node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,486
7
Intelliquip:intelliquip intelliquip llc develops browser-based software also known intelligent front-end basic function company software automate front-end sales process complex equipment software specialized fluid handling equipment industry compatible pumps compressors valves blowers turboexpanders heat exchangers actuators filters seals couplings motors variable-frequency drives intelliquip browser-based software incorporates concept software service saas means deploy subscription-based hosted service users access via internet without need install software user computer saas platform intelliquip ’ intelligent front-end allows clients deploy selection configuration solutions equipment directly internal sales force sales channels company licensed fpx llc patented core configurator engine use software intelliquip also member hydraulic institute largest association pump industry manufacturers north america part hydraulic institute electronic data exchange committee participate project fiatech adopt aex cfixml schemas implement intelliquip software initiative developing standards automate information exchange design procurement delivery installation operation maintenance engineered equipment
[ 467, 4309 ]
Test
2,487
4
Duplicati:duplicati duplicati backup client securely stores encrypted incremental compressed remote backups local files cloud storage services remote file servers duplicati supports various online backup services like onedrive amazon s3 backblaze rackspace cloud files tahoe lafs google drive also servers support ssh/sftp webdav ftp duplicati uses standard components rdiff zip aescrypt gnupg allows users recover backup files even duplicati available released terms gnu lesser general public license lgpl duplicati free software duplicati written mostly c implemented completely within clr enables cross-platform runs well 32-bit 64-bit versions windows macos linux using either .net framework mono duplicati graphical user interface wizard-style interface command-line version use headless environments interfaces use core thus set features capabilities command-line version similar duplicity interface duplicati unique features usually found commercial systems remote verification backup files disk snapshots backup open files disk snapshots performed vss windows lvm linux original duplicati project started june 2008 intended produce graphical user interface duplicity program included port duplicity code use windows dropped september 2008 work clean re-implementation began re-implementation includes sub-programs found duplicity rdiff ftp etc initial version duplicati saw initial release june 2009 2012 work duplicati 2 started complete rewrite includes new storage engine allows efficient incremental continuous backups new user interface web-based makes possible install duplicati 2 headless systems like servers nas also responsive easily used mobile devices even though duplicati 2 still beta already 20,000 active installations duplicati gui command-line interface call common component called main serves binding point operations supported currently encryption compression storage component considered subcomponent loaded runtime making possible third-party developer inject subcomponent duplicati without access source need modify duplicati license type also flexible enough allow redistribution duplicati closed-source storage provider duplicati designed independent provider possible means storage medium supports common commands get/put/list/delete work duplicati duplicity model duplicati based relies heavily components system librdiff tcftp others since duplicati intended cross-platform unlikely components available platforms duplicati re-implements components instead notably duplicati features rdiff aescrypt implementation work system supports clr runtime duplicati gui duplicati 1.x intended used single machine display attached however also possible install duplicati windows service linux daemon set duplicati system tray starting duplicati service limitation addressed duplicati 2 web interface used headless systems duplicati 1.x extremely slow file listings browsing file tree restores take long time since duplicati produces incremental backups corrupt missing incremental volume render following incremental backups next full backup useless duplicati 2 regularly tests backup detect corrupted files early duplicati 1.x stores file modification date metadata like permissions attributes addressed duplicati 2
[ 11201, 2050, 7364, 6565, 3366, 11178, 3819, 5612, 3629, 1358, 7983, 3794, 3573, 4438, 823, 728 ]
Test
2,488
0
Stemming:stemming linguistic morphology information retrieval stemming process reducing inflected sometimes derived words word stem base root form—generally written word form stem need identical morphological root word usually sufficient related words map stem even stem valid root algorithms stemming studied computer science since 1960s many search engines treat words stem synonyms kind query expansion process called conflation computer program subroutine stems word may called stemming program stemming algorithm stemmer stemmer english operating stem cat identify strings cats catlike catty stemming algorithm might also reduce words fishing fished fisher stem fish stem need word example porter algorithm reduces argue argued argues arguing argus stem argu first published stemmer written julie beth lovins 1968 paper remarkable early date great influence later work area paper refers three earlier major attempts stemming algorithms professor john w. tukey princeton university algorithm developed harvard university michael lesk direction professor gerard salton third algorithm developed james l. dolby r consultants los altos california later stemmer written martin porter published july 1980 issue journal program stemmer widely used became de facto standard algorithm used english stemming dr. porter received tony kent strix award 2000 work stemming information retrieval many implementations porter stemming algorithm written freely distributed however many implementations contained subtle flaws result stemmers match potential eliminate source error martin porter released official free software mostly bsd-licensed implementation algorithm around year 2000 extended work next years building snowball framework writing stemming algorithms implemented improved english stemmer together stemmers several languages paice-husk stemmer developed chris paice lancaster university late 1980s iterative stemmer features externally stored set stemming rules standard set rules provides 'strong stemmer may specify removal replacement ending replacement technique avoids need separate stage process recode provide partial matching paice also developed direct measurement comparing stemmers based counting over-stemming under-stemming errors several types stemming algorithms differ respect performance accuracy certain stemming obstacles overcome simple stemmer looks inflected form lookup table advantages approach simple fast easily handles exceptions disadvantages inflected forms must explicitly listed table new unfamiliar words handled even perfectly regular e.g cats cat table may large languages simple morphology like english table sizes modest highly inflected languages like turkish may hundreds potential inflected forms root lookup approach may use preliminary part-of-speech tagging avoid overstemming lookup table used stemmer generally produced semi-automatically example word run inverted algorithm might automatically generate forms running runs runned runly last two forms valid constructions unlikely.. suffix stripping algorithms rely lookup table consists inflected forms root form relations instead typically smaller list rules stored provides path algorithm given input word form find root form examples rules include suffix stripping approaches enjoy benefit much simpler maintain brute force algorithms assuming maintainer sufficiently knowledgeable challenges linguistics morphology encoding suffix stripping rules suffix stripping algorithms sometimes regarded crude given poor performance dealing exceptional relations like 'ran 'run solutions produced suffix stripping algorithms limited lexical categories well known suffixes exceptions however problem parts speech well formulated set rules lemmatisation attempts improve upon challenge prefix stripping may also implemented course languages use prefixing suffixing suffix stripping algorithms may differ results variety reasons one reason whether algorithm constrains whether output word must real word given language approaches require word actually exist language lexicon set words language alternatively suffix stripping approaches maintain database large list known morphological word roots exist real words approaches check list existence term prior making decision typically term exist alternate action taken alternate action may involve several criteria non-existence output term may serve cause algorithm try alternate suffix stripping rules case two suffix stripping rules apply input term creates ambiguity rule apply algorithm may assign human hand stochastically priority one rule another algorithm may reject one rule application results non-existent term whereas overlapping rule example given english term friendlies algorithm may identify ies suffix apply appropriate rule achieve result friendl friendl likely found lexicon therefore rule rejected one improvement upon basic suffix stripping use suffix substitution similar stripping rule substitution rule replaces suffix alternate suffix example could exist rule replaces ies affects algorithm varies algorithm design illustrate algorithm may identify ies suffix stripping rule well suffix substitution rule apply since stripping rule results non-existent term lexicon substitution rule substitution rule applied instead example friendlies becomes friendly instead friendl diving details common technique apply rules cyclical fashion recursively computer scientists would say applying suffix substitution rule example scenario second pass made identify matching rules term friendly ly stripping rule likely identified accepted summary friendlies becomes via substitution friendly becomes via stripping friend example also helps illustrate difference rule-based approach brute force approach brute force approach algorithm would search friendlies set hundreds thousands inflected word forms ideally find corresponding root form friend rule-based approach three rules mentioned would applied succession converge solution chances brute force approach would slower lookup algorithms direct access solution rule-based try several options combinations choose result seems best complex approach problem determining stem word lemmatisation process involves first determining part speech word applying different normalization rules part speech part speech first detected prior attempting find root since languages stemming rules change depending word part speech approach highly conditional upon obtaining correct lexical category part speech overlap normalization rules certain categories identifying wrong category unable produce right category limits added benefit approach suffix stripping algorithms basic idea stemmer able grasp information word stemmed apply accurate normalization rules unlike suffix stripping rules also modify stem stochastic algorithms involve using probability identify root form word stochastic algorithms trained learn table root form inflected form relations develop probabilistic model model typically expressed form complex linguistic rules similar nature suffix stripping lemmatisation stemming performed inputting inflected form trained model model produce root form according internal ruleset similar suffix stripping lemmatisation except decisions involved applying appropriate rule whether stem word return word whether apply two different rules sequentially applied grounds output word highest probability correct say smallest probability incorrect typically measured lemmatisation algorithms stochastic given word may belong multiple parts speech probability assigned possible part may take account surrounding words called context context-free grammars take account additional information either case assigning probabilities possible part speech likely part speech chosen appropriate normalization rules applied input word produce normalized root form stemming techniques use n-gram context word choose correct stem word hybrid approaches use two approaches described unison simple example suffix tree algorithm first consults lookup table using brute force however instead trying store entire set relations words given language lookup table kept small used store minute amount frequent exceptions like ran run word exception list apply suffix stripping lemmatisation output result linguistics term affix refers either prefix suffix addition dealing suffixes several approaches also attempt remove common prefixes example given word indefinitely identify leading prefix removed many approaches mentioned earlier apply go name affix stripping study affix stemming several european languages found algorithms use stem database example set documents contain stem words stems mentioned necessarily valid words rather common sub-strings brows browse browsing order stem word algorithm tries match stems database applying various constraints relative length candidate stem within word example short prefix stem words would considered stem word beside .. much early academic work area focused english language significant use porter stemmer algorithm many languages investigated hebrew arabic still considered difficult research languages stemming english stemmers fairly trivial occasional problems dries third-person singular present form verb dry axes plural axe well axis stemmers become harder design morphology orthography character encoding target language becomes complex example italian stemmer complex english one greater number verb inflections russian one complex noun declensions hebrew one even complex due nonconcatenative morphology writing system without vowels requirement prefix stripping hebrew stems two three four characters multilingual stemming applies morphological rules two languages simultaneously instead rules single language interpreting search query commercial systems using multilingual stemming exist two error measurements stemming algorithms overstemming understemming overstemming error two separate inflected words stemmed root been—a false positive understemming error two separate inflected words stemmed root not—a false negative stemming algorithms attempt minimize type error although reducing one type lead increasing example widely used porter stemmer stems universal university universe univers case overstemming though three words etymologically related modern meanings widely different domains treating synonyms search engine likely reduce relevance search results example understemming porter stemmer alumnus → alumnu alumni → alumni alumna alumnae → alumna english word keeps latin morphology near-synonyms conflated stemming used approximate method grouping words similar basic meaning together example text mentioning daffodils probably closely related text mentioning daffodil without cases words morphological stem idiomatic meanings closely related user searching marketing satisfied documents mentioning markets marketing stemmers common elements query systems web search engines effectiveness stemming english query systems soon found rather limited however led early information retrieval researchers deem stemming irrelevant general alternative approach based searching n-grams rather stems may used instead also stemmers may provide greater benefits languages english stemming used determine domain vocabularies domain analysis many commercial companies using stemming since least 1980s produced algorithmic lexical stemmers many languages snowball stemmers compared commercial lexical stemmers varying results google search adopted word stemming 2003 previously search fish would returned fishing software search algorithms vary use word stemming programs simply search substrings obviously find fish fishing searching fishes find occurrences word fish
[ 5122, 8323, 2440, 2059, 6798, 11538, 10231, 1044, 5399, 538, 6304, 7599, 4531, 3893, 4662, 3127, 10557, 6208, 3533, 5197, 6223, 8538, 5857, 1890, 7780, 9320, 7918, 8046, 8688, 119, 8440, 7164 ]
Validation
2,489
3
Claasen's_law:claasen law claasen logarithmic law usefulness named technologist theo a. c. m. claasen introduced idea 1999 cto philips semiconductors law also expressed system parameters e.g ram cpu speed disk capacity need increase multiple create noticeable impact performance case ram law 256mb unit practically useful 128mb unit though base unit doubled would require 16384mb 128 × 128mb unit ram truly double performance law modern car e.g ford mondeo substantially useful getting occupants b older car e.g ford model order achieve linear improvement usefulness time necessary exponential increase technology time moore law delivers exponential increase technology claasen law combined moore law implies linear improvement usefulness time
[ 2273 ]
Validation
2,490
3
Baikal_CPU:baikal cpu baikal cpu line mips arm-based microprocessors developed fabless design firm baikal electronics spin-off russian supercomputer company t-platforms judging information available online sources baikal electronics selected different approach compared russian microprocessor initiatives elbrus-2sm elbrus-8s mcst multiclet line chips design baikal electronics based existing commercial ip cores imagination technologies arm holdings compared innovative approach multiclet elbrus cpu history dating back elbrus supercomputers soviet union march 2015 synopsys inc. announced baikal electronics selected synopsys solutions accelerate design verification advanced system chips may 2015 baikal electronics imagination technologies announced first commercial baikal microprocessor based mips warrior p5600 called baikal-t1 first samples new cpu available starting june 2015 baikal-t1 mainly targets applications networking industrial automation features hardware support virtualization high performance 128-bit simd engine march 2016 announced imagination technologies blog desktop pc called tavolga terminal also known meadowsweet terminal pc available order t-platforms computer based baikal-t1 cpu sm750 graphics processing unit debian linux operating system
[ 6659, 7687, 1425, 4386, 10658, 938, 6957, 7983, 823, 11580, 7234, 11333, 2503, 2523, 9309, 5358, 1776, 499, 1399 ]
Validation
2,491
4
REACH_authorisation_procedure:reach authorisation procedure authorisation procedure one regulatory tools european regulation ec reach n°1907/2006 aiming ban use substances high concern svhc included annex xiv reach substitute technically economically feasible alternatives process concerns manufacturers importers downstream users substances representatives foreign manufacturers also apply authorisation authorisation today impacts many industries including aerospace electronics automotive energy paint industries moreover defence applications de facto exempted authorisation process member states must decide case case basis whether company benefit procedure outlined article 2.3 reach reach regulation relies four main procedures registration evaluation restriction authorisation chemical substances eu member states european chemicals agency request european commission submit propositions identify substances high concern based criteria laid article 57 reach work supported expert groups echa eu member states based various criteria screening methodologies order identify relevant svhcs annex xiv last step prioritisation process lists svhcs exhibit particularly high risk human health environment based inherent properties quantities uses order forbid use eu market recommendations include svhcs annex xiv made echa debated relevant stakeholders member states companies ngos etc. final decision inclusion substance annex xiv taken european commission listed annex xiv reach regulation substance therefore assigned “ sunset date ” use banned unless authorisation granted definite period time today 2015/05/26 161 substances listed candidate list 31 substances listed annex xiv candidate list usually updated every 6 months annex xiv updated every 12 18 months authorisation procedure complex concerns manufacturers importers downstream users representatives substances banning use takes effect sunset date date use substance possible companies granted authorisation submitted dossier latest application date latter indeed benefit transitional period pending eu commission final decision exception made downstream users case upstream stakeholder within supply chain granted authorisation substance use point view supply chain substance matters instance subcontractors authorised importers covered annex xiv substance use supplied via supply chain authorisation application made granted finally downstream users need apply authorisation nevertheless obligation notify use echa art 66 reach check compliance risk management measures concerned companies thus invited take measures soon substance use enters candidate list enquiring impacted actors strategies authorisation applications made one several specific uses article 3 reach thus defines “ use ” “ processing formulation consumption storage keeping treatment filling containers transfer one container another mixing production article use ” framework authorisation dossier description use applied specify market supply chain processes type articles concerned use applied consistent enough cover exposure scenario also analysis alternatives use applied mistaken identified use corresponds reach registration process identified use focuses process consider performances markets questions exceptions exist application authorisation required production article may require authorisation point finished articles require authorisation put market even though still contain substance subject authorisation consequently articles requiring use annex xiv substance still produced outside eu imported particular case future restrictions procedure could however limit placing market articles risk remains art 58.6 reach review period duration eu commission authorises use substance sunset date following durations considered review periods end review period application authorisation reassessed evaluate progress made terms research development substitution applications extend review period made latest 18 months expiry date european commission may also reduce duration new circumstances appear terms risks impacts court european union qualified rule appeals applications authorisation member states turn responsible controlling decision implementation application authorisation afa made three main parts chemical safety report csr analysis alternatives aoa socio-economic analysis sea goal dossier demonstrate alternative substance immediately available risks controlled social economic advantages use substance outweigh risks human health environment dossier usually takes 6 18 months preparation echa guidelines available assist drafting application authorisation filed latest application date lad set 18 months sunset date lad enables benefit transitional period pending european commission decision afa made one several substances case grouping need demonstrated basis annex xi reach one several uses applied one several companies latter case called joint application requires appointing main applicant contact point echa two submission routes planned reach regulation adequate control route goal chemical safety report prove threshold values respected socio-economic route goal chemical safety report demonstrate risks reduced minimum chemical safety report contains aoa aims demonstrate alternative appropriate i.e technically economically feasible less risky available analysis alternatives therefore presents substance alternative solutions contains socio-economic analysis compulsory document socio-economic route also complete application justified adequate control route aims demonstrate advantages use substance outweigh risks human health environment purpose applicants must compare two scenarios ‘ use scenario ’ continued use substance one hand ‘ non-use scenario ’ cease use substance hand discuss impacts contains dossiers submitted submission windows february may august november echa strongly advise follow windows plenary sessions two committees rac seac organised march june september december year submitting plenary sessions submission windows therefore helps efficient assessment application applications deemed received business rules check successfully passed provided echa fees paid time examination dossier carried risk assessment committee rac socio-economic analysis committee seac opens public consultation alternatives 8 weeks companies ngos interested party possibility comment possibly challenge alternatives proposed applicant consultation followed additional discussions two committees order clarify application process called trialogue stakeholders invited participate duration examination varies according complexity clarity dossier committees however obligation deliver first opinion dossier 10 months submission latest dossier committee opinion sent commission whole process take 2 years may 4 2015 28 applications authorisation filed total 56 uses dossier requires implementing specific strategy define uses analysis industrial processes associated risks alternatives socio-economic impacts banning substance committees expect dossier contain precise description industrial process operational conditions representative dossier well risk management measures implemented applicant main issue application authorisation process duration review period granted therefore critical bring necessary precisions dossiers justify requested review period duration justification weak argumentation generic may induce granting shorter-than-requested review period beyond simple drafting application authorisation dossier whole process implies expertise deep analysis company activity multiple aspects analysis therefore requires extensive collection information also possibly contacts customers strengthen analysis alternatives public consultation one core mechanisms authorisation process stakeholders ’ competing companies universities laboratories ngos member states etc involvement consultation process growing last years reach 400 comments single dossier influence comments particular concerning alternatives makes major step authorisation process order streamline process templates comments instructions available echa website consulting costs application authorisation estimated echa amounts average around 230,000 eur single use
[]
Test
2,492
2
IPhone_4:iphone 4 iphone 4 smartphone designed marketed apple inc fourth generation iphone succeeding 3gs preceding 4s following number notable leaks iphone 4 first unveiled june 7 2010 apple worldwide developers conference san francisco released june 24 2010 united states united kingdom france germany japan iphone 4 introduced new hardware design iphone family apple ceo steve jobs touted thinnest smartphone world time consisted stainless steel frame doubles antenna internal components situated aluminosilicate glass iphone 4 also introduced apple new high-resolution retina display pixel density 326 pixels per inch maintaining physical size aspect ratio precursors iphone 4 also introduced apple a4 system-on-chip along ios 4—which notably introduced multitasking functionality apple new facetime video chat service iphone 4 also first iphone include front-facing camera first released version cdma networks ending period exclusive carrier iphone products united states iphone 4 received generally positive reception critics praising revamped design powerful hardware comparison previous models market success 600,000 pre-orders within 24 hours release iphone 4 plagued highly publicized reports abnormalities new antenna design caused device lose cellular signal held certain way human contact phone outer edge would cause significant decrease signal strength iphone 4 spent longest time apple flagship iphone model fifteen months although succeeding 4s announced october 2011 4 continued sold midrange model september 2012 thereafter entry-level offering apple lineup september 2013 announcement iphone 5s/iphone 5c iphone 4 longest lifespan iphone ever produced spanning close four years available developing countries early 2015 official unveiling iphone 4 june 7 2010 two prototypes brought attention media breaching apple normally secretive development process many speculations regarding technical specifications proved accurate january 27 2010 gadget website engadget received leaked images unreleased ipad unbeknownst editors readers images contained two unreleased iphone 4s n't subsequent gizmodo release aware complete contents images april 19 2010 gadget website gizmodo reported purchased iphone prototype 5000 furthermore conducted product teardown device prototype reported lost apple employee gray powell redwood city california shortly gizmodo published detailed information prototype apple legal associates formally requested phone returned apple gizmodo responded intent cooperate april 23 officers rapid enforcement allied computer team react task force california httap program raided home jason chen gizmodo editor responsible reviewing prototype seizing computers hard drives electronic frontier foundation criticized raid violating journalist source protection laws forbid seizure journalist computers well suspicion apple used influence member steering committee charged direction oversight california react task force push police action way would normally conducted type incident apple already received iphone prototype raid returned gizmodo district attorney stated investigation suspended discontinued searching gizmodo editor belongings determine whether shield laws applicable cautioned charges issued point pictures video second prototype published vietnamese website taoviet may 12 2010 almost identical first used a4 chip manufactured apple website purchased prototype 4,000 digitimes reported screen resolution new phone 960-by-640 confirmed apple iphone 4 official announcement iphone 4 available pre-order june 15 2010 customers attempting pre-order iphone 4 reported problems pre-order process us uk online apple stores crashed due surge traffic issue reported softbank apple exclusive partners united states japan respectively suspended advance sales iphone 4 demand threatened exceed supply retail stores also unable complete pre-order transactions due servers crashing apple partner carriers received 600,000 pre-orders iphone 4 first 24 hours largest number pre-orders apple received single day device point engadget reported 20:30 utc iphone 4 pre-order suppliers sold 1.7 million iphone 4s sold first three days availability iphone 4 also released orange tunisia available eight cities launch july 30 2010 iphone 4 made available sale australia new zealand 15 countries free bumper cases south korea released kt september 10 israel released september 24 cellcom pelephone orange launched thailand september 23 ais dtac true move malaysia september 26 kuala lumpur nationwide september 27 according website maxis iphone 4 released south africa september 22 vodacom mtn networks limited quantities iphone 4 launched vietnam september 30 vinaphone viettel first 3 major cities hanoi ho chi minh city da nang country end october iphone 4 launched india may 27 2011 aircel airtel january 11 2011 verizon wireless announced media event reached agreement apple would begin selling cdma iphone 4 united states ending apple exclusivity agreement verizon iphone went sale february 10 pre orders began february 3 verizon iphone includes 'personal hotspot feature allows user use iphone wireless hotspot five devices connecting one time february 3 2011 presale iphone 4 broke verizon first day sales records single device june 24 2010 apple issued statement white iphone 4 models proving challenging manufacture expected initially pushed release date back second half july lot speculation surrounding delay white iphone 4 among popular rumors concerning phone internal camera adversely affected light leaking due semi-translucent glass white paint sources report problem relates apple inability match white color front face plate home button april 27 2011 apple announced would releasing white iphone 4 model april 28 2011 gsm cdma release white iphone 4 carried april 28 apple official unveiling iphone 4s october 4 2011 announced sprint would begin carrying reconfigured cdma iphone 4 iphone 4s us october 14 september 2013 release iphone 5s iphone 5c apple stopped selling iphone 4 stores well website replaced 8 gb iphone 4s display iphone 4 manufactured lg exclusive contract apple features led backlit tft lcd capacitive touchscreen pixel density 326 pixels per inch ppi diagonally measured 960×640 display pixel 78 micrometers width display contrast ratio 800:1 screen marketed apple retina display based assertion display approximately 300 ppi distance one eye 57 arcseconds per pixel maximum amount detail human retina perceive iphone expected used distance 12 inches eyes higher resolution would allegedly effect image apparent quality maximum potential human eye already met claim disputed raymond soneira president displaymate technologies said interview wired magazine claims jobs something exaggeration reasonably close perfect display steve pushed little far soneira stated resolution human retina higher claimed apple working 477 ppi eyes 36 arcseconds per pixel however phil plait author bad astronomy whose career includes collaboration nasa regarding camera hubble space telescope responded criticism stating better 20/20 eyesight one foot away iphone 4 pixels resolved picture look pixellated average eyesight picture look fine iphone 4 features additional front-facing vga camera backside-illuminated 5 megapixel rear-facing camera 3.85 mm f/2.8 lens led flash rear-facing camera capable recording hd video 720p 30 frames per second cameras make use tap focus feature part ios 4 photo video recording rear-facing camera 5× digital zoom contrast steve jobs announcement wwdc 2010 recent federal communications commission documentation shown iphone 4 contains penta-band 3g umts antenna quad-band 3g umts radio advertised apple according fcc documentation filed apple radio inside iphone 4 supports 800 850 900 1,900 2,100 mhz 800 mhz frequency commonly used japanese mobile phones advertised supported apple however 800 mhz band subset 850 mhz band probably explains device advertised quad-band chip-sets manufactured skyworks solutions infineon gsm version apple mobile products time iphone 4 also used 30 pin dock connector external data port iphone 4 first generation iphone second microphone used noise cancellation located top unit near headphone jack main microphone bottom left iphone 4 introduces gyroscopic sensor detects 3-axis angular acceleration around x z axes enabling precise calculation yaw pitch roll gyroscope complements accelerometer sensor present since original iphone detects device acceleration shake vibration shock fall detecting linear acceleration along one three axes x z combined data accelerometer gyroscope provides detailed precise information device 6-axis movement space 3 axes gyroscope combined 3 axes accelerometer enable device recognize approximately far fast direction moved space iphone 4 powered apple a4 chip designed intrinsity like prior iphone models manufactured samsung system-on-a-chip composed arm cortex-a8 cpu integrated powervr sgx535 gpu apple a4 also used ipad clocked rated speed 1 ghz clock speed iphone 4 disclosed prior models iphone underclocked cpu typically extends battery life lowers heat dissipation iphone 4 512 mb dram additional dram supports increased performance multi-tasking iphone 4 uses micro-sim card iphone 4 devices running gsm network positioned ejectable tray located right side device cdma network however phone connects network using esn prior models used regular mini-sim cards depending operator micro-sim cards may available networks globally technical workaround possible trim mini-sim card knife scissors fits micro-sim tray prior models data stored flash memory 8 16 32 gb sim unlike prior generations storage capacity printed back unit iphone 4 features redesigned structure designed jony ive design would later reused adapted iphone 4s 5 5s se notably bulges back panel well band front back gone replaced flattened surfaces redesign reflects utilitarianism uniformity existing apple products ipad imac overall dimensions iphone 4 reduced predecessor high wide deep compared iphone 3gs high wide deep making iphone 4 24 thinner predecessor iphone 3gs steve jobs claimed thinnest smartphone planet reduced size device primarily due externally placed antenna iphone 4 structured around stainless steel frame wraps around edge phone acting primary structure device iphone 4 antennas metal band features two slits gsm version phone one lower left one top fake slit along lower right cosmetically mirror one lower left divide band two antenna sections left section band serves bluetooth wi-fi gps antenna right lower sections band act antenna gsm umts connectivity cdma version phone four slits metal band two top left right two bottom divides metal band four different segments like gsm version phone serves different antennas connectivity top portion band divided top left right slits connecting cdma network left portion metal band bluetooth wi-fi gps like gsm version right side antenna serves cosmetically mirror left side also create similar look gsm version phone internal components situated two panels aluminosilicate glass described apple chemically strengthened 20 times stiffer 30 times harder plastic theoretically allowing scratch resistant durable prior models fall 2010 pentalobe screws started replace philips screws used post-repair units us production units japan iphone 4 shipped ios 4 newest version apple ios mobile operating system time ios 4 introduced multitasking system allowing apps remain suspended memory perform certain operations background allowing users switch apps using on-screen menu also introduced facetime allows users perform video calls iphone ipad ipod touch os x users iphone 4 supports ios 7 released september 2013 due relatively aged hardware iphone 4 certain features available newer iphone models available device ios 7 include siri 3d maps turn-by-turn navigation airdrop airplay mirroring live camera filters panorama mode certain visual effects introduced ios 7 blurring translucent interface elements parallax effect home screen live wallpapers still subject limitations ios 7.1 bring slight performance improvements operating system iphone 4. ios 7 specifically ios 7.1.2 last version ios support iphone 4 unlike iphone 4s iphone 4 receive ios 8 update due performance issues iphone 4 bumper ring rubber plastic surrounds edge iphone 4 purpose protecting phone inner part rubber external band made plastic bumper wraps around edges device protecting edges lesser extent screen bumper cover front rear phone though slightly raise iphone whatever surface sitting additionally plastic band houses metallic buttons volume controls sleep/wake button six holes bumper enable access mute switch dock connector headphone jack speaker microphones apple updated bumper wider volume switch hole release iphone 4 cdma network updated bumper also compatible iphone 4s next generation iphone identical exterior design measurements iphone 4 cdma pre-release reception generally positive announcement included information covered gizmodo fox news commented seeing action far informative staring gizmodo photos busted test unit rhodri marsden independent said aside introduction face-to-face video calling staggering feature set instead focusing device powerful predecessor speedier easier use make previously laborious tasks seem like cinch cnet reacted announcement explaining believes imovie ios exciting part year wwdc keynote article noted iphone 4 unlike current cameras record hd content edit device labeling true mobile editing suite reviews iphone 4 generally favorable walt mossberg wall street journal called device best device class engadget named best smartphone market june 2010 cnet gave iphone 4 rating 8.6 10 one highest ratings given smartphone techradar gave device 4.5/5 stars consumer reports said signal problem reason rate recommended model although tests ranked highest among smart phones joshua topolsky engadget described device industrial design detailed sophisticated predecessor users reported yellow discoloration screen disappeared several days attributed glass lamination glue used time dry fully unit reached consumers due speed manufacturing another issue reported users within days iphone 4 release calls proximity sensor insensitive facial contact touchscreen end calls mute calls dial numbers users reported particularly low-light conditions photos taken iphone 4 sometimes contained blue green splotches issues white balance also discovered particularly using flash shortly iphone 4 launched consumers reported signal strength phone reduced touching lower left edge phone bridging one two locations separates two antennas resulting dropped calls areas lower signal reception response apple issued statement advising customers avoid gripping phone lower left corner making receiving call consequence problem reported july 2 2010 several iphone 4 users planning suing apple fraud concealment negligence intentional misrepresentation defective design legal challenge started law firm set website recruit disenchanted iphone 4 buyers lawsuit apple later day apple issued another statement stating discovered cause dramatic drop bars apple explained formula used calculate number bars display wrong apple promised correct issue release software update within weeks would address mistake present since original iphone new york times commented failure detect longstanding problem earlier astonishing consumer reports initially stated iphone 4 signal issues unique may serious continued mention signal loss problem faced entire smartphone industry problem apple made formal apology next day magazine altered stance encountering instances dropped calls magazine rejected apple explanation conducting tests controlled environment comparing results prior generations iphone sarcastically pointed using piece tape cover lower left antenna gap one way fix problem recommended consumers want iphone works well without masking-tape fix purchase iphone 3gs instead magazine also tested iphone 4 wearing bumper frame-like cover sold apple prevents direct contact antenna reporting resolve problem cnn repeated consumer reports statement small amount duct tape proven effective fix iphone 4 dropped call issue july 16 2010 press conference steve jobs announced apple would provide iphone 4 owners free case help solve antenna issue refund users already purchased bumper free case offer would valid september 30 2010 apple would re-evaluate situation get free case owners able apply via app installed phone found app store july 22 2010 september 30 2010 jobs also announced apple could produce enough bumpers owners phone would source supply offer range cases additionally jobs cited figures applecare showed 0.55 percent iphone 4 users complained company issue number phones returned apple 1.7 percent – 4.3 percentage points less number iphone 3gs models returned first month phone launch consumer reports noted solution permanent though good first step however jobs specify time line fixing problem offering free bumper temporary solution pc world decided remove iphone 4 top 10 cell phones chart reassign pending rating despite negative media attention regarding antenna issues 72 iphone 4 users say satisfied iphone 4 according august 2010 survey changewave research iphone 4 model continued sold unchanged september 2013 2011 two iphone 4 units equipped special application taken international space station aboard space shuttle sts-135 mission devices used various experiments utilizing sensors special app
[ 4609, 10755, 9732, 1549, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 1083, 8253, 576, 8783, 5201, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 4225, 10878, 8842, 5...
None
2,493
2
Windows_Imaging_Component:windows imaging component windows imaging component wic component object model based imaging codec framework introduced windows vista later available windows xp service pack 3 working processing digital images image metadata allows applications supporting framework automatically get support installed codecs graphics file formats similar directshow acm/vcm extended using image codecs support third-party graphics formats system-wide basis additionally windows presentation foundation applications also automatically support installed image codecs codecs raw image formats used high-end professional digital cameras also supported manner wic enables application developers perform image processing operations image format single set common apis without requiring prior knowledge specific image formats writing codec wic developers get system-wide support graphics file format applications use wic .net 3.x wpf windows imaging component provides extensible architecture image codecs pixel formats metadata automatic run-time discovery new formats supports reading writing arbitrary metadata image files ability preserve unrecognized metadata editing working images preserves high bit depth image data 32 bits per channel throughout revamped high dynamic range image processing pipeline built windows vista windows imaging component supports windows color system icc v4-compliant color management technology windows vista default windows vista ships jpeg tiff gif png bmp hd photo encoders decoders ico decoder additionally 2009 camera manufacturers 3rd-parties released wic codecs proprietary raw image formats enabling mac-like raw image support windows 7 vista july 2011 extended significantly microsoft providing separate codec pack current digital cameras progressive graphics file pgf viewer distributed wic codec wic supports exchangeable image file exif png textual metadata image file directory ifd iptc information interchange model iptc extensible metadata platform xmp formats addition wic includes extensible framework support third-party metadata implementations metadata format support per codec example native jpeg codec supports xmp native gif png codecs wic available windows xp service pack 2 stand-alone downloadable program built windows xp service pack 3 also available part .net framework 3.0 discontinued powertoy windows xp microsoft known photo info allows viewing editing image metadata windows explorer also uses wic starting windows vista windows explorer windows photo gallery based wic thus view organize images format wic codec installed office 2010 later versions core office apps word excel powerpoint outlook import image file formats supported wic starting windows 7 windows media center available windows 7 home premium wic-enabled also gdi+ graphic library built wic although gdi+ load 3rd-party external codecs windows 7 wic stack underwent major overhaul free-threaded built-in external codecs shipping windows free-threaded also requirement new codecs targeting windows 7 microsoft expression design import export capabilities entirely based wic expression media phase one media pro service pack 1 later also supports additional raw camera formats hd photo jpeg xr using wic 2018 third-party imaging applications image editors image organizers image viewers utilize wic fastpictureviewer simple standalone third-party image viewer supports standard image formats along hd photo raw camera formats nrw nef cr2 dng using wic experimental wic import plug-in adobe photoshop also found fastpictureviewer website another wic import plug-in gimp found gimp-forum.net
[ 10243, 10769, 9234, 1043, 1055, 2083, 8227, 1577, 4143, 9263, 11316, 1077, 8246, 1098, 4174, 4178, 9813, 603, 2145, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 3224, 4771, 7846, 10414, 8391, 214, 9943, 9434, 2783, 736, 432...
Test
2,494
4
The_Sleuth_Kit:sleuth kit sleuth kit tsk library collection unix- windows-based utilities facilitate forensic analysis computer systems written maintained primarily digital investigator brian carrier sleuth kit capable parsing ntfs fat/exfat ufs 1/2 ext2 ext3 ext4 hfs iso 9660 yaffs2 file systems either separately within disk images stored raw dd expert witness aff formats sleuth kit used examine microsoft windows apple macintosh osx many linux unix computers sleuth kit used sleuth kit free open-source suite provides large number specialized command-line based utilities based coroner toolkit official successor platform tools included sleuth kit include
[ 645, 2437, 8582, 5512, 6797, 2193, 5010, 4500, 2197, 5397, 2199, 8469, 3099, 7968, 6177, 5284, 5413, 5293, 11182, 7983, 10290, 4789, 823, 4408, 2231, 8635, 830, 7369, 6475, 10189, 4049, 11221, 4834, 5475, 7525, 9319, 8298, 5492, 246, 6263...
Test
2,495
2
Mirror_driver:mirror driver mirror driver display driver virtual device mirrors drawing operations one additional physical display devices video mirroring active time system draws primary video device location inside mirrored area copy draw operation executed mirrored video device real-time windows mirror drivers first introduced 1998 windows 2000 display driver model renamed later xpdm 2006 windows vista microsoft introduced new windows display driver model older drivers still supported vista since older model encompass support features first introduced vista newer features would necessarily disabled older driver active consequence mirror driver designed older model active windows remote assistance windows live mesh use vista disabled desktop window manager windows aero similar situation existed transition windows 7 windows 8 beginning ddk targeted windows 8 mirror drivers fulfill exacting specifications must support specific set functions windows installations come two mirror drivers preinstalled mnmdd used netmeeting rdpdd chained dd used terminal server/remotedesktop services third-party mirror drivers included screen readers jaws window-eyes freedombox monitoring software lanschool remote desktop software timbuktu logmein ultravnc tightvnc radmin remotepc
[ 6114, 4178, 6972 ]
None
2,496
7
SAP_Cloud_Platform:sap cloud platform sap cloud platform platform service developed sap se creating new applications extending existing applications secure cloud computing environment managed sap sap cloud platform integrates data business processes sap cloud platform open platform-as-a-service includes in-memory sap hana database management system connects premises cloud-based systems running sap third-party software relies open standards like java javascript node.js cloud foundry integration options sap cloud platform promoted build extend business applications rapid innovation cycles sap apple inc. partnered develop mobile applications ios using cloud-based software development kits sdks sap cloud platform sap cloud platform based open source technology developed supported partnership suse company also partnership cloud foundry beta offering sap cloud platform enables customers test give feedback functionalities coming cloud foundry initially unveiled sap netweaver cloud belonging sap hana cloud portfolio october 16 2012 cloud platform reintroduced new name sap hana cloud platform may 13 2013 foundation sap cloud products including sap businessobjects cloud adoption sap hana cloud platform increased steadily since platform launch 2012 sap claiming 4000 customers 500 partners adopting sap hana cloud platform february 27 2017 sap hana cloud platform renamed sap cloud platform mobile world congress sap cloud platform contains many services better overview assigned several categories following list contains categories defined sap applications available sap hana app center extend integrate applications customize existing applications extend mobile footprint mobile-first apps sap cloud platform organizations better engage customers empower employees developers build applications running cloud still access data premises clouds sap cloud platform developer edition offers users easy free way explore sap cloud platform capabilities addition 1gb shared sap hana sap cloud platform provides users
[ 6018, 1539, 8451, 3462, 6027, 4236, 10893, 526, 911, 272, 1935, 8592, 405, 2328, 4377, 8986, 10265, 5662, 11038, 5666, 6307, 9766, 39, 2217, 6444, 5677, 10413, 8495, 3121, 5681, 9906, 7352, 10681, 11070, 448, 4289, 11201, 8515, 10820, 326...
Test
2,497
5
Anti-replay:anti-replay anti-replay sub-protocol ipsec part internet engineering task force ietf main goal anti-replay avoid hackers injecting making changes packets travel source destination anti-replay protocol uses unidirectional security association order establish secure connection two nodes network secure connection established anti-replay protocol uses packet sequence numbers defeat replay attacks follows source sends message adds sequence number packet sequence number starts 0 incremented 1 subsequent packet destination maintains 'sliding window record sequence numbers validated received packets rejects packets sequence number lower lowest sliding window i.e old already appears sliding window i.e duplicates/replays accepted packets validated update sliding window displacing lowest sequence number window already full see also replay attack
[ 3742, 8694 ]
Test
2,498
3
Nemesis_3:_The_Eve_of_Destruction:nemesis 3 eve destruction four distinct classes vixen chosen first one resembles original vic viper second one twisted version vic viper featuring new photon missile third one like metalion nemesis 2 featuring napalm missile extended fire blaster fourth one like sabel tiger salamander featuring 2-way missile approach ripple laser four classes may choose classic shield force field takes less hits expire protects direction also possible choose behavior option original shadow movement fixed rolling like option warrior nemesis 2 game retains several new weapons introduced nemesis 2 like laser fire blaster vector laser well salamander weapons like meteor laser screw laser game nemesis series visibly keeps track number speed boosts order upgrade ship weapons secret spots must found like secret stages nemesis 2 predictions salamander
[ 9005, 9006, 10931, 4405, 9247 ]
None
2,499
9
Persistent_programming_language:persistent programming language programming languages natively seamlessly allow objects continue existing program closed called persistent programming languages jade one language persistent programming language programming language extended constructs handle persistent data distinguished embedded sql least two ways persistent programming language embedded sql using embedded sql programmer responsible writing explicit code fetch data memory store data back database persistent programming language programmer manipulate persistent data without write code explicitly drawbacks persistent programming languages include
[ 9467, 8262 ]
None
2,500
3
NLX_(motherboard_form_factor):nlx motherboard form factor nlx new low profile extended form factor proposed intel developed jointly ibm dec vendors low profile low cost mass-marketed retail pcs release 1.2 finalized march 1997 release 1.8 finalized april 1999 nlx similar overall design lpx including riser card low-profile slimline case modernized updated allow support latest technologies keeping costs fixing main problems lpx specified motherboards size officially nlx form factor designed use atx power supplies featured soft power function however nlx cases instead used smaller sfx form factor proprietary form factors 20-pin connector many slimline systems formerly designed fit lpx form factor modified fit nlx nlx true standard unlike lpx making interchangeability components easier older form factor ibm gateway nec produced fair number nlx computers late 1990s primarily socket 370 pentium ii-iii celeron nlx never enjoyed widespread acceptance lpx importantly one largest pc manufacturers dell decided using nlx created proprietary motherboards use slimline systems although many computers motherboards still available secondhand new production essentially ceased slimline small form factor market nlx superseded micro-atx flexatx mini-itx form factors
[ 10337, 10468, 455, 7113, 9307, 10095, 2161, 2803, 10715, 1400, 8730, 3323, 3037 ]
Test
2,501
8
Business_Process_Execution_Language:business process execution language web services business process execution language ws-bpel commonly known bpel business process execution language oasis standard executable language specifying actions within business processes web services processes bpel export import information using web service interfaces exclusively one describe web-service interactions two ways executable business processes abstract business processes ws-bpel aims model behavior processes via language specification executable abstract business processes extends web services interaction model enables support business transactions also defines interoperable integration model facilitate expansion automated process integration within businesses development came notion programming large programming small required different types languages serialized xml aims enable programming large concepts programming large programming small distinguish two aspects writing type long-running asynchronous processes one typically sees business processes origins ws-bpel go back web services flow language wsfl xlang 2001 ibm microsoft defined fairly similar programming large languages wsfl web services flow language xlang respectively microsoft even went ahead created scripting variant called xlang/s would later serve basis orchestrations services inside biztalk server specifically documented language proprietary fully documented advent popularity bpml growing success bpmi.org open bpms movement led jboss intalio inc. ibm microsoft decided combine languages new language bpel4ws april 2003 bea systems ibm microsoft sap siebel systems submitted bpel4ws 1.1 oasis standardization via web services bpel technical committee although bpel4ws appeared 1.0 1.1 version oasis ws-bpel technical committee voted 14 september 2004 name spec ws-bpel 2.0 change name aligned bpel web service standard naming conventions start ws- similar ws-security took account significant enhancements made bpel4ws 1.1 ws-bpel 2.0 discussing specific version moniker bpel commonly used june 2007 active endpoints adobe systems bea ibm oracle sap published bpel4people ws-humantask specifications describe human interaction bpel processes implemented ten original design goals associated bpel bpel orchestration language choreography language primary difference orchestration choreography executability control orchestration specifies executable process involves message exchanges systems message exchange sequences controlled orchestration designer choreography specifies protocol peer-to-peer interactions defining e.g. legal sequences messages exchanged purpose guaranteeing interoperability protocol directly executable allows many different realizations processes comply choreography realized writing orchestration e.g. form bpel process peer involved orchestration choreography distinctions based analogies orchestration refers central control conductor behavior distributed system orchestra consisting many players choreography refers distributed system dancing team operates according rules choreography without centralized control bpel focus modern business processes plus histories wsfl xlang led bpel adopt web services external communication mechanism thus bpel messaging facilities depend use web services description language wsdl 1.1 describe outgoing incoming messages addition providing facilities enable sending receiving messages bpel programming language also supports standard graphical notation ws-bpel oasis technical committee decided scope vendors invented notations notations take advantage fact constructs bpel block-structured e.g. sequence pick scope etcetera feature enables direct visual representation bpel process descriptions form structograms style reminiscent nassi–shneiderman diagram others proposed use substantially different business process modeling language namely business process model notation bpmn graphical front-end capture bpel process descriptions illustration feasibility approach bpmn specification includes informal partial mapping bpmn bpel 1.1 detailed mapping bpmn bpel implemented number tools including open-source tool known bpmn2bpel however development tools exposed fundamental differences bpmn bpel make difficult cases impossible generate human-readable bpel code bpmn models even difficult problem bpmn-to-bpel round-trip engineering generating bpel code bpmn diagrams maintaining original bpmn model generated bpel code synchronized sense modification one propagated bpel control structures 'if-then-elseif-else 'while well variable manipulation facilities depend use 'programming small languages provide logic bpel implementations must support xpath 1.0 default language design bpel envisages extensibility systems builders use languages well bpelj effort related jsr 207 may enable java function 'programming small language within bpel despite wide acceptance web services distributed business applications absence human interactions significant gap many real-world business processes fill gap bpel4people extended bpel orchestration web services alone orchestration role-based human activities well within context business process bpel4people extending bpel additional independent syntax semantic ws-humantask specification introduces definition human tasks notifications including properties behavior set operations used manipulate human tasks coordination protocol introduced order control autonomy life cycle service-enabled human tasks interoperable manner bpel4people specification introduces ws-bpel extension address human interactions ws-bpel first-class citizen defines new type basic activity uses human tasks implementation allows specifying tasks local process use tasks defined outside process definition extension based ws-humantask specification version 2.0 introduced changes new features
[ 2432, 8070, 5768, 4107, 8203, 10510, 1041, 7320, 2585, 6811, 9629, 7198, 5283, 10020, 425, 8626, 8627, 10553, 8766, 6079, 1347, 5059, 7753, 11339, 10829, 2901, 5210, 1756, 2013, 222, 1250, 4979, 6007, 4088, 3323, 10236, 3966 ]
Test
2,502
2
IPhone_(1st_generation):iphone 1st generation iphone colloquially known iphone 2g iphone 1 2008 differentiate later models first smartphone designed marketed apple inc. years rumors speculation officially announced january 9 2007 later released united states june 29 2007 featured quad-band gsm cellular connectivity gprs edge support data transfer development iphone dated back 2005 former apple ceo steve jobs conceived idea design expanded upon next 2 years complete secrecy announced q1 2007 although several aspects iphone considered obsolete current standards device seen archetype current cell phones eliminating physical hardware buttons stylus favor touch-based user interface successor iphone 3g announced june 2008 2005 apple ceo steve jobs conceived idea using touchscreen interact computer way could directly type onto display instead requiring stylus common existing technology time decided device would require triple layered capacitive multi-touch touch screen new advanced technology time helped removing physical keyboard mouse tablet computer jobs recruited group apple engineers investigate idea side project jobs reviewed prototype user interface saw potential developing concept mobile phone whole effort called project purple 2 began 2005 apple created device secretive unprecedented collaboration cingular wireless mobility development cost collaboration estimated 150 million thirty-month period apple rejected design committee approach yielded motorola rokr e1 largely unsuccessful collaboration motorola instead cingular wireless gave apple liberty develop iphone hardware software in-house original iphone introduced steve jobs january 9 2007 keynote address macworld conference expo held moscone west san francisco california address jobs said day looking forward two half years today apple going reinvent phone jobs introduced iphone combination three devices widescreen ipod touch controls revolutionary mobile phone breakthrough internet communicator six weeks iphone released plastic screen replaced glass one jobs upset screen prototype carrying pocket scratched keys quick switch led bidding process manufacturing contractor foxconn opened new wing shenzhen factory complex specifically bid february 2007 lg electronics accused apple copying lg prada phone similar hardware functionality announced several weeks iphone iphone released united states june 29 2007 price 499 4 gb model 599 8 gb model requiring 2-year contract thousands people reported waited outside apple retail stores days device launch many stores reported stock shortages within hour availability avoid repeating problems playstation 3 launch caused burglaries even shooting off-duty police officers hired guard stores overnight later made available united kingdom france germany portugal republic ireland austria november 2007 six ten americans surveyed said knew iphone coming release iphone main competitors consumer business markets considered lg prada lg viewty samsung ultra smart f700 nokia n95 nokia e61i palm treo 750 palm centro htc touch sony ericsson w960 blackberry ipod touch touchscreen device media internet abilities interface iphone without ability connect cellular network phone functions internet access released september 5 2007 time apple significantly dropped price 8 gb model 599 399 still requiring 2-year contract discontinuing 4 gb model apple sold one millionth iphone five days later 74 days release receiving hundreds emails ... upset price drop apple gave store credit early adopters 16 gb model released february 5 2008 499 original launch price 4 gb model apple released sdk march 6 2008 allowing developers create apps would available starting iphone os version 2.0 free upgrade iphone users june 9 apple announced iphone 3g began shipping july 11 original iphone discontinued july 15 total sales volume came 6,124,000 units release iphone marketed running os x name operating system revealed iphone os release iphone sdk original iphone supported three major versions operating system discontinued iphone os 1 2 3 however full iphone os 3 feature set supported last update original iphone received iphone os 3.1.3 original operating system original iphone iphone os 1 marketed os x included visual voicemail multi-touch gestures html email safari web browser threaded text messaging youtube however many features like mms apps copy paste supported release leading hackers jailbreaking phones add features official software updates slowly added features iphone os 2 released july 11 2008 time release iphone 3g introduced third-party applications microsoft exchange support push e-mail enhancements iphone os 3 released june 17 2009 introduced copy paste functionality spotlight search home screen new features youtube app iphone os 3 available original iphone well iphone 3g however features iphone os 3 supported original iphone iphone os 3.1.3 last version iphone os ios released original iphone four writers given review models original iphone david pogue new york times walt mossberg wall street journal steven levy newsweek ed baig usa today new york times wall street journal published positive cautious reviews iphone primary criticisms relatively slow speed 2.5g edge network phone inability connect using 3g services wall street journal technology columnist walt mossberg concluded despite flaws feature omissions iphone balance beautiful breakthrough handheld computer time magazine named invention year 2007 mobile gazette reported whilst iphone many impressive points equally many bad ones noting lack 3g mms third-party applications weak camera without autofocus flash
[ 4609, 10755, 9732, 1549, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 1083, 8253, 576, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 8842, 5784, 1177, 4...
None
2,503
3
KOMDIV-32:komdiv-32 komdiv-32 family 32-bit microprocessors developed manufactured scientific research institute system development niisi russian academy sciences manufacturing plant niisi located dubna grounds kurchatov institute komdiv-32 processors intended primarily spacecraft applications many radiation hardened rad-hard microprocessors compatible mips r3000 integrated mips r3010 compatible floating-point unit
[ 9857, 6659, 9861, 7687, 1425, 6033, 4386, 426, 6957, 8625, 1461, 2490, 11580, 6207, 5825, 7234, 2523, 9309, 5348, 6250, 5358, 1776, 499, 1399 ]
Test
2,504
7
Online_SAS:online sas online sas also known online.net french cloud computing web hosting company founded xavier niel 1999 100 subsidiary iliad group company provides physical dedicated servers cloud computing architectures dedibox scaleway brands domain registration services bookmyname brand colocation services datacenters brand iliad datacenter company second player france gb/s internet traffic 1999 online started activities web hosting domain name registration services august 2002 domain name registrar bookmyname bought iliad concurrent ldcom may 2006 rental dedicated servers dedibox brand launched december 2008 iliad bought alice adsl also took construction operation datacenters launched 1999 isdnet bought cable wireless january 2000 acquired tiscali france june 2003 finally renamed iliad datacenter april 2010 online merges dedibox another subsidiary iliad bringing together different hosting activities single brand 2012 company opened third datacenter 11800 m² vitry-sur-seine 11 months construction works site received first tier-iii certification france uptime institute january 2014 since 2012 company publishes real time pue datacenters pue.online.net effort transparency 2013 online launched labs.online.net preview infrastructure service offer based dedicated hardware without virtualization based arm cpus hardware made factory near laval france april 2015 service left beta status renamed scaleway popularity platform grows online added servers x86_64 based cpus march 2016 online owns operates several data centers located île-de-france region past company operated also since august 2013 network online as12876 online s.a.s independent one free case allowed company move away closed interconnection policy internet service provider early 2015 company announced exceeded gb/s immediate internet traffic may 2016 online shows total gb/s capacity links weathermap present following internet exchange points france-ix equinix-ix ams-ix et neutral internet exchange
[ 2720, 225, 1410, 4194, 8865, 7078, 2795, 5356, 4429, 9964, 1650 ]
Train
2,505
9
Curry_(programming_language):curry programming language curry experimental functional logic programming language based haskell language merges elements functional logic programming including constraint programming integration nearly superset haskell lacking support mostly overloading using type classes implementations provide anyway language extension münster curry compiler functional program set functions defined equations rules functional computation consists replacing subexpressions equal regards function definitions subexpressions replacements reductions possible value normal form obtained instance consider function double defined expression “ ” replaced latter replaced interpret operator “ ” defined infinite set equations e.g. etc similar way one evaluate nested expressions subexpressions replaced quoted also another order evaluation replace arguments operators right left case derivations lead result property known confluence follows fundamental property pure functional languages termed referential transparency value computed result depend order time evaluation due absence side effects simplifies reasoning maintenance pure functional programs many functional languages like haskell curry supports definition algebraic data types enumerating constructors instance type boolean values consists constructors declared follows functions booleans defined pattern matching i.e. providing several equations different argument values principle replacing equals equals still valid provided actual arguments required form e.g complex data structures obtained recursive data types instance list elements type elements arbitrary denoted type variable either empty list “ ” non-empty list “ ” consisting first element list type “ ” usually written finite lists x1x2 ... xn written x1x2 ... xn define operations recursive types inductive definitions pattern matching supports convenient separation different cases instance concatenation operation “ ” polymorphic lists defined follows optional type declaration first line specifies “ ” takes two lists input produces output list list elements unspecified type beyond application various programming tasks operation “ ” also useful specify behavior functions lists instance behavior function last yields last element list specified follows lists xs elements e xs e ∃ysyse xs based specification one define function satisfies specification employing logic programming features similarly logic languages functional logic languages provide search solutions existentially quantified variables contrast pure logic languages support equation solving nested functional expressions equation like yse solved instantiating ys list e value curry one define operation last follows symbol “ ” used equational constraints order provide syntactic distinction defining equations similarly extra variables i.e. variables occurring left-hand side defining equation explicitly declared “ ” order provide opportunities detect bugs caused typos conditional equation form l c r applicable reduction condition c solved contrast purely functional languages conditions evaluated boolean value functional logic languages support solving conditions guessing values unknowns condition narrowing discussed next section used solve kind conditions narrowing mechanism whereby variable bound value selected among alternatives imposed constraints possible value tried order remainder program invoked case determine validity binding narrowing extension logic programming performs similar search actually generate values part search rather limited testing narrowing useful allows function treated relation value computed directions curry examples previous section illustrate noted previous section narrowing thought reduction program term graph often many different ways strategies reduce given term graph antoy et al proved 1990s particular narrowing strategy needed narrowing optimal sense number reductions get normal form corresponding solution minimal among sound complete strategies needed narrowing corresponds lazy strategy contrast sld-resolution strategy prolog rule defining shown expresses fact actual argument must match result narrowing expression curry express property also following concise way haskell allow declaration since pattern left-hand side contains defined function pattern also called functional pattern functional patterns enabled combined functional logic features curry support concise definitions tasks requiring deep pattern matching hierarchical data structures since curry able solve equations containing function calls unknown values execution mechanism based non-deterministic computations similarly logic programming mechanism supports also definition non-deterministic operations i.e. operations delivers one result given input archetype non-deterministic operations predefined infix operation called choice operator returns one arguments operator defined following rules thus evaluation expression returns well computing non-deterministic operations computing free variables narrowing expressive power rules defining show important feature curry rules tried order evaluate operation hence one define operation insert element list indeterminate position operation defined returns permutation given input list due absence side effects functional logic program executed different strategies evaluate expressions curry uses variant needed narrowing strategy combines lazy evaluation non-deterministic search strategies contrast prolog uses backtracking search solutions curry fix particular search strategy hence implementations curry like kics2 user easily select search strategy like depth-first search backtracking breadth-first search iterative deepening parallel search
[ 10011, 9345, 10819, 3876, 8421, 8775, 6536, 9224, 11625, 8973, 7983, 5651, 11574, 219, 2045 ]
Test
2,506
3
List_of_former_IA-32_compatible_processor_manufacturers:list former ia-32 compatible processor manufacturers 32-bit intel architecture became dominant computing platform 1980s 1990s multiple companies tried build microprocessors compatible intel instruction set architecture companies successful mainstream computing market far amd market presence computing market couple product generations cyrix successful 386 486 generations products well pentium introduced list former ia-32 compatible microprocessor vendors
[ 7008, 8355, 5380, 3883, 9932, 11405, 3123, 499, 3323 ]
Test
2,507
2
Commercial_Operating_System_(COS):commercial operating system cos cos-3xx commercial operating system name used digital equipment corporation family operating systems supported use dibol programming language combining features basic fortran cobol cos also supported rpg report program generator commercial operating system implemented run hardware pdp-8 pdp-11 family cos-310 developed pdp-8 provide operating environment dibol cos-310 system purchased package included desk vt-52 vdt video display tube pair eight inch floppy drives optionally could purchase one 2.5 mb hard drives removable media cos-310 one operating systems available decmate ii unlike tss-8 user 4k virtual machine cos user virtual 32k cos-350 developed support pdp-11 port dibol focus vendors turnkey software packages pre-cos-350 pdp 11/05 single-user batch-oriented implementation released multi-user pdp 11/10-based cos came 4 years later much powerful pdp-11/34 added significant configuration flexibility expansion capability
[ 3650, 7076, 1253, 10475, 1804, 8876, 7983, 6448, 273, 6837, 8732, 10590, 9759 ]
Test
2,508
4
Zombie_(computing):zombie computing computing zombie computer connected internet compromised hacker computer virus trojan horse program used perform malicious tasks one sort another remote direction botnets zombie computers often used spread e-mail spam launch denial-of-service attacks dos attacks owners zombie computers unaware system used way owner tends unaware computers metaphorically compared fictional zombies coordinated ddos attack multiple botnet machines also resembles zombie horde attack depicted fictional zombie films zombie computers used extensively send e-mail spam 2005 estimated 50–80 spam worldwide sent zombie computers allows spammers avoid detection presumably reduces bandwidth costs since owners zombies pay bandwidth spam also greatly furthers spread trojan horses trojans self-replicating rely movement e-mails spam grow whereas worms spread means similar reasons zombies also used commit click fraud sites displaying pay-per-click advertising others host phishing money mule recruiting websites zombies used conduct distributed denial-of-service ddos attacks term refers orchestrated flooding target websites large numbers computers large number internet users making simultaneous requests website server intended result crashing prevention legitimate users accessing site variant type flooding known distributed degradation-of-service committed pulsing zombies distributed degradation-of-service moderated periodical flooding websites done intent slowing rather crashing victim site effectiveness tactic springs fact intense flooding quickly detected remedied pulsing zombie attacks resulting slow-down website access go unnoticed months even years notable incidents distributed denial- degradation-of-service attacks past include attack upon spews service 2003 one blue frog service 2006 2000 several prominent web sites yahoo ebay etc clogged standstill distributed denial service attack mounted ‘ mafiaboy ’ canadian teenager attack grc.com discussed length perpetrator 13-year-old probably sardis mississippi identified gibson research web site steve gibson disassembled 'bot zombie used attack traced distributor account research describes operation 'bot'-controlling irc channel beginning july 2009 similar botnet capabilities also emerged growing smartphone market examples include july 2009 wild release sexy space text message worm world first botnet capable sms worm targeted symbian operating system nokia smartphones later month researcher charlie miller revealed proof concept text message worm iphone black hat briefings also july united arab emirates consumers targeted etisalat blackberry spyware program 2010s security community divided real world potential mobile botnets august 2009 interview new york times cyber security consultant michael gregg summarized issue way point smart phones desktops '80s
[ 3072, 9732, 10245, 10756, 9227, 9233, 9242, 9761, 9256, 9771, 10297, 1083, 3643, 7739, 9791, 1088, 2114, 4165, 8789, 107, 10875, 5245, 2175, 6786, 5764, 9356, 1681, 4245, 10392, 1690, 5281, 2213, 1200, 8387, 10952, 4314, 6368, 2275, 10477, ...
Validation
2,509
5
Internet_Group_Management_Protocol:internet group management protocol internet group management protocol igmp communications protocol used hosts adjacent routers ipv4 networks establish multicast group memberships igmp integral part ip multicast igmp used one-to-many networking applications online streaming video gaming allows efficient use resources supporting types applications igmp used ipv4 networks multicast management ipv6 networks handled multicast listener discovery mld part icmpv6 contrast igmp bare ip encapsulation network designed deliver multicast service using igmp might use basic architecture igmp operates host local multicast router switches featuring igmp snooping derive useful information observing igmp transactions protocol independent multicast pim used local remote multicast routers direct multicast traffic hosts sending multicasts hosts registered igmp receive igmp operates network layer network management protocols like icmp igmp protocol implemented particular host within router host requests membership group local router router listens requests periodically sends subscription queries single router per subnet elected perform querying function multilayer switches include igmp querier capability allow igmp snooping features work absence ip multicast capability larger network igmp vulnerable attacks firewalls commonly allow user disable needed three versions igmp igmpv1 defined igmpv2 defined igmpv3 initially defined updated defines igmpv3 mldv2 igmpv2 improves igmpv1 adding ability host signal desire leave multicast group igmpv3 improves igmpv2 supporting source-specific multicast introduces membership report aggregation versions backwards compatible router supporting igmpv3 support clients running igmpv1 igmpv2 igmpv3 igmpv1 uses query-response model queries sent 224.0.0.1 membership reports sent group multicast address igmpv2 accelerates process leaving group adjusts timeouts leave-group messages sent 224.0.0.2 group-specific query introduced group-specific queries sent group multicast address means routers select igmp querier network introduced igmpv3 introduces source-specific multicast capability membership reports sent 224.0.0.22 several types igmp messages igmp messages carried bare ip packets ip protocol number 2 similar internet control message protocol transport layer used igmp messaging message sent using following ip destination addresses freebsd linux windows operating systems support igmp host side
[ 10242, 1030, 9225, 8211, 5653, 6681, 6682, 10270, 10271, 6689, 9251, 2085, 7208, 7214, 8238, 562, 1586, 9269, 11321, 3133, 5181, 6723, 11332, 8265, 8266, 4687, 6735, 10341, 10344, 3695, 4723, 2679, 4729, 5251, 9860, 649, 9868, 6797, 3218, ...
None
2,510
3
Thunder_Blade:thunder blade game released standard stand-up arcade cabinet introduced use force feedback joystick vibrates gameplay sit-down unit also available replacing force feedback seat moves tandem joystick versions game later released master system amiga amstrad cpc atari st commodore 64 dos msx turbografx-16 sharp x68000 zx spectrum nintendo 3ds remake released 3d classic japan august 20 2014 north america europe may 14 2015 australia july 2 2015 follow-up super thunder blade released exclusively sega mega drive/genesis game plot setting resembles 1983 film 1984 tv series blue thunder player controls helicopter gunship using chain gun missiles destroy enemy tanks helicopters etc. save home country levels top-down third-person perspective view boss levels top-down view game well received sinclair saying thunder blade probably game took money arcades summer probably one eagerly awaited coin-op conversions game earned golden joystick console award 1988-1989
[ 9166, 9006 ]
None
2,511
7
TerraNet_AB:terranet ab terranet ab company delivers mobile telephony data services via peer-to-peer mobile mesh network handsets light infrastructure headquartered sweden currently led ceo pär-olof johannesson system uses unit within range additional network node allowing voice data transmission via radio frequency rather conventional cell sites terranet concept originally developed way bring mobile coverage under-served geographies populations technology much broader market terranet phone switched begins look phones within effective range finds connects extends radio network actual number dialled handset uses checks see person called within range handsets network call goes detractors questioned terranet lack clear business model though device manufacturers appear interested efforts noted thought leaders voice ip alexander straub truphone identified mesh networks next big thing telecoms terranet ab founded 2004 inventor technology anders carlius serial entrepreneur lund skåne county carlius came background chip manufacturing switchcore also worked web portal operator spray network served first ceo 2010 since inception terranet headquartered lund ideon science park best known home ericsson radio systems carlius says came idea travelling safari east africa wife emma first extensive pilot project carried autumn 2005 farming co-operative botswana trials included agreement indian operator bharat sanchar nigam test 50 handsets late 2012 number pilots south america year development engineer conny said main prerogative miniaturise terranet credit card-sized circuit could installed mobile handset company prestigious red herring magazine award april 2008 carlius received number honours work promoting entrepreneurship sweden including leadership awards 2005 rapidus 2008 jönköping international business school terranet supported private investors july 2013 emerged serial entrepreneur dan olofsson bought 12.5 stake ceo pär-olof johannesson acknowledged oloffson investment means lot company well-known operator heavy industrial background knows industry inside
[ 8640, 10021 ]
Test
2,512
1
Temporal_database:temporal database temporal database stores data relating time instances offers temporal data types stores information relating past present future time temporal databases could uni-temporal bi-temporal tri-temporal specifically temporal aspects usually include valid time transaction time decision time uni-temporal database one axis time either validity range system time range bi-temporal database two axes time tri-temporal database three axes time approach introduces additional complexities temporal databases contrast current databases confused currently available databases store facts believed true current time temporal databases support managing accessing temporal data providing one following features development sql attendant use real-life applications database users realized added date columns key fields issues arose example table primary key attributes adding date primary key track historical changes lead creation rows intended deletes must also handled differently rows tracked way 1992 issue recognized standard database theory yet resolving issue neither then-newly formalized sql-92 standard richard snodgrass proposed 1992 temporal extensions sql developed temporal database community response proposal committee formed design extensions 1992 edition sql standard ansi x3.135.-1992 iso/iec 9075:1992 extensions known tsql2 developed 1993 committee late 1993 snodgrass presented work group responsible american national standard database language sql ansi technical committee x3h2 known ncits h2 preliminary language specification appeared march 1994 acm sigmod record based responses specification changes made language definitive version tsql2 language specification published september 1994 attempt made incorporate parts tsql2 new sql standard called sql3 parts tsql2 included new substandard sql3 iso/iec 9075-7 called sql/temporal tsql2 approach heavily criticized chris date hugh darwen iso project responsible temporal support canceled near end 2001 december 2011 iso/iec 9075 database language part 2 sql/foundation included clauses table definitions define application-time period tables valid time tables system-versioned tables transaction time tables system-versioned application-time period tables bitemporal tables substantive difference tsql2 proposal adopted sql:2011 hidden columns sql:2011 treatment new data type intervals instead two date timestamp columns bound together using codice_1 declaration another difference replacement controversial prefix statement modifiers tsql2 set temporal predicates features standard related temporal databases automatic time period splitting temporal primary keys temporal referential integrity temporal predicates allen interval algebra time-sliced sequenced queries illustration consider following short biography fictional man john doe store life john doe current non-temporal database use table person name address order simplify name defined primary key person john father officially reported birth april 4 1975 date smallville official inserted following entry database codice_2 note date stored database graduation john moves forgets register new address john entry database changed december 27 1994 finally reports bigtown official updates address database person table contains codice_3 note information john living smallville overwritten longer possible retrieve information database official accessing database december 28 1994 would told john lives bigtown technically database administrator ran query codice_4 december 26 1994 result would codice_5 running query 2 days later would result codice_6 death database would state lived bigtown april 1 2001 coroner deletes john doe entry database running query would return result valid time time fact true real world valid time period may past span current time occur future example record valid time person table two fields added valid-from valid-to specify period person address valid real world april 4 1975 john father registered son birth official inserts new entry database stating john lives smallville april 3 note although data inserted 4th database states information valid since 3rd official yet know john move another place valid-to field set infinity ∞ entry database december 27 1994 john reports new address bigtown living since august 26 1994 new database entry made record fact original entry codice_7 deleted valid-to attribute updated reflect known john stopped living smallville august 26 1994 database contains two entries john doe john dies current entry database updated stating john live bigtown longer database looks like transaction time records time period database entry accepted correct enables queries show state database given time transaction time periods occur past current time transaction time table records never deleted new records inserted existing ones updated setting transaction end time show longer current enable transaction time example two fields added person table transaction-from transaction-to transaction-from time transaction made transaction-to time transaction superseded may infinity yet superseded makes table bitemporal table happens person address stored database incorrect suppose official accidentally entered wrong address date suppose person lied address reason upon discovery error officials update database correct information recorded example 1-jun-1995 3-sep-2000 john doe moved beachy avoid paying beachy exorbitant residence tax never reported authorities later tax investigation discovered 2-feb-2001 fact beachy dates record fact existing entry john living bigtown must split two separate records new record inserted recording residence beachy database would appear follows however leaves record database ever claimed lived bigtown 1-jun-1995 3-sep-2000 might important know auditing reasons use evidence official tax investigation transaction time allows capturing changing knowledge database since entries never directly modified deleted instead entry records entered superseded logically deleted database contents look like database records happened real world also officially recorded different times bitemporal model contains valid transaction time provides historical rollback information historical information e.g john live 1992 provided valid time rollback e.g 1992 database believe john lived provided transaction time answers example questions may database may altered since 1992 causing queries produce different results valid time transaction time single fact example consider temporal database storing data 18th century valid time facts somewhere 1701 1800 transaction time would show facts inserted database example january 21 1998 challenging issue support temporal queries transaction time database evolving schema order achieve perfect archival quality key importance store data schema version first appeared however even simple temporal query rewriting history attribute value would required manually rewritten schema versions potentially hundreds case mediawiki process would particularly taxing users proposed solution provide automatic query rewriting although part sql similar standards approaches minimize complexities schema evolution following implementations provide temporal features relational database management system rdbms non-relational nosql database management systems provide temporal features including following sometimes slowly changing dimension used method
[ 2688, 4736, 4738, 5632, 10628, 8201, 10389, 11030, 4376, 5151, 9631, 1697, 5794, 7080, 10413, 9397, 3001, 4155, 7868, 9147, 11324, 2369, 11457, 6085, 2901, 9557, 1751, 7767, 11098, 8539, 7650, 8291, 9828, 10340, 10471, 8683, 6131, 1146, 639...
Test
2,513
9
Zathura_(document_viewer):zathura document viewer zathura free plugin-based document viewer plugins available pdf via poppler mupdf postscript djvu epub written lightweight controlled vi-like keybindings zathura customizability makes well-liked many linux users zathura official packages available arch linux debian fedora gentoo openbsd opensuse source mage gnu/linux ubuntu unofficial macos package provided macports zathura named 2005 film development zathura began 12 august 2009 18 september 2009 version 0.0.1 announced arch linux community zathura official arch linux package since april 2010 year end july imported source mage test grimoire official debian package since least 2011 part debian squeeze zathura automatically reloads documents working compiled documents written latex zathura refresh output whenever compilation takes place zathura option enabling inverse search using synctex zathura adjust document best-fit fit width rotate pages view pages side-by-side fullscreen mode pages also recolored black background white foreground zathura search text copy text primary x selection supports bookmarks open encrypted files behavior appearance zathura customized using configuration file zathura ability execute external shell commands opened tabs using
[ 2181, 2886, 9418, 7435, 1295, 7983, 3828, 5397, 8628, 2045, 1822 ]
Test
2,514
3
Transactional_Synchronization_Extensions:transactional synchronization extensions transactional synchronization extensions tsx-ni extension x86 instruction set architecture isa adds hardware transactional memory support speeding execution multi-threaded software lock elision according different benchmarks tsx provide around 40 faster applications execution specific workloads 4–5 times database transactions per second tps tsx documented intel february 2012 debuted june 2013 selected intel microprocessors based haswell microarchitecture haswell processors 45xx well r-series k-series unlocked multiplier skus support tsx august 2014 intel announced bug tsx implementation current steppings haswell haswell-e haswell-ep early broadwell cpus resulted disabling tsx feature affected cpus via microcode update 2016 side-channel timing attack found abusing way tsx handles transactional faults i.e page faults order break kaslr major operating systems support tsx emulation provided part intel software development emulator also experimental support tsx emulation qemu fork tsx provides two software interfaces designating code regions transactional execution hardware lock elision hle instruction prefix-based interface designed backward compatible processors without tsx support restricted transactional memory rtm new instruction set interface provides greater flexibility programmers tsx enables optimistic execution transactional code regions hardware monitors multiple threads conflicting memory accesses aborting rolling back transactions successfully completed mechanisms provided software detect handle failed transactions words lock elision transactional execution uses memory transactions fast path possible slow fallback path still normal lock hardware lock elision hle adds two new instruction prefixes codice_1 codice_2 two prefixes reuse opcodes existing codice_3 codice_4 prefixes codice_5 codice_6 processors support tsx codice_3 codice_4 prefixes ignored instructions codice_1 codice_2 valid thus enabling backward compatibility codice_1 prefix hint used following instructions explicit codice_12 prefix codice_13 codice_14 codice_15 codice_16 codice_17 codice_18 codice_19 codice_20 codice_21 codice_22 codice_23 codice_24 codice_25 codice_26 codice_27 codice_28 codice_29 codice_30 codice_30 instruction used without codice_12 prefix well codice_2 prefix hint used instructions listed codice_34 codice_35 instructions hle allows optimistic execution critical section eliding write lock lock appears free threads failed transaction results execution restarting codice_1-prefixed instruction treating instruction codice_1 prefix present restricted transactional memory rtm alternative implementation hle gives programmer flexibility specify fallback code path executed transaction successfully executed rtm adds three new instructions codice_38 codice_39 codice_40 codice_38 codice_39 instructions mark start end transactional code region codice_40 instruction explicitly aborts transaction transaction failure redirects processor fallback code path specified codice_38 instruction abort status returned codice_45 register tsx provides new codice_46 instruction returns whether processor executing transactional region intel tsx specification describes transactional memory exposed programmers withholds details actual transactional memory implementation intel specifies developer optimization manuals haswell maintains read-sets write-sets granularity cache line tracking addresses l1 data cache processor intel also states data conflicts detected cache coherence protocol haswell l1 data cache associativity eight means implementation transactional execution writes nine distinct locations mapping cache set abort however due micro-architectural implementations mean fewer accesses set guaranteed never abort additionally cpu configurations hyper-threading technology l1 cache shared two threads core operations sibling logical processor core cause evictions independent research points haswell ’ transactional memory likely deferred update system using per-core caches transactional data register checkpoints words haswell likely use cache-based transactional memory system much less risky implementation choice hand intel skylake later may combine cache-based approach memory ordering buffer mob purpose possibly also providing multi-versioned transactional memory amenable speculative multithreading august 2014 intel announced bug exists tsx implementation haswell haswell-e haswell-ep early broadwell cpus resulted disabling tsx feature affected cpus via microcode update bug fixed f-0 steppings vpro-enabled core m-5y70 broadwell cpu november 2014 bug found reported diploma thesis school electrical computer engineering national technical university athens
[ 2821, 7173, 4491, 4108, 4237, 6924, 5649, 7313, 6038, 7446, 9111, 9369, 9500, 3615, 5883, 4389, 2088, 9391, 8120, 8506, 2237, 1085, 8125, 8126, 833, 7234, 9541, 3142, 1998, 5326, 977, 3537, 8273, 2516, 5844, 9428, 7387, 4444, 8795, 3294, ...
Train
2,515
4
Novabackup:novabackup novabackup developed novastor data protection software enables smb users backup recover mission critical data across hybrid physical virtual machines novabackup designed work microsoft windows operating systems offering local online file backups disaster recovery image backups novabackup uses proprietary file format uses .nbd file extension backwards compatible meaning backups older versions novabackup version 8 restored latest version software version 7 8 backups still restored file extensions need updated .nbd multiple novabackup editions available versions built smb users support backups pcs laptops servers including support exchange/sql virtual machines novabackup software includes novacare premium support email/phone-in technical support maintenance upgrades novastor partnered buffalo offering novabackup software included linkstation family consumer nas solutions terastation family business-class nas solutions release change log novabackup starting version 13.0 current novabackup release log
[ 929, 2339, 3366, 6153, 3629, 1358, 9655, 1049 ]
Validation
2,516
3
Intel_Turbo_Boost:intel turbo boost intel turbo boost intel trade name feature automatically raises certain processors operating frequency thus performance demanding tasks running turbo-boost-enabled processors core i5 core i7 core i9 xeon series manufactured since 2008 particularly based nehalem sandy bridge later microarchitectures frequency accelerated operating system requests highest performance state processor processor performance states defined advanced configuration power interface acpi specification open standard supported major operating systems additional software drivers required support technology design concept behind turbo boost commonly referred dynamic overclocking workload processor calls faster performance processor clock try increase operating frequency regular increments required meet demand increased clock rate limited processor power current thermal limits number cores currently use maximum frequency active cores frequency increases occur increments 133 mhz nehalem processors 100 mhz sandy bridge ivy bridge haswell skylake processors electrical thermal limits exceeded operating frequency automatically decreases decrements 133 100 mhz processor operating within design limits turbo boost 2.0 introduced 2011 sandy bridge microarchitecture intel turbo boost max 3.0 introduced 2016 broadwell-e microarchitecture intel november 2008 white paper discusses turbo boost technology new feature incorporated nehalem-based processors released month similar feature called intel dynamic acceleration ida available many core 2 based centrino platforms feature receive marketing treatment given turbo boost intel dynamic acceleration dynamically changed core frequency function number active cores operating system instructed one active cores enter c3 sleep state using advanced configuration power interface acpi active core dynamically accelerated higher frequency intel turbo boost technology monitor gui utility could used monitor turbo boost utility reached end-of-life state longer supporting intel processors released q2 2013 longer available
[ 3973, 4491, 4108, 398, 5649, 7313, 5523, 4886, 8855, 9369, 10139, 9500, 3882, 7983, 4017, 2237, 8125, 833, 6339, 9541, 3403, 1998, 3537, 2514, 5073, 10966, 7387, 4444, 3294, 7783, 1000, 4204, 4334, 9582, 1137, 630, 4217, 5883, 10620 ]
None
2,517
3
AVR32:avr32 avr32 32-bit risc microcontroller architecture produced atmel microcontroller architecture designed handful people educated norwegian university science technology including lead designer øyvind strøm cpu architect erik renno atmel norwegian design center instructions executed single-cycle multiply–accumulate unit perform 32-bit × 16-bit 48-bit arithmetic operation two cycles result latency issued per cycle resemble 8-bit avr microcontroller family even though designed atmel norway trondheim debug-tools similar support avr32 dropped linux kernel 4.12 atmel switched mostly variants arm architecture avr32 least two micro-architectures avr32a avr32b differ instruction set architecture register configurations use caches instructions data avr32a cpu cores inexpensive applications provide dedicated hardware registers shadowing register file status return address interrupts saves chip area expense slower interrupt-handling avr32b cpu cores designed fast interrupts dedicated registers hold values interrupts exceptions supervisor calls avr32b cores also support java virtual machine hardware avr32 instruction set 16-bit compact 32-bit extended instructions similar e.g arm several specialized instructions found older armv5 armv6 mips32 several u.s. patents filed avr32 isa design platform like avr 8-bit microcontroller architecture avr32 designed high code density packing much function instructions fast instructions clock cycles atmel used independent benchmark consortium eembc benchmark architecture various compilers consistently outperformed armv5 16-bit thumb code armv5 32-bit arm code much 50 code-size 3× performance atmel says picopower avr32 at32uc3l consumes less 0.48 mw/mhz active mode claimed time used less power 32-bit cpu march 2015 claim new cortex-m0+-based microcontrollers using arm holdings arm architecture instruction set broken ultra-low power performance barriers date avr32 architecture used atmel products 2006 atmel launched avr32a avr32 ap7 core 7-stage pipelined cache-based design platform ap7000 implements avr32b architecture supports simd single instruction multiple data dsp digital signal processing instructions risc instruction-set addition java hardware acceleration includes memory management unit mmu supports operating systems like linux early 2009 rumored ap7200 follow-on processor held back resources going chips 2007 atmel launched second avr32 avr32 uc3 core designed microcontrollers using on-chip flash memory program storage running without mmu memory management unit avr32 uc3 core uses three-stage pipelined harvard architecture specially designed optimize instruction fetches on-chip flash memory avr32 uc3 core implements avr32a architecture shares instruction set architecture isa ap7 sibling differs including optional simd instructions java support shares 220 instructions avr32b isa features atomic bit manipulation control on-chip peripherals general purpose i/os fixed point dsp arithmetic implementations combined compatible set peripheral controllers buses first seen at91sam arm-based platforms peripherals first seen ap7000 high speed usb peripheral controller standalone dma controller appeared later updated arm9 platforms arm cortex-m3 based products avr32 cores include nexus class 2+ based on-chip debug framework build jtag uc3 core announced electronica 2010 munich germany november 10 2010 first 32-bit avr microcontroller optional floating-point unit april 10 2012 atmel announced end life ap7 core devices april 4 2013 devicename ends *au audio version allow execution atmel licensed audio firmware ips devicename ends *s includes aes crypto module series low-power uc3d embeds sleepwalking technology allows peripheral wake device sleep mode
[ 7170, 8450, 1798, 6925, 1170, 1298, 7445, 5785, 9371, 8861, 11424, 5922, 2339, 3493, 4773, 6311, 8487, 9638, 682, 4269, 9391, 2224, 4144, 11314, 7604, 1461, 1462, 823, 9911, 6207, 10945, 7234, 7235, 6084, 3014, 3142, 3911, 9928, 9932, 660...
Test
2,518
0
Robert_Mercer:robert mercer robert leroy mercer born july 11 1946 american computer scientist developer early artificial intelligence co-ceo renaissance technologies hedge fund mercer played key role brexit campaign donating data analytics services nigel farage also major funder organizations supporting right-wing political causes united states breitbart news donald trump 2016 campaign president principal benefactor make america number 1 super pac november 2017 mercer announced would step renaissance technologies sell stake breitbart news daughters mercer grew new mexico developed early interest computers 1964 attended national youth science camp west virginia learned program donated ibm computer went get bachelor degree physics mathematics university new mexico working degree job air force weapons laboratory kirtland air force base writing programs though felt produced good work felt optimized later said experience left jaundiced view government-funded research earned ph.d. computer science university illinois urbana–champaign 1972 mercer joined ibm research fall 1972 worked thomas j. watson research center yorktown new york helped develop brown clustering statistical machine translation technique part speech recognition translation research program led frederick jelinek lalit bahl june 2014 mercer received association computational linguistics lifetime achievement award work 1993 mercer joined hedge fund renaissance technologies recruited executive nick patterson founder renaissance james harris simons quantitative analyst preferred hire mathematicians computer scientists physicists rather business school students financial analysts mercer former colleague ibm peter brown became co-ceos renaissance simons retired 2009 renaissance main fund medallion earned 39 per year average 1989 2006 bipartisan senate panel estimated 2014 medallion investors underpaid taxes 6.8 billion decade masking short-term gains long-term returns 2014 renaissance managed 25 billion assets november 2017 mercer announced would stepping position renaissance technologies decision taken hedge fund faced backlash mercer political activism mercer appears director eight bermuda companies paradise papers appear used legally avoid us taxes 2015 washington post called mercer one ten influential billionaires politics since 2006 mercer donated 34.9 million republican political campaigns us mercer given 750,000 club growth 2 million american crossroads 2.5 million freedom partners action fund 2010 financially supported fringe biochemist art robinson unsuccessful efforts unseat peter defazio oregon 4th congressional district 2013-2014 election cycle mercer donated fourth largest amount money among individual donors second among republican donors mercer joined koch brothers ’ conservative political donor network 2010 citizens united v. fec mercer daughter rebekah mercer decided establish political foundation mercer family foundation run rebekah donated variety conservative causes mercer donated heritage foundation cato institute media research center reclaim new york gai 2013 mercer shown data former jimmy carter pollster patrick caddell critical top democrats commissioned research caddell showed voters becoming alienated political parties mainstream candidates mercer main financial backer jackson hole summit conference took place wyoming august 2015 advocate gold standard also supported doctors disaster preparedness fred kelly grant idaho activist encourages legal challenges environmental laws campaign death penalty nebraska funded ads new york critical so-called ground-zero mosque according associates interviewed bloomberg mercer concerned monetary banking systems united states believes danger government meddling mercer major source funds breitbart news gave least 10 million media outlet according newsweek 2015 mercer also gave 400,000 black americans better future conservative think tank led raynard jackson since 2017 mercer donated 87,100 super pac mercer activist campaign united kingdom end membership european union also known brexit andy wigmore communications director leave.eu said mercer donated services data analytics firm cambridge analytica nigel farage head united kingdom independence party ukip firm able advise leave.eu ability harvest data people facebook profiles order target individualized persuasive messages vote brexit reported cambridge analytica also undisclosed links canadian digital firm aggregateiq also played pivotal role domenic cummings voteleave campaign delivered estimated one billion individually curated targeted adverts voters lead brexit referendum contravention established voting rules voteleave leave.eu inform uk electoral commission donation despite fact law demands donations valued £7,500 must reported 2018 electoral commission found voteleave campaign guilty breaking electoral law january 2016 mercer biggest single donor 2016 u.s. presidential race june 2016 ranked 1 donor federal candidates 2016 election cycle donated 2 million john r. bolton super pac 668,000 republican national committee mercer major financial supporter 2016 presidential campaign ted cruz contributing 11 million super pac associated candidate mercer major supporter donald trump 2016 campaign president mercer daughter rebekah helped get steve bannon kellyanne conway senior roles trump campaign rebekah worked conway cruz super-pac keep promise 2016 republican primaries mercer also financed super pac make america number one supported trump campaign nick patterson former colleague mercer said 2017 trump would elected without mercer support mercer said civil rights act 1964 landmark federal statute arising civil rights movement 1960s major mistake 2017 david magerman former renaissance employee alleged lawsuit mercer said african americans economically better civil rights movement white racists longer existed united states racists remaining black racists mercer portrayed actor aden gillett 2019 hbo channel 4 produced drama entitled mercer wife diana lynne dean three daughters jennifer jenji rebekah bekah heather sue rebekah runs mercer family foundation three mercer daughters formerly owned bakery called ruby et violette mercer plays competitive poker owns ho scale model railroad 2009 mercer filed suit raildreams custom model railroad design alleging raildreams overcharged 2 million mercer lives owl nest mansion head harbor new york commissioned series yachts named sea owl recent one 203 feet 62 metres length pirate-themed playroom mercer grandchildren chandelier venetian glass florida mercer built large stable horse riding center acquired one country largest collections machine guns historical firearms including weapon arnold schwarzenegger wielded terminator 2013 mercer sued several members household staff accused docking wages failing pay overtime compensation lawsuit settled according lawyer represented staff members mercer net worth estimated hundreds millions dollars often referred billionaire
[ 679, 2602, 7724, 1783, 10557 ]
Validation
2,519
2
APL_(programming_language):apl programming language apl named book programming language programming language developed 1960s kenneth e. iverson central datatype multidimensional array uses large range special graphic symbols represent functions operators leading concise code important influence development concept modeling spreadsheets functional programming computer math packages also inspired several programming languages mathematical notation manipulating arrays developed kenneth e. iverson starting 1957 harvard university 1960 began work ibm developed notation adin falkoff published book programming language 1962 preface states premise notation used inside ibm short research reports computer systems burroughs b5000 stack mechanism stack machines versus register machines evaluated ibm upcoming computers iverson also used notation draft chapter programming language written book writing fred brooks automatic data processing would published 1963 1979 iverson received turing award work apl early 1962 first attempt use notation describe complete computer system happened falkoff discussed william c. carter work standardize instruction set machines later became ibm system/360 family 1963 herbert hellerman working ibm systems research institute implemented part notation ibm 1620 computer used students special high school course calculating transcendental functions series summation students tested code hellerman lab implementation part notation called personalized array translator pat 1963 falkoff iverson edward h. sussenguth jr. working ibm used notation formal description ibm system/360 series machine architecture functionality resulted paper published ibm systems journal 1964 published team turned attention implementation notation computer system one motivations focus implementation interest john l. lawrence new duties science research associates educational company bought ibm 1964 lawrence asked iverson group help use language tool develop use computers education lawrence m. breed philip s. abrams stanford university joined team ibm research continued prior work implementation programmed fortran iv part notation done ibm 7090 computer running ibsys operating system work finished late 1965 later named ivsys iverson system basis implementation described detail abrams stanford university technical report interpreter iverson notation 1966 academic aspect formally supervised niklaus wirth like hellerman pat system earlier implementation include apl character set used special english reserved words functions operators system later adapted time-sharing system november 1966 reprogrammed ibm system/360 model 50 computer running time sharing mode used internally ibm key development ability use apl effectively wide use cathode ray tube crt terminals development special ibm selectric typewriter interchangeable typing element special apl characters used paper printing terminal workstations using selectric typewriter typing element mechanism ibm 1050 ibm 2741 terminal keycaps could placed normal keys show apl characters would entered typed key struck first time programmer could type see proper apl characters used iverson notation forced use awkward english keyword representations falkoff iverson special apl selectric typing elements 987 988 designed late 1964 although apl computer system available use iverson cited falkoff inspiration idea using ibm selectric typing element apl character set many apl symbols even apl characters selectric typing element still typed over-striking two extant element characters example grade character made delta shift-h sheffer stroke shift-m necessary apl character set much larger 88 characters allowed typing element even letters restricted upper-case capitals first apl interactive login creation apl workspace 1966 larry breed using ibm 1050 terminal ibm mohansic labs near thomas j. watson research center home apl yorktown heights new york ibm chiefly responsible introducing apl marketplace apl first available 1967 ibm 1130 apl\1130 would run little 8k 16-bit words memory used dedicated 1 megabyte hard disk apl gained foothold mainframe timesharing systems late 1960s early 1980s part would support multiple users lower-specification systems dynamic address translation hardware additional improvements performance selected ibm system/370 mainframe systems included apl assist microcode support apl execution included processor firmware distinct implemented entirely higher-level software somewhat later suitably performing hardware finally growing available mid- late-1980s many users migrated applications personal computer environment early ibm apl interpreters ibm 360 ibm 370 hardware implemented multi-user management instead relying host services thus timesharing systems first introduced 1966 apl\360 system multi-user interpreter ability programmatically communicate operating system information setting interpreter system variables done special privileged i-beam functions using monadic dyadic operations 1973 ibm released apl.sv continuation product offered shared variables means access facilities outside apl system operating system files mid-1970s ibm mainframe interpreter even adapted use ibm 5100 desktop computer small crt apl keyboard small computers time offered basic 1980s vsapl program product enjoyed wide use conversational monitor system cms time sharing option tso vspc music/sp cics users 1973-1974 patrick e. hagerty directed implementation university maryland apl interpreter 1100 line sperry univac 1100/2200 series mainframe computers time sperry nothing 1974 student alan stebbens assigned task implementing internal function 1960s 1970s several timesharing firms arose sold apl services using modified versions ibm apl\360 interpreter north america better-known ones i. p. sharp associates scientific time sharing corporation stsc time sharing resources tsr computer company tcc compuserve also entered market 1978 apl interpreter based modified version digital equipment corp carnegie mellon ran dec ki kl 36-bit machines compuserve apl available commercial market consumer information service advent first less expensive mainframes ibm 4300 later personal computer mid-1980s timesharing industry gone sharp apl available i. p. sharp associates first timesharing service 1960s later program product starting around 1979 sharp apl advanced apl implementation many language extensions packages ability put one objects single variable file system nested arrays shared variables apl interpreters available mainframe mini-computer manufacturers also notably burroughs control data corporation cdc data general digital equipment corporation dec harris hewlett-packard hp siemens ag xerox others garth foster syracuse university sponsored regular meetings apl implementers community syracuse minnowbrook conference center blue mountain lake new york later years eugene mcdonnell organized similar meetings asilomar conference grounds near monterey california pajaro dunes near watsonville california sigapl special interest group association computing machinery continues support apl community microcomputers became available mid 1970s onwards basic became dominant programming language nevertheless microcomputers provided apl instead first intel 8008-based mcm/70 released 1974 primarily used education another machine time videobrain family computer released 1977 supplied dialect apl called apl/s commodore superpet introduced 1981 included apl interpreter developed university waterloo 1976 bill gates claimed open letter hobbyists microsoft corporation implementing apl intel 8080 motorola 6800 little incentive make available hobbyists software piracy never released starting early 1980s ibm apl development leadership jim brown implemented new version apl language contained primary enhancement concept nested arrays array contain arrays new language features facilitated integrating nested arrays program workflow ken iverson longer control development apl language left ibm joined i. p. sharp associates one major contributions directing evolution sharp apl accord vision vendors busy developing apl interpreters new hardware notably unix-based microcomputers apl2 almost always standard chosen new apl interpreter developments even today apl vendors users cite apl2 compatibility selling point products apl2 ibm mainframe computers still available ibm cites use problem solving system design prototyping engineering scientific computations expert systems teaching mathematics subjects visualization database access first available cms tso 1984 apl2 workstation edition windows os/2 aix linux solaris followed much later early 1990s various implementations apl aplx dyalog et al. include extensions object-oriented programming support .net framework xml-array conversion primitives graphing operating system interfaces lambda calculus expressions apl formed basis influenced following languages apl criticized praised choice unique non-standard character set learn become ardent adherents suggesting weight behind iverson idea notation used make difference 1960s 1970s terminal devices even display monitors could reproduce apl character set popular ones employed ibm selectric print mechanism used special apl type element one early apl line terminals line-mode operation full screen texas instruments ti model 745 circa 1977 full apl character set featured half full duplex telecommunications modes interacting apl time-sharing service remote mainframe run remote computer job called rje time universal use high-quality graphic displays printing devices unicode support apl character font problem largely eliminated however entering apl characters requires use input method editors keyboard mappings virtual/on-screen apl symbol sets easy-reference printed keyboard cards frustrate beginners accustomed programming languages beginners prior experience programming languages study involving high school students found typing using apl characters hinder students measurable way defense apl use apl requires less coding type keyboard mappings become memorized time also special apl keyboards manufactured use today freely available downloadable fonts operating systems microsoft windows reported productivity gains assume one spend enough time working apl make worthwhile memorize symbols semantics keyboard mappings mention substantial number idioms common tasks unlike traditionally structured programming languages apl code typically structured chains monadic dyadic functions operators acting arrays apl many nonstandard primitives functions operators indicated single symbol combination symbols primitives defined precedence always associate right thus apl read best understood right-to-left early apl implementations circa 1970 programming loop-flow control structures codice_1 codice_2 loops codice_3 constructs instead used array operations use structured programming constructs often necessary since operation could performed full array one statement example codice_4 function codice_5 replace for-loop iteration ιn applied scalar positive integer yields one-dimensional array vector 1 2 3 ... n. recent implementations apl generally include comprehensive control structures data structure program control flow clearly cleanly separated apl environment called workspace workspace user define programs data i.e. data values exist also outside programs user also manipulate data without define program examples apl interpreter first types six spaces awaiting user input output starts column one user save workspace values programs execution status apl uses set non-ascii symbols extension traditional arithmetic algebraic notation single character names single instruction multiple data simd vector functions one way apl enables compact formulation algorithms data transformation computing conway game life one line code nearly versions apl theoretically possible express computable function one expression one line code unusual character set many programmers use special keyboards apl keytops write apl code although various ways write apl code using ascii characters practice almost never done may thought support iverson thesis notation tool thought modern implementations use standard keyboard layouts special mappings input method editors access non-ascii characters historically apl font distinctive uppercase italic alphabetic characters upright numerals symbols vendors continue display apl character set custom font advocates apl claim examples so-called write-only code badly written almost incomprehensible code almost invariably examples poor programming practice novice mistakes occur language advocates also claim far productive apl conventional computer languages working software implemented far less time far fewer programmers using technology also may claim compact terse apl lends well larger-scale software development complexity number lines code reduced greatly many apl advocates practitioners also view standard programming languages cobol java comparatively tedious apl often found time-to-market important trading systems apl makes clear distinction functions operators functions take arrays variables constants expressions arguments return arrays results operators similar higher-order functions take functions arrays arguments derive related functions example sum function derived applying reduction operator addition function applying reduction operator maximum function returns larger two numbers derives function returns largest group vector numbers j language iverson substituted terms verb function adverb conjunction operator apl also identifies features built language represented symbol fixed combination symbols primitives primitives either functions operators coding apl largely process writing non-primitive functions versions apl operators however primitives considered neither functions operators noticeably assignment words used apl literature meanings differ mathematics generality computer science apl explicit representations functions operators syntax thus providing basis clear explicit statement extended facilities language tools experiment displays hello world 'hello world sample user session youtube design theme apl define default actions cases would produce syntax errors programming languages 'hello world string constant displays display default action expression action specified explicitly e.g assignment function parameter another example theme exponentiation apl written indicates raising 2 power 3 would written languages fortran python many languages use signify multiplication 2*3 apl uses however base specified statement apl languages programming languages one would syntax error apl however assumes missing base natural logarithm constant e 2.71828 ... interpreting suppose array numbers gives average reading right-to-left gives number elements x since dyadic operator term left required well parenthesis since otherwise x would taken summation would element x divided number elements x adds elements x building calculates standard deviation since assignment operator appear within expression would place suitable values av sd naturally one would make expression function repeated use rather retyping time following immediate-mode expression generates typical set pick 6 lottery numbers six pseudo-random integers ranging 1 40 guaranteed non-repeating displays sorted ascending order lot concisely although seems complex new apler combines following apl functions also called primitives glyphs since function left left-most x tell apl result simply outputs display single line separated spaces without needing explicit instruction codice_6 also monadic equivalent called codice_15 simply returns one random integer 1 sole operand right inclusive thus role-playing game program might use expression codice_16 roll twenty-sided die following expression finds prime numbers 1 r. time space calculation complexity formula_1 big notation executed right left means note assumes apl origin 1 i.e. indices start 1 apl set use 0 origin codice_45 codice_46 convenient calculations following expression sorts word list stored matrix x according word length following function life written dyalog apl takes boolean matrix calculates new generation according conway game life demonstrates power apl implement complex algorithm little code also hard follow unless one advanced knowledge apl following example also dyalog first line assigns html code variable codice_47 uses apl expression remove html tags explanation apl used many purposes including financial insurance applications artificial intelligence neural networks robotics argued apl calculation tool programming language symbolic nature array capabilities made popular domain experts data scientists require skills computer programmer apl well suited image manipulation computer animation graphic transformations encoded matrix multiplications one first commercial computer graphics houses digital effects produced apl graphics product named visions used create television commercials animation 1982 film tron latterly stormwind boating simulator uses apl implement core logic interfacing rendering pipeline middleware major part physics engine today apl remains use wide range commercial scientific applications example investment management asset management health care dna profiling hobbyists first implementation apl using recognizable apl symbols apl\360 ran ibm system/360 completed november 1966 though time remained use within ibm 1973 implementors larry breed dick lathwell roger moore awarded grace murray hopper award association computing machinery acm given work design implementation apl\360 setting new standards simplicity efficiency reliability response time interactive systems 1975 ibm 5100 microcomputer offered apl\360 one two built-in rom-based interpreted languages computer complete keyboard display supported special symbols used language significant developments apl\360 included cms/apl made use virtual storage capabilities cms aplsv introduced shared variables system variables system functions subsequently ported ibm system/370 vspc platforms final release 1983 replaced apl2 1968 apl\1130 became first publicly available apl system created ibm ibm 1130 became popular ibm type-iii library software ibm released apl*plus sharp apl versions apl\360 added business-oriented extensions data formatting facilities store apl arrays external files jointly developed two companies employing various members original ibm apl\360 development team two companies i. p. sharp associates ipsa apl\360 services company formed 1964 ian sharp roger moore others stsc time-sharing consulting service company formed 1969 lawrence breed others together two developed apl*plus thereafter continued work together develop apl separately apl*plus sharp apl stsc ported apl*plus many platforms versions made vax 11 pc unix whereas ipsa took different approach arrival personal computer made sharp apl available platform using additional pc-xt/360 hardware 1993 soliton incorporated formed support sharp apl developed sharp apl sax sharp apl unix apl*plus continues apl2000 apl+win 1985 ian sharp dan dyer stsc jointly received kenneth e. iverson award outstanding contribution apl apl2 significant re-implementation apl ibm developed 1971 first released 1984 provides many additions language notable nested non-rectangular array support available mainframe computers running z/os z/vm workstations running aix linux sun solaris microsoft windows entire apl2 products services team awarded iverson award 2007 dyalog apl first released british company dyalog ltd. 1983 available aix linux including raspberry pi macos microsoft windows platforms based apl2 extensions support object-oriented programming functional programming licences free personal/non-commercial use 1995 two development team john scholes peter donnelly awarded iverson award work interpreter gitte christensen morten kromberg joint recipients iverson award 2016 nars2000 open-source apl interpreter written bob smith prominent apl developer implementor stsc 1970s 1980s nars2000 contains advanced features new datatypes runs natively microsoft windows platforms wine aplx cross-platform dialect apl based apl2 several extensions first released british company microapl 2002 although longer development commercial sale available free charge dyalog gnu apl free implementation extended apl specified iso/iec 13751:2001 thus similar apl2 runs gnu/linux windows using cygwin uses unicode internally written jürgen sauermann richard stallman founder gnu project early adopter apl using write text editor high school student summer 1969 apl traditionally interpreted language language characteristics weak variable typing well suited compilation however arrays core data structure provides opportunities performance gains parallelism parallel computing massively parallel applications very-large-scale integration vlsi outset apl regarded high-performance language example noted speed could perform complicated matrix operations operates arrays performs operations like matrix inversion internally nevertheless apl rarely purely interpreted compilation partial compilation techniques used include following apl interpreters support idiom recognition evaluate common idioms single operations example evaluating idiom codice_48 single operation codice_49 boolean vector codice_50 array creation two intermediate arrays avoided weak typing apl means name may reference array datatype function operator general interpreter know advance form must therefore perform analysis syntax checking etc run-time however certain circumstances possible deduce advance type name expected reference generate bytecode executed reduced run-time overhead bytecode also optimised using compilation techniques constant folding common subexpression elimination interpreter execute bytecode present assumptions made met dyalog apl includes support optimised bytecode compilation apl subject research experiment since language first became available first compiler considered burroughs apl-700 released around 1971 order able compile apl language limitations imposed apex research apl compiler written robert bernecky available gnu public license stsc apl compiler hybrid bytecode optimiser compiler enables compilation functions machine code provided sub-functions globals declared interpreter still used runtime library execute functions meet compilation requirements apl standardized american national standards institute ansi working group x3j10 international organization standardization iso international electrotechnical commission iec iso/iec joint technical committee 1 subcommittee 22 working group 3 core apl language specified iso 8485:1989 extended apl language specified iso/iec 13751:2001
[ 15, 6160, 7186, 7188, 25, 10778, 5148, 5149, 9245, 5154, 5677, 5168, 2045, 7733, 3126, 1079, 3642, 7739, 62, 6718, 10819, 8262, 1610, 1099, 6228, 7775, 1632, 9825, 6248, 1130, 2670, 623, 2168, 3705, 7292, 9345, 2181, 1673, 6797, 10387, ...
Test
2,520
1
Sqsh:sqsh sqsh pronounced skwish short sqshell pronounced s-q-shell open-source substitute isql interactive sql client supplied sybase adaptive server enterprise ase relational database management system isql sqsh essentially rudimentary command-line tools issuing transact-sql commands ase server receiving displaying results sqsh supports among others command history aliases piping output external programs sources runs various flavours unix including linux well windows cygwin libraries
[ 2181, 4490, 6797, 270, 10413, 5492, 823 ]
Test
2,521
2
Line_discipline:line discipline line discipline ldisc layer terminal subsystem unix-like systems terminal subsystem consists three layers upper layer provide character device interface lower hardware driver communicate hardware pseudo terminal middle line discipline implement behavior common terminal devices line discipline glues low level device driver code high level generic interface routines read 2 write 2 ioctl 2 responsible implementing semantics associated device policy separated device driver serial hardware driver used devices require different data handling example standard line discipline processes data receives hardware driver applications writing device according requirements terminal unix-like system input handles special characters interrupt character typically control-c erase kill characters typically backspace delete control-u respectively output replaces lf characters cr/lf sequence serial port could also used dial-up internet connection using serial modem ppp case ppp line discipline would used would accumulate input data serial line ppp input packets delivering networking stack rather character device would transmit packets delivered networking stack serial line unix-like systems use streams implement line disciplines
[ 4333, 8432, 7188, 5397, 5492, 8697, 8991 ]
Test
2,522
0
Multilingual_notation:multilingual notation multilingual notation representation lexical resource allows translation two words instance within lmf multilingual notation could presented following diagram english french translation diagram two intermediate senseaxis instances used order represent near match fleuve french river english senseaxis instance bottom linked directly english sense notion exist english complex situation two languages concerned following diagram dealing english italian spanish within context multilingual database comprising two languages usually multilingual notations factorized order save number links terms multilingual notations interlingual nodes shared among language descriptions specific context lexical resource bilingual lexicon term bilingual link usually preferred let us note instead translation rather broad meaning authors prefer equivalence words different notions like dynamic formal equivalences term mainly used context machine translation nlp lexicons term used context translation dictionary concerns mainly hand-held electronic translators
[ 7780, 11056, 7164 ]
Train
2,523
3
Elbrus-2S+:elbrus-2s+ elbrus-2s+ multi-core microprocessor based elbrus 2000 architecture developed moscow center sparc technologies mcst multiple reports regarding evolution technology purpose import substitution russia raised several ministries july 2014 due economic sanctions response 2014 pro-russian unrest ukraine december 2014 announced mikron start pilot production dual-core variant microprocessor called elbrus-2sm using 90 nanometer cmos manufacturing process zelenograd russia elbrus-4s cpu reported built support intel x86 emulation well native vliw mode perform 23 instructions per clock cycle programs built elbrus 2000 native mode compiler determines different operations shall distributed 23 computing units saving final program means dynamic scheduling needed runtime thus reducing amount work cpu perform every time program executed static scheduling needs performed one time program built advanced algorithms finding optimal distribution work employed south bridge elbrus 2000 chipset connects peripherals bus cpu developed mcst also compatible mcst-r1000 december 2012 kraftway announced deliver elbrus based pc together partner mcst august 2013 kuyan gusev kozlov kaimuldenov kravtsunov mcst published article based experience building deployment debian linux elbrus computer architecture done using hybrid compiler toolchain cross native elbrus-2s+ intel core 2 duo december 2014 implementation opengl 3.3 standard demonstrated running game doom 3 bfg edition elbrus-4s clocked 720 mhz using radeon graphics card 2 gigabytes video memory april 2015 mcst announced two new products based elbrus-4s cpu one 19-inch rack server four cpus 16 cores one personal computer december 2015 first shipment pcs based vliw cpu elbrus-4s made russia
[ 6659, 7687, 1425, 8090, 1952, 4386, 6818, 6957, 8625, 10675, 2490, 11580, 7234, 2503, 5457, 10833, 2525, 3294, 9309, 5348, 5358, 1776, 499, 1399 ]
Validation
2,524
3
Nomadik:nomadik nomadik family microprocessors multimedia applications stmicroelectronics based arm9 arm architecture designed specifically mobile devices december 12 2002 stmicroelectronics texas instruments jointly announced initiative open mobile application processor interfaces omapi intended used 2.5 3g mobile phones going produced 2003 later merged larger initiative renamed mipi alliance nomadik stmicroelectronics implementation standard nomadik first presented october 7 2003 ceatec show tokyo later year nomadik microprocessor report analysts choice award application processors family aimed 2.5g/3g mobile phones personal digital assistants portable wireless products multimedia capability addition suitable automotive multimedia applications known device using nomadik processor nokia n96 used stn8815 version chip n96 debuted 2008 absence gpu noticed derivative nomadik created specifically navigation systems gps named cartesio sta2062 used products garmin nüvi 205 nüvi 500 derivative used arm926ej-s coupled sta5620 gps rf downconverter added 32-channel hardware gps correlator nomadik family discontinued 2009 development already begun successor soc called stn8500 superseded novathor family st-ericsson renamed u8500 st-nxp wireless division merged st-ericsson joint venture
[ 3585, 7170, 8720, 11282, 9235, 11289, 1057, 38, 4139, 8237, 9774, 8250, 8253, 7745, 7235, 7747, 2635, 99, 8812, 11374, 10361, 638, 644, 11396, 8842, 11405, 146, 659, 1170, 1682, 7833, 666, 5786, 4258, 4773, 9913, 8383, 10945, 7877, 9928, ...
Test
2,525
3
Chipset:chipset computer system chipset set electronic components integrated circuit known data flow management system manages data flow processor memory peripherals usually found motherboard chipsets usually designed work specific family microprocessors controls communications processor external devices chipset plays crucial role determining system performance computing term chipset commonly refers set specialized chips computer motherboard expansion card personal computers first chipset ibm pc 1984 neat chipset developed chips technologies intel 80286 cpu home computers game consoles arcade-game hardware 1980s 1990s term chipset used custom audio graphics chips examples include commodore amiga original chip set sega system 16 chipset term chipset often refers specific pair chips motherboard northbridge southbridge northbridge links cpu high-speed devices especially ram graphics controllers southbridge connects lower-speed peripheral buses pci isa many modern chipsets southbridge contains on-chip integrated peripherals ethernet usb audio devices motherboards chipsets often come different manufacturers manufacturers chipsets x86 motherboards include amd broadcom intel nvidia sis via technologies apple computers unix workstations traditionally used custom-designed chipsets server manufacturers also develop custom chipsets products 1980s chips technologies pioneered manufacturing chipsets pc-compatible computers computer systems produced since often share commonly used chipsets even across widely disparate computing specialties example ncr 53c9x low-cost chipset implementing scsi interface storage devices could found unix machines mips magnum embedded devices personal computers traditionally x86 computers processor primary connection rest machine motherboard chipset northbridge northbridge directly responsible communications high-speed devices system memory primary expansion buses pcie agp pci cards common examples conversely system communication back processor connection processor northbridge commonly designated front side bus fsb requests resources directly controlled northbridge offloaded southbridge northbridge intermediary processor southbridge southbridge handled everything else generally lower-speed peripherals board functions largest hard disk storage connectivity usb parallel serial communications connection northbridge southbridge normally pci bus 2003 interaction cpu main memory expansion device graphics card — whether agp pci integrated motherboard — directly controlled northbridge ic behalf processor made processor performance highly dependent system chipset especially northbridge memory performance ability shuttle information back processor 2003 however amd introduction athlon 64-bit series processors changed athlon64 marked introduction integrated memory controller incorporated processor thus allowing processor directly access handle memory negating need traditional northbridge intel followed suit 2008 release core series cpus x58 platform newer processors integration increased primarily inclusion system primary pcie controller integrated graphics directly cpu fewer functions left un-handled processor chipset vendors condensed remaining northbridge southbridge functions single chip intel version platform controller hub pch effectively enhanced southbridge remaining peripherals—as traditional northbridge duties memory controller expansion bus pcie interface even on-board video controller integrated cpu die chipset often contains secondary pcie connections though however platform controller hub also integrated processor package second die mobile variants skylake processors
[ 3585, 3586, 3588, 1038, 5649, 10260, 7712, 548, 8237, 9774, 9791, 11331, 2635, 4173, 1614, 7247, 4695, 1121, 6250, 107, 7788, 8301, 2159, 4208, 6256, 1651, 1660, 4221, 9343, 3203, 4767, 4270, 9400, 7354, 2237, 6339, 6854, 3783, 9427, 5859...
None
2,526
7
Crunchfish:crunchfish crunchfish swedish technology company malmö develops gesture recognition software mobile phone tablet market crunchfish founded 2010 initial focus create innovations ios android app markets gesture recognition using standard webcam main gesture sensor one core innovations company focusing touchless interaction based camera based gestures 2013 april company selected '2013 red herring top 100 company red herring magazine crunchfish produces gesture sensing software set customized mid-air gesture recognition solutions named a3d™ global mobile device manufacturers app developers crunchfish cooperates smartphone manufacturers enable crunchfish gesture sensing technology partners mobile devices crunchfish developed touchless functions chinese gionee smartphone elife e6 launched china july 2013 india africa august 2013 crunchfish integrates touchless functions e.g smartphones technology portable mobile platform devices gesture recognition technology used mobile phones tablets dtvs equipped front-facing camera typical uses crunchfish touchless technology devices intelligent home smartphones tablets digital tv games home electronics built-in standard camera gesture based functionality adds alternative options standard touch interface user example put tablet front him/her free mid-air gesture hands interacting media player without touching smartphone users answer reject phone calls start slideshows photo gallery use video scrubber etc without touching device device pause video playback users look away screen crunchfish touchless a3d software able detect track objects fingers hand gestures face movements three dimensions based video stream embedded standard camera e.g mobile device
[ 1083 ]
Test
2,527
4
Challenge–response_spam_filtering:challenge–response spam filtering challenge–response c/r system type spam filter automatically sends reply challenge alleged sender incoming e-mail originally designed 1997 stan weatherby called email verification reply sender asked perform action assure delivery original message would otherwise delivered action perform typically takes relatively little effort great effort perform large numbers effectively filters spammers challenge–response systems need send challenges unknown senders senders previously performed challenging action previously sent e-mail would automatically whitelisted c/r systems attempt provide challenges fulfilled easily legitimate senders non-easily spammers two characteristics differ legitimate senders spammers exploited achieve goal listed examples challenges could used exploit differences nowadays c/r systems used widely enough make spammers bother automatically respond challenges therefore c/r systems generally rely simple challenge would made complicated spammers ever build automated responders c/r systems ideally problems sending challenges forged email addresses reduced challenges sent critics c/r systems raised several issues regarding usefulness email defense number issues relate programs auto-respond e-mail including mailing list managers vacation programs bounce messages mail servers spammers use fake non-existent address sender address field e-mail header also use forged existing sender address valid arbitrary person address without person consent latter would become increasingly common e.g callback verification would become popular detect spam c/r systems challenging message forged sender address would send challenge new message person whose address forged would create e-mail backscatter would effectively shift burden person would received spam person whose address forged addition forged sender decided validate challenge c/r user would receive spam anyway forged sender address would whitelisted though definitely undesirable side-effect issue would non-existent people whose email address used forged address spam happen run c/r system case one c/r users must implement form return address signing bounce address tag validation ensure challenge goes also systems like spf dkim became common forged sender addresses would recognized systems reaching c/r system cases c/r systems tricked becoming spam relays useful part message challenge generally included challenge message spammer knowing sending c/r using system could design message spam payload part message challenge message includes case forged sender actual recipient spam c/r system unwittingly relay disseminating ordinary email address protected c/r system results challenges send mail address c/r critics consider rude give people email address require unless previously whitelisted might always possible answer challenge send mail advocates c/r systems argue benefits far outweigh 'burden incidental challenge probably never final solution spam without laying kind burden e-mail sender reason widespread use c/r systems understood accepted appreciated analogy snail mail sender prepared pay stamp analogy phone calls caller prepared pay outgoing call c/r systems interact badly mailing list software person subscribed mailing list begins use c/r software posters mailing list may confronted challenge messages order confirmations billing statements delivery notices online shopping systems usually sent via automated systems email challenges sent systems lost legitimate mail sent systems may reach c/r system user advocates c/r systems argue though takes extra effort solutions problems exist end-user behind c/r system simple things c/r advocates claim systems lower rate false positives systems automatically filtering unsolicited bulk email critics argue typical users c/r systems still need review challenged mail regularly looking non-bulk mail solicited bulk email sender responded challenge issue particularly notable newsletters transactional messages solicited bulk email senders usually check challenges mail however bulk email question solicited c/r user could expected added whitelist bulk email solicited definition spam filtered c/r system
[ 3549, 8224, 2887, 519, 6762, 8202, 8337, 6975, 10906, 3323, 6876, 3645, 5407 ]
Test
2,528
4
Safetica_Technologies:safetica technologies safetica technologies european data loss prevention software dlp vendor safetica dlp designed contextual protection data endpoint level blocks erroneous malicious actions might lead sensitive files leaving company safetica also identify wasted costs connected low work productivity ineffective use software licenses wasted print company history goes back 2007 group security professionals led founder jakub mahdal started developing security solutions czech republic 2011 company started using name safetica technologies introduced first version product called safetica dlp soon partnered top-class investor ondřej tomek put 1,000,00 research development got first customers abroad 2013 safetica started distribution markets asia middle east 2015 safetica technologies received 1,500,000 investment product development petr žikeš became new ceo 2016 company partnered global antivirus company eset bundle products antivirus products means safetica distributed throughout global sales network covering 180 countries
[ 3629, 10245, 131, 2213 ]
None
2,529
3
Memory_barrier:memory barrier memory barrier also known membar memory fence fence instruction type barrier instruction causes central processing unit cpu compiler enforce ordering constraint memory operations issued barrier instruction typically means operations issued prior barrier guaranteed performed operations issued barrier memory barriers necessary modern cpus employ performance optimizations result out-of-order execution reordering memory operations loads stores normally goes unnoticed within single thread execution cause unpredictable behaviour concurrent programs device drivers unless carefully controlled exact nature ordering constraint hardware dependent defined architecture memory ordering model architectures provide multiple barriers enforcing different ordering constraints memory barriers typically used implementing low-level machine code operates memory shared multiple devices code includes synchronization primitives lock-free data structures multiprocessor systems device drivers communicate computer hardware program runs single-cpu machine hardware performs necessary bookkeeping ensure program executes memory operations performed order specified programmer program order memory barriers necessary however memory shared multiple devices cpus multiprocessor system memory-mapped peripherals out-of-order access may affect program behavior example second cpu may see memory changes made first cpu sequence differs program order following two-processor program gives example out-of-order execution affect program behavior initially memory locations codice_1 codice_2 hold value codice_3 program running processor 1 loops value codice_2 zero prints value codice_1 program running processor 2 stores value codice_6 codice_1 stores value codice_8 codice_2 pseudo-code two program fragments shown steps program correspond individual processor instructions processor 1 processor 2 one might expect print statement always print number 42 however processor 2 store operations executed out-of-order possible codice_2 updated codice_1 print statement invoked come loop similarly processor 1 load operations may executed out-of-order possible codice_1 read codice_2 checked print statement might therefore print unexpected value programs neither situations acceptable memory barrier inserted processor 2 assignment codice_2 ensure new value codice_1 visible processors prior change value codice_2 another inserted processor 1 access codice_1 ensure value codice_1 read prior seeing change value codice_2 another example driver performs following sequence processor store operations executed out-of-order hardware module may triggered data ready memory another illustrative example non-trivial one arises actual practice see double-checked locking multithreaded programs usually use synchronization primitives provided high-level programming environment java .net framework application programming interface api posix threads windows api synchronization primitives mutexes semaphores provided synchronize access resources parallel threads execution primitives usually implemented memory barriers required provide expected memory visibility semantics environments explicit use memory barriers generally necessary api programming environment principle high-level memory model defines memory visibility semantics although programmers usually need use memory barriers high level environments important understand memory visibility semantics extent possible understanding necessarily easy achieve memory visibility semantics always consistently specified documented programming language semantics defined different level abstraction machine language opcodes programming environment memory model defined different level abstraction hardware memory model important understand distinction realize always simple mapping low-level hardware memory barrier semantics high-level memory visibility semantics particular programming environment result particular platform implementation posix threads may employ stronger barriers required specification programs take advantage memory visibility implemented rather specified may portable memory barrier instructions address reordering effects hardware level compilers may also reorder instructions part program optimization process although effects parallel program behavior similar cases general necessary take separate measures inhibit compiler reordering optimizations data may shared multiple threads execution note measures usually necessary data protected synchronization primitives discussed prior section c c++ volatile keyword intended allow c c++ programs directly access memory-mapped i/o memory-mapped i/o generally requires reads writes specified source code happen exact order specified omissions omissions reorderings reads writes compiler would break communication program device accessed memory-mapped i/o c c++ compiler may omit reads writes volatile memory locations may reorder read/writes relative actions volatile location variable keyword volatile guarantee memory barrier enforce cache-consistency therefore use volatile alone sufficient use variable inter-thread communication systems processors c c++ standards prior c11 c++11 address multiple threads multiple processors usefulness volatile depends compiler hardware although volatile guarantees volatile reads volatile writes happen exact order specified source code compiler may generate code cpu may re-order execution volatile read write reordered regard non-volatile reads writes thus limiting usefulness inter-thread flag mutex preventing compiler specific compilers like gcc reorder operations around in-line assembly code volatile memory tags like asm volatile memory see examples compiler memory barrier moreover guaranteed volatile reads writes seen order processors cores due caching cache coherence protocol relaxed memory ordering meaning volatile variables alone may even work inter-thread flags mutexes
[ 4616, 9224, 3082, 5139, 10780, 10785, 6180, 5677, 8242, 9266, 4161, 9794, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 5754, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 2224, 10933, 5815, ...
Test
2,530
3
Dual_format:dual format dual format technique used allow two completely different systems software reside disk term used amiga atari st platform indicate disk could inserted either machine would still boot run secret behind lies special layout first track disk contained amiga atari st bootsector time fooling operating system think track resolved format expected games used technique three produced eclipse software design stone age monster business lethal xcess st/amiga format magazine also used technique coverdisks amiga pc dual-format games also existed like budget version rick dangerous game 3d pool even contained tri-format disk contained amiga atari st pc versions game dual tri-format disks implemented using technology developed rob computing recently dual format come identify software distributed single disk includes windows macintosh versions installation program list dual format floppy disk titles
[ 1801, 8300, 6797, 6129, 10328, 2811 ]
None
2,531
5
Security_Parameter_Index:security parameter index security parameter index spi identification tag added header using ipsec tunneling ip traffic tag helps kernel discern two traffic streams different encryption rules algorithms may use spi per rfc 2401 required part ipsec security association sa enables receiving system select sa received packet processed spi local significance since defined creator sa spi generally viewed opaque bit string however creator sa may interpret bits spi facilitate local processing works like port numbers tcp udp connections means could different sas used provide security one connection sa could therefore act set rules carried encapsulating security payload esp header authentication header ah length 32 bits
[ 10908, 3742 ]
Test
2,532
5
Cell_Loss_Priority:cell loss priority cell loss priority clp flag bit atm cell header determines probability cell discarded network becomes congested cells clp 0 insured traffic unlikely dropped cells clp 1 best-effort traffic may discarded congested conditions order free resources handle insured traffic clp used control network traffic policing mechanism policing process determines cells meet predefined restrictions enter atm network restrictions include traffic rates burst sizes agreed upon customer network provider
[ 2912, 835 ]
Test
2,533
3
Burroughs_B1700:burroughs b1700 burroughs b1000 series series mainframe computers built burroughs corporation originally introduced 1970s continued software development 1987 series consisted three major generations b1700 b1800 b1900 series machines also known burroughs small systems contrast burroughs large systems b5000 b6000 b7000 b8000 burroughs medium systems b2000 b3000 b4000 much original research b1700 initially codenamed plp proper language processor program language processor done burroughs pasadena plant production b1700s began mid-1970s occurred santa barbara liege belgium plants majority design work done santa barbara b1830 notable exception designed liege b1000 distinguished machines writeable control store allowing machine emulate machine burroughs mcp master control program would schedule particular job run mcp would preload interpreter whatever language required interpreters presented different virtual machines cobol fortran etc notable idea semantic gap ideal expression solution particular programming problem real physical hardware illustrated inefficiency current machine implementations three burroughs architectures represent solving problem building hardware aligned high-level languages so-called language-directed design contemporary term today often called high-level language computer architecture large systems stack machines efficiently executed algol medium systems b2000 3000 b4000 aimed business world executing cobol thus everything done bcd including addressing memory b1000 series perhaps universal solution perspective used idealized virtual machines language actual hardware built enhance capability perhaps obvious examples bit-addressable memory variable size arithmetic logic unit alu ability data register instruction register allowing efficient instruction parsing another feature machine language appearance output alu appear different addressable registers x+y x-y two read-only registers within machine language one concession fact burroughs primarily supplier business thus running cobol availability bcd arithmetic alu internally machines employed 16-bit instructions 24-bit data path bit addressable memory supported mix quite efficiently internally later generation memories stored data 32-bit boundaries capable reading across boundary supplying merged result initial hardware implementations built ctl family originally made fairchild semiconductor introduction b1955 1979 series employed popular readily obtainable ttl logic family b1955 control logic implemented proms muxes b1965 last series implemented pair microcode sequencers stayed lock step majority instructions executed single cycle first cycle decoded fplas using 16 inputs perfect size 16-bit instruction word 48 min-terms successive cycles multi-cycle instruction sourced proms fplas prom outputs wired together fpla would drive output first cycle get tri-stated proms would drive control lines completion instruction i/o system b1000 series consisted 24-bit data path control strobes peripherals cpu would place data data path inform peripheral data present many peripheral adapters fairly simplistic cpu actually drove adapter state machines operations successive accesses later models machines 1800 1900 series could configured either single dual processor tightly coupled machines competed access main memory b1955 b1965 could accommodate four processors memory bus least one would assigned multi-line adapter supplied serial i/o system dual-processor configurations ever actually sold multi-line capable driving multiple 19.2kb rs485 serial lines multi-drop configuration serial i/o polled given terminal would wait addressed grab line send data pending multi-line adapter would dma data main memory linked list format consequently processors n't deal serial i/o interrupt issues taken care fact block mode terminals type supported b1000 series could address maximum 2 megabytes memory days multiple gigabytes sounds fairly limiting commercial installations got hundreds kilobytes storage
[ 512, 8001, 2243, 3716, 7173, 1702, 2477, 3886, 4465, 2002, 5714, 9714, 11059, 3960, 2811 ]
Validation
2,534
6
File_deletion:file deletion file deletion way removing file computer file system examples reasons deleting files operating systems include commands deleting files rm unix era cp/m dr-dos del/erase ms-dos/pc dos dr-dos microsoft windows etc. file managers also provide convenient way deleting files files may deleted one-by-one whole directory tree may deleted common problem deleting files accidental removal information later proves important one way deal back files regularly erroneously deleted files may found archives another technique often used delete files instantly move temporary directory whose contents deleted recycle bin trash works microsoft windows apple macos well linux distributions employ strategy ms-dos one use undelete command ms-dos deleted files really deleted marked deleted—so could undeleted time disk blocks used eventually taken files data recovery programs work scanning files marked deleted space freed per byte rather per file sometimes cause data recovered incompletely defragging drive may prevent undeletion blocks used deleted file might overwritten since marked empty another precautionary measure mark important files read-only many operating systems warn user trying delete files file system permissions exist users lack necessary permissions able delete files preventing erasure people work critical system files unix-like operating systems order delete file one must usually write permission parent directory file common problem sensitive data deleted files really erased may recovered interested parties file systems remove link data see undelete even overwriting parts disk something else formatting may guarantee sensitive data completely unrecoverable special software available overwrites data modern post-2001 ata drives include secure erase command firmware however high security applications high-security enterprises sometimes require disk drive physically destroyed ensure data recoverable microscopic changes head alignment effects mean even measures guaranteed data encrypted encryption key unavailable crypto-shredding practice 'deleting data deleting overwriting encryption keys
[ 2432, 3972, 2824, 6797, 8729, 9762, 8997, 3366, 1193, 7983, 11695, 178, 7090, 4409, 831, 1475, 7369, 9166, 4435, 10195, 2779, 6494, 1509, 6120, 11368, 5619, 5492, 11251, 9086 ]
None
2,535
3
Berkeley_IRAM_project:berkeley iram project 1996–2004 research project computer science division university california berkeley berkeley iram project explored computer architecture enabled wide bandwidth memory processor made possible designed integrated circuit chip since envisioned chip would consist primarily random-access memory ram smaller part needed central processing unit cpu research team used term intelligent ram iram describe chip architecture like j–machine project mit primary objective research avoid von neumann bottleneck occurs connection memory cpu relatively narrow memory bus separate integrated circuits strong competitive pressures technology employed component computer system—principally cpu memory offline storage—is typically selected minimize cost needed attain given level performance though microprocessor memory implemented integrated circuits prevailing technology used differs microprocessor technology optimizes speed memory technology optimizes density reason integration memory processor chip part limited static random-access memory sram may implemented using circuit technology optimized logic performance rather denser lower-cost dynamic random-access memory dram microprocessor access off-chip memory costs time power however significantly limiting processor performance reason computer architecture employing hierarchy memory systems developed static memory integrated microprocessor temporary easily accessible storage cache data also retained off-chip dram since on-chip cache memory redundant presence adds cost power purpose iram research project find computing applications better trade-off cost performance could achieved architecture dram integrated on-chip processor thus eliminating need redundant static memory cache—even though technology used optimum dram implementation fair say berkeley iram achieve recognition berkeley risc received iram project nevertheless influential although initial iram proposals focused trade-offs cpu dram iram research came concentrate vector instruction sets publications early advocates incorporation vector processing vector instruction sets microprocessors several commercial microprocessors intel avx subsequently adopted vector processing instruction set extensions
[ 1376, 833, 9932, 10285, 2383, 1776, 4144 ]
None
2,536
7
Aiyara_cluster:aiyara cluster aiyara cluster low-powered computer cluster specially designed process big data aiyara cluster model considered specialization beowulf cluster sense aiyara also built commodity hardware inexpensive personal computers system-on-chip computer boards unlike beowulf applications aiyara cluster scoped big data area scientific high-performance computing another important property aiyara cluster low-power must built class processing units produces less heat name aiyara originally referred first arm-based cluster built wichai srisuruk chanwit kaewkasi suranaree university technology name aiyara came thai word literally elephant reflect underneath software stack apache hadoop like beowulf aiyara cluster define particular software stack run atop cluster normally runs variant linux operating system commonly used big data software stacks apache hadoop apache spark report aiyara hardware successfully processed non-trivial amount big data published proceedings icsec 2014 aiyara mk-i second aiyara cluster consists 22 cubieboards first known soc-based arm cluster able process big data successfully using spark hdfs stack aiyara cluster model technical description explaining build aiyara cluster later published chanwit kaewkasi dzone 2014 big data guide results cluster optimization techniques make cluster processing rate boost 0.9 gb/min still preserve low-power consumption reported proceeding ieee tencon 2014
[ 785, 7699, 7963, 6815, 5798, 9126, 6184, 2345, 4909, 7218, 8501, 823, 5948, 4286, 2113, 8514, 5956, 4423, 1480, 330, 1866, 8523, 4308, 344, 2264, 731, 2140, 11487, 4194, 5090, 7142, 8810, 9964, 7802, 508, 3197, 8447 ]
Test
2,537
9
Language_workbench:language workbench language workbench tool set tools enables software development language-oriented programming software development paradigm language workbench typically include tools support definition reuse composition domain-specific languages together integrated development environment language workbenches introduced popularized martin fowler 2005 language workbenches usually support
[ 7777, 4293, 9926, 2666, 1552, 11475, 6581 ]
None
2,538
4
Brain_Test:brain test brain test piece malware masquerading android app tested users iq brain test discovered security firm check point available google play app store 15 september 2015 check point described brain test new level sophistication malware brain test uploaded two separate occasions com.zmhitlte.brain com.mile.brain starting august 2015 times google bouncer failed detect malware first removal 24 august 2015 software reintroduced using obfuscation technique tim erin tripwire said bypassing vetting processes apple google keystone mobile malware campaign malware turned include rootkit revelation described cunning first thought malware thought written chinese actor according shaulov check point based use packing/obfuscation tool baidu eleven paths telefonica-owned company found links may pieces malware based id used access umeng internet domains accessed apps shared jpg png images appears app first detected nexus 5 using check point mobile threat prevention system fact system unable remove malware alerted software company researchers unusual threat according check point may necessary re-flash rom device brain test successfully installed reinstaller system directory malware uploaded two forms packing feature present second
[ 9800, 4649, 5261, 8668, 1299, 3353, 7515, 700, 8413, 9791 ]
Test
2,539
4
Managed_security_service:managed security service computing managed security services mss network security services outsourced service provider company providing service managed security service provider mssp roots mssps internet service providers isps mid late 1990 ’ initially isp would sell customers firewall appliance customer premises equipment cpe additional fee would manage customer-owned firewall dial-up connection according recent industry research organizations 74 manage security in-house 82 professionals said either already partnered plan partner managed security service provider businesses turn managed security services providers alleviate pressures face daily related information security targeted malware customer data theft skills shortages resource constraints managed security services mss also considered systematic approach managing organization security needs services may conducted in-house outsourced service provider oversees companies network information system security functions managed security service include round-the-clock monitoring management intrusion detection systems firewalls overseeing patch management upgrades performing security assessments security audits responding emergencies products available number vendors help organize guide procedures involved diverts burden performing chores manually considerable away administrators industry research firm forrester research identified 14 significant vendors global market 2018 23-criteria evaluation managed security service providers mssps -- identifying accenture ibm dell secureworks trustwave verizon deloitte wipro others leaders mssp market newcomers market include number smaller providers used protect homes small business high networth clients early example outsourced off-site mssp service us west nteract internet security security service ’ require customer purchase equipment security equipment installed customers premises service considered mssp offering us west retained ownership firewall equipment firewalls operated internet point presence pop service based check point firewall-1 equipment following year long beta introduction period service generally available early 1997 service also offered managed virtual private networking vpn encryption security launch customized assistance assessment business risks key business requirements security development security policies processes may include comprehensive security architecture assessments design include technology business risks technical risks procedures consulting may also include security product integration on-site mitigation support intrusion occurred including emergency incident response forensic analysis service involves installing upgrading managing firewall virtual private network vpn and/or intrusion detection hardware software electronic mail commonly performing configuration changes behalf customer management includes monitoring maintaining firewall traffic routing rules generating regular traffic management reports customer intrusion detection management either network level individual host level involves providing intrusion alerts customer keeping date new defenses intrusion regularly reporting intrusion attempts activity content filtering services may provided email filtering data traffic filtering clearly managed service product resale major revenue generator many mss providers category provides value-added hardware software variety security-related tasks one service may provided archival customer data day-to-day monitoring interpretation important system events throughout network—including unauthorized behavior malicious hacks denial service dos anomalies trend analysis first step incident response process includes one-time periodic software scans hacking attempts order find vulnerabilities technical logical perimeter generally assess security throughout network accurately reflect personnel-related exposures due disgruntled employees social engineering etc regularly reports given client includes monitoring event logs intrusions change management service identify changes system violate formal security policy example rogue administrator grants much access system short measures compliance technical risk model decision criteria engaging services mssp much form outsourcing cost-effectiveness compared in-house solutions focus upon core competencies need round-the-clock service ease remaining up-to-date important factor specific mss outsourcing network security hands critical control company infrastructure outside party mssp whilst relieving ultimate responsibility errors client mssp still ultimate responsibility security must prepared manage monitor mssp hold accountable services contracted relationship mssp client turnkey one although organization remains responsible defending network information security related business risks working mssp allows organization focus core activities remaining protected network vulnerabilities business risks result information assets upon business depends securely configured managed resulting asset compromise due violations confidentiality availability integrity compliance specific government-defined security requirements achieved using managed security services business model behind managed security services commonplace among large enterprise companies security experts model later adapted fit medium-sized smaller companies smbs organizations 500 employees 100 employee one site value-added reseller var community either specializing managed security offering extension managed service solutions smbs increasingly turning managed security services number reasons chief among specialized complex highly dynamic nature security growing number regulatory requirements obliging businesses secure digital safety integrity personal information financial data held transferred via computer networks whereas larger organizations typically employ specialist department organizations smaller scale distributed location businesses medical dental offices attorneys professional services providers retailers typically employ full-time security specialists although frequently employ staff external consultants organizations many constrained budget limitations address combined issues lack expertise lack time limited financial resources emerging category managed security service provider smb arisen organizations across sectors shifting managed security services traditional in-house security practices trend outsourcing security jobs managed security services vendors picking appreciable pace also helps enterprises focus core business activities strategic approach effective management cost-effectiveness seamless monitoring major drivers fueling demand services increase participation leading companies worldwide end user enterprises gaining confidence outsourcing security services providers category tend offer comprehensive security services delivered remotely managed appliances devices simple install run part background fees normally highly affordable reflect financial constraints charged monthly basis flat rate ensure predictability costs service providers deliver daily weekly monthly exception-based reporting depending client ’ requirements security tuning firewall tuning/ ids tuning/ siem tuning today security become power weapon cyberattacks become highly sophisticated enterprises toil keep par new malware deviant e-mail spoofing fraud gambit among different prominent players managed security service provider observe growing need combat increasingly complicated intended attacks response vendors busy enhancing sophistication solution many cases winning security expert expand portfolio besides increasing regulatory compliance associated protection citizen ’ data worldwide likely stimulate enterprises ensure high data-security level frontrunners engaging managed security services financial services telecom information technology etc maintain competitive edge mss vendors focusing refining product offering technologies deployed clients another crucial factor profitability remains capability lower cost yet generate revenue avoiding deployment additional tools simplifying service creation integration products ensures unprecedented visibility well integration besides mss market would witness tremendous growth regions north america europe asia –pacific latin america middle east africa
[ 2953, 5774, 5245, 8998, 939, 3629, 7352, 10574, 10196, 7515, 8668, 9053, 94, 11611, 3941, 5749, 4471, 3323, 5373, 2558 ]
Test
2,540
3
Dig_Dug:dig dug dig dug programmed shouichi fukatani worked many namco earlier arcade titles designed junior colleagues galaga creator shigeru yokoyama music composed yuriko keino becoming first game worked namco — short jingle made character moved made executives wanted walking sound game described strategic digging game namco large amount strategy used defeat enemies heavily used game marketing upon release dig dug well-received critics addictive gameplay cute characters strategy popular title golden age arcade video games met long series sequels spin-offs several platforms alongside ports home consoles digital storefronts dig dug also included many namco video game compilations number systems characters game appear throughout mr. driller series based dig dug gameplay dig dug maze video game controlling titular character player objective eliminate enemies screen pookas red tomato-like creatures comically large goggles fygars green dragons breathe fire dig dug defeat enemies using bike pump inflate air explode crushing large falling rocks bonus points awarded squashing multiple enemies single rock dropping two rocks stage cause bonus item appear middle screen eaten points enemies defeated dig dug progress next stage enemies travel solid dirt reach player eyes shown inflated enemies pose threat player allowing dig dug pass without harm game play short jingle dig dug moves abruptly stopping becomes idle player takes long clear stage enemies become faster much aggressive indicated short jingle stages indicated number flowers placed top screen later stages feature variations color dirt increasing movement speed enemies dig dug first released japan namco april 19 1982 later released north america europe atari inc. later year game programmed shouichi fukatani worked many company earlier arcade titles died 1985 ran namco galaga arcade system modified shigeichi ishimura described namco strategic digging game amount strategy used defeat enemies heavily used game marketing music composed yuriko keino first video game namco worked — idea music played character moved inspired development team want add walking sound player instead replaced short jingle many developers junior colleagues galaga creator shigeru yokoyama helped supervise project first home conversion dig dug released atari 2600 1983 developed published atari followed versions atari 5200 colecovision atari 8-bit family commodore 64 apple ii japan game ported casio pv-1000 1983 later msx 1984 nintendo family computer 1985 gakken produced handheld lcd tabletop game 1983 replaced dig dug air pump flamethrower accommodate hardware limitations namco released game boy conversion north america 1992 featured all-new game called new dig dug player must collect keys open exit door — version later included 1996 japan-only compilation namco gallery vol 3 also included galaxian tower druaga famista 4 japanese sharp x68000 version developed dempa released 1995 bundled dig dug ii dig dug included several namco video game compilations including namco museum vol 3 1996 namco museum 64 1999 namco museum 50th anniversary 2005 namco museum remix 2007 namco museum essentials 2009 namco museum switch 2017 game released digitally xbox live arcade 2006 featuring support online leaderboards achievements added xbox one backwards compatibility lineup 2016 version japanese wii virtual console released 2009 dig dug also included bonus game pac-man party alongside arcade versions pac-man galaga dig dug critical commercial success upon release praised strategy gameplay character designs sold 22,228 arcade units north america end 1982 grossing us 46.3 million revenue popular title golden age arcade video games american publication blip magazine favorably compared games pac-man defender simple controls fun gameplay allgame called arcade nes classic praising characters gameplay unique premise easily translatable home platforms japanese magazine gamest called one greatest arcade games time 1998 applauding addictiveness breaking traditional dot-eater gameplay used titles pac-man rally-x 2007 retrospective eurogamer praised perfect gameplay strategy saying one memorable legendary videogame releases past 30 years killer list videogames rated six popular coin-op game website electronic fun computers games praised atari 8-bit version retaining entertaining gameplay arcade version simple controls reviewing xbox live arcade digital re-release ign liked presentation leaderboards achievements noting still extremely fun addicting game recommending fans original newcomers gamespot similar response praising xbla version colorful artwork retaining original arcade gameplay eurogamer applauded game addictiveness still holding years release home versions game would receive criticism quality lack exclusive content readers softline magazine ranked dig dug tenth-worst apple ii fourth-worst atari 8-bit video game 1983 subpar quality living consumer expectations eurogamer ign gamespot criticized xbla conversion lack online multiplayer achievements easy unlock eurogamer particular criticizing game controls sometimes unresponsive dig dug met long series sequels several platforms first dig dug ii released 1985 less successful game opted overhead perspective instead digging earth dig dug drills along fault lines sink pieces island ocean 1996 remake game dig dug arrangement released arcades alongside original namco classic collection vol 2 arcade collection added new enemies music power-ups boss fights two-player co-operative play 3d followup titled dig dug deeper published infogrames 2001 windows nintendo ds sequel released 2005 combining elements first two games adding narrative link mr. driller series massively-multiplayer online game dig dug island publicly released 2008 online version dig dug ii game lasted year servers shuttered 2009 two dig dug -themed slot machines produced japanese company oizumi 2003 small lcd monitors featuring animations dig dug characters webcomic adaptation game produced 2012 shiftylook subsidiary bandai namco focused reviving older namco game franchises drawn several different artists lasting nearly 200 issues concluding 2014 following closure shiftylook character dig dug renamed taizo hori play japanese phrase horitai zo meaning want dig would become prominent character namco mr. driller series retconned father susumu hori married baraduke protagonist masuyo tobi would divorce unknown reasons taizo appears playable character namco super wars wonderswan color namco × capcom playstation 2 released japan taizo appears now-defunct web browser game namco high principal titular high school simply known president dig dug pookas would appear several namco video games including sky kid 1985 pac-man world 1999 pro baseball famista ds 2011 2011 super smash bros. nintendo 3ds wii u 2014
[ 11522, 1060, 9093, 9006, 10287, 1776, 10544, 10066, 10931, 6452, 5717, 8663, 5753, 3039 ]
None
2,541
9
Southampton_BASIC_System:southampton basic system southampton basic system sobs dialect basic programming language developed used ict 1900 series computers late 1960s early 1970s implemented minimop operating system university southampton also ran maximop operated teletype terminal though crt terminals could also used common many early implementations basic sobs needed lines line numbers allow user add new lines program desired place also targets codice_1 codice_2 statements codice_3 facility available allow sections code renumbered default increments 10 allow space middle program line numbers numeric values represented internally floating point language relatively statements comparison modern programming languages note particular lack codice_4-like statement codice_5 looping construct available programmers variable names numeric values either single letter single letter followed single numeric digit thus allowing 286 discreet variables total strings supported variable names restriction followed pound codice_6 symbol limited number numeric functions provided took one numeric parameter support strings limited one function codice_7 returned length string parameter sub-strings supported square brackets codice_8 referred sub-string string codice_9 2nd character 3rd character inclusive would print codice_10 syntax also supported left-hand side assignment would print codice_11 support handling arrays data relatively strong codice_12 statements able read entire array codice_13 statements perform useful matrix operations matrix addition matrix subtraction matrix multiplication finding inverse matrix square matrix example output would sobs primitive debugging capabilities limited mostly codice_14 statement codice_15 would cause interpreter print line number executed
[ 3718, 3594, 7691, 1805, 9997, 786, 11412, 406, 22, 3736, 3481, 9881, 797, 3233, 11683, 5925, 8101, 4136, 10666, 8494, 303, 7343, 11315, 315, 7355, 7486, 7870, 4160, 4674, 10750, 712, 847, 5455, 1879, 92, 11229, 5730, 2915, 9188, 5733, 1...
Validation
2,542
4
NSO_Group:nso group nso group technologies israeli technology firm focused cyber intelligence founded 2010 niv carmi omri lavie shalev hulio reportedly employs around 500 people based herzliya near tel aviv annual revenues said around 40 million 2013 150 million 2015 june 2017 company put sale 1 billion francisco partners management founders lavie hulio partnering european private equity fund novalpina capital purchased majority stake nso february 2019 according company nso provides authorized governments technology helps combat terror crime claims software created nso group used targeted attacks human rights activists journalists several countries nso founders said ex-members unit 8200 israeli intelligence corps unit responsible collecting signals intelligence company start-up funding came group investors headed eddy shalev partner venture capital fund genesis partners group invested total 1.8 million dollars 30 stake 2012 government mexico announced signing 20 million contract nso 2015 company reportedly sold surveillance technology government panama contract became subject panamanian anti-corruption investigation following disclosure leak confidential information italian firm hacking team 2014 american private equity firm francisco partners bought company 130 million reported 2015 francisco seeking sell company 1 billion company officially put sale 1 billion june 2017 roughly ten times francisco originally paid 2014 february 14 2019 francisco partners sold 60 majority stake nso back co-founders shalev hulio omri lavie supported purchase novalpina capital hulio lavie invested 100 million novalpina acquiring remaining portion majority stake thus valuing company approximately 1 billion day acquisition novalpina attempted address concerns raised citizen lab letter stating belief nso operates sufficient integrity caution april 2019 nso froze deals saudi arabia scandal alleging nso software role tracking slain journalist jamal khashoggi months death may 2019 exploit whatsapp alleged developed nso whatsapp told financial times broke news attack hallmarks private company known work governments deliver spyware reportedly takes functions mobile phone operating systems nso denied involvement selecting targeting victims explicitly denied creating exploit august 25 2016 citizen lab lookout revealed software known pegasus created nso used target human rights activist ahmed mansoor united arab emirates mansoor informed citizen lab researchers bill marczak john scott-railton iphone 6 targeted august 10 2016 means clickable link sms text message analysis citizen lab lookout discovered link downloaded software exploit three previously unknown unpatched zero-day vulnerabilities ios according analysis software jailbreak iphone malicious url opened form attack known spear phishing software installs collects communications locations targeted iphones including communications sent imessage gmail viber facebook whatsapp telegram skype software also collect wi-fi passwords researchers noticed software code referenced nso group product called pegasus leaked marketing materials pegasus previously come light leak records hacking team indicated software supplied government panama 2015 researchers claim mexican journalist rafael cabrera also targeted software could used israel turkey thailand qatar kenya uzbekistan mozambique morocco yemen hungary saudi arabia nigeria bahrain citizen lab lookout notified apple security team patched flaws within ten days released update ios patch macos released six days later 2017 citizen lab researchers revealed nso exploit links may sent mexican scientists public health campaigners targets supported measures reduce childhood obesity including mexico soda tax july 2017 international team assembled investigate 2014 iguala mass kidnapping publicly complained thought surveilled mexican government claim mexican government used pegasus send messages funeral homes containing links clicked allowed government surreptitiously listen investigators mexican government repeatedly denied unauthorized hacking june 2018 israeli court indicted former employee nso group allegedly stealing copy pegasus attempting sell online 50 million worth cryptocurrency december 2018 new york times investigation concluded pegasus software played role murder jamal khashoggi friend khashoggi claimed filing saudi authorities used israeli-made software spy dissident citizen lab researchers reported october 2018 targeted undercover operatives connected nso citizen lab previously reported use nso software spy inner circle jamal khashoggi murder citizen lab october report revealed nso signature spy software placed iphone saudi dissident omar abdulaziz one khashoggi ’ confidantes months abdulaziz claimed software revealed khashoggi private criticisms saudi royal family abdulaziz claimed played major role kashoggi death ap report incident could find direct evidence connecting operative surveillance citizen lab ’ researchers nso nso denied involvement phone joaquín guzmán known el chapo hacked using nso software 2011 mexican president felipe calderón reportedly called nso thank company role guzmán capture
[ 1024, 5636, 4117, 8726, 535, 9761, 4644, 4133, 6186, 1608, 3657, 8779, 4703, 8288, 8292, 10875, 3711, 8320, 5764, 2187, 4240, 1688, 2717, 9375, 2734, 9904, 9395, 8886, 7869, 3789, 4304, 3286, 4314, 9435, 4318, 3807, 4830, 5349, 1254, 1047...
Test
2,543
7
Casebook_PBC:casebook pbc casebook pbc us cloud computing public-benefit corporation headquartered new york city incubated annie e. casey foundation company initially developed child welfare solutions since expanded provide saas platform servicing whole human services casebook initially started project annie e. casey foundation leadership kathleen feely vice-president innovation foundation early success private service providers software spun non-profit organization known case commons 2012 indiana department child services first state agency implement casebook mobile web-based solution child welfare caseworkers effort led organization receiving design experience award 2014 code america technology award 2015 2017 organization helped state california child welfare digital services agency learn build ship software year leadership new ceo tristan louis casebook pbc entered national partnership kpmg allowing kpmg leverage casebook platform exclusive solution child welfare vertical rebranded case commons casebook pbc company offers casebook platform set core components used variety human services software developments historical background child welfare space company also offers suite applications put together allow states assemble ccwis-ready child welfare system official company site casebook pbc certified b-corp
[ 4194 ]
Test
2,544
1
Query_optimization:query optimization query optimization function many relational database management systems query optimizer attempts determine efficient way execute given query considering possible query plans generally query optimizer accessed directly users queries submitted database server parsed parser passed query optimizer optimization occurs however database engines allow guiding query optimizer hints query request information database simple finding address person ss 123-45-6789 complex like finding average salary employed married men california ages 30 39 earn less wives queries results generated accessing relevant database data manipulating way yields requested information since database structures complex cases especially not-very-simple queries needed data query collected database accessing different ways different data-structures different orders different way typically requires different processing time processing times query may large variance fraction second hours depending way selected purpose query optimization automated process find way process given query minimum time large possible variance time justifies performing query optimization though finding exact optimal way execute query among possibilities typically complex time consuming may costly often practically impossible thus query optimization typically tries approximate optimum comparing several common-sense alternatives provide reasonable time good enough plan typically deviate much best possible result trade-off amount time spent figuring best query plan quality choice optimizer may choose best answer different qualities database management systems different ways balancing two cost-based query optimizers evaluate resource footprint various query plans use basis plan selection assign estimated cost possible query plan choose plan smallest cost costs used estimate runtime cost evaluating query terms number i/o operations required cpu path length amount disk buffer space disk storage service time interconnect usage units parallelism factors determined data dictionary set query plans examined formed examining possible access paths e.g. primary index access secondary index access full file scan various relational table join techniques e.g. merge join hash join product join search space become quite large depending complexity sql query two types optimization consist logical optimization—which generates sequence relational algebra solve query—and physical optimization—which used determine means carrying operation query optimizers represent query plans tree plan nodes plan node encapsulates single operation required execute query nodes arranged tree intermediate results flow bottom tree top node zero child nodes—those nodes whose output fed input parent node example join node two child nodes represent two join operands whereas sort node would single child node input sorted leaves tree nodes produce results scanning disk example performing index scan sequential scan performance query plan determined largely order tables joined example joining 3 tables b c size 10 rows 10,000 rows 1,000,000 rows respectively query plan joins b c first take several orders-of-magnitude time execute one joins c first query optimizers determine join order via dynamic programming algorithm pioneered ibm system r database project algorithm works two stages sort order avoid redundant sort operation later processing query second particular sort order speed subsequent join clusters data particular way sql query modern relational dbms selections joins particular sql queries often nest several layers spj blocks select-project-join means group exists exists operators cases nested sql queries flattened select-project-join query always query plans nested sql queries also chosen using dynamic programming algorithm used join ordering lead enormous escalation query optimization time database management systems use alternative rule-based approach uses query graph model one hardest problems query optimization accurately estimate costs alternative query plans optimizers cost query plans using mathematical model query execution costs relies heavily estimates cardinality number tuples flowing edge query plan cardinality estimation turn depends estimates selection factor predicates query traditionally database systems estimate selectivities fairly detailed statistics distribution values column histograms technique works well estimation selectivities individual predicates however many queries conjunctions predicates query predicates often highly correlated example codice_1 implies codice_2 hard estimate selectivity conjunct general poor cardinality estimates uncaught correlation one main reasons query optimizers pick poor query plans one reason database administrator regularly update database statistics especially major data loads/unloads classical query optimization assumes query plans compared according one single cost metric usually execution time cost query plan calculated without uncertainty assumptions sometimes violated practice multiple extensions classical query optimization studied research literature overcome limitations extended problem variants differ model cost single query plans terms optimization goal classical query optimization associates query plan one scalar cost value parametric query optimization assumes query plan cost depends parameters whose values unknown optimization time parameters instance represent selectivity query predicates fully specified optimization time provided execution time parametric query optimization therefore associates query plan cost function maps multi-dimensional parameter space one-dimensional cost space goal optimization usually generate query plans could optimal possible parameter value combinations yields set relevant query plans run time best plan selected set true parameter values become known advantage parametric query optimization optimization general expensive operation avoided run time often cost metrics addition execution time relevant compare query plans cloud computing scenario instance one compare query plans terms much time take execute also terms much money execution costs context approximate query optimization possible execute query plans randomly selected samples input data order obtain approximate results reduced execution overhead cases alternative query plans must compared terms execution time also terms precision reliability data generate multi-objective query optimization models cost query plan cost vector vector component represents cost according different cost metric classical query optimization considered special case multi-objective query optimization dimension cost space i.e. number cost vector components one different cost metrics might conflict e.g. might one plan minimal execution time different plan minimal monetary execution fees cloud computing scenario therefore goal optimization find query plan minimizes cost metrics must find query plan realizes best compromise different cost metrics best compromise depends user preferences e.g. users might prefer cheaper plan others prefer faster plan cloud scenario goal optimization therefore either find best query plan based specification user preferences provided input optimizer e.g. users define weights different cost metrics express relative importance define hard cost bounds certain metrics generate approximation set pareto-optimal query plans i.e. plans plan better cost according metrics user select preferred cost tradeoff plan set multi-objective parametric query optimization generalizes parametric multi-objective query optimization plans compared according multiple cost metrics plan costs may depend parameters whose values unknown optimization time cost query plan therefore modeled function multi-dimensional parameter space multi-dimensional cost space goal optimization generate set query plans optimal possible combination parameter values user preferences
[ 10632, 8201, 8979, 2068, 10389, 7446, 10899, 2456, 1049, 4376, 5403, 5658, 9112, 10137, 4255, 9248, 9631, 9634, 1447, 2344, 4263, 7080, 10793, 10413, 10286, 9397, 3004, 1341, 7868, 11324, 10048, 2369, 5953, 6850, 2246, 9286, 2632, 11030, 92...
Test
2,545
6
Fdisk:fdisk computer file systems fdisk command-line utility provides disk partitioning functions available dos dr flexos ibm os/2 microsoft windows operating systems certain ports freebsd netbsd openbsd dragonfly bsd macos compatibility reasons versions windows nt operating system line windows 2000 onwards replaced advanced tool called codice_1 similar utilities exist unix-like systems example bsd disklabel ibm introduced fixed disk setup program version 1.00 march 1983 release ibm pc/xt first pc store data hard disk ibm personal computer dos version 2.0 version 1 could used create one fat12 dos partition delete change active partition display partition data writes master boot record supported four partitions three intended operating systems cp/m-86 xenix expected partitioning utilities support august 1984 pc dos 3.0 added fat16 partitions support larger hard disks efficiently april 1987 pc dos/fdisk 3.30 added support extended partitions could hold 23 logical drives volumes ibm pc dos 7.10 contained utilities command available ms-dos versions 3.2 later support fat16b added compaq ms-dos 3.31 later became available ms-dos/pc dos 4.0 dos programs including program came original windows 95 capable creating fat partitions types fat12 fat16 fat16b derivative ms-dos provided windows 95 windows 98 later windows versions shipping windows 95b later able manipulate fat32 partitions windows 2000 later use logical disk manager feature well unlike programs operating systems programs dos windows 9x/me alter data partition table also overwrite many sectors data partition however create extended partition partition editor must put extended boot records logical drive disk users must sure correct disk/partition chosen using dos/windows partitioning switch undocumented well known repairing master boot record supplied windows 95 report correct size hard disk larger 64 gb updated available microsoft corrects microsoft named replacement 263044usa8 version 4.72.2811.0 signature may 23 2000 original windows 98 program size smaller updated one os/2 shipped two partition table managers version 4.0 text mode fdisk gui-based fdiskpm two identical functionality manipulate fat partitions advanced hpfs partitions os/2 versions 4.5 higher including ecomstation use jfs filesystem well fat hpfs replace logical volume manager lvm dr dos 6.0 flexos include implementation command implementation freedos free software freedos version developed brian e. reifsnyder paragon technology systems pts-dos 2000 pro includes implementation mach operating system written robert baron ported 386bsd julian elischer implementation used freebsd netbsd dragonfly bsd 2019 well early versions openbsd 1995 1997 openbsd 2.2 tobias weingartner re-wrote 1997 openbsd 2.2 subsequently forked apple computer inc 2002 still used basis macos 2019 native partitions bsd systems traditionally use bsd disklabel partitioning supported certain architectures compatibility reasons addition bsd disklabel mandatory linux maximum number partitions fdisk 60 3 primary partitions 1 extended partition 56 logical partitions
[ 6148, 2568, 8713, 6674, 8729, 4636, 9762, 1071, 9780, 5177, 8266, 7244, 4174, 7249, 9306, 5220, 1637, 1647, 8816, 9839, 8306, 9844, 633, 9343, 8834, 6787, 6281, 652, 6797, 4248, 6297, 3738, 8857, 4771, 2212, 7847, 5293, 178, 1718, 4279, ...
Test
2,546
9
Symbolic_Stream_Generator:symbolic stream generator symbolic stream generator ssg software productivity aid unisys mainframe computers former univac 1100/2200 series ssg used generate run-streams corresponding ibm job control language apply administer symbolic changes program sources form version control many purposes ssg program i.e. job control script called skeleton programming language symstream tool created output streams based interpreting data provided via multiple input sources originally created univac creation operating system os updates later adopted general user community creation complex batch real-time computer processes sources could recursively reference additional sources providing wide flexibility input parsing rules output creation also source files similar levels dynamic input capability interpretation multiple input sources allowed dynamic creation output stream content complex recursive processes could applied create program source code job execution sequences simulated dynamic input virtual consoles general provide scripting capabilities reminiscent unix grep yacc tools
[ 9780 ]
Test
2,547
3
Atari_Panther:atari panther atari panther cancelled 32-bit video game console atari corporation going successor atari 7800 atari xegs developed ex-sinclair team flare technology previously responsible two cancelled console projects flare one konix multisystem panther planned combination atari st atari transputer workstation blossom video hardware work started 1988 planned release 1991 directly compete super nintendo entertainment system sega genesis atari abandoned project favor 64-bit jaguar team flare convinced create 3d graphics hardware instead system features three chips consisting motorola 68000 running 16 mhz object processor called panther ensoniq sound processor called otis featuring 32 sound channels presumably es5505 panther never manufactured design eclipsed jaguar three games planned panther release games later rewritten atari jaguar upon panther demise
[ 1776, 921, 7269 ]
Test
2,548
8
QuickCode:quickcode quickcode formerly scraperwiki web-based platform collaboratively building programs extract analyze public online data wiki-like fashion scraper refers screen scrapers programs extract data websites wiki means user programming experience create edit programs extracting new data analyzing existing datasets main use website providing place programmers journalists collaborate analyzing public data service renamed circa 2016 n't wiki scraping time eponymous parent company renamed 'the sensible code company scrapers created using browser based ide connecting via ssh server running linux programmed using variety programming languages including perl python ruby javascript r. scraperwiki founded 2009 julian todd aidan mcguire initially funded 4ip venture capital arm tv station channel 4 since attracted additional £1 million round funding enterprise ventures francis irving chief executive officer scraperwiki
[ 3462, 8582, 5833, 8554, 2548, 3478, 823, 4187, 9245, 735 ]
Test
2,549
3
AMD_K12:amd k12 k12 amd first custom microarchitecture based armv8-a aarch64 instruction set planned release 2017 predecessor a1100 series also armv8-a used arm cortex-a57 cores product still n't released development arm architectures continuing products planned microarchitecture focus high frequency power efficiency target dense server embedded semi-custom market segments
[ 3586, 8322, 5380, 9092, 6151, 8327, 10375, 5645, 7963, 2719, 5541, 11047, 2094, 6978, 7234, 11080, 2764, 7631, 980, 473, 5356, 1005, 9964, 1137, 3070 ]
Validation
2,550
6
Cfdisk:cfdisk cfdisk linux partition editor similar fdisk different user interface curses part util-linux package linux utility programs originally written 1992 current version 2.29 current cfdisk implementation based libfdisk supports master boot record guid partition table bsd disklabel sgi sun disk labels also provides information partitions content invoked without arguments cfdisk attempts read current partition table disk drive present findings
[ 3969, 546, 10851, 9320, 1801, 10967, 652, 1101, 7534, 1071, 2864, 2545, 8909, 3859, 8147, 823, 10971 ]
Test
2,551
3
Macintosh_512Ke:macintosh 512ke macintosh 512k enhanced 512ke introduced april 1986 cheaper alternative top-of-the-line macintosh plus debuted three months previously macintosh 512k 800k disk drive 128k rom used macintosh plus like predecessors little room expansion companies create memory upgrades brought machine 2 mb earliest macintosh model able run system software 6 also earliest used appleshare server bridge mac communicate modern devices originally case identical predecessor except model number listed rear bucket agency approval label used beige-like color well like macintosh plus 1987 512ke adopted standard apple platinum color well case-front design plus without name though keeping original rear bucket later lifespan 512ke discounted offered educational market badged macintosh ed m0001d later m0001ed 512ke shipped original short macintosh keyboard extended macintosh plus keyboard built-in numeric keypad could purchased optionally version 512ke sold outside north america included full keyboard marketed macintosh 512k/800 later larger keyboard would included standard north america well although 512ke includes 128k roms 800k disk drive mac plus 512ke retains port connectors original mac reason 512ke users hard disk option slower floppy-port-based hard disk 20 similar products serial port even though 512ke roms contain scsi manager software enables use faster scsi hard disks roms ones used mac plus scsi port apple point users certain third-party products could added 512ke provide scsi port macintosh 512k could upgraded 512ke purchasing installing apple 299 macintosh plus disk drive kit included following one upgrade made apple replaced logic board rear case accommodate different port configuration macintosh plus providing built-in scsi functionality 4mb ram apple official upgrades costly many third-party manufacturers offered add-on scsi cards well ram upgrades achieve functionality new rom allowed computer run much newer system application software though loaded data ram slightly decreased amount available memory – 1.5k – leaving well 370k available applications june 1986 512ke shipped system 3.2 discontinued apple changed recommended os 512ke system 4.1 system 6.0.8 maximum os 512ke
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 7269, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, ...
Validation
2,552
8
Mapmyuser.com:mapmyuser.com mapmyuser web traffic analysis tool mapmyuser provides realtime web stats visitor geolocation statistics mapmyuser used compute web usage share example
[ 1943, 735, 3688, 119 ]
Test
2,553
3
Macintosh_SE:macintosh se macintosh se personal computer designed manufactured sold apple computer inc. march 1987 october 1990 marked significant improvement macintosh plus design introduced apple time macintosh ii se retains compact macintosh form factor original macintosh computer introduced three years earlier uses design language used macintosh ii enhanced model se/30 introduced january 1989 sales original se continued macintosh se updated august 1989 include superdrive updated version called macintosh se fdhd later macintosh se superdrive macintosh se replaced macintosh classic similar model retained central processing unit form factor lower price point macintosh se introduced appleworld conference los angeles march 2 1987 se acronym system expansion notable new features compared similar predecessor macintosh plus se macintosh ii first apple computers since apple sold without keyboard instead customer offered choice new adb apple keyboard apple extended keyboard apple produced ten ses transparent cases prototypes promotional shots employees extremely rare command premium price collectors macintosh se shipped system 4.0 finder 5.4 version specific computer macintosh ii announced time shipped month later includes system 4.1 finder 5.5 readme file included installation disks se ii first place apple ever used term macintosh system software 1998 two versions retroactively given name macintosh system software 2.0.1 processor motorola 68000 8 mhz 8 mhz system bus 16-bit data path ram se came 1 mb ram standard expandable 4 mb logic board four 30-pin simm slots memory must installed pairs must 150 ns faster video 256 kb onboard video memory enabling 512x384 monochrome resolution built-in screen lower resolution storage se accommodate either one two floppy drives floppy drive hard drive after-market brackets designed allow se accommodate two floppy drives well hard drive however configuration supported apple addition external floppy disk drive may also connected making se macintosh besides macintosh portable could support three floppy drives though increased storage ram capacity optional internal hard drive rendered external drives less necessity predecessors single-floppy se models also featured drive-access light spot second floppy drive would hard-drive equipped models came 20 mb scsi hard disk battery soldered logic board 3.0 v 1/2aa lithium battery must present order basic settings persist power cycles macintosh se machines sat long time experienced battery corrosion leakage resulting damaged case logic board expansion processor direct slot logic board allows expansion cards accelerators installed se upgraded 50 mhz 5 mb micromac accelerators past accelerators also available sonnet allegro since installing card required opening computer case exposing user high voltages internal crt apple recommended authorized apple dealers install cards case sealed then-uncommon torx screws upgrades apple introduced macintosh se/30 january 1989 logic board upgrade sold apple dealers high-cost upgrade se consisting new se/30 motherboard case front internal chassis accommodate upgrade components easter egg macintosh se rom size increased 64 kb original mac 256 kb allowed development team include easter egg hidden roms jumping address 0x41d89a reading rom chips possible display four images engineering team introduced march 2 1987 introduced august 1 1989
[ 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 4139, 7211, 8253, 576, 1090, 4180, 10838, 10840, 9312, 7269, 8806, 6258, 10357, 4220, 10365, 10878, 6783, 4741, 8842, 6283, 7824, 147, 7830, 6807, 4258, 7842, 7844, 7869, 8893, 8896, ...
Test
2,554
4
Videntifier:videntifier videntifier icelandic software company developed method quickly identify videos images automatic manner videntifier patented technology store fingerprints enormous amounts video content images identify reference material within seconds usually single frame enough identify entire video currently company headquartered reykjavik iceland office vilnius lithuania videntifier technologies founded september 2007 provides technology search track vast amounts multimedia data efficient manner previously company focused providing services police departments engaged locating illegal images videos seized computers company roots database laboratories reykjavik university later opened secondary lab irisa-cnrs rennes 2005 videntifier technologies received one top prizes austrian genius competition best business idea 2008 innovation award 2008 2008 videntifier technologies received golden egg award best new business idea iceland 2013 videntifier technologies signed agreement interpol provide advanced imaging technology effort child sexual abuse material
[ 9488, 2558 ]
None
2,555
6
Grid_file_system:grid file system grid file system computer file system whose goal improved reliability availability taking advantage many smaller file storage areas file systems contain three components grid file system would similar needs file systems designed appear single disk single computer manage entirely many new challenges arise grid scenario whereby single disk within grid capable handling requests data contained grid file storage utilizes layers redundancy achieve high level data protection inability lose data current means redundancy include replication parity checks redundancy implemented via raid array whereby multiple physical disks appear local computer single disk may include data replication and/or disk partitioning similarly grid file system would consist level redundancy either logical file level block level possibly including sort parity check across various disks present grid first foremost file table mechanism necessary additionally file table must include mechanism locating target/destination file within grid secondly mechanism working file data must exist mechanism responsible making file data available requests bittorrent technology parallel drawn grid file system torrent tracker search engine would file table torrent applications transmitting files would file data component rss feed like mechanism could utilized file table nodes indicate new files added table instigate replication similar components file system may incorporate similar technology distributed replication distributed data request/fulfillment systems file table file data capable addressed single entity i.e using virtual nodes cluster growth system could easily controlled simply deciding uses grid member would responsible file table file lookups and/or file data assuming exists method managing data replication assigning quotas etc autonomously within grid data could configured high availability regardless loss outage largest problem currently revolves around distributing data updates torrents support minimal hierarchy currently implemented either metadata torrent tracker strictly ui basic categorization updating multiple nodes concurrently assuming atomic transactions required presents latency updates additions usually point feasible additionally grid network based file system breaks traditional tcp/ip paradigms file system generally low level ring 0 type operations require complicated tcp/ip implementations introducing layers abstraction complication process creating grid file system examples high-available data include
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 1049, 9762, 5158, 11323, 8772, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6813, 6309, 1190, 5286, 10405, 7344, 2230, 5816, 1212, 8380, 10951, 9420, 3795, ...
Test
2,556
9
Class_(computer_programming):class computer programming object-oriented programming class extensible program-code-template creating objects providing initial values state member variables implementations behavior member functions methods many languages class name used name class template name default constructor class subroutine creates objects type objects generated instantiating class distinct concepts easily conflated object created constructor class resulting object called instance class member variables specific object called instance variables contrast class variables shared across class languages classes compile-time feature new classes declared run-time languages classes first-class citizens generally objects typically type similar languages class creates classes called metaclass casual use people often refer class object narrowly speaking objects type interface namely types member variables signatures member functions methods properties satisfy time class implementation specifically implementation methods create objects given type given implementation terms type theory class implementationa concrete data structure collection subroutineswhile type interface different concrete classes produce objects abstract type depending type system example type might implemented two classes fast small stacks scales poorly scales well high overhead small stacks similarly given class may several different constructors types generally represent nouns person place thing something nominalized class represents implementation example type might represent properties functionality bananas general classes would represent ways producing bananas say banana suppliers data structures functions represent draw bananas video game class could produce particular bananas instances class would objects type often single implementation type given case class name often identical type name classes composed structural behavioral constituents programming languages include classes programming construct offer support various class-related features syntax required use features varies greatly one programming language another class contains data field descriptions properties fields data members attributes usually field types names associated state variables program run time state variables either belong class specific instances class languages structure defined class determines layout memory used instances implementations possible example objects python use associative key-value containers programming languages support specification invariants part definition class enforce type system encapsulation state necessary able enforce invariants class behavior class instances defined using methods methods subroutines ability operate objects classes operations may alter state object simply provide ways accessing many kinds methods exist support varies across languages types methods created called programmer code special methods—such constructors destructors conversion operators—are created called compiler-generated code language may also allow programmer define call special methods every class implements realizes interface providing structure behavior structure consists data state behavior consists code specifies methods implemented distinction definition interface implementation interface however line blurred many programming languages class declarations define implement interface languages however provide features separate interface implementation example abstract class define interface without providing implementation languages support class inheritance also allow classes inherit interfaces classes derived example class inherits class b class b implements interface interface b class also inherits functionality constants methods declaration provided interface b languages support access specifiers interface class considered set public members class including methods attributes via implicit getter setter methods private members internal data structures intended depended external code thus part interface object-oriented programming methodology dictates operations interface class independent results layered design clients interface use methods declared interface interface places requirements clients invoke operations one interface particular order approach benefit client code assume operations interface available use whenever client access object buttons front television set interface electrical wiring side plastic casing press power button toggle television example particular television instance method represented button buttons together comprise interface television sets model would interface common form interface specification group related methods without associated implementation methods television set also myriad attributes size whether supports colour together comprise structure class represents full description television including attributes structure buttons interface getting total number televisions manufactured could static method television class method clearly associated class yet outside domain individual instance class static method finds particular instance set television objects another example following common set access specifiers although many object-oriented languages support access specifiers semantics may differ object-oriented design uses access specifiers conjunction careful design public method implementations enforce class invariants—constraints state objects common usage access specifiers separate internal data class interface internal structure made private public accessor methods used inspect alter private data access specifiers necessarily control visibility even private members may visible client external code languages inaccessible visible member may referred run-time example pointer returned member function attempt use referring name member client code prevented type checker various object-oriented programming languages enforce member accessibility visibility various degrees depending language type system compilation policies enforced either compile-time run-time example java language allow client code accesses private data class compile languages feature accessibility schemes addition design standalone classes programming languages may support advanced class design based upon relationships classes inter-class relationship design capabilities commonly provided compositional hierarchical classes composed classes thereby establishing compositional relationship enclosing class embedded classes compositional relationship classes also commonly known has-a relationship example class car could composed contain class engine therefore car engine one aspect composition containment enclosure component instances instance enclosing object contains component instances value components enclosing object similar lifetime components contained reference may similar lifetime example objective-c 2.0 class instance string object array object classes derived one existing classes thereby establishing hierarchical relationship derived-from classes base classes parent classes derived class child class subclass relationship derived class derived-from classes commonly known is-a relationship example class 'button could derived class 'control therefore button control structural behavioral members parent classes inherited child class derived classes define additional structural members data fields behavioral members methods addition inherit therefore specializations superclasses also derived classes override inherited methods language allows languages support multiple inheritance example java allows class implement multiple interfaces inherit one class multiple inheritance allowed hierarchy directed acyclic graph dag short otherwise tree hierarchy classes nodes inheritance relationships links classes level likely associated classes different levels levels hierarchy called layers levels abstraction example simplified objective-c 2.0 code iphone sdk example uitableview uiscrollview uiview uiresponder nsobject conceptually superclass superset subclasses example common class hierarchy would involve superclass would subclass subset relations set theory well i.e. squares rectangles rectangles squares common conceptual error mistake part relation subclass example car truck kinds vehicles would appropriate model subclasses vehicle class however would error model component parts car subclass relations example car composed engine body would appropriate model engine body subclass car object-oriented modeling kinds relations typically modeled object properties example class would property called would typed hold collection objects instances etc object modeling languages uml include capabilities model various aspects part kinds relations – data cardinality objects constraints input output values etc information utilized developer tools generate additional code beside basic data definitions objects error checking get set methods one important question modeling implementing system object classes whether class one superclasses real world actual sets would rare find sets n't intersect one set however systems flavors clos provide capability one parent run time introduces complexity many object-oriented community consider antithetical goals using object classes first place understanding class responsible handling message get complex dealing one superclass used carelessly feature introduce system complexity ambiguity classes designed avoid modern object-oriented languages smalltalk java require single inheritance run time languages multiple inheritance may useful modeling implementation however semantic web application objects multiple superclasses volatility internet requires level flexibility technology standards web ontology language owl designed support similar issue whether class hierarchy modified run time languages flavors clos smalltalk support feature part meta-object protocols since classes first-class objects possible dynamically alter structure sending appropriate messages languages focus strong typing java c++ allow class hierarchy modified run time semantic web objects capability run time changes classes rational similar justification allowing multiple superclasses internet dynamic flexible dynamic changes hierarchy required manage volatility although class-based languages commonly assumed support inheritance inheritance intrinsic aspect concept classes languages often referred object-based languages support classes yet support inheritance examples object-based languages include earlier versions visual basic object-oriented analysis uml association two classes represents collaboration classes corresponding instances associations direction example bi-directional association two classes indicates classes aware relationship associations may labeled according name purpose association role given end association describes role corresponding class example subscriber role describes way instances class person participate subscribes-to association class magazine also magazine subscribed magazine role association association role multiplicity describes many instances correspond instance class association common multiplicities 0..1 1..1 1..* 0..* specifies number instances many categories classes overlap language supports inheritance abstract class abstract base class abc class instantiated either labeled abstract simply specifies abstract methods virtual methods abstract class may provide implementations methods may also specify virtual methods via signatures implemented direct indirect descendants abstract class class derived abstract class instantiated abstract methods parent classes must implemented class derivation chain object-oriented programming languages allow programmer specify classes considered abstract allow instantiated example java c php keyword abstract used c++ abstract class class least one abstract method given appropriate syntax language pure virtual function c++ parlance class consisting virtual methods called pure abstract base class pure abc c++ also known interface users language languages notably java c support variant abstract classes called interface via keyword language languages multiple inheritance allowed class implement multiple interfaces class contain abstract publicly accessible methods concrete class class instantiated opposed abstract classes languages classes declared scopes global scope various types classes inner class class defined within another class relationship inner class containing class also treated another type class association inner class typically neither associated instances enclosing class instantiated along enclosing class depending language may may possible refer class outside enclosing class related concept inner types also known inner data type nested type generalization concept inner classes c++ example language supports inner classes inner types via typedef declarations another type local class class defined within procedure function limits references class name within scope class declared depending semantic rules language may additional restrictions local classes compared non-local ones one common restriction disallow local class methods access local variables enclosing function example c++ local class may refer static variables declared within enclosing function may access function automatic variables metaclasses classes whose instances classes metaclass describes common structure collection classes implement design pattern describe particular kinds classes metaclasses often used describe frameworks languages python ruby smalltalk class also object thus class instance unique metaclass built language common lisp object system clos non-subclassable classes allow programmers design classes hierarchies classes level hierarchy derivation prohibited stand-alone class may also designated non-subclassable preventing formation hierarchy contrast abstract classes imply encourage require derivation order used non-subclassable class implicitly concrete non-subclassable class created declaring class c java php example java class designated final non-subclassable classes may allow compiler compiled languages perform optimizations available subclassable classes open class one changed typically executable program changed customers developers often change classes typically change standard built-in ones ruby classes open python classes created runtime modified afterwards objective-c categories permit programmer add methods existing class without need recompile class even access source code languages special support mixins though language multiple inheritance mixin simply class represent is-a-type-of relationship mixins typically used add methods multiple classes example class might provide method called included classes share common parent languages supporting feature partial class class whose definition may split multiple pieces within single source-code file across multiple files pieces merged compile-time making compiler output non-partial class primary motivation introduction partial classes facilitate implementation code generators visual designers otherwise challenge compromise develop code generators manage generated code interleaved within developer-written code using partial classes code generator process separate file coarse-grained partial class within file thus alleviated intricately interjecting generated code via extensive parsing increasing compiler efficiency eliminating potential risk corrupting developer code simple implementation partial classes compiler perform phase precompilation unifies parts partial class compilation proceed usual benefits effects partial class feature include partial classes existed smalltalk name class extensions considerable time arrival .net framework 2 microsoft introduced partial classes supported c 2.0 visual basic 2005 winrt also supports partial classes simple example written visual basic .net shows parts class defined two different files compiled result two files written one like objective-c partial classes also known categories may even spread multiple libraries executables like following example key difference objective-c categories overwrite definitions another interface declaration categories n't equal original class definition first requires last instead .net partial class ca n't conflicting definitions partial definitions equal others foundation header file nsdata.h user-supplied library separate binary foundation framework header file nsdata+base64.h app yet another separate binary file source code file main.m dispatcher find methods called nsdata instance invoke correctly uninstantiable classes allow programmers group together per-class fields methods accessible runtime without instance class indeed instantiation prohibited kind class example c class marked static instantiated static members fields methods may instance constructors sealed unnamed class anonymous class class bound name identifier upon definition analogous named versus unnamed functions benefits organizing software object classes fall three categories object classes facilitate rapid development lessen semantic gap code users system analysts talk developers users using essentially vocabulary talking accounts customers bills etc object classes often facilitate rapid development object-oriented environments come powerful debugging testing tools instances classes inspected run time verify system performing expected also rather get dumps core memory object-oriented environments interpreted debugging capabilities developer analyze exactly program error occurred see methods called arguments arguments object classes facilitate ease maintenance via encapsulation developers need change behavior object localize change object component parts reduces potential unwanted side effects maintenance enhancements software re-use also major benefit using object classes classes facilitate re-use via inheritance interfaces new behavior required often achieved creating new class class inherit default behaviors data superclass tailor aspect behavior data accordingly re-use via interfaces also known methods occurs another object wants invoke rather create new kind object class method re-use removes many common errors make way software one program re-uses code another data type class usually considered compile-time construct language may also support prototype factory metaobjects represent run-time information classes even represent metadata provides access reflection facilities ability manipulate data structure formats run-time many languages distinguish kind run-time type information classes class basis information needed run-time dynamic languages make strict distinctions run-time compile-time constructs therefore may distinguish metaobjects classes example human metaobject representing class person instances class person created using facilities human metaobject
[ 2048, 10754, 4101, 9224, 1034, 1546, 531, 2585, 3613, 3102, 9245, 10786, 11307, 5677, 5680, 7219, 9780, 1591, 2617, 4155, 8251, 11327, 10819, 6239, 2145, 4201, 2666, 623, 9330, 9331, 3702, 3705, 5754, 7292, 9345, 2691, 8324, 5255, 7307, 9...
Test
2,557
9
Fold_(higher-order_function):fold higher-order function functional programming fold also termed reduce accumulate aggregate compress inject refers family higher-order functions analyze recursive data structure use given combining operation recombine results recursively processing constituent parts building return value typically fold presented combining function top node data structure possibly default values used certain conditions fold proceeds combine elements data structure hierarchy using function systematic way folds sense dual unfolds take seed value apply function corecursively decide progressively construct corecursive data structure whereas fold recursively breaks structure replacing results applying combining function node terminal values recursive results catamorphism versus anamorphism unfolds folds regarded consistently replacing structural components data structure functions values lists example built many functional languages two primitives list either empty list commonly called nil codice_1 constructed prefixing element front another list creating called cons node codice_2 resulting application codice_3 function written colon codice_4 haskell one view fold lists replacing nil end list specific value replacing cons specific function replacements viewed diagram another way perform structural transformation consistent manner order two links node flipped fed combining function pictures illustrate right left fold list visually also highlight fact codice_5 identity function lists shallow copy lisp parlance replacing cons codice_3 nil codice_7 change result left fold diagram suggests easy way reverse list codice_8 note parameters cons must flipped element add right hand parameter combining function another easy result see vantage-point write higher-order map function terms codice_9 composing function act elements codice_3 period operator denoting function composition way looking things provides simple route designing fold-like functions algebraic data types structures like various sorts trees one writes function recursively replaces constructors datatype provided functions constant values type provided values function generally referred catamorphism folding list codice_11 addition operator would result 15 sum elements list codice_11 rough approximation one think fold replacing commas list operation giving codice_13 example associative operation final result regardless parenthesization although specific way calculated different general case non-associative binary functions order elements combined may influence final result value lists two obvious ways carry either combining first element result recursively combining rest called right fold combining result recursively combining elements last one last element called left fold corresponds binary operator either right-associative left-associative haskell prolog terminology right fold sum would parenthesized codice_14 whereas left fold would parenthesized codice_15 practice convenient natural initial value case right fold used one reaches end list case left fold initially combined first element list example value 0 additive identity would chosen initial value giving codice_16 right fold codice_17 left fold multiplication initial choice 0 would n't work codice_18 identity element multiplication 1 would give us outcome codice_19 use initial value necessary combining function f asymmetrical types e.g codice_20 i.e type result different type list elements initial value must used type f result linear chain applications possible whether left- right-oriented determined types expected arguments combining function second argument must type result f could seen binary operation associates right vice versa function magma i.e symmetrical types codice_21 result type list elements type parentheses may placed arbitrary fashion thus creating tree nested sub-expressions e.g. codice_22 binary operation f associative value well-defined i.e. parenthesization although operational details calculated different significant impact efficiency f non-strict whereas linear folds node-oriented operate consistent manner node list tree-like folds whole-list oriented operate consistent manner across groups nodes one often wants choose identity element operation f initial value z initial value seems appropriate example one wants fold function computes maximum two parameters non-empty list get maximum element list variants codice_9 codice_24 use last first element list respectively initial value haskell several languages called codice_25 codice_26 1 making reference automatic provision initial element fact lists applied must least one element folds use type-symmetrical binary operation types arguments result must richard bird 2010 book proposes general fold function non-empty lists codice_27 transforms last element applying additional argument function value result type starting folding thus able use type-asymmetrical binary operation like regular codice_9 produce result type different list elements type using haskell example codice_24 codice_9 formulated equations list empty result initial value fold tail list using new initial value result applying f old initial value first element list empty result initial value z apply f first element result folding rest lists folded tree-like fashion finite indefinitely defined lists case codice_31 function avoid runaway evaluation indefinitely defined lists function codice_32 must always demand second argument value least and/or immediately see example presence lazy non-strict evaluation codice_9 immediately return application f head list recursive case folding rest list thus f able produce part result without reference recursive case right i.e. second argument rest result never demanded recursion stop e.g. allows right folds operate infinite lists contrast codice_24 immediately call new parameters reaches end list tail recursion efficiently compiled loop ca n't deal infinite lists — recurse forever infinite loop reached end list expression effect built codice_24 nested left-deepening codice_32-applications presented caller evaluated function codice_32 refer second argument first able produce part result without reference recursive case left i.e. first argument recursion would stop means codice_9 recurses right allows lazy combining function inspect list elements left conversely codice_24 recurses left allows lazy combining function inspect list elements right chooses e.g. reversing list also tail-recursive implemented using finite lists means left-fold reverse composed perform right fold tail-recursive way cf modification function codice_32 reverses order arguments i.e. tail-recursively building representation expression right-fold would build extraneous intermediate list structure eliminated continuation-passing style technique similarly codice_41 needed languages like haskell flipped order arguments combining function codice_24 unlike e.g. scheme order arguments used combining functions codice_24 another technical point case left folds using lazy evaluation new initial parameter evaluated recursive call made lead stack overflows one reaches end list tries evaluate resulting potentially gigantic expression reason languages often provide stricter variant left folding forces evaluation initial parameter making recursive call haskell codice_44 note apostrophe pronounced 'prime function codice_45 library one needs aware fact though forcing value built lazy data constructor wo n't force constituents automatically combined tail recursion folds approach efficiency loops ensuring constant space operation lazy evaluation final result impossible undesirable using haskell interpreter structural transformations fold functions perform illustrated constructing string infinite tree-like folding demonstrated e.g. recursive primes production unbounded sieve eratosthenes haskell function codice_46 operates ordered lists local manner efficiently produce set union codice_47 set difference finite lists e.g. merge sort duplicates-removing variety codice_48 could easily defined using tree-like folding function haskell 98 features mergesort|codice_49 duplicates-preserving variant codice_46 functions codice_51 codice_52 could defined folding language left fold right fold left fold without initial value right fold without initial value unfold notes category higher-order functions category recursion category programming language comparisons category articles example haskell code category articles example scheme code category iteration programming
[ 4101, 3462, 8582, 6536, 2062, 3733, 8854, 5783, 10395, 5917, 7326, 9245, 8226, 3876, 5031, 5165, 5677, 8116, 11574, 6074, 8514, 8644, 5833, 8397, 11343, 7889, 2519, 1112, 10083, 228, 8421, 6502, 9828, 4840, 8554, 8810, 2670, 3442, 3705, 2...
Test
2,558
4
Computer_security:computer security computer security cybersecurity information technology security security protection computer systems theft damage hardware software electronic data well disruption misdirection services provide field becoming important due increased reliance computer systems internet wireless network standards bluetooth wi-fi due growth smart devices including smartphones televisions various devices constitute internet things due complexity terms politics technology cybersecurity also one major challenges contemporary world vulnerability weakness design implementation operation internal control vulnerabilities discovered documented common vulnerabilities exposures cve database exploitable vulnerability one least one working attack exploit exists vulnerabilities often hunted exploited aid automated tools manually using customized scripts secure computer system important understand attacks made threats typically classified one categories backdoor computer system cryptosystem algorithm secret method bypassing normal authentication security controls may exist number reasons including original design poor configuration may added authorized party allow legitimate access attacker malicious reasons regardless motives existence create vulnerability denial service attacks dos designed make machine network resource unavailable intended users attackers deny service individual victims deliberately entering wrong password enough consecutive times cause victims account locked may overload capabilities machine network block users network attack single ip address blocked adding new firewall rule many forms distributed denial service ddos attacks possible attack comes large number points – defending much difficult attacks originate zombie computers botnet range techniques possible including reflection amplification attacks innocent systems fooled sending traffic victim unauthorized user gaining physical access computer likely able directly copy data may also compromise security making operating system modifications installing software worms keyloggers covert listening devices using wireless mice even system protected standard security measures may able by-passed booting another operating system tool cd-rom bootable media disk encryption trusted platform module designed prevent attacks eavesdropping act surreptitiously listening private conversation typically hosts network instance programs carnivore narusinsight used fbi nsa eavesdrop systems internet service providers even machines operate closed system i.e. contact outside world eavesdropped upon via monitoring faint electromagnetic transmissions generated hardware tempest specification nsa referring attacks surfacing 2017 new class multi-vector polymorphic cyber threats surfaced combined several types attacks changed form avoid cyber security controls spread threats classified fifth generation cyber attacks phishing attempt acquire sensitive information usernames passwords credit card details directly users phishing typically carried email spoofing instant messaging often directs users enter details fake website whose look feel almost identical legitimate one fake website often ask personal information log-in passwords information used gain access individual real account real website preying victim trust phishing classified form social engineering privilege escalation describes situation attacker level restricted access able without authorization elevate privileges access level example standard computer user may able exploit vulnerability system gain access restricted data even become root full unrestricted access system social engineering aims convince user disclose secrets passwords card numbers etc example impersonating bank contractor customer common scam involves fake ceo emails sent accounting finance departments early 2016 fbi reported scam cost us businesses 2bn two years may 2016 milwaukee bucks nba team victim type cyber scam perpetrator impersonating team president peter feigin resulting handover team employees 2015 w-2 tax forms spoofing act masquerading valid entity falsification data ip address username order gain access information resources one otherwise unauthorized obtain several types spoofing including tampering describes malicious modification products so-called evil maid attacks security services planting surveillance capability routers examples employee behavior big impact information security organizations cultural concepts help different segments organization work effectively work effectiveness towards information security within organization ″exploring relationship organizational culture information security culture″ provides following definition information security culture ″isc totality patterns behavior organization contribute protection information kinds.″ andersson reimers 2014 found employees often see part organization information security effort often take actions ignore organizational information security best interests research shows information security culture needs improved continuously ″information security culture analysis change″ authors commented ″it never ending process cycle evaluation change maintenance.″ manage information security culture five steps taken pre-evaluation strategic planning operative planning implementation post-evaluation growth number computer systems increasing reliance upon individuals businesses industries governments means increasing number systems risk computer systems financial regulators financial institutions like u.s. securities exchange commission swift investment banks commercial banks prominent hacking targets cyber criminals interested manipulating markets making illicit gains web sites apps accept store credit card numbers brokerage accounts bank account information also prominent hacking targets potential immediate financial gain transferring money making purchases selling information black market in-store payment systems atms also tampered order gather customer account data pins computers control functions many utilities including coordination telecommunications power grid nuclear power plants valve opening closing water gas networks internet potential attack vector machines connected stuxnet worm demonstrated even equipment controlled computers connected internet vulnerable 2014 computer emergency readiness team division department homeland security investigated 79 hacking incidents energy companies vulnerabilities smart meters many use local radio cellular communications cause problems billing fraud aviation industry reliant series complex systems could attacked simple power outage one airport cause repercussions worldwide much system relies radio transmissions could disrupted controlling aircraft oceans especially dangerous radar surveillance extends 175 225 miles offshore also potential attack within aircraft europe pan-european network service newpens us nextgen program air navigation service providers moving create dedicated networks consequences successful attack range loss confidentiality loss system integrity air traffic control outages loss aircraft even loss life desktop computers laptops commonly targeted gather passwords financial account information construct botnet attack another target smartphones tablet computers smart watches mobile devices quantified self devices like activity trackers sensors cameras microphones gps receivers compasses accelerometers could exploited may collect personal information including sensitive health information wifi bluetooth cell phone networks devices could used attack vectors sensors might remotely activated successful breach increasing number home automation devices nest thermostat also potential targets large corporations common targets many cases aimed financial gain identity theft involves data breaches loss millions clients credit card details home depot staples target corporation recent breach equifax cyberattacks ordered foreign governments governments engage cyberwarfare intent spread propaganda sabotage spy targets many people believe russian government played major role us presidential election 2016 using twitter facebook affect results election medical records targeted use general identify theft health insurance fraud impersonating patients obtain prescription drugs recreational purposes resale although cyber threats continue increase 62 organizations increase security training business 2015 attacks financially motivated however example security firm hbgary federal suffered serious series attacks 2011 hacktivist group anonymous retaliation firm ceo claiming infiltrated group sony pictures attack 2014 motive appears embarrass data leaks cripple company wiping workstations servers vehicles increasingly computerized engine timing cruise control anti-lock brakes seat belt tensioners door locks airbags advanced driver-assistance systems many models additionally connected cars may use wifi bluetooth communicate onboard consumer devices cell phone network self-driving cars expected even complex systems carry security risk issues gained wide attention simple examples risk include malicious compact disc used attack vector car onboard microphones used eavesdropping however access gained car internal controller area network danger much greater – widely publicized 2015 test hackers remotely carjacked vehicle 10 miles away drove ditch manufacturers reacting number ways tesla 2016 pushing security fixes air cars computer systems area autonomous vehicles september 2016 united states department transportation announced initial safety standards called states come uniform policies government military computer systems commonly attacked activists foreign powers local regional government infrastructure traffic light controls police intelligence agency communications personnel records student records financial systems also potential targets largely computerized passports government id cards control access facilities use rfid vulnerable cloning internet things iot network physical objects devices vehicles buildings embedded electronics software sensors network connectivity enables collect exchange data – concerns raised developed without appropriate consideration security challenges involved iot creates opportunities direct integration physical world computer-based systems also provides opportunities misuse particular internet things spreads widely cyber attacks likely become increasingly physical rather simply virtual threat front door lock connected internet locked/unlocked phone criminal could enter home press button stolen hacked phone people could stand lose much credit card numbers world controlled iot-enabled devices thieves also used electronic means circumvent non-internet-connected hotel door locks medical devices either successfully attacked potentially deadly vulnerabilities demonstrated including in-hospital diagnostic equipment implanted devices including pacemakers insulin pumps many reports hospitals hospital organizations getting hacked including ransomware attacks windows xp exploits viruses data breaches sensitive data stored hospital servers 28 december 2016 us food drug administration released recommendations medical device manufacturers maintain security internet-connected devices – structure enforcement distributed generation systems risk cyber attack real according daily energy insider attack could cause loss power large area long period time attack could severe consequences natural disaster district columbia considering creating distributed energy resources der authority within city goal customers insight energy use giving local electric utility pepco chance better estimate energy demand d.c. proposal however would allow third-party vendors create numerous points energy distribution could potentially create opportunities cyber attackers threaten electric grid serious financial damage caused security breaches standard model estimating cost incident data available made public organizations involved several computer security consulting firms produce estimates total worldwide losses attributable virus worm attacks hostile digital acts general 2003 loss estimates firms range 13 billion worms viruses 226 billion forms covert attacks reliability estimates often challenged underlying methodology basically anecdotal security breaches continue cost businesses billions dollars survey revealed 66 security staffs believe senior leadership takes cyber precautions strategic priority however reasonable estimates financial cost security breaches actually help organizations make rational investment decisions according classic gordon-loeb model analyzing optimal investment level information security one conclude amount firm spends protect information generally small fraction expected loss i.e. expected value loss resulting cyber/information security breach physical security motivations breaches computer security vary attackers thrill-seekers vandals activists others criminals looking financial gain state-sponsored attackers common well resourced started amateurs markus hess hacked kgb recounted clifford stoll cuckoo egg additionally recent attacker motivations traced back extremist organizations seeking gain political advantage disrupt social agendas growth internet mobile technologies inexpensive computing devices led rise capabilities also risk environments deemed vital operations critical targeted environments susceptible compromise led series proactive studies migrate risk taking consideration motivations type actors several stark differences exist hacker motivation nation state actors seeking attack based ideological preference standard part threat modelling particular system identify might motivate attack system might motivated breach level detail precautions vary depending system secured home personal computer bank classified military network face different threats even underlying technologies use similar computer security countermeasure action device procedure technique reduces threat vulnerability attack eliminating preventing minimizing harm cause discovering reporting corrective action taken common countermeasures listed following sections security design alternately secure design means software designed ground secure case security considered main feature techniques approach include open security architecture organization defines security architecture design artifacts describe security controls security countermeasures positioned relate overall information technology architecture controls serve purpose maintain system quality attributes confidentiality integrity availability accountability assurance services techopedia defines security architecture unified security design addresses necessities potential risks involved certain scenario environment also specifies apply security controls design process generally reproducible key attributes security architecture state computer security conceptual ideal attained use three processes threat prevention detection response processes based various policies system components include following today computer security comprises mainly preventive measures like firewalls exit procedure firewall defined way filtering network data host network another network internet implemented software running machine hooking network stack case unix-based operating systems linux built operating system kernel provide real-time filtering blocking another implementation so-called physical firewall consists separate machine filtering network traffic firewalls common amongst machines permanently connected internet organizations turning big data platforms apache hadoop extend data accessibility machine learning detect advanced persistent threats however relatively organisations maintain computer systems effective detection systems fewer still organized response mechanisms place result reuters points companies first time report losing electronic theft data physical stealing assets primary obstacle effective eradication cyber crime could traced excessive reliance firewalls automated detection systems yet basic evidence gathering using packet capture appliances puts criminals behind bars vulnerability management cycle identifying remediating mitigating vulnerabilities especially software firmware vulnerability management integral computer security network security vulnerabilities discovered vulnerability scanner analyzes computer system search known vulnerabilities open ports insecure software configuration susceptibility malware beyond vulnerability scanning many organizations contract outside security auditors run regular penetration tests systems identify vulnerabilities sectors contractual requirement formal verification correctness computer systems possible yet common operating systems formally verified include sel4 sysgo pikeos – make small percentage market two factor authentication method mitigating unauthorized access system sensitive information requires something know password pin something card dongle cellphone piece hardware increases security unauthorized person needs gain access social engineering direct computer access physical attacks prevented non-computer means difficult enforce relative sensitivity information training often involved help mitigate risk even highly disciplined environments e.g military organizations social engineering attacks still difficult foresee prevent enoculation derived inoculation theory seeks prevent social engineering fraudulent tricks traps instilling resistance persuasion attempts exposure similar related attempts possible reduce attacker chances keeping systems date security patches updates using security scanner or/and hiring competent people responsible security statement ambiguous even systems developed competent people get penetrated effects data loss/damage reduced careful backing insurance hardware may source insecurity microchip vulnerabilities maliciously introduced manufacturing process hardware-based assisted computer security also offers alternative software-only computer security using devices methods dongles trusted platform modules intrusion-aware cases drive locks disabling usb ports mobile-enabled access may considered secure due physical access sophisticated backdoor access required order compromised covered detail one use term computer security refers technology used implement secure operating systems 1980s united states department defense dod used orange book standards current international standard iso/iec 15408 common criteria defines number progressively stringent evaluation assurance levels many common operating systems meet eal4 standard methodically designed tested reviewed formal verification required highest levels means uncommon example eal6 semiformally verified design tested system integrity-178b used airbus a380 several military jets software engineering secure coding aims guard accidental introduction security vulnerabilities also possible create software designed ground secure systems secure design beyond formal verification aims prove correctness algorithms underlying system important cryptographic protocols example within computer systems two many security models capable enforcing privilege separation access control lists acls capability-based security using acls confine programs proven insecure many situations host computer tricked indirectly allowing restricted file access issue known confused deputy problem also shown promise acls giving access object one person never guaranteed practice problems resolved capabilities mean practical flaws exist acl-based systems designers certain utilities must take responsibility ensure introduce flaws capabilities mostly restricted research operating systems commercial oss still use acls capabilities however also implemented language level leading style programming essentially refinement standard object-oriented design open source project area e language end-user widely recognized weakest link security chain estimated 90 security incidents breaches involve kind human error among commonly recorded forms errors misjudgment poor password management inability recognize misleading urls identify fake websites dangerous email attachments human component cyber risk particularly relevant determining global cyber risk organization facing security awareness training levels provides formal compliance regulatory industry mandates considered essential reducing cyber risk protecting individuals companies great majority cyber threats focus end-user represents profound cultural change many security practitioners traditionally approached cybersecurity exclusively technical perspective moves along lines suggested major security centers develop culture cyber awareness within organization recognizing security aware user provides important line defense cyber attacks responding forcefully attempted security breaches manner one would attempted physical security breaches often difficult variety reasons incident response organized approach addressing managing aftermath computer security incident compromise goal preventing breach thwarting cyberattack incident identified managed time intrusion typically escalates impactful event data breach system failure intended outcome computer security incident response plan limit damage reduce recovery time costs responding compromises quickly mitigate exploited vulnerabilities restore services processes minimize impact losses incident response planning allows organization establish series best practices stop intrusion causes damage typical incident response plans contain set written instructions outline organization response cyberattack without documented plan place organization may successfully detect intrusion compromise stakeholders may understand roles processes procedures escalation slowing organizations response resolution four key components computer security incident response plan illustrative examples different types computer security breaches given 1988 60,000 computers connected internet mainframes minicomputers professional workstations 2 november 1988 many started slow running malicious code demanded processor time spread computers – first internet computer worm software traced back 23-year-old cornell university graduate student robert tappan morris jr. said wanted count many machines connected internet 1994 hundred intrusions made unidentified crackers rome laboratory us air force main command research facility using trojan horses hackers able obtain unrestricted access rome networking systems remove traces activities intruders able obtain classified files air tasking order systems data furthermore able penetrate connected networks national aeronautics space administration goddard space flight center wright-patterson air force base defense contractors private sector organizations posing trusted rome center user early 2007 american apparel home goods company tjx announced victim unauthorized computer systems intrusion hackers accessed system stored data credit card debit card check merchandise return transactions 2010 computer worm known stuxnet reportedly ruined almost one-fifth iran nuclear centrifuges disrupting industrial programmable logic controllers plcs targeted attack generally believed launched israel united states – although neither publicly admitted early 2013 documents provided edward snowden published washington post guardian exposing massive scale nsa global surveillance also indications nsa may inserted backdoor nist standard encryption standard later withdrawn due widespread criticism nsa additionally revealed tapped links google data centres 2013 2014 russian/ukrainian hacking ring known rescator broke target corporation computers 2013 stealing roughly 40 million credit cards home depot computers 2014 stealing 53 56 million credit card numbers warnings delivered corporations ignored physical security breaches using self checkout machines believed played large role malware utilized absolutely unsophisticated uninteresting says jim walter director threat intelligence operations security technology company mcafee – meaning heists could easily stopped existing antivirus software administrators responded warnings size thefts resulted major attention state federal united states authorities investigation ongoing april 2015 office personnel management discovered hacked year earlier data breach resulting theft approximately 21.5 million personnel records handled office office personnel management hack described federal officials among largest breaches government data history united states data targeted breach included personally identifiable information social security numbers names dates places birth addresses fingerprints current former government employees well anyone undergone government background check believed hack perpetrated chinese hackers july 2015 hacker group known impact team successfully breached extramarital relationship website ashley madison created avid life media group claimed taken company data user data well breach impact team dumped emails company ceo prove point threatened dump customer data unless website taken permanently avid life media take site offline group released two compressed files one 9.7gb second 20gb second data dump avid life media ceo noel biderman resigned website remained functioning international legal issues cyber attacks complicated nature global base common rules judge eventually punish cyber crimes cyber criminals security firms agencies locate cybercriminal behind creation particular piece malware form cyber attack often local authorities take action due lack laws prosecute proving attribution cyber crimes cyber attacks also major problem law enforcement agencies computer viruses switch one country another one jurisdiction another – moving around world using fact n't capability globally police operations like internet someone given free plane tickets online criminals world use techniques dynamic dns fast flux bullet proof servers add difficulty investigation enforcement role government make regulations force companies organizations protect systems infrastructure information cyberattacks also protect national infrastructure national power-grid government regulatory role cyberspace complicated cyberspace seen virtual space remain free government intervention seen many today libertarian blockchain bitcoin discussions many government officials experts think government crucial need improved regulation mainly due failure private sector solve efficiently cybersecurity problem r. clarke said panel discussion rsa security conference san francisco believes industry responds threaten regulation industry n't respond threat follow hand executives private sector agree improvements necessary think government intervention would affect ability innovate efficiently daniel r. mccarthy analyzed public-private partnership cybersecurity reflected role cybersecurity broader constitution political order many different teams organisations exist including 14 april 2016 european parliament council european union adopted general data protection regulation gdpr eu 2016/679 gdpr became enforceable beginning 25 may 2018 provides data protection privacy individuals within european union eu european economic area eea gdpr requires business processes handle personal data built data protection design default gdpr also requires certain organizations appoint data protection officer dpo countries computer emergency response team protect network security since 2010 canada cyber security strategy functions counterpart document national strategy action plan critical infrastructure strategy three main pillars securing government systems securing vital private cyber systems helping canadians secure online also cyber incident management framework provide coordinated response event cyber incident canadian cyber incident response centre ccirc responsible mitigating responding threats canada critical infrastructure cyber systems provides support mitigate cyber threats technical support respond recover targeted cyber attacks provides online tools members canada critical infrastructure sectors posts regular cyber security bulletins operates online reporting tool individuals organizations report cyber incident inform general public protect online public safety canada partnered stop.think.connect coalition non-profit private sector government organizations launched cyber security cooperation program also run getcybersafe portal canadian citizens cyber security awareness month october public safety canada aims begin evaluation canada cyber security strategy early 2015 china central leading group internet security informatization established 27 february 2014 leading small group lsg communist party china headed general secretary xi jinping staffed relevant party state decision-makers lsg created overcome incoherent policies overlapping responsibilities characterized china former cyberspace decision-making mechanisms lsg oversees policy-making economic political cultural social military fields relate network security strategy lsg also coordinates major policy initiatives international arena promote norms standards favored chinese government emphasize principle national sovereignty cyberspace berlin starts national cyber defense initiative 16 june 2011 german minister home affairs officially opened new german ncaz national center cyber defense nationales cyber-abwehrzentrum located bonn ncaz closely cooperates bsi federal office information security bundesamt für sicherheit der informationstechnik bka federal police organisation bundeskriminalamt deutschland bnd federal intelligence service bundesnachrichtendienst mad military intelligence service amt für den militärischen abschirmdienst national organisations germany taking care national security aspects according minister primary task new organization founded 23 february 2011 detect prevent attacks national infrastructure mentioned incidents like stuxnet provisions cyber security incorporated rules framed information technology act 2000 national cyber security policy 2013 policy framework ministry electronics information technology meity aims protect public private infrastructure cyber attacks safeguard information personal information web users financial banking information sovereign data cert- nodal agency monitors cyber threats country post national cyber security coordinator also created prime minister office pmo indian companies act 2013 also introduced cyber law cyber security obligations part indian directors provisions cyber security incorporated rules framed information technology act 2000 update 2013 following cyber attacks first half 2013 government news media television station bank websites compromised national government committed training 5,000 new cybersecurity experts 2017 south korean government blamed northern counterpart attacks well incidents occurred 2009 2011 2012 pyongyang denies accusations 1986 computer fraud abuse act key legislation prohibits unauthorized access damage protected computers defined although various measures proposed – none succeeded 2013 executive order improving critical infrastructure cybersecurity signed prompted creation nist cybersecurity framework standardized government testing services general services administration gsa standardized penetration test service pre-vetted support service rapidly address potential vulnerabilities stop adversaries impact us federal state local governments services commonly referred highly adaptive cybersecurity services hacs listed us gsa advantage website see information penetration test standardized government penetration test services department homeland security dedicated division responsible response system risk management program requirements cybersecurity united states called national cyber security division division home us-cert operations national cyber alert system national cybersecurity communications integration center brings together government organizations responsible protecting computer networks networked infrastructure third priority federal bureau investigation fbi protect united states cyber-based attacks high-technology crimes along national white collar crime center nw3c bureau justice assistance bja part multi-agency task force internet crime complaint center also known ic3 addition specific duties fbi participates alongside non-profit organizations infragard criminal division united states department justice operates section called computer crime intellectual property section ccips charge investigating computer crime intellectual property crime specialized search seizure digital evidence computers networks 2017 ccips published framework vulnerability disclosure program online systems help organizations clearly describe authorized vulnerability disclosure discovery conduct thereby substantially reducing likelihood described activities result civil criminal violation law computer fraud abuse act 18 u.s.c § 1030 united states cyber command also known uscybercom tasked defense specified department defense information networks ensures security integrity governance government military infrastructure assets role protection civilian networks u.s. federal communications commission role cybersecurity strengthen protection critical communications infrastructure assist maintaining reliability networks disasters aid swift recovery ensure first responders access effective communications services food drug administration issued guidance medical devices national highway traffic safety administration concerned automotive cybersecurity criticized government accountability office following successful attacks airports claimed attacks airplanes federal aviation administration devoted funding securing systems board planes private manufacturers aircraft communications addressing reporting system concerns also raised future next generation air transportation system computer emergency response team name given expert groups handle computer security incidents us two distinct organization exist although work closely together growing concern cyberspace become next theater warfare mark clayton christian science monitor described article titled new cyber arms race future wars fought soldiers guns planes drop bombs also fought click mouse half world away unleashes carefully weaponized computer programs disrupt destroy critical industries like utilities transportation communications energy attacks could also disable military networks control movement troops path jet fighters command control warships led new terms cyberwarfare cyberterrorism united states cyber command created 2009 many countries similar forces critical voices question whether cybersecurity significant threat made cybersecurity fast-growing field concerned reducing organizations risk hack data breach according research enterprise strategy group 46 organizations say problematic shortage cybersecurity skills 2016 28 2015 commercial government non-governmental organizations employ cybersecurity professionals fastest increases demand cybersecurity workers industries managing increasing volumes consumer data finance health care retail however use term cybersecurity prevalent government job descriptions typical cyber security job titles descriptions include student programs also available people interested beginning career cybersecurity meanwhile flexible effective option information security professionals experience levels keep studying online security training including webcasts wide range certified courses also available united kingdom nationwide set cyber security forums known u.k cyber security forum established supported government cyber security strategy order encourage start-ups innovation address skills gap identified u.k government following terms used regards computer security explained
[ 11, 10252, 20, 4117, 4119, 10264, 6169, 30, 2082, 2084, 6184, 10290, 10291, 2111, 6209, 4163, 8259, 2118, 8262, 2122, 6222, 6224, 10322, 10325, 89, 8288, 6241, 4194, 2148, 8292, 4198, 6246, 2152, 10341, 2154, 107, 4206, 8302, 2162, 4212, ...
Test
2,559
2
Desktop_Linux_Consortium:desktop linux consortium desktop linux consortium dlc non-profit organization aims enhancing promoting use linux operating system desktop computers founded 4 february 2003
[ 10694, 10376, 7983, 10192, 823, 5721, 1406 ]
Test
2,560
3
Emdebian_Grip:emdebian grip emdebian grip discontinued small-footprint linux distribution based compatible debian compared debian provides fine-grained control package selection size dependencies content enabling way creation small efficient debian packages use resource-limited embedded systems result reduced installation size one main benefits coming emdebian grip emdebian grip project terminated available updates planned new releases leaving version 3.1 based debian 7.1 wheezy longer supported latest stable release emdebian grip re-packs package files made available debian removing unneeded files man pages info documents documentation unwanted translation files emdebian grip debian distribution builder command package processes package compiled architectures supported debian generates equivalent emdebian grip package way binaries maintainer scripts dependencies original debian packages left untouched overall size installation footprint packages reduced packages created emdebian grip recompiled completely binary compatible debian result emdebian grip maintains much compatibility possible debian even possible mix emdebian debian packages even migrate existing debian system emdebian grip emdebian grip provides complete package repositories seven architectures i386 amd64 powerpc armhf armel mips mipsel included support standard debian tools like functional changes emdebian grip compared base debian releases since version 3.0 emdebian grip suites codenames include additional -grip suffix compared equivalent debian suites codenames july 13 2014 end-of-life notice posted project web site announced updates emdebian grip stopped leaving version 3.1 based debian 7.1 wheezy longer supported latest stable release main reasons stated cause ending project lack embedded devices provide support expandable storage much work involved preparing updates releasing new versions
[ 6675, 7187, 10776, 25, 10780, 4637, 3618, 9762, 5158, 7217, 9784, 10809, 576, 10817, 10333, 97, 8298, 7285, 9335, 2168, 633, 1147, 3197, 1150, 2179, 6787, 7812, 8326, 10883, 6797, 2195, 9366, 6296, 7325, 1694, 9887, 3241, 3248, 6837, 8388...
Train
2,561
0
Second-order_co-occurrence_pointwise_mutual_information:second-order co-occurrence pointwise mutual information computational linguistics second-order co-occurrence pointwise mutual information semantic similarity measure assess degree association two given words uses pointwise mutual information pmi sort lists important neighbor words two target words large corpus pmi-ir method used altavista advanced search query syntax calculate probabilities note near search operator altavista essential operator pmi-ir method however longer use altavista means implementation point view possible use pmi-ir method form new systems case algorithmic point view advantage using soc-pmi calculate similarity two words co-occur frequently co-occur neighboring words example british national corpus bnc used source frequencies contexts method considers words common lists aggregate pmi values opposite list calculate relative semantic similarity define pointwise mutual information function words formula_1 formula_3 tells us many times type formula_4 appeared entire corpus formula_5 tells us many times word formula_4 appeared word formula_7 context window formula_8 total number tokens corpus word formula_7 define set words formula_10 sorted descending order pmi values formula_7 taken top-most formula_12 words formula_13 set formula_10 contains words formula_15 rule thumb used choose value formula_12 formula_12-pmi summation function word defined respect another word word formula_21 respect word formula_22 formula_24 sums positive pmi values words set formula_25 also common words set formula_26 words function actually aggregates positive pmi values semantically close words formula_22 also common formula_21 list formula_29 value greater 1 formula_12-pmi summation function word formula_21 respect word formula_22 formula_33 formula_12-pmi summation function word formula_22 respect word formula_21 formula_37 respectively finally semantic pmi similarity function two words formula_21 formula_22 defined semantic word similarity normalized provides similarity score formula_43 formula_44 inclusively normalization semantic similarity algorithm returns normalized score similarity two words takes arguments two words formula_45 formula_46 maximum value formula_47 returned semantic similarity function sim returns similarity score 0 1 inclusively example algorithm returns 0.986 words cemetery graveyard formula_48 soc-pmi method
[ 1890, 11206 ]
Test
2,562
0
L2_Syntactic_Complexity_Analyzer:l2 syntactic complexity analyzer l2 syntactical complexity analyzer l2sca developed xiaofei lu pennsylvania state university computational tool produces syntactic complexity indices written english language texts along coh-metrix l2sca one extensively used computational tool compute indices second language writing development l2sca also widely utilised field corpus linguistics l2sca available single batch mode first provides possibility analyzing single written text 14 syntactic complexity indices latter allows user analyze 30 written texts simultaneously l2sca used numerous studies field second language writing development compute indices syntactic complexity l2sca also used various studies field corpus linguistics
[ 1890, 8565 ]
None
2,563
4
Kerio_Technologies:kerio technologies kerio technologies inc. former technology company specializing collaboration software unified threat management small medium organizations founded 2001 kerio headquartered san jose california january 2017 gfi software acquired kerio kerio technologies incorporated 2001 first product winroute pro entered internet security market 1997 owned maintained tiny software february 1 2002 tiny software transferred sales development software kerio developers continued work kerio brand kerio main products early 2000s kerio personal firewall kerio winroute firewall company focused collaboration software kerio mailserver kerio discontinued personal firewall late 2005 acquired sunbelt software starting 2010 kerio mailserver renamed kerio connect kerio winroute kerio control kerio introduced kerio operator ip pbx system 2011 samepage file sharing collaboration software 2013 january 2017 kerio bought gfi software kerio connect kerio control kerio operator kerio cloud became gfi assets samepage part acquisition
[ 1792, 2049, 4480, 6797, 1172, 3350, 9496, 3482, 1436, 670, 4511, 6431, 5924, 550, 8998, 10790, 939, 1708, 3885, 8753, 823, 569, 5178, 11577, 5057, 1858, 10433, 11073, 2118, 4814, 9423, 10574, 6993, 7121, 10708, 4568, 9048, 2907, 6364, 586...
Test
2,564
6
OneFS_distributed_file_system:onefs distributed file system onefs file system parallel distributed networked file system designed isilon systems basis isilon scale-out storage platform onefs file system controlled managed onefs operating system freebsd variant data structures onefs file system maintain protection information means filesystem one file may protected +1 basic parity protection another may protected +4 resilient four failures yet another file may protected 2x mirroring feature referred flexprotect flexprotect also responsible automatically rebuilding data event failure protection levels available based number nodes cluster follow reed solomon algorithm blocks individual file spread across nodes allows entire nodes fail without losing access data file metadata directories snapshot structures quotas structures logical inode mapping structure based mirrored b+ trees block addresses generalized 64-bit pointers reference node drive blknum tuples native block size 8192 bytes inodes 512 bytes disk disks 512 byte sectors 8kb disks 4kb sectors one distinctive characteristic onefs metadata spread throughout nodes homogeneous fashion dedicated metadata servers piece metadata replicated every node address list root btree blocks inode mapping structure everything else found starting point following generalized 64-bit pointers nodes running onefs must connected together high performance low-latency back-end network optimal performance onefs 1.0-3.0 used gigabit ethernet back-end network starting onefs 3.5 isilon offered infiniband models 2007 mid-2018 nodes sold utilized infiniband back-end starting onefs 8.1.0 gen6 models isilon offers ethernet back-end network 10 gigabit 40 gigabit data metadata locking transaction group management allocation event traffic go back-end rpc system data metadata transfers zero-copy modification operations on-disk structures transactional journaled onefs equipped options accessing storage via nfs cifs/smb ftp http hdfs utilize non-local authentication active directory ldap nis capable interfacing external backup devices applications use ndmp protocol onefs file system proprietary file system managed controlled freebsd-derived onefs operating system zsh default login shell onefs operating system onefs presents specialized command set administer onefs file system specialized shell programs start letters isi notable exceptions isilon extensions freebsd codice_1 codice_2 programs
[ 5120, 2051, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 4708, 8298, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 7344, 2230, 7863, 5816, 1212, 4797, 8380, 7364, 1...
None
2,565
3
Gemini_Wing:gemini wing gemini wing arcade game created tecmo released 1987 vertically-scrolling shooter one two players control futuristic aircraft travelling numerous terrains shooting enemies animalistic insectoid design home conversions released zx spectrum commodore 64 amstrad cpc amiga atari st msx x68000
[ 10931, 9006 ]
Test
2,566
8
PowerMapper:powermapper powermapper web crawler automatically creates site map website using thumbnails web page number map styles available although cheaper standard edition fewer styles professional edition site maps displayed number different map styles arrange sites tree structure styles display thumbnails page others use text-only presentation map styles include site maps also exported xml sitemaps format use google yahoo msn search engines product received positive reviews infoworld 1.0 release 1997 subsequent reviews 4.0 release microsoft technet magazine websitetips.com also favorable list problems commonly encountered users provided vendor powermapper faq powermapper commercial licensed software uses serial numbers prevent unlicensed usage standard licensing per-user pooled floating licences also available extra cost
[ 3744, 8769, 3875, 4473, 714, 6797, 2318, 7983, 944, 113, 11284, 1240, 1913, 2459 ]
None
2,567
4
Boomerang_attack:boomerang attack cryptography boomerang attack method cryptanalysis block ciphers based differential cryptanalysis attack published 1999 david wagner used break coconut98 cipher boomerang attack allowed new avenues attack many ciphers previously deemed safe differential cryptanalysis refinements boomerang attack published amplified boomerang attack rectangle attack boomerang attack based differential cryptanalysis differential cryptanalysis attacker exploits differences input cipher plaintext affect resultant difference output ciphertext high-probability differential input difference produce likely output difference needed covers nearly cipher boomerang attack allows differentials used cover part cipher attack attempts generate so-called quartet structure point halfway cipher purpose say encryption action e cipher split two consecutive stages e e e e e plaintext message suppose two differentials two stages say e basic attack proceeds follows one attack kasumi block cipher used 3gpp related-key rectangle attack breaks full eight rounds cipher faster exhaustive search biham et al. 2005 attack requires 2 chosen plaintexts encrypted one four related keys time complexity equivalent 2 kasumi encryptions
[ 7556, 3084, 2957, 7056, 658, 660, 1173, 1941, 4128, 1315, 4389, 10662, 169, 11185, 8627, 8628, 2357, 10806, 1847, 9528, 2110, 9541, 10315, 6863, 8273, 7635, 212, 9556, 10963, 11349, 2265, 1114, 7643, 9697, 8674, 229, 618, 1898, 881, 1654,...
Test
2,568
6
Robocopy:robocopy robocopy robust file copy command-line directory and/or file replication command microsoft windows robocopy functionally replaces xcopy options available part windows resource kit starting windows nt 4.0 first introduced standard feature windows vista windows server 2008 command robocopy robocopy noted capabilities beyond built-in windows copy xcopy commands including following requiring appropriate command-line options examples usage one option specified must separated spaces directory names non-standard characters spaces put double quotes usual command-line commands full reference see microsoft technet robocopy page robocopy syntax markedly different predecessors copy xcopy accepts folder names without trailing backslash source destination arguments file names wildcard characters codice_23 codice_24 valid source destination arguments files selected excluded using optional file filtering argument supports wildcards along various options example copy two files folder codice_25 codice_26 following syntax used copy pdf files codice_25 codice_26 files named copied folder selected copying fully qualified path names supported robocopy outputs screen optionally log file directories encounters alphabetical order directory preceded number files directory fulfill criteria copied directory yet exist target marked new dir directory empty /e option used contains files meeting criteria new directory created /nfl file names log option used files copied listed name directory end output table giving numbers directories files bytes table gives total number found source number copied includes directories marked new dir even copied number skipped already exist target number mismatches failed extras failed mean i/o error prevented file copied access denied also row time taken time spent failed files seems wrong column robocopy inter-packet gap ipg option allows control network bandwidth used session theory following formula expresses delay milliseconds required simulate desired bandwidth b kilobits per second network link available bandwidth b kbps formula_1 practice however experimentation usually required find suitable delay due factors nature volume traffic network methodology employed ipg option may offer level control provided bandwidth throttling technologies bits used windows update branchcache although robocopy command-line tool microsoft technet provides gui front-end called robocopy gui developed derk benisch systems engineer msn search group microsoft required .net framework 2.0 includes copy robocopy version xp026 non-microsoft guis robocopy ken tamaru microsoft developed copying program similar robocopy called richcopy available microsoft technet based robocopy offers similar features require .net framework note several versions robocopy show version number executing codice_35 command line version stored inside executable queried powershell example codice_36 inside windows explorer right-clicking robocopy.exe selecting properties clicking details tab
[ 3970, 8834, 10631, 6281, 6797, 3856, 2193, 6674, 8976, 4248, 8729, 8988, 4001, 9505, 4771, 10489, 7847, 808, 7983, 7088, 10033, 3250, 9780, 9910, 1978, 7356, 5437, 7486, 10428, 960, 8517, 1741, 4174, 1750, 9946, 2406, 10727, 5482, 6506, 9...
Validation
2,569
4
Packet_generator:packet generator packet generator packet builder type software generates random packets allows user construct detailed custom packets depending network medium operating system packet generators utilize raw sockets ndis function calls direct access network adapter kernel-mode driver useful testing implementations ip stacks bugs security vulnerabilities
[ 9440, 418, 5636, 4011, 1580, 10349, 2007, 5657, 11486, 11006, 10079 ]
Test
2,570
1
WxSQLite3:wxsqlite3 wxsqlite3 c++ wrapper around public domain sqlite 3.x database specifically designed use programs based wxwidgets library wxsqlite3 try hide underlying database contrary almost special features current sqlite version 3.18.0 supported like example creation user defined scalar aggregate functions since sqlite stores strings utf-8 encoding wxsqlite3 methods provide automatic conversion wxstrings utf-8 strings works best unicode builds wxwidgets ansi builds current locale conversion object wxconvcurrent used conversion to/from utf-8 special care taken external administration tools used modify database contents since tools operate unicode resp utf-8 mode since version 1.7.0 optional support key based database encryption 128 bit aes also included starting version 1.9.6 wxsqlite3 encryption extension compatible sqlite amalgamation source includes extension functions module support 256 bit aes encryption added version 1.9.8 since version 3.5.0 sqlite library integrated part wxsqlite3 since version 4.0.0 wxsqlite3 supports select encryption scheme runtime addition wxsqlite3 legacy schemes aes 128 bit aes 256 bit two encryption schemes namely sqleet aka chacha20 poly1305 sqlcipher aka aes 256 bit sha1/sha256/sha512 sqlcipher variants version 1 version 4 supported selected
[ 5546, 5612, 7983 ]
Test
2,571
2
Spinning_pinwheel:spinning pinwheel spinning pinwheel variation mouse pointer arrow used apple macos indicate application busy officially macos human interface guidelines refers spinning wait cursor also known names including spinning beach ball spinning wheel death loading spinny spinning pizza death spod wristwatch first wait cursor early versions classic mac os apple hypercard first popularized animated cursors including black-and-white spinning quartered circle resembling beach ball beach-ball cursor also adopted indicate running script code hypertalk-like applescript cursors could advanced repeated hypertalk invocations set cursor busy wait cursors activated applications performing lengthy operations versions apple installer used animated counting hand cursor applications provided theme-appropriate custom cursors revolving yin yang symbol fetch running dog retrospect spinning tape pro tools tapping fingers apple provided standard interfaces animating cursors originally cursor utilities spincursor rotatecursor mac os 8 later appearance manager setanimatedthemecursor nextstep 1.0 used monochrome icon resembling spinning magneto-optical disk whose drive quite slow common reason wait cursor appear color support added nextstep 2.0 color versions icons added wait cursor updated reflect bright rainbow surface removable disks icon remained even later machines began using hard disk drives primary storage contemporary cd rom drives even slower 1x 150 kb/s arrival mac os x wait cursor often called spinning beach ball press presumably authors knowing next history relating hypercard wait cursor two-dimensional appearance kept essentially unchanged next rhapsody/mac os x server 1.0 otherwise user interface design resembling mac os 8/platinum theme mac os x 10.0/cheetah mac os x 10.1/puma introduced aqua user interface theme mac os x 10.2/jaguar gave cursor glossy rounded gumdrop look keeping os x interface elements os x 10.10 entire pinwheel rotates previously overlaying translucent layer moved os x 10.11 el capitan spinning wait-cursor design updated less shadowing brighter solid colors better match design user interface colors also turn spinning texture single-tasking operating systems like original macintosh operating system wait cursor might indicate computer completely unresponsive user input indicate response may temporarily slower usual due disk access changed multitasking operating systems system software 5 usually possible switch another application continue work individual applications could also choose display wait cursor long operations often able cancelled keyboard command transition mac os x macos apple narrowed wait cursor meaning display wait cursor controlled operating system application could indicate application infinite loop performing lengthy operation ignoring events application event queue receives events operating system example key presses mouse button clicks application takes longer 2 seconds process events event queue regardless cause operating system displays wait cursor whenever cursor hovers application windows meant indicate application temporarily unresponsive state application recover also may indicate part application entered unrecoverable state infinite loop time user may prevented closing resizing even minimizing windows affected application although moving window still possible os x well previously hidden parts window usually redrawn even application otherwise unresponsive one application unresponsive typically applications usable file system network delays another common cause default events actions initiate processed sequentially works well event involves trivial amount processing spinning wait cursor appearing operation complete processing takes long application appear unresponsive developers may prevent using separate threads lengthy processing allowing application main thread continue responding external events however greatly increases application complexity another approach divide work smaller packets use nsrunloop grand central dispatch instruments application comes mac os x developer tools along functions allows user monitor sample applications either responding performing lengthy operation time application respond spinning wait cursor activated instruments sample process determine code causing application stop responding information developer rewrite code avoid cursor activated apple guidelines suggest developers try avoid invoking spinning wait cursor suggest user interface indicators asynchronous progress indicator spinning wait cursor commonly referred spinning x death/doom common words phrases x replaced include
[ 1542, 4486, 5520, 3474, 11539, 8852, 1694, 6319, 11444, 3766, 11581, 9919, 576, 5840, 10333, 4844, 5744, 7795, 8441 ]
Validation
2,572
9
Microsoft_Basic_1.0:microsoft basic 1.0 basic 1.0 standard basic language thomson computers mo5 to7 etc reference entire range implementation microsoft basic basic-69 mo5 instruction set reduced double precision implemented interpreter fits 12 kb rom instead 16 kb to7 upgraded version produced name basic 128 to7-70 to9 mo5nr mo6 included dos new instructions to8/8d to9+ even upgraded version name basic 512 provided basic 1.0 interpreter recognizes usual commands for..next gosub..return if..then..else data read restore statements advanced instructions like on..goto on..gosub also possible used introduce children france programming 1980s three languages mainly taught lse basic logo school textbooks programs given basic 1.0 thomson sometimes exelbasic exelvision exl 100
[ 6594 ]
Test
2,573
2
Z80-RIO:z80-rio z80-rio abbreviation z80 operating system relocatable modules i/o management general-purpose operating system developed zilog late 1970 various computer systems including z80 micro computer system mcz-1 series z80 development system zds mcz systems primarily used software development automation solutions rio designed facilitate development integration user programs production environment system provides modest environment minimum system support enhanced environment modest environment provides program debugger file manipulation capability floppy disk driver supporting eight disk drives basic console driver provision paper tape operation enhanced environment provides access rio executive system support utilities zilog floppy disk file system zdos zilog hard disk file system dfs also provides access number disk-resident software text editor macro assembler linker following list commands supported z80-rio udos z80-rio compatible clone veb robotron available number computers company 5120 pc 1715 based u880 processor latter clone zilog z80 udos also one operating systems available p8000 microcomputer system developed 1987 veb elektro-apparate-werke berlin-treptow „ friedrich ebert “ eaw german democratic republic ddr east germany
[ 2179, 7847, 6664, 4682, 7983, 1750, 6203, 1501 ]
Test
2,574
3
26-bit:26-bit computer architecture 26-bit integers memory addresses data units 26 bits wide thus represent values 64 mega base 2 two examples computer processors featured 26-bit memory addressing certain second generation ibm system/370 mainframe computer models introduced 1981 several subsequent models 26-bit physical addresses 24-bit virtual addresses earlier models first generations arm processors data processing needs continued grow ibm customers faced challenges directly addressing larger memory sizes ended short-term emergency solution pair ibm second wave system/370 models 3033 3081 introduced 26-bit real memory addressing increasing system/370 amount physical memory could attached factor 4 previous 24-bit limit 16 mb ibm referred 26-bit addressing extended real addressing subsequent models also included 26-bit support however 2 years later ibm introduced 31-bit memory addressing expanding physical virtual addresses 31 bits system/370-xa models even popular 3081 upgradeable xa standard given 26-bit brief history state-of-the-art memory addressing available ibm model range given virtual addresses still limited 24 bits software exploitation 26-bit mode limited customers exploited 26-bit mode eventually adjusted applications support 31-bit addressing ibm dropped support 26-bit mode several years producing models supporting 24-bit 26-bit 31-bit modes 26-bit mode addressing mode ibm removed line mainframe computers descended system/360 addressing modes including 64-bit mode supported current model mainframes arm processor architecture 26-bit refers design used original arm processors program counter pc processor status register psr combined one 32-bit register r15 status flags filling high 6 bits program counter taking lower 26 bits fact program counter always word-aligned lowest two bits always zero allowed designers reuse two bits hold processor mode bits four modes allowed usr26 svc26 irq26 fiq26 contrast 32 possible modes available program status separated program counter recent arm architectures design enabled efficient program execution program counter status flags could saved restored single operation resulted faster subroutine calls interrupt response traditional designs would two register loads saves calling returning subroutine despite 32-bit alu word-length processors based arm architecture version 1 2 26-bit pc address bus consequently limited 64 mib addressable memory still vast amount memory time limitation architectures since included various steps away original 26-bit design arm architecture version 3 introduced 32-bit pc separate psr well 32-bit address bus allowing 4 gib memory addressed change pc/psr layout caused incompatibility code written previous architectures processor also included 26-bit compatibility mode used old pc/psr combination processor could still address 4 gb mode could execute anything address 0x3fffffc 64 mb mode used risc os running acorn risc pc utilise new processors retaining compatibility existing software arm architecture version 4 made support 26-bit addressing modes optional arm architecture version 5 onwards removed entirely
[ 9932, 9964, 3630, 7631, 5457, 9978 ]
Validation
2,575
0
Normalized_Google_distance:normalized google distance normalized google distance ngd semantic similarity measure derived number hits returned google search engine given set keywords keywords similar meanings natural language sense tend close units normalized google distance words dissimilar meanings tend farther apart specifically normalized google distance ngd two search terms x n total number web pages searched google multiplied average number singleton search terms occurring pages f x f number hits search terms x respectively f x number web pages x occur formula_2 x viewed alike possible formula_3 x different two search terms x never occur together web page occur separately ngd infinite terms always occur together ngd zero example 9 april 2013 googling shakespeare gave 130,000,000 hits googling macbeth gave 26,000,000 hits googling shakespeare macbeth gave 20,800,000 hits number pages indexed google estimated number hits search term 25,270,000,000 hits assuming 1,000 search terms average page gives formula_4 hence shakespeare macbeth much alike according relative semantics supplied google normalized google distance derived earlier normalized compression distance namely objects given literally like literal four-letter genome mouse literal text macbeth shakespeare similarity objects given ncd simplicity take meaning object represented literal object objects also given name like 'the four-letter genome mouse 'the text macbeth shakespeare also objects given literally name acquire meaning contexts background common knowledge humankind like 'home red similarity names objects given ngd probabilities google search terms conceived frequencies page counts returned google divided number pages indexed google multplied average number search terms pages approximate actual relative frequencies search terms actually used society based premise relations represented normalized google distance approximately capture assumed true semantic relations governing search terms ngd world wide web google used text corpora wikipedia king james version bible oxford english dictionary together appropriate search engines following properties proved applications colors versus numbers primes versus non-primes given well randomized massive experiment using wordnet categories primes versus non-primes case wordnet experiment ngd method augmented support vector machine classifier experiments consist 25 positive examples 25 negative ones wordnet experiment consisted 100 random wordnet categories ngd method success rate 87.25 mean 0.8725 standard deviation 0.1169 rates agreement wordnet categories represent knowledge researchers phd entered rare see agreement less 75
[ 416, 11206, 119 ]
None
2,576
8
Hamlets_(software):hamlets software hamlets previously known ibm servlet-based content creation framework name open source system generating web-pages originally developed rené pawlitzek ibm defines hamlet servlet extension reads xhtml template files containing presentation using sax simple api xml dynamically adds content fly places template marked special tags ids using small set callback functions template compiler used accelerate hamlets hamlets provide easy-to-use easy-to-understand lightweight small-footprint servlet-based content creation framework facilitates development web-based applications hamlets framework supports also enforces complete separation content presentation
[ 1920, 3462, 8582, 2062, 9614, 148, 1812, 9245, 10526, 8739, 3876, 4777, 5165, 5677, 7983, 4529, 7987, 692, 8883, 5048, 6074, 9666, 8644, 11259, 1353, 595, 4056, 6493, 102, 8554, 5612, 8691, 3705, 3323 ]
Test
2,577
9
Louis_Hodes:louis hodes louis hodes june 19 1934 – june 30 2008 american mathematician computer scientist cancer researcher got phd hartley rogers thesis computability john mccarthy late 1950s early 1960s helped produce earliest implementations lisp marvin minsky early research visual pattern recognition lisp also credited idea initial implementation logic programming 1966 moved cancer-related research specifically national institutes health later national cancer institute turned interest visual pattern recognition medical imaging applications also worked efficient algorithms screening chemical compounds studying chemical carcinogenesis work models clustering chemical compounds pronounced milestone developmental therapeutics program national cancer institute revolutioniz ing selection compounds interest measuring novelty chemical structure comparing known compounds
[ 4992, 10752, 11269, 3334, 6919, 7048, 7562, 2062, 9231, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 3119, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, 7880, 8908, ...
Test
2,578
0
Computational_Linguistics_(journal):computational linguistics journal computational linguistics quarterly peer-reviewed open-access academic journal field computational linguistics published mit press association computational linguistics acl journal includes articles squibs book reviews established american journal computational linguistics 1974 david hays originally published microfiche 1978 george heidorn transformed print journal 1980 quarterly publication 1984 journal obtained current title open-access since 2009 according journal citation reports journal 2017 impact factor 1.319 following persons editors-in-chief
[ 5248, 1890, 4038, 3947, 7724, 10577 ]
None
2,579
5
Arora_(web_browser):arora web browser arora discontinued free open-source web browser developed benjamin c. meyer arora available linux mac os x windows freebsd os/2 haiku genode operating system supported qt toolkit arora name palindrome browser features include tabbed browsing bookmarks browsing history smart location bar opensearch session management privacy mode download manager webinspector adblock several months meyer discontinued development arora due uncertainty strictures non-compete clauses employer finally july 2011 announced would longer contribute project another software developer bastien pederencino forked arora source code published variant called zbrowser renamed zeromus browser february 2013 may 2013 pederencino published another variant called bluelightcat february 2014 new patches released arora github project page linux distributions incorporating changes individual versions arora packages repositories
[ 513, 6657, 9736, 6171, 9757, 7713, 10791, 9770, 559, 4661, 3639, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 119, 4728, 637, 1664, 2182, 6797, 10910, 8351, 7340, 9394, 9908, 185, 11449, 4797, 11466, ...
None
2,580
4
Books_on_cryptography:books cryptography books cryptography published sporadically highly variable quality long time despite tempting though superficial paradox secrecy essence sending confidential messages — see kerckhoffs principle contrast revolutions cryptography secure communications since 1970s well covered available literature early example book cryptography roman work lost known references many early cryptographic works esoteric mystical and/or reputation-promoting cryptography mysterious much opportunity things least one work trithemius banned catholic church put index librorum prohibitorum black magic witchcraft many writers claimed invented unbreakable ciphers none though sometimes took long establish 19th century general standard improved somewhat e.g. works auguste kerckhoffs friedrich kasiski étienne bazeries colonel parker hitt william friedman early 20th century also wrote books cryptography authors others mostly abandoned mystical magical tone invention radio much military communications went wireless allowing possibility enemy interception much readily tapping landline increased need protect communications end world war cryptography literature began officially limited one exception american black chamber herbert yardley gave insight american cryptologic success stories including zimmermann telegram breaking japanese codes washington naval conference significant books cryptography include end world war ii early 1980s aspects modern cryptography regarded special concern governments military protected custom cases statute significant work published cryptography period undoubtedly david kahn codebreakers published time mid-1960s virtually information modern practice cryptography available kahn said ninety percent content previously unpublished book caused serious concern nsa despite lack coverage specific modern cryptographic practice much failing prevent book published nsa staff informed even acknowledge existence book asked us military mere possession copy cryptographic personnel grounds considerable suspicion perhaps single greatest importance book impact next generation cryptographers whitfield diffie made comments interviews effect
[ 7073, 8674, 1315, 6755, 4007, 6599, 4719, 6928, 7887, 1970, 4435, 9617, 1941, 7542, 11514, 10332, 3774 ]
Validation
2,581
2
Jim_Gettys:jim gettys jim gettys born 15 october 1953 american computer programmer involved multiple computer related projects gettys worked dec cambridge research laboratory january 2009 vice president software one laptop per child project working software olpc xo-1 2009 2014 worked alcatel-lucent bell labs since 2010 gettys core member group investigating bufferbloat effect performance internet one original developers x window system mit worked x.org served board directors served gnome foundation board directors worked world wide web consortium w3c editor http/1.1 specification internet engineering task force draft standard gettys helped establish handhelds.org community development linux handheld devices traced one main goals olpc review overhaul much standard linux software order make run faster consume less memory power context pointed common fallacy among programmers today storing computed values memory preferable recomputing values later claims often false current hardware given fast cpus long time takes recover potential cache miss holds bsc degree mit earth planetary sciences course 12 — eaps 1997 internet plumber year award behalf group worked http/1.1 gettys one keepers flame usenix 1999 lifetime achievement award behalf x window system community large
[ 1026, 9223, 5644, 4367, 8848, 657, 10642, 1939, 10004, 3478, 6808, 7450, 6302, 7584, 802, 3618, 5410, 6691, 6947, 8354, 5931, 8364, 429, 3764, 1717, 823, 2109, 11069, 10687, 7872, 10822, 8263, 843, 589, 6352, 4177, 6993, 8787, 11602, 4437...
Test
2,582
0
ULTRA_(machine_translation_system):ultra machine translation system ultra machine translation system created five languages japanese chinese spanish english german computing research laboratory 1991 ultra universal language translator machine translation system developed computing research laboratory translate five languages japanese chinese spanish english german uses artificial intelligence well linguistic logic programming methods main goal system robust cover general language simple use uses bidirectional parsers/generators system language-independent system intermediate representation means takes account needs expression expression one main elements language uses relaxation techniques provide best translation used x window user interface users paste sentence source window chose target language press translate tool translates source text taking consideration said said said lexical entries system two parts ultra works intermediate representation language systems transfer takes place language systems independent independent systems gives extra benefit adding another language disrupt existing language translations developers david farwell yorick wilks created ir interlingual representation base analyzing generating expressions analyzed many different types communications business letters documents emails compare communication style ultra looks best words kinds information good forms equivalents expression target language
[ 5635, 10703, 8688, 5399, 7164 ]
Validation
2,583
9
SdlBasic:sdlbasic sdlbasic multiplatform interpreter basic using sdl libraries interpreter core based wxbasic interpreter useful people familiar ansi-basic interpreters curious needing sdl library features coding development using ide possible create executable sdlbasic development started december 2002 author vroby roberto viola got idea using sdl libraries wxbasic core instead wxwidgets libraries major releases 2004 2005 2007 2012 prior 2005 text editor used write program code 2005 ide added 2012 package split ide interpreter although ide could used run code main download site sourceforge support site online documentation forum moved changed maintainer found link added altervista.org original author still contributes forum may 22 2008 sdlbasic ported sony playstation portable allows play games use applications coded sdlbasic recently someone qj forums released update version 0.7 included video output slim sdlbasic open source freely available terms gnu general public licence
[ 10480, 303 ]
None
2,584
2
UNIX_System_Laboratories,_Inc._v._Berkeley_Software_Design,_Inc.:unix system laboratories inc. v. berkeley software design inc. usl v. bsdi lawsuit brought united states 1992 unix system laboratories berkeley software design inc regents university california intellectual property related unix operating system culmination unix wars case settled court 1994 judge expressed doubt validity usl intellectual property novell time bought usl university agreeing litigate berkeley software distribution bsd suit roots computer systems research group csrg university california berkeley license source code unix bell labs students operating systems research csrg modified extended unix csrg made several releases modified operating system beginning 1978 blessing berkeley software distribution bsd contained copyrighted unix source code available organizations source code license unix students faculty csrg audited software code tcp/ip stack removing intellectual property released general public 1988 net/1 bsd license became apparent berkeley csrg would soon close students faculty csrg began effort remove remaining code bsd replace effort resulted public release net/2 1991 bsd license net/2 contained enough code nearly complete unix-like system csrg believed contained intellectual property berkeley software design bsdi obtained source net/2 filled missing pieces ported intel i386 computer architecture bsdi sold resulting bsd/386 operating system could ordered 1-800-its-unix drew ire agree bsdi claim bsd/386 free intellectual property unix system laboratories subsidiary filed suit bsdi new jersey april 1992 suit later amended include regents university california lawsuit usl alleged grounds usl asked court preliminary injunction would bar bsdi distributing net/2 software case decided hearing bsdi contended using sources freely distributed university california plus six additional files bsdi accepted liability six files refused account files distributed university california judge agreed bsdi argument told usl restate complaint based solely six files would dismiss rather narrow claim usl chose sue bsdi university california requested preliminary injunction distribution net/2 1993 judge dickinson r. debevoise denied preliminary injunction grounds usl valid copyright 32v could show obvious trade secret works published u.s. january 1 1978 march 1 1989 subject provisions 17 u.s.c § 405 required copyright owner properly affix copyright notice work order claim copyright protection released v32 1978 omitted notice thousands copies failed copyright 32v 1992 1993 days dismissal preliminary injunction university filed countersuit usl california claiming usl failed credit university use bsd code system v required software license contract university demanded usl forced reprint documentation appropriate due credit added notify licensees oversight run full-page advertisements major publications wall street journal fortune magazine informing public omission 1993 soon uc filed countersuit usl purchased novell novell ceo ray noorda favored settlement reached 1994 salient points 18,000 files berkeley distribution three removed 70 modified show usl copyright notices condition settlement usl would file lawsuits users distributors upcoming 4.4bsd-lite release
[ 11232, 5506, 5380, 7204, 8266, 8395, 9452, 1839, 7983, 9135, 2035, 5492, 7702, 5534, 9151 ]
Test
2,585
9
First-class_citizen:first-class citizen programming language design first-class citizen also type object entity value given programming language entity supports operations generally available entities operations typically include passed argument returned function modified assigned variable concept first- second-class objects introduced christopher strachey 1960s actually define term strictly contrasted real numbers procedures algol first second class objects algol real number may appear expression assigned variable either may appear actual parameter procedure call procedure hand may appear another procedure call either operator common case one actual parameters expressions involving procedures whose results procedures thus sense procedures algol second class citizens—they always appear person never represented variable expression except case formal parameter ... robin popplestone gave following definition items certain fundamental rights 1990s raphael finkel proposed definitions second third class values definitions widely adopted simplest scalar data types integer floating-point numbers nearly always first-class many older languages arrays strings first-class assigned objects passed parameters subroutine example neither fortran iv c supports array assignment passed parameters position first element actually passed—their size lost c appears support assignment array pointers fact simply pointers array first element carry array size languages data types first-class objects though object-oriented languages classes first-class objects instances metaclasses languages support continuations goto-labels objects let alone first-class objects many programming languages support passing returning function values applied arguments whether suffices call function values first-class disputed authors require possible create new functions runtime call 'first-class result functions c first-class objects instead sometimes called second-class objects still manipulated fashions via function pointers smalltalk functions methods first-class objects like smalltalk classes since smalltalk operators etc methods also first-class objects languages java php explicit reflection subsystem allow access internal implementation structures even though accessible manipulable way ordinary objects
[ 512, 9730, 11269, 3462, 8587, 2062, 5783, 9245, 3876, 5165, 2556, 11457, 4034, 8644, 2501, 8262, 10569, 5456, 10581, 727, 10712, 7386, 11610, 8924, 7392, 1889, 10083, 10470, 2666, 3051, 8554, 2936, 3705, 1019, 7292, 2045 ]
Test