node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
2,686
2
IFund:ifund ifund us 200 million capital fund developers may enter equity deals creation applications services components apple inc. iphone ipod touch ipad platform offered managed venture capital company kleiner perkins caufield byers kpcb ifund announced kpcb partner john doerr time iphone os sdk apple iphone roadmap event march 6 2008 cupertino california ifund managed kpcb partner matt murphy collaboration partners chi-hua chien john doerr bill joy randy komisar ellen pao ted schlein apple provides kpcb market insight support march 31 2010 kpcb announced fund doubled september 15 2008 kpcb launched blog share perspectives ifund december 2008 confidential ifund application data accidentally published web kleiner perkins caufield byers ’ former hosting provider meteora technologies group database dump file file indexed google coincidentally discovered fruux staffer file contained applications 588 companies including detailed information companies like founder bios financial ratios business models
[ 10755, 9732, 1549, 5647, 7697, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 576, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 5733, 8806, 3691, 2673, 2676, 6264, 7292, 7806, 6783, 10878, 8842, 5784, 1177, 4251, 3228, 2207, 11430, 171, 2...
None
2,687
6
File_system_fragmentation:file system fragmentation computing file system fragmentation sometimes called file system aging tendency file system lay contents files non-continuously allow in-place modification contents special case data fragmentation file system fragmentation increases disk head movement seek time applies known hinder throughput addition file systems sustain unlimited fragmentation correction existing fragmentation reorganize files free space back contiguous areas process called defragmentation modern computers ssd disks rotate really discs conventional sense file system fragmentation n't much performance problem fixed movement heads discs fact overly defragmenting drives slowly shorten life-span file system first initialized partition contains small internal structures otherwise one contiguous block empty space means file system able place newly created files anywhere partition time creation files laid near-optimally operating system applications installed archives unpacked separate files end occurring sequentially related files positioned close existing files deleted truncated new regions free space created existing files appended often impossible resume write exactly file used end another file may already allocated thus new fragment allocated time goes factors continuously present free space well frequently appended files tend fragment shorter regions free space also mean file system longer able allocate new files contiguously break fragments especially true file system becomes full large contiguous regions free space unavailable following example simplification otherwise complicated subject consider following scenario new disk five files named b c e saved continuously sequentially order file using 10 blocks space block size unimportant remainder disk space one free block thus additional files created saved file e. file b deleted second region ten blocks free space created disk becomes fragmented empty space simply left marked available later use used needed file system could defragment disk immediately deletion would incur severe performance penalty unpredictable times new file called f requires seven blocks space placed first seven blocks newly freed space formerly holding file b three blocks following remain available another new file called g needs three blocks added could occupy space f c. subsequently f needs expanded since space immediately following occupied three options file system second option probably impractical performance reasons third file large third option impossible single contiguous free space large enough hold new file thus usual practice simply create extent somewhere else chain new extent onto old one material added end file f would part extent much material room available last extent another extent would created eventually file system free segments many places files may spread many extents access time files files may become excessively long early file systems unable fragment files one example acorn dfs file system used bbc micro due inability fragment files error message ca n't extend would times appear user would often unable save file even disk adequate space dfs used simple disk structure files disk located length starting sector meant files exist continuous block sectors fragmentation possible using example table attempt expand file f step five would failed system ca n't extend error message regardless much free space might remain disk total available extend data file standards error handling time primitive case programs squeezed limited memory bbc micro could rarely afford waste space attempting handle errors gracefully instead user would find dumped back command prompt ca n't extend message data yet appended file would lost problem could solved simply checking free space disk beforehand either free space disk may exist size largest contiguous block free space immediately apparent without analyzing numbers presented disk catalog would escape user notice addition almost dfs users previously used cassette file storage suffer error upgrade floppy disk system expensive upgrade shock upgrade might without warning cause data loss file system fragmentation may occur several levels individual file fragmentation occurs single file broken multiple pieces called extents extent-based file systems disk file systems attempt keep individual files contiguous often possible without significant performance penalties file system check defragmentation tools typically account file fragmentation fragmentation percentage statistic free unallocated space fragmentation occurs several unused areas file system new files metadata written unwanted free space fragmentation generally caused deletion truncation files file systems may also intentionally insert fragments bubbles free space order facilitate extending nearby files see preventing fragmentation file segmentation also called related-file fragmentation application-level file fragmentation refers lack locality reference within storing medium related files see file sequence detail unlike previous two types fragmentation file scattering much vague concept heavily depends access pattern specific applications also makes objectively measuring estimating difficult however arguably critical type fragmentation studies found frequently accessed files tend small compared available disk throughput per second avoid related file fragmentation improve locality reference case called file contiguity assumptions active observations operation applications made frequent assumption made worthwhile keep smaller files within single directory together lay natural file system order often reasonable assumption always hold example application might read several different files perhaps different directories exactly order written thus file system simply orders writes successively might work faster given application file system fragmentation problematic consumer-grade hard disk drives increasing disparity sequential access speed rotational latency lesser extent seek time file systems usually placed thus fragmentation important problem file system research design containment fragmentation depends on-disk format file system also heavily implementation file system fragmentation less performance impact upon solid-state drives mechanical seek time involved however file system needs store one additional piece metadata corresponding file piece metadata occupies space requires processing power processor time maximum fragmentation limit reached write requests fail simple file system benchmarks fragmentation factor often omitted realistic aging fragmentation difficult model rather simplicity comparison file system benchmarks often run empty file systems thus results may vary heavily real-life access patterns several techniques developed fight fragmentation usually classified two categories preemptive retroactive due difficulty predicting access patterns techniques often heuristic nature may degrade performance unexpected workloads preemptive techniques attempt keep fragmentation minimum time data written disk simplest appending data existing fragment place possible instead allocating new blocks new fragment many today file systems attempt preallocate longer chunks chunks different free space fragments called extents files actively appended largely avoids file fragmentation several files concurrently appended thus avoiding becoming excessively intertwined final size file subject modification known storage entire file may preallocated example microsoft windows swap file page file resized dynamically normal operation therefore become highly fragmented prevented specifying page file minimum maximum sizes effectively preallocating entire file bittorrent peer-to-peer filesharing applications limit fragmentation preallocating full space needed file initiating downloads relatively recent technique delayed allocation xfs hfs+ zfs technique also called allocate-on-flush reiser4 ext4 file system written file system blocks reserved locations specific files laid yet later file system forced flush changes result memory pressure transaction commit allocator much better knowledge files characteristics file systems approach try flush files single directory contiguously assuming multiple reads single directory common locality reference improved reiser4 also orders layout files according directory hash table files accessed natural file system order dictated readdir always read sequentially retroactive techniques attempt reduce fragmentation negative effects fragmentation occurred many file systems provide defragmentation tools attempt reorder fragments files sometimes also decrease scattering i.e improve contiguity locality reference keeping either smaller files directories directory trees even file sequences close disk hfs plus file system transparently defragments files less 20 mib size broken 8 fragments file opened obsolete commodore amiga smart file system sfs defragmented filesystem use defragmentation process almost completely stateless apart location working stopped started instantly defragmentation data integrity ensured metadata normal data
[ 2432, 3841, 6797, 2193, 11667, 2197, 11033, 7070, 6434, 9762, 7983, 819, 8627, 8628, 3640, 3512, 3257, 8510, 8640, 9665, 10051, 5840, 6494, 8671, 739, 1253, 3312, 246, 9343 ]
None
2,688
1
Enhanced_entity–relationship_model:enhanced entity–relationship model enhanced entity–relationship eer model extended entity–relationship model computer science high-level conceptual data model incorporating extensions original entity–relationship er model used design databases developed reflect precisely properties constraints found complex databases engineering design manufacturing cad/cam telecommunications complex software systems geographic information systems gis eer model includes concepts introduced er model additionally includes concepts subclass superclass is-a along concepts specialization generalization furthermore introduces concept union type category used represent collection objects union objects different entity types eer model also includes eer diagrams conceptual models accurately represent requirements complex databases entity type subtype subclass entity type x every necessarily x subclass entity inherits attributes relationships superclass entity property called attribute relationship inheritance subclass entity may specific attributes relationships together attributes relationships inherits superclass common superclass example vehicle superclass along subclasses car truck number common attributes car truck would part superclass attributes specific car truck max payload truck type ... would make two subclasses textbooks discussing eer implementation using purely relational databases booklet discussing eer implementation using object-oriented object-relational databases textbook discussing implementation relational object-relational databases shorter survey articles
[ 5632, 1146, 8201, 9481, 10505, 9467, 10258, 10518, 4376, 9112, 9631, 7968, 1697, 290, 1314, 7074, 7461, 8742, 5550, 5808, 10418, 1076, 9397, 9527, 3768, 4155, 3004, 7868, 9147, 9661, 4416, 5441, 9663, 11324, 11457, 6085, 8518, 72, 2512, 8...
Test
2,689
7
WANdisco:wandisco wandisco plc. dually headquartered sheffield england san ramon california us public software company specialized area distributed computing development offices san ramon california sheffield england belfast northern ireland wandisco corporate contributor hadoop subversion open source projects name wandisco acronym wide area network distributed computing initially offering replication solution distributed teams using concurrent versions system cvs expanded include apache subversion svn multisite plus 2006 git git multisite 2013 gerrit gerrit multisite 2014 2012 wandisco acquired altostor entered big data market non-stop hadoop product altostor founders dr. konstantin shvachko jagane sundar joined wandisco part acquisition helped develop company next generation hadoop product released 2015 wandisco fusion wandisco distributed coordination engine dcone shared component wandisco clustering products dcone system allows multiple instances application operate independent hardware without sharing resources application servers kept synchronisation dcone regardless whether servers lan globally separated accessible wide area network wan wandisco replication technology work yeturu aahlad previously worked sun netscape ibm involved developing corba framework aahlad theorized model effective active replication wan development dcone wandisco taken paxos algorithm baseline added innovations relevant mission-critical high transaction volume distributed environments wandisco provides replication products cvs apache subversion git gerrit apache hadoop amazon web services microsoft azure google cloud platform addition company offers support consultancy training services company website lists companies arm avaya bally technologies barclays blackrock bosch cisco dell emc disney fujitsu general electric honda juniper networks pitney bowes april 2016 wandisco announced ibm signed deal oem wandisco fusion deal allows ibm rebrand fusion ibm big replicate plays important role ibm big data cloud computing strategy including movement data on-premises software cloud july 2018 wandisco announced filed new patent blockchain company claims patent enables effective permissioned blockchain transactions underlying algorithmic mechanism mechanism enables throughput achieved orders magnitude higher public blockchains 2011 wandisco announced ubersvn deployment apache subversion included web based management console ability add additional application lifecycle management features ubersvn download available mid-2013 september 2013 wandisco announced official sponsor uc berkeley amplab five-year collaborative effort university california berkeley wandisco one apache hadoop committer staff jagane sundar february 2013 wandisco released free distribution hadoop containing additional components developed wandisco wandisco involved apache subversion open source project 2008 2015 employed several contributors work subversion project time wandisco provides subversion binary downloads windows centos debian oracle linux rhel suse linux ubuntu mac os x solaris via website binaries use default package management system linux distribution december 2010 wandisco announced intention develop features subversion project specifically aimed improving branching merging functionality apache foundation subversion developers said announcement contained unfounded claims insinuations community involvement lack development features according apache features already worked time david richards wandisco clarified position subversion community followed announcing wandisco sponsorship ongoing support work apache software foundation
[ 9248, 1668, 7499, 3791, 1935, 7248, 6834, 9137, 4919, 1049, 3323 ]
Test
2,690
4
Hacktivity:hacktivity hacktivity conference traditional event budapest hungary official alternative representatives information security profession meet interested field framework time informal informative sometimes in-depth technological participants official alternative experts information security profession universities colleges professors participating training young people participating high level education/university college students professional trade unions
[ 7449, 5373 ]
Test
2,691
9
Visual_programming_language:visual programming language computing visual programming language vpl programming language lets users create programs manipulating program elements graphically rather specifying textually vpl allows programming visual expressions spatial arrangements text graphic symbols used either elements syntax secondary notation example many vpls known dataflow diagrammatic programming based idea boxes arrows boxes screen objects treated entities connected arrows lines arcs represent relations vpls may classified according type extent visual expression used icon-based languages form-based languages diagram languages visual programming environments provide graphical iconic elements manipulated users interactive way according specific spatial grammar program construction general goal vpls make programming accessible novices support programmers three different levels visually transformed language non-visual language superimposed visual representation naturally visual languages inherent visual expression obvious textual equivalent current developments try integrate visual programming approach dataflow programming languages either immediate access program state resulting online debugging automatic program generation documentation dataflow languages also allow automatic parallelization likely become one greatest programming challenges future visual basic visual c visual j etc languages microsoft visual studio ide visual programming languages representation algorithms etc textual even though ide embellishes editing debugging activities rich user interface similar consideration applies rapid application development environments typically support form designer sometimes also graphical tools illustrate define control flow data dependencies parsers visual programming languages implemented using graph grammars following contains list notable visual programming languages many modern video games make use behavior trees principle family simple programming languages designed model behaviors non-player characters behaviors modeled trees often edited graphical editors article originally based material free on-line dictionary computing used update needed
[ 9345, 1924, 9224, 6539, 6797, 4111, 5775, 7825, 10514, 5395, 5651, 7571, 9877, 5527, 10134, 4121, 9626, 3613, 4770, 5415, 7341, 10413, 5680, 9780, 1591, 1207, 9783, 4410, 191, 576, 2242, 6594, 7363, 10819, 8262, 9926, 5320, 11207, 4042, 1...
Test
2,692
2
Corel_Linux:corel linux corel linux also called corel linuxos debian-based operating system made corel began beta testing september 21 1999 released public november 15 1999 mainly competed windows 98 windows 2000 microsoft plus mac os 9 apple corel later discontinued distribution remove former corel open source development website march 2002 corel use kfm standard kde file manager instead used file manager cfm along modifications corel made made operating system incompatible versions linux much competitors industry time relatively little linux software available serious hurdle corel users operating system second edition released august 15 2000 download regular deluxe editions latter bundled corel wordperfect office linux xandros purchased corel linux source code development team corel scrapped linux business august 2001 however corel corporation stockholder xandros corel linux following system requirements corel linux featured file manager close look feel windows explorer file manager provided integrated windows smb network browser company also advertised operating system compatible flagship software key selling point corel linux compatibility company wordperfect applications eponymous word processor eighth version given away personal customers hopes would purchase wordperfect office 2000 suite added quattro pro corel presentations corelcentral programs deluxe version suite added paradox database manager latter omits level editor network mode scenarios original game 'limited edition corel linux deluxe came instead railroad tycoon ii unlike free wordperfect 8 office suite written natively linux instead consisted windows programs powered corel fork wine compatibility layer result linux suite suffered performance penalty compared windows version wordperfect 8 wordperfect suite corel adapted graphics applications run linux using wine consisted coreldraw stylized coreldraw suite eponymous program paid software corel photo-paint available free download corel smartmove part corel linux application provided following smartmove built around wine libraries read windows registry settings windows applications thus able migrate smartmove core libraries created wrapper windows registry easily look settings smartmove looks existing microsoft windows installations machine looks little individual users offers transfer application settings analogous programs linux understands deal internet explorer netscape cookies bookmarks outlook mirc icq settings variety desktop preferences including wallpaper color scheme even mouse handedness tried settings since windows installation fairly new n't much check death corel linux application faded away longer maintained however similar functionality available least ubuntu installing dual-boot configuration machine already windows
[ 5380, 8837, 7435, 6797, 10127, 2321, 8851, 10899, 5397, 4887, 10394, 10397, 673, 3745, 10530, 9253, 10149, 11305, 7854, 7983, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 8907, 2383, 1110, 5721, 9693, 3167, 1632, 2914, 485, 3685...
Test
2,693
4
Mondo_Rescue:mondo rescue mondo rescue free disaster recovery software supports linux i386 x86-64 ia-64 freebsd i386 packaged multiple distributions red hat rhel fedora centos opensuse sles mandriva debian ubuntu gentoo also supports tapes disks usb devices network cd/dvd backup media multiple filesystems lvm software hardware raid restoration may done physical media including obdr tape support cd/dvd/usb media network pxe mentioned free software directory emphasis stability ease use according ohloh mondorescue development worth 6m mondo uses linux distribution called mindi provide favorable post boot environment performing data restore unlike disk clone solutions ready use live cd provided mondo rescue instead included mindi package create custom turn-key live cd/dvds using exact linux kernel configuration system backed effect bootable dvd/cd customized computer backed objective reduce possibility missing device drivers kernel incompatibilities may arise using generic vanilla linux kernel pre-built live dvd/cd
[ 6280, 1801, 5356, 3791, 7983, 9455, 6514, 10387, 4438, 823, 2045, 7134 ]
Test
2,694
7
CloudLocker:cloudlocker cloudlocker personal cloud device created stoamigo based paradise nevada cloudlocker offers cloud storage data conversion file sharing powered stoamigo platform unlike public cloud service involves third party access users ’ digital media cloudlocker on-premises cloud solution stays user ’ possession connects home office network via plug play interface cloud computing storage widely acknowledged next big thing many people wary privacy concerns uncomfortable storing personal data pictures videos somebody else ’ server core challenge data privacy share data protecting personal information public cloud storage services google amazon microsoft dropbox offer level protection personal information would available information kept home office according report world privacy forum report found “ information stored business individual third party may fewer weaker privacy protections information possession creator information. ” report goes state “ government agencies private litigants may able obtain information third party easily creator information. ” cloudlocker one many different personal cloud options market today cloudlocker falls server device cloud category personal cloud solutions cloudlocker attempts address internet privacy issue providing personal cloud server users keep sole possession gives global access remote browser user ’ internet-enabled devices files stored cloudlocker accessed pc laptop smartphone tablet via stoamigo platform stoamigo account stoamigo desktop web mobile applications designed sharing viewing streaming digital media cloudlocker used file sharing anyone even stoamigo account users decide share digital media user set permissions recipients view-only download share private file files shared anyone else users share files folders lists multiple contacts customize permission settings person user arrange receive notifications viewed downloaded shared files thus establish audit trail access specific files folders users may modify settings shared files time share choose retract shared files everyone selected recipients users create listen playlists watch video files continuous play devices streaming cloudlocker downloading required native media player streams files cloudlocker dlna compatible user able view media content cloudlocker dlna tv dlna device cloudlocker comes usb ports user attach external hard drives cloudlocker use space additional storage thereby making storage space limitless stoamigo android ios app option create qr code mobile device share file folder list files music playlist cloudlocker stoamigo also available europe
[ 4194, 10185, 4623, 7983, 10161, 5650, 823, 10168, 2267, 8446 ]
Test
2,695
5
CalDAV:caldav calendaring extensions webdav caldav internet standard allowing client access scheduling information remote server extends webdav http-based protocol data manipulation specification uses icalendar format data access protocol defined allows multiple client access information thus allowing cooperative planning information sharing many server client applications support protocol extensions caldav automated scheduling also standardized caldav specification first published 2003 internet draft submitted internet engineering task force ietf lisa dusseault march 2007 caldav specification finished published ietf rfc 4791 authored cyrus daboo apple bernard desruissaux oracle lisa dusseault commercenet caldav designed implementation collaborative software client server needs maintain access share collections events developed open standard foster interoperability software different implementers architecture caldav partially inherited underlying specifications organizes data events tasks free-busy info notes directories collections multiple items resources reside resources collections accessed one users using standard http dav semantics detect conflicting changes provide locking access control concept acls used operation view edit delete etc denied granted per user therefore specification requires caldav servers must support webdav access control protocol rfc 3744 calendar resources must use icalendar format allows server understand process data parsing icalendar items necessary server support number calendaring-specific operations free-busy time reports expansion recurring events functionality user may synchronize calendar caldav server share among multiple devices users protocol also supports non-personal calendars calendars sites organizations list caldav clients includes list caldav server includes
[ 8386, 5093, 4490, 362, 3246, 7888, 3286, 2679, 5784, 11418, 7415, 5791 ]
Test
2,696
7
SalesforceIQ:salesforceiq salesforceiq formerly relateiq subsidiary salesforce.com american software company based palo alto california company software involves relationship intelligence platform combines data email systems smartphone calls appointments augment replace standard relationship management tools database solutions scans 10,000 emails calendar entries data points per minute first run july 2014 salesforce.com announced plans acquire company close 400 million company founded july 2011 adam evans steve loughlin end july 2013 company hired data scientist dj patil vp product leadership team also includes vp sales armando mann recent head sales dropbox former google executive vp marketing elise bergeron formerly facebook unlike traditional relationship management systems rely data input users keep teams informed run predictive analytics salesforceiq platform automatically isolates analyzes user professional emails interactions combining data information gleaned sources linkedin facebook salesforceiq leverages data science comb emails analyze offer reminders suggestions busy salespeople march 2014 company released closest connections feature automates normally time-consuming—and potentially erroneous—sales process identifying warm introductions potential prospects based real activity happening within team email inboxes phones calendars social networks part 2015 dreamforce conference relateiq rebranded salesforceiq
[ 10090, 467 ]
Train
2,697
3
M.U.L.E.:m.u.l.e m.u.l.e seminal multiplayer video game originally written atari 8-bit family ozark softscape published 1983 electronic arts designed danielle bunten berry m.u.l.e ported commodore 64 nintendo entertainment system ibm pcjr japanese versions also exist pc-8801 sharp x1 msx 2 computers plays like strategy game incorporates aspects simulate economics set fictional planet irata atari backwards game exercise supply demand economics involving competition among four players computer opponents automatically filling missing players players provided several different choices race colonist providing different advantages disadvantages paired respective strategies win players compete amass largest amount wealth must also cooperate survival colony central game acquisition use m.u.l.e multiple use labor element develop harvest resources player real estate depending outfitted m.u.l.e configured harvest energy food smithore m.u.l.e.s constructed crystite valuable mineral available tournament level players must balance supply demand elements buying need selling n't players may also exploit create shortages refusing sell players store raises price resource following turns scheming players encouraged allowing collusion initiates mode allowing private transaction crystite one commodity influenced supply demand considerations deemed sold 'off world strategy resource somewhat different—a player may attempt maximize production without fear much supply demand resource required certain things turn instance player short food less time take one turn similarly player short energy land plots wo n't produce output shortage smithore raise price m.u.l.e.s store prevent store manufacturing new m.u.l.e.s make use one land players must also deal periodic random events run-away m.u.l.e.s sunspot activity theft space pirates meteorite potentially destructive beneficial effects game features balancing system random events impact single player favorable events never happen player currently first place unfavorable events never happen player last place leveling playfield applied whenever tie happens game e.g two players want buy resource price player losing position automatically wins tie players also hunt mountain wampus cash reward according jim rushing one four original partners ozark softscape m.u.l.e initially called planet pioneers development intended similar cartels cutthroats graphics better playability focus multiplayer real-time auction element came largely lead designer danielle bunten wheeler dealers board game monopoly used model game encouragement social interaction monopoly came several game elements acquisition development land primary task economy scale effect wherein grouped plots multiple plots type would increased production quantities also inspired different species different tokens monopoly random events affecting individual similar chance cards additional game features claim jumping loans crystite depletion discarded adding complexity without enhancing gameplay setting inspired robert a. heinlein time enough love wherein galactic colonization style american old west pioneers drive primitive tools m.u.l.e based idea genetically modified animal heinlein novel given appearance star wars imperial walker another heinlein novel moon harsh mistress provided decision government external authority land originally sold auction caused feedback loop wealthiest player land thus made money thus developers created land authority gives player free plot land turn ozark softscape developed game atari 8-bit first policy developing advanced computers porting platforms removing altering features sprites necessary bunten stated ozark port game apple ii series m.u.l.e ca n't done apple pc port m.u.l.e developed k-byte software affiliate electronic arts published ibm part venture home market pcjr sold poorly due released 1985 latter discontinued although game actual pcjr support copies existed internet considered lost 2012 vince bray found original disk archived jeff leyda jim leonard m.u.l.e sold 30,000 copies lauded reviewers computer gaming world described fascinating enjoyable game comes best point four human players minor criticisms included too-weak computer opponents lack save feature softline called m.u.l.e computer games like game learning experience also stimulating fun frustrating thought provoking fun addictive fun magazine praised offering valuable lessons economic topics noting learned hard way concluded game feels good virtually flawless human-computer human-human competition john j. anderson wrote creative computing also mention shooting found anywhere game positively refreshing ... mule belongs every atari software shelf world every home every school near every atari scott mace infoworld called m.u.l.e unusual ease allows multiplayer interaction single game computer console wrote would incredible lasting power like best board games stated learned economics marketplace m.u.l.e ever college leo laporte hi-res also said learned economics game college predicted m.u.l.e may revitalize video game industry ought make rich anyway praised theme captivating musical come-on 've ever heard concluded ask m.u.l.e perfect game reporting byte children loved jerry pournelle described m.u.l.e cross hammurabi diplomacy arcade game lots strategic decisions—provided 're skillful enough joystick implement 've decided another reviewer wrote magazine impossible adequately describe interaction economically realistic subtleties m.u.l.e concluding intriguing way illustrate triumphs perils free enterprise orson scott card compute 1983 gave m.u.l.e two ea games worms complimentary reviews writing original set well allow player take part creativity things computers magazine listed game may 1988 one favorite games stating requires sense strategy well proficiency joystick maneuvers steven list reviewed m.u.l.e space gamer 70 commented m.u.l.e simply great game tour de force programming design good family entertainment educational exciting n't computer disk drive may worth investment able play addison-wesley book atari software 1984 gave game overall rating stating combines best features monopoly economic simulation games like hammurabi teaching valuable lessons economies fun way book noted several people play game becomes involved interactive two zzap 64 reviewers stated 1985 m.u.l.e excellent trading game recommended novice skilled third complained found little excitement ... nothing keep interested 1984 m.u.l.e awarded 1984 best multi-player video game/computer game 5th annual arkie awards judges described unique blend boardgame strategy computer-game pacing noted since release 'm.u.l.e gained intense cult following softline readers named game third most-popular atari program 1983 score 7.44 10 1988 m.u.l.e among first members computer gaming world hall fame honoring games rated highly time readers 1992 1994 surveys science fiction games magazine gave title five five stars calling all-time computer classic one games ever devised playable entertaining four humans economics made fun ... still holds well years provides justification holding onto 8-bit atari 1996 magazine named m.u.l.e 3 best games time list named 5 ten greatest pc games ever pc world 2009 m.u.l.e listed 19th important video game time 1up.com chris crawford said game considering platform team deal m.u.l.e greatest game design ever done computer gaming world reported april 1994 ea working videogame version game design terminated creative differences publisher designer magazine reported rumor may 1994 sega genesis version completed ea debating release reported august 1994 bunten decided remaking game ea wanted put guns bombs editorial asked company give us m.u.l.e smithore crystite creator intended bunten working internet version m.u.l.e death 1998 2005 netplay component called kaillera integrated atari800winplus emulator enabling original game played internet several m.u.l.e clones exist including subtrade traders space horse online remake game called planet m.u.l.e released december 6 2009 game free download major platforms comma 8 studios later acquired mobile m.u.l.e license released m.u.l.e returns ios november 2013 super mario bros creator shigeru miyamoto cited m.u.l.e influence pikmin series wright dedicated game sims memory bunten m.u.l.e theme song included wright later game spore easter egg space level ability allows terran players call multiple robotic workers called m.u.l.e.s board game adaptation m.u.l.e board game released 2015 according twin galaxies following records recognized
[ 9006 ]
None
2,698
2
Memwatch:memwatch memwatch free programming tool memory leak detection c released gnu general public license designed compile run system ansi c compiler primarily intended detect diagnose memory leaks also used analyze program memory usage provided logging facilities memwatch differs debugging software compiled directly program debugged instead compiled separately loaded program runtime
[ 2045, 814 ]
None
2,699
4
UniKey:unikey unikey technologies alternative access control company based united states designs licenses keyless entry technology worldwide first product partnership kwikset kēvo bluetooth-enabled deadbolt door lock unikey technologies founded 2010 florida phil dumas serves president chief executive officer electrical engineering degree university central florida background biometric security dumas part team launched smartscan first mass-market biometric residential deadbolt lock started unikey effort create dependable convenient way access everything unikey technologies first came public attention may 2012 dumas appeared abc reality series shark tank unikey received investment offers five judges show including offer 500,000 40 equity stake mark cuban kevin o'leary dumas accepted offer ultimately unable come terms show 2013 unikey raised approximately 2.6 million funding led ff venture capital year unikey announced licensing deal kwikset largest residential lock manufacturer united states one largest world manufacture distribute kēvo residential smart lock using unikey technology launched 2013 kēvo first bluetooth-enabled touch-to-open smart lock kēvo ability detect user compatible smartphone tablet via app lock unlock door deadbolt lock senses user phone nearby outside phone emits low-energy bluetooth signal allowing door unlocked lock face touched making unnecessary interact phone order open door users grant unrestricted temporary access phones well kēvo also comes keychain fob provides touch-to-open function authorized smart phone prime security feature product unikey inside/outside intelligence detects whether verified device currently inside outside home authorized device known inside house unauthorized users unable activate kēvo outside system acts one-way filter lets authorized users pass entryway june 2014 unikey miwa lock company announced partnership offer keyless entry hotels unikey developed touch-to-open passive keyless entry system integrated miwa existing radio-frequency identification hospitality locks keys activated smartphone apps guests check app sent room number phone enabled act virtual key following miwa partnership unikey making way commercial access control industry partnerships grosvenor technologies nortek security control company also expanded international reach partnership uk home security company era
[ 2737 ]
Train
2,700
3
LibATA:libata libata library used inside linux kernel support ata host controllers devices libata provides ata driver api class transports ata atapi devices scsi ata translation ata devices according t10 sat specification features include power management s.m.a.r.t. pata/sata atapi port multiplier hot swapping ncq
[ 1801, 2804 ]
Validation
2,701
5
Connection-oriented_communication:connection-oriented communication connection-oriented communication network communication mode telecommunications computer networking communication session semi-permanent connection established useful data transferred stream data delivered order sent alternative connection-oriented transmission connectionless communication example datagram mode communication used ip udp protocols data may delivered order since different network packets routed independently may delivered different paths connection-oriented communication may circuit switched connection packet-mode virtual circuit connection latter case may use either transport layer virtual circuit protocol tcp protocol allowing data delivered order although lower layer switching connectionless may data link layer network layer switching mode data packets belonging traffic stream delivered path traffic flows identified connection identifier rather complete routing information allowing fast hardware based switching connection-oriented protocol services often always reliable network services provide acknowledgment successful delivery automatic repeat request functions case missing data detected bit-errors atm frame relay mpls examples connection-oriented unreliable protocol circuit switched communication example public switched telephone network isdn sonet/sdh optical mesh networks intrinsically connection-oriented communications systems circuit mode communication provides guarantees data arrive constant bandwidth constant delay in-order delivery bit stream byte stream provided switches reconfigured circuit establishment phase packet switched communication may also connection-oriented called virtual circuit mode communication due packet switching communication may suffer variable bit rate delay due varying traffic load packet queue lengths connection-oriented communication necessarily reliable protocols keep track conversation connection-oriented protocols sometimes described stateful connection-oriented transport layer protocols provide connection-oriented communications connectionless communications systems connection-oriented transport layer protocol tcp may based connectionless network layer protocol ip still achieves in-order delivery byte-stream means segment sequence numbering sender side packet buffering data packet reordering receiver side sequence numbering requires two-way synchronization segment counters three-step connection establishment phase connection-oriented packet switched data link layer network layer protocol data sent path communication session protocol identifies traffic flows channel/data stream number often denoted virtual circuit identifier vci rather complete routing information packet source destination addresses used connectionless datagram switching conventional ip routers connection-oriented communication routing information may provided network nodes connection establishment phase vci defined tables node thus actual packet switching data transfer taken care fast hardware opposed slow software based routing typically connection identifier small integer 10 bits frame relay 24 bits atm example makes network switches substantially faster routing tables simple look-up tables trivial implement hardware impact great fact even characteristically connectionless protocols ip traffic tagged connection-oriented header prefixes e.g. mpls ipv6 built-in flow id field atm frame relay example examples connection-oriented unreliable data link layer protocols also reliable connectionless protocols well ax.25 network layer protocol passes data i-frames combination rare reliable-connectionless uncommon modern networks connection-oriented protocols handle real-time traffic substantially efficiently connectionless protocols especially short constant length packets atm yet replaced ethernet carrying real-time isochronous traffic streams especially heavily aggregated networks like backbones motto bandwidth cheap fails deliver promise experience also shown over-provisioning bandwidth resolve quality service issues hence 10- gigabit ethernet expected replace atm time connection-oriented protocols designed altered accommodate connection-oriented connectionless data examples connection-oriented packet mode communication i.e virtual circuit mode communication
[ 4609, 2306, 2827, 5531, 10924, 562, 1586, 9909, 7865, 4797, 3006, 5439, 2752, 835, 11591, 5470, 5472, 1893, 11112, 2793, 4589, 10864, 2802, 6267 ]
Validation
2,702
2
Ubuntu_Hacks:ubuntu hacks ubuntu hacks tips tools exploring using tuning linux book tips ubuntu popular linux distribution book published o'reilly media june 2006 part o'reilly hacks series
[ 823 ]
None
2,703
8
TreeRing:treering treering silicon valley ca-based technology company providing on-demand digital printing customizable school yearbooks us canada one first start-ups changed traditional yearbook industry company designed free software social-networking features allowing creation personalized yearbooks offered new business model eliminating financial cost yearbooks schools treering publishing platform allows high school community collaborate web-based yearbooks saved using cloud storage users add share comment photos memories events students parents customize copy school yearbook uploading content personalized pages result addition print version schools opt share online yearbook company business model impose financial obligation schools signing treering unlike traditional publishers business models based offset printing techniques minimum orders ordering paying yearbooks done online 2012 treering printed 125,000 yearbooks raised 3.6 million first round venture funding silicon valley list company investors included mike mccue flipboard co-founder rich barton expedia zillow founder second avenue partners cedar grove investments others 2013 company served 2,000 schools across us anticipating production 200,000 yearbooks company prints yearbooks recycled paper plants tree every printed copy
[ 8446 ]
Test
2,704
2
Phoenix-RTOS:phoenix-rtos phoenix-rtos real-time operating system designed internet things appliances main goal system facilitate creation software defined solutions phoenix-rtos successor phoenix operating system developed 1999-2001 pawel pisarczyk department electronics information technology warsaw university technology phoenix originally implemented ia-32 microprocessors adapted arm7tdmi processor 2003 powerpc 2004 system available gpl license decision abandon development phoenix write phoenix-rtos scratch taken creator 2004 2010 phoenix systems company established aiming commercialize system phoenix-rtos 2.0 based monolithic kernel initially versions ia-32 processor configurable esi-risc developed cooperation nxp semiconductors phoenix-rtos 2.0 also adapted vybrid arm cortex-a5 platform version equipped prime phoenix-prime g3-plc phoenix-g3 protocol support used smart grid networks phoenix-rtos runs applications designed written unix operating system phoenix-rtos version 3.0 based microkernel expected completed 2017 geared towards measuring devices low power consumption main problem first implementation low kernel modularity difficulties management process software development device drivers file system drivers phoenix-rtos equipped haas hardware software modules allow implementation rich devices functionality e.g modems existing haas modules include 2016 energa-operator based poland installed 6.6k data concentrator units balancing meter functionality network based phoenix-rtos license agreements use system mass production smart meters signed
[ 7170, 5380, 9964, 7983, 7187, 5492, 9366, 7483, 8700, 6207 ]
Test
2,705
4
AppShield:appshield appshield world first application firewall appshield conceptualized eran reshef gili raanan introduced market perfecto technologies sanctum summer 1999 appshield product first product inspect incoming hypertext transfer protocol requests block malicious attacks based dynamic policy composed analyzing outgoing html pages product faced many market adoption challenges sanctum forced introduce complementary solution named appscan demonstrate need application security 2004 f5 networks acquired appshield intellectual properties sanctum discontinued technology gartner ’ magic quadrant mq 2015 web application firewalls estimates global waf market size big 420 million 24 percent annual growth
[ 2118, 331, 5404, 5178, 2238, 4797, 2558 ]
Test
2,706
3
VESA_Display_Power_Management_Signaling:vesa display power management signaling vesa display power management signaling dpms standard vesa consortium power management video monitors example usage includes turning putting monitor standby period idle time save power commercial displays also incorporate technology vesa issued dpms 1.0 1993 basing work united states environmental protection agency epa earlier energy star power management specifications subsequent revisions included future vesa bios extensions standard defines signal h-sync v-sync pins standard svga monitor trigger monitor power saving capabilities dpms defines four modes normal standby suspended state power may still drawn order power indicator lights standard
[ 9057, 8682, 11631, 11634, 3548 ]
Validation
2,707
2
Samsung_Wave_II_S8530:samsung wave ii s8530 samsung wave ii s8530 samsung wave ii successor samsung wave s8500 smartphone running bada 1.2 operating system designed samsung commercially released october 2010 wave slim touchscreen phone powered samsung hummingbird cpu s5pc110 includes 1 ghz arm cortex-8 cpu powerful built-in powervr sgx 540 graphics engine super lcd screen 720p high-definition video capture capabilities shortage super amoled screens one primary reasons release model design phone made mostly metal alloy measured 10.9 mm thick terms form factor slate style featuring 3 physical buttons front call reject/ shutdown main menu button screen screen capacitive touchscreen super lcd anti-smudge oleophobic coating top scratch-resistant tempered-glass gorilla glass display touch panel shown capable resisting extreme friction scratch-resistant screen resolution 800x480 wvga processor phone features 1 ghz soc internally contains arm cortex a8 cpu core identical arm cortex cpu core used apple a4 package package soc phone graphics engine sgx 540 said capable generating 90 million triangles per second soc used samsung galaxy 256mb+128mb ram hardware samsung wave s8500 camera phone features 5 megapixel supports 2592 x 1944 pixels along autofocus led flash geo-tagging face blink detection image stabilization touch focus etc features various shooting modes beauty shot smile shot continuous panorama vintage shot camcorder able shoot 720p hd recording 1280x720 30 fps flash well also able record slow motion video 320x240 120 fps flash features feature includes a-gps 2 gb/8 gb internal storage microsdhc slot additional 32 gb also magnetometer proximity sensor accelerometer 5.1-channel surround sound mobile theater music recognition fake call service smart search social hub first phone support bluetooth version 3.0 addition bluetooth 3.0 phone also features wi-fi 802.11 b/g/n hsdpa 3.2 mbit/s hsupa 2 mbit/s phone available european/asia 3g bandings north american 3g bandings keep mind north american 3g bandings version phone limited availability available us user interface phone one smartphone feature samsung bada operating system platform ui samsung touchwiz 3.0 touchwiz 3.0 like 2 predecessors touchwiz 2.0 touchwiz utilises widgets 3 notable widgets pre-installed touchwiz 3.0 daily briefing includes essential information weather finance ap mobile news schedule feeds updates buddies allows users call send texts read facebook/twitter feeds favourite contacts users allowed 10 homescreens add widgets applications terms internet browser samsung wave pre-installed dolphin browser v2.0 based webkit browser supports flash disabled default improve page load time default phone comes picsel viewer capable reading .pdf microsoft office file formats users selected countries buy download picsel office editor samsung apps samsung apps users also download applications games widgets application store software includes gps software comes phone lbs route 66 palringo im facebook twitter social hub mini diary daily briefing memo video player fm radio media browser voice recorder e-mail pre-installed asphalt5 media support mp3 aac aac+ e-aac+ wma amr wav mp4 flac mpeg4 h.263 h.264 wmv avi divx xvid mkv android porting due many owners phone disliking bada software many people worked porting popular android o.s wave 2 ported versions known froyo gingerbread ice cream sandwich jelly bean kitkat however still developed features gps may limited function intended samsung site reviews support forums
[ 10080, 196, 2852, 487, 9964, 7983, 1776, 6608, 2259, 8794, 6391, 10393, 6266, 1083 ]
Validation
2,708
3
RISC_Single_Chip:risc single chip risc single chip rsc single-chip microprocessor developed fabricated international business machines ibm rsc feature-reduced single-chip implementation power1 multi-chip central processing unit cpu implemented power instruction set architecture isa used entry-level workstation models ibm rs/6000 family model 220 230 rsc operated frequencies 33 45 mhz three execution units fixed point unit floating point unit branch processor 8 kb unified instruction data cache like power1 memory controller i/o tightly integrated functional units responsible functions memory interface unit sequencer unit residing die processor rsc contains nine functional units fixed-point execution unit fxu floating-point execution unit fpu memory management unit mmu memory interface unit miu sequencer unit common on-chip processor unit cop instruction fetch unit instruction queue dispatch unit fixed point unit executes integer instructions generates addresses load store operations portions branch instructions three-stage pipeline consisting decode execute writeback stages instructions require several cycles execute stage completed floating point unit executes floating point instructions unlike power1 rsc register renaming capability due limited die area unit must fit save die area floating point multiply-add array 32 bits wide perform 64-bit double-precision operations operands broken two instruction passes twice multiply-add array floating point pipeline consists four stages decode multiply add writeback rsc 8 kb unified cache instead separate instruction large data caches like power1 unified cache two-way set associative uses store-through policy reload store miss least recently used lru replacement policy cache line size 64 bytes cache line sectored four quadwords 16 bytes quadword given valid bit cache directory cycle four words read two doublewords written memory data bus 72 bits wide 64 bits used data path 8 bits used error correcting code ecc memory interface unit manages bus performs ecc checks data coming processor ecc logic capable correcting single-bit errors compared power1 rsc memory data bus narrower uses industry standard simms instead custom memory cards rsc contained approximately one million transistors 14.9 mm 15.2 mm 226.48 mm die fabricated ibm complementary metal-oxide semiconductor cmos process minimal feature size 0.8 μm three levels wiring packaged 36 mm 36 mm ceramic pin grid array module 201 signal pins required 3.6 volt power supply consumed 4 watts operation 33 mhz
[ 3457, 3493, 3470, 5358, 1776, 4465, 10734, 5235, 1461, 3323, 8700 ]
Test
2,709
4
Common_Vulnerabilities_and_Exposures:common vulnerabilities exposures common vulnerabilities exposures cve system provides reference-method publicly known information-security vulnerabilities exposures national cybersecurity ffrdc operated mitre corporation maintains system funding national cyber security division united states department homeland security security content automation protocol uses cve cve ids listed mitre system well us national vulnerability database mitre corporation documentation defines cve identifiers also called cve names cve numbers cve-ids cves unique common identifiers publicly known information-security vulnerabilities publicly released software packages historically cve identifiers status candidate can- could promoted entries cve- however practice ended time ago identifiers assigned cves assignment cve number guarantee become official cve entry e.g cve may improperly assigned issue security vulnerability duplicates existing entry cves assigned cve numbering authority cna three primary types cve number assignments investigating vulnerability potential vulnerability helps acquire cve number early cve numbers may appear mitre nvd cve databases time days weeks months potentially years due issues embargoed cve number assigned issue made public cases entry researched written mitre due resource issues benefit early cve candidacy future correspondence refer cve number information getting cve identifiers issues open source projects available red hat cves software publicly released include betas pre-release versions widely used commercial software included publicly released category however custom-built software distributed would generally given cve additionally services e.g web-based email provider assigned cves vulnerabilities found service e.g xss vulnerability unless issue exists underlying software product publicly distributed cve database contains several fields standardized text description issue one common entry means entry number reserved mitre issue cna reserved number case cna requests block cve numbers advance e.g red hat currently requests cves blocks 500 cve number marked reserved even though cve may assigned cna time cve assigned mitre made aware i.e. embargo passes issue made public mitre researched issue written description entries show **reserved ** list urls information date entry created cves assigned directly mitre date mitre created cve entry cves assigned cnas e.g microsoft oracle hp red hat etc also date created mitre cna case cna requests block cve numbers advance e.g red hat currently requests cves blocks 500 entry date cve assigned cna following fields previously used older cve records longer used order support cve id beyond cve-year-9999 aka cve10k problem change made cve syntax 2014 took effect jan 13 2015 new cve-id syntax variable length includes cve prefix year arbitrary digits note variable length arbitrary digits begin four 4 fixed digits expand arbitrary digits needed calendar year example cve-yyyy-nnnn needed cve-yyyy-nnnnn cve-yyyy-nnnnnn also means changes needed previously assigned cve-ids include minimum 4 digits cve attempts assign one cve per security issue however many cases would lead extremely large number cves e.g several dozen cross-site scripting vulnerabilities found php application due lack use codice_1 insecure creation files codice_2 deal guidelines subject change cover splitting merging issues distinct cve numbers general guideline one first consider issues merged issues split type vulnerability e.g buffer overflow vs. stack overflow software version affected e.g one issue affects version 1.3.4 2.5.4 affects 1.3.4 2.5.8 would split reporter issue e.g alice reports one issue bob reports another issue issues would split separate cve numbers another example alice reports /tmp file creation vulnerability version 1.2.3 earlier examplesoft web browser addition issue several codice_2 file creation issues found cases may considered two reporters thus split two separate cves alice works examplesoft examplesoft internal team finds rest may merge'ed single cve conversely issues merged e.g bob finds 145 xss vulnerabilities exampleplugin exampleframework regardless versions affected may merged single cve mitre cve database searched cve list search nvd cve database searched search cve cce vulnerability database cve identifiers intended use respect identifying vulnerabilities common vulnerabilities exposures cve dictionary common names i.e. cve identifiers publicly known information security vulnerabilities cve ’ common identifiers make easier share data across separate network security databases tools provide baseline evaluating coverage organization ’ security tools report one security tools incorporates cve identifiers may quickly accurately access fix information one separate cve-compatible databases remediate problem users assigned cve identifier vulnerability encouraged ensure place identifier related security reports web pages emails
[ 1024, 5636, 10633, 2187, 6797, 2446, 4240, 1683, 10132, 6550, 6423, 1688, 10264, 2717, 5024, 1954, 4644, 7337, 7467, 4268, 3503, 9904, 7601, 11567, 9525, 8886, 10747, 7736, 7739, 575, 1474, 10622, 1608, 3657, 3021, 11213, 6735, 4689, 8787, ...
None
2,710
7
Oracle_Grid_Engine:oracle grid engine oracle grid engine previously known sun grid engine sge codine computing distributed networked environments grd global resource director grid computing computer cluster software system otherwise known batch-queuing system acquired part purchase gridware improved supported sun microsystems later oracle open source versions multiple commercial versions technology initially sun later oracle univa corporation october 22 2013 univa announced acquired intellectual property trademarks grid engine technology univa take support.. univa since evolved grid engine technology e.g improving scalability demonstrated 1 million core cluster aws announced june 24 2018 original grid engine open-source project website closed 2010 versions technology still available original sun industry standards source license projects forked original project code known son grid engine open grid scheduler univa grid engine grid engine typically used computer farm high-performance computing hpc cluster responsible accepting scheduling dispatching managing remote distributed execution large numbers standalone parallel interactive user jobs also manages schedules allocation distributed resources processors memory disk space software licenses grid engine used foundation sun grid utility computing system made available internet united states 2006 later becoming available many countries early version public cloud computing facility predating amazon aws instance feature sets date last sun releases 2009 earlier current feature information found web sites open source forks univa grid engine features 6.2 features sge include grid engine runs multiple platforms including aix bsd freebsd netbsd openbsd hp-ux irix linux mac os x solaris super-ux tru64 windows via sfu interix sua microsoft windows services unix execution hosts z/os progress typical grid engine cluster consists master host one execution hosts multiple shadow masters also configured hot spares take role master original master host crashes univa providing commercial support training univa grid engine oracle grid engine description historic options sun provided support contracts commercial version grid engine unix platforms windows professional services consulting training support provided sun partners sun partners georgetown university deliver grid engine administration classes bioteam runs short sge training workshops 1 2 days long users obtained community support grid engine mailing lists grid engine workshops held 2002 2003 2007 2009 2012 regensburg germany contains historic information recent deployment information specifically regarding commercial users available univa notable deployments sge include 2000 sun acquired gridware privately owned commercial vendor advanced computing resource management software offices san jose calif. regensburg germany later year sun offered free version gridware solaris linux renamed product sun grid engine 2001 sun made source code available adopted open source development model ports mac os x *bsd contributed non-sun open source developers 2010 purchase sun oracle grid engine 6.2 update 6 source code included binaries changes put back project source repository response grid engine community started open grid scheduler project continue develop maintain free implementation grid engine january 18 2011 announced univa recruited several principal engineers former sun grid engine team univa would developing forked version grid engine newly announced univa grid engine include commercial support would compete official version oracle grid engine oct 22 2013 univa announced acquired intellectual property trademarks pertaining grid engine technology univa take support oracle grid engine customers contains historic information products solutions longer available number sge add-ons available
[ 3328, 7682, 3331, 8447, 9602, 8582, 9731, 1801, 4235, 6797, 1806, 1809, 1304, 9343, 7072, 8994, 1316, 10789, 3753, 1707, 5677, 3247, 7983, 6322, 4020, 2871, 823, 11129, 1594, 2236, 7104, 9665, 6338, 5956, 10436, 8007, 1480, 6856, 330, 289...
Test
2,711
2
Tomoyo_Linux:tomoyo linux tomoyo linux stylised tomoyo linux linux kernel security module implements mandatory access control mac tomoyo linux mac implementation linux used increase security system also useful purely systems analysis tool launched march 2003 sponsored ntt data corporation march 2012 tomoyo linux focuses system behaviour tomoyo linux allows process declare behaviours resources needed achieve purpose protection enabled tomoyo linux restricts process behaviours resources allowed administrator main features tomoyo linux include tomoyo merged linux kernel mainline version 2.6.30 2009 june 10 currently one four standard linux security modules lsm along selinux apparmor smack tomoyo linux project started patch linux kernel provide mac porting tomoyo linux mainline linux kernel required introduction hooks lsm designed developed specifically support selinux label-based approach however hooks needed integrate remaining mac functionality tomoyo linux consequently project following two parallel development lines
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, 2762, 8909, 6352, ...
Test
2,712
4
Robert_E._Drake:robert e. drake robert edwin drake october 11 1923 – january 12 2006 american intelligence official deputy director national security agency 1978 1980 time highest ranking civilian agency joined armed services security agency 1949 eventually newly created national security agency 1952 nsa served overseas offices europe southeast asia hawaii also served position chief soviet east european analytic group deputy director operations retiring nsa 1978 returned independent consulting work intelligence work received national intelligence distinguished service medal national security agency meritorious exceptional civilian service awards defense department distinguished civilian service award central intelligence agency distinguished service medal alumnus carleton college minnesota george washington university national war college died heart failure 2006 aged 82
[ 289, 4898, 7137, 10305, 11302, 327, 6343, 266, 6668, 365, 9357, 4719, 7887, 2897, 1714, 10832, 4566, 6749 ]
None
2,713
2
RemoteFX:remotefx microsoft remotefx microsoft brand name covers set technologies enhance visual experience microsoft-developed remote display protocol remote desktop protocol rdp remotefx first introduced windows server 2008 r2 sp1 based intellectual property microsoft acquired continued develop since acquiring calista technologies part overall remote desktop services workload remotefx components introduced windows server 2008 r2 sp1 include windows server 2012 following components added remotefx addition following components updated windows server 2016 rdp 10 following components added remotefx remotefx media streaming replaced multi media redirection mmr note mmr completely removed rdp 10 given remotefx media streaming works types video content whereas mmr worked windows server 2008 r2 remotefx codec could leveraged session hosting remote desktop session hosts vdi scenarios remote desktop virtualization hosts remotefx vgpu remotefx usb redirection features could used vdi scenarios remote desktop virtualization hosts windows 10 version 1511 brings remotefx client hyper-v removing dependency remote desktop services role generation 2 vms windows server 2012 r2 support remotefx windows server 2016 added support windows server 2012 features remotefx exception vgpu used without physical gpu present server gpu present server synthetic software-emulated gpu used render content gpu present server used hardware accelerate graphics via remotefx vgpu feature remotefx vgpu following requirements windows server 2008 r2 sp1 tested twelve virtual machines per gpu total twenty-four virtual machines two physical gpus although gpu meeting requirements capable using remotefx windows server catalog carries additional qualification define requirements server-qualified gpus specifications define gpus configuration requirements provide vm performance targets graphics cards meet typically professional workstation products ati/amd firepro v5800 v5900 v7800 v7900 v8800 v9800 nvidia quadro 2000 3800 4000 4800 5000 5800 6000 quadro fx 2800m 880m quadroplex 7000 tesla m2070q servers running remotefx vgpu need accommodate graphics cards either larger power supplies pcie slots alternatively connect existing servers external pcie expansion chassis
[ 4505, 10747, 9655, 2943 ]
Validation
2,714
4
NSA_Playset:nsa playset nsa playset open source project inspired nsa ant catalog create accessible easy use tools security researchers surveillance tools recreated off-the-shelf open-source hardware software thus far nsa playset consists fourteen items code instructions found online project ’ homepage initial nsa ant catalog leak published der spiegel 2013 michael ossman founder great scott gadgets gave shout security researchers start working tools mentioned catalog recreate name nsa playset came originally dean pierce also contributor twilightvegetable gsm nsa playset anyone invited join contribute device requisites addition nsa playset similar already existing nsa ant project ease use silly name based original tool ’ name silly name requisite rule michael ossman came example given project ’ website example project similar foxacid maybe could call coyotemeth ease use part stems also nsa playset motto 10 year old ’ n't count
[ 3984, 8625, 8978, 11108 ]
Validation
2,715
0
WYSIWYM_(interaction_technique):wysiwym interaction technique see meant wysiwym text editing interaction technique emerged two projects university brighton allows users create abstract knowledge representations required semantic web using natural language interface natural language understanding nlu technology employed instead natural language generation nlg used highly interactive manner text editor accepts repeated refinement selected span text becomes increasingly less vacuous authored semantics using mouse text property held evolving text refined set options derived nlg built-in ontology invisible representation semantic knowledge created used multilingual document generation formal knowledge formation task requires formally specified information two projects brighton worked field conceptual authoring lay foundation research development semantic web authoring tool swat tool explored means developing knowledge base without prior experience controlled natural language tools
[ 2440, 10452 ]
Train
2,716
4
DaveGrohl:davegrohl davegrohl brute-force password cracker macos originally created 2010 password hash extractor since evolved standalone distributed password cracker supports standard mac os x user password hashes md4 sha-512 pbkdf2 used since os x lion also extract formatted popular password crackers like john ripper latest stable release designed specifically mac os x lion mountain lion davegrohl supports dictionary incremental attacks dictionary attack scan number pre-defined wordlists incremental attack count character set finds password distributed mode uses bonjour find server nodes local network therefore requires configuration
[ 3937, 7426, 8513, 4580, 6916, 7556, 7557, 4457, 4140, 7983, 8787, 10135, 8827, 733 ]
Test
2,717
4
Shellshock_(software_bug):shellshock software bug shellshock also known bashdoor family security bugs unix bash shell first disclosed 24 september 2014 shellshock could enable attacker cause bash execute arbitrary commands gain unauthorized access many internet-facing services web servers use bash process requests 12 september 2014 stéphane chazelas informed bash maintainer chet ramey discovery original bug called bashdoor working security experts developed patch fix issue assigned vulnerability identifier existence bug announced public bash updates fix ready distribution bug chazelas discovered caused bash unintentionally execute commands commands concatenated end function definitions stored values environment variables within days publication variety related vulnerabilities discovered ramey addressed series patches attackers exploited shellshock within hours initial disclosure creating botnets compromised computers perform distributed denial-of-service attacks vulnerability scanning security companies recorded millions attacks probes related bug days following disclosure potential compromise millions unpatched systems shellshock compared heartbleed bug severity shellshock bug affects bash program various unix-based systems use execute command lines command scripts often installed system default command-line interface analysis source code history bash shows bugs existed since bash version 1.03 released september 1989 shellshock privilege escalation vulnerability offers way users system execute commands unavailable happens bash function export feature whereby command scripts created one running instance bash shared subordinate instances feature implemented encoding scripts within table shared instances known environment variable list new instance bash scans table encoded scripts assembles one command defines script new instance executes command new instance assumes scripts found list come another instance verify verify command built properly formed script definition therefore attacker execute arbitrary commands system exploit bugs may exist bash command interpreter attacker way manipulate environment variable list cause bash run presence bug announced public bash updates fix ready distribution though took time computers updated close potential security issue within hour announcement bash vulnerability reports machines compromised bug 25 september 2014 botnets based computers compromised exploits based bug used attackers distributed denial-of-service ddos attacks vulnerability scanning kaspersky labs reported machines compromised attack dubbed thanks-rob conducting ddos attacks three targets identify 26 september 2014 shellshock-related botnet dubbed wopbot reported used ddos attack akamai technologies scan united states department defense 26 september security firm incapsula noted 17,400 attacks 1,800 web domains originating 400 unique ip addresses previous 24 hours 55 attacks coming china united states 30 september website performance firm cloudflare said tracking approximately 1.5 million attacks probes per day related bug 6 october widely reported yahoo servers compromised attack related shellshock issue yet next day denied shellshock specifically allowed attacks maintainer bash warned first discovery bug fix followed soon companies distributors informed matter publicly disclosed cve identifier cve-2014-6271 however release patch subsequent reports different yet related vulnerabilities 26 september 2014 two open-source contributors david a. wheeler norihiro tanaka noted additional issues even patching systems using recently available patches email addressed oss-sec list bash bug list wheeler wrote patch continues 'whack-a-mole job fixing parsing errors began first patch bash parser certain many many many vulnerabilities however rather general reasoning without actually presenting exploitation examples implied restricting bash functionality effect bash scripts wo n't work even intended harm users 27 september 2014 michał zalewski google inc. announced discovery bash vulnerabilities one based upon fact bash typically compiled without address space layout randomization 1 october zalewski released details final bugs confirmed patch florian weimer red hat posted 25 september indeed prevent done using fuzzing technique aid software utility known american fuzzy lop original form vulnerability involves specially crafted environment variable containing exported function definition followed arbitrary commands bash incorrectly executes trailing commands imports function vulnerability tested following command systems affected vulnerability commands display word vulnerable result bash executing command echo vulnerable embedded specially crafted environment variable named x discovered michał zalewski vulnerability relates parsing function definitions environment variables bash cause segfault also discovered michał zalewski relates parsing function definitions environment variables bash day original vulnerability published tavis ormandy discovered related bug demonstrated following code vulnerable system would execute command date unintentionally example system patch cve-2014-6271 cve-2014-7169 system displays syntax errors notifying user cve-2014-6271 prevented still writes file named 'echo working directory containing result 'date call system patched cve-2014-6271 cve-2014-7169 simply echo word date file echo created shown florian weimer todd sabin found bug relates out-of-bounds memory access error bash parser code example vulnerability leverages use multiple « eof declarations nested documents vulnerable system echo text cve-2014-7186 vulnerable redir_stack also found florian weimer off-by-one error bash parser code allowing out-of-bounds memory access example vulnerability leverages use multiple done declarations vulnerable system echo text cve-2014-7187 vulnerable word_lineno test requires shell supports brace expansion 24 september 2014 bash maintainer chet ramey provided patch version bash43-025 bash 4.3 addressing cve-2014-6271 already packaged distribution maintainers 24 september bash43-026 followed addressing cve-2014-7169 cve-2014-7186 discovered florian weimer red hat posted patch code unofficially 25 september ramey incorporated bash bash43-027.—these patches provided code helpful know compile rebuild new bash binary executable file patch file remaining source code files next day red hat officially presented according updates red hat enterprise linux another day fedora 21 canonical ltd. presented updates ubuntu long term support versions saturday 27 september sunday updates suse linux enterprise following monday tuesday end month mac os x updates appeared 1 october 2014 michał zalewski google inc. finally stated weimer code bash43-027 fixed first three bugs even remaining three published bash43-027 including two discoveries means earlier distribution updates updates required cover six issues also covered ibm hardware management console
[ 1024, 5636, 6153, 4117, 8726, 535, 8735, 9761, 2084, 4133, 4644, 5682, 5176, 1608, 3657, 8779, 10333, 4703, 8288, 8292, 10875, 3711, 8320, 7809, 5764, 2187, 4240, 2709, 1688, 2717, 7325, 9375, 8867, 7847, 9904, 9395, 8886, 10437, 3789, 53...
None
2,718
3
Toobin':toobin' toobin nowiki /nowiki atari games video game originally released arcade game 1988 based recreational sport tubing later ported systems nes commodore amiga commodore 64 msx game boy color game player assumes control main characters bif jet guiding many winding rivers innertube game included part midway arcade treasures arcade party pak given remixed soundtrack also included 2012 compilation midway arcade origins game one 23 arcade games included midway arcade level pack lego dimensions unlocked using hidden arcade dock level follow lego brick road player competes river race computer another player player score increases swishing gates hitting characters cans collecting hidden letters spell toobin collecting treasures players try avoid obstacles pushing power-ups allow players carry multiple cans combinations gates increase score multiplier game three different classes five rivers total 15
[ 3020, 9166, 9006 ]
Test
2,719
3
Excavator_(microarchitecture):excavator microarchitecture amd excavator family 15h microarchitecture developed amd succeed steamroller family 15h use amd apu processors normal cpus october 12 2011 amd revealed excavator code name fourth-generation bulldozer-derived core excavator-based apu mainstream applications called carrizo released 2015 carrizo apu designed hsa 1.0 compliant excavator-based apu cpu variant named toronto server enterprise markets also produced excavator final revision bulldozer family two new microarchitectures replacing excavator year later excavator succeeded x86-64 zen architecture early 2017 excavator added hardware support new instructions avx2 bmi2 rdrand excavator designed using high density aka thin libraries normally used gpus reduce electric energy consumption die size delivering 30 percent increase efficient energy use excavator process 15 instructions per clock compared amd previous core steamroller three apu lines announced released plans steamroller 3rd gen bulldozer excavator 4th gen bulldozer architectures high-end desktop platforms excavator cpu desktop announced 2nd feb 2016 named athlon x4 845.in 2017 three desktop cpus athlon x4 9x0 launched come socket am4 tdp 65w fact apus graphics cores disabled amd opteron roadmaps 2015 show excavator-based toronto apu toronto cpu intended 1 processor 1p cluster applications
[ 3586, 8322, 5380, 9092, 9475, 6151, 8327, 10375, 5645, 398, 9369, 8090, 7963, 9500, 9122, 10658, 5541, 11047, 2088, 2094, 11183, 6705, 9400, 10620, 833, 6978, 7234, 9541, 11080, 2764, 7247, 9551, 5329, 7122, 9427, 9428, 473, 3294, 5859, 7...
None
2,720
7
Cloud_computing_architecture:cloud computing architecture cloud computing architecture refers components subcomponents required cloud computing components typically consist front end platform fat client thin client mobile device back end platforms servers storage cloud based delivery network internet intranet intercloud combined components make cloud computing architecture cloud computing architectures consist front-end platforms called clients cloud clients clients servers fat thick clients thin clients zero clients tablets mobile devices client platforms interact cloud data storage via application middleware via web browser virtual session zero ultra-thin client initializes network gather required configuration files tell os binaries stored entire zero client device runs via network creates single point failure network goes device rendered useless online network storage data stored accessible multiple clients cloud storage generally deployed following configurations public cloud private cloud community cloud combination three also known hybrid cloud order effective cloud storage needs agile flexible scalable multi-tenancy secure software-as-a-service saas service-model involves cloud provider installing maintaining software cloud users running software cloud internet intranet users client machines require installation application-specific software since cloud applications run cloud saas scalable system administrators may load applications several servers past customer would purchase load copy application servers saas customer access application without installing software locally saas typically involves monthly annual fee software service provides equivalent installed applications traditional non-cloud computing delivery applications software service four common approaches flex tenancy considered user adaptive saas paradigm designated multi-input four way manifold models systems based simplified encryption methods target listed data sequences multiple passes simplicity concept makes flex tenancy saas popular among without informatics processing experience basic maintenance custodial staff franchise businesses development service web based community shared development tools equivalent locally installed development tools traditional non-cloud computing delivery development tools data service web based design construct cloud data accessed defined api layer daas services often considered specialized subset software service saas offering platform service cloud computing service provides users application platforms databases service equivalent middleware traditional non-cloud computing delivery application platforms databases infrastructure service taking physical hardware going completely virtual e.g servers networks storage system management existing cloud equivalent infrastructure hardware traditional non-cloud computing method running cloud words businesses pay fee monthly annually run virtual servers networks storage cloud mitigate need data center heating cooling maintaining hardware local level generally cloud network layer offer
[ 4194, 10782, 2504, 2795, 4429, 5202, 467, 8446 ]
Test
2,721
4
McAfee_VirusScan:mcafee virusscan mcafee virusscan antivirus program created maintained mcafee inc. formerly known intel security network associates prior available standalone package included mcafee livesafe mcafee antivirus plus mcafee total protection additionally bskyb mcafee previously produced sky broadband branded version virusscan offered free sky digital customers upon broadband modem installation mcafee livesafe integrates antivirus firewall anti-spyware/anti-ransomware capabilities mcafee also produces enterprise-level product named virusscan enterprise mcafee designed use larger networks designed make management antivirus software multiple computers easier unlike home-user edition enterprise edition consists client application networked computers server application system installs updates configures settings client programs clients controlled using included epolicy orchestrator epo unified console control virusscan mcafee products november 2008 mcafee announced virusscan mac 8.6 earlier versions used name virex developed hjc software key changes virusscan 8.6 included leopard compatibility universal binary package ran intel powerpc-based macs access scanning apple mail support tests virus bulletin additional independent consumer-organizations mcafee virusscan fared well frequently failing detect common viruses review virusscan 2006 cnet criticized product due pronounced performance hits two three real-world performance tests users reviewing product reported encountering technical problems older versions virusscan engine use available cpu cycles reviewers described customer support mcafee products lacking support staff slow respond unable answer many questions april 21 2010 beginning approximately 2 pm gmt erroneous virus definition file update mcafee affected millions computers worldwide running windows xp service pack 3 update resulted removal windows system file codice_1 machines causing machines lose network access cases enter reboot loop mcafee rectified removing replacing faulty dat file version 5958 emergency dat file version 5959 posted fix affected machines consumer knowledgebase august 2012 update mcafee antivirus caused protection become turned users lose internet connections mcafee criticized notifying users promptly issues learned mcafee though well-known continues mixed reviews industry sources company prepared 2015 release series address current market conditions repositioning includes voice facial recognition authentication cloud-based data security
[ 2049, 7809, 131, 5891, 1417, 3981, 3342, 6797, 10637, 4374, 10392, 3739, 1052, 156, 6431, 5924, 2213, 550, 1318, 6823, 2601, 8614, 2859, 3243, 3885, 6699, 7983, 8615, 1970, 4403, 5887, 6834, 9523, 823, 10166, 7103, 704, 9537, 7362, 10308,...
Train
2,722
3
Philips_NMS-1205:philips nms-1205 br philips nms-1205 msx audio cartridge without bios using yamaha y8950 chip released 1984 nms-1205 sold europe msx personal computer cartridge featured fm sound synthesizer sound sampler adpcm 32 kb sample ram midi interface audio midi i/o connectors also built software music-box call musicbox fm sound synthesizer opl fm operator type-l compatible sound sampler 32kb sampleram adpcm unit midi interface in/out/thru built software music-box call musicbox note sold europe
[ 1515, 9006 ]
Test
2,723
2
LIO_(SCSI_target):lio scsi target computing linux-io lio target open-source implementation scsi target become standard one included linux kernel internally lio initiate sessions instead provides one logical unit numbers luns waits scsi commands scsi initiator performs required input/output data transfers lio supports common storage fabrics including fcoe fibre channel ieee 1394 iscsi iscsi extensions rdma iser scsi rdma protocol srp usb included linux distributions native support lio qemu/kvm libvirt openstack makes lio also storage option cloud deployments lio maintained datera inc. silicon valley vendor storage systems software january 15 2011 lio scsi target engine merged linux kernel mainline kernel version 2.6.38 released march 14 2011 additional fabric modules merged subsequent linux releases competing generic scsi target module linux scst narrower purpose providing linux iscsi target older iet iscsi enterprise target stgt scsi target framework modules also enjoy industry support scsi standard provides extensible semantic abstraction computer data storage devices become lingua franca data storage systems scsi t10 standards define commands protocols scsi command processor sent scsi cdbs electrical optical interfaces various implementations scsi initiator endpoint initiates scsi session scsi target endpoint waits initiator commands executes required i/o data transfers scsi target usually exports one luns initiators operate lio linux scsi target implements generic scsi target provides remote access data storage device types prevalent storage fabrics protocols lio neither directly accesses data directly communicate applications lio provides highly efficient fabric-independent fabric-transparent abstraction semantics numerous data storage device types lio implements modular extensible architecture around versatile highly efficient parallelized scsi command processing engine scsi target engine implements semantics scsi target lio scsi target engine independent specific fabric modules backstore types thus lio supports mixing matching number fabrics backstores time lio scsi target engine implements comprehensive spc-3/spc-4 feature set support high-end features including scsi-3/scsi-4 persistent reservations prs scsi-4 asymmetric logical unit assignment alua vmware vsphere apis array integration vaai t10 dif etc lio configurable via configfs-based kernel api managed via command-line interface api targetcli concept scsi target n't narrowly restricted physical devices scsi bus instead provides generalized model receivers logical scsi fabric includes scsi sessions across interconnects physical scsi bus conceptually scsi target provides generic block storage service server scenario backstores provide scsi target generalized access data storage devices importing via corresponding device drivers backstores n't need physical scsi devices important backstore media types result lio provides generalized model export block storage fabric modules implement frontend scsi target encapsulating abstracting properties various supported interconnect following fabric modules available fibre channel ethernet fcoe fabric module allows transport fibre channel protocol fcp traffic across lossless ethernet networks specification supported large number network storage vendors part technical committee t11 fc-bb-5 standard lio supports standard ethernet nics fcoe fabric module contributed cisco intel released linux 3.0 july 21 2011 fibre channel high-speed network technology primarily used storage networking standardized technical committee t11 international committee information technology standards incits qlogic fibre channel fabric module supports 4- 8-gigabit speeds following hbas fibre channel fabric module low-level driver lld released linux 3.5 july 21 2012 linux 3.9 following qlogic hbas cnas also supported makes lio first open source target support 16-gigabit fibre channel firewire sbp-2 fabric module enables linux export local storage devices via ieee 1394 systems mount ordinary ieee 1394 storage device ieee 1394 serial bus interface standard high-speed communications isochronous real-time data transfer developed apple firewire late 1980s early 1990s macintosh computers supported firewire target disk mode since 1999 firewire sbp-2 fabric module released linux 3.5 july 21 2012 internet small computer system interface iscsi fabric module allows transport scsi traffic across standard ip networks carrying scsi sessions across ip networks iscsi used facilitate data transfers intranets manage storage long distances iscsi used transmit data local area networks lans wide area networks wans internet enable location-independent location-transparent data storage retrieval lio iscsi fabric module also implements number advanced iscsi features increase performance resiliency multiple connections per session mc/s error recovery levels 0-2 erl=0,1,2 lio supports standard ethernet nics iscsi fabric module released linux 3.1 october 24 2011 networks supporting remote direct memory access rdma use iscsi extensions rdma iser fabric module transport iscsi traffic iser permits data transferred directly remote scsi computer memory buffers without intermediate data copies direct data placement ddp using rdma rdma supported infiniband networks ethernet data center bridging dcb networks via rdma converged ethernet roce standard ethernet networks iwarp enhanced tcp offload engine controllers iser fabric module developed together datera mellanox technologies first released linux 3.10 june 30 2013 scsi rdma protocol srp fabric module allows transport scsi traffic across rdma see networks 2013 srp widely used iser although limited scsi peer-to-peer protocol whereas iscsi fully routable srp fabric module supports following mellanox host channel adapters hcas srp fabric module released linux 3.3 march 18 2012 2012 c't magazine measured almost 5000 mb/s throughput lio srp target one mellanox connectx-3 port 56 gbit/s fdr mode sandy bridge pci express 3.0 system four fusion-io iodrive pci express flash memory cards usb gadget fabric module enables linux export local storage devices via universal serial bus usb systems mount ordinary storage device usb designed mid-1990s standardize connection computer peripherals also become common data storage devices usb gadget fabric module released linux 3.5 july 21 2012 targetcli user space single-node management command line interface cli lio supports fabric modules based modular extensible architecture plug-in modules additional fabric modules functionality targetcli provides cli uses underlying generic target library well-defined api thus cli easily replaced complemented ui metaphors gui targetcli implemented python consists three main modules detailed instructions set lio targets found lio wiki targetcli lio included linux distributions per default overview popular ones together initial inclusion dates
[ 4616, 6153, 3082, 5139, 10780, 10785, 9762, 6180, 6187, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 6244, 10853, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 8364, 10933, 5815, 7863, 5822, ...
Test
2,724
2
Peter_T._Brown:peter t. brown peter t. brown executive director free software foundation fsf 2005 early 2011 come business management finance background began working organization 2001 comptroller promoted executive director 2005 departure bradley kuhn replaced john sullivan since joined software freedom conservancy director treasurer oxford england worked past bbc new internationalist became american citizen august 2017
[ 10464, 1394 ]
Train
2,725
4
Enterprise_Privacy_Authorization_Language:enterprise privacy authorization language enterprise privacy authorization language epal formal language writing enterprise privacy policies govern data handling practices systems according fine-grained positive negative authorization rights submitted ibm world wide web consortium w3c 2003 considered recommendation 2004 lawsuit filed zero-knowledge systems claiming ibm breached copyright agreement worked together 2001 2002 create privacy rights markup language prml epal based prml means zero-knowledge argued co-owner standard
[ 2818, 8262, 1368, 3323, 124, 2013 ]
Test
2,726
6
.wps:.wps .wps file extension used
[]
None
2,727
1
MSQL:msql msql mini sql lightweight database management system hughes technologies 1993–94 david hughes developed network monitoring management system called minerva design system required database management system store configuration working data enable future portability hughes elected use structured query language interface application database management system despite fact time free inexpensive sql database management implementation available hughes therefore developed translation program provided interface free postgres dbms use sql product named minisql msql time became clear postgres perform adequately low-specification systems used run minerva msql developed lightweight database management system right implementing limited subset sql standard performing well minimally specified hardware msql first low-cost sql-based database management system combined free linux operating system availability relatively powerful low-cost pc hardware development world wide web standards technologies msql important factor early development interactive dynamic web applications particularly period 1994–97 increasingly supplanted highly featured mysql msql large widespread install base late 1990s despite offered source code form strongly associated open source software msql never offered open source license msql provided free non-commercial use typical license commercial use 1997 would cost 170 compared five-digit purchase price full-featured competitors 1996 development msql began stagnate mysql arose fill void 1999 mysql surpassed msql popularity today msql less visibility time database system often licensed companies use products used end-users directly msql actively maintained developed primarily support licensees internal use within hughes technologies products projects still provided license allows use free charge non-commercial educational charitable activities msql 4.2 released april 2019. msql originally supported several host languages
[ 2372, 8644, 8582, 5612, 5677, 7022, 7983, 10286, 10413, 692, 119, 10389, 823, 11030, 2045 ]
None
2,728
4
Identification_friend_or_foe:identification friend foe identification friend foe iff radar-based identification system designed command control uses transponder listens interrogation signal sends response consisting unique signal identifies broadcaster enables military civilian air traffic control interrogation systems identify aircraft vehicles forces friendly determine bearing range interrogator iff may used military civilian aircraft iff first developed second world war arrival radar several infamous friendly fire incidents despite name iff positively identify friendly targets hostile ones iff interrogation receives reply invalid reply object identified friendly positively identified foe may instance friendly aircraft inoperative malfunctioning transponder addition many reasons friendly aircraft may properly reply iff iff tool within broader military action combat identification cid process attaining accurate characterization detected objects operational environment sufficient support engagement decision broadest characterization friend enemy neutral unknown cid reduce friendly fire incidents also contributes overall tactical decision-making successful deployment radar systems air defence world war ii combatants immediately confronted difficulty distinguishing friendly aircraft hostile ones time aircraft flown high speed altitude making visual identification impossible targets showed featureless blips radar screen led incidents battle barking creek britain air attack fortress koepenick germany already deployment chain home radar system ch raf considered problem iff robert watson-watt filed patents systems 1935 1936 1938 researchers bawdsey manor began experiments reflectors consisting dipole antennas tuned resonate primary frequency ch radars pulse ch transmitter hit aircraft antennas would resonate short time increasing amount energy returned ch receiver antenna connected motorized switch periodically shorted preventing producing signal caused return ch set periodically lengthen shorten antenna turned practice system found unreliable use return highly dependent direction aircraft moving relative ch station often returned little additional signal suspected system would little use practice turned case raf turned entirely different system also planned consisted set tracking stations using hf/df radio direction finders aircraft radios modified send 1 khz tone 14 seconds every minute allowing stations ample time measure aircraft bearing several stations assigned sector air defence system sent measurements plotting station sector headquarters used triangulation determine aircraft location known pip-squeak system worked labour-intensive display information directly radar operators system worked directly radar clearly desirable first active iff transponder transmitter/responder iff mark used experimentally 1939 used regenerative receiver fed small amount amplified output back input strongly amplifying even small signals long single frequency like morse code unlike voice transmissions tuned signal ch radar 20–30 mhz amplifying strongly broadcast back aircraft antenna since signal received time original reflection ch signal result lengthened blip ch display easily identifiable testing found unit would often overpower radar produce little signal seen time new radars introduced using new frequencies instead putting mark production new iff mark ii introduced early 1940 mark ii series separate tuners inside tuned different radar bands stepped using motorized switch automatic gain control solved problem sending much signal mark ii technically complete war began lack sets meant available quantity small number raf aircraft carried time battle britain pip-squeak kept operation period battle ended iff mark ii quickly put full operation pip-squeak still used areas land ch cover well emergency guidance system even 1940 complex system mark ii reaching limits new radars constantly introduced 1941 number sub-models introduced covered different combinations radars common naval ones instance used raf introduction radars based microwave-frequency cavity magnetron rendered obsolete simply way make responder operating band using contemporary electronics 1940 english engineer freddie williams suggested using single separate frequency iff signals time seemed pressing need change existing system introduction magnetron work concept began telecommunications research establishment iff mark iii become standard western allies war mark iii transponders designed respond specific 'interrogators rather replying directly received radar signals interrogators worked limited selection frequencies matter radar paired system also allowed limited communication made including ability transmit coded 'mayday response iff sets designed built ferranti manchester williams specifications equivalent sets manufactured us initially copies british sets allied aircraft would identified upon interrogation radar iff sets obviously highly classified thus many wired explosives event aircrew bailed crash landed jerry proc reports alongside switch turn unit iff destruct switch prevent capture enemy many pilot chose wrong switch blew iff unit thud contained explosion acrid smell burning insulation cockpit deter many pilots destroying iff units time time eventually self destruct switch secured thin wire prevent accidental use fug 25a erstling english firstborn debut developed germany 1940 two bands tuned low-vhf band 125 mhz used freya radar low-uhf-banded 550–580 mhz used würzburg flight transceiver set selected day code ten bits dialled unit start identification procedure ground operator switched pulse frequency radar 3,750 hz 5,000 hz airborne receiver decoded started transmit day code radar operator would see blip lengthen shorten given code ensuring spoofed iff transmitter worked 168 mhz power 400 watts pep system included way ground controllers determine whether aircraft right code include way transponder reject signals sources british military scientists found way exploiting building iff transmitter called perfectos designed trigger response fug 25a system vicinity fug 25a responded 168 mhz frequency signal received antenna system ai mk iv radar originally operated 212 mhz comparing strength signal different antennas direction target could determined mounted mosquitos perfectos severely limited german use fug 25a united states naval research laboratory working iff system since war used single interrogation frequency like mark iii separate responder frequency responding different frequency several practical advantages notably response one iff trigger another requires complete transmitter responder side circuitry contrast greatly simplified system used british designs technique known cross-band transponder mark ii revealed 1941 tizard mission decided use take time improve experimental system result became mark iv main difference earlier models worked higher frequencies around 600 mhz allowed much smaller antennas unfortunately also turned close frequencies used german würzburg radar concerns would triggered radar transponder responses would picked radar display thereby give away operational frequencies led us–british effort make improved model mark v also known united nations beacon unb moved still higher frequencies around 1 ghz operational testing complete war ended time testing finished 1948 much improved mark x beginning testing mark v abandoned mark x started purely experimental device operating frequencies 1 ghz development continued decided introduce encoding system known selective identification feature sif sif allowed return signal contain 12 pulses representing four octal digits 3 bits depending timing interrogation signal sif would respond several ways mode 1 indicated type aircraft mission cargo instance mode 2 returned tail code mark x began introduced early 1950s period great expansion civilian air transport system decided use slightly modified mark x sets aircraft well sets included new mode 3 paired civilian mode operated similar original mode 2 returned four-digit identifier mode 3 identical normally referred mode 3/a addition mode c returned altitude encoded single 12-bit number gillham code represented altitude number x 100 feet 1200 mode b specified never used current iff system mark xii works frequencies mark x supports military civilian modes main reason creation mark xii addition military mode 4 mark xii transponders would respond properly formed interrogation signal broadcasting reply could picked receiver using triangulation enemy could determine location transponder british already used technique germans wwii used usaf vpaf aircraft vietnam war mode 4 started interrogation similar mode 3 followed encoded pulse chain similar one used mode 3/a receiver side transponder checks code known day code responds two match pulses reply delayed based received code largely eliminates ability enemy trigger transponder 1980s new civilian mode mode added allowed greatly increased amounts data encoded returned signal used encode location aircraft navigation system basic part traffic collision avoidance system tcas system allows commercial aircraft know location aircraft area avoid without need ground operators basic concepts mode militarized mode 5 simply cryptographically encoded version mode data iff world war ii soviet military systems 1946 1991 used coded radar signals called cross-band interrogation cbi automatically trigger aircraft transponder aircraft illuminated radar radar-based aircraft identification also called secondary radar military civil usage primary radar bouncing rf pulse aircraft determine position george charrier working rca filed patent iff device 1941 required operator perform several adjustments radar receiver suppress image natural echo radar receiver visual examination iff signal would possible 1943 donald barchok filed patent radar system using acronym iff text parenthetic explanation indicating acronym become accepted term 1945 emile labin edwin turner filed patents radar iff systems outgoing radar signal transponder reply signal could independently programmed binary codes setting arrays toggle switches allowed iff code varied day day even hour hour united states nato countries started using system called mark xii late twentieth century britain implemented iff system compatible standard developed program compatible system known successor iff siff modes 4 5 designated use nato forces
[ 11404 ]
None
2,729
2
Zero_page_(CP/M):zero page cp/m zero page base page data structure used cp/m systems programs communicate operating system 8-bit cp/m versions located first 256 bytes memory hence name equivalent structure dos program segment prefix psp 8-bit cp/m following structure cp/m-86 structure
[ 10113, 6921, 3216, 2840, 2201, 7323, 7849, 11562, 178, 4409, 7999, 4548, 5457, 8529, 10067, 10083, 5220, 1515, 2672, 3056, 4337, 9329, 4727, 11513, 6778 ]
None
2,730
2
DirectFB:directfb directfb direct frame buffer software library small memory footprint provides graphics acceleration input device handling abstraction layer integrated windowing system support translucent windows multiple display layers top linux framebuffer without requiring kernel modifications directfb free open-source software subject terms gnu lesser general public license lgpl library allows developers alternative full x window system x11 server used unix-like operating systems directfb allows applications talk directly video hardware direct api speeding simplifying graphic operations often used games embedded systems developers circumvent overhead full x window system server implementation 2006 version directfb included software stack ce linux forum audio/video graphics specification v2 directfb host xdirectfb rootless x server implementation uses directfb windows x11 top-level windows xdirectfb interface mimics x11 interface directfb api simplify running applications written x11 directfb directfbgl opengl extension directfb/xdirectfb uses direct rendering infrastructure dri mesa 3d library support opengl hardware acceleration among products use directfb linuxtv ben nanonote unreleased palm foleo mobile companion webos operating system panasonic viera connect tvs philips tvs based jointspace
[ 6403, 4902, 11431, 7983, 10480, 2804, 5397, 11221, 823, 2045, 9054 ]
Test
2,731
3
SPARC_T3:sparc t3 sparc t3 microprocessor previously known ultrasparc t3 codenamed rainbow falls also known ultrasparc kt niagara-3 development multithreading multi-core cpu produced oracle corporation previously sun microsystems officially launched 20 september 2010 member sparc family successor ultrasparc t2 overall single socket multi-socket throughput increased t3 processor systems providing superior throughput half cpu socket requirements predecessor throughput spec cint2006 rate increased single socket t3-1 platform comparison predecessor t2+ processor dual-socket t5240 platform simulated web serving workloads dual-socket based sparc t3 systems benchmarked better performance quad-socket previous generation ultrasparc t2+ systems well competing dual quad socket contemporary systems online publication register incorrectly reported june 2008 microprocessor would 16 cores 16 threads september 2009 published roadmap instead showed 8 threads per core hot chips 21 conference sun revealed chip total 16 cores 128 threads according isscc 2010 presentation 16-core sparc soc processor enables 512 threads 4-way glueless system maximize throughput 6mb l2 cache 461gb/s 308-pin serdes i/o 2.4tb/s support required bandwidth six clock four voltage domains well power management circuit techniques optimize performance power variability yield trade-offs across 377mm die support ultrasparc t3 confirmed july 16 2010 arcbot twitter noted unpublished psarc/2010/274 revealed new -xtarget value ultrasparc t3 included opensolaris oracle openworld san francisco september 20 2010 processor officially launched sparc t3 dropping ultra prefix name accompanied new systems new reported benchmarks claiming world-record performance varied real-world application benchmarks released full system disclosures internationally recognized spec benchmarks also released full system disclosures oracle disclosed sparc t3 built 40 nm process sparc t3 features include release sparc t3 chip new brand oracle sparc t-series servers introduced market effectively replacing cmt ultrasparc t2/t2 plus machines previous sparc enterprise product line fewer physical products former server line refreshed t3 chip reducing total number servers respectively four like prior t1 t2 t2+ processors t3 supports hyper-privileged execution mode t3 supports 128 oracle vm server sparc domains feature formerly known logical domains sparc t3 processor effectively two t2+ processors single die t3
[ 5378, 9090, 9731, 1801, 4235, 1809, 4241, 1818, 8863, 1707, 10926, 3247, 6322, 10675, 4664, 4285, 6464, 7104, 9665, 9541, 2895, 3919, 597, 6107, 2269, 11487, 9955, 11363, 7270, 11626, 10734, 1776, 11636, 630, 1399, 1788 ]
Test
2,732
4
NOP_slide:nop slide computer security nop slide nop sled nop ramp sequence nop no-operation instructions meant slide cpu instruction execution flow final desired destination whenever program branches memory address anywhere slide technique sees common usage software exploits used direct program execution branch instruction target known precisely notable applications include defensive programming strategies emc-aware programming nop slide function consists list canonical nop instructions presence code suspicious easy automatically detect reason practical nop slides often composed non-canonical nop instructions moving register adding zero instructions affect program state inconsequentially makes much difficult identify entropy nop slide dependent upon constraints placed determined certain registers use say set known value next use instructions manipulate arbitrarily may used nop slide additionally alignment nop slide instruction pointer deterministic multi-byte instructions used nop slide without regard results unaligned execution input providing attack vector nop slide payload introduced filtered accepting printable characters field possible instructions inclusion limited instructions part architecture extension sse may frequently irrelevant program state used nop slide targeting computer extension supported many techniques exist detect presence nop slides memory example 2005 greek researchers found easily detected checking whether memory image contains lengthy sequence bytes starting offset within sequence valid leads execution place
[ 1474, 10786, 5358, 3473, 9393, 11537, 8126, 5176, 2558 ]
Test
2,733
4
Digital_Guardian:digital guardian digital guardian american data loss prevention software company provides software end-user level corporate networks servers databases cloud digital guardian designed see stop malicious actions users malware endpoints puts data events context applies granular set rules protect threats company holds 20 patents technology customers include 300 global 2000 companies well seven 10 largest brands world considered leader global data loss prevention market company founded 2003 name verdasys start flagship product digital guardian data-centric security platform monitoring encrypting proprietary sensitive information passing desktop laptop enterprise server 2008 verdasys launched sitetrust encryption software service banks brokerages big companies served customers internet legally liable losses online fraud client-side software package turned whenever user visited website protected sitetrust service spawned new instance user web browser shutting malware creating secure space around communications protected site agreement verdasys fidelis security systems fidelis cybersecurity 2010 enabled customers acquire implement integrated solution consisting fidelis xps network appliances digital guardian enterprise information protection single offering verdasys early 2012 verdasys expanded data leak prevention portfolio cloud help enterprises protect data stored networks reduce costs one customers large insurance company requested verdasys take job monitoring protecting data verdasys introduced two new offerings managed service information protection msip information protection service ipaas offering data protection managed service digital guardian platform completed eal2+ evaluation communications security establishment common criteria evaluation certification scheme december 2012 verdasys introduced data connector 2013 contained malware threats detected fireeye platform verdasys connector malware handled manually december gartner magic quadrant placed digital guardian among five leaders global data loss prevention market ken levine previously mcafee executive joined company ceo 2014 focused simplifying product march verdasys raised 12 million venture funding bringing company total raised capital 69 million funding round led existing investors ge pension trust fairhaven capital new individual investment brookline venture partners 2014 also year several major partnerships acquisitions march identity finder llc partnered verdasys bringing sensitive data manager capable automatically finding classifying securing sensitive information august verdasys changed name digital guardian increased staff 150 time security software installed two million servers laptops devices october company acquired armor5 provider cloud control solutions focusing specifically preventing employees bring mobile device work copying removing company files data may 2015 company acquired savant protection enabling organizations deploy unique agent whitelisting applications used particular endpoint blue coat systems launched alliance ecosystem endpoint detection response july 2015 digital guardian among alliance-founding members ecosystem allows sharing actionable intelligence gathered endpoint security solutions also july consulting firm atos digital guardian partnered deliver atos ’ cloud-based data loss prevention service october company bought code green networks based silicon valley contributed true dlp gear acquisition code green networks provided digital guardian network discovery cloud data loss prevention company added 100 customers 2015 bringing total count nearly 500 including general electric dupont end year digital guardian announced 66 million new funding firm largest round since founded returning investors round ge pension trust advised ge asset management fairhaven capital partners loring wolcott coolidge special situation funds brookline venture partners new investors llr partners mass mutual ventures corporate venture capital arm massachusetts mutual life insurance company venture unit siemens financial services company raised 135 million since founding january 2016 gartner magic quadrant enterprise data loss prevention placed digital guardian among four leaders global data loss prevention market fourth consecutive time bostinno included digital guardian among 16 boston tech firms watch 2016 company placed 148th list top 500 cybersecurity firms world released cybersecurity ventures 2015 data loss prevention software platform digital guardian integrates content context location awareness along encryption data level controls reduce risk information loss misuse purposeful data theft host-based security technology empowers organizations monitor control audit prevent data wrongful disclosure malicious theft automatically enforcing data security policies procedures scalable platform provides multiple independent layers protection enable secure data sharing across physical virtual mobile cloud environments architecture platform three parts digital guardian allows businesses host manage premise choose managed security programs deployed managed service digital guardian collect actual data rather aggregates metadata files documents watches patterns activity metadata encrypted hashed digitally signed transferred digital guardian hosting facilities via fips 140-2 certified messaging protocol digital guardian provides updated analytics alerts reports administrators continuously monitor data application system access usage whether end users online offline virtual environments organizations apply specific risk-based policy controls adhere data governance compliance rules example health service organization cigna uses digital guardian software monitor ports encrypt data transfers employees try transfer files usb flash drive prompted type reasons transfer data actually transferred compared reasons digital guardian also provides support sharefile file sharing storage systems extending data loss prevention capabilities organizations support virtual desktops
[ 2818, 10245, 4107, 11429, 3880, 11432, 3629, 5563, 3262, 704, 3520, 2901, 1239, 7515, 11611, 4194, 612, 2158, 5363, 7802, 2558 ]
None
2,734
4
DarkMatter_(Emirati_company):darkmatter emirati company darkmatter founded united arab emirates uae 2014 2015 cybersecurity company company describes purely defensive company several whistleblowers alleged involved offensive cybersecurity cracking colloquially hacking including behalf emirati government darkmatter founded either 2014 2015 faisal al-bannai founder mobile phone vendor axiom telecom son major general dubai police force around 2014 zeline 1 wholly owned subsidiary darkmatter became active finland darkmatter public launch came 2015 2nd annual arab future cities summit time company advertised capabilities including network security bug sweeping promised create new secure mobile phone handset promoted digital defense intelligence service uae 2016 darkmatter replaced cyberpoint contractor project raven also 2016 darkmatter sought smartphone development expertise oulu finland darkmatter recruited several finnish engineers early 2018 darkmatter turnover hundreds millions us dollars eighty per cent work uae government related organisations including nesa developed smartphone model called katim arabic silence addition recruiting via conventional routes personal referrals stalls trade shows e.g black hat darkmatter headhunts staff u.s. national security agency poached competitors staff contracted uae government happened cyberpoint employees project raven confidential initiative help uae surveil governments militants human rights activists team included former u.s. intelligence agents applied training hack phones computers belonging project raven victims operation based converted mansion abu dhabi nicknamed villa around 2014 2016 cyberpoint supplied u.s.-trained contractors project raven 2016 news reports emerged cyberpoint contracted italian spyware company hacking team damaged cyberpoint reputation defensive cybersecurity firm reportedly dissatisfied relying upon u.s.-based contractor uae replaced cyberpoint darkmatter contractor darkmatter induced several cyberpoint staff move darkmatter project raven reportedly expanded surveillance include targeting americans potentially implicating american staff unlawful behaviour 2016 project raven bought tool called karma karma able remotely exploit apple iphones anywhere world without requiring interaction part iphone owner apparently achieved exploiting zero-day vulnerability device imessage app project raven operatives able view passwords emails text messages photos location data compromised iphones people whose mobile phones deliberately compromised using karma reportedly include 2017 apple patched security vulnerabilities exploited karma reducing tool effectiveness 2016 two darkmatter whistleblowers multiple security researchers expressed concerns darkmatter intended become certificate authority ca would give technical capability create fraudulent certificates would allow fraudulent websites software updates convincingly masquerade legitimate ones capabilities misused would allow darkmatter easily deploy rootkits targets devices decrypt https communications firefox users via man-in-the-middle attacks 28 december 2017 darkmatter requested mozilla include trusted ca firefox web browser year mozilla reviewers addressed concerns darkmatter technical practices eventually questioning basis whether darkmatter met baseline requirements inclusion 30 january 2019 reuters published investigations describing darkmatter project raven mozilla reviewers noted investigation findings subsequently electronic frontier foundation eff others asked mozilla deny darkmatter request basis investigation showed darkmatter untrustworthy therefore liable misuse capabilities mozilla public consultation deliberations ongoing july 2019 mozilla prohibited government united arab emirates operating one internet security gatekeepers following reports cyber espionage program run abu dhabi-based darkmatter staff leading clandestine hacking operation august 2019 google blocked websites approved darkmatter reuters reported firm ’ involvement hacking operation led united arab emirates google previously said websites certified darkmatter would marked unsafe chrome android browsers
[ 5024, 2275, 517, 3944, 8264, 939, 8172, 9791, 2542, 7887, 5078, 10392, 4318, 4863 ]
Test
2,735
2
IPod_Touch_(7th_generation):ipod touch 7th generation seventh-generation ipod touch stylized marketed ipod touch colloquially known ipod touch 7g ipod touch 7 ipod touch 2019 multipurpose handheld device designed marketed apple inc. touchscreen-based user interface successor ipod touch 6th generation becoming first major update ipod touch since 2015 released online apple store may 28 2019 seventh-generation ipod touch features ios apple mobile operating system user interface ios based concept direct manipulation using multi-touch gestures interface control elements consist sliders switches buttons interaction os includes gestures swipe tap pinch reverse pinch specific definitions within context ios operating system multi-touch interface internal accelerometers used applications respond shaking device one common result undo command rotating vertically one common result switching portrait landscape mode seventh-generation ipod touch introduced may 28 2019 running latest ios version 12.3.1 play music movies television shows audiobooks podcasts sort media library songs artists albums videos playlists genres composers podcasts audiobooks compilations scrolling achieved swiping finger across screen alternatively headset controls used pause play skip repeat tracks however earpods come seventh-generation ipod touch include remote microphone voice control feature also used identify track play songs playlist specific artist create genius playlist apple a10 system-on-chip seventh-generation ipod touch enables advanced features predecessors includes arkit applications group facetime functionality seventh-generation ipod touch features apple a10 processor m10 motion coprocessor processor used apple iphone 7 apple ipad 2018 however underclocked 1.64 ghz 2.34 ghz uses two four cores making ipod touch weaker devices chip seventh-generation ipod touch features front rear camera systems sixth-generation device includes 8mp rear facing camera capable recording video 1080p resolution 30fps slow-motion video 720p 120fps camera also supports different photo features burst photos hdr photos panoramic photos front facing camera facetime hd camera capable taking photos 1.2mp recording video 720p 30fps camera also features auto hdr video recordings burst photo capabilities device first ipod touch come 256 gb storage option— highest capacity ever offered ipod surpassing 160gb capacity sixth-generation ipod classic discontinued 2014 seventh-generation ipod touch ships apple earpods apple lightning usb charging cable device also supports apple airpods earpods lightning connector
[ 10755, 9732, 1549, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 576, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 3691, 2673, 6264, 7292, 2686, 6783, 7806, 10878, 8842, 5784, 1177, 4251, 3228, 2...
Test
2,736
5
PKI_Resource_Query_Protocol:pki resource query protocol pki resource query protocol prqp internet protocol used obtaining information services associated x.509 certification authority described draft document pkix working group released 2013-oct-23 proposed standard rfc7030 created massimiliano pala solve interoperability usabilities issues among pkis specifically addressing certain problems associated finding services data repositories associated ca messages communicated via prqp encoded asn.1 usually communicated http present ever services protocols defined address different needs users administrators pkis deployment new applications services need access pki resources provided different organizations critical application needs told find services new certificate encounters therefore application needs properly configured filling complex configuration options whose meaning mostly unknown average user likely administrator well prqp protocol addresses interoperability trust building issues among separate pki islands fact provides dynamic method capable provide timely information provided services available pki resources also used help painless rollover services e.g switching crls ocsp certificate validation moreover prqp allows pki management dynamically choose services provided based faced challenges infrastructure deployment words prqp thought similar concept dns pki resources pkis three primary methods clients obtain pointers pki data adopting specific certificate extensions looking easily accessible repositories e.g dns local database etc adapting existing protocols e.g web services provide pointers published data ca could use authority information access aia subject information access sia extensions detailed rfc-3280 former provide information issuer certificate latter carries information inside ca certificates offered services subject information access extension carry uri point certificate repositories timestamping services hence extension allows access services several different protocols e.g http ftp ldap smtp although encouraged usage aia sia extension still widely deployed two main reasons first lack support extensions available clients second reason extensions static i.e modifiable indeed modify add new extensions order users applications aware new services dismissal certificate must re-issued would feasible end entities ee certificates except periodic reissuing would feasible ca certificate ca could retain public key name add new values aia extension new certificate users fetch ca cert regularly rather caching would enable become aware new services although possible almost every available clients look cas certificates already stored clients local database case since urls tend change quite often certificates persist longer time frames experience suggests extensions invariably point urls longer exist moreover considering fact entity issues certificates one runs services may infeasible issuing ca reissue certificate case server url changes therefore wise depend usage aia sia extensions available services repositories lookup srv record dns service record technique thought provide pointers servers directly dns rfc 1035 defined rfc 2782 introduction type record allows administrators perform operations rather similar ones needed solve problem prqp addresses i.e easily configurable pki discovery service basic idea client query dns specific srv record example srv-aware ldap client wants discover ldap server certain domain performs dns lookup _ldap._tcp.example.com _tcp means client requesting tcp enabled ldap server returned record contains information priority weight port target service domain problem adoption mechanism pkis unlike dns usually fixed requirement name space used time correspondence dns structure data contained certificates exception domain component dc attributes used certificate subject dc attributes used specify domain components dns name example domain name example.com could represented using dc=com dc=example format ca subject field would make use format issuer field would allow client applications perform dns lookups provided domain information repositories services could stored however currently practice different fact extremely difficult client map digital certificates dns records dc format widely adopted existing cas example one certificate ie7/outlook certificates store uses domain components provide mapping certificate internet domain
[ 513, 7364, 10020, 2887, 10924, 9909 ]
None
2,737
4
Access_control:access control fields physical security information security access control ac selective restriction access place resource act accessing may mean consuming entering using permission access resource called authorization locks login credentials two analogous mechanisms access control geographical access control may enforced personnel e.g. border guard bouncer ticket checker device turnstile may fences avoid circumventing access control alternative access control strict sense physically controlling access system checking authorized presence see e.g ticket controller transportation variant exit control e.g shop checkout country term access control refers practice restricting entrance property building room authorized persons physical access control achieved human guard bouncer receptionist mechanical means locks keys technological means access control systems like mantrap within environments physical key management may also employed means managing monitoring access mechanically keyed areas access certain small assets physical access control matter access control system determines allowed enter exit allowed exit enter allowed enter exit historically partially accomplished keys locks door locked someone key enter door depending lock configured mechanical locks keys allow restriction key holder specific times dates mechanical locks keys provide records key used specific door keys easily copied transferred unauthorized person mechanical key lost key holder longer authorized use protected area locks must re-keyed electronic access control uses computers solve limitations mechanical locks keys wide range credentials used replace mechanical keys electronic access control system grants access based credential presented access granted door unlocked predetermined time transaction recorded access refused door remains locked attempted access recorded system also monitor door alarm door forced open held open long unlocked credential presented reader reader sends credential information usually number control panel highly reliable processor control panel compares credential number access control list grants denies presented request sends transaction log database access denied based access control list door remains locked match credential access control list control panel operates relay turn unlocks door control panel also ignores door open signal prevent alarm often reader provides feedback flashing red led access denied flashing green led access granted description illustrates single factor transaction credentials passed around thus subverting access control list example alice access rights server room bob alice either gives bob credential bob takes access server room prevent two-factor authentication used two factor transaction presented credential second factor needed access granted another factor pin second credential operator intervention biometric input three types factors authenticating information passwords common means verifying user identity access given information systems addition fourth factor authentication recognized someone know whereby another person knows provide human element authentication situations systems set allow scenarios example user may password forgotten smart card scenario user known designated cohorts cohorts may provide smart card password combination extant factor user question thus provide two factors user missing credential giving three factors overall allow access credential physical/tangible object piece knowledge facet person physical enables individual access given physical facility computer-based information system typically credentials something person knows number pin something access badge something biometric feature combination items known multi-factor authentication typical credential access card key-fob newer software also turn users smartphones access devices many card technologies including magnetic stripe bar code wiegand 125 khz proximity 26-bit card-swipe contact smart cards contactless smart cards also available key-fobs compact id cards attach key ring biometric technologies include fingerprint facial recognition iris recognition retinal scan voice hand geometry built-in biometric technologies found newer smartphones also used credentials conjunction access software running mobile devices addition older traditional card access technologies newer technologies near field communication nfc bluetooth low energy also potential communicate user credentials readers system building access access control point door turnstile parking gate elevator physical barriers granting access electronically rely users credentials biometric fingerprints face card readers pin typically access point door electronic advanced access control door contain several elements basic stand-alone electric lock lock unlocked operator switch automate operator intervention replaced reader reader could keypad code entered could card reader could biometric reader readers usually make access decision send card number access control panel verifies number access list monitor door position magnetic door switch used concept door switch unlike refrigerators car doors generally entry controlled exit uncontrolled cases exit also controlled second reader used opposite side door cases exit controlled free exit device called request-to-exit rex used request-to-exit devices push-button motion detector button pushed motion detector detects motion door door alarm temporarily ignored door opened exiting door without electrically unlock door called mechanical free egress important safety feature cases lock must electrically unlocked exit request-to-exit device also unlocks door access control decisions made comparing credential access control list look-up done host server access control panel reader development access control systems seen steady push look-up central host edge system reader predominant topology circa 2009 hub spoke control panel hub readers spokes look-up control functions control panel spokes communicate serial connection usually rs-485 manufactures pushing decision making edge placing controller door controllers ip enabled connect host database using standard networks access control readers may classified functions able perform readers may additional features lcd function buttons data collection purposes i.e clock-in/clock-out events attendance reports camera/speaker/microphone intercom smart card read/write support access control readers may also classified type identification technology 1 serial controllers controllers connected host pc via serial rs-485 communication line via 20ma current loop older systems external rs-232/485 converters internal rs-485 cards installed standard pcs rs-485 communication ports advantages disadvantages 2 serial main sub-controllers door hardware connected sub-controllers a.k.a door controllers door interfaces sub-controllers usually make access decisions instead forward requests main controllers main controllers usually support 16 32 sub-controllers advantages disadvantages 3 serial main controllers intelligent readers door hardware connected directly intelligent semi-intelligent readers readers usually make access decisions forward requests main controller connection main controller unavailable readers use internal database make access decisions record events semi-intelligent reader database function without main controller used areas require high security main controllers usually support 16 64 readers advantages disadvantages ones listed second paragraph 4 serial controllers terminal servers spite rapid development increasing use computer networks access control manufacturers remained conservative rush introduce network-enabled products pressed solutions network connectivity many chose option requiring less efforts addition terminal server device converts serial data transmission via lan wan advantages disadvantages rs-485-related advantages disadvantages also apply 5 network-enabled main controllers topology nearly described second third paragraphs advantages disadvantages apply on-board network interface offers couple valuable improvements transmission configuration user data main controllers faster may done parallel makes system responsive interrupt normal operations special hardware required order achieve redundant host pc setup case primary host pc fails secondary host pc may start polling network controllers disadvantages introduced terminal servers listed fourth paragraph also eliminated 6 ip controllers controllers connected host pc via ethernet lan wan advantages disadvantages 7 ip readers readers connected host pc via ethernet lan wan advantages disadvantages advantages disadvantages ip controllers apply ip readers well common security risk intrusion access control system simply following legitimate user door referred tailgating often legitimate user hold door intruder risk minimized security awareness training user population active means turnstiles high security applications risk minimized using sally port sometimes called security vestibule mantrap operator intervention required presumably assure valid identification second common risk levering door open relatively difficult properly secured doors strikes high holding force magnetic locks fully implemented access control systems include forced door monitoring alarms vary effectiveness usually failing high false positive alarms poor database configuration lack active intrusion monitoring newer access control systems incorporate type door prop alarm inform system administrators door left open longer specified length time third common security risk natural disasters order mitigate risk natural disasters structure building quality network computer equipment vital organizational perspective leadership need adopt implement hazards plan incident response plan highlights incident plan determined national incident management system must include pre-incident planning incident actions disaster recovery action review similar levering crashing cheap partition walls shared tenant spaces divisional wall vulnerability vulnerability along lines breaking sidelights spoofing locking hardware fairly simple elegant levering strong magnet operate solenoid controlling bolts electric locking hardware motor locks prevalent europe us also susceptible attack using doughnut shaped magnet also possible manipulate power lock either removing adding current although access control systems incorporate battery back-up systems locks almost always located secure side door access cards proven vulnerable sophisticated attacks enterprising hackers built portable readers capture card number user proximity card hacker simply walks user reads card presents number reader securing door possible card numbers sent clear encryption used counter dual authentication methods card plus pin always used many access control credentials unique serial numbers programmed sequential order manufacturing known sequential attack intruder credential used system simply increment decrement serial number find credential currently authorized system ordering credentials random unique serial numbers recommended counter threat finally electric locking hardware still mechanical keys fail-over mechanical key locks vulnerable bumping need know principle enforced user access controls authorization procedures objective ensure authorized individuals gain access information systems necessary undertake duties computer security general access control includes authentication authorization audit narrow definition access control would cover access approval whereby system makes decision grant reject access request already authenticated subject based subject authorized access authentication access control often combined single operation access approved based successful authentication based anonymous access token authentication methods tokens include passwords biometric scans physical keys electronic keys devices hidden paths social barriers monitoring humans automated systems access-control model entities perform actions system called subjects entities representing resources access may need controlled called objects see also access control matrix subjects objects considered software entities rather human users human users effect system via software entities control although systems equate subjects user ids processes started user default authority level control fine-grained enough satisfy principle least privilege arguably responsible prevalence malware systems see computer insecurity models example object-capability model software entity potentially act subject object access-control models tend fall one two classes based capabilities based access control lists acls capability-based acl-based models mechanisms allow access rights granted members group subjects often group modeled subject access control systems provide essential services authorization identification authentication access approval accountability access accounts enforced many types controls telecommunication term access control defined u.s. federal standard 1037c following meanings definition depends several technical terms federal standard 1037c object-oriented programming languages access control part apparatus achieving encapsulation one four fundamentals object-oriented programming goal establish clear separation interface visible accessible parts class implementation internal representation helper methods also known data hiding ensures exclusive data access class members variables methods protects object integrity preventing corruption client programmer/ client classes rule thumb use restrictive access level data unless compelling reason expose also helps reduce interdependencies classes leading lower coupling fewer regression bugs object-oriented programming access control typically implemented using access modifiers object class although access modifiers may syntactically different languages attempt achieve goal define variables methods visible several programming languages e.g java c++ c ruby use public protected private access modifiers keywords allow programmer establish access levels classes class members data methods exact use programming language varied depending language philosophy similarities differences note ruby private methods always self implicit receiver therefore used current object languages mechanisms override access modifies gain access private components object one example friend class c++ special public member methods accessors aka getters mutator methods often called setters used control changes class variables order prevent unauthorized access data corruption public policy access control restrict access systems authorization track monitor behavior within systems accountability implementation feature using trusted systems security social control
[ 5636, 9745, 8210, 3612, 10268, 9248, 2083, 3624, 1579, 6708, 3125, 4663, 3133, 10815, 2630, 10823, 2128, 4689, 10835, 10340, 4198, 3178, 8302, 119, 2699, 3723, 5774, 3215, 6308, 6309, 3750, 8881, 3262, 2756, 3780, 7368, 5325, 6350, 5327, ...
None
2,738
2
4MLinux:4mlinux 4mlinux lightweight distribution made 32bit 64bit architectures named 4mlinux since 4 main components os maintenance used rescue live cd multimedia inbuilt support almost every multimedia format miniserver comes 64-bit server included running lamp suite mystery includes collection classic linux games distribution developed poland first released 2010 distribution include package manager uses jwm joe window manager default window manager also comes conky preinstalled installing programs distribution distribution retrieve windows version rather linux version due coming pre-installed wine compatibility layer windows applications package manager distribution geared towards people prefer lightweight distribution version distribution called 4mlinux game edition provides 90s games natively doom hexen distribution comes two different version 4mserver 4mlinux 4mlinux requires 128 mb ram installed hdd 1024 mb ram used live cd/usb whereas 4mserver requires 256 mb ram installed hdd 2048 mb ram used live cd/usb
[ 4611, 3079, 3089, 4113, 8209, 8727, 543, 11297, 7204, 9253, 11305, 56, 3129, 4153, 59, 8248, 9276, 4673, 3654, 5190, 3147, 2125, 1107, 1110, 89, 5721, 1632, 4192, 3685, 10860, 5742, 2671, 11388, 2692, 8837, 9353, 9873, 11410, 8857, 10394,...
Test
2,739
4
Nmap:nmap nmap network mapper free open-source network scanner created gordon lyon also known pseudonym fyodor vaskovich nmap used discover hosts services computer network sending packets analyzing responses nmap provides number features probing computer networks including host discovery service operating system detection features extensible scripts provide advanced service detection vulnerability detection features nmap adapt network conditions including latency congestion scan nmap started linux utility ported systems including windows macos bsd linux popular platform followed windows nmap features include nmap provide information targets including reverse dns names device types mac addresses typical uses nmap nmapfe originally written zach smith nmap official gui nmap versions 2.2 4.22 nmap 4.50 originally 4.22soc development series nmapfe replaced zenmap new official graphical user interface based umit developed adriano monteiro marques various web-based interfaces allow controlling nmap analysing nmap results web browser include nmap-cgi ivre microsoft windows specific guis exist including nmapwin updated since june 2003 v1.4.0 nmapw syhunt nmap provides four possible output formats interactive output saved file nmap output manipulated text processing software enabling user create customized reports nmap first published september 1997 article phrack magazine source-code included help contributions computer security community development continued enhancements included operating system fingerprinting service fingerprinting code rewrites c c++ additional scan types protocol support e.g ipv6 sctp new programs complement nmap core features major releases include nmap tool used discover services running internet connected systems like tool could potentially used black hat hacking precursor attempts gain unauthorized access computer systems however nmap also used security systems administration assess networks vulnerabilities i.e white hat hacking system administrators use nmap search unauthorized servers computers conform security standards jurisdictions unauthorized port scanning illegal nmap originally distributed gnu public license gpl later releases nmap authors added clarifications specific interpretations license felt gpl unclear lacking instance nmap 3.50 specifically revoked license sco group distribute nmap software views sco-linux controversies matrix reloaded trinity seen using nmap access power plant computer system allowing neo physically break building appearance nmap film widely discussed internet forums hailed unusually realistic example hacking nmap nmapfe used listening 2006 movie former nsa officer defects mounts clandestine counter-listening station high italian alps nmap source code seen movie battle royale well brief views command line version nmap executing live free die hard bourne ultimatum 2013 nmap continued make appearances movies including popular sci-fi movie elysium film dredd film adaptation famous judge dredd comics released 2012 also contains multiple nmap scenes nmap used network reconnaissance exploitation slum tower network even seen briefly movie trailer command nmap widely used video game hacknet allowing probe network ports target system hack snowden nmap used aptitude test scene 14 minutes movie nmap integral part academic activities used research involving tcp/ip protocol suite networking general well research tool nmap become research topic
[ 3714, 1541, 9735, 10633, 6797, 3473, 4369, 6548, 1429, 3094, 4373, 5402, 161, 10020, 4005, 8998, 4777, 939, 9771, 10924, 3503, 1200, 5935, 7983, 8497, 9393, 5045, 7989, 823, 9780, 9146, 7228, 3006, 11202, 2887, 6345, 842, 1232, 3539, 8791...
Test
2,740
1
Online_complex_processing:online complex processing online complex processing olcp class realtime data processing involving complex queries lengthy queries and/or simultaneous reads writes records
[ 5658 ]
Test
2,741
1
Generic_Mapping_Tools:generic mapping tools generic mapping tools gmt open-source collection computer software tools processing displaying xy xyz datasets including rasterisation filtering image processing operations various kinds map projections software stores 2-d grids coards-compliant netcdf files comes comprehensive collection free gis data coast lines rivers political borders coordinates geographic objects users convert data like satellite imagery digital elevation models sources import gmt stores resulting maps diagrams postscript ps encapsulated postscript eps format users operate system command line enables scripting automation routine tasks less comprehensive graphic user interfaces available third parties well web applications bringing system functionality online paul wessel walter h. f. smith created gmt 1988 lamont-doherty earth observatory officially releasing october 7 1991 gnu general public license letters gmt originally stood gravity magnetism topography three basic types geophysical data besides strong support visualisation geographic data sets software includes tools processing manipulating multi-dimensional datasets gmt users geoscientists
[ 7983, 8628, 5397, 823, 2045 ]
Validation
2,742
4
Macau_Computer_Emergency_Response_Team_Coordination_Centre:macau computer emergency response team coordination centre macau computer emergency response team coordination centre mocert managed macau new technologies incubator centre providing macau computer security incident handling information promoting information security awareness well coordinating computer security incident response public local enterprises mocert collaborates local bodies also communicates exchange information members first forum incident response security teams apcert asia pacific computer emergency response teams mocert mission facilitate healthy secure internet environment macau mocert provides latest computer vulnerabilities discovered around world publishes latest security issues advisories website individuals organizations also register free mocert subscriber get latest related information email organization also provides advice best way handle computer incident free mocert accepts reports computer security related incidents example phishing malware malicious website phoney emails attachments information security attacks mocert organizes relevant seminars events macao constituency regular basis promote information security awareness macao public events topics altered according current issues facing macao mocert complements seminars events print material form leaflet booklets sections constituency requires awareness guidance information security
[ 7515, 5636, 10190, 2558 ]
Validation
2,743
3
Road_Blaster:road blaster laserdisc-based arcade games time gameplay consists on-screen instructions overlaid pre-recorded full motion video animated footage high-speed chases vehicular combat player controls cross-hair steer car toward correct directions according green arrows flashing beeping beside controlling gas pedal brake booster whenever light game nine stages upon successfully completing level player graded reaction time different difficulty levels selected normal mode pop-up icons audio tones signal turn left right brake hit turbo hit cars hard mode on-screen icons guide player story road blaster inspired revenge thriller films mad max takes place post-apocalyptic wasteland late 1990s united states future time game release player assumes role vigilante drives customized sports car order get revenge biker gang responsible wife death honeymoon recovering injuries upgrades car goes rampage nine areas goal seek gang female boss complete vengeance road blaster uses animation provided anime studio toei animation animated guidance yoshinobu inano also directed key-animated films animated using 15,000 hand-painted cels produce 30 minutes animation game director yoshihisa kishimoto previously worked cobra command later directed arcade version double dragon car road blaster seen inside lee brothers garage start game road blaster originally released 1985 laserdisc-based arcade game various ports released throughout including versions msx x1 mega cd/sega cd laseractive mega ld format sega saturn playstation 3do interactive multiplayer prototyped turbo blaster however sega cd mega ld versions released outside japan titles road avenger road prosecutor respectively titles possibly changed avoid confusion similarly titled arcade game roadblasters atari games ported mega drive around time road blaster also released sharp x68000 windows 2011 exclusively japan cobra command road blaster ported ios revolutionary concepts 2010 2011 respectively variations included one-shot reproductions vhs cassette players takara video challenger limited interactive port road blaster arcade game sega saturn playstation ports compilations road blaster another laserdisc arcade game developed team titled thunder storm known outside japan cobra command unofficial super nes port also released 2011 however game relies heavily msu1 media enhancement chip somewhat new chip allows 4gb additional storage space full motion video playback stereo pcm audio early 2018 another unofficial port released commodore amiga ocs aga versions released based mega cd version dragon reviewers gave sega cd version game 4 5 stars 1993 gamefan noted greater interaction compared time gal thunderstorm praised non-stop control vehicle graphics smooth animation andrenaline rush experience gamepro praised highly detailed animation stereo cd sound called masterpiece like participating intense action-packed animated movie release famitsu gave mega cd version score 32 40 mega rated 86 famitsu later scored sega saturn version 25 40 playstation version 23 40 ios port released generally favourable reviews including scores 8 10 ign 7 10 pocket gamer novelization game announced 2009 project officially authorized g-mode japan rights holder data east catalog written mary margaret park
[ 1921, 2436, 9006 ]
Test
2,744
6
Partition_table:partition table partition fixed-size subset disk drive treated unit operating system partition table table maintained disk operating system describing partitions disk terms partition table partition map commonly associated mbr partition table master boot record mbr ibm pc compatibles may used generically refer formats divide disk drive partitions guid partition table gpt apple partition map apm bsd disklabel partitions created resized deleted called disk partitioning usually done installation operating system also possible make changes partitions operating system installed
[ 6939, 1801, 1071, 7983, 2545, 1970, 8857, 2811, 8572 ]
None
2,745
3
Wait_state:wait state wait state delay experienced computer processor accessing external memory another device slow respond computer microprocessors generally run much faster computer subsystems hold data cpu reads writes even memory fastest supply data fast cpu could process example 2011 typical pc processors like intel core 2 amd athlon 64 x2 run clock several ghz means one clock cycle less 1 nanosecond typically 0.3 ns 0.5 ns modern desktop cpus main memory latency 15–30 ns second-level cpu caches run slower processor core processor needs access external memory starts placing address requested information address bus must wait answer may come back tens hundreds cycles later cycles spent waiting called wait state wait states pure waste processor performance modern designs try eliminate hide using variety techniques cpu caches instruction pipelines instruction prefetch branch prediction simultaneous multithreading others single technique 100 successful together significantly reduce problem wait states used reduce energy consumption processor allowing main processor clock either slow temporarily pause wait state cpu work rather spinning uselessly tight loop waiting data sporadically reducing clock speed manner helps keep processor core cool extend battery life portable computing devices ibm mainframes term wait state used different meaning wait state refers cpu halted possibly due kind serious error condition unrecoverable error operating system ipl wait state indicated bit 14 psw set 1 bits psw providing wait state code giving reason wait z/architecture mode wait state code found bits 116-127
[ 7607, 10692, 6950, 5503, 1801, 3615, 8078, 10734, 1776, 7505, 7218, 563, 8501, 663, 731, 799 ]
Test
2,746
5
Advanced_Data_Communication_Control_Procedures:advanced data communication control procedures telecommunication advanced data communication control procedures protocol adccp bit-oriented data link layer protocol used provide point-to-point point-to-multipoint transmission data frames contain error control information places data network ensures proper delivery destination adccp based ibm sdlc protocol hdlc iso lapb itu/ccitt based adccp adccp ansi standard x3.66 derived ibm synchronous data link control sdlc protocol functionally equivalent iso high-level data link control hdlc standard adccp 3 main modes – nrm normal response mode akin sdlc abm asynchronous balanced mode akin hdlc arm asynchronous response mode
[ 1997, 6544, 7865, 3323, 4543 ]
Test
2,747
4
Wietse_Venema:wietse venema wietse zweitze venema born 1951 dutch programmer physicist best known writing postfix email system also wrote tcp wrapper collaborated dan farmer produce computer security tools satan coroner toolkit studied physics university groningen continuing get phd 1984 dissertation left-right symmetry nuclear beta decay spent 12 years eindhoven university systems architect mathematics computer science department spent part time writing tools electronic data interchange since emigrating u.s. 1996 2015 working ibm thomas j. watson research center new york state march 24 2015 announced leaving ibm google awards venema received work
[ 3172, 3503, 7605, 8469, 8791, 3323, 4349 ]
Test
2,748
5
Ipswitch_IMail_Server:ipswitch imail server imail handle many 300,000 users average message flow ~25 per second ~2 million day support 32 64 bit platforms iis/.net framework 2.0 smtp pop3 imap4 ldap protocol support rfc 1870 compliant business computing world review imail server premium v11.01 pc magazine voted imail server editor choice – march 2009 network computing awards 2008 messaging product year
[ 471, 5063, 10248, 76, 8332, 5230, 11500, 8976, 9909, 4439, 412 ]
Validation
2,749
2
Security_and_Maintenance:security maintenance security maintenance formerly known action center security center earlier versions component windows nt family operating systems monitors security maintenance status computer monitoring criteria includes optimal operation antivirus software personal firewall well working status backup restore network access protection nap user account control uac windows error reporting wer windows update notifies user problem monitored criteria antivirus program up-to-date offline security maintenance consists three major components control panel applet windows service application programming interface api provided windows management instrumentation wmi control panel applet divides monitored criteria categories color-codes yellow indicates non-critical warning e.g settings monitored optimal red indicates critical message e.g anti-virus program offline service named security center determines current state settings service default starts computer starts continually monitors system changes notifies user detects problem versions windows prior windows 10 adds notification icon windows taskbar wmi provider makes settings available system third-party anti-virus anti-spyware personal firewall software vendors primarily register security maintenance wmi provider windows vista added new set apis let programs retrieve aggregate health status within security maintenance receive notifications health status changes apis allow programs confirm system healthy state engaging certain actions example computer game ensure firewall running connecting online game security maintenance charge following microsoft learned discussions customers confusion whether users taking appropriate steps protect systems steps taking effective research microsoft made decision include visible control panel windows xp service pack 2 would provide consolidated view important security features service pack 2 released august 2004 includes first version windows security center wsc version monitors windows update windows firewall availability anti-virusprogram third-party providers personal firewall anti-virus software packages encouraged use wsc api register products wsc 25 august 2004 pc magazine published article security watch newsletter titled windows xp sp2 security center spoofing threat outlined design vulnerability could allow malware manipulate security center displaying false security status regardless true security status malware requires administrative privileges microsoft countered claim asserting piece malware gains administrative privileges need spoof anything commit much nastier malicious actions wsc windows vista monitors new criteria anti-spyware software user account control internet explorer security settings also display logos third-party products registered security center unlike windows xp beta versions windows vista wsc could disabled overridden security software maker symantec spoke noting would cause great deal consumer confusion security problems would reported wsc symantec tools time mcafee another large security software vendor lodged similar complaints end microsoft allowed wsc disabled windows 7 windows security center renamed action center designed centralize reduce number notifications system encompasses security maintenance computer notification icon windows taskbar appears message perusal replaces five separate notification icons found windows vista troubleshooting link also added providing shortcut windows 7 new troubleshooting control panel windows 8 action center monitors 10 new items microsoft account windows activation smartscreen automatic maintenance drive status device software startup apps homegroup file history storage spaces windows 10 name action center used application notifications quick actions action center windows 8.1 renamed security maintenance causing confusion users administrators longer displays icon notification area otherwise retains features windows 8.1 action center troubleshooting link removed windows 10 fall creators update starting windows 10 creators update microsoft introduced new component called windows defender security center wdsc provides much functionality new component universal windows platform app also default front-end windows defender relies service called windows defender security center service comparison security maintenance wdsc
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 8753, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 8296, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 651, 67...
None
2,750
4
Economics_of_security:economics security economics information security addresses economic aspects privacy computer security economics information security includes models strictly rational “ homo economicus ” well behavioral economics economics security addresses individual organizational decisions behaviors respect security privacy market decisions economics security addresses core question agents choose technical risks exists technical solutions mitigate security privacy risks economics addresses question also inform design decisions security engineering national security canonical public good economic status information security came intellectual fore around 2000 case innovations arose simultaneously multiple venues 2000 ross anderson wrote information security hard anderson explained significant difficulty optimal development security technology incentives must aligned technology enable rational adoption thus economic insights integrated technical design security technology enable party risk invest limit risk otherwise designers simply counting altruism adoption diffusion many consider publication birth economics security also 2000 harvard camp school government wolfram department economics argued security public good rather extant vulnerabilities associated negative externality value vulnerabilities defined work tradable goods six years later idefense zdi mozilla extant markets vulnerabilities 2000 scientists computer emergency response team carnegie mellon university proposed early mechanism risk assessment hierarchical holographic model provided first multi-faceted evaluation tool guide security investments using science risk since time cert developed suite systematic mechanism organizations use risk evaluations depending size expertise organization octave study computer security investment risk avoidance become standard practice 2001 unrelated development lawrence a. gordon martin p. loeb published using information security response competitor analysis systems working paper published article written 2000 professors maryland smith school business present game-theoretic framework demonstrates information security prevent rival firms gaining sensitive information context article considers economic i.e. cost-benefit aspects information security authors came together develop expand series flagship events name workshop economics information security proof work security technology designed stop spam altering economics early paper economics information security argued proof work work fact finding proof work work without price discrimination illustrated later paper proof work work another finding one critical understanding current american data practices opposite privacy economic terms anonymity rather price discrimination privacy price discrimination authored andrew odlyzko illustrates may appear information pathology collection data fact rational organizational behavior hal varian presented three models security using metaphor height walls around town show security normal good public good good externalities free riding end result case lawrence a. gordon martin p. loeb wrote economics information security investment gordon-loeb model considered many first economic model determines optimal amount invest protect given set information model takes account vulnerability information security breach potential loss breach occur
[ 8302, 4496, 1941, 9145, 4956, 5373, 2558 ]
None
2,751
9
TREE-META:tree-meta tree-meta tree meta treemeta translator writing system compiler-compiler system context-free languages originally developed 1960s parsing statements metalanguage resemble augmented backus–naur form embedded tree-building directives unparsing rules include extensive tree-scanning code-generation constructs tree-meta instrumental development on-line system ported many systems including univac 1108 ge 645 sds-940 icl 1906a perq ucsd p-system complete example tree-meta program extracted untested complete declarations conditionals blocks example appendix 6 icl 1900 tree-meta manual document also definition tree-meta tree-meta appendix 3 program recognizer also outputs assembly language input demonstrates one key features tree-meta tree pattern matching used lhs get val example rhs add sub algol-style comment delimited
[ 10560, 9926, 1552, 2065, 477 ]
Test
2,752
5
Automatic_repeat_request:automatic repeat request automatic repeat request arq also known automatic repeat query error-control method data transmission uses acknowledgements messages sent receiver indicating correctly received packet timeouts specified periods time allowed elapse acknowledgment received achieve reliable data transmission unreliable service sender receive acknowledgment timeout usually re-transmits packet sender receives acknowledgment exceeds predefined number retransmissions types arq protocols include stop-and-wait arq go-back-n arq selective repeat arq/selective reject arq three protocols usually use form sliding window protocol tell transmitter determine packets need retransmitted protocols reside data link transport layers layers 2 4 osi model transmission control protocol uses variant go-back-n arq ensure reliable transmission data internet protocol provide guaranteed delivery packets selective acknowledgement sack uses selective repeat arq itu-t g.hn standard provides way create high-speed 1 gbit/s local area network using existing residential wiring power lines telephone lines coaxial cables uses selective repeat arq ensure reliable transmission noisy media arq systems widely used shortwave radio ensure reliable delivery data telegrams systems came forms called arq-e arq-m also included ability multiplex two four channels number patents exist use arq live video contribution environments high throughput environments negative acknowledgements used drive overheads
[ 5472, 1154, 10947, 8741, 3273, 10924, 2701, 9230, 5071, 2640, 4691, 2772, 7865, 2329, 2203, 5118, 4095 ]
Test
2,753
3
Rock_n'_Bolt:rock n bolt rock n bolt puzzle video game developed action graphics published 1984 activision colecovision commodore 64 msx sg-1000 objective game lock platforms place according supplied map three levels difficulty second third level time limits
[ 9006 ]
Validation
2,754
4
ReDoS:redos regular expression denial service redos algorithmic complexity attack produces denial-of-service providing regular expression takes long time evaluate attack exploits fact regular expression implementations exponential time worst case complexity time taken grow exponentially relation input size attacker thus cause program spend unbounded amount time processing providing regular expression either slowing becoming unresponsive regular expression matching done building finite-state automaton regular expressions easily converted nondeterministic automata nfas state input symbol may several possible next states building automaton several possibilities exist algorithms first two problematic first problematic deterministic automaton could formula_1 states formula_2 number states nondeterministic automaton thus conversion nfa dfa may take exponential time second problematic nondeterministic automaton could exponential number paths length formula_3 walking input length formula_3 also take exponential time last two algorithms however exhibit pathological behavior note non-pathological regular expressions problematic algorithms usually fast practice one expect compile regular expression time match n time instead simulation nfa lazy computation dfa mn worst-case complexity regular expression denial service occurs expectations applied regular expressions provided user malicious regular expressions provided user trigger worst-case complexity regular expression matcher regex algorithms written efficient way regular expression engines existence extend regular expression languages additional constructs always solved efficiently extended patterns essentially force implementation regular expression programming languages use backtracking malicious regexes get stuck crafted input different depending regular expression matcher attack backtracking matchers occur whenever factors occur second condition best explained example regular expression codice_1 match repeated subexpression codice_2 therefore matching nondeterministic automaton may try new match codice_2 new match input many consecutive double number possible paths automaton examples malicious regexes include following susceptible input minimum input length might change slightly using faster slower machines patterns may cause exponential behavior long enough inputs hundreds characters usually could still cause long elaboration times example pattern codice_9 input arbitrarily long sequence s. pattern may also cause backtracking matchers hang so-called evil malicious regexes found online regular expression repositories note enough find evil sub expression order attack full regex two examples also susceptible input regex affected user input attacker inject malicious regex make system vulnerable therefore cases regular expression denial service avoided removing possibility user execute arbitrary patterns server case web applications databases main vulnerable applications alternatively malicious page could hang user web browser cause use arbitrary amounts memory however examples paragraphs considerably less artificial others thus demonstrate vulnerable regexes may used result programming mistakes case e-mail scanners intrusion detection systems could also vulnerable fortunately cases problematic regular expressions rewritten non-evil patterns example codice_8 rewritten codice_13 case web application programmer may use regular expression validate input client server side system attacker could inspect client code looking evil regular expressions send crafted input directly web server order hang
[ 1952, 11487, 10852, 8262, 4488, 2409, 6536, 6347, 2060, 9293, 6735, 7091, 5245, 9688, 953, 3581, 9727 ]
Validation
2,755
6
ARJ:arj arj archived robert jung software tool designed robert k. jung creating high-efficiency compressed file archives arj currently version 2.86 dos 3.20 microsoft windows supports 16-bit 32-bit 64-bit intel architectures arj one two mainstream archivers dos windows early mid-1990s pkzip competition parts arj covered generally arj less popular pkzip niche market bbs era warez scene largely due arj creation handling multi-volume archives archives split smaller files suitable dial-up transfers floppy distribution robust pkzip arj compressed files filename extension .arj unpacked various tools arj software exists free software re-implementation tool software 7-zip zipeg winrar also unpack .arj files mac exists standalone utilities dearj unarjmac
[ 6022, 1801, 10121, 1420, 6797, 1940, 3222, 9880, 3114, 10027, 2095, 4406, 6713, 10817, 11076, 1352, 4296, 3659, 10317, 4174, 10575, 4561, 722, 3804, 7422, 1631, 3296, 9953, 5858, 11614, 6759, 5096, 7529, 6506, 4459, 10857, 237, 1646, 7667, ...
Test
2,756
4
Automated_information_systems_security:automated information systems security telecommunication automated information systems security comprises measures controls ensure confidentiality integrity availability information processed stored automated information systems unauthorized disclosure modification destruction may accidental intentional automated information systems security includes consideration computer hardware software functions characteristics features operational procedures accountability procedures access controls central computer facility remote computer terminal facilities management constraints physical structures devices computers transmission lines power sources personnel communications controls needed provide acceptable level risk automated information system data information contained system automated information systems security also includes totality security safeguards needed provide acceptable protection level automated information system data handled automated information system information security automated information systems security synonym computer security
[ 2737, 7188, 5373, 2558 ]
None
2,757
1
BaseX:basex basex native light-weight xml database management system xquery processor developed community project github specialized storing querying visualizing large xml documents collections basex platform-independent distributed permissive free software license contrast document-oriented databases xml databases provide support standardized query languages xpath xquery basex highly conformant world wide web consortium w3c specifications official update full text extensions included gui enables users interactively search explore analyze data evaluate xpath/xquery expressions realtime i.e. user types basex uses tabular representation xml tree structures store xml documents database acts container single document collection documents xpath accelerator encoding scheme staircase join operator taken inspiration speeding xpath location steps additionally basex provides several types indices improve performance path operations attribute lookups text comparisons full-text searches basex started christian grün university konstanz 2005 2007 basex went open source bsd-licensed since basex server pure java 1.7 application thus runs system provides suitable java implementation tested windows mac os x linux openbsd particular packages available debian ubuntu
[ 9828, 5677, 10453, 6775, 2456, 124, 479 ]
None
2,758
4
XML_external_entity_attack:xml external entity attack xml external entity attack type attack application parses xml input attack occurs xml input containing reference external entity processed weakly configured xml parser attack may lead disclosure confidential data denial service server side request forgery port scanning perspective machine parser located system impacts xml 1.0 standard defines structure xml document standard defines concept called entity storage unit type different types entities external general/parameter parsed entity often shortened external entity access local remote content via declared system identifier system identifier assumed uri dereferenced accessed xml processor processing entity xml processor replaces occurrences named external entity contents dereferenced system identifier system identifier contains tainted data xml processor dereferences tainted data xml processor may disclose confidential information normally accessible application similar attack vectors apply usage external dtds external style sheets external schemas etc included allow similar external resource inclusion style attacks attacks include disclosing local files may contain sensitive data passwords private user data using file schemes relative paths system identifier since attack occurs relative application processing xml document attacker may use trusted application pivot internal systems possibly disclosing internal content via http requests launching csrf attack unprotected internal services situations xml processor library vulnerable client-side memory corruption issues may exploited dereferencing malicious uri possibly allowing arbitrary code execution application account attacks access local resources may stop returning data possibly impacting application availability many threads processes released note application need explicitly return response attacker vulnerable information disclosures attacker leverage dns information exfiltrate data subdomain names dns server control examples testing xml injection owasp-dv-008 xml version= 1.0 encoding= iso-8859-1 php expect module loaded remote code execution may possible modified payload xml version= 1.0 encoding= iso-8859-1 since entire xml document communicated untrusted client usually possible selectively validate escape tainted data within system identifier dtd therefore xml processor configured use local static dtd disallow declared dtd included xml document
[ 8930, 899, 8644, 522, 5682, 10492, 5404, 479 ]
Test
2,759
2
GeeksPhone_Revolution:geeksphone revolution geeksphone revolution smartphone released geeksphone january 2014 uses x86 architecture pci bus instead arm architecture capable running either android firefox os lacks dual boot facility
[ 1776, 1083, 7492, 2259 ]
Validation
2,760
5
Instant_Messaging_and_Presence_Protocol:instant messaging presence protocol instant messaging presence protocol impp ietf working group created purpose developing architecture simple instant messaging presence awareness/notification created 1999-02-25 concluded 2004-09-08
[ 10242, 5251, 3460, 5382, 4746, 1036, 11408, 3610, 3228, 10271, 3105, 9511, 1962, 9519, 8758, 1467, 6208, 1218, 6982, 6855, 1738, 2892, 3284, 4318, 3812, 4068, 6628, 9572, 3959, 7928, 10748 ]
Validation
2,761
3
Green_Hills_Software:green hills software green hills software privately owned company builds operating systems programming tools embedded systems firm founded 1982 dan o'dowd carl rosenberg world headquarters santa barbara california green hills software wind river systems enacted 99-year contract cooperative peers embedded software engineering market throughout 1990s relationship ending series lawsuits throughout early 2000s resulted opposite parting ways whereupon wind river devoted publicly embrace linux open-source software green hills initiated public relations campaign decrying use issues national security 2008 green hills integrity-178 rtos first system certified national information assurance partnership niap composed national security agency nsa national institute standards technology nist evaluation assurance level eal 6+ november 2008 announced commercialized version integrity 178-b available sold private sector integrity global security subsidiary green hills software march 27 2012 contract announced green hills software nintendo designates multi official integrated development environment toolchain nintendo licensed developers program wii u video game console february 25 2014 announced operating system integrity chosen urban aeronautics airmule integrity posix real-time operating system rtos integrity variant named integrity-178b certified common criteria evaluation assurance level eal 6+ high robustness november 2008 micro velosity stylized µ-velosity real-time microkernel resource-constrained devices green hills produces compilers programming languages c c++ fortran ada cross-platform 32- 64-bit microprocessors including arm blackfin coldfire mips powerpc superh starcore x86 v850 xscale multi integrated development environment ide programming languages c c++ embedded c++ ec++ ada aimed embedded engineers timemachine set tools optimizing debugging c c++ software timemachine introduced 2003 supports reverse debugging feature later also became available free gdb 7.0 debugger 2009
[ 2179, 7561, 8720, 1298, 7187, 9366, 6300, 8861, 1952, 428, 11180, 7983, 4914, 1462, 823, 11446, 5049, 10170, 10813, 10945, 7234, 1350, 8904, 2761, 9931, 7887, 10962, 6486, 5976, 9176, 1761, 5865, 5612, 9964, 499, 5363, 11123, 3960, 8700, ...
Test
2,762
3
Vmlinux:vmlinux linux systems codice_1 statically linked executable file contains linux kernel one object file formats supported linux includes elf coff a.out codice_1 file might required kernel debugging symbol table generation operations must made bootable used operating system kernel adding multiboot header bootsector setup routines traditionally unix platforms called kernel image codice_3 development virtual memory kernels supported feature given codice_4 prefix differentiate name codice_1 mutation vmunix codice_6 letter codice_7 end denotes compressed example gzipped traditionally kernel located root directory filesystem hierarchy however bootloader must use bios drivers access hard disk limitations i386 systems meant first 1024 cylinders hard disk addressable overcome linux distributors encouraged users create partition beginning drives specifically storing bootloader kernel related files grub lilo syslinux common bootloaders convention partition mounted filesystem hierarchy codice_8 later standardised filesystem hierarchy standard fhs requires linux kernel image located either codice_9 codice_8 although technical restriction enforcing traditionally creating bootable kernel image kernel also compressed using gzip since linux 2.6.30 using lzma bzip2 requires small decompression stub included resulting image stub decompresses kernel code systems printing dots console indicate progress continues boot process support lzo lz4 compression later added decompression routine negligible factor boot time prior development bzimage size constraints architectures notably i386 extremely limiting making compression necessity sparc architecture vmlinux file compressed using simple gzip silo boot loader transparently decompresses gzipped images filename bootable image important many popular distributions use vmlinuz linux kernel matured size kernels generated users grew beyond limits imposed architectures space available store compressed kernel code limited bzimage big zimage format developed overcome limitation splitting kernel discontiguous memory regions bzimage compressed using gzip linux 2.6.30 introduced algorithms although popular misconception codice_11 prefix means bzip2 compression used bzip2 package often distributed tools prefixed codice_11 codice_13 codice_14 etc case bzimage file specific format contains concatenated codice_15 codice_16 codice_17 codice_18 codice_18 contains gzipped vmlinux file data section elf see compressed/makefile piggy.o source files mentioned codice_20 script codice_21 found codice_22 kernel sources decompresses kernel image distributions e.g red hat clones may come codice_23 rpm contains codice_1 file matching kernel rpm typically gets installed codice_25 codice_26 elf header x86-64 gentoo 2.6.29 executable kernel image readelf -h vmlinux elf header
[ 4616, 3082, 5139, 10780, 10785, 6180, 8242, 9266, 4161, 8772, 6213, 8268, 589, 593, 6244, 5222, 10856, 4207, 5244, 4734, 11391, 7812, 7821, 4238, 10382, 2195, 2711, 6808, 9882, 1694, 2723, 8364, 10933, 5815, 5822, 5824, 1736, 8909, 6352, ...
None
2,763
2
NepaLinux:nepalinux nepalinux debian morphix-based linux distribution focused desktop usage nepali language computing contains applications desktop users openoffice.org nepali gnome kde desktops nepali input method editor development distribution nepalinux done madan puraskar pustakalaya version 1.0 produced part pan localization project support international development research centre idrc canada nepalinux effort promoting free open-source software nepal october 2007 nepalinux joint recipient association progressive communications annual apc foss prize
[ 8837, 7435, 10127, 2321, 5397, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 439, 56, 59, 7483, 3903, 4673, 2375, 4039, 5067, 8907, 1110, 9693, 2914, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534, 2671, 7920,...
Test
2,764
3
Zen+:zen+ zen+ codename amd successor zen microarchitecture first released april 2018 powering second generation ryzen processors known ryzen 2000 mainstream desktop systems threadripper 2000 high-end desktop setups zen+ uses globalfoundries 12nm fabrication process optimization 14nm process used zen minor design rule changes means die sizes zen zen+ identical amd chose increase amount empty space individual smaller transistors improve power efficiency reduce thermal density rather design entirely new floor-plan physically smaller die process optimizations allowed zen+ achieve higher clock speeds lower power consumption zen products though minor revisions compared zen microarchitecture known changes microarchitecture include improved clock speed regulation response workload reduced cache memory latencies increased cache bandwidth better ddr4 sdram memory support zen+ also supports improvements per-core clocking features based core utilization cpu temperatures changes core utilization temperature power algorithms branded precision boost 2 xfr2 extended frequency range 2 evolutions first-generation technologies zen zen xfr gave additional 50 200 mhz clock speed increase 25 mhz increments maximum precision boost clocks zen+ xfr2 longer listed separate clock modifier instead xfr temperature power clock monitoring logic feeds precision boost 2 algorithm adjust clocks power consumption opportunistically dynamically ultimately changes zen+ resulted 3 improvement ipc zen conjunction 6 higher clock speeds resulted 10 overall increase performance
[ 3586, 8322, 5380, 9092, 9475, 6151, 8327, 10375, 5645, 398, 6033, 9369, 7963, 2719, 9122, 5541, 11047, 2088, 2094, 11183, 1329, 6705, 10675, 9400, 833, 6978, 7234, 9541, 11080, 7247, 9551, 977, 5329, 7122, 9427, 473, 9435, 5859, 7783, 126...
Train
2,765
4
Loggly:loggly solarwinds loggly cloud-based log management analytics service provider based san francisco california jon gifford raffael marty kord campbell founded company 2009 charlie oppenheimer ceo loggly announced acquisition solarwinds part solarwinds cloud division brands january 8 2018 2009 jon gifford raffael marty kord campbell founded loggly assist companies solving operational issues app47 mobile application management provider partnered loggly september 2012 company chose loggly software-as-a-service saas deployment option september 2013 loggly released generation 2 updated version service update included log collection standard syslog protocols graphical web interface allowed users use point-and-click process find log events generate charts month loggly completed 10.5 million funding round led cisco data collective trinity ventures true ventures matrix partners also participated round october 2014 company announced 15 million series c funding round led harmony partners matrix partners trinity ventures cisco data collective true ventures also participated funding round raised loggly total investment funding 33.4 million company released loggly dynamic field explorer new user experience aims reduce time developers spend identifying troubleshooting problems month january 8 2018 company announced part solarwinds loggly headquartered san francisco california company 54 employees 10,000 customers october 2017 loggly records log data device reports real-time management platform trend data loggly cloud-based log management service provider require use proprietary software agents collect log data service uses open source technologies including elasticsearch apache lucene 4 apache kafka
[ 11429, 4234, 6834, 11542, 6458, 3614 ]
Validation
2,766
1
Biobase_(company):biobase company biobase international bioinformatics company headquartered wolfenbüttel germany focus generation maintenance licensing databases field molecular biology related software platforms history company founded 1997 spin-off german research centre biotechnology gbf braunschweig germany known today helmholtz research centre infection research *the founders scientists gbf research group bioinformatics headed time edgar wingender company managed michael tysiak ceo/cfo frank schacherer coo citation needed • company original product transfac database platform description analysis gene regulatory events networks subsequently complemented number smaller databases relevant aspects gene regulation early signaling pathway database transpath transpath constituted earliest signaling pathway database alongside cell signaling network database csndb curated t. takai national institute health sciences nihs tokyo • 1999 2000 employees till august 2017 biobase group new high-tech enterprise focusing development production management scientific equipment vitro diagnosis ivd instrument reagent • biobase group certificates including iso9001 iso13485 iso 14001 sgs ce nsf en fda etc • biobase group always adheres mission “ service health future ” promotes company ’ culture vigorously providing high quality products good service biobase would like establish win-win business cooperation distributors world end 1999 biobase acquired venture capital imh funds managed triginta capital mbg hannover 2007 tbg 2002 intec w g tokyo japan invested company remained shareholder 2005 early 2005 company acquired databases produced incyte wilmington delaware usa operated time incyte subsidiary proteome inc beverly early flagship proteome yeast proteome database ypd complemented number similar databases latest achievement acquisition human proteome survey database humanpsd biobase gmbh three fully owned daughter companies biobase corporation beverly/massachusetts usa since 2005 biobase databases india pvt ltd. bangalore india since 2006 biobase japan k.k yokohama japan since 2007 company databases provide manually curated content collected structured peer-reviewed scientific primary publications biobase knowledge library bkl integrated database comprising following modules addition biobase developed explain system biological interpretation gene expression proteomics data integrated functional promoter pathway analysis gene regulation portal offers number earlier revisions company products free charge users non-profit organizations number third-party products also distributed biobase addition products biobase offers knowledge process outsourcing kpo services may comprise development population customized databases specific contents systematic analyses gene expression data biobase member following publicly funded research consortia first two coordinated biobase alexander kel addition biobase entered research partnerships
[]
None
2,767
3
Spatial_Archive_and_Interchange_Format:spatial archive interchange format spatial archive interchange format saif pronounced safe defined early 1990s self-describing extensible format designed support interoperability storage geospatial data saif dataset saif two major components together define saiftalk first class syntax notation csn data definition language used define dataset schema second object syntax notation osn data language used represent object data adhering schema csn osn contained physical file along directory beginning file use ascii text straightforward syntax csn osn ensure parsed easily understood directly users developers saif dataset .saf .zip extension compressed using zip archive format schema definition saif defines 285 classes including enumerations class syntax notation covering definitions high-level features geometric types topological relationships temporal coordinates relationships geodetic coordinate system components metadata considered forming base schema using csn user defines new schema describe features given dataset classes belonging new schema defined csn subclasses existing saif classes new enumerations foreststand :myschema example could defined attributes including age species etc foreststand :myschema specified subclass geographicobject feature defined saif standard user defined classes must belong schema one defined user previously existing different schemas exist dataset objects defined one schema reference specified another inheritance saif supports multiple inheritance although common usage involved single inheritance object referencing object referencing used means breaking large monolithic structures significantly allow objects defined referenced number times section geometry land-water interface could define part coastline well part municipal boundary part marine park boundary geometric feature defined given object reference used geometry coastline municipality marine park specified multimedia multimedia objects also objects saif dataset referenced accordingly example image sound files associated given location could included primary advantage saif inherently extensible following object oriented principles meant data transfers one gis environment another need follow lowest common denominator two systems instead data could extracted dataset defined first gis transformed intermediary i.e. semantically rich saif model transformed model format applicable second gis notion model model transformation deemed realistic object oriented approach recognized scripts carry transformations could fact add information content safe software developed feature manipulation engine fme large measure express purpose supporting transformations fmebc freely available software application supported wide range transformations using saif hub fme developed commercial offering intermediary could held memory instead saif dataset saif project established means addressing interoperability different geographic information systems exchange formats particular prominence time included digest digital geographic information exchange standard sdts spatial data transfer specification later accepted spatial data transfer standard considered inflexible difficult use consequently government british columbia decided develop saif put forward national standard canada saif became canadian national standard 1993 approval canadian general standards board last version saif published january 1995 designated cgis-saif canadian geomatics interchange standard spatial archive interchange format formal definition release 3.2 issue can/cgsb-171.1-95 catalogue number p29-171-001-1995e work saif modeling paradigm csn classes carried principally mark sondheim henry kucera peter friesen british columbia government time dale lutz murray safe software developed object syntax notation reader writer software became part feature manipulation engine saif brought attention michael stonebraker kenn gardels university california berkeley working initial version open geospatial interoperability specification ogis first efforts became open geospatial consortium ogc series 18 submissions iso sql multimedia working group also helped tie saif original iso work geospatial features today saif historical interest significant precursor geography markup language formative element development widely used feature manipulation engine sondheim m. k. gardels k. buehler 1999 gis interoperability pp 347–358 geographical information systems second edition volume 1 edited paul a. longley michael f. goodchild david j. magurie davide w. rhind sondheim m. p. friesen d. lutz d. murray 1997 spatial archive interchange format saif spatial database transfer standards 2 characteristics assessing standards full descriptions national international standards world edited moellering h. hogan r. elsevier netherlands surveys resource mapping branch spatial archive interchange format release 3.2 formal definition 1995 also release 3.1 1994 3.0 1993 2.0 1992 1.0 1991 0.1 1990 surveys resource mapping branch british columbia ministry environment lands parks 258p also published canadian general standards board can/cgsb-171.1-95 available request geobc service desk http //www.ilmb.gov.bc.ca/geobc/servicedesk.html
[]
Test
2,768
9
Oracle_Media_Objects:oracle media objects oracle media objects formerly oracle card software development tool developing multi-media applications functionality appearance similar apple computer hypercard program originated plus 1989 clone hypercard published format verlag added several highly-requested features plus purchased spinnaker software ported windows nt os/2 presentation manager becoming first cross-platform hypermedia solution 1994 plus purchased objectplus focussed windows version renaming winplus also licensed system oracle used basis oracle card first released 1991 oracle card essentially redistribution plus runtime engine along external libraries establishing connections rdbms engines oracle db2 oracle card stacks could execute queries associate results native variables making oracle card one first rdbms application development environments support cross-platform development years later oracle acquired original plus source code format verlag developed become oracle media objects omo omo n't last long development ceasing version 1.1.2 omo used oracle position video demand market commercially products built using tool amongst secret century series cd-roms published voyager company inside independence day aces entertainment omo unique distinction stacks cross-platform also external libraries xcmds purpose small subset mac os memory management commands handles ported platforms addition omo sported modular design every type object actually implemented plugin file objects folder omo object types included standard controls available hypercard clones time buttons text fields draw paint graphics well complex controls like spreadsheet field non-control items could placed card invisible runtime like timers could scheduled send messages specified time oracle card primary value lay fact time oracle product offer gui support microsoft windows therefore sometimes included sales pitches potential clients virtue fact windows becoming increasingly popular desktop large corporations showed customers oracle serious windows current product platform oracle primary application development tool oracle forms 3 character-based run microsoft windows although could run dos window natively dos without windows oracle desperately working developing upgrade oracle forms 4 gui features development behind schedule oracle card primarily used stop gap demonstration product oracle forms become available handful large clients including u.s postal service known developed applications oracle card internal use oracle card broad commercial success development platform despite fact feature set surpassed apple hypercard nearly every respect platform support database connectivity vector graphics support better color support faster performance richer plug-in architecture eventually oracle forms 4.0 released meaning support windows longer exclusive domain oracle card oracle customers tended interested standard forms-based database applications rather sorts multimedia applications possible create oracle card successor omo oracle eventually threw full weight behind oracle forms 4.0 casting oracle card/omo oblivion however oracle card team led two oracle employees gone form successful technology companies marc benioff founder salesforce.com evan goldberg founder netsuite
[ 1539, 10340, 11171, 4486, 6377, 10090, 1259, 4844, 7983, 8976, 1592, 3167 ]
Train
2,769
2
ClanLib:clanlib clanlib video game sdk supporting microsoft windows macos linux partial support mobile platforms full hardware accelerated graphics support opengl also software renderer clanlib also helps playing sound using vorbis mikmod libraries classes collision detection guis xml networking things may helpful game programmer earliest known public release 1999 version 0.1.18 introduction c++ game programming published june 2007 dedicates chapter learn use clanlib library make 2d games also game programming python lua ruby published december 2003 chapter using clanlib together ruby
[ 5451, 6797, 7983, 10480, 4182, 823, 3734, 479 ]
Validation
2,770
0
Eagles_Guidelines:eagles guidelines eagles guidelines provide guidance markup used text corpora particularly identifying features relevant computational linguistics lexicography expert advisory group language engineering standards eagles initiative european commission within dg xiii linguistic research engineering programme numerous well-known companies research centres universities professional bodies across european union collaborate aegis ec dgxiii produce eagles guidelines set recommendations de facto standards good practice areas language engineering eagles initiative coordinated consorzio pisa ricerche pisa italy eagles aims accelerate provision standards
[ 1890, 7599 ]
Validation
2,771
3
Miracle_Warriors:_Seal_of_the_Dark_Lord:miracle warriors seal dark lord miracle warriors seal dark lord known japan role-playing video game released initially japanese pc-88 ported various systems including sega master system version released north america screen game consists four parts lower left character statistics lists characters party character life bar experience bar single character gain experience hitting enemies experiences full new level reached experience bar emptied bars extended resulting maximum life character experience needed gain new level lower right statistics entire party example amount money upper right section varies screen screen traveling world town maze map shown player navigate player invokes main menu shown battle shows battle menu upper left section also varies traveling world cave shows party members surroundings battle shows foe town shows persons player talk dialogue player encounters enemy screen switches battle mode battle mode player choose one character attack per turn character also subjected attack enemy unless enemy uses spell attacks multiple players enemies use flame spells attack party members sleep spells put multiple party members sleep every time party member put sleep take damage wake put sleep many times battle taking damage time fall asleep every party member sleeping enemy use flame spell attack every party member alternative attack player several options including talking retreating using magical item casting spell enemies respond talking give hints currency game guilder used buy items heal players defeated enemies also yield fangs proof valor battle fangs used buy exclusive items traded villages guilders defeating enemies also increase decrease player character points fame killing monsters usually increases player fame killing good characters example merchants decreases player fame certain amount character points required enter certain villages game takes place world five lands spread three continent came elaborate grid-format map noting areas interest game four types land plain forest mountains desert enemies become dangerous different types land plains safest terrain cross continents separated oceans storming sea around last continent ship required sail oceans special ship needed cross storming sea helmed someone pirate blood veins throughout world several towns towns smiths repair weapons armor healers heal sell herbs shops sell weapons armor towns provide information one person every town buys fangs fifty guilders also villages serve special purposes selling ships special magical items several caves exist world house guardians protect mystical armors legend finally also various castles visited get weapons legends kings impressed enough demon queen terarin テラリン returned stolen golden seal opened pandora passage letting loose dark creatures world young hero tasked king restore peace world must step footsteps ancestor iason fought seal demoness another dimension finish job bring end terarin evil hero must enlist aid three companions guy warrior medi amazon treo pirate called turo english manual find three keys terarin lair underground temple defeat also need find set ancient mystical weapons armor miracle warriors master system received mixed mostly positive reviews including rated 40 games machine 77 sega power 80 tilt game followed sequel titled wings arugisu アルギースの翼 released msx2 kogado 1988
[ 9006 ]
Test
2,772
5
Hybrid_automatic_repeat_request:hybrid automatic repeat request hybrid automatic repeat request hybrid arq harq combination high-rate forward error-correcting coding arq error-control standard arq redundant bits added data transmitted using error-detecting ed code cyclic redundancy check crc receivers detecting corrupted message request new message sender hybrid arq original data encoded forward error correction fec code parity bits either immediately sent along message transmitted upon request receiver detects erroneous message ed code may omitted code used perform forward error correction fec addition error detection reed–solomon code fec code chosen correct expected subset errors may occur arq method used fall-back correct errors uncorrectable using redundancy sent initial transmission result hybrid arq performs better ordinary arq poor signal conditions simplest form comes expense significantly lower throughput good signal conditions typically signal quality cross-over point simple hybrid arq better basic arq better simplest version harq type harq adds ed fec information message prior transmission coded data block received receiver first decodes error-correction code channel quality good enough transmission errors correctable receiver obtain correct data block channel quality bad transmission errors corrected receiver detect situation using error-detection code received coded data block rejected re-transmission requested receiver similar arq sophisticated form type ii harq message originator alternates message bits along error detecting parity bits fec parity bits first transmission received error free fec parity bits never sent also two consecutive transmissions combined error correction neither error free understand difference type type ii hybrid arq consider size ed fec added information error detection typically adds couple bytes message incremental increase length fec hand often double triple message length error correction parities terms throughput standard arq typically expends percent channel capacity reliable protection error fec ordinarily expends half channel capacity channel improvement standard arq transmission must received error free given transmission error detection pass type ii hybrid arq first transmission contains data error detection different standard arq received error free done data received error second transmission contain fec parities error detection received error free done received error error correction attempted combining information received transmissions type hybrid arq suffers capacity loss strong signal conditions type ii hybrid arq fec bits transmitted subsequent re-transmissions needed strong signal conditions type ii hybrid arq performs good capacity standard arq poor signal conditions type ii hybrid arq performs good sensitivity standard fec practice incorrectly received coded data blocks often stored receiver rather discarded re-transmitted block received two blocks combined called hybrid arq soft combining dahlman et al. p. 120 possible two given transmissions independently decoded without error may happen combination previously erroneously received transmissions gives us enough information correctly decode two main soft combining methods harq several variants two main methods exist example partial chase combining subset bits original transmission re-transmitted partial incremental redundancy systematic bits always included re-transmission self-decodable example incremental redundancy harq hsdpa data block first coded punctured 1/3 turbo code transmission coded block usually punctured i.e fraction coded bits chosen sent puncturing pattern used transmission different different coded bits sent time although hsdpa standard supports chase combining incremental redundancy shown incremental redundancy almost always performs better chase combining cost increased complexity harq used stop-and-wait mode selective repeat mode stop-and-wait simpler waiting receiver acknowledgment reduces efficiency thus multiple stop-and-wait harq processes often done parallel practice one harq process waiting acknowledgment another process use channel send data forward error correction codes used harq scheme besides turbo codes e.g extended irregular repeat-accumulate eira code efficiently-encodable rate-compatible e2rc code low-density parity-check codes harq used hsdpa hsupa provide high speed data transmission downlink uplink respectively mobile phone networks umts ieee 802.16-2005 standard mobile broadband wireless access also known mobile wimax also used evolution-data optimized lte wireless networks type hybrid arq used itu-t g.hn high-speed local area network standard operate data rates 1 gbit/s existing home wiring power lines phone lines coaxial cables g.hn uses crc-32c error detection ldpc forward error correction selective repeat arq
[ 2640, 4691, 2203, 2752 ]
None
2,773
4
Computer_liquidator:computer liquidator computer liquidator buys computer technology related equipment longer required one company resells flips another company computer liquidators agents act computer recycling electronic recycling business several reasons companies sell liquidate used information technology i.t equipment bankruptcy downsizing expanding technological advancement technological advancement common reason equipment longer performing tasks required usually rendered obsolete advanced technology coming market used obsolete technology often referred electronic waste equipment designated outdated one company still viable another company whose operations may require advanced solutions often information technology audit performed help company decide equipment needs updating requirements computer liquidation sustainable solution environmentally friendly rapid technology change low initial cost planned obsolescence resulted fast-growing surplus computers electronic components around globe purpose computer liquidators keep many computers electronic parts landfills newer better technology replaces hardware ever-increasing speed amount technical trash increases technology replaced speed hardware changes innovates last years follows degree moore law predictions made every landfill would soon overflowing discarded computer screens computers along associated equipment keyboards mouses hardware associated use internet.most electronic waste sent landfills incinerated releases toxic materials lead mercury cadmium soil groundwater atmosphere thus negative impact environment best liquidating companies clearly outlined policies regarding disposal dangerous substances often issue information technology act liquidation avoids possible toxins pollution comes putting electronic waste landfills also avoids extra costs go recycling example new york passed law 2015 banned putting electronic devices landfills waste facilities rural counties forced either turn people away eat cost recycling cathode ray tubes outside new york city counties spending 6 million 10 million year deal problem according stephen acquario executive director new york state association counties option liquidation actually incentivizes people get rid electronic waste safer way since recycling actually costs owner money cases people would rather throw avoid recycling fee computer liquidators effectively create secondary market meet demand looking cheaper solution require cutting edge technology important note equipment liquidated ranges new technology old technology relatively lower price secondary market equipment companies may even purchase tech devices secondary market use backups stocking equipment preemptively replacement always hand event trouble product availability also another reason buyers buy market manufacturers generally refresh product line every 12 24 months typically liquidating older products networking hardware often see service lives five years resellers computer liquidators might carry products upwards decade old end users use particular product may find much easier cheaper add/replace older device rather take costs business disruptions knowledge gaps occur upgrading new products newer products adopted used equipment inevitably liquidated thrown sold back creates robust marketplace typically three agents computer liquidation process seller computer liquidator buyer sellers companies bankrupt need sell assets companies downsizing expanding companies upgrading technology usually companies looking sell equipment first conduct information technology audit review systems equipment process generally fueled supply side computer liquidators rely available market liquidate resell thus nearly always exists shortage buyers oceantech example buys computers laptops tablets electronics companies longer need technology conduct certified data destruction appliances technicians perform thorough check systems confirm devices functional stored warehouse certain parts like motherboard hard drives able used stripped machine put warehouse store devices parts resold smaller companies places like school districts need products companies involved computer liquidation business also heavily involved computer electronic recycling industry takes similar process disassembling testing process theoretically benefits ends exchange seller gets money equipment longer needs buyer gets cheap equipment necessary work number organizations sprung provide technical guidelines handling dealing ewaste
[ 9499, 2273, 7579 ]
Test
2,774
9
Joy_(programming_language):joy programming language joy programming language computer science purely functional programming language produced manfred von thun la trobe university melbourne australia joy based composition functions rather lambda calculus turned many similarities forth due design sort parallel evolution convergence also inspired function-level programming style backus fp joy unusual except function-level programming languages esoteric ones unlambda lack lambda operator therefore lack formal parameters illustrate common example square function might defined imperative programming language c variable x formal parameter replaced actual value squared function called functional language scheme function could defined different many ways still uses formal parameter x way joy square function defined joy everything function takes stack argument returns stack result instance numeral 5 represent integer constant instead short program pushes number 5 onto stack square function makes copy top element multiplies two top elements stack leaving square original top element top stack need formal parameter makes joy concise illustrated definition quicksort binrec one joy many recursive combinators implementing binary recursion expects four quoted programs top stack represent joy meaning function homomorphism syntactic monoid onto semantic monoid syntactic relation concatenation symbols maps directly onto semantic relation composition functions homomorphism rather isomorphism onto one-to-one symbol one meaning sequences symbols meaning e.g dup 2 joy concatenative programming language concatenation two programs denotes composition functions denoted two programs library routines mirror iso c though current implementation easily extensible functions written c
[ 3904, 9345, 10083, 4069, 11625, 5168, 11219, 1976, 5081, 2045 ]
None
2,775
5
DRDA:drda distributed relational database architecture drda database interoperability standard open group drda describes architecture distributed relational databases defines rules accessing distributed data provide actual application programming interfaces apis perform access first used db2 2.3 drda designed work group within ibm period 1988 1994 messages protocols structural components drda defined distributed data management architecture
[ 6850, 9286, 10438, 10280, 2314, 7053, 10413, 8975, 2901, 4630, 6651, 5051, 3388, 4255 ]
None
2,776
3
Ace_of_Aces_(video_game):ace aces video game ace aces combat flight simulator developed artech digital entertainment published 1986 three different companies accolade u.s. gold tiertex design studios released amstrad cpc atari 8-bit family atari 7800 commodore 64 msx ms-dos master system zx spectrum set world war ii player flies raf mosquito long range fighter-bomber equipped rockets bombs cannon missions include destroying german fighter planes bombers v-1 flying bombs u-boats trains 1988 atari corporation released version cartridge styled then-new atari xegs ace aces received mixed reviews went become one best-selling commodore 64 video games published accolade upon launching game menu screen options either practice partake proper mission shown player decides practice mode choose whether dog fight training u-boat train bombing playing practice mode enemies less aggressive five different view options — cockpit left right wings navigational map bomb bay — accessed using keyboard double-tapping fire button moving joystick desired direction missions player controls twin-engined balsa raf mosquito already airborne mitigating necessity takeoff starting mission player chooses supplies wish bring player brings lower maximum speed plane end missions landing required points awarded according many enemies shot along amount unused fuel bombs missiles missions completed player choose combine two missions produce mashup 1987 compute article ace aces noted accolade second best selling commodore 64 game compute along reviewers praised graphics sound ace aces 1991 1993 computer gaming world surveys strategy war games gave one half stars five calling somewhat ahistorical issue 20 zzap 64 reviewer said best factual war simulation played compared dambusters said playability better desert fox also used comparison referred sometimes unbelievable article computer video games magazine published 1986 said another well-made well-presented game accolade continued say action-packed gameplay would able keep even critical computer pilot busy time come four criteria highly rated graphics getting 10 along sound value playability getting 8 graphics along sound features highly praised commodore 64 version n't highly acclaimed master system version chad reinhardt defunct games mentioned ace aces starts potential poor controls lack ability interact plane makes forgettable reinhardt criticised different practise mode main game continued adding little help actually helps attempting missions gave game d+ overall reviewers commented feeling excitement playing sega version review kultboy given rating 20 said reasoning behind low review plane meant fighter plane flies like tanker comparatively score graphics game given high 68 sega pro gave game rating 56 praised graphics static continued say impractical in-game zx spectrum version met reviews disliking complexity changing controls may distracting dogfight issue 38 sinclair reviewers ben stone paul sumner mike dunn criticised difficulty game game contains enough gameplay days steve panak writing analog computing preferred ace aces infiltrator atari 8-bit flight simulator
[ 7314, 9166, 9006 ]
Test
2,777
2
Internet_Explorer_11:internet explorer 11 internet explorer 11 ie11 eleventh final version internet explorer web browser microsoft officially released october 17 2013 windows 8.1 november 7 2013 windows 7 browser also shipped windows 10 release july 29 2015 microsoft edge default browser version windows default browser shipped windows server 2016 windows server 2019 january 12 2016 recent version internet explorer offered installation given windows operating system continue supported security updates lasting end support lifecycle windows operating system windows 7 8.1 internet explorer 11 receive security updates remainder windows versions support lifecycles internet explorer 10 reach end support january 31 2020 ie 11 supported version internet explorer windows server 2012 windows embedded 8 standard ie 11 available piloting windows server 2012 windows embedded 8 standard starting spring 2019 ie11 features redesigned developer tools support webgl enhanced scaling high dpi screens prerender prefetch launch ie11 got support http/2 addition ie11 supports full screen orientation apis css border image support javascript enhancements dom mutation observers web cryptography api video text track support encrypted media support improved html editor ie11 uses transport layer security v1.2 default protocol secure connections deprecates rc4 cipher suite internet explorer 11 windows rt support java add-ons november 2013 review sitepoint ie11 scored better google chrome 30 firefox 26 webkit sunspider test google webgl test tied chrome fastest microsoft fish aquarium benchmark webgl came last google v8 performance benchmark result speed improvements reviewer said switched chrome speed alone 're using wrong browser ie11 also observed use less memory multiple tabs open contemporary versions chrome firefox august 2015 sitepoint benchmarked ie11 review microsoft edge edge 12 chrome 44 firefox 39 also present ie11 came last apple jetstream test replaced sunspider google octane test replaces v8 came second microsoft fish aquarium test edge though internal build ie11 leaked march 25 2013 first preview version formally released june 2013 build 2013 conference along preview release windows server 2012 r2 windows 8.1 july 25 2013 microsoft released developer preview internet explorer 11 windows 7 windows server 2008 r2 releases internet explorer update windows 7 8.1 released april 2 2014 added enterprise mode improved developer tools improved support webgl ecmascript 5.1
[ 6657, 9736, 2579, 6171, 7708, 9757, 7713, 10791, 9770, 10282, 5677, 559, 4661, 3639, 10808, 64, 5707, 9808, 11345, 10834, 6231, 8281, 603, 6747, 8296, 1642, 9834, 9328, 115, 9843, 119, 4728, 637, 1664, 5765, 6797, 10910, 8351, 7340, 9908,...
Train
2,778
2
QuickStart:quickstart quickstart loading method used several different software applications designed speed loading time software load core files libraries computer startup allows applications start quickly selected later quickstarters typically place icon system tray full application needs loaded base components already ram significantly reduces load time quickstarters controversial use ram even application open reason quickstarters actually decrease performance whole example six applications load quickstarter system tray 50 megabytes per piece 300 megabytes ram could otherwise used working applications user 256 megabytes ram cause running applications page virtual memory drastically reduce performance hand user one gigabyte ram running applications probably paged load times quickstart applications reduced resulting higher overall performance point user powers system system ready use delayed system must incur performance penalty form reading quickstart applications hard drive additional cpu processing sub-system usage quickstart application loaded memory following examples applications use quickstart method quickstarters workaround poor performance hard disk drives hdds traditionally standard desktop computers solid-state drives ssds lower latency faster seek times hdds less need quickstarters ssds ssd slowly becoming popular certain types computers business setting quickstart also informal often short description accomplish specific task generally meant help non-experts leave details important experts may also greatly simplified overall discussion topic
[ 1577, 3562, 11539, 4926 ]
Validation
2,779
4
Information_sensitivity:information sensitivity information sensitivity control access information knowledge might result loss advantage level security disclosed others loss misuse modification unauthorized access sensitive information adversely affect privacy welfare individual trade secrets business even security international relations nation depending level sensitivity nature information refers information already matter public record knowledge regard government private organizations access release information may requested member public often formal processes laid accessibility government-held public records important part government transparency accountability citizens values democracy public records may furthermore refer information identifiable individuals considered confidential including limited census records criminal records sex offender registry files voter registration includes business information subjected special protection may routinely shared anyone inside outside business confidential information used general sense mean sensitive information whose access subject restriction may refer information individual well pertains business however situations release personal information could negative effect owner example person trying avoid stalker inclined restrict access personal information furthermore person ssn sin credit card numbers financial information may considered private disclosure might lead crimes identity theft fraud types private information including records person health care education employment may protected privacy laws unauthorized disclosure private information make perpetrator liable civil remedies may cases subject criminal penalties even though often used interchangeably personal information sometimes distinguished private information personally identifiable information latter distinct former private information used identify unique individual personal information hand information belonging private life individual used uniquely identify individual range individual ’ favourite colour details domestic life latter common example personal information also regarded sensitive individual sharing details trusted listener would prefer shared anyone else sharing may result unwanted consequences confidential business information refers information whose disclosure may harm business information may include trade secrets sales marketing plans new product plans notes associated patentable inventions customer supplier information financial data classified information generally refers information subject special security classification regulations imposed many national governments disclosure may cause harm national interests security protocol restriction imposed upon information categorized hierarchy classification levels almost every national government worldwide restricted levels containing information may cause greatest danger national security leaked authorized access granted individuals need know basis also passed appropriate level security clearance classified information reclassified different level declassified made available public depending changes situation new intelligence classified information may also denoted method communication access example protectively marked secret eyes protectively marked secret encrypted transfer indicating document must physically read recipient openly discussed example telephone conversation communication sent using encrypted means often mistakenly listed meaning eyes intended recipient anomaly becomes apparent additional tag within windowed area also used data privacy concerns exist various aspects daily life wherever personal data stored collected internet medical records financial records expression political opinions 80 countries world personally identifiable information protected information privacy laws outline limits collection use personally identifiable information public private entities laws usually require entities give clear unambiguous notice individual types data collected reason collection planned uses data consent-based legal frameworks explicit consent individual required well european union data protection directive provides rigorous standard privacy protection legislation across member states although directive legally binding member states expected enact national privacy legislation within three years directive ’ adoption conforms standards since adoption directive demonstrated significant influence privacy legislation non-eu nations requirements privacy laws non-member nations engaging transborder flows private data eu member nations eu passed general data protection regulation gdpr replace directive regulation adopted 27 april 2016 becomes enforceable 25 may 2018 two-year transition period unlike directive require national governments pass enabling legislation thus directly binding applicable proposed new eu data protection regime extends scope eu data protection law foreign companies processing data eu residents provides harmonisation data protection regulations throughout eu thereby making easier non-european companies comply regulations however comes cost strict data protection compliance regime severe penalties 4 worldwide turnover gdpr also brings new set digital rights eu citizens age economic value personal data increasing digital economy canada personal information protection electronic documents act pipeda regulates collection use personal data electronic documents public private organizations pipeda effect federal provincial jurisdictions except provinces existing privacy laws determined “ substantially similar ” even though unified sensitive information framework united states implemented significant amount privacy legislation pertaining different specific aspects data privacy emphasis privacy healthcare financial e-commerce educational industries federal state levels whether regulated self regulated laws require establish ways access sensitive information limited people different roles thus essence requiring establishment sensitive data domain model mechanisms protection domains guideline form pre-defined models safe harbor hipaa based research latanya sweeny established privacy industry metrics additionally many countries enacted legislature regarding data privacy protection still process confidentiality sensitive business information established non-disclosure agreements legally binding contract two parties professional relationship ndas may one-way case employee receiving confidential information employing organization two-way businesses needing share information one another accomplish business goal depending severity consequences violation non-disclosure may result employment loss loss business client contacts criminal charges civil lawsuit hefty sum damages ndas signed employer employee initiation employment non-compete clause may part agreement added protection sensitive business information employee agrees work competitors start competing business within certain time geographical limit unlike personal private information internationally recognized framework protecting trade secrets even agreed-upon definition term “ trade secret ” however many countries political jurisdictions taken initiative account violation commercial confidentiality criminal civil laws example us economic espionage act 1996 federal crime united states misappropriate trade secrets knowledge benefit foreign power injure owner trade secret commonly breach commercial confidentiality falls civil law united kingdom developing countries trade secret laws either non-existent poorly developed offer little substantial protection many countries unauthorized disclosure classified information criminal offence may punishable fines prison sentence even death penalty depending severity violation less severe violations civil sanctions may imposed ranging reprimand revoking security clearance subsequent termination employment whistleblowing intentional disclosure sensitive information third-party intention revealing alleged illegal immoral otherwise harmful actions many examples present former government employees disclosing classified information regarding national government misconduct public media spite criminal consequences await espionage spying involves obtaining sensitive information without permission knowledge holder use spies part national intelligence gathering countries used political strategy nation-states since ancient times unspoken knowledge international politics countries spying one another time even allies computer security information security applied computing network technology significant ever-growing field computer science term computer insecurity hand concept computer systems inherently vulnerable attack therefore evolving arms race exploit existing vulnerabilities security systems must engineer new mechanisms security number security concerns arisen recent years increasing amounts sensitive information every level found primary existence digital form personal level credit card fraud internet fraud forms identity theft become widespread concerns individuals need aware day-to-day basis existence large databases classified information computer networks also changing face domestic international politics cyber-warfare cyber espionage becoming increasing importance national security strategy nations around world estimated 120 nations around world currently actively engaged developing deploying technology purposes philosophies internet cultures open-source governance hacktivism popular hacktivist slogan information wants free reflects cultural shifts perception towards political government secrecy popular controversial wikileaks one many manifestations growing cultural sentiment becoming additional challenge security integrity classified information
[ 6494, 2818, 3619, 4194, 2534, 3495, 9000, 9901, 11695, 2737, 5404, 6902, 8471, 9688, 3516, 2558 ]
Test
2,780
1
Database_trigger:database trigger database trigger procedural code automatically executed response certain events particular table view database trigger mostly used maintaining integrity information database example new record representing new worker added employees table new records also created tables taxes vacations salaries triggers also used log historical data example keep track employees previous salaries follows series descriptions popular dbms support triggers addition triggers fire execute pl/sql code data modified oracle 10g supports triggers fire schema-level objects tables modified user logon logoff events occur four main types triggers oracle 8i database events logons logoffs startups fire oracle triggers full list available msdn performing conditional actions triggers testing data following modification done accessing temporary inserted deleted tables introduced support triggers 1997 following functionality previously implemented postgresql synopsis firebird supports multiple row-level insert update delete combination thereof triggers per table always addition default table changes order triggers relative specified would otherwise ambiguous position clause triggers may also exist views always instead triggers replacing default updatable view logic version 2.1 triggers views deemed updatable would run addition default logic firebird raise mutating table exceptions like oracle triggers default nest recurse required sql server allows nesting recursion default firebird triggers use new old context variables inserted deleted tables provide updating inserting deleting flags indicate current usage trigger version 2.1 firebird additionally supports following database-level triggers database-level triggers help enforce multi-table constraints emulate materialized views exception raised transaction commit trigger changes made trigger far rolled back client application notified transaction remains active commit never requested client application continue make changes re-request commit syntax database triggers ibm db2 distributed systems known db2 luw luw means linux unix windows supports three trigger types trigger trigger instead trigger statement level row level triggers supported triggers operation table firing order determined trigger creation data since version 9.7 ibm db2 supports autonomous transactions trigger checking data deciding operation permitted exception thrown trigger operation aborted data changed db2 triggers read — ca n't modify data triggers triggers designed post processing requested change performed triggers write data tables unlike databases write table including table trigger operates instead triggers making views writeable triggers usually programmed sql pl language sqlite supports row-level triggers statement-level triggers updateable views supported sqlite emulated instead triggers example implementation triggers non-relational database sedna provides support triggers based xquery triggers sedna designed analogous triggers natively base xml query update languages xpath xquery xml update language trigger sedna set nodes xml document stored database nodes updated trigger automatically executes xquery queries updates specified body example following trigger cancels person node deletion open auctions referenced person understand trigger behavior works need aware two main types triggers row statement level triggers distinction two many times code within trigger executed time suppose trigger made called update certain table row level triggers would execute row affected update important keep mind rows affected update command trigger execute code within trigger statement level triggers called regardless many rows affected update important note even update command n't affect rows code within trigger still executed using options determine trigger called suppose trigger called insert certain table trigger using option code within trigger executed insert table occurs common use trigger verify input values insert modify values accordingly let say trigger uses instead code within trigger executed insert happens table example use trigger creating audit history made inserts database keeping track changes made using options need keep things mind option allow modify tables input validation practical use using triggers allows modify tables inserting audit history table creating trigger determine statement row level simply include row clause row level omit clause statement level cautious using additional insert/update/delete commands within trigger trigger recursion possible causing unwanted behavior examples trigger modifying different table looking modified see common applications different trigger types used oracle syntax example row level trigger called update row affected trigger called update phone book database trigger called adds entry separate table named phone_book_audit also take note triggers able take advantage schema objects like sequences example audit_id_sequence.nexval used generate unique primary keys phone_book_audit table calling update phone_book table people last name 'jones /div g notice phone_number_audit table populated two entries due database two entries last name 'jones since update modified two separate row values created trigger called twice modification oracle syntax statement trigger called update phone_book table trigger gets called makes insert phone_book_edit_history table lets exactly update example however time statement level trigger /div see trigger called even though update change two rows example row trigger modifies insert using conditional last name larger 10 letters using substr function change last_name column value abbreviation lets perform insert someone large name /div see trigger worked modifying value insert executed using statement trigger particularly useful enforcing database restrictions example going enforce restriction upon someone named someuser table phone_book someuser logged attempting insert error message show custom errors one restriction num variable defined numerous pre-defined errors variable must range -20000 -20999
[ 8201, 9225, 2068, 4630, 1049, 5658, 9248, 10793, 10286, 8762, 11324, 9286, 2632, 9290, 7756, 8788, 10326, 7767, 9828, 10340, 8295, 8808, 2669, 6775, 1146, 3196, 9360, 10389, 4255, 4263, 9389, 10413, 9397, 3254, 7868, 6850, 5827, 2246, 734, ...
None
2,781
3
Quantum_error_correction:quantum error correction quantum error correction qec used quantum computing protect quantum information errors due decoherence quantum noise quantum error correction essential one achieve fault-tolerant quantum computation deal noise stored quantum information also faulty quantum gates faulty quantum preparation faulty measurements classical error correction employs redundancy simplest way store information multiple times and—if copies later found disagree—just take majority vote e.g suppose copy bit three times suppose noisy error corrupts three-bit state one bit equal zero two equal one assume noisy errors independent occur probability p likely error single-bit error transmitted message three ones possible double-bit error occurs transmitted message equal three zeros outcome less likely outcome copying quantum information possible due no-cloning theorem theorem seems present obstacle formulating theory quantum error correction possible spread information one qubit onto highly entangled state several physical qubits peter shor first discovered method formulating quantum error correcting code storing information one qubit onto highly entangled state nine qubits quantum error correcting code protects quantum information errors limited form classical error correcting codes use syndrome measurement diagnose error corrupts encoded state reverse error applying corrective operation based syndrome quantum error correction also employs syndrome measurements perform multi-qubit measurement disturb quantum information encoded state retrieves information error syndrome measurement determine whether qubit corrupted one outcome operation syndrome tells us physical qubit affected also several possible ways affected latter counter-intuitive first sight since noise arbitrary effect noise one distinct possibilities codes effect either bit flip sign phase flip corresponding pauli matrices x z reason measurement syndrome projective effect quantum measurement even error due noise arbitrary expressed superposition basis operations—the error basis given pauli matrices identity syndrome measurement forces qubit decide certain specific pauli error happened syndrome tells us let pauli operator act corrupted qubit revert effect error syndrome measurement tells us much possible error happened nothing value stored logical qubit—as otherwise measurement would destroy quantum superposition logical qubit qubits quantum computer repetition code works classical channel classical bits easy measure repeat stops case quantum channel due no-cloning theorem longer possible repeat single qubit three times overcome different method so-called three-qubit bit flip code used technique uses entanglement syndrome measurements comparable performance repetition code consider situation want transmit state single qubit formula_1 noisy channel formula_2 let us moreover assume channel either flips state qubit probability formula_3 leaves unchanged action formula_2 general input formula_5 therefore written formula_6 let formula_7 quantum state transmitted error correcting protocol place transmitted state correctly transmitted probability formula_8 however improve number encoding state greater number qubits way errors corresponding logical qubits detected corrected case simple three-qubit repetition code encoding consists mappings formula_9 formula_10 input state formula_1 encoded state formula_12 mapping realized example using two cnot gates entangling system two ancillary qubits initialized state formula_13 encoded state formula_14 passed noisy channel channel acts formula_14 flipping subset possibly empty qubits qubit flipped probability formula_16 single qubit flipped probability formula_17 two qubits flipped probability formula_18 three qubits flipped probability formula_19 note assumption channel made assume formula_2 acts equally independently three qubits state encoded problem detect correct errors without time corrupting transmitted state let us assume simplicity formula_3 small enough probability single qubit flipped negligible one detect whether qubit flipped without also querying values transmitted asking whether one qubits differs others amounts performing measurement four different outcomes corresponding following four projective measurements formula_22this achieved example measuring formula_23 formula_24 reveals qubits different others without time giving information state qubits outcome corresponding formula_25 obtained correction applied outcome corresponding formula_26 observed pauli x gate applied formula_27-th qubit formally correcting procedure corresponds application following map output channel formula_28note procedure perfectly corrects output zero one flips introduced channel one qubit flipped output properly corrected example first second qubits flipped syndrome measurement gives outcome formula_29 third qubit flipped instead first two assess performance error correcting scheme general input study fidelity formula_30 input formula_14 output formula_32 output state formula_33 correct one qubit flipped happens probability formula_34 write formula_35 dots denote components formula_33 resulting errors properly corrected protocol follows formula_37this fidelity compared corresponding fidelity obtained error correcting protocol used shown equal formula_38 little algebra shows fidelity error correction greater one without formula_39 note consistent working assumption made deriving protocol formula_3 small enough flipped bits kind error classical computer another possibility error quantum computers sign flip transmission channel relative sign formula_41 formula_42 become inverted instance qubit state formula_43 may sign flip formula_44 original state qubit formula_45 changed state formula_46 hadamard basis bit flips become sign flips sign flips become bit flips let formula_47 quantum channel cause one phase flip bit flip code recover formula_48 transforming hadamard basis transmission formula_47 error channel may induce either bit flip sign flip possible correct types errors using one code shor code fact shor code corrects arbitrary single-qubit errors let formula_50 quantum channel arbitrarily corrupt single qubit 1st 4th 7th qubits sign flip code three group qubits 1,2,3 4,5,6 7,8,9 designed bit flip code shor code qubit state formula_51 transformed product 9 qubits formula_52 bit flip error happens qubit syndrome analysis performed set states 1,2,3 4,5,6 7,8,9 correct error three bit flip group 1,2,3 4,5,6 7,8,9 considered three inputs shor code circuit reduced sign flip code means shor code also repair sign flip error single qubit shor code also correct arbitrary errors bit flip sign flip single qubit error modeled unitary transform u act qubit formula_48 formula_56 described form formula_58 formula_59 formula_60 formula_61 complex constants identity pauli matrices given u equal error occurs formula_65 bit flip error occurs formula_66 sign flip error occurs formula_67 bit flip error sign flip error occur due linearity follows shor code correct arbitrary 1-qubit errors several proposals made storing error-correctable quantum information bosonic modes unlike two-level system oscillator infinitely many energy levels single physical system example cat code followed shortly gottesman-kitaev-preskill gkp states recently binomial code insight offered codes take advantage redundancy within single system rather duplicate many two-level qubits written fock basis simplest binomial encoding formula_68 subscript l indicates logically encoded state dominant error mechanism system stochastic application bosonic lowering operator formula_69 corresponding error states formula_70 formula_71 respectively since codewords involve even photon number error states involve odd photon number errors detected measuring photon number parity system general quantum code quantum channel formula_72 subspace formula_73 formula_74 state hilbert space exists another quantum channel formula_75 formula_76 formula_77 orthogonal projection onto formula_78 formula_75 known correction operation non-degenerate code one different elements set correctable errors produce linearly independent results applied elements code distinct set correctable errors produce orthogonal results code considered pure time researchers come several codes codes allow indeed quantum computations arbitrary length content threshold theorem found michael ben-or dorit aharonov asserts correct errors concatenate quantum codes css codes—i.e re-encode logical qubit code logarithmically many levels— provided error rate individual quantum gates certain threshold otherwise attempts measure syndrome correct errors would introduce new errors correct late 2004 estimates threshold indicate could high 1-3 provided sufficiently many qubits available several experimental realizations css-based codes first demonstration nmr qubits subsequently demonstrations made linear optics trapped ions superconducting transmon qubits error correcting codes also implemented one aimed correcting photon loss dominant error source photonic qubit schemes
[ 2273, 8514, 9801, 74, 11209, 6798, 8688, 3698, 10452, 2680, 7164 ]
None
2,782
2
Media_Control_Interface:media control interface media control interface — mci short — high-level api developed microsoft ibm controlling multimedia peripherals connected microsoft windows os/2 computer cd-rom players audio controllers mci makes simple write program play wide variety media files even record sound passing commands strings uses relations described windows registries mci section file system.ini one advantage api mci commands transmitted programming language scripting language open script lingo aso example commands mcisendcommand mcisendstring mci interface phased favor directx apis first released 1995 media control interface consists 7 parts so-called mci devices e.g cd-rom vcd player play certain type files e.g avivideo plays .avi files cdaudio plays cd-da tracks among others mci devices also made available time play type media needs initialized correctly using mci commands commands subdivided categories full list mci commands found microsoft msdn library
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 5225, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9...
None
2,783
2
Layered_Service_Provider:layered service provider layered service provider lsp deprecated feature microsoft windows winsock 2 service provider interface spi layered service provider dll uses winsock apis attempt insert tcp/ip protocol stack stack layered service provider intercept modify inbound outbound internet traffic allows processing tcp/ip traffic taking place internet applications accessing internet web browser email client etc. example could used malware redirect web browers rogue websites block access sites like windows update alternatively computer security program could scan network traffic viruses threats winsock service provider interface spi api provides mechanism layering providers top winsock lsps available range useful purposes including parental controls web content filtering parental controls web filter windows vista lsp layering order providers kept winsock catalog unlike well-known winsock 2 api covered numerous books documentation samples winsock 2 spi relatively unexplored winsock 2 spi implemented network transport service providers namespace resolution service providers winsock 2 spi used extend existing transport service provider implementing layered service provider example quality service qos windows 98 windows 2000 implemented lsp tcp/ip protocol stack another use lsps would develop specialized url filtering software prevent web browsers accessing certain sites regardless browser installed desktop winsock 2 spi allows software developers create two different types service providers—transport namespace transport providers commonly referred protocol stacks services supply functions set connections transfer data exercise flow control error control namespace providers services associate addressing attributes network protocol one human-friendly names enable protocol-independent name resolution spi also allows develop two types transport service providers—base layered service providers base service providers implement actual details transport protocol setting connections transferring data exercising flow control error control layered service providers implement higher-level custom communication functions rely existing underlying base provider actual data exchange remote endpoint winsock 2 lsps implemented windows dlls single exported entry function wspstartup transport spi functions made accessible ws2_32.dll upper chain layered provider via lsp dispatch table lsps base providers strung together form protocol chain lsp dll registered using special lsp registrant instructs winsock 2 loading order lsps one lsp installed protocols intercept lsps work intercepting winsock 2 commands processed ws2_32.dll therefore modify commands drop command log data makes useful tool malware network filters network intercepters stream based sniffers sniffing network traffic lsp sometimes troublesome since anti-virus vendors typically flag activity malicious — network packet analyzer therefore better alternative capturing network traffic feature lsp winsock proxy sniffing allow traffic captured single application also enable traffic going localhost 127.0.0.1 sniffed windows two kinds lsp ifs non ifs lsp currently lsps market non ifs difference two lsps non ifs lsps modify socket handle non valid windows ifs handle therefore lsp must implement winsock 2 methods ifs lsps hand preserve socket handle allows lsp implement functions wants intercept ifs lsps much less performance impact non ifs lps limited fact inspect modify data receive path lsps deprecated since windows server 2012 systems include lsps pass windows logo checks windows 8 style metro apps use networking automatically bypass lsps windows filtering platform provides similar functionality compatible windows 8 style metro apps conventional desktop applications major issue lsps bugs lsp cause applications break example lsp returns wrong number bytes sent interface cause applications go infinite loop waiting network stack indicate data sent another major common issue lsps removed unregistered improperly lsp buggy would result corruption winsock catalog registry entire tcp/ip stack would break computer could longer access network lsp technology often exploited spyware adware programs order intercept communication across internet example malware may insert lsp network stack forward user traffic unauthorized external site data-mined find user interests bombard him/her targeted advertisements well spam e-mail malware lsp removed correctly older versions windows may left without working network connection potential loss network connectivity prevented windows xp service pack 2 windows server 2003 service pack 1 later windows operating systems winsock ability self-heal user uninstalls lsp installed lsps viewed using xp/vista windows defender software explorer using third-party utilities
[ 10243, 9234, 1043, 9746, 1055, 2083, 8227, 1577, 4143, 9263, 8753, 8246, 4178, 9813, 603, 1656, 5754, 9340, 5761, 9348, 5765, 10886, 2183, 5259, 653, 6797, 3224, 10392, 4771, 2213, 7846, 10414, 8391, 214, 9434, 736, 4321, 6370, 9440, 4836...
None
2,784
7
Cherrypal:cherrypal cherrypal california-based marketer chinese-manufactured consumer-oriented computers markets range models diversity cpu-types structures features operating systems commentators observed cherrypal arguably beat heralded much-better financed one laptop per child olpc project goal 100 laptop units physically small cherrypal unit general purchase 99 plus shipping 7 screen olpc provided child developing world 199 7.5 company business practices generated controversy antipathy vocally dissatisfied customers others marginally satisfied practices pertaining merchandise returns communication repeatedly faulted u.s better business bureau rating cherrypal f indicating bbb strongly questions company ’ reliability cherrypal claims commitment environmental concerns needs impoverished countries particular key sponsorship learning center ghana supports one laptop per teacher pilot program nigeria order company marketed c114 ppc-processor-based nettop cherrypal bing x86-based netbook cherrypal africa xburst-cpu-based netbook cherrypal asia arm-processor-based netbooks cherrypad america arm-processor-based tablet computer cherrypal c114 small light nettop computer using powerpc-processor freescale 5121e system-on-a-chip soc integrated main-board xubuntu operating system device launches firefox minefield web-browser abiword word-processor apps via icon double-click article register noted cherrypal producers asserted computer consume 2 watts power independent informal testing shown wattage consumption still low 6.9 watts booting cherrypal c114 rebadged version limepc d1 mini-desktop computer developed part broader freescale powerpc chip-based product line thtf shenzhen r center shown public 2008 ces las vegas january 2008 cherrypal bing slim x86-based netbook ships windows xp cherrypal 99 netbook africa aimed primarily developing world also available sale consumers according blog post max seybold device specs cherrypal web store kept intentionally vague africa built set design instead cherrypal either purchases pre-made netbook systems buys odd lots whatever inexpensive components available builds netbooks rebrands netbooks africas 99 computer named africa honor paajaf humanitarian services group based ghana west-africa seybold states resulting device minimum meet specs listed website could also exceed could also end arm mips x86-based cpu architecture depending chips available interview seybold stated africa meant sold computer traditional sense appliance provide internet access people could afford buy traditional computer said number government services unemployment disability encouraging access internet lack access becoming disability thing cherrypal promises 99 ability access internet cherrypal asia low cost arm-based netbook uses android os version 1.7 cherrypal america also known cherrypad android tablet based upon telechips tcc89xx arm11 processors cherrypal initially sold tablet promise upgrade android 2.2 november support android market market support officially removed tablet conform market requirements google also android 2.2 upgrade canceled instead cherrypal promises update android 2.3 hardware cherrypal america listed cherrypal comprises 800 mhz arm11 cpu telechips 256 mb ddr2 ram 2 gb flash memory 800x480 resistive touchscreen however user report arguing less powerful specifications according boot-log dumped via dmesg according various android news magazines cherrypal announced successor current cherrypad cherrypal founded max seybold based palo alto c114 following c120 desktop computers originally developed tsinghua tongfang thtf shenzhen r center engineering team led american electronics industry veterans jack campbell ryan quinn extended line handheld desktop tv-based pcs using freescale mpc5121e powerpc microprocessor shown ces 2008 thtf desktop product picked thereafter oem purchase cherrypal cherrypal marketers planned use firefox web-browser also user interface launch applications openoffice.org planned cherrypal would make use cloud computing applications storage would wholly part internet-based plans yet implemented company president asserted cloud green maraschino would launched february 2010 however known occurred
[ 1537, 3585, 2308, 1682, 405, 10393, 5019, 6178, 9266, 1849, 1728, 7492, 10820, 11337, 5078, 6618, 5339, 4194, 3300, 3301, 8044, 2285, 9581, 10606, 2420, 8700, 10109 ]
Test
2,785
5
Carrier-sense_multiple_access_with_collision_detection:carrier-sense multiple access collision detection carrier-sense multiple access collision detection csma/cd media access control method used notably early ethernet technology local area networking uses carrier-sensing defer transmissions stations transmitting used combination collision detection transmitting station detects collisions sensing transmissions stations transmitting frame collision condition detected station stops transmitting frame transmits jam signal waits random time interval trying resend frame csma/cd modification pure carrier-sense multiple access csma csma/cd used improve csma performance terminating transmission soon collision detected thus shortening time required retry attempted following procedure used initiate transmission procedure complete frame transmitted successfully collision detected transmission following procedure used resolve detected collision procedure complete retransmission initiated retransmission aborted due numerous collisions methods collision detection media dependent shared electrical bus 10base5 10base2 collisions detected comparing transmitted data received data recognizing higher normal signal amplitude bus media carrier sensed receive channel transmitting triggers collision event repeaters hubs detect collisions propagate jam signals collision recovery procedure likened happens dinner party guests talk common medium air speaking guest politely waits current speaker finish two guests start speaking time stop wait short random periods time ethernet time measured microseconds hope choosing random period time guests choose time try speak thus avoiding another collision jam signal jamming signal signal carries 32-bit binary pattern sent data station inform stations collision must transmit maximum jam-time calculated follows maximum allowed diameter ethernet installation limited 232 bits makes round-trip-time 464 bits slot time ethernet 512 bits difference slot time round-trip-time 48 bits 6 bytes maximum jam-time turn means station noting collision occurred sending 4 6 byte long pattern composed 16 1-0 bit combinations note size jam signal clearly minimum allowed frame-size 64 bytes purpose ensure node may currently receiving frame receive jam signal place correct 32-bit mac crc causes receivers discard frame due crc error late collision type collision happens packet allowed protocol standard question 10 megabit shared medium ethernet collision error occurs first 512 bits data transmitted transmitting station late collision said occurred importantly late collisions re-sent nic unlike collisions occurring first 64 octets left upper layers protocol stack determine loss data correctly set csma/cd network link late collisions usual possible causes full-duplex/half-duplex mismatch exceeded ethernet cable length limits defective hardware incorrect cabling non-compliant number hubs network bad nic local collision collision occurs nic opposed wire nic detect local collisions without attempting send information utp cable local collision detected local segment station detects signal rx pair time sending tx pair since two signals different pairs characteristic change signal collisions recognized utp station operating half-duplex functional difference half full-duplex operation regard whether transmit receive pairs permitted used simultaneously channel capture effect phenomenon one user shared medium captures medium significant time period usually 16 frames users denied use medium effect first seen networks using csma/cd ethernet effect data-intense connection dominates multiple-access wireless channel happens ethernet links way nodes back link attempt re-access ethernet protocol communication collision happens two users medium try send time user waits random period time re-accessing link however user wait back random amount time proportional number times successively tried access link channel capture effect happens one user continues win link example user user b try access quiet link time since detect collision user waits random time 0 1 time units user b let say user chooses lower back-off time user begins use link b allows finish sending frame user still send user user b cause another data collision choose random back-off time 0 1 user b choose back-off time 0 3 – b second time colliding row chances win one continues likely win collision battles 16 collisions number tries user backs extended period time user captured channel ability one node capture entire medium decreased number nodes increases number nodes increases higher probability one nodes lower back-off time capturing node channel capture effect creates situation one station able transmit others continually backing thus leading situation short-term unfairness yet situation long-term fair every station opportunity capture medium one station done transmitting efficiency channel increased one node captured channel negative side effect capture effect would idle time created due stations backing one station finished transmitting medium large idle times present stations continually backing instances back-off occur long stations actually discard packets maximum attempt limits reached csma/cd used now-obsolete shared media ethernet variants 10base5 10base2 early versions twisted-pair ethernet used repeater hubs modern ethernet networks built switches full-duplex connections longer need use csma/cd ethernet segment collision domain isolated csma/cd still supported backwards compatibility half-duplex connections ieee 802.3 standard defines ethernet variants historical reasons still bore title carrier sense multiple access collision detection csma/cd access method physical layer specifications 802.3-2008 uses new name ieee standard ethernet
[ 10112, 2306, 388, 1541, 8708, 3847, 7698, 10005, 5270, 11288, 2458, 5020, 2211, 1192, 11560, 7723, 11181, 816, 2998, 7865, 5185, 7490, 9284, 5321, 6857, 7498, 2911, 2912, 5092, 5863, 2802 ]
Test