbscript jscript context web servers running asp protocol subsequently apache :asp created apache web server allows coding perl neither vbscript jscript perlscript also used write windows script host-based programs similar vbscript standalone perlscripts executed created file extension .pls case require enclosing xml e.g .pls files gain access drag drop wsh functionality perlscripts extension wsf require xml tags specify job id script language e.g wsf perlscripts gain access wsh drag drop functionality similarly perl droplets now-obsolete macperl wsh objects available via implicitly created wscript object | [
5249,
8582,
6797,
3988,
1304,
11683,
6313,
10026,
4398,
4658,
9014,
823,
4294,
9808,
7764,
4439,
603,
7518,
479,
9055,
865,
11492,
2281,
8941
] | Test |
1,838 | 4 | Director_of_the_National_Security_Agency:director national security agency director national security agency dirnsa highest-ranking official national security agency defense agency within u.s. department defense director nsa also concurrently serves chief central security service chcss commander u.s. cyber command uscybercom dirnsa/chcss officeholder reports secretary defense intelligence cdruscybercom secretary defense according united states code director nsa recommended secretary defense nominated appointment president nominee must confirmed via majority vote senate accordance department defense directive 5100.20 dated 23 december 1971 director nsa must always commissioned officer military services assignment currently part tri-hatted position director nsa appointed grade four-star general admiral period incumbency deputy director always technically experienced civilian armed forces security agency predecessor national security agency existed 1949 1952 | [
6017,
1930,
6668,
8726,
1189,
9517,
5308,
1986,
6343,
6344,
11335,
7119,
7759,
7887,
3154,
8276,
7893,
991,
7137,
2275,
3305,
7145,
2419,
6005,
6136,
766
] | Test |
1,839 | 2 | Computer_Systems_Research_Group:computer systems research group computer systems research group csrg research group university california berkeley dedicated enhancing unix operating system funded defense advanced research projects agency professor bob fabry berkeley acquired unix source license 1974 group started modify unix distributed version berkeley software distribution bsd april 1980 fabry signed contract darpa develop unix even accommodate specific requirements arpanet funding fabry created computer systems research group berkeley sockets api berkeley fast file system group significant innovations sockets interface solved problem supporting multiple protocols e.g xns tcp/ip extended unix everything file notion network protocols fast file system increased block allocation size 512 bytes 4096 bytes larger improving disk transfer performance also allowing micro-blocks small 128 bytes improved disk utilization another noteworthy contribution job control signals allowed user suspend job key-press control-z continue running job background c shell noteworthy versions bsd 3.0 bsd first version bsd support virtual memory 4.0 bsd included job-control ctrl-z functionality suspend restart running job special 4.15 interim bsd version released using bbn tcp/ip 4.2 bsd included full tcp/ip stack ffs nfs support early 1980s csrg best-known non-commercial unix developer majority unix sites used least berkeley software included csrg work unix system v. 1970s 1980s t/usl raised commercial licensing fee unix 20,000 100,000– 200,000 became big problem small research labs companies used bsd csrg decided replace source code originated succeeded 1994 n't agree took berkeley court settlement 1994 csrg distributed last versions called 4.4bsd-lite bsd-licensed 4.4bsd-encumbered unix-licensed group disbanded 1995 leaving significant legacy freebsd openbsd netbsd dragonfly bsd based 4.4bsd-lite distribution continue play important role open-source unix community today including dictating style c programming used via knf style man page alongside free software foundation linux csrg laid foundations open source community former members include keith bostic bill joy marshall kirk mckusick samuel j leffler michael j. karels among others corporations sun microsystems berkeley software design sleepycat software later acquired oracle considered spin-off companies csrg berkeley software design led robert kolstad led development bsd unix supercomputers convex computer mach kernel | [
7552,
5506,
1927,
4745,
7561,
7307,
10761,
2061,
9743,
8725,
2584,
5534,
11297,
1316,
684,
4908,
7983,
2994,
1718,
823,
1080,
5815,
8504,
9151,
9153,
9665,
3651,
7748,
10436,
9927,
8395,
5710,
5969,
850,
6361,
9306,
10202,
3551,
607,
9320... | Test |
1,840 | 7 | Zettagrid:zettagrid zettagrid pty ltd australian based public cloud computing provider offer infrastructure service iaas backup baas disaster recovery draas services company management architecture applications development divisions operate perth western australia sales offices sydney jakarta zettagrid launched may 2010 offering vmware vsphere virtual private server hosting perth western australia july 2011 zettagrid launched virtual data centre service based upon vmware vcloud amazon web services rackspace microsoft azure macquarie telecom telstra optus | [
4194,
3819,
4429,
1935,
6703,
7248,
6514,
9682,
11097
] | Test |
1,841 | 9 | Control_table:control table control tables tables control control flow play major part program control rigid rules structure content control table—its qualifying attribute ability direct control flow way execution processor interpreter design tables sometimes referred table-driven design although typically refers generating code automatically external tables rather direct run-time tables cases control tables specific implementations finite-state-machine-based automata-based programming several hierarchical levels control table may behave manner equivalent uml state machines control tables often equivalent conditional expressions function references embedded usually implied relative column position association list control tables reduce need programming similar structures program statements two-dimensional nature tables makes easier view update one-dimensional nature program code cases non-programmers assigned maintain control tables tables multiple dimensions fixed variable lengths usually portable computer platforms requiring change interpreter algorithm logic essentially embodied within table structure content structure table may similar multimap associative array data value combination data values may mapped one functions performed perhaps simplest implementation control table may sometimes one-dimensional table directly translating raw data value corresponding subroutine offset index pointer using raw data value either directly index array performing basic arithmetic data beforehand achieved constant time without linear search binary search using typical lookup table associative array architectures accomplished two three machine instructions without comparisons loops technique known trivial hash function used specifically branch tables double dispatch feasible range possible values data needs small e.g ascii ebcdic character value range hexadecimal '00 'ff actual range guaranteed smaller array truncated less 256 bytes table translate raw ascii values new subroutine index 1,4,3,2 constant time using one-dimensional array automata-based programming pseudoconversational transaction processing number distinct program states small dense sequence control variable used efficiently dictate entire flow main program loop two byte raw data value would require minimum table size 65,536 bytes handle input possibilities whilst allowing 256 different output values however direct translation technique provides extremely fast validation conversion relative subroutine pointer heuristics together sufficient fast access memory permits use branch table one-dimensional 'array contiguous machine code branch/jump instructions effect multiway branch program label branched immediately preceding indexed branch sometimes generated optimizing compiler execute switch statement provided input range small dense gaps created previous array example although quite compact compared multiple equivalent codice_1 statements branch instructions still carry redundancy since branch opcode condition code mask repeated alongside branch offsets control tables containing offsets program labels constructed overcome redundancy least assembly languages yet requiring minor execution time overhead compared conventional branch table usually control table thought truth table executable binary implementation printed decision table tree decision tables several levels contain often implied propositions together one associated 'actions actions usually performed generic custom-built subroutines called interpreter program interpreter instance effectively functions virtual machine 'executes control table entries thus provides higher level abstraction underlying code interpreter control table constructed along similar lines language dependent switch statement added possibility testing combinations input values using boolean style and/or conditions potentially calling multiple subroutines instead single set values 'branch program labels switch statement construct case may available confusingly differing implementations high level languages hll control table concept comparison intrinsic language dependencies might nevertheless implemented differently according available data definition features chosen programming language control table essentially embodies 'essence conventional program stripped programming language syntax platform dependent components e.g if/then do.. for.. while.. switch goto call 'condensed variables e.g input1 values e.g 'm 'd subroutine identities e.g 'add 'subtract.. 1 2.. structure table typically implies default logical operations involved 'testing equality performing subroutine 'next operation following default sequence rather explicitly stated within program statements required programming paradigms multi-dimensional control table normally minimum contain value/action pairs may additionally contain operators type information location size format input output data whether data conversion run-time processing nuances required processing already implicit function table may may contain indexes relative absolute pointers generic customized primitives subroutines executed depending upon values row table illustrated applies 'input1 since specific input specified table conditions actions implied structure variety values encoded within control table largely dependent upon computer language used assembly language provides widest scope data types including actions option directly executable machine code typically control table contain values possible matching class input together corresponding pointer action subroutine languages claim support pointers directly nevertheless instead support index used represent 'relative subroutine number perform conditional execution controlled value table entry e.g use optimized switch statement designed zero gaps i.e multiway branch comments positioned column even embedded textual documentation render decision table 'human readable even 'condensing encoding essentials still broadly in-line original program specification especially printed decision table enumerating unique action created coding begins table entries also optionally contain counters collect run-time statistics 'in-flight later optimization control tables reside static storage auxiliary storage flat file database may alternatively partially entirely built dynamically program initialization time parameters may reside table optimum efficiency table memory resident interpreter begins use interpreter written suitable programming language including high level language suitably designed generic interpreter together well chosen set generic subroutines able process commonly occurring primitives would require additional conventional coding new custom subroutines addition specifying control table interpreter optionally may apply well-defined sections complete application program main control loop 'less conditional sections program initialization termination interpreter need unduly complex produced programmer advanced knowledge compiler writer written application program except usually designed efficiency mind primary function execute table entries set instructions need requirement parsing control table entries therefore designed far possible 'execution ready requiring plugging variables appropriate columns already compiled generic code interpreter program instructions theory infinitely extensible constitute possibly arbitrary values within table meaningful interpreter control flow interpreter normally sequential processing table row may modified specific actions table entries arbitrary values thus designed efficiency mind selecting values used direct indexes data function pointers particular platforms/language specifically designed minimize instruction path lengths using branch table values even cases jit compilers consist directly executable machine code snippets pointers subroutines may coded either language interpreter supported program language provided suitable inter-language 'call linkage mechanisms exist choice language interpreter and/or subroutines usually depend upon portable needs across various platforms may several versions interpreter enhance portability control table subordinate control table pointer may optionally substitute subroutine pointer 'action column interpreter supports construct representing conditional 'drop lower logical level mimicking conventional structured program structure first sight use control tables would appear add quite lot program overhead requiring interpreter process 'native programming language statements executed however always case separating 'encapsulating executable coding logic expressed table readily targeted perform function efficiently may experienced obviously spreadsheet application underlying spreadsheet software transparently converts complex logical 'formulae efficient manner able order display results examples chosen partly illustrate potential performance gains may compensate significantly additional tier abstraction also improve upon otherwise might less efficient less maintainable lengthier code although examples given 'low level assembly language c language seen cases lines code required implement control table approach yet achieve significant constant time performance improvements reduce repetitive source coding aid clarity compared verbose conventional program language constructs see also quotations donald knuth concerning tables efficiency multiway branching article following examples arbitrary based upon single input simplicity however intention merely demonstrate control flow effected via use tables instead regular program statements clear technique easily extended deal multiple inputs either increasing number columns utilizing multiple table entries optional and/or operator similarly using hierarchical 'linked control tables structured programming accomplished optionally using indentation help highlight subordinate control tables ct1 example control table simple lookup table first column represents input value tested implied 'if input1 x true corresponding 2nd column 'action contains subroutine address perform call jump similar switch statement effect multiway branch return form dynamic dispatch last entry default case match found ct1 programming languages support pointers within data structures alongside data values table ct1 used direct control flow appropriate subroutines according matching value table without column indicate otherwise equality assumed simple case assembly language example ibm/360 maximum 16mb address range z/architecture attempt made optimize lookup coding first example uses instead simple linear search technique purely illustrate concept demonstrate fewer source lines handle 256 different input values approximately 265 lines source code would required mainly single line table entries whereas multiple 'compare branch would normally required around 512 source lines size binary also approximately halved table entry requiring 4 bytes instead approximately 8 bytes series 'compare immediate'/branch instructions larger input variables saving even greater improving performance interpreter example improved interpreter 26 times less executed instructions example average n= 1 64 13 times less would needed using multiple comparisons handle 64 different input values approximately 85 lines source code less required mainly single line table entries whereas multiple 'compare branch would require around 128 lines size binary also almost halved despite additional 256 byte table required extract 2nd index improved interpreter 21 times less executed instructions n =64 first example average 42 times less would needed using multiple comparisons handle 256 different input values approximately 280 lines source code less would required mainly single line table entries whereas multiple 'compare branch would require around 512 lines size binary also almost halved c language example example c uses two tables first ct1 simple linear search one-dimensional lookup table obtain index matching input x second associated table ct1p table addresses labels jump made efficient 256 byte table used translate raw ascii value x directly dense sequential index value use directly locating branch address ct1p i.e index mapping byte-wide array execute constant time possible values x ct1p contained names functions instead labels jump could replaced dynamic function call eliminating switch-like goto decreasing performance additional cost function housekeeping next example illustrates similar effect achieved languages support pointer definitions data structures support indexed branching subroutine contained within 0-based array subroutine pointers table ct2 used extract index 2nd column pointer array ct2p pointer arrays supported switch statement equivalent used alter control flow one sequence program labels e.g case0 case1 case2 case3 case4 either process input directly else perform call return appropriate subroutine default add subtract multiply divide.. deal ct2 examples possible efficiently translate potential ascii input values unknown pointer array index without actually using table lookup shown table consistency first example multi-dimensional control tables constructed i.e customized 'more complex examples might test multiple conditions multiple inputs perform one 'action based matching criteria 'action include pointer another subordinate control table simple example implicit 'or condition incorporated extra column handle lower case input however instance could equally handled simply extra entry lower case characters specifying subroutine identifier upper case characters extra column count actual run-time events input occur also included ct3 control table entries much similar conditional statements procedural languages crucially without actual language dependent conditional statements i.e instructions present generic code physically interpreter processes table entries table simply embodies program logic via structure values tables series similar table entries defines entire logic table entry number pointer may effectively take place program counter conventional programs may reset 'action also specified table entry example ct4 shows extending earlier table include 'next entry and/or including 'alter flow jump subroutine create loop example actually efficient way construct control table demonstrating gradual 'evolution first examples shows additional columns used modify behaviour fifth column demonstrates one action initiated single table entry case action performed normal processing entry '- values mean 'no conditions 'no action structured programming goto-less code incorporating equivalent 'do 'for loop constructs also accommodated suitably designed 'indented control table structures ct4 complete 'program read input1 process repeating e encountered specialist field telecommunications rating concerned determining cost particular call table-driven rating techniques illustrate use control tables applications rules may change frequently market forces tables determine charges may changed short notice non-programmers many cases algorithms pre-built interpreter therefore require additional runtime interpretation expression held table known rule-based rating rather table-driven rating consequently consumes significantly overhead spreadsheet data sheet thought two dimensional control table non empty cells representing data underlying spreadsheet program interpreter cells containing formula usually prefixed equals sign simply designate special type data input dictates processing referenced cells altering control flow within interpreter externalization formulae underlying interpreter clearly identifies spreadsheets cited rule based rating example readily identifiable instances use control tables non programmers control tables technique could said belong particular programming paradigm closest analogy might automata-based programming reflective form metaprogramming since table entries could said 'modify behaviour interpreter interpreter however subroutines programmed using one available paradigms even mixture table essentially collection raw data values even need compiled could read external source except specific platform dependent implementations using memory pointers directly greater efficiency multi-dimensional control table conceptual similarities bytecode operating virtual machine platform dependent interpreter program usually required perform actual execution largely conditionally determined tables content also conceptual similarities recent common intermediate language cil aim creating common intermediate 'instruction set independent platform unlike cil pretensions used common resource languages p-code also considered similar earlier implementation origins far back 1966 multi-dimensional control table used determine program flow normal hardware program counter function effectively simulated either pointer first next table entry else index fetching instruction involves decoding data table entry without necessarily copying data within entry first programming languages able use pointers dual advantage less overhead involved accessing contents also advancing counter point next table entry execution calculating next 'instruction address i.e table entry even performed optional additional action every individual table entry allowing loops jump instructions stage interpreter program optionally save program counter relevant details depending upon instruction type stage record full partial trace actual program flow debugging purposes hot spot detection code coverage analysis performance analysis see examples ct3 ct4 optionally following mainly apply use multi-dimensional tables one-dimensional tables discussed earlier | [
9345,
522,
9739,
11674,
8609,
2339,
8868,
7461,
5415,
10796,
1841,
7607,
2619,
2620,
4042,
7627,
9932,
2901,
7421,
477,
9315,
5354,
2798,
1776,
9330,
3443,
372,
9714,
2811,
3708,
2045
] | None |
1,842 | 2 | Flatpak:flatpak flatpak formerly xdg-app software utility software deployment package management linux advertised offering sandbox environment users run application software isolation rest system applications using flatpak need permissions access bluetooth sound pulseaudio network files etc. permissions defined maintainer flatpak controlled added removed users system flatpak developed part freedesktop.org project formerly known x desktop group xdg originally called xdg-app flathub repository remote source flatpak terminology located become de facto standard getting applications packaged flatpak packages added flathub administrators developers programs though admins stated preference developer-submitted apps although flathub de facto source applications packaged flatpak flatpak work independently flathub possible host remote access remotes totally independent flathub | [
2432,
11525,
2310,
10760,
2955,
7435,
7181,
7309,
7947,
2448,
9487,
788,
1813,
8213,
10900,
6680,
8476,
4902,
4775,
5670,
6694,
7847,
6828,
8621,
6446,
7983,
823,
2872,
6583,
11322,
3131,
5819,
10172,
190,
3649,
10817,
9671,
5067,
3918,
4... | None |
1,843 | 4 | Honeyd:honeyd honeyd open source computer program created niels provos allows user set run multiple virtual hosts computer network virtual hosts configured mimic several different types servers allowing user simulate infinite number computer network configurations honeyd primarily used field computer security honeyd used primarily two purposes using software ability mimic many different network hosts 65536 hosts honeyd act distraction potential hackers network 3 real servers one server running honeyd network appear running hundreds servers hacker hacker research possibly social engineering order determine servers real hacker may get caught honeypot either way hacker slowed possibly caught honeyd gets name ability used honeypot network normal traffic valid servers thus network administrator running honeyd monitor his/her logs see traffic going virtual hosts set honeyd traffic going virtual servers considered highly suspicious network administrator take preventative action perhaps blocking suspicious ip address monitoring network suspicious traffic | [
9256,
1785,
4956,
2045,
2558
] | None |
1,844 | 6 | Hard_link:hard link computing hard link directory entry associates name file file system directory-based file systems must least one hard link giving original name file term “ hard link ” usually used file systems allow one hard link file creating additional hard link effect giving one file multiple names e.g different names different directories independently connect data disk none depends others causes alias effect e.g file opened one names changes made content changes also visible file opened alternative name contrast soft link “ shortcut ” file direct link data rather short file contains text file name location gives direct access yet another file name within directory name contained referred soft link may either hard link another soft link also creates aliasing different way every directory file special contains list file names maintained file system since directories files multiple hard links directories possible could create loops within structure directories rather branching structure like tree reason creation hard links directories sometimes forbidden multiple hard links – multiple directory entries file – supported posix-compliant partially posix-compliant operating systems linux android macos also windows nt4 later windows nt operating systems support also depends type file system used instance ntfs file system supports multiple hard links fat refs posix-compliant partially posix-compliant operating systems unix-like systems additional hard links existing files created system call ln link command-line utilities codice_1 command reveal many hard links point given file link count also included output codice_2 microsoft windows hard links created using codice_3 command windows nt 6.0 later systems windows vista earlier systems windows xp windows server 2003 using codice_4 windows api windows 2000 onwards includes createhardlink call create hard links deletefile used remove getfileinformationbyhandle used determine number hard links associated file hard links require ntfs partition starting windows vista hard links used windows component store winsxs keep track different versions dlls stored hard disk drive unix-like emulation compatibility software running windows cygwin subsystem unix-based applications allow use posix interfaces windows process unlinking dissociates name data volume without destroying associated data data still accessible long least one link points still exists last link removed space considered free process called undeleting allows recreation links data longer associated name however process available systems often reliable file deleted added free space map re-use portion deleted file space claimed new data undeletion unsuccessful previous data overwritten may result cross-linking new data leading filesystem corruption additionally deleted files solid state drives may erased time storage device reclamation free space file systems support hard links use reference counting integer value stored physical data section integer represents total number hard links created point data new link created value increased one link removed value decreased one link count becomes zero operating system usually automatically deallocates data space file process file opened access may choose immediately either performance enable undelete command maintenance value guarantees dangling hard links pointing nowhere happen symbolic links filesystem file associated inode preserved long single hard link directory reference points process keeps associated file open relieving burden accounting programmer user simple method file system track use given area storage zero values indicate free space nonzero values indicate used space posix-compliant operating systems many unix-variants reference count file directory returned stat fstat system calls codice_5 field codice_6 figure right two hard links named link a.txt link b.txt point physical data file link a.txt opened editor modified saved changes visible file link b.txt opened viewing since filenames point data opened posix systems associated file descriptor remains valid opening even original file moved true file opened link b.txt — name associated data editors however break hard link concept e.g emacs opening file link b.txt editing emacs first renames link b.txt link b.txt~ loads link b.txt~ editor saves modified contents newly created link b.txt using approach two hard links link a.txt link b.txt~ backup file link b.txt would one link longer shares data link a.txt behavior changed using emacs variable codice_7 number hard links physical data may created access data user needs specify name existing link operating system resolve location actual data one links removed posix unlink function example unix codice_8 command data still accessible link remains links removed process file open space occupied data freed allowing reused future semantic allows deleting open files without affecting process uses technique commonly used ensure temporary files deleted automatically program termination including case abnormal termination prevent loops filesystem keep interpretation parent directory consistent many modern operating systems allow hard links directories unix system v allowed superuser permission make links mac os x v10.5 leopard newer use hard links directories time machine backup mechanism symbolic links ntfs junction points generally used instead purpose hard links created files volume link file different volume needed may created symbolic link maximum number hard links single file limited size reference counter unix-like systems counter usually machine-word-sized 32- 64-bit 4,294,967,295 18,446,744,073,709,551,615 links respectively though filesystems number hard links limited strictly on-disk format linux 3.11 ext4 filesystem limits number hard links file 65,000 windows ntfs filesystem limit 1024 hard links file hard links criticized high-maintenance design neil brown linux weekly news since complicate design programs handle directory trees including archivers disk usage tools du must take care de-duplicate files linked multiple times hierarchy brown also calls attention fact plan 9 bell labs intended successor unix include concept hard link | [
5120,
2051,
516,
11270,
5643,
6669,
3598,
4624,
10257,
9747,
6677,
5142,
8214,
10774,
537,
540,
3102,
9762,
8227,
8740,
5158,
1577,
10281,
8236,
52,
2101,
11323,
10812,
576,
3648,
8772,
10310,
1098,
7754,
7244,
4173,
4174,
10314,
9808,
10... | Test |
1,845 | 4 | Security_tape:security tape security tape security label type adhesive tape used help reduce shipping losses due pilfering reduce tampering product adulteration often pressure sensitive tape label special tamper resistant tamper evident features used ‘ ’ security seal ’ ’ addition container closure used security label sometimes used authentication products anti-pilferage seal security tapes labels sometimes used conjunction security envelopes security tapes used packaging tapes small primary packages bottles cartons larger shipping containers corrugated boxes also used unit loads palletized goods strength adhesive bonding important security labels usually used security features backing strength less important bonding characteristics critical security tapes appearance similar standard packaging tapes help conceal value pilferable item logistics packaging professionals want bring attention item package security tapes bright colors high impact graphics security tapes labels one part broader security system one layer security provide full protection shipments packages security products foiled knowledgeable person sufficient time access specialized tools solvents extreme temperatures security tapes labels adhesives etc security tapes labels usually add security one point entry container points unauthorized entry sometimes available security tapes also used access doors temporary area denial tamper indicating seals sensitive equipment uses security tapes require stability sun heat many types constructions tapes labels used security use security printing holography embossing barcodes rfid chips etc common tape strips labels sequential serial numbers bar codes etc custom printing corporate logo etc useful needs revised periodically creative counterfeiters many security tapes extra strong backings high performance adhesives damaged partially open package invitation theft tampering high graphics draw attention package shipment security tapes often special features indicate opening including security tapes usually wound roll storage dispensing either release liner used premium release coating used top surface security labels typically employ release liner die-cut sometimes tape label intended provide signal removal container tampering imaging delamination fracture etc desired outcome tape label correctly indicate attempted unauthorized container opening conversely signal tampering tampering type binary classification may possible “ false negative ” label appears intact yet tampering occurred depending specific security tape/label may specialized means removing reattaching label covering obscuring signaled/activated label etc also tampering could occurred different part container “ false positive ” may also possible either accident intent | [
5433,
10163,
6141
] | None |
1,846 | 3 | ICLOAK:icloak icloak linux-based operating system designed security primary objective boots live usb device replaces main os default leaves trace user computer unless files explicitly saved persistent partition internet traffic routed tor icloak comes various utilities word-processor abiword spreadsheet application gnumeric originally icloak funded successful kickstarter campaign raised 100,000 | [
7483,
5363,
7983
] | Test |
1,847 | 4 | Time/memory/data_tradeoff_attack:time/memory/data tradeoff attack time/memory/data tradeoff attack type cryptographic attack attacker tries achieve situation similar space–time tradeoff one parameter data amount data available attacker real time attacker balances reduces one two parameters favor one two type attack hard ciphers encryption schemes designed resist type attack attack special type general cryptanalytic time/memory tradeoff attack tradeoff attacks symmetric cryptosystems dates back 1980 hellman suggested time/memory tradeoff method break block ciphers formula_1 possible keys time formula_2 memory formula_3 related tradeoff curve formula_4 formula_5 later babbage golic devised different tradeoff attack stream ciphers new bound formula_6 formula_7 formula_8 output data available cryptanalyst real time attack special type general cryptanalytic time/memory tradeoff attack general time/memory tradeoff attack two main phases time/memory/data tradeoff attack following parameters block ciphers formula_1 total number possible keys also assume number possible plaintexts ciphertexts formula_1 also let given data single ciphertext block specific plaintext counterpart consider mapping key formula_16 ciphertext formula_17 random permutation function formula_18 formula_1 point space function formula_18 invertible need find inverse function formula_21 hellman technique invert function according hellman block cipher hand property mapping key cipher text random permutation function formula_18 formula_1 point space formula_18 invertible tradeoff relationship becomes ways better formula_6 stream ciphers formula_1 specified number internal states bit generator probably different number keys formula_8 count first pseudorandom bits produced generator finally attacker goal find one actual internal states bit generator able run generator point generate rest key associate possible formula_1 internal states bit generator corresponding string consists first formula_66 bits obtained running generator state mapping formula_67 states formula_16 output prefixes formula_17 previous mapping considered random function formula_1 points common space invert function attacker establishes following result birthday attack gives condition formula_85 attack time formula_86 preprocessing time formula_87 particular point tradeoff curve formula_6 generalize relation ignore available data real time able reduce formula_2 formula_86 formula_91 general tradeoff curve eventually becomes formula_6 formula_7 formula_87 novel idea introduced 2000 combines hellman tradeoff babbage-and-golic tradeoff attacks achieve new tradeoff curve better bounds stream ciphers cryptoanalysis hellman block cipher technique applied stream cipher using idea covering formula_1 points space matrices obtained multiple variants formula_54 function formula_18 mapping internal states output prefixes recall tradeoff attack stream cipher successful given formula_8 output prefixes found matrices covering formula_1 cuts number covered points matrices formula_1 formula_101 points done reducing number matrices formula_27 formula_103 keeping formula_25 large possible requires formula_105 least one table new attack formula_106 reduced number matrices formula_103 preprocessing time formula_108 realtime required attack formula_109 product number matrices length iteration number available data points attack time eventually use matrix stopping rule obtain tradeoff curve formula_110 formula_111 formula_112 attack invented biryukov shamir wagner idea relies following feature various stream ciphers bit generator undergoes changes internal state producing next output bit therefore enumerate special states generate formula_113 zero bits small values formula_113 low cost forcing large number output bits take specific values enumeration process become expensive difficult define sampling resistance stream cipher formula_115 formula_113 maximum value makes enumeration feasible let stream cipher formula_117 states full name formula_118 bits corresponding output name first formula_118 bits output sequence bits stream cipher sampling resistance formula_115 efficient enumeration use short name formula_121 bits define special states generator special state formula_121 short name corresponding short output name formula_121 bits output sequence special state removing first formula_113 leading bits able define new mapping reduced space formula_125 points mapping equivalent original mapping let formula_126 realtime data available attacker guaranteed least one output special states otherwise relax definition special states include points substitute formula_8 formula_128 formula_1 formula_130 new time/memory/data tradeoff attack shamir biryukov obtain tradeoff curve formula_131 formula_132 actually improvement since could relax lower bound formula_2 since formula_134 small formula_91 means attack made faster technique reduces number expensive disk access operations formula_27 formula_137 since accessing special formula_128 points makes attack faster reduced number expensive disk operations | [
7556,
2567,
3084,
2957,
7056,
658,
660,
1173,
1941,
10662,
169,
11185,
2357,
10806,
9528,
9541,
10315,
6863,
8273,
10963,
212,
9556,
2265,
1114,
7643,
9697,
618,
1898,
881,
1654,
7161,
7034,
892
] | Test |
1,848 | 3 | Load_task_register:load task register ltr x86 instruction stands load task register used operating systems support multitasking ltr supported protected mode long mode real mode virtual 8086 mode must executed cpl 0 therefore used application programs ltr loads special x86 task register segment selector points task state segment executing ltr instruction tss pointed argument marked busy hardware task switch occurs opposite ltr instruction str instruction copies value task register specified location note x86 task register accessible directly ltr str instructions | [
255,
2345,
6730,
2987,
499,
5080,
1247
] | None |
1,849 | 3 | Raspberry_Pi:raspberry pi raspberry pi series small single-board computers developed united kingdom raspberry pi foundation promote teaching basic computer science schools developing countries original model became far popular anticipated selling outside target market uses robotics include peripherals keyboards mice cases however accessories included several official unofficial bundles organisation behind raspberry pi consists two arms first two models developed raspberry pi foundation pi model b released foundation set raspberry pi trading eben upton ceo develop third model b+ raspberry pi trading responsible developing technology foundation educational charity promote teaching basic computer science schools developing countries according raspberry pi foundation 5 million raspberry pis sold february 2015 making best-selling british computer november 2016 sold 11 million units 12.5m march 2017 making third best-selling general purpose computer july 2017 sales reached nearly 15 million march 2018 sales reached 19 million pis made sony factory pencoed wales made china japan several generations raspberry pis released models feature broadcom system chip soc integrated arm-compatible central processing unit cpu on-chip graphics processing unit gpu processor speed ranges 700 mhz 1.4 ghz pi 3 model b+ 1.5ghz pi 4 on-board memory ranges 256 mb 1 gb 4 gb available pi 4 random-access memory ram secure digital sd cards microsdhc form factor sdhc early models used store operating system program memory boards one four usb ports video output hdmi composite video supported standard 3.5 mm tip-ring-sleeve jack audio output lower-level output provided number gpio pins support common protocols like i²c b-models 8p8c ethernet port pi 3 pi zero w on-board wi-fi 802.11n bluetooth prices range us 5 55 first generation raspberry pi 1 model b released february 2012 followed simpler cheaper model 2014 foundation released board improved design raspberry pi 1 model b+ boards approximately credit-card sized represent standard mainline form-factor improved a+ b+ models released year later compute module released april 2014 embedded applications raspberry pi 2 added ram released february 2015 raspberry pi zero smaller size reduced input/output i/o general-purpose input/output gpio capabilities released november 2015 us 5 2017 became newest mainline raspberry pi 28 february 2017 raspberry pi zero w launched version zero wi-fi bluetooth capabilities us 10 12 january 2018 raspberry pi zero wh launched version zero w pre-soldered gpio headers raspberry pi 3 model b released february 2016 1.2 ghz 64-bit quad core processor on-board 802.11n wi-fi bluetooth usb boot capabilities pi day 2018 raspberry pi 3 model b+ launched faster 1.4 ghz processor three-times faster gigabit ethernet throughput limited ca 300 mbit/s internal usb 2.0 connection 2.4 5 ghz dual-band 802.11ac wi-fi 100 mbit/s features power ethernet poe usb boot network boot sd card longer required raspberry pi 4 model b released june 2019 1.5 ghz 64-bit quad core arm cortex-a72 processor on-board 802.11ac wi-fi bluetooth 5 full gigabit ethernet throughput limited two usb 2.0 ports two usb 3.0 ports dual monitor support 4k resolution pi 4 also powered via usb-c port enabling additional power provided downstream peripherals used appropriate psu three sizes onboard ram available 1 gb us 35 2 gb us 45 4 gb us 55 raspberry pi 4 design flaw third-party e-marked usb cables used apple macbooks incorrectly identify refuse provide power expected corrected future board revision tom hardware tested 14 different cables found 11 turned powered pi without issue raspberry pi hardware evolved several versions feature variations memory capacity peripheral-device support block diagram describes model b b+ model a+ pi zero similar lack ethernet usb hub components ethernet adapter internally connected additional usb port model a+ pi zero usb port connected directly system chip soc pi 1 model b+ later models usb/ethernet chip contains five-port usb hub four ports available pi 1 model b provides two pi zero usb port also connected directly soc uses micro usb otg port unlike pi models 40 pin gpio connector omitted pi zero solderable holes pin locations pi zero wh remedies broadcom bcm2835 soc used first generation raspberry pi includes 700 mhz arm1176jzf-s processor videocore iv graphics processing unit gpu ram level 1 l1 cache 16 kb level 2 l2 cache 128 kb level 2 cache used primarily gpu soc stacked underneath ram chip edge visible arm1176jz f -s cpu used original iphone although higher clock rate mated much faster gpu earlier v1.1 model raspberry pi 2 used broadcom bcm2836 soc 900 mhz 32-bit quad-core arm cortex-a7 processor 256 kb shared l2 cache raspberry pi 2 v1.2 upgraded broadcom bcm2837 soc 1.2 ghz 64-bit quad-core arm cortex-a53 processor soc used raspberry pi 3 underclocked default 900 mhz cpu clock speed v1.1 bcm2836 soc longer production late 2016 raspberry pi 3+ uses broadcom bcm2837b0 soc 1.4 ghz 64-bit quad-core arm cortex-a53 processor 512 kb shared l2 cache raspberry pi 4 uses broadcom bcm2711 soc 1.5 ghz 64-bit quad-core arm cortex-a72 processor raspberry pi zero zero w use broadcom bcm2835 soc first generation raspberry pi although running 1 ghz cpu clock speed operating 700 mhz default first generation raspberry pi provided real-world performance roughly equivalent 0.041 gflops cpu level performance similar 300 mhz pentium ii 1997–99 gpu provides 1 gpixel/s 1.5 gtexel/s graphics processing 24 gflops general purpose computing performance graphical capabilities raspberry pi roughly equivalent performance xbox 2001 raspberry pi 2 v1.1 included quad-core cortex-a7 cpu running 900 mhz 1 gb ram described 4–6 times powerful predecessor gpu identical original parallelised benchmarks raspberry pi 2 v1.1 could 14 times faster raspberry pi 1 model b+ raspberry pi 3 quad-core arm cortex-a53 processor described ten times performance raspberry pi 1 benchmarks showed raspberry pi 3 approximately 80 faster raspberry pi 2 parallelised tasks raspberry pi systems-on-chip could overclocked 800 mhz 1000 mhz reports raspberry pi 2 similarly overclocked extreme cases even 1500 mhz discarding safety features over-voltage limitations raspbian linux distro overclocking options boot done software command running sudo raspi-config without voiding warranty cases pi automatically shuts overclocking chip temperature reaches possible override automatic over-voltage overclocking settings voiding warranty appropriately sized heat sink needed protect chip serious overheating newer versions firmware contain option choose five overclock turbo presets used attempt maximise performance soc without impairing lifetime board done monitoring core temperature chip cpu load dynamically adjusting clock speeds core voltage demand low cpu running hot performance throttled cpu much chip temperature acceptable performance temporarily increased clock speeds 1 ghz depending board version turbo settings used seven overclock presets highest turbo preset sdram clock originally 500 mhz later changed 600 mhz 500 mhz sometimes causes sd card corruption simultaneously high mode core clock speed lowered 450 250 mhz medium mode 333 250 mhz cpu first second generation raspberry pi board require cooling heat sink fan even overclocked raspberry pi 3 may generate heat overclocked older beta model b boards 128 mb allocated default gpu leaving 128 mb cpu first 256 mb release model b model three different splits possible default split 192 mb ram cpu sufficient standalone 1080p video decoding simple 3d probably together 224 mb linux 1080p framebuffer likely fail video 3d 128 mb heavy 3d possibly also video decoding e.g kodi comparatively nokia 701 uses 128 mb broadcom videocore iv later model b 512 mb ram new standard memory split files arm256_start.elf arm384_start.elf arm496_start.elf initially released 256 mb 384 mb 496 mb cpu ram 256 mb 128 mb 16 mb video ram respectively week later rpf released new version start.elf could read new entry config.txt gpu_mem= xx could dynamically assign amount ram 16 256 mb 8 mb steps gpu older method memory splits became obsolete single start.elf worked 256 mb 512 mb raspberry pis raspberry pi 2 raspberry pi 3 1 gb ram raspberry pi zero zero w 512 mb ram raspberry pi 4 choice 1 2 4 gb ram set time manufacture raspberry pi 4 model b safety user guide mentions raspberry pi 4 model b 1 gb 2 gb 4 gb 8 gb variants 8gb model available 2019 launch model a+ pi zero ethernet circuitry commonly connected network using external user-supplied usb ethernet wi-fi adapter ethernet port provided built-in usb ethernet adapter using smsc lan9514 chip raspberry pi 3 pi zero w wireless equipped 2.4 ghz wifi 802.11n bluetooth 4.1 based broadcom bcm43438 fullmac chip official support monitor mode implemented unofficial firmware patching pi 3 also 10/100 mbit/s ethernet port raspberry pi 3b+ features dual-band ieee 802.11b/g/n/ac wifi bluetooth 4.2 gigabit ethernet limited approximately 300 mbit/s usb 2.0 bus soc raspberry pi 4 full gigabit ethernet throughput limited funnelled via usb chip pi zero used usb device usb gadget plugged another computer via usb port another machine configured multiple ways example show serial device ethernet device although originally requiring software patches added mainline raspbian distribution may 2016 pi 3 boot usb flash drive firmware limitations models pi 2b v1.2 3a+ 3b 3b+ 4b boards although often pre-configured operate headless computer raspberry pi may also optionally operated generic usb computer keyboard mouse may also used usb storage usb midi converters virtually device/component usb capabilities depending installed device drivers underlying operating system many included default peripherals attached various pins connectors surface raspberry pi video controller generate standard modern tv resolutions hd full hd higher lower monitor resolutions well older ntsc pal standard crt tv resolutions shipped i.e. without custom overclocking support following resolutions 640×350 ega 640×480 vga 800×600 svga 1024×768 xga 1280×720 720p hdtv 1280×768 wxga variant 1280×800 wxga variant 1280×1024 sxga 1366×768 wxga variant 1400×1050 sxga+ 1600×1200 uxga 1680×1050 wxga+ 1920×1080 1080p hdtv 1920×1200 wuxga higher resolutions 2048×1152 may work even 3840×2160 15 hz low frame rate convincing video note also allowing highest resolutions imply gpu decode video formats resolutions fact pis known work reliably h.265 high resolutions commonly used high resolutions however common formats full hd work although raspberry pi 3 h.265 decoding hardware cpu powerful predecessors potentially fast enough allow decoding h.265-encoded videos software gpu raspberry pi 3 runs higher clock frequencies 300 mhz 400 mhz compared previous versions ran 250 mhz raspberry pis also generate 576i 480i composite video signals used old-style crt tv screens less-expensive monitors standard connectorseither rca 3.5 mm phono connector depending model television signal standards supported pal-bghid pal-m pal-n ntsc ntsc-j none raspberry pi models built-in real-time clock booting time set either manually configured previously saved state shutdown provide relative consistency file system network time protocol used update system time connected network real-time hardware clock battery backup ds1307 may added interfaces via 200-pin ddr2 so-dimm connector raspberry pi 1 models a+ b+ pi 2 model b pi 3 models a+ b b+ pi 4 pi zero zero w zero wh gpio j8 40-pin pinout raspberry pi 1 models b first 26 pins pi zero zero w 40 gpio pins unpopulated through-holes exposed soldering instead zero wh wireless header header pins preinstalled model b rev 2 also pad called p5 board p6 schematics 8 pins offering access additional 4 gpio connections gpio pins freed four board version identification links present revision 1.0 removed models b provide gpio access act status led using gpio 16 models a+ b+ provide gpio access act status led using gpio 47 power status led using gpio 35 raspberry pi foundation provides raspbian debian-based linux distribution download well third-party ubuntu windows 10 iot core risc os specialised media centre distributions promotes python scratch main programming languages support many languages default firmware closed source unofficial open source available many operating systems also run raspberry pi including formally verified microkernel third-party operating systems available via official website include ubuntu mate windows 10 iot core risc os specialised distributions kodi media centre classroom management raspberry pi use videocore iv gpu via binary blob loaded gpu boot time sd-card additional software initially closed source part driver code later released however much actual driver work done using closed source gpu code application software makes calls closed source run-time libraries openmax opengl es openvg turn call open source driver inside linux kernel calls closed source videocore iv gpu driver code api kernel driver specific closed libraries video applications use openmax use opengl es use openvg turn use egl openmax egl use open source kernel driver turn official firmware freely redistributable binary blob closed-source minimal proof-of-concept open source firmware also available mainly aimed initializing starting arm cores well performing minimal startup required arm side also capable booting minimal linux kernel patches remove dependency mailbox interface responsive known work raspberry pi 1 2 3 well variants raspberry pi zero working state actively developed last significant commits made around mid-2017 technology writer glyn moody described project may 2011 potential replacing machines supplementing march 2012 stephen pritchard echoed bbc micro successor sentiment itpro alex hope co-author next gen report hopeful computer engage children excitement programming co-author ian livingstone suggested bbc could involved building support device possibly branding bbc nano centre computing history strongly supports raspberry pi project feeling could usher new era release board showcased arm ceo warren east event cambridge outlining google ideas improve uk science technology education harry fairhead however suggests emphasis put improving educational software available existing hardware using tools google app inventor return programming schools rather adding new hardware choices simon rockman writing zdnet blog opinion teens better things despite happened 1980s october 2012 raspberry pi t3 innovation year award futurist mark pesce cited borrowed raspberry pi inspiration ambient device project moorescloud october 2012 british computer society reacted announcement enhanced specifications stating definitely something 'll want sink teeth february 2015 switched-mode power supply chip designated u16 raspberry pi 2 model b version 1.1 initially released version found vulnerable flashes light particularly light xenon camera flashes green red laser pointers however bright lights particularly ones continuously found effect symptom raspberry pi 2 spontaneously rebooting turning lights flashed chip initially users commenters suspected electromagnetic pulse emp xenon flash tube causing problem interfering computer digital circuitry ruled tests light either blocked card aimed side raspberry pi 2 cause problem problem narrowed u16 chip covering first system chip main processor u16 blu-tack opaque poster mounting compound light sole culprit instead emp confirmed laser pointer tests also found less opaque covering needed shield laser pointers shield xenon flashes u16 chip seems bare silicon without plastic cover i.e chip-scale package wafer-level package would present block light unofficial workarounds include covering u16 opaque material electrical tape lacquer poster mounting compound even balled-up bread putting raspberry pi 2 case avoiding taking photos top side board xenon flash issue caught release raspberry pi 2 commercial electronic devices routinely subjected tests susceptibility radio interference standard common practice test susceptibility optical interference june 2017 raspberry pi royal academy engineering macrobert award citation award raspberry pi said inexpensive credit card-sized microcomputers redefining people engage computing inspiring students learn coding computer science providing innovative control solutions industry raspberry pi community described jamie ayre floss software company adacore one exciting parts project community blogger russell davis said community strength allows foundation concentrate documentation teaching community developed fanzine around platform called magpi 2015 handed raspberry pi foundation volunteers continued in-house series community raspberry jam events held across uk around world enquiries board united kingdom received schools state private sectors around five times much interest latter hoped businesses sponsor purchases less advantaged schools ceo premier farnell said government country middle east expressed interest providing board every schoolgirl enhance employment prospects 2014 raspberry pi foundation hired number community members including ex-teachers software developers launch set free learning resources website foundation also started teacher training course called picademy aim helping teachers prepare teaching new computing curriculum using raspberry pi classroom 2018 nasa launched jpl open source rover project scaled curiosity rover uses raspberry pi control module encourage students hobbyists get involved mechanical software electronics robotics engineering number developers applications leveraging raspberry pi home automation programmers making effort modify raspberry pi cost-affordable solution energy monitoring power consumption relatively low cost raspberry pi become popular economical alternative expensive commercial solutions june 2014 polish industrial automation manufacturer techbase released modberry industrial computer based raspberry pi compute module device number interfaces notably rs-485/232 serial ports digital analogue inputs/outputs economical 1-wire buses widely used automation industry design allows use compute module harsh industrial environments leading conclusion raspberry pi longer limited home science projects widely used industrial iot solution achieve goals industry 4.0 march 2018 suse announced commercial support suse linux enterprise raspberry pi 3 model b support number undisclosed customers implementing industrial monitoring raspberry pi otto digital camera created next thing co incorporates raspberry pi compute module successfully crowd-funded may 2014 kickstarter campaign slice digital media player also uses compute module heart crowd-funded august 2014 kickstarter campaign software running slice based kodi project launched december 2014 event held uk space agency astro pi competition officially opened january opened primary secondary school aged children residents united kingdom mission british esa astronaut tim peake deployed computers board international space station loaded winning code orbit collected data generated sent earth distributed winning teams covered themes competition included spacecraft sensors satellite imaging space measurements data fusion space radiation organisations involved astro pi competition include uk space agency ukspace raspberry pi esero-uk esa 2006 early concepts raspberry pi based atmel atmega644 microcontroller schematics pcb layout publicly available foundation trustee eben upton assembled group teachers academics computer enthusiasts devise computer inspire children computer inspired acorn bbc micro 1981 model model b model b+ names references original models british educational bbc micro computer developed acorn computers first arm prototype version computer mounted package size usb memory stick usb port one end hdmi port foundation goal offer two versions priced us 25 35 started accepting orders higher priced model b 29 february 2012 lower cost model 4 february 2013. even lower cost us 20 a+ 10 november 2014 26 november 2015 cheapest raspberry pi yet raspberry pi zero launched us 5 £4 | [
1537,
3585,
7170,
516,
11282,
4124,
5663,
8225,
6178,
9762,
38,
4139,
2605,
8237,
561,
9266,
9779,
1590,
4151,
8248,
8250,
8253,
6718,
6207,
10813,
1089,
7234,
10820,
582,
4679,
11337,
8266,
2635,
2137,
9320,
10344,
1642,
10862,
644,
7300... | Test |
1,850 | 1 | SQL_Server_Management_Objects:sql server management objects sql server management objects smo .net objects introduced microsoft microsoft sql server 2005 designed allow easy simple programmatic management microsoft sql server using smo .net programmers design applications similar functionality microsoft sql server management studio smo objects comes sql server versions starting sql server 2005 2005 2008 2008r2 2012 2014 2016 included sql server editions including express edition sql server management objects smo msdn | [
2901
] | Test |
1,851 | 8 | Apache_Axis2:apache axis2 apache axis2 core engine web services complete re-design re-write widely used apache axis soap stack implementations axis2 available java c. axis2 provides capability add web services interfaces web applications also function standalone application server new architecture axis2 introduced august 2004 axis2 summit colombo sri lanka new architecture axis2 based flexible efficient configurable comparison axis1.x architecture well-established concepts axis 1.x like handlers etc. preserved new architecture apache axis2 supports soap 1.1 soap 1.2 integrated support widely popular rest style web services business-logic implementation offer ws-* style interface well rest/pox style interface simultaneously axis2/java support spring framework axis2/c high-performance web services implementation implemented portability ability embedded hosted apache httpd microsoft iis axis http server see article apache axis2/c performance 2008 latest release occurred 2009 axis2 came many new features enhancements industry specification implementations key features offered include apache axis2 includes support following standards list features selling points cited apache axis site axis2 modules provides qos features like security reliable messaging etc | [
1280,
8070,
10377,
6284,
8460,
7567,
1296,
6161,
6805,
5910,
1047,
8217,
11161,
6555,
6811,
5789,
8860,
10020,
3877,
10661,
11303,
5677,
1327,
7983,
4919,
5047,
6328,
4538,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
10877,
1222,
1991,
4294,
... | Test |
1,852 | 2 | MacRuby:macruby macruby discontinued implementation ruby language ran objective-c runtime corefoundation framework development apple inc. supposed replace rubycocoa targeted ruby 1.9 used high performance llvm compiler infrastructure starting version 0.5 supports ahead-of-time just-in-time compilation macruby supported interface builder shipped core library called hotcocoa simplify cocoa programming macruby also used embedded scripting language objective-c applications may 2012 laurent sansonetti announced rubymotion port macruby ios os x android development macruby effectively ended late 2011 coinciding principal author departure apple inc.. jan 5 2015 macruby project longer active development macruby work mavericks team shifted focus commercial rubymotion product ios os x. macruby originally called ruby+objc developed laurent sansonetti began work late 2007 march 2008 first publicly available version macruby 0.1 announced official rubytalk forum version 0.2 released june 2008 implemented ruby strings arrays hashes native cocoa types september 2008 macruby 0.3 released included hotcocoa library well several hotcocoa example programs october 2008 apple created first macruby page developer connection website macruby 0.4 released march 2009 macruby 0.5 0.6 0.7 january may october 2010 respectively macruby 0.8 released december 13 2010 0.9 february 25 2011 0.10 march 23 2011 0.11 october 17 2011 0.12 june 11 2012 | [
7430,
9229,
2191,
7695,
10771,
9245,
5409,
8609,
10406,
7983,
564,
4277,
5945,
5567,
6338,
11208,
5578,
3790,
4943,
10973,
1379,
10470,
11625,
8303,
2804,
2045
] | Validation |
1,853 | 2 | ANDOS:andos andos russian operating system electronika bk-0010 electronika bk-0011 electronika bk-0011m series computers created 1990 first released 1992 initially developed alexey nadezhin whose name system named later also sergey kamnev joined project widespread system bk series computers used ms-dos-compatible file system format andos used fat12 filesystem 800 kb floppy disks electronika bk-0011m electronika bk-0011 andos provided electronika bk-0010 emulation loading bk-0010 rom image bk-0011 ram minimal configuration system able occupy less 4 kb ram system able support 64 disk drives hard drive partitions well ram disks computer memory tape recording also able read-only access microdos file system format disks although last version function transferred system core file manager became optional | [
2179,
8713,
11145,
7823,
5267,
9762,
10156,
7983,
5043,
7224,
3129,
7358,
8262,
4039,
9166,
477,
1253,
4076,
5359
] | Validation |
1,854 | 3 | Fantasy_Zone_II:_The_Tears_of_Opa-Opa:fantasy zone ii tears opa-opa past courageous hero opa-opa saved fantasy zone invading nenon forces victory came price forced fight father led invasion space year 1432 10 years battle nenon forces spreading chaos fantasy zone opa-opa must fly fantasy zone rout invasion end game opa-opa comes face-to-face invasion mastermind identical copy tense battle opa-opa father appears confront sight brings opa-opa tears causes second opa-opa vanish later revealed twin physical manifestation opa-opa dark impulses desires spawned prior battles seeking drive fantasy zone ruin reunited father opa-opa able purge darkness swears disaster never occur similar defender player occupies side-scrolling level repeats indefinitely player freely travel left right zone contains several bases serve primary targets new sequel warps hidden behind certain bases allow player travel different zones level least three zones bases cleared zones level player travel warp boss boss fights allow free travel main stages force player face boss face particular direction bosses generally large change color reflect damage taken final stage boss rush player must fight succession previous bosses fighting final boss two action buttons correspond two types attacks fire bomb fire attacks shoot horizontally typical shooter different variants purchased shops bomb attacks powerful basic bomb drops downward variants behaviors limited quantity shops uncovered key points allow player purchase upgraded weapons bombs speed well extra lives upgrades opa-opa speed larger wings jet engines permanent long player lose life weapon upgrades time-limited bombs limited quantity items become increasingly expensive subsequent purchases encouraging player vary purchases arcade version fantasy zone ii based system e board result almost identical master system version differences include use radar shows bases destroyed well use timer reaches zero player lose life player manages clear level timer remaining seconds add score money unlike original version famicom port subtitle title screen says teardrop opa-opa september 2008 sega released remake fantasy zone ii part compilation sega ages vol 33 fantasy zone complete collection developed m2 game unique remakes attempt modernize older work rather ground-up reimagining title arcade game system 16 hardware like predecessor rather console title limited sega master system described remake strictly adheres technical limitations time fantasy zone ii originally released m2 ceo naoki horii stated remake inspired disappointment fantasy zone never got true arcade sequel played sms game lot horii explained heart hearts really wanted see arcade hardware ensure remake would authentic system 16 unique hardware capabilities limitations m2 developed title real system 16 hardware modest memory increase 256kb m2 dubbed system 16c playable compilation via company emulation technology shows 1987 sega copyright makes mention m2 bears titular distinction original game easily confused real arcade title 1987 fans dubbed version fantasy zone ii dx distinguish original versions remake beyond scope features requested sega available budget horii funded development out-of-pocket amount described cost new car follows original fantasy zone ii loosely pulling enemies music locations gameplay elements master system game pairing completely new content elements original arcade fantasy zone notable change level structure rather several distinct zones stage must cleared stage remake two parallel dimensions bright side dark side comparable size levels first fantasy zone bases destroyed one dimension also destroyed making possible clear level entirely one side dark side difficult offers greater rewards points money earned bosses either side considerably difficult attack patterns dark side game also features three endings depend whether dark side levels cleared whether specific items bought music arranged manabu namiki uses melodies many songs tokuhiko uwabo original fantasy zone ii soundtrack calculatedly rearranged style similar original fantasy zone composer hiroshi kawaguchi namiki also wrote original tracks game stages enemies largely based themes original difficult recognize half game bosses correspond original generally regarded loose interpretation original m2 released free demo version fantasy zone ii website lets download play first second levels windows computer game bootlegged released arcades title fz-2006 ii taiwanese manufacturer isg bootleg bears 2006 copyright date actually appears derived 2008 playstation 2 release due containing 2008-07-15ver string embedded rom data sega also produced limited number arcade units running real system 16 hardware promote game release nintendo 3ds port 16-bit version fantasy zone ii released japan 2014 internationally 2015 titled 3d fantasy zone ii w includes new features content second game mode called link loop land endless survival mode starring opa-opa brother upa-upa | [
10316,
9006,
11231
] | None |
1,855 | 2 | 17_(app):17 app 17 live video streaming mobile app designed taiwanese pop singer jeffery huang member machi features instant photo video sharing functions client apps available ios android smartphone systems first launched app store 5 june 2015 sooner play store 10 june 2015 app re-released 28 october 2015 banned due prohibited content app become one popular live streaming apps taiwan malaysia hong kong singapore japan approximately 700 thousand daily active users 17 allows users broadcast live post photos videos album privacy settings used allow access rights permitted users users also follow one another track recent status changes app complained become platform broadcasting indecent scenes live broadcast sexual intercourse process app found unauthorized broadcasting lives attracted millions audience watch founder 17 jeffery huang claimed broadcast would stopped user ’ account would deleted received complaints also responded would stricter supervision system avoid similar incidents happening april 2016 according security website customer data 17 sold tor hidden website data include 4 million email addresses along ip addresses usernames unsalted md5 passwords users registered around time change passwords | [
8413,
9063
] | Test |
1,856 | 9 | PowerBuilder:powerbuilder powerbuilder integrated development environment owned sap since acquisition sybase 2010 july 5 2016 sap appeon entered agreement whereby appeon would responsible developing selling supporting powerbuilder powerbuilder use since 1991 peaking around 1998 around 100,000 users powerbuilder market share declined years many applications created still use today years powerbuilder updated new standards 2010 major upgrade powerbuilder released provide support microsoft .net framework 2014 support added odata dockable windows 64-bit native applications 2017 support added ios android app development powerbuilder 2019 provides new targets enable developers rapidly create restful web apis non-visual .net assemblies test-driven manner using c language .net core framework powerscript client app development revamped new ui technologies cloud architecture powerbuilder native data-handling object called datawindow used create edit display data database object gives programmer number tools specifying controlling user interface appearance behavior also provides simplified access database content json xml web services extent datawindow frees programmer considering differences database management systems different vendors datawindow display data using multiple presentation styles connect various data sources powerbuilder used primarily building business crud applications although new software products rarely built powerbuilder many client-server erp products line-of-business applications built late 1980s early 2000s powerbuilder still provide core database functions large enterprises government higher education manufacturing insurance banking energy telecommunications job openings powerbuilder developers readily available often revolve around maintaining existing applications powerbuilder originally developed powersoft 1991 powersoft went public 1993 acquired sybase 904 million sybase stock 1995 may 2010 sap announced would acquiring sybase 5.8 billion powerbuilder languished long time several reasons powerbuilder 12 compatibility web technologies asp.net web services represented attempt regain market share order move developers newer versions powerbuilder 12 provided utilities attempt simplify migration december 2013 sap announced new version going directly number 15 released beta version key features included support .net framework v4.5 sql server 2012 oracle 12 windows 8 odata dockable windows sap later released version 12.6 july 5 2016 appeon signed agreement sap develop new generation powerbuilder development platform appeon announced plans major innovations ranging mobile cloud deployment test-driven development continuous integration terms agreement sap appeon responsible developing selling supporting offering powered powerbuilder technology june 30 2017 powerbuilder 2017 launched appeon release first new installment powerbuilder appeon first release powerbuilder support windows 10 ios android app development may 31 2019 powerbuilder 2019 launched appeon release second new installment powerbuilder appeon first release powerbuilder support c development provides new c ide .net data access objects c migration solution web api client ui themes powerscript object-oriented programming language nearly visual non-visual objects support inheritance polymorphism encapsulation programmer may utilize common code framework powerbuilder foundation classes also known pfc inherit objects leverage pre-existing code datawindow key component selling point powerbuilder datawindow offers visual sql painter supports outer joins unions subquery operations convert sql visual representation back developer use native sql desired datawindow updates automatic — produces proper sql runtime based dbms user currently connected feature makes easier developers experienced sql datawindow also built-in ability retrieve data update data via stored procedures rest web apis well import/export json data restclient object introduced powerbuilder 2017 facilitates bridging datawindow rest web apis requiring minimal coding powerbuilder offers native interfaces major databases well odbc ole-db enterprise version many connectivity options allow performance monitoring tuning due information database schema primary key information stored powerbuilder data dictionary code required implement data display browsing greatly simplified dictionary information allows generation appropriate sql behind scenes powerbuilder supports following ways interacting database datawindow simplest approach relying automatically generated sql powerbuilder supports activex ocx controls visible non-visible also use ole automation client however powerbuilder supports late binding early binding therefore using ole automation dropdown possible actions provided powerbuilder also act dde client server providing mechanism interoperate applications powerbuilder make windows third-party api calls general works well third-party libraries dll files however directly support callback functions powerbuilder offers /pbdebug variants -pbdebug -pbd /debug -debug -deb runtime switch creates log file help track bug field user simply emails log file developer another feature log sql statements file also built-in performance profiling integrated debugger context-sensitive help active newsgroup provide support powerbuilder applications typically compiled p-code interpreted powerbuilder run time although compiled machine code called c-code typical business application run lot faster however applications unusually large number cpu-intensive computations likely benefit 4,000x faster compiling machine code main reason compiling machine code used enormous number errors powerbuilder especially machine code generation extensibility language rather limited older versions powerbuilder technologies provided overcome ex powerbuilder native interface pbni rather tricky develop solution includes external c++ code may require competent c++ developer also powerbuilder expert guide developer myriad subtleties language powerbuilder virtual machine inheritance object-oriented features limited object types windows userobjects menus particular possible inherit datawindow powerbuilder user open descendant parent time painter though see ancestors code working descendant address criticisms appeon set new roadmap powerbuilder publishes openly appeon website classic powerscript language still available compatibility reasons known language built around datawindow amongst developers powerbuilder ide built around datawindow c development centered around new .net datawindow automated migration existing datawindows introduced powerbuilder 2019 since appeon took powerbuilder launched new official community website powerbuilder developers community website offers technical articles webinars q authored community users appeon also hosts annual user conference called appeon elevate recordings conference sessions available conference website number local user groups around world cooperate appeon deliver abridged versions conference seminar format local language also variety grass roots community groups resources powerbuilder developers share convene powerbuildertv series webinars powerbuilder users vendors tend focus third party add-ons powerbuilder central community initiative create single source third party add-ons services | [
2183,
6797,
9360,
8473,
5403,
10020,
9130,
10029,
10413,
7983,
1459,
3507,
5952,
1348,
4042,
11212,
11472,
6993,
9813,
5210,
479,
7274,
3573,
6654
] | None |
1,857 | 1 | SHERPA/Juliet:sherpa/juliet sherpa/juliet online database open access mandates adopted academic funding bodies part sherpa suite services around open access run jisc formerly university nottingham database contains information 100 funders mostly united kingdom juliet indicates policy regarding self-archiving open access journals archival research data users suggest updates records addition new funder via form service mainly useful researchers received project-based funding want clear summary funder links original policies also provided | [
7923,
10759
] | Test |
1,858 | 4 | L7-filter:l7-filter l7-filter software package provides classifier linux netfilter subsystem categorize internet protocol packets based application layer data major goal tool make possible identification peer-to-peer programs use unpredictable port numbers two versions software first implemented kernel module linux 2.4 2.6 second experimental version released december 2006 runs user-space program relies netfilter user-space libraries classification process versions l7-filter use regular expressions though user-space kernel modules use different regular expression libraries identify network protocol technique used conjunction linux qos system allows application-specific yet port-independent traffic shaping versions l7-filter released gnu general public license | [
1792,
2049,
4480,
2563,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
10016,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
8753,
823,
569,
5178,
11577,
9279,
8640,
5057,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10451,
10708,
4568,
4953,
... | Test |
1,859 | 5 | Net-SNMP:net-snmp net-snmp suite software using deploying snmp protocol v1 v2c v3 agentx subagent protocol supports ipv4 ipv6 ipx aal5 unix domain sockets transports contains generic client library suite command line applications highly extensible snmp agent perl modules python modules net-snmp housed sourceforge usually top 100 projects sourceforge ranking system march 2005 sourceforge project month widely distributed comes included many operating systems including distributions linux freebsd openbsd solaris os x also available net-snmp web site steve waldbusser cmu started freely available snmp tool kit 1992 package later abandoned cmu wes hardaker uc davis renamed ucd-snmp extended meet network management needs electrical engineering department eventually mr. hardaker left university realized project network wide thus renamed net-snmp reflect distributed development roots net-snmp project long full description found net-snmp history page command snmpget uses snmpget application retrieve information associated specific object identifier oid target device example snmpget usage retrieve specific oid 'sysuptime community string 'demopublic 'test.net-snmp.org host name agent query command snmpwalk uses snmp getnext request query network tree information object identifier oid may given command line oid specifies portion object identifier space searched using getnext requests variables subtree given oid queried values presented user oid argument present snmpwalk search subtree rooted snmpv2-smi :mib-2 including mib object values mib modules defined lying within subtree example snmpwalk usage retrieve variables system oid | [
5093,
8582,
9320,
8873,
8554,
7983,
2045,
2804,
823,
5469,
3133,
5470
] | Train |
1,860 | 6 | File_System_Visualizer:file system visualizer file system visualizer also known fsv 3d file browser using opengl created daniel richard g. clone sgi fsn file manager irix systems aimed run modern linux unix-like operating systems capable representing file systems two ways mapv mode files directories represented cuboids equal height size cuboid representing size file directory treev mode files directories shown conventional tree manner links parent directories subdirectories columns various height indicating file size top directories represent files inside modes standard 2d tree representation files directories displayed left window mouse used rotate 3d representation file system eagle eye function shows representation overhead view file system visualizer also capable manipulating files directories shows | [
6243,
10051,
7983,
5397,
11221,
823,
2045
] | None |
1,861 | 4 | Cris_Thomas_(Space_Rogue):cris thomas space rogue cris thomas also known space rogue american cyber security researcher white hat hacker founding member researcher high-profile hacker security think tank l0pht heavy industries thomas one seven l0pht members testified u.s. senate committee governmental affairs 1999 topic government homeland computer security specifically warning internet vulnerabilities claiming group could take internet within 30 minutes subsequently thomas pursued career cyber security research also embracing public advocacy role cyber security subject-matter expert sme pundit granting interviews contributing articles space rogue advocacy served educate advise corporations government public security concerns relative risk areas election integrity cyber terrorism technology anticipation new risks associated society adoption internet things balancing perspective risk vs. hype founding member hacker think tank l0pht heavy industries thomas first l0pht members leave following merger l0pht stake 2000 last reveal true name thomas one seven l0pht members testified u.s. senate committee governmental affairs 1999 testifying internet handle space rogue testimony thomas l0pht members served inform government current future internet vulnerabilities federal public channels susceptible testimony marked first time persons federal witness protection permitted testify assumed names l0pht thomas created whacked mac archives hacker news network addition released least one security advisories detailing flaw fwb hard disk toolkit thomas continued career cyber security research stake guardent trustwave spiderlabs tenable ibm x-force red selected serve panelist 2016 atlantic council cyber risk discussion series webinar speaker national science foundation watch series thomas embraced public advocacy role cyber security subject-matter expert sme pundit granting interviews contributing articles educate public security concerns relative risk topics include election integrity cyber terrorism technology password security anticipation new risks associated society adoption internet things balancing perspective risk vs. hype response 2016 united states government accountability office report revealing nation nuclear weapons control computers relied outdated 8 floppy disks thomas argued older computers data storage systems programming languages lack internet connectivity would make difficult hackers access systems effectively reducing vulnerability weapon control systems hacking following cyber security mega-breaches target home depot u.s. office personnel management thomas advocated proactive implementation basic security measures effective means thwart similar mega-threats bluntly stating gap knowledge implementation leaves companies individuals unnecessary risk thomas ’ recommendation focused simple measures known one two decades organizations implemented universally thomas identified retail cyber security breaches including fao schwarz early 1999 2017 defcon hacker conference thomas assisted escorting rep. hurd r rep. jim langevin around conference area various villages whacked mac archives ftp download site managed thomas world largest collection apple macintosh hacking tools total size tools site 20mb cd copy contents ftp site advertised sale serving editor-in-chief thomas founded managed l0pht online newsletter website known hacker news network simply hacker news hnn originally created rapidly share discoveries computer security hacker news also became forum users post security alerts vulnerabilities identified publication grew eventually supporting paid advertising audience included technology journalists companies interest cybersecurity website seen several background shots video solar sunrise dawn new threat produced national counterintelligence center 1999 l0pht merger stake 2000 responsible disclosure-focused hacker news network replaced security news network hacker news network decade offline set launch jan. 11 2010 video reports security last videos published 2011 hacker news network 2018 redirects spacerogue.net 2013 thomas created project cybersquirrel1 satirical demonstration relative risk cyberwarfare attacks critical infrastructure elements north american electrical grid started twitter feed cybersquirrel1 project expanded include full website cybersquirrel tracking map dataset grew attrition.org brian martin alias “ jared e. richo ” a/k/a jericho joined project 2014 cybersquirrel1 results disrupted public perception regarding prevalence nation-based hacking cyberwarfare attacks concluding damage due cyberwarfare example stuxnet tiny compared cyber-threat caused animals 2015-2016 alleged russian interference 2016 united states elections unfolded public media interest hacking hackers increased leading 2016 election thomas interviewed mainstream media productions including cnbc money release joint analysis report thomas called expanded detail indicators compromise federal joint analysis reports indicating increased transparency ip address reporting instrumental enhancing security prior 2018 election thomas continued advocacy speaking cbs news outlets securing elections vulnerability voting machines | [
9217,
3843,
3619,
1861,
8580,
8135,
5512,
4830,
8827,
4945,
9392,
5111,
9214,
4471,
9688,
3323,
4956,
2558
] | None |
1,862 | 7 | National_Grid_Service:national grid service national e-infrastructure service nes formerly national grid service organisation uk academics researchers 2004 2011 funded two governmental bodies engineering physical sciences research council epsrc joint information systems committee jisc nes provided compute data resources accessed standard common set services nes services based globus toolkit job submission storage resource broker data management nes resources hosted scientific software packages including siesta gaussian well providing access compute data resources nes offered training national e-science centre edinburgh grid support uk academics researchers grid computing nes 500 users twenty nine sites nes gridpp two organisations made uk ngi organisation uk point contact european grid infrastructure prior nes uk e-science programme funded grid support centre later grid operations support centre gosc provided support end users use develop grid computing following uk engineering task force developing so-called 'level 2 grid ad hoc collection individual institutes committing variety compute resources grid computing nes funded develop full service initially called etfp grid engineering task force production grid became known national grid service hardware purchased installed february 2004 web site appeared april 2004 phase 1 october 2004 september 2006 worked separately funded grid operations support centre gosc start phase two october 2006 ngs gosc merged single project name nes nes third phase ran september 2011 nes provided free-to-use services uk academic researchers nes following partner sites affiliate sites provided resources nes conditions sometimes provide access users common ngs interfaces members gridpp collaboration also offered resources academics uk could apply free account nes science research ranged permeation drugs membrane welfare ethnic minority groups united kingdom applications included modelling coastal oceans modelling hiv mutations research cameras imaging patients cancer treatments simulating galaxy formation example use nes motivation methodology implementation e-social science pilot demonstrator project entitled grid enabled micro-econometric data analysis gemeda used nes investigate policy relevant social science issue welfare ethnic minority groups united kingdom underlying problem statistical analysis uses quantitative data one source application grid technology problem allows one integrate elements required empirical modelling process data extraction data transfer statistical computation results presentation manner transparent casual user examples research using nes published 2006 2011 | [
9984,
4195,
5956,
10116,
10341,
1449,
8370,
5654,
11353
] | Validation |
1,863 | 9 | Userscript:userscript userscript user script program usually written javascript modifying web pages augment browsing desktop browsers firefox enabled use userscript manager browser extension greasemonkey presto-based opera browser supported userscripts referred user javascript placed designated directory userscripts often referred greasemonkey scripts named original userscript manager firefox wikipedia feature enabled registered users allows install userscripts augment editing viewing encyclopedia pages userscript manager type browser extension augmented browsing technology provides user interface manage scripts main purpose userscript manager execute scripts webpages loaded common operations performed userscript manager include downloading creating installing organizing deleting editing scripts well modifying script permissions e.g website exceptions one aspect userscripts shared uploaded userscript repository become available users downloading examples userscript repositories include greasy fork openuserjs | [
9241,
9780,
3462
] | None |
1,864 | 9 | MATH-MATIC:math-matic math-matic marketing name at-3 algebraic translator 3 compiler early programming language univac univac ii math-matic written beginning around 1955 team led charles katz direction grace hopper preliminary manual produced 1957 final manual following year syntactically math-matic similar univac contemporaneous business-oriented language flow-matic differing providing algebraic-style expressions floating-point arithmetic arrays rather record structures expressions math-matic could contain numeric exponents including decimals fractions way custom typewriter math-matic programs could include inline assembler sections arith-matic code univac machine code univac 1000 words memory successor univac ii little 2000 math-matic allowed larger programs automatically generating code read overlay segments uniservo tape required compiler attempted avoid splitting loops across segments proposing collaboration acm led algol 58 gesellschaft für angewandte mathematik und mechanik wrote considered math-matic closest available language proposal contrast backus fortran math-matic emphasise execution speed compiled programs univac machines floating-point hardware math-matic translated via a-3 arith-matic pseudo-assembler code rather directly univac machine code limiting usefulness sample math-matic program | [
1952,
9345,
9889,
4483,
8262,
9804,
2798,
7032,
1976,
3960,
5277
] | None |
1,865 | 2 | Lions'_Commentary_on_UNIX_6th_Edition,_with_Source_Code:lions commentary unix 6th edition source code lions commentary unix 6th edition source code john lions 1976 contains source code 6th edition unix kernel plus commentary commonly referred lions book despite age still considered excellent commentary simple high quality code many years lions book unix kernel documentation available outside bell labs although license 6th edition allowed classroom use source code license 7th edition specifically excluded use book spread illegal copy machine reproductions kind samizdat commonly held copied book computer science book reprinted 1996 peer-to-peer communications unix operating system source code level six kernel source code lightly edited lions better separate functionality — system initialization process management interrupts system calls basic i/o file systems pipes character devices procedures symbols listed alphabetically cross reference code presented run pdp-11/40 rk-05 disk drive lp-11 line printer interface pcl-11 paper tape writer kl-11 terminal interface suitable pdp-11 emulator simh commentary unix operating system starts notes unix useful documentation unix manual pages dec hardware manuals section architecture pdp-11 chapter read c programs source commentary follows divided sections code book ends suggested exercises student lions explains commentary supplements comments source possible understand code without extra commentary reader advised read notes needed commentary also remarks code might improved source code commentary originally produced may 1976 set lecture notes lions computer science courses 6.602b 6.657g university new south wales department computer science unix news march 1977 announced availability book unix licensees lions trouble keeping popularity 1978 available bell labs announced unix version 7 usenix june 1979 academic/research license longer automatically permitted classroom use thus licensees longer able use lions notes classes operating systems however thousands computer science students around world spread photocopies could study legally class would sometimes meet hours discuss book many pioneers unix open source treasured multiple-generation photocopy follow-on effects license change included andrew s. tanenbaum creating minix tanenbaum wrote operating systems 1987 various unix people particularly peter h. salus dennis ritchie berny goodheart lobbied unix various owners novell santa cruz operation many years allow book published officially 1996 santa cruz operation finally authorised release twenty-year-old 6th edition source code along source code versions ancient unix full code plus 1977 version commentary published peer-to-peer communications reissue includes commentary michael tilson sco peter salus dennis ritchie ken thompson peter collinson greg rose mike o'dell berny goodheart peter reintjes infamous program comment expected understand occurs line 2238 source code lions commentary p. 22 end comment explaining process exchange mechanism refers line 325 file slp.c source code reads major reason piece code hard understand depended quirk way c-compiler pdp-11 saved registers procedure calls code failed ported machines redesigned version 7 unix dennis ritchie later explained meaning remark xv6 modern reimplementation sixth edition unix ansi c multiprocessor x86 systems | [
3488,
6369,
9027,
132,
9444,
7655,
7983,
499,
5492,
7187,
8628,
2045,
8671
] | Test |
1,866 | 7 | Distributed_memory:distributed memory computer science distributed memory refers multiprocessor computer system processor private memory computational tasks operate local data remote data required computational task must communicate one remote processors contrast shared memory multiprocessor offers single memory space used processors processors aware data resides except may performance penalties race conditions avoided distributed memory system typically processor memory form interconnection allows programs processor interact interconnect organised point point links separate hardware provide switching network network topology key factor determining multiprocessor machine scales links nodes implemented using standard network protocol example ethernet using bespoke network links used example transputer using dual-ported memories key issue programming distributed memory systems distribute data memories depending problem solved data distributed statically moved nodes data moved demand data pushed new nodes advance example problem described pipeline data x processed subsequently functions f g h etc result h g f x expressed distributed memory problem data transmitted first node performs f passes result onto second node computes g finally third node computes h also known systolic computation data kept statically nodes computations happen locally changes edges reported nodes example simulation data modeled using grid node simulates small part larger grid every iteration nodes inform neighboring nodes new edge data similarly distributed shared memory node cluster access large shared memory addition node limited non-shared private memory distributed shared memory hides mechanism communication hide latency communication | [
785,
7313,
7699,
7963,
6815,
2210,
5798,
9126,
6184,
2345,
4909,
7218,
10675,
8501,
5948,
4286,
2113,
8514,
5956,
4423,
1480,
6909,
330,
7497,
8523,
10439,
4308,
2008,
344,
2394,
731,
2140,
2264,
1503,
11487,
4194,
5090,
11618,
7142,
5223... | Test |
1,867 | 5 | Bidirectional_Forwarding_Detection:bidirectional forwarding detection bidirectional forwarding detection bfd network protocol used detect faults two forwarding engines connected link provides low-overhead detection faults even physical media n't support failure detection kind ethernet virtual circuits tunnels mpls label switched paths bfd establishes session two endpoints particular link one link exists two systems multiple bfd sessions may established monitor one session established three-way handshake torn way authentication may enabled session choice simple password md5 sha1 authentication available bfd discovery mechanism sessions must explicitly configured endpoints bfd may used many different underlying transport mechanisms layers operates independently therefore needs encapsulated whatever transport uses example monitoring mpls lsps involves piggybacking session establishment lsp-ping packets protocols support form adjacency setup ospf is-is may also used bootstrap bfd session protocols may use bfd receive faster notification failing links would normally possible using protocol keepalive mechanism session may operate one two modes asynchronous mode demand mode asynchronous mode endpoints periodically send hello packets number packets received session considered demand mode hello packets exchanged session established assumed endpoints another way verify connectivity perhaps underlying physical layer however either host may still send hello packets needed regardless mode use either endpoint may also initiate echo function function active stream echo packets sent endpoint sends back sender via forwarding plane used test forwarding path remote system june 2011 bfd protocol standardization process entered proposed standard stage rfc 5880 defines bfd protocol detecting mpls lsp failure using bfd monitor connectivity across multiple network hops using bfd ipv4 ipv6 bfd operation conjunction open shortest path first ospf is-is protocols also outlined rfc 5881 | [
3751,
9868,
10924,
2206,
5469,
5470
] | Test |
1,868 | 1 | Canmore_(database):canmore database canmore online database information 320,000 archaeological sites monuments buildings scotland begun royal commission ancient historical monuments scotland historic environment scotland maintained since 2015 canmore database part national record historic environment nrhe formerly national monuments record scotland nmrs contains around 1.3 million catalogue entries includes marine monuments designated official wreck sites fall protection wrecks act wreck | [
248,
2901
] | Test |
1,869 | 3 | Unisys_2200_Series_system_architecture:unisys 2200 series system architecture figure shows high-level architecture os 2200 system identifying major hardware software components majority unisys software included subsystems applications area model example database managers subsystems compilers applications details system architecture covered unisys publication 3850 7802 instruction processor programming reference manual also see univac 1100/2200 series 1100 series used 36-bit word 6-bit characters since 1962 word character size department defense dod requirement since military needed able calculate accurate trajectories design bridges perform engineering scientific calculations needed 32 bits precision 32-bit floating point number provided 6 digits accuracy 36 bit number provided 8 digits accuracy accepted minimum requirement since memory storage space costs drove system going 64 bits simply acceptable general systems use ones complement arithmetic unusual time almost computer manufacturers time delivered 36-bit systems 6-bit characters including ibm dec general electric sylvania 6-bit character set used 1100 series also dod mandated set defined army signal corps called fieldata data returned field 1108 provided 9-bit character format order support ascii later iso 8-bit sets extensively used 1980s space constraints 2200 series architecture provides many registers base registers logically contain virtual address points word code data bank segment may point beginning bank word within bank index registers used instructions modify offset specified assumed base register simple arithmetic add subtract may performed index registers addition index registers consist lower offset portion upper increment portion instruction may use offset value index register part address specify increment added offset allows loops accomplished fewer instructions incrementing index step size accomplished without separate instruction arithmetic registers allow full set computational instructions including floating point operations instructions work adjacent pairs registers perform double-precision operations even-odd constraints two registers may used double-precision value four arithmetic registers also index registers sets overlap – index register x12 arithmetic register a0 allows full range calculations performed indexes without move results rest registers known r registers used fast temporary storage certain special functions r1 holds repeat count instructions may repeated block transfer execute repeated etc. r2 holds bit mask instructions perform bitwise logical operation addition functions e.g. masked load upper two full sets registers x r b one set user registers used applications portions operating system saved restored part activity thread state set exec registers used interrupt processing routines portions operating system want avoid save restore user registers exec registers writable user applications although user code read result exec carefully designed never leave private secure confidential information registers instruction interpretation chooses appropriate register set use based bit processor state register bit always set changed privileged interrupt registers also visible address space exec portion protected reference non-privileged code result fault interrupt 2200 series uses 36-bit segmented virtual address space ’ look later addressing architecture 2200 series cisc architecture system large number instructions current count 245 many addressing variants variants encoded directly instruction format partial word references dependent processor state register settings many instructions also perform complex functions one implements large part cobol edit verb figure shows building blocks architecture data comm two primary examples software subsystems live protection ring user application exec many subsystems users write mentioned earlier 2200 series uses 36-bit segmented virtual address original notion segmented space came earliest implementation emphasized code data separation performance use shared code banks years expanded provide greater flexibility levels sharing far greater protection security reliability controlled access shared data also introduced virtual address consists three parts high-order 3 bits define sharing level heart entire addressing protection scheme every thread eight bank descriptor tables segment descriptor tables industry based b16-b23 tables indexed level – level 0 refers bank descriptor table bdt based b16 level 2 bdt based b18 etc level 0 level 2 bdts common threads system every run process level 4 bdt bdt common threads run every user thread unshared level 6 bdt extended-mode activity thread always six banks segments totally unique one return control stack holds information calling structure including security relevant privilege state changes accessible thread except use call return similar instructions major part protection reliability mechanism applications cause bad effects changing return addresses overwriting return control stack another unique bank automatic storage bank activity local store stack used compilers hold local variables created within block also used hold parameter lists passed call one checks made operating system behalf call made protected subsystem ensure operands thread-local stack thread right access memory region referenced parameters parameters kept thread-local space chance thread may change validation responsibility called procedure perform similar checks secondary parameters may exist shared space i.e. primary parameter points structure contains pointers procedure expected copy pointers local space validating use internally held validated pointer activities may create additional segments limit available address space 2 words 8gw 36gb convenient way multi-threaded applications get large amounts memory space knowing totally thread-safe taking space away rest available program activity program independent space meaning application say 100 activities able use 800gw 3tb virtual space basic-mode activities start banks basic-mode programs aware virtual address space calls extended-mode subsystems cause banks created os 2200 implement programs exactly way unix linux windows implement processes closest analogy obvious difference os 2200 permits single program per run job session executing time program may hundreds threads spawn programs run concurrently several banks program level contain mixture run job session information program information control structures operating system access read-only access program programs may retrieve information structures debugging purposes retrieve things like user-id terminal-id without overhead system call written program contain things like thread state save areas file control blocks accounting information rest banks used program program object file executed operating system obtains bank information file creates banks needed loads bank initial state file simplest program single bank containing code data considered bad form permitted compatibility old applications create application assembly language standard compilers create one code banks one data banks normally code banks marked read-only debugging reliability aid security concerns either way program affect program thus address space distinct programs system nothing program change contents program ’ memory os shared subsystems protected mechanisms discussed later even read access prohibited os subsystem memory almost cases code program possible create shared subsystem generally readable even writable multiple programs must explicitly installed way privileged system administrator programs initially created banks specified object file single activity may use system calls create additional banks within program level additional activities closest analogy shared subsystem .dll subsystem much like program many respects except activities associated instead accessed programs subsystems typically via call instruction fact program subsystem plus one activities every activity belongs home subsystem program created subsystem concept important encapsulation access rights privilege within home subsystem activities typically share common access rights code data banks code banks home subsystem usually read-only even execute-only contain constant data activities right execute subsystems also combinations banks may contain data banks well code banks globally shared subsystems must installed system someone appropriate administrator privileges subsystems may also open files database manager subsystem opens database files use typically exclusive access rights operating system attach banks subsystem hold file control tables os level contains banks exec banks never directly accessible either programs global subsystems entry points os handled way protected subsystem calls made os always via gates instructions exist purpose er executive request via interrupts next part virtual address bdi bank descriptor index level field selected particular bank descriptor table base register b16-b23 base registers b16-b23 part activity state maintained exec direct access activity bank descriptor tables program activity levels exist within program-level banks belong operating system bdi simply index bank descriptor table entry table contains information bank entry describes 1mb 256kw virtual address space larger contiguous space needed consecutive entries logically combined create larger bank maximum 2 words bank descriptor table entry bank descriptor – bd gives size bank small 256kw large 16mw large 1gw small bank always represented single bd large banks represented 64 consecutive bds large bank 4096 bds large large banks need use 64 4096 consecutive bds use many needed provide virtual address space required entry also contains upper lower limits allowable offsets within bank virtual addresses outside limits generate fault interrupt allows small banks example containing message virtual space reserved actually needs provides debugging check bad pointers indices bd also contains key value access control fields fields indicate whether read write execute permission granted instruction processor 3 bits special access permissions sap applies activities executing within owning subsystem really matching key value general access permissions gap applies everyone else usually zero access exec sets key value state activity may changed gate interrupt transitions 2200 series protection architecture uses three pieces activity state reflected hardware state processor privilege pp ring domain processor privilege controls ability execute privileged instructions access protected registers state pp=0 used exec gives full access instructions privileged state exec activities user activities used gate access exec api run pp=0 pp=1 restricts privileged instructions allow reading day clocks reading contents privileged registers none privileged registers contain truly sensitive information allowing general read access could easily lead undetected errors user programs basically pp=1 instructions change addressing environment change clocks change instrumentation state perform i/o restricted pp=1 rarely used pp=2 normal user mode state code executes restriction pp=1 also pp=3 restricts instructions user program execute currently use many existing programs using instructions intent restrict access instructions may system model dependent domain mechanism heart protection mechanism bd bank descriptor lock field consisting ring number domain number also key field state activity key matches lock ring key less ring lock activity special access permission otherwise activity general access permission ring allows overriding domain protection mechanism user applications run ring=3 protected subsystems run ring=2 gives access data still allowing access parameters data calling user ’ space note still possible thread cause protected subsystem access user ’ space thread ’ bank descriptor tables use ring=0 used os allows access data still able access parameters passed either user programs protected subsystems gates another part protection mechanism gate data structure controls transitions domains gate lives gate bank hardware enforces references gates must addresses proper offset multiple gate size within gate bank gate contains target address new values pp ring domain may contain hidden parameter passed target protected subsystems directly accessible subsystems instead subsystem must request gate built gate bank access subsystem permits operating system perform access control checks linking system find gate address associated entry point fact whole mechanism usually transparently handled within linking system hidden parameter permits example file i/o gate contain address handle file control block since guaranteed correct created os user opened file many error checks eliminated path length i/o os 2200 designed handle 32 instruction processors cpus great deal design done years optimize environment example os 2200 makes almost use critical sections design ’ high probability multiple processors executing code instead uses data locking finest granularity data possible generally locks deal single instance data object e.g. activity control structure file control block contained within data structure object minimizes likelihood conflicts global locks set updating list objects lock set long takes update links list even dispatching done separate locks different priority levels check made empty priority level without setting lock lock need set adding removing item queue register set visible address space registers appear exist first 128 words 200 current instruction bank b0 referenced data item impose restriction compilers place data constants first 128 words code bank result expansion instruction set without requiring additional operation codes register-to-register operations accomplished register-storage operation codes typical instructions contain function code target source register index register base register displacement field function code qualifier indicates immediate data displacement base h fields combine form single 18-bit immediate value allows loading adding multiplying etc small constants eliminate memory reference associated storage processor state captured stack interrupt contains information needed return control interrupted activity determine type interrupt interrupts may occur middle long instructions state deals possibility basic mode another whole form instruction formats addressing basic mode provides compatibility previous systems back 1108 practical purposes hardware architecture defines rules addresses instructions converted forms obvious difference basic mode lack explicit b registers instructions instead four implicitly used b registers b12-b15 complex algorithm using limits banks represented b registers operand address b register within current instruction found interesting instructions 2200 repertoire locking synchronization instructions conditional replace familiar quite similar compare swap intel architecture instructions always gain exclusive use memory/cache-line holding referenced word ts tss check bit referenced word bit clear set continue ts skip tss bit set either interrupt ts fall next instruction tss ts interrupt os takes one several actions depending instruction sequence activity priority real time exec activities simply get control back allow retry unless even higher-priority activity waiting presumption lock set another processor soon cleared user activity running real time priority may priority temporarily reduced placed back dispatching queues alternatively code sequence may indicate test set queuing used case os places activity wait state chains end list activities waiting particular lock activities clearing lock check see waiting notify os allow one try test set queuing typically used synchronization within subsystems database manager activities many programs may executing result mechanisms efficient low overhead synchronization among activities queuing architecture another interesting special case specifically designed allow efficient handling messaging number messages waiting processing could almost unlimited also aimed reducing one primary costs messaging namely constantly move messages around memory even moving communication manager message queue subsystem processing program eliminated instead message placed small bank instructions allow placing bank descriptors banks queue removing queue message placed queue sending program subsystem longer access bank removed address space message retrieved queue bank becomes part receiver address space queuing instructions also provide activity synchronization functions e.g. wait message pointers moved moved way ensures security integrity moved data message visible recipient i/o 2200 series systems handled i/o processors processors offload large portions i/o path length recovery fully isolating main system i/o faults interrupts bus errors etc greatly improve reliability availability i/o processors come three different types storage communications clustering real difference firmware load i/o processors controlled operating system os 2200 provide raw mode i/o called arbitrary device i/o even os validates program accessing allowed device handles interrupts faults passing appropriate status program programs must granted privileges security officer access devices arbitrary mode may limited security officer system operator specific devices arbitrary i/o allowed device also use program system device must exclusively allocated program os takes general calls programs generates command packets real memory device addresses passed i/o processor firmware i/o processor actually creates device specific e.g. scsi packets sets dma issues i/o services interrupts | [
8352,
9911,
2477,
2638,
6797,
1776,
5457,
823,
3323
] | Test |
1,870 | 7 | Ansarada:ansarada ansarada provider ai-powered virtual data rooms material information platforms business transactions material events mergers acquisitions fundraising tenders ipos historically ansarada virtual data rooms enabled hosting exchange management confidential material information bidders sellers mergers acquisitions due diligence process software service saas solutions ansarada also creators world first video game since launched january 2014 138,000 sessions total screen views amounting 9.5 million ansarada offices sydney london new york chicago well employees working asia africa continental europe sydney-based ansarada founded 2005 andrew slavin chief technology officer sam riley chief executive rachel riley chief financial officer daphne chang company named first two letters founder first names four founders employees continue 80 percent company group investment bankers lawyers owning remaining 20 percent ansarada disclose sales profits ansarada claims 60 percent market share australian deals employs 200 people offices sydney chicago new york city london amsterdam frankfurt johannesburg hong kong development centre ho chi minh city july 2016 ansarada partnered pyco group launched new software development center vietnam range artificial intelligence features introduced ansarada virtual data rooms vdr 2017 ai-powered alternative traditional virtual data rooms 100-plus new features allow users “ illuminate risk opportunity raise protect potential optimize processes deal preparation execution close ” sell-side users ansarada rooms view ai bidder engagement score assigns numerical value likelihood potential bidder make offer predicts win objectively tells sellers interest ai bidder engagement score calculated using machine learning algorithm takes account performance 57 separate metrics time aida acronym ansarada intelligent data assistant extracts on-demand insights data based activity within ansarada room allows information accessed natural language need login click menus features desktop product users interact aida chat interface available iphone itunes app store virtual assistant uses natural language processing understand user requests plus 20 “ skills ” extract data insights provide answers october 2017 ansarada launched world first material information platform deliver readiness service raas platform uses new technologies artificial intelligence machine learning help businesses ready important outcomes structuring material information correctly assigning accountability people tracking progress objective score readiness selection ansarada clients include law firms corporate finance software property private equity venture capital ansarada launched game january 2014 appeal primarily investment bankers looking express competitive sides risk-free setting new york times reported ten hours games release attracted 1,000 users played 3,300 times according new york times | [
6153
] | Test |
1,871 | 3 | ARM_Cortex-A55:arm cortex-a55 arm cortex-a55 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings cambridge design centre cortex-a55 2-wide decode in-order superscalar pipeline cortex-a55 serves successor arm cortex-a53 designed improve performance energy efficiency a53 arm stated a55 15 improved power efficiency 18 increased performance relative a53 memory access branch prediction also improved relative a53 cortex-a75 cortex-a55 cores first products support arm dynamiq technology successor big.little technology designed flexible scalable designing multi-core products cortex-a55 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a55 used within kryo 385 cpu core semi-custom core also used qualcomm mid-range socs kryo 360 silver kryo 460 silver | [
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
10361,
638,
644,
9863,
8842,
146,
659,
7833,
666,
5786,
6815,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
6391,
3835,
2814,
781,
69... | None |
1,872 | 3 | ARM_Cortex-A75:arm cortex-a75 arm cortex-a75 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings sophia design centre cortex-a75 3-wide decode out-of-order superscalar pipeline cortex-a75 serves successor cortex-a73 designed improve performance a73 maintaining efficiency according arm a75 expected offer 16–48 better performance a73 targeted beyond mobile workloads a75 also features increased tdp envelope 2 w enabling increased performance cortex-a75 cortex-a55 cores first products support arm dynamiq technology successor big.little technology designed flexible scalable designing multi-core products cortex-a75 available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc arm also collaborated qualcomm semi-custom version cortex-a75 used within kryo 385 cpu semi-custom core also used qualcomm mid-range socs kryo 360 gold | [
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
630,
10361,
638,
644,
9863,
8842,
146,
659,
7833,
666,
5786,
6815,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
1776,
6391,
3835,
28... | None |
1,873 | 4 | Device_configuration_overlay:device configuration overlay device configuration overlay dco hidden area many today ’ hard disk drives hdds usually information stored either dco host protected area hpa accessible bios os user however certain tools used modify hpa dco system uses identify_device command determine supported features given hard drive dco report command supported features nonexistent drive smaller actually determine actual size features disk device_configuration_identify command used output command compared output identify_device see dco present given hard drive major tools remove dco order fully image hard drive using device_configuration_reset command permanently alters disk unlike host protected area hpa temporarily removed power cycle device configuration overlay dco first introduced ata-6 standard allows system vendors purchase hdds different manufacturers potentially different sizes configure hdds number sectors example would using dco make 80-gigabyte hdd appear 60-gigabyte hdd os bios ... given potential place data hidden areas area concern computer forensics investigators additional issue forensic investigators imaging hdd hpa and/or dco certain vendors claim tools able properly detect image hpa either silent handling dco indicate beyond capabilities tool hdat2 free software program ms-dos used create/remove host protected area hpa using command set max create/remove dco hidden area using command dco modify also functions dco data synergy freeware atatool utility used detect dco windows environment recent versions allow dco created removed frozen guidance software encase comes linux-based tool images hard drives called linen linen 6.01 validated national institute justice nij october 2008 found tool remove either host protected areas hpas dcos however linux test environment automatically removed hpa test drive allowing tool image sectors hidden hpa tool acquire sectors hidden dco accessdata ftk imager 2.5.3.14 validated national institute justice nij june 2008 findings indicated physical acquisition made drive hidden sectors either host protected area device configuration overlay tool remove either hpa dco tool acquire sectors hidden hpa variety hardware imaging tools found successfully detect remove dcos nij routinely tests digital forensics tools publications found http //nij.ncjrs.gov/app/publications/pub_search.aspx searchtype=basic category=99 location=top psid=55 nist https //www.nist.gov/itl/ssd/cs/cftt/cftt-disk-imaging.cfm | [
9319,
11368,
1515,
9166,
7983,
2447,
11182,
9458,
4408,
9086
] | Validation |
1,874 | 3 | Compaq_Evo:compaq evo compaq evo series business desktop laptop pcs thin clients made compaq hewlett-packard following 2002 merger evo brand introduced compaq may 2001 business-oriented brand replaced compaq deskpro brand desktops armada notebooks evo rebranded hp compaq used 2013 desktops small made positioned horizontally instead vertically monitor could placed top save space featured sleek silver black compact design early models shipped cd-rom drives compaq eventually shipped evo cd-rw drives dvd-rom drives design models allowed one cd dvd drive models bigger designs 2 cd dvd drives models also shipped 3½ floppy drive positioned cd dvd drive models also 2 usb 2.0 ports front convenience well two back human interface devices external volumes also headphone microphone jack front line line back laptops conservative design described one reviewer old-school black squared-off-corner business notebook models tough black case reminiscent ibm thinkpad midsize 14 15 screen good multimedia capability offered 256 mb ram standard amount easily upgraded 512 mb even 1 gb thin clients based geode processor family compaq evo desktop computer great option businesses schools compact cheap design affordable needed specs businesses schools compaq evo computers shipped standard windows xp windows 2000 running compaq evo shipped pentium 4 processors laptop evos shipped centrino platforms last evo-branded models released 2003 later replaced re-branded like compaq-branded products hp compaq products final model carry compaq evo name n620c notebook early pentium-m system featured 1.6ghz processor n620c intel centrino-based instead used compaq wireless module snapped onto multiport slot lid notebook desktop models notebook models thin clients | [
8229,
1638,
11100,
3304,
5384,
6765,
3214,
2258,
1304,
3323,
5756
] | None |
1,875 | 4 | Risk_management_framework:risk management framework risk management framework united states federal government policy standards help secure information systems computers networks developed national institute standards technology two main publications cover details rmf nist special publication 800-37 guide applying risk management framework federal information systems nist special publication 800-53 security privacy controls federal information systems organizations nist special publication 800-37 guide applying risk management framework federal information systems developed joint task force transformation initiative working group transforms traditional certification accreditation c process six-step risk management framework rmf risk management framework rmf illustrated right provides disciplined structured process integrates information security risk management activities system development life cycle rmf steps include lifecycle information system encounter many types risk affect overall security posture system security controls must implemented rmf process supports early detection resolution risks risk categorized high level infrastructure risks project risks application risks information asset risks business continuity risks outsourcing risks external risks strategic risks infrastructure risks focus reliability computers networking equipment project risks focus budget timeline system quality application risks focus performance overall system capacity information asset risks focus damage loss disclosure unauthorized part information assets business continuity risks focus maintaining reliable system maximum up-time outsourcing risks focus impact 3rd party supplier meeting requirements external risks items outside information system control impact security system strategic risks focuses need information system functions align business strategy system supports | [
10821,
5373,
4798
] | Train |
1,876 | 5 | Dynamic_synchronous_transfer_mode:dynamic synchronous transfer mode dynamic synchronous transfer mode dtm optical networking technology standardized european telecommunications standards institute etsi 2001 beginning specification etsi es 201 803-1 dtm time division multiplexing circuit-switching network technology combines switching transport designed provide guaranteed quality service qos streaming video services used packet-based services well marketed professional media networks mobile tv networks digital terrestrial television dtt networks content delivery networks consumer oriented networks triple play networks dtm architecture conceived 1985 developed royal institute technology kth sweden published february 1996 research team split two spin-off companies reflecting two different approaches use technology one companies remains active field delivers commercial products based dtm technology name net insight | [
10368,
10242,
3847,
649,
9868,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
9380,
2085,
9381,
3751,
3752,
10924,
562,
2356,
2996,
9909,
10171,
3133,
3006,
4797,
5181,
5437,
7364,
2887,
8265,
2509,
4687,
5843,
2904,
5469,
5470,
5471,
... | Test |
1,877 | 2 | Foomatic:foomatic foomatic configurable printing filter uses ppd files configuration generate appropriate output given printer spooler independent means used common unix printing system cups lprng others uses ghostscript background using options according ppd file printer currently developed openprinting workgroup linux foundation like cups foomatic supposes applications produce output postscript output spools postscript printer action needed otherwise generic way act foomatic-rip knows available printer translate postscript data directly printer language without creating intermediate raster file components package following free drivers specifically developed work foomatic | [
10885,
3974,
8360,
7626,
4011,
6830,
10352,
8628,
8763
] | Validation |
1,878 | 2 | Blued_(macOS):blued macos blued bluetooth daemon macos previously mac os x started system interacted directly user daemon handles service discovery link key management incoming connection acceptance | [
11521,
2819,
1796,
9734,
3719,
4615,
10888,
11402,
9100,
5647,
10512,
1042,
8852,
9109,
7318,
4888,
3228,
11037,
2207,
1439,
811,
3371,
5292,
1710,
6700,
8877,
1074,
10036,
3766,
2232,
9912,
11257,
9406,
6849,
4933,
713,
9418,
9035,
3790,
... | None |
1,879 | 9 | Creative_Basic:creative basic creative basic cb third-generation event-driven programming language windows integrated development environment ide current version executables interpreted require runtime libraries installed end-user computer planned future version compiled executables creative basic extensive command set access application programming interface api libraries available microsoft windows operating system although modern version dates 2007 development completely compatible ibasic use worldwide since 2002 notable projects jerry muelver wikiwriter wikiwriter chm wizard alyce watson mike rainey manufacturing engineering programs see links hello program program open console window print 10 random numbers program create gui window exit button event handling routine | [
7691,
1805,
6797,
9997,
786,
11412,
22,
3481,
9881,
3613,
797,
3233,
11683,
5925,
8101,
4136,
10666,
8494,
303,
7343,
7983,
11315,
4410,
315,
7355,
7486,
7870,
4160,
4674,
10750,
712,
847,
92,
11229,
2915,
9188,
5733,
11243,
2541,
8429,
... | Validation |
1,880 | 6 | Dot_Hill_Systems:dot hill systems dot hill systems corp manufacturer computer storage area network arrays providing computer hardware software products small large computer data storage systems dot hill started 1997 carlsbad california 2004 dot hill acquired chaparral network storage longmont colorado chaparral network storage started 2000 also manufactured storage systems 2010 dot hill start moving almost carlsbad operations longmont dot hill listed nasdaq hill dot hill products interfaces supporting fibre channel fc internet small computer systems interface iscsi serial attached scsi sas products include hard drives solid-state drives ssds dot supports raid software data center storage management applications run windows linux rhel suse apple mac os x snow leopard oracle solaris xenserver vmware esx servers host interfaces ssd sas sata drive technologies seagate technology finalized acquisition company october 2015 | [
1801,
7863,
823
] | Test |
1,881 | 4 | Crackme:crackme crackme often abbreviated cm small program designed test programmer reverse engineering skills programmed reversers legal way crack software since intellectual property infringed upon crackmes reversemes keygenmes generally similar protection schemes algorithms found proprietary software however due wide use packers/protectors commercial software many crackmes actually difficult algorithm harder find track commercial software keygenme specifically designed reverser find protection algorithm used application also write small keygen programming language choice keygenmes properly manipulated self-keygenning example checking might generate corresponding key simply compare expected entered keys makes easy copy key generation algorithm often anti-debugging anti-disassemble routines used confuse debuggers make disassembly useless code-obfuscation also used make reversing even harder | [
10173,
8171,
6797,
823
] | Validation |
1,882 | 4 | 2014_Russian_hacker_password_theft:2014 russian hacker password theft 2014 russian hacker password theft alleged hacking incident resulting possible theft 1.2 billion internet credentials including usernames passwords hundreds millions corresponding e-mail addresses data breach first reported new york times reported many media allegedly discovered reported milwaukee-based information security company hold security 420,000 websites reported affected according new york times source big companies know user credentials among stolen hold security disclose sites compromised instead offered two separate services one website owners one consumers check 're affected service website owners costs 10 month check consumers free hold security described group responsible hack small group “ fewer dozen men 20s ... based small city south central russia region flanked kazakhstan mongolia ” dubbed group cybervor russian lit cyber thief hold claimed hack perpetrated use sql injection according forbes article hold security says 1.2 billion credentials stolen way also ones cybervor simply bought people used means hold security n't know split forbes columnist kashmir hill noted internet predictably panicked story yet another massive password breach went viral pretty direct link panic pay-out security firm hold security website service offering people check username password pair stolen requires people send hold security encrypted versions passwords named independent sources come forward confirm breach forbes columnist joseph steinberg even expressed outright skepticism many facts claimed breach raising questions trustworthiness reports breach altogether | [
1024,
8320,
899,
3843,
5636,
5764,
10502,
2187,
4240,
11152,
10003,
10132,
4117,
8726,
535,
1688,
2717,
9375,
1440,
5024,
9761,
4644,
4133,
5028,
11175,
297,
2857,
5547,
8489,
11052,
9518,
9904,
7601,
1970,
9395,
8886,
1337,
441,
1979,
40... | Test |
1,883 | 9 | Alan_Perlis:alan perlis alan jay perlis april 1 1922 – february 7 1990 american computer scientist professor purdue university carnegie mellon university yale university best known pioneering work programming languages first recipient turing award perlis born jewish family pittsburgh pennsylvania graduated taylor allderdice high school 1939 1943 received bachelor degree chemistry carnegie institute technology later renamed carnegie mellon university world war ii served u.s. army became interested mathematics earned master degree 1949 ph.d. 1950 mathematics massachusetts institute technology mit doctoral dissertation titled integral equations solution iteration analytic continuation 1952 participated project whirlwind joined faculty purdue university 1956 moved carnegie institute technology chair mathematics first head computer science department 1962 elected president association computing machinery awarded inaugural turing award 1966 according citation influence area advanced programming techniques compiler construction reference work done member team developed programming language algol 1971 perlis moved yale university become chair computer science hold eugene higgins chair 1977 elected national academy engineering 1982 wrote article epigrams programming association computing machinery acm sigplan journal describing one-sentence distillations many things learned programming career epigrams widely quoted remained yale death 1990 publications selection | [
512,
7048,
9993,
11020,
1178,
667,
8987,
1952,
10668,
2482,
1976,
4921,
9019,
4799,
4800,
10049,
4930,
10435,
70,
8262,
3529,
1610,
1099,
9804,
7630,
10320,
2519,
11099,
7775,
9825,
8695,
9315,
4201,
11242,
2283,
4331,
8813,
2670,
2798,
1... | Validation |
1,884 | 9 | ActiveJDBC:activejdbc activejdbc java implementation active record design pattern developed igor polevoy inspired activerecord orm ruby rails based convention configuration similar ruby rails activejdbc infers meta data database result models require setters getters creation saving new records table one line updating existing record activejdbc query language search criteria written abbreviated sql activejdbc general purpose java orm served first building block activeweb | [
3080,
10737,
9467,
10413
] | Validation |
1,885 | 4 | SyncBack:syncback syncback software allows backing synchronizing files several resources including internal external drive different media usb thumb drive cd dvd remote server nas ftp windows server cloud storage provider governing law shall governed laws singapore file backup move sync restore functions program highly rated easy use features found syncback note features may available higher variants syncback four versions syncback available syncbackfree syncbacklite shareware syncbackse shareware syncbackpro shareware syncbackse syncbackpro work windows client versions windows server oses syncbackfree syncbacklite support windows client versions | [
9025,
3366,
1801,
1358,
7983,
4505
] | Train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.