node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,186
9
Static_build:static build static build compiled version program statically linked libraries computer science linking means taking one objects generated compilers assembling single executable program objects program modules containing machine code symbol definitions come two varieties linker program resolves references undefined symbols finding object defines symbol question replacing placeholders symbol address linkers take objects collection called library final program include whole library objects needed libraries diverse purposes exist one system libraries usually linked default modern operating system environments allow dynamic linking postponing resolving undefined symbols program run means executable still contains undefined symbols plus list objects libraries provide definitions loading program load objects/libraries well perform final linking dynamic linking offers three advantages statically built program dynamic linking occurs bindings done compile time static builds predictable behavior rely particular version libraries available final system commonly found forensic security tools avoid possible contamination malfunction due broken libraries examined machine flexibility permits upgraded library benefit dynamically-linked applications also prevent applications assume presence specific version particular library running correctly every application system must copy dynamic library ensure correct operation benefits dynamic linking moot another benefit static builds portability final executable file compiled longer necessary keep library files program references since relevant parts copied executable file result installing statically-built program computer user n't download install additional libraries program ready run
[ 1952, 8037, 6664, 7849, 10013, 7983, 2804, 7421 ]
None
3,187
8
Dynamic_site_acceleration:dynamic site acceleration dynamic site acceleration dsa group technologies make delivery dynamic websites efficient manufacturers application delivery controllers content delivery networks cdns use host techniques accelerate dynamic sites including edge device either adc cdn capable tcp multiplexing placed web servers clients offload origin servers accelerate content delivery usually connection client server requires dedicated process lives origin duration connection clients slow connection occupies part origin server process stay alive server waiting complete request tcp multiplexing situation different device obtains complete valid request client sending origin request fully arrived offloads application database servers slower expensive use compared adcs cdns http built-in system cache control using headers etag expires last modified many cdns adcs claim dsa replaced system calling dynamic caching dynamic cache control gives options invalidate bypass cache standard http cache control purpose dynamic cache control increase cache-hit ratio website rate requests served cache served normal server due dynamic nature web 2.0 websites difficult use static web caching reason dynamic sites per definition personalized content different users regions example mobile users may see different content desktop users may see registered users may need see different content anonymous users see even among registered users content may vary widely often example social media websites static caching dynamic user-specific pages introduces potential risk serving irrelevant content 3rd party content wrong users identifier allowing caching system differentiate content url/get-request n't correctly varied appending user-specific tokens/keys dynamic cache control options configure caching cookie-based cache control allows serving content cache based presence lack specific cookies cookie stores unique identifier-key logged-in user device already implemented authenticating users upon execution page opens session dynamic caching system caches referred url well cookie keys allowing simply enable serving default caches anonymous users personalized caches logged-in users without forcing modify code make append additional user identifiers url like static caching system personalized content cached might queued edge device means system store list possible responses might needed future allowing readily served differs caching prefetched responses served especially useful accelerating responses third-party apis advertisements route optimization also known latency-based routing optimizes route traffic clients different origin servers order minimize latency route optimization done dns provider cdn route optimization comes measuring multiple paths client origin server recording fastest path path used serve content client specific geographical zone makes request although front-end optimization feo dsa describe group techniques improve online content delivery work different aspects overlaps on-the-fly data compression improved cache-control however key differences
[ 10368, 65, 9601, 4797, 2994, 11250, 7965 ]
Test
3,188
1
MySQL_Archive:mysql archive mysql archive storage engine mysql relational database management system users use analytic storage engine create table “ archive ” data deleted table added archive engine uses compression strategy based zlib library packs rows using bit header represent nulls removes whitespace character type fields completed row inserted compression buffer flushed disk explicit flush table read closing table one current restrictions archive tables support indexes thus necessitating table scan select tasks archive tables however supported mysql query cache dramatically reduce response times archive table queries repetitively issued mysql examining index support archive tables upcoming releases engine acid compliant unlike oltp engines uses stream format disk block boundaries head archive file generated byte array representing data format contents file mysql 5.1 copy mysql frm file stored header archive file frm file represents definition table allows archive file restored mysql server archive file copied server despite use zlib archive files compatible gzio basis gzip tools uses azio system fork gzio archive differs mysql analytical engine myisam row level locking engine keeping constant version snapshot throughout single query making mvcc means archive lock concurrent bulk inserts bulk inserts performs interlaced insert unlike myisam order guaranteed users use archive_reader tool take online snapshot table change characteristics archive file create archive table specify following engine string mysql archive storage engine authored maintained brian aker introduced 2004 mysql 4.1
[ 11392, 8195, 10258, 7453, 1950, 9503, 7339, 7983, 9010, 10048, 6721, 7234, 5964, 5198, 4561, 7506, 9687, 10459, 6245, 8295, 8683, 5356, 2413, 5612, 7022, 4598, 1399, 10873, 2810, 8700, 2045 ]
Test
3,189
2
Jeff_Waugh:jeff waugh jeff waugh also known jdub australian free software open source software engineer known past prominence gnome ubuntu projects communities 2004 waugh hired mark shuttleworth early employee canonical ltd. member ubuntu project worked business development oscon 2005 waugh best evangelist google-o'reilly open source awards evangelism ubuntu gnome announced resignation canonical july 2006 focus fully work gnome project 2007 waugh then-wife pia waugh co-directors waugh partners australian open source consultancy launched 2006 waugh partners 2007 nsw state pearcey award young achievers work promoting free software australian ict industry 2008 waugh partner one laptop per child australia program 2008 pia waugh moved new career waugh later employers included bulletproof networks kounta waugh served number formal semi-formal positions free software development community projects waugh author python feed aggregator planet waugh married fellow open-source advocate community leader pia waugh 2011 wrote blog september 2011 occasion ruok day struggling depression since late teens contributing factor divorce felt overcome category living people category open source people category free software programmers category year birth missing living people category australian computer specialists category gnome developers category ubuntu operating system people category people sydney category australian bloggers
[ 1026, 5644, 10255, 2581, 6691, 6694, 2109, 3654, 8263, 10822, 589, 4177, 1107, 8787, 4192, 7793, 5755, 11394, 8848, 657, 6808, 6302, 8354, 8364, 3245, 9908, 1717, 708, 6352, 3802, 4831, 7913, 9971, 5369, 6413, 4367, 3859, 7450, 1822, 802,...
Test
3,190
7
Turbot_(business):turbot business turbot turbot hq inc privately held software company headquartered united states turbot provides automated cloud governance controls enterprise cloud applications infrastructure turbot founded nathan wallace 2014 us corporation based nj 2016 company expanded virtual office across varying us states 2017 turbot announced expansion united kingdom turbot hq limited india turbot hq india private limited 2018 turbot expanded footprint multiple cities india started operations australia turbot hq private limited turbot provides real-time automated configuration control software-defined infrastructure cloud platforms turbot aws advanced technology partner multiple certified competencies security cloud management life sciences etc turbot also microsoft azure partner google cloud platform partner well member cloud native computing foundation linux foundation center internet security turbot varying consulting managed services technology integration partnerships providing varying use cases partners empower services capabilities turbot uses “ sandbox ” approach governance allows internal departments freedom explore adopt new software solutions adhering data protection regulations
[ 7248, 4011, 997 ]
None
3,191
5
Wide_area_information_server:wide area information server wide area information server wais client–server text searching system uses ansi standard z39.50 information retrieval service definition protocol specifications library applications z39.50:1988 search index databases remote computers developed late 1980s project thinking machines apple computer dow jones kpmg peat marwick wais adhere either standard osi framework adopting instead tcp/ip created unique protocol inspired z39.50:1988 wais protocol servers promoted thinking machines corporation tmc cambridge massachusetts tmc-produced wais servers ran massively parallel cm-2 connection machine sparc-based cm-5 mp supercomputers wais clients developed various operating systems windowing systems including microsoft windows macintosh next x gnu emacs character terminals tmc released free open source software version wais unix 1991 inspired wais project full-text databases emerging sgml projects z39.50 version 2 z39.50:1992 released unlike 1988 predecessor compatible superset international iso 10162/10163 standard advent z39.50:1992 termination support free wais thinking machines establishment wais inc commercial venture u.s. national science foundation funded clearinghouse networked information discovery retrieval cnidr promote internet search discovery systems open source standards cnidr created new free open-source wais first freewais based wais-8-b5 codebase tmc wholly new software suite isite based upon z39.50:1992 using isearch full-text search engine ulrich pfeifer norbert gövert computer science department university dortmund extended cnidr freewais code become freewais-sf structured fields main improvement ulrich pfeifer rewrote freewais-sf perl becoming wait inspired wais directory servers eliot christian usgs envisioned gils government information locator service gils based upon z39.50:1992 extensions became u.s. federal mandate part paperwork reduction act 1995 thinking machines corp provided service called directory servers wais server like information source except containing information wais servers internet wais server tmc wais code creates special record containing metadata plus common words describing indexed content record uploaded central server indexed along records public servers directory searched find servers might content relevant specific field interest model searching wais servers search became model gils peter deutsch whois++ distributed white pages directory two developers wais brewster kahle harry morris left thinking machines found wais inc menlo park california bruce gilliat wais inc. originally joint project apple computer peat markwick dow jones thinking machines 1992 presidential campaign ross perot used wais product campaign wide information system connecting field offices national office later perot systems adopted wais better access information corporate databases early clients environmental protection agency library congress department energy later wall street journal encyclopædia britannica wais inc sold aol may 1995 15 million following sale margaret st. pierre left wais inc start blue angel technologies wais variant formed basis metastar georgios papadopoulos left found atypon françois schiettecatte left human genome project johns hopkins hospital started fs-consult developed variant wais eventually became scienceserver later sold elsevier science kahle gilliat went found internet archive alexa internet public wais often used full-text search engine individual internet gopher servers supplementing popular veronica system searches menu titles gopher sites wais gopher share world wide web client–server architecture certain amount functionality wais protocol influenced largely z39.50 protocol designed networking library catalogs allows text-based search retrieval following search gopher provides free text search mechanism principally uses menus menu list titles user may pick one gopher space web containing many loops menu system gives user impression tree web data model similar gopher model except menus generalized hypertext documents cases simple file servers generate menus hypertext directly file structure server web hypertext model permits author freedom communicate options available reader include headings various forms list structure
[ 6657, 10242, 5251, 8582, 7943, 3979, 140, 6797, 2318, 3218, 9757, 10269, 10910, 35, 3110, 10791, 6319, 7983, 9905, 9908, 4661, 10808, 6330, 4797, 5054, 8639, 10174, 7364, 1480, 10057, 10313, 10060, 9043, 2901, 4310, 119, 5078, 6229, 6231, ...
Train
3,192
4
Gamma_Group:gamma group gamma group anglo-german technology company sells surveillance software governments police forces around world company strongly criticised human rights organisations selling finfisher software undemocratic regimes egypt bahrain following arab spring protests 2011 activists bahrain identified suspicious emails identified social engineering attempts persuade launch applications containing malicious software emails passed analysts identified malware would give finfisher access infected computers university toronto citizenlab conducted investigation gamma identified 33 likely government users finfisher 32 countries based presence finfisher master ip address country belonging specific government department 2014 gamma group hacked 40 gb dump information released detailing gamma 'client lists price lists source code details effectiveness finfisher malware user support documentation list classes/tutorials much details gamma capabilities found surveillance industry index despite hack extent negative publicity gamma activities finfisher reported gaining popularity around world numerous governments
[ 8537, 1169, 4314, 7515 ]
Test
3,193
9
Incr_Tcl:incr tcl incr tcl commonly stylised nowiki incr tcl /nowiki often abbreviated itcl set object-oriented extensions tcl programming language widely used among tcl community generally regarded industrial strength name pun c++ itcl implementations exist package may dynamically loaded tcl application well independent standalone language interpreter itcl allows namespaces used organizing commands variables example itcl like tcl built-in support integration c code itcl classes itcl follows copyright restrictions tcl/tk use copy modify even redistribute software without written agreement royalty provided keep copyright notices intact claim ownership software authors institutions retain ownership described license.terms files included standard distribution information please see incrtcl.sourceforge.net/itcl/copyright.html incr tcl ground chad smith published january 2000
[ 9345, 8262, 9575, 6826, 3183, 692 ]
None
3,194
3
MP6:mp6 rise mp6 superpipelined superscalar microprocessor designed rise technology compete intel pentium line rise technology spent 5 years developing x86 compatible microprocessor finally introduced november 1998 low-cost low-power alternative super socket 7 platform allowed higher front-side bus speeds previous socket 7 made possible cpu manufacturers keep competing intel moved slot 1 platform mp6 made use mmx instruction set three mmx pipelines allowed cpu execute three mmx instructions single cycle three integer units made possible execute three integer instructions single cycle well fully pipelined floating point unit could execute two floating-point instructions per cycle improve performance core utilized branch prediction number techniques resolve data dependency conflicts according rise mp6 perform almost fast intel pentium ii frequencies despite innovative features real-life performance mp6 proved disappointing mainly due small l1 cache another reason rise mp6 pr 266 rating based upon old intel pentium mmx main competitors intel celeron 266 idt winchip 2-266 amd k6-2 266 delivered performance benchmarks applications celeron k6-2 actually worked 266 mhz winchip 2 pr rating based upon performance amd opponent announced 1998 chip never achieved widespread use rise quietly exited market december following year like competitors cyrix idt rise found unable compete intel amd silicon integrated systems sis licensed mp6 technology used sis 550 system-on-a-chip soc integrated mp6 cpu north south bridges sound video single chip sis 550 saw use compact pcs consumer devices dvd players sis 551 chip also marketed dm p vortex86 m6127d later dm p took mp6 design sis continues development vortex86 soc product line dm p signed agreement xcore allow rebrand chip xcore86
[ 5088, 3588, 5380, 6020, 8231, 10440, 1260, 1677, 398, 10734, 1776, 499, 8851, 3798, 4252, 8125, 6815 ]
Test
3,195
1
VxInsight:vxinsight vxinsight knowledge mining tool developed sandia national laboratories institute scientific information allows user visualize relationship groups objects large databases 3d landscape hillier et al call pioneering study vxinsight used analyze gene expression i.e microarray data across number conditions c. elegans using vxinsight kim et al able cluster genes mounts coherent functions also able make novel observations finding distinct classes transposons tc3 mariner transposons appear differentially regulated development
[]
Validation
3,196
1
In-database_processing:in-database processing in-database processing sometimes referred in-database analytics refers integration data analytics data warehousing functionality today many large databases used credit card fraud detection investment bank risk management use technology provides significant performance improvements traditional methods traditional approaches data analysis require data moved database separate analytics environment processing back database spss ibm examples tools still today analysis database data resides eliminates costs time security issues associated old approach processing data warehouse though in-database capabilities first commercially offered mid-1990s object-related database systems vendors including ibm illustra/informix ibm oracle technology begin catch mid-2000s concept migrating analytics analytical workstation enterprise data warehouse first introduced thomas tileston presentation entitled “ cake eat accelerate data mining combining sas teradata ” teradata partners 2005 experience possibilities conference orlando fl september 18–22 2005 mr. tileston later presented technique globally 2006 2007 2008 point need in-database processing become pressing amount data available collect analyze continues grow exponentially due largely rise internet megabytes gigabytes terabytes petabytes “ big data ” one primary reasons become important collect process analyze data efficiently accurately also speed business accelerated point performance gain nanoseconds make difference industries additionally people industries use data answer important questions questions ask become complex demanding sophisticated tools precise results factors combination created need in-database processing introduction column-oriented database specifically designed analytics data warehousing reporting helped make technology possible three main types in-database processing translating model sql code loading c c++ libraries database process space built-in user-defined function udf out-of-process libraries typically written c c++ java registering database built-in udfs sql statement type in-database processing predictive model converted source language sql run database usually stored procedure many analytic model-building tools ability export models either sql pmml predictive modeling markup language sql loaded stored procedure values passed parameters model executed natively database tools use approach include sas spss r kxen c c++ udf libraries run process functions typically registered built-in functions within database server called like built-in function sql statement running process allows function full access database server ’ memory parallelism processing management capabilities functions must well-behaved negatively impact database engine type udf gives highest performance method olap mathematical statistical univariate distributions data mining algorithms out-of-process udfs typically written c c++ java running process run risk database engine run process space resources ’ expected performance in-process udf still typically registered database engine called standard sql usually stored procedure out-of-process udfs safe way extend capabilities database server ideal way add custom data mining libraries in-database processing makes data analysis accessible relevant high-throughput real-time applications including fraud detection credit scoring risk management transaction processing pricing margin analysis usage-based micro-segmenting behavioral ad targeting recommendation engines used customer service organizations determine next-best actions in-database processing performed promoted feature many major data warehousing vendors including teradata aster data systems acquired ibm netezza puredata systems db2 warehouse products iemc greenplum sybase paraccel sas exasol products offered vendors cwi monetdb ibm db2 warehouse offer users means write functions udfs extensions udxs enhance products capabilities fuzzy logix offers libraries in-database models used mathematical statistical data mining simulation classification modelling well financial models equity fixed income interest rate portfolio optimization in-database pioneers collaborates marketing teams institutionalize data mining analytic processes inside data warehouse fast reliable customizable consumer-behavior predictive analytics in-database processing one several technologies focused improving data warehousing performance others include parallel computing shared everything architectures shared nothing architectures massive parallel processing important step towards improving predictive analytics capabilities
[ 2688, 5632, 9345, 4483, 10632, 8201, 4107, 8979, 2068, 4116, 7446, 10389, 2456, 1049, 5658, 5403, 9631, 1697, 9634, 9893, 4263, 2344, 7080, 10286, 6395, 9397, 9147, 3004, 7868, 11324, 10048, 5953, 6850, 11457, 6085, 9286, 3529, 5450, 10061,...
Test
3,197
2
Preemption_(computing):preemption computing computing preemption act temporarily interrupting task carried computer system without requiring cooperation intention resuming task later time changes executed task known context switches normally carried privileged task part system known preemptive scheduler power preempt interrupt later resume tasks system given system design operations performed system may preemptible usually applies kernel functions service interrupts permitted run completion would tend produce race conditions resulting deadlock barring scheduler preempting tasks processing kernel functions simplifies kernel design expense system responsiveness distinction user mode kernel mode determines privilege level within system may also used distinguish whether task currently preemptible modern systems preemptive kernels designed permit tasks preempted even kernel mode examples systems solaris 2.0/sunos 5.0 windows nt linux kernel 2.6.x newer aix bsd systems netbsd since version 5 term preemptive multitasking used distinguish multitasking operating system permits preemption tasks cooperative multitasking system wherein processes tasks must explicitly programmed yield need system resources simple terms preemptive multitasking involves use interrupt mechanism suspends currently executing process invokes scheduler determine process execute next therefore processes get amount cpu time given time preemptive multitasking operating system kernel also initiate context switch satisfy scheduling policy priority constraint thus preempting active task general preemption means prior seizure high priority task instance seizes currently running task known preemptive scheduling term preemptive multitasking sometimes mistakenly used intended meaning specific referring instead class scheduling policies known time-shared scheduling time-sharing preemptive multitasking allows computer system reliably guarantee process regular slice operating time also allows system rapidly deal important external events like incoming data might require immediate attention one another process specific time processes grouped two categories waiting input output called i/o bound fully utilizing cpu cpu bound early systems processes would often poll busywait waiting requested input disk keyboard network input time process performing useful work still maintained complete control cpu advent interrupts preemptive multitasking i/o bound processes could blocked put hold pending arrival necessary data allowing processes utilize cpu arrival requested data would generate interrupt blocked processes could guaranteed timely return execution although multitasking techniques originally developed allow multiple users share single machine soon became apparent multitasking useful regardless number users many operating systems mainframes single-user personal computers no-user control systems like robotic spacecraft recognized usefulness multitasking support variety reasons multitasking makes possible single user run multiple applications time run background processes retaining control computer period time process allowed run preemptive multitasking system generally called time slice quantum scheduler run every time slice choose next process run length time slice critical balancing system performance vs process responsiveness time slice short scheduler consume much processing time time slice long processes take longer respond input interrupt scheduled allow operating system kernel switch processes time slices expire effectively allowing processor time shared number tasks giving illusion dealing tasks parallel simultaneously operating system controls design called multi-tasking system today nearly operating systems support preemptive multitasking including current versions windows macos linux including android ios earliest operating systems available home users featuring preemptive multitasking sinclair qdos 1984 amiga os 1985 ran motorola 68000-family microprocessors without memory management amiga os used dynamic loading relocatable code blocks hunks amiga jargon multitask preemptively processes flat address space early pc operating systems ms-dos pc dos support multitasking however alternative operating systems mp/m-86 1981 concurrent cp/m-86 support preemptive multitasking unix-like systems including minix coherent provided preemptive multitasking 1980s-era personal computers later dos versions natively supporting preemptive multitasking/multithreading include concurrent dos multiuser dos novell dos later called caldera opendos dr-dos 7.02 higher since concurrent dos 386 could also run multiple dos programs concurrently virtual dos machines earliest version windows support limited form preemptive multitasking windows 2.1x used intel 80386 virtual 8086 mode run dos applications virtual 8086 machines commonly known dos boxes could preempted windows 95 98 32-bit applications made preemptive running one separate address space 16-bit applications remained cooperative backward compatibility windows 3.1x protected mode kernel virtual device drivers ran preemptively 16-bit applications non-preemptive shared address space preemptive multitasking always supported windows nt versions os/2 native applications unix unix-like systems linux bsd macos vms os/360 many operating systems designed use academic medium-to-large business markets although plans upgrade cooperative multitasking found classic mac os preemptive model preemptive api exist mac os 9 although limited sense abandoned favor mac os x called macos hybrid old mac system style nextstep operating system based mach kernel derived part bsd always provided unix-like preemptive multitasking
[ 2560, 3586, 7173, 6155, 9739, 6675, 7187, 7699, 5655, 10776, 25, 4637, 10781, 9762, 4643, 6180, 3109, 5158, 8231, 6184, 7217, 7218, 10803, 9784, 10809, 2623, 576, 2113, 2625, 7234, 3142, 6730, 6221, 2638, 3160, 2137, 2138, 2140, 10333, 31...
Test
3,198
5
List_of_SIP_response_codes:list sip response codes session initiation protocol sip signalling protocol used controlling communication sessions voice ip telephone calls sip based around request/response transactions similar manner hypertext transfer protocol http transaction consists sip request one several request methods least one response sip requests responses may generated sip user agent user agents divided clients uacs initiate requests servers uases respond single user agent may act uac uas different transactions example sip phone user agent uac making call uas receiving one additionally devices act uac uas single transaction called back-to-back user agents b2buas sip responses specify three-digit integer response code one number defined codes detail status request codes grouped according first digit provisional success redirection client error server error global failure codes corresponding first digit 1–6 expressed example 1xx provisional responses code 100–199 sip response codes consistent http response codes although http response codes valid sip sip responses also specify reason phrase default reason phrase defined response code reason phrases varied however provide additional information provide text different language sip response codes corresponding reason phrases initially defined rfc 3261 rfc also defines sip parameters internet assigned numbers authority iana registry allow rfc provide response codes list includes sip response codes defined ietf rfcs registered sip parameters iana registry list also includes sip response codes defined obsolete sip rfcs specifically rfc 2543 therefore registered iana explicitly noted
[ 755, 10271, 4725, 4797 ]
None
3,199
1
Jordan_Antiquities_Database_and_Information_System:jordan antiquities database information system jordan antiquities database information system jadis computer database antiquities jordan first kind arab world established department antiquities 1990 cooperation american center oriental research amman sponsored united states agency international development jadis use 2002 superseded new system mega-j 10,841 antiquities registered database
[ 2901 ]
Train
3,200
1
Qualis_(CAPES):qualis capes qualis brazilian official system purpose classifying scientific production maintained coordenadoria de aperfeiçoamento de pessoal de nível superior capes government agency linked brazilian ministry education qualis task classify evaluate academic means used production scientific publications post-graduate programs master theses doctoral dissertations classification occurs system grades per field evaluation depends level circulation local national international quality journal b c classification annually updated follows series criteria defined capes number issues indexation number publishing institutions impact factor based jcr etc grades called strata occur 1–8 scale a1 highest a2 b1 b2 b3 b4 b5 c — listed
[]
None
3,201
4
ThunderByte_Antivirus:thunderbyte antivirus thunderbyte anti-virus tbav early antivirus software product created dutchman frans veldman 1988 published company esass b.v mainly designed dos also versions supporting microsoft windows tbav known fast scan speed heuristics-based scanner codice_1 files tracking known-good file information originally thunderbyte used dedicated isa card provide protection operating system even loaded later software-only product released soon displaced hardware offering distributed shareware 1998 tbav sold norman asa discontinued thunderbyte product
[ 2213, 6797, 7983, 5368, 11166 ]
Test
3,202
7
EKool:ekool ekool school management system used estonia covering 90 nation school network connecting pupils parents teachers involved estimated application used 28-30 estonians total name ekool means eschool estonian system usable teachers pupils parents exchange information time tables grades homework assignments similar features ekool created 2002 look world foundation cooperation companies private sector originally designed meet requirements four test schools rocca al mare school jüri gymnasium kuresaare gymnasium tallinn arte gymnasium since grown cover 90 estonian school network ekool started 2002 replace printed school diaries digital journals would enable parents students see grades homework assignments online pilot project launched specifications 4 schools rocca al mare school jüri gymnasium kuressaare gymnaasium tallinn arte gymnasium initial look world program ended 2005 turned private company koolitööde next years ekool mostly expanded estonian school system reaching 420 schools 2012 since 2014 ekool also supported mobile application allows students parents access information mobile phones however schools teachers still need use computer ekool accessed combination user-name password estonian id-card estonian mobile-id smart-id online bank identification ekool used various interest groups school personnel students parents extent local government overseeing school one user account person access functionalities different user groups user belongs schools personnel carries data entry process ekool latter used parties right access information among information schools provide parents students access information keep date side make easy school collect contact information parents students enter keep ekool updated using
[]
Test
3,203
3
Volta_(microarchitecture):volta microarchitecture volta codename gpu microarchitecture developed nvidia succeeding pascal first announced roadmap march 2013 however first product announced may 2017 architecture named 18th 19th century italian chemist physicist alessandro volta nvidia first chip feature tensor cores specially designed cores superior deep learning performance regular cuda cores architecture produced tsmc 12 nm finfet process first graphics card use datacentre tesla v100 e.g part nvidia dgx-1 system also used quadro gv100 titan v. mainstream geforce graphics cards based volta volta succeeded turing architecture architectural improvements volta architecture include following volta announced gpu microarchitecture within xavier generation tegra soc focusing self-driving cars nvidia annual gpu technology conference keynote 10th may 2017 nvidia officially announced volta microarchitecture along tesla v100 volta gv100 gpu built 12 nm process size using hbm2 memory 900 gb/s bandwidth nvidia officially announced nvidia titan v december 7 2017 nvidia officially announced quadro gv100 march 27 2018 volta also reported included summit sierra supercomputers used gpgpu compute volta gpus connect power9 cpus via nvlink 2.0 expected support cache coherency therefore improve gpgpu performance
[ 3585, 398, 9489, 10658, 2339, 7086, 9774, 1461, 9911, 11322, 8514, 7111, 2635, 2525, 11613, 2277, 8937, 11630, 1776, 6900, 2937 ]
Validation
3,204
2
AMDGPU:amdgpu amdgpu amd fully open source unified graphics driver linux amdgpu officially supports cards built upon gcn 1.2 higher support previous cards experimental may enabled kernel parameter amdgpu also optional closed-source component operates top open source amdgpu alternative 3d application support known amdgpu-pro
[ 2850, 3586, 1510, 1480, 11080, 876, 5356, 2935, 7983, 6705, 499, 823, 11485, 11130, 10971, 2045 ]
None
3,205
2
Nokia_E72:nokia e72 nokia e72 smartphone nokia eseries range manufactured finland nokia e72 announced june 15 2009 nokia connections 2009 event singapore successor nokia e71 based similar design form factor offers similar feature set nokia e72 business-oriented phone eseries devices standard features including mobile email calendar instant messaging among many others symbian-based s60 3rd edition feature pack 2 operating system nokia e72 new optical navi key feature addition standard d-pad used many nokia devices including nokia e71 – said improve ease scrolling menus emails internet browser images optical sensor addition series closely spaced buttons comparison predecessor nokia e72 said higher level performance likely due faster 600 mhz arm processor also includes 5-megapixel auto focusing camera changes improvements software-based including changes user interface built-in messaging application among others nokia e73 mode usa feature phone t-mobile usa support t-mobile uma service band iv support 3g different piece hardware internally e72 current firmware device 91.004 published 2 june 2012 check current firmware one may dial 0000 vertu constellation quest 2010 based e72 design
[ 1537, 8577, 11655, 9359, 1424, 529, 2449, 8083, 10770, 5143, 2072, 7063, 5274, 5019, 5659, 669, 8472, 11545, 4003, 4132, 6310, 167, 40, 3626, 5290, 10410, 10802, 7220, 821, 5175, 7866, 1083, 1728, 7617, 4291, 7877, 10053, 199, 967, 9292, ...
Test
3,206
2
Henry_Spencer:henry spencer henry spencer born 1955 canadian computer programmer space enthusiast wrote regex widely used software library regular expressions co-wrote c news usenet server program also wrote ten commandments c programmers coauthor david lawrence book managing usenet working university toronto ran first active usenet site outside u.s. starting 1981 records period eventually acquired google provide archive usenet 1980s first international usenet site run ottawa 1981 however generally remembered served merely read-only medium later 1981 spencer acquired usenet feed duke university brought utzoo online earliest public archives usenet date may 1981 result small size usenet youthful days spencer early involvement made well-recognised participant commemorated vernor vinge 1992 novel fire upon deep novel featured interstellar communications medium remarkably similar usenet author including spurious message headers one characters appeared solely postings modeled spencer slightly obliquely named also credited claim understand unix condemned reinvent poorly mid-december 2001 google unveiled improved usenet archives go decade deeper internet past millions posts company originally acquired bought existing archive called deja news 1981 1991 running zoology department computer system university toronto spencer copied 2 million usenet messages onto magnetic tapes 141 tapes wound university western ontario google michael schmidt tracked help david wiseman others got transferred onto disks google archives henry spencer helped geoff collyer write c news 1987 around time wrote non-proprietary replacement codice_1 unix library handling regular expressions made freely available api followed eighth edition research unix spencer library used many software packages including tcl mysql postgresql well adapted others including early versions perl circa 1993 spencer donated second version library 4.4bsd following posix standard regular expressions spencer technical lead frees/wan project implementing ipsec cryptographic protocol stack linux also wrote 'aaa amazing awk assembler one longest complex programs ever written awk programming language also developed 4 point font used entomologists labeling pinned insect specimens spencer founding member canadian space society served board directors several times since 1984 mission analysis planning launch orbits css canadian solar sail project defunct software architect canadian science microsatellite dedicated studying variable light stars extrasolar planets launched eurockot 2003 asteroid 117329 spencer named honour highly regarded space enthusiast familiar respected presence several space forums usenet internet 1983 2007 spencer posted 34,000 messages sci.space newsgroups knowledge space history technology corrected henry spencer virtual t-shirt award created reward anyone catch error fact
[ 7872, 6369, 515, 8612, 8582, 7022, 7376, 2804, 692, 3350, 823, 5492, 8539, 2045, 3742, 9151 ]
Test
3,207
4
Bill_Woodcock:bill woodcock bill woodcock born august 16 1971 san francisco california united states executive director packet clearing house non-profit research institute dedicated understanding supporting internet traffic exchange technology policy economics bill entered field internet routing research 1989 serving network architect operations director international multiprotocol service-provision backbone network 1993 1994 woodcock one founders packet clearing house served current post executive director since 1997 time woodcock directly participated establishment three hundred public internet exchange points europe africa asia americas continues serve boards provide ongoing technical policy advice many institutions 1998 woodcock j.d falk model spam regulation became first anti-spam legislation world california law 17538.4 paved way jurisdictions woodcock successfully concluded telecommunications regulatory reform efforts several african countries woodcock director roles four companies areas satellite communications content distribution domain name service technology 2001 woodcock co-authored chuck goolsbee chuck woody fiendishly difficult mac-mgrs trivia quiz annual gathering member macintosh managers mailing list san francisco macworld expo date 50 questions remain unanswered twenty years together richard ford initially brita meng hosted annual inaptly named a/ux user group dinner conjunction mactivity macworld meetings woodcock current former packet clearing house representative afrinic apnic arin iepg isoc isp/c lacnic natoa ripe bill woodcock regular speaker afnog apia apnic apricot arin isoc ripe iepg ietf sanog nanog meetings served program committees nanog sanog pam apricot woodcock one estonia computer attacks unleashed bronze soldier tallinn incident assisted defense coordinated hillar aarelaid cert-ee wake itu december 2012 world conference international telecommunications characterized attempted take-over institutions internet governance woodcock published number secret itu budget documents acted point-person effort redirect usd 11m u.s. government funds itu contributions support multistakeholder model internet governance effort centered people petition web site received much favorable attention press internet governance community woodcock published work includes many pch white-papers 1993 mcgraw-hill book networking macintosh report anf appletalk tunneling architectures working group chaired 1993 1994 many articles network world macworld macweek connections networking journals periodicals addition principal author multicast dns ip anycast operator requirements infrastructure management methods ietf drafts early 1990s pioneered igp egp-based topological load-balancing techniques using ip anycast technology together mark kosters proposed 1996 montreal iepg root dns servers migrated ip anycast work provided basis upon root dns servers deployed since late 1990s 2010 2011 rick lamb previously built signing system places dnssec cryptographic signatures dns root zone woodcock built first global-scale fips 140-2 level 4 dnssec signing infrastructure locations singapore zurich san jose addition protocol development work woodcock developed networking products cisco agilent farallon
[ 4952, 2050, 3259, 9688 ]
Test
3,208
1
World_Database_of_Happiness:world database happiness world database happiness web-based archive research findings subjective appreciation life database contains overview scientific publications happiness digest research findings database contains information happy people wide range circumstances 165 different nations happiness defined degree individual judges quality life whole favorably two 'components happiness distinguished hedonic level affect degree pleasant affect dominates contentment perceived realization wants world database happiness tool acquire overview ever-growing stream research findings happiness accumulation knowledge stagnates scientists capitalize earlier research investments medio 2013 database covered 19,000 scientific findings happiness 6000 distributional findings happy people another 13,000 correlational findings associated less happiness first findings date 1915 world database happiness often used popular media make lists happiest countries around globe example happy planet index aims chart sustainable happiness world combining data longevity happiness size ecological footprint citizens database clear conceptual focus includes research findings subjective enjoyment one ’ life whole thereby evades babel haunted study happiness ages side coin much interesting research left findings reported technical details measurement statistical analysis detail welcomed scholars makes information difficult digest lay-persons still another limitation available findings often contradictory makes hard draw firm conclusions causes happiness clear poor health separation unemployment lack social contact strongly negatively associated unhappiness another problem world database happiness number studies happiness increases high rate gets increasingly difficult offer complete overview research findings
[]
Validation
3,209
9
Jape_(software):jape software jape configurable graphical proof assistant originally developed richard bornat queen mary university london bernard sufrin university oxford allows user define logic decide view proofs much works variants sequent calculus natural deduction claimed jape popular program computer-assisted logic teaching involves exercises developing proofs mathematical logic program available mac unix windows operating systems written java programming language released gnu gpl
[ 5492, 5677, 6797, 4791 ]
None
3,210
7
Unigine:unigine unigine proprietary cross-platform game engine developed russian software company unigine corp. apart use game engine mainly used enterprise area simulators virtual reality systems serious games visualization distinguishing feature unigine support large open worlds planet scale also advanced 3d renderer currently supports opengl 4 directx 11 updated unigine sdk released 3 months unigine engine also core technology lineup benchmarks cpu gpu power supply cooling system used overclockers technical media tom hardware linus tech tips pc gamer others unigine benchmarks also included part phoronix test suite benchmarking purposes linux systems first public release 0.3 version may 4 2005 unigine engine created scratch based engine last update released july 7 2014 initially started microsoft windows linux support platforms added later os x playstation 3 android ios experimental support webgl included official sdk unigine 1 support several graphical apis directx 9 directx 10 directx 11 opengl opengl es playstation 3 initial versions v0.3x opengl support 3 apis developers c++ c uniginescript proprietary scripting language similar с++ syntax custom shaders written glsl hlsl languages unigine 1 several features required professional simulators enterprise vr systems mostly support large virtual scenarios specific hardware often called serious games support large virtual worlds implemented via double precision coordinates 64-bit per axis zone-based background data streaming optional operations geographic coordinate system latitude longitude elevation instead x z video output sophisticated displays implemented via so-called multi-channel rendering network-synchronized image generation single large image several computers standard approach professional simulators system enabled support multiple output devices asymmetric projections e.g cave curved screens multiple projectors requiring image warping edge blending also supported also various types stereoscopic 3d output supported anaglyph separate images output nvidia 3d vision well vr hmd support oculus rift unigine 1 also supported multi-monitor output video-walls unigine renderer supports shader model 5.0 hardware tessellation directcompute well opencl together set post-processes including screen space ambient occlusion ssao real-time global illumination set built-in high-level objects like terrain grass water clouds unigine uses proprietary physics engine collision detection rigid body physics dynamical destruction objects rag doll cloth fluid buoyancy force fields time reverse pathfinding also implemented proprietary engine together basic ai components spatial triggers callbacks features includes interactive 3d gui video playback using theora codec 3d audio system based openal library wysiwyg scene editor unigineeditor originally released october 10 2015 unigine 2 features unigine 1 focus simulators enterprise use main differences transition forward rendering deferred rendering approach pbr shading introduction several new graphical technologies like geometry water multi-layered volumetric clouds ssrtgi voxel-based lighting introduction c api supported platforms microsoft windows linux os x support stopped starting 2.6 version unigine 2 supports following graphical apis directx 11 opengl 4.x 3 apis developers c++ c uniginescript supported shader languages hlsl glsl uusl unified unigine shader language proprietary ssrtgi screen space ray-traced global illumination rendering technology introduced 2.5 version presented siggraph 2017 real-time live event roots unigine frustum.org open source project initiated 2002 alexander frustum zaprjagaev co-founder along denis shergin ceo ex-cto unigine corp name unigine means universal engine unique engine november 25 2010 unigine corp announced competition support linux game development agreed give away free license unigine engine anyone willing develop release game linux native client would also grant team windows license competition ran december 10 2010 considerable number entries submitted due unexpected response unigine decided extend offer three best applicants getting full unigine licenses winners announced december 13 2010 developers selected kot-in-action creative artel previously developed steel storm gamepulp intend make puzzle platformer med-art previously worked 2019 company claimed 200 b2b customers worldwide primarily use unigine military virtual reality projects several notable projects include graphical benchmarks cad systems unigine engine used platform series benchmarks used determine stability pc hardware cpu gpu power supply cooling system extremely stressful conditions well overclocking
[ 2368, 8454, 8937, 2826, 11306, 5612, 6797, 4334, 6900, 2293, 4182, 823, 9691, 11700, 5914, 5083, 1916, 2943 ]
Test
3,211
3
Interrupt_coalescing:interrupt coalescing interrupt coalescing also known interrupt moderation technique events would normally trigger hardware interrupt held back either certain amount work pending timeout timer triggers used correctly technique reduce interrupt load order magnitude incurring relatively small latency penalties interrupt coalescing typically combined either hardware fifo direct memory access allow continued data throughput interrupts held back interrupt coalescing common feature modern network cards technique dates back early computer uarts 16550 uart chip used ibm pc serial interface time even servicing interrupt rates required low data rate serial data streams day taxing contemporary cpus interrupt coalescing also implemented without support hardware disabling interrupts interrupt controller using timer-based polling
[ 5457, 3027, 3637 ]
Test
3,212
9
Hash_consing:hash consing computer science particularly functional programming hash consing technique used share values structurally equal term hash consing originates implementations lisp attempt reuse cons cells constructed avoiding penalty memory allocation hash consing commonly implemented hash tables storing weak references may garbage-collected data stored therein contains references outside table hash consing shown give dramatic performance improvements—both space time—for symbolic dynamic programming algorithms interesting property hash consing two structures tested equality constant time turn improve efficiency divide conquer algorithms data sets contain overlapping blocks simple efficient suitable demonstration concept implementation memoizer means hash table weak references scheme
[ 2304, 10083, 4101, 6502, 11674, 541 ]
Test
3,213
4
Security_Descriptor_Definition_Language:security descriptor definition language security descriptor definition language sddl defines string format used describe security descriptor text string
[ 5573, 2959 ]
None
3,214
4
HP_Data_Protector:hp data protector hp data protector software automated backup recovery software single-server enterprise environments supporting disk storage tape storage targets provides cross-platform online backup data microsoft windows unix linux operating systems business- mission-critical applications hp data protector zero downtime backup leverages array-based solutions offload processing server perform backup operations copy production data hp data protector instant recovery retrieves data replicated images disk recovery specific points time hp data protector originated omniback last version use omniback name version 4.1 retired 2004 hewlett-packard acquired apollo computer 1989 latter already developed backup system entitled omniback network backup system available market time hp continued develop product omniback name purpose backing individual files raw disk partitions related distinct product omniback/turbo developed backing databases 1996 hp released omniback ii 2.0 merged omniback ii omniback/turbo single product although still impossible create single job would contain database file system backup windows nt port released version 2.3 version 2.55 released 1997 included support hp-ux ibm aix interim hewlett-packard withdrew development slovenia germany significant time spent delivering version 3.5.2 solaris complete however allowed quick ports tru64 linux version 5.0 omniback name dropped since product called hp openview storage data protector hp storageworks data protector product called hp data protector software hp announced release hp data protector 9.0 part adaptive backup recovery initiative may 2014 released july 2014 released july 2014 along two companion products hp data protector management pack hp backup navigator hp data protector architecture based concept cell network environment contains cell manager clients backup devices cell manager main system centrally controls manages cell contains database runs core software runs backup restore sessions writing session information database client system within cell clients backed require installation disk agent clients control backup restore data require installation media agent multi-site operations data protector manager managers mom allows local administrators control data backup restore providing centralized enterprise monitoring media management configuration multiple data protector cells grouped configured managed mom hp data protector offers data deduplication capabilities ability compare blocks data written backup device data blocks previously stored device data deduplication hp data protector allows disk-based data storage target storage tape drives used deduplication targets sequential nature opposed block-oriented nature disk-devices hp data protector supports backup restore virtual servers including protection whole virtual machine application data supported virtual environments include vmware windows 2008 hyper-v limited microsoft virtual server 2005 hp integrity virtual machines citrix xenserver support longer officially provided hp data protector includes automated key management software linear tape-open lto-4 encryption users choice client-based encryption data security use encryption functionality lto-4 later generation tape drives november 2009 hp began offering hp data protector notebook extension hp data protector notebook extension enables users back recover data working remotely offline hp data protector notebook extension data captured backed automatically time user changes creates receives file processes transparent user impact laptop desktop performance data stored temporarily local repository pending transfer network data vault full backup restore capabilities key features include end-user single-click recovery encryption compression techniques granular recovery extensions components sit inside applications provide operator application way triggering large restore selecting individual items need restored without requiring assistance backup administrator example vmware granular recovery extension appears extra item vsphere console vcenter lets vmware administrator restore vmdk file finally provides interface selecting files vmdk file sharepoint gre allows microsoft sharepoint administrators recover single document collection folder directly via sharepoint gui granular recovery sharepoint 2010 introduced version 7.0
[ 5384, 6153, 6797, 8212, 1304, 8229, 3366, 7983, 823, 5571, 7243, 1358, 3281, 1874, 2258, 11100, 1638, 6765, 11505, 5492, 5756 ]
Test
3,215
4
Turnstile:turnstile turnstile also called baffle gate turnstyle form gate allows one person pass time also made enforce one-way traffic people addition restrict passage people insert coin ticket pass similar thus turnstile used case paid access sometimes called faregate ticket barrier used purpose example access public transport pay toilet restrict access authorized people example lobby office building turnstiles originally used like forms stile allow human beings pass keeping sheep livestock penned use turnstiles modern applications credited clarence saunders used first piggly wiggly store turnstiles used wide variety settings including stadiums amusement parks mass transit stations office lobbies airports ski resorts factories power plants casinos business/revenue standpoint turnstiles give accurate verifiable count attendance security standpoint lead patrons enter single-file security personnel clear view patron enables security efficiently isolate potential trouble confiscate prohibited materials hand physical barriers become serious safety issue speedy evacuation needed requiring emergency exits bypass turnstiles persons disabilities may difficulties using turnstiles cases generally wide aisle gate manual gate may provided locations luggage expected line turnstiles may entirely formed wide aisle gates example heathrow terminals 2 3 underground station turnstiles often use ratchet mechanisms allow rotation stile one direction allowing ingress preventing rotation direction often designed operate payment made usually inserting coin token slot swiping tapping inserting paper ticket electronically-encoded card turnstiles often used counting numbers people passing gate even payment involved used extensively manner amusement parks order keep track many people enter exit park ride ride first major use turnstiles sporting venue hampden park glasgow scotland waist-high turnstiles often used fairs attractions arenas user inserts ticket pass slot barcode read access granted sensor determines speed user passes sets electric motor turn turnstile corresponding speed sometimes also referred half-height turnstiles fixed arm style traditionally popular type turnstile many variations style available including one designed accompanied matching ticket box one ticket box built styles designed allow entry payment actual coins tokens inserted others allow access valid barcode electronically read disadvantage type people jump turnstile happens commonly moscow metro mass transport systems russia optical turnstiles alternative traditional arm -style turnstile increasingly used locations physical barrier deemed unnecessary unaesthetic optical turnstiles generally use infrared beam count patrons recognize anyone attempting enter site without valid entry pass drop arm optical turnstile combination security tripod barrier turnstile fully optical turnstile lanes either single double arms access granted arms drop recesses cabinet arms drop way turnstile functions fully optical turnstile full-height turnstile larger version turnstile commonly high similar operation revolving door eliminates possibility inherent waist-high style someone jumping turnstile however type turnstile functions differently revolving door often allow someone come someone else goes also pejoratively known iron maiden torture device name high-wheel sometimes called rotogate especially chicago used unstaffed exits chicago l stations also used increasingly new york city subway stations since turn 21st century europe however rotogate refers different kind gate turnstile two types full height turnstiles high entrance/exit turnstile heet exit-only difference heet turnstiles rotate directions thus allowing two-way traffic exit-only turnstiles rotate one direction thus allowing one-way traffic exit-only turnstiles commonly used mass transit stations allow passengers exit system without interfering entering exit-only models also used enclosed areas theme parks zoos amusement parks allow visitors leave denying admission paid additionally single double tandem turnstiles contain two rotors side side frame allows throughput limited space tandems frequently narrow two single turnstiles placed side-by-side public transport systems soviet union common use turnstiles entrance subway stations first introduced moscow metro 7 november 1958 city buses commuter trains usually operated proof-of-payment system fare collection became pressing business post-soviet russia railway terminals high-traffic railway station moscow area nizhny novgorod elsewhere turnstiles installed early 2000s moscow authorities sought improve fare collection since enclosing bus tram stops providing fare gates feasible installed turnstiles inside city bus tram practice caused passenger complaints slowed boarding compared traditional honor system similar system use brazilian chilean city buses hong kong trams
[ 2737, 7068 ]
Test
3,216
2
Dynamic_debugging_technique:dynamic debugging technique dynamic debugging technique ddt name several debugger programs originally developed dec hardware initially known dec debugging tape distributed paper tape name pun insecticide i.e bug-killer ddt first version ddt developed mit pdp-1 computer 1961 newer versions newer platforms continued use name ported vendor platforms changing media name changed less dec-centric version ddt closely related odt names used several different debuggers generally debuggers odt name limited capabilities ddt debuggers early versions digital research cp/m cp/m-86 kept dec name ddt ddt-86 ddt-68k debugger however meaning dynamic debugging tool cp/m ddt later superseded symbolic instruction debugger sid zsid sid86 gemsid dr dos gem addition normal function debugger ddt also used top-level command shell mit operating system recent systems replaced pword implements restricted subset ddt functionality ddt could run debug eight processes called jobs time several sessions teco ddt could run recursively jobs could ddts could run another eight jobs eight jobs given unique names usual name original top-most ddt hactrn hack-tran thus guy l. steele famous filk poem parody edgar allan poe raven hactrn ddt dynamic debugging technique implemented decsystem-10 decsystem-20 allowed references symbols within programming debugged feature loaded symbols .exe executable file special version named sddt used symbols running monitor allowed system programmers peek inside
[ 10113, 2181, 6921, 1804, 273, 2840, 2201, 2729, 7849, 11562, 7983, 178, 4409, 7999, 577, 4548, 4423, 5328, 6355, 10067, 2786, 10083, 5220, 8301, 2672, 3056, 4337, 9329, 4727, 11513, 6778, 1147, 2045 ]
Test
3,217
3
The_Untouchables_(video_game):untouchables video game untouchables video game released ocean software 1989 zx spectrum amstrad cpc commodore 64 msx amiga dos later nes snes based film untouchables side-scrolling based loosely movie game plays significant parts film set chicago primary goal game take al capone henchmen eventually detain capone electronic gaming monthly gave super nes version 5.8 10 commenting title would better super scope compatible bit difficult use pad shooting sequences reviewer crash called game great stuff ocean brought chicago life atmospheric title tune 128k beautifully detailed graphics challenging gameplay add one addictive mean game sinclair user commented untouchables cracking conversion easily one successful accurate movie licenses date paul rand computer video games stated untouchables well thought package find niche people software collections ... buy wo n't disappointed games machine added six levels trigger-pumping fun suitable graphics give authentic twenties feel nice touches ... make untouchables winner
[ 9006 ]
None
3,218
5
Network_News_Transfer_Protocol:network news transfer protocol network news transfer protocol nntp application protocol used transporting usenet news articles netnews news servers reading posting articles end user client applications brian kantor university california san diego phil lapsley university california berkeley wrote specification network news transfer protocol march 1986 contributors included stan o. barber baylor college medicine erik fair apple computer usenet originally designed based uucp network article transfers taking place direct point-to-point telephone links news servers powerful time-sharing systems readers posters logged computers reading articles directly local disk local area networks internet participation proliferated became desirable allow newsreaders run personal computers connected local networks resulting protocol nntp resembled simple mail transfer protocol smtp tailored exchanging newsgroup articles newsreader also known news client software application reads articles usenet either directly news server disks via nntp well-known tcp port 119 reserved nntp well-known tcp port 433 nnsp may used bulk transfer articles one server another clients connect news server transport layer security tls tcp port 563 often used sometimes referred nntps alternatively plain-text connection port 119 may changed use tls via codice_1 command october 2006 ietf released updates nntp codifies many additions made years since rfc 977 time ietf also released specifies use transport layer security tls via nntp starttls abortive attempt update nntp standard early 1990s specialized form nntp intended specifically use clients nnrp proposed protocol never completed fully implemented name persisted internetnews inn nnrpd program result subset standard nntp commands useful clients sometimes still referred nnrp
[ 6657, 10242, 1030, 3592, 8211, 6681, 6682, 10269, 10271, 6689, 10786, 35, 9251, 2085, 10791, 7208, 7214, 8238, 562, 1075, 1586, 9269, 11321, 3133, 4158, 5181, 6723, 11332, 10309, 8265, 8266, 4687, 592, 98, 10341, 10344, 9834, 3695, 4723, ...
Validation
3,219
1
In-memory_database:in-memory database in-memory database imdb also main memory database system mmdb memory resident database database management system primarily relies main memory computer data storage contrasted database management systems employ disk storage mechanism in-memory databases faster disk-optimized databases disk access slower memory access internal optimization algorithms simpler execute fewer cpu instructions accessing data memory eliminates seek time querying data provides faster predictable performance disk applications response time critical running telecommunications network equipment mobile advertising networks often use main-memory databases imdbs gained lot traction especially data analytics space starting mid-2000s – mainly due multi-core processors address large memory due less expensive ram potential technical hurdle in-memory data storage volatility ram specifically event power loss intentional otherwise data stored volatile ram lost introduction non-volatile random access memory technology in-memory databases able run full speed maintain data event power failure simplest form main memory databases store data volatile memory devices devices lose stored information device loses power reset case imdbs said lack support durability portion acid atomicity consistency isolation durability properties volatile memory-based imdbs often support three acid properties atomicity consistency isolation many imdbs added durability via following mechanisms imdbs allow database schema specify different durability requirements selected areas database thus faster-changing data easily regenerated meaning system shut-down would need journaled durability though would replicated high availability whereas configuration information would flagged needing preservation storing data in-memory confers performance advantages expensive method data storage approach realising benefits in-memory storage limiting costs store frequently accessed data in-memory rest disk since hard distinction data stored in-memory stored disk systems dynamically update data stored based data usage approach subtly different caching recently accessed data cached opposed frequently accessed data stored in-memory flexibility hybrid approaches allow balance struck cloud computing industry terms data temperature hot data cold data emerged describe data stored respect hot data used describe mission-critical data needs accessed frequently cold data describes data needed less often less urgently data kept archiving auditing purposes hot data stored ways offering fast retrieval modification often accomplished in-memory storage always cold data hand stored cost-effective way accepted data access likely slower compared hot data descriptions useful concrete definition hot cold manufacturing efficiency provides another reason selecting combined in-memory/on-disk database system device product lines especially consumer electronics include units permanent storage others rely memory storage set-top boxes example devices require database system manufacturer adopt hybrid database system lower upper cost less customization code rather using separate in-memory on-disk databases respectively disk-less disk-based products first database engine support in-memory on-disk tables single database webdna released 1995 another variation involves large amounts nonvolatile memory server example flash memory chips addressable memory rather structured disk arrays database form memory combines fast access speed persistence reboots power losses
[ 2051, 5640, 1801, 6920, 7946, 10389, 4502, 1049, 1178, 9631, 2339, 10917, 8871, 10921, 1579, 8619, 4781, 6831, 7347, 5051, 10048, 5953, 11203, 10186, 4811, 2901, 7767, 4696, 5209, 862, 4194, 1636, 9828, 1136, 4598, 3450, 4604, 9471 ]
None
3,220
7
Lanyon_Solutions:lanyon solutions lanyon solutions inc. privately owned software-as-a-service saas company provided cloud-based software manage meetings events travel lanyon software supported range clients including corporations hotels associations tradeshows convention visitor bureaus cvbs intermediaries meetings events travel space merged cvent 2017 lanyon solutions formed combination two companies active network business solutions group lanyon vista equity partners 2014 two acquisitions added passkey genieconnect 2014 nevertheless solutions services offered individual companies date back decades lanyon founded 1984 nick lanyon irving texas provider software focused corporate transient travel 2009 lanyon received 10 million funding frontier capital charlotte nc-based private equity company expand lanyon product customer sales support company purchased vista equity partners december 2012 signaling exit frontier capital investment company founded 1996 waltham ma-based passkey international provided hotel reservation technology hotels event planners april 2014 lanyon acquired passkey complemented lanyon existing event solutions included passkey groupmax technology enabled hotels destination marketing organizations drive revenue group reservations easing manual tasks associated managing group room blocks starcite founded 1999 spinoff mcgettigan partners company expanded focus desktop consolidation meetings technology acquiring attendee applications provider regweb 2002 attendee product provider b-there 2003 2006 starcite merged onvantage inc. formed merger seeuthere technologies plansoft 2004 bringing together two leaders meetings technology merged company took starcite name products included starcite mobile attendee attendee networking 1:1 meetings schedule meetings business intelligence meetings data analytics suite smm applications supplier database 2008 active network acquired boulder co-based regonline online registration company lindon ut-based wingateweb provided large enterprise event management software january 2012 active network acquired starcite 57.7 million form business solutions group offer smm event marketing software meetings events addition starcite smm business solutions group technology offering included activeworks conference conferences regonline online registration starcite supplier marketplace hotel venue sourcing september 2013 active network acquired vista equity partners 1 billion would return public company private status february 2014 lanyon paired active network business solutions group consolidated lanyon name genieconnect founded 2010 teams us uk apac previously known geniemobile march 2013 uk-based genieconnect offered enterprise-level mobile event technology products included smartconnect provides content based attendee app usage ibeacon-enabled audience response solution marketing track attendee behaviors send messages audiences omnistream event wall aggregate social event activity genieconnect mobile event technology used associations corporations exhibitors expo companies cisco live 2014 genieconnect achieved following results 11,000 attendee profiles updates 7,500 access interactive maps 167,00 plus favorited content mobile app received user rating 4.5 5 stars cisco post-event survey acquired lanyon december 2014 genieconnect mobile technology already integrated many lanyon existing solutions formed early 2014 merger active network business solutions group lanyon lanyon solutions expanded software offering focus several key mergers acquisitions company acquired group hotel reservations company passkey april 2014 mobile application company genieconnect december 2014 lanyon solutions relocated headquarters downtown dallas texas offices draper ut london uk philadelphia pa singapore singapore waltham lanyon serves meetings events travel industries variety software products businesses hotels lanyon large focus enterprise serving 80 fortune 100 10,000 small medium-sized businesses 100,000 hotels company solutions designed manage costs spend data related meetings hotels enabling hoteliers offer venues services corporations associations introduced 2013 lanyon smart events cloud solution brings together strategic meetings management event marketing technologies single solution smart events cloud solution includes products hoteliers lanyon provides rfp management software respond meetings transient erfps hotel booking systems product offerings include
[ 9818 ]
Test
3,221
9
Command_language:command language command language language job control computing domain-specific interpreted language common examples command language shell batch programming languages languages used directly command line also automate tasks would normally performed manually command line share domain—lightweight automation—with scripting languages though command language usually stronger coupling underlying operating system command languages often either simple grammars syntaxes close natural language shallow learning curve many domain-specific languages
[ 8262, 8295, 9926, 7022, 4782, 7983, 9871, 9714, 5395, 9780, 10387, 11442 ]
None
3,222
6
Compress:compress compress unix shell compression program based lzw compression algorithm compared modern compression utilities gzip bzip2 compress performs faster less memory usage cost significantly lower compression ratio uncompress utility restore files original state compressed using compress utility files specified standard input uncompressed standard output up-coming posix single unix specification revision planned deflate algorithm used gzip format supported utilities files compressed compress typically given extension .z modeled earlier pack program used extension .z tar programs pipe data compress given command line option codice_1 tar program compress stores multiple files within one tape archive files returned original state using uncompress usual action uncompress merely create uncompressed copy file also restore timestamp attributes compressed file files produced compress systems uncompress supports 9- 16-bit compression lzw algorithm used compress patented sperry research center 1983 terry welch published ieee article algorithm 1984 failed note applied patent algorithm spencer thomas university utah took article implemented compress 1984 without realizing patent pending lzw algorithm gif image format also incorporated lzw compression way unisys later claimed royalties implementations gif joseph m. orost led team worked thomas et al create 'final 4.0 version compress published free software 'net.sources usenet group 1985. granted 1985 compress could used without paying royalties sperry research eventually merged unisys compress fallen favor particular user-groups makes use lzw algorithm covered unisys patent gzip bzip2 increased popularity linux-based operating systems due alternative algorithms along better file compression compress however maintained presence unix bsd systems us lzw patent expired 2003 public domain united states patents lzw worldwide also expired see graphics interchange format unisys lzw patent enforcement up-coming posix single unix specification revision planned deflate algorithm used gzip format supported utilities output binary consists bit groups bit group consists codes fixed amount bits 9-16 group except last aligned amount bits multiplied 8 right padded zeroes last group aligned 8 padded zeroes find information ncompress issue example want output 10 9 bit codes output 5 10 bit codes 2 bit groups 100 bits 50 bits first group aligned 72 right padded zeroes second group aligned 8 right padded zeroes need output 100 bits 44 zero bits 50 bits 6 zero bits actually bug lzw n't require alignment bug part original unix compress ncompress gzip even windows port exists 35 years application/x-compress files created using bug include output specification compress implementations writes random bits uninitialized buffer alignment bits guarantee alignment bits zeroes terms 100 compatibility decompressor ignore alignment bit values
[ 6022, 10121, 1420, 8975, 1940, 5397, 7702, 9880, 3114, 10027, 2095, 7983, 11442, 4406, 4279, 823, 6713, 10817, 2755, 11076, 1352, 4296, 3659, 10317, 4174, 5711, 10575, 3921, 722, 4561, 3804, 8414, 1631, 3296, 6369, 5858, 9953, 11614, 6759, ...
None
3,223
4
James_Dolan_(computer_security_expert):james dolan computer security expert james s. dolan july 20 1981 – december 27 2017 american computer security expert aaron swartz kevin poulsen co-developed securedrop widely used secure digital platform sources anonymously submit materials journalists dolan grew chester new york grew four sisters went school tuxedo park school considered gifted early age later moved brooklyn called home chester ny 1999 2006 dolan served marines two deployments iraq war worked data network specialist 2003 dolan served iii marine expeditionary force initial iraq war second deployment september 2004 march 2005 dolan served 4th civil affairs group fallujah one centers conflict time dolan fallujah operation phantom fury part second battle fallujah trevor timm freedom press foundation referenced dolan military service description dolan obituary wrote saying impact serving iraq often spoke motivating factor dolan cybersecurity work goal making metadata transparent accountable service iraq war dolan worked computer security large company 2012 side project job dolan helped develop open source securedrop initially known deaddrop 2013 poulsen dolan moved freedom press foundation ensure continued development adoption following death fellow developer aaron swartz dolan lead maintainer deaddrop freedom press foundation first employee performed outreach assisted installations news organizations included new yorker propublica washington post vice news among others 2015 dolan moved san diego california work head security classy american software company online fundraising platform designed nonprofit organizations position held time death dolan found dead brooklyn hotel december 2017 age 36 former colleagues speculate james died suicide fate swartz reportedly suffered ptsd time marines dolan second member securedrop team commit suicide gofundme fund set fellow marines establish james dolan memorial fund annually donate designated non-profit foundations projects name
[ 11659, 11221, 2558, 743 ]
None
3,224
8
Text_Template_Transformation_Toolkit:text template transformation toolkit microsoft text template transformation toolkit usually referred t4 template based text generation framework included visual studio t4 source files usually denoted file extension .tt t4 used developers part application tool framework automate creation text files variety parameters text files ultimately text format code example c xml html xaml t4 uses custom template format contain .net code string literals parsed t4 command line tool .net code compiled executed output executed code text file generated template t4 also completely run within .net applications via use texttransformation class eliminates need end user visual studio installed t4 used within microsoft asp.net mvc creation views controllers ado.net entity framework entity generation asp.net dynamic data also used outside microsoft projects subsonic t4 templating also supported monodevelop four types controls handed t4 template transformation engine microsoft often criticized lack tooling support t4 within visual studio ide relies third parties namely tangible engineering clarius consulting however later revisions included better tooling support
[ 10243, 10769, 1043, 1055, 2083, 8227, 1577, 2603, 4143, 9263, 11316, 1077, 6709, 8246, 8757, 4674, 4174, 4178, 83, 9813, 603, 608, 2145, 10338, 617, 1656, 5754, 9340, 5761, 5765, 10886, 2183, 4231, 5259, 653, 6797, 10900, 10902, 11414, 47...
Test
3,225
4
Wiper_(malware):wiper malware wiper class malware whose intention wipe hard drive computer infects piece malware referred wiper allegedly used attacks iranian oil companies 2012 international telecommunication union supplied kaspersky lab hard drives allegedly damaged wiper analysis sample alleged malware could found kaspersky discovered traces separate piece malware known flame shamoon malware contained disk wiping mechanism employed 2012 2016 malware attacks targeting saudi energy companies utilized commercial direct drive access driver known rawdisk original variant overwrote files portions image burning u.s. flag 2016 variant nearly identical except using image body alan kurdi instead wiping component used part malware employed lazarus group—a cybercrime group alleged ties north korea 2013 south korea cyberattack 2014 sony pictures hack sony hack also utilized rawdisk 2017 computers several countries—most prominently ukraine infected variant petya ransomware modified effectively act wiper malware infects master boot record payload encrypts internal file table ntfs file system although still demanded ransom found code significantly modified payload could actually revert changes ransom successfully paid
[ 7809, 9762, 5764, 11368, 11152, 2193, 1970, 7515, 3423 ]
None
3,226
3
Interlock_(engineering):interlock engineering interlock feature makes state two mechanisms functions mutually dependent may used prevent undesired states finite-state machine may consist electrical electronic mechanical devices systems applications interlock used help prevent machine harming operator damaging preventing one element changing state due state another element vice versa elevators equipped interlock prevents moving elevator opening doors prevents stationary elevator open doors moving although idiot proof strategies interlock confused simple safety switch example typical household microwave oven switch disables magnetron door opened interlock rather would considered interlock door locked magnetron magnetron prevented operating door open interlocks may include sophisticated elements curtains infrared beams photodetectors computer containing interlocking computer program digital analogue electronics simple switches locks trapped key interlocking method ensuring safety industrial environments forcing operator predetermined sequence using defined selection keys locks switches called trapped key works releasing trapping keys predetermined sequence control power isolated key released used grant access individual multiple doors example prevent access inside electric kiln trapped key system may used interlock disconnecting switch kiln door switch turned key held interlock attached disconnecting switch open kiln door switch first opened releases key key used unlock kiln door key removed switch interlock plunger interlock mechanically prevents switch closing power re-applied kiln kiln door locked releasing key key returned disconnecting switch interlock similar two-part interlock system used anywhere necessary ensure energy supply machine interrupted machine entered adjustment maintenance microprocessor architecture interlock hardware stalls pipeline inserts bubbles hazard detected hazard cleared one example hazard software program loads data system bus calls use data following cycle system loads take multiple cycles load-to-use hazard interlocks may strictly mechanical one form internal firearm safety blocks motion trigger sear and/or firing pin unless breech properly closed locked operation device press cutter hand fed workpiece hand removed use two buttons actuate device one hand greatly reduces possibility operation endangering operator system fool-proof systems often augmented use cable–pulled gloves worn operator retracted away danger area stroke machine major problem engineering operator safety tendency operators ignore safety precautions even outright disabling forced interlocks due work pressure factors therefore safeties require perhaps must facilitate operator cooperation many people use generators supplement power home business event main municipal power gone offline order safely transfer power source generator back main safety interlock often employed interlock consists one switches prevent main power generator power powering dwelling simultaneously without safeguard power sources running could cause overload condition generator power back-feed onto main could cause dangerous voltage reach lineman repairing main feed far outside building interlock device designed allow generator provide backup power way prevents main generator power connected time b allows circuit breakers operate normally without interference event overload condition interlock devices electrical systems employ mechanical device manage movement circuit breakers also allow use padlocks prevent someone accidentally activating main power system without authorization
[ 8036, 8523, 1272, 10781, 2623 ]
None
3,227
3
AGRIS:agris agris international system agricultural science technology global public domain database 9 million structured bibliographical records agricultural science technology became operational 1975 database maintained ciard content provided 150 participating institutions 65 countries agris search system allows scientists researchers students perform sophisticated searches using keywords agrovoc thesaurus specific journal titles names countries institutions authors information management flourished 1970s agris metadata corpus developed allow users free access knowledge available agricultural science technology agris developed international cooperative system serve developed developing countries advent internet along promises offered open access publishing growing awareness management agricultural science technology information would various facets standards methodologies interoperability facilitation knowledge exchange tools enable information management specialists process data information knowledge exchange across countries common interoperability criteria thus adopted implementation agris ap metadata accordingly created order allow exchange retrieval agricultural information resources agris covers wide range subjects related agriculture science technology including forestry animal husbandry aquatic sciences fisheries human nutrition extension content includes unique grey literature unpublished scientific technical reports theses conference papers government publications growing number around 20 bibliographical records corresponding full text document web easily retrieved google 5 december 2013 agris 2.0 released agris 2.0 time access agris repository provided agris search engine agris data converted rdf resulting linked dataset created 200 million triples agris also registered data hub http //thedatahub.org/dataset/agris agris partners contributing agris database use several formats exchanging data including simple dc oai-pmh systems agris ap format anyway adopted directly falling umbrella ciard joint initiative co-led cgiar gfar fao new agris aims promote sharing management agricultural science technology information use common standards methodologies incorporate web 2.0 features order make search experience comprehensive intuitive far-reaching possible users new agris furthermore new agris also leverage data infrastructure one ciard projects ciard ring acronym standing routemap information nodes gateways ring ciard ring project led gfar aims directory ard agricultural research development information services allow monitoring describing classifying existing services whilst benchmarking interoperability criteria ensure maximum outreach global availability
[ 10452, 2948, 7599 ]
None
3,228
2
Messages_(Apple):messages apple messages instant messaging software application developed apple inc. macos ios watchos operating systems desktop messages application replaced ichat native os x instant messaging client release os x mountain lion july 2012 inherits majority ichat features messages also brings support imessage apple messaging service ios well facetime integration mobile version messages ios used iphone ipad also supports sms mms due replacing older text messaging text app since ios 3 users tell difference message via sms one sent imessage bubbles appear either green sms blue imessage apple released messages iphone built-in application iphone os 3.0 june 17 2009 replaced text application native messaging application since iphone inception change name due iphone gaining native support mms protocol addition previously available sms protocol even though iphone 3g newly released iphone 3gs original iphone received os 3.0 update original iphone left support mms citing hardware challenges messages also gained support sharing contacts using vcard standard big changes included support copy paste ability forward delete multiple messages time release iphone os 4.0 name later changed ios 4.0 2010 messages received minor upgrade among new features ability search within text messages much like search feature mail also added support displaying character count notify one gone standard sms character limit ios 4.0 also included support red exclamation mark appear app icon warn failure send message developers provided new api allowed add embedded messaging functionality apps ipad ipod touch gained support messages release ios 5.0 october 12 2011 unlike iphone supported sms mms imessage ipad ipod touch supported apple imessage protocol imessage users ios 5 could send text picture messages contacts wifi 3g ios 5 devices without using carrier quota addition user could start conversation one device continue another messages also introduced typing indication delivery read receipts imessage introduction notification center new sms mms imessages could seen lock screen pulling notification center ios 6 helped improve syncing multiple devices ipod touch ipad users could use iphone phone numbers send receive imessages earlier iphone users could receive imessages sent phone number ipad ipod touch addition users could add additional emails receive send messages device settings accessible settings application messages tab ios 6 also added share button apps like safari photos enabled users share links photos using sms/mms imessage without leaving app ios 7 messages received new user interface apple also allowed users see message post date swiping messages view right left ios 8 users send audio video messages holding record button group conversations users remove/add someone thread name thread share location thread view attachments turn disturb receive notifications specific thread part new continuity feature users use iphones relay send receive sms mms messages macs ipads ios 9 app received redesigned overlay sending audio clip well seeing contact photos list view iphone 6 later ios 10 app app store allowing user download third-party messages apps apps allow user send stickers play games within messages app app received new visual effects example chat bubbles sent loud gentle effect messages announced os x beta application february 16 2012 macs running mac os x 10.7 lion released conjunction developer preview apple to-be-released os mountain lion 10.8 beta discontinued december 12 2012 3 months release mountain lion full-version messages os x released july 25 2012 included mountain lion messages replaced ichat default im client since mac os x 10.2 addition supporting apple new imessage protocol messages os x retained support aim yahoo messenger google talk jabber messages unitizes newly added notification center notify incoming messages introduction new share button applications like safari finder preview gave users ability share links webpages photos files messages also supported dragging dropping files photos sharing messages also supports video calling apple facetime third-party im services supports release 10.8.2 messages os x gained ability send receive imessages using iphone phone number yosemite app redesigned look like app ios 7 8 part new continuity feature users able send receive sms mms messages iphones running ios 8 possibility reopen previous conversations removed embedded control font size character format within sent messages removed headlining feature ios 5 messages widely reviewed met fairly positive reviews dante cesa engadget review praised brilliance apple execution messages complimented way messages change earlier sms ui would automatically convert sms/mms imessage recipient registered imessage sms/mms stopped using service dan moren macworld also praise apple execution saying ... explain less technically savvy friends send free message instead sms done automatically feature widely praised anandtech praised apple technical achievements messages particularly imessage noted away sms character limits 140 160 helped eliminate messages sent received split two messages tests found apple actually prioritized using cellular networks send text messages opposed wifi networks spite possibly incurring data costs claimed data usage text based imessage small enough ignore especially considered cellular networks secure wifi protected picture video messages apple prioritized wifi given much higher data consumption compared text criticism messages relates imessage release ios 6 os x mountain lion 10.8.2 inability receive imessages sent one iphone phone number ipad ipod touch mac criticized feature addressed ios 6 iphones ipads ipod touches os x 10.8.2 macs messages also came fire due multiple cases apple icloud service going messages relies icloud send receive imessages using apple voiceover screen reader ios macos visually impaired users tap message read also navigate messages ui using voice utilizing siri messages enables one dictate send messages commands siri also able read new incoming messages default font size ios messages editable accessibility tab settings application
[ 10242, 10755, 9732, 4615, 1036, 1549, 5647, 7697, 1042, 11289, 3610, 10271, 3105, 6186, 4139, 6700, 4657, 1074, 8754, 8758, 9784, 8253, 576, 6208, 9802, 8783, 5713, 4180, 3670, 1623, 3672, 4184, 10838, 2141, 4702, 3681, 9826, 2149, 8806, ...
Validation
3,229
9
Jsish:jsish javascript interpreter shell jsish jsi short scripting language designed use embedded systems language used primarily applications written c c++ using gnu tool-chains mingw provides windows compatibility jsi code compiles either c99 c++ c++ support native instead extern c jsi created embedded application replacement tcl jimtcl main goal provide embedded scripting using mostly standard syntax javascript opposed idiosyncratic ones used tcl lua python secondary goal data compatibility web browsers using json speed major goal life jsi started fork quad-wheel interpreter eventually major internal features tcl added current implementation nearly 10 times size original little original code remains jsi comes builtin support sqlite websocket self-hosting zip file-systems codice_1 executable unusual integrates self-mounting file system containing builtin utilities applications include debugger web-server latter used provide web user-interfaces debugger sqlite applications accessed via codice_1 command-line arguments jsi highly independent scripts extensions unusually robust due functions support duck typed-parameters implementation mature rich resilient development environment includes integrated logging asserts strict mode version 2.4 released december 2017 jsi considered feature-stable jsi implements version 5.1. ecmascript standard following deviations one major extension function definitions use types defaults
[ 3969, 9345, 5635, 2181, 3462, 6797, 8854, 546, 4777, 5546, 7983, 2864, 692, 9780, 438, 1101, 8909, 8147, 11219, 4437, 10971, 8289, 10851, 9320, 8554, 9834, 5612, 2045 ]
Validation
3,230
9
CorVision:corvision corvision fourth generation programming tool 4gl currently owned attunity inc. corvision developed cortex corporation vax/vms isam environment although cortex beta tested corvision-10 generated pcs corvision stayed anchored vms corvision-10 proved difficult hoped never released corvision traced back 1972 lou santoro mike lowery created inform newly formed time-sharing company standard information systems sis inform contained corvisions basic utility commands sort report list consolidate first users inform new england telephone polaroid temple barker sloan 1972 sis offices los angeles garden grove minneapolis chicago boston new york city district columbia charlotte raleigh atlanta phoenix 1976 1977 ken levitt dick berthold sis ported inform cdc-3600 pdp-11/70 ias called new tool inform-11 cortex founded 1978 sherm uchill craig hill mike lowery dick berthold market inform-11 inform-11 first used deliver 20-user order entry system eddie bauer deliver insurance processing system consolidated group trust 1981 1982 cortex received significant investment b. dick using new investment cortex ported inform digital equipment corporation new vax/vms adding compiled executables inform-11 promoted cortex digital pioneering rapid application development system 1984 jim warner encapsulated inform repository-based development tool called application factory inform process procedural language became known builder within application factory 1986 name application factory dropped favor name corvision 1986 1989 corvision experienced heyday quickly became known robust capable tool rapidly building significant multi-user applications addition relational database support attracted major accounts cortex quickly became international company 1992 corvision version 5 released query support unix query allowed read-only access users developers systems database backend seemed desirable facility allowing users create use throw away reports without calling developers nasty habit causing performance issues users often understand database structure could send large queries processing queues causing system-wide issues 1993 cortex started supported vesting digital new 64-bit alpha line 1994 international software group co. ltd. isg purchased cortex early 1987 cortex recognized growth popularity ibm pc supporting wikt diagrammatic editing menus data relationships corvision 1993 client-server version released widely adopted 1997 isg work corvision-10 herald rebirth corvision onto ibm pc platform stopped corvision-10 proving difficult port isg finally refused spend money now-dated system 1994 saw last innovative corvision release v5.11 extra-fee y2k release v5.12.2 marked end development corvision still exists handful companies yet found time money upgrade existing mainframe systems corvision runs vms environment stable search corvision developers contractors support ageing systems problem since around 1999 companies started appearing offering conversion tools convert builder code compiled visual basic java 2005 corvision guru michael lowery president order processing technologies attempted revive corvision franchise cv2vb process convert corvision applications .net applications using sql server cv2vb opt third generation corvision conversion replacement modeler/code generator commercial service former corvision clients information available cv2vb website brief explanation application development using corvison first step developing application corvision fill parameters control miscellaneous aspects concerning application-wide functions parameters fall five groupings follows usually default values parameters satisfactory corvision however allows setting changed time development parameters file wp accessed runtime latest setting always used corvision keeps information behind status screen up-to-date indicates current state development process left hand side indicates specification tasks need right hand side indicates generation tasks need changes additions specification cause changes dictionary datasets keys dictionary datasets keys screens reports menus corvision provides useful feature called field search field search allows investigate analyze use fields different aspects application allows developers assess impact changes made provide complete specification details hardcopy form corvision run reports option 80 different types report produced component specification reports csrs known also produced tentative unreferenced unresolved items key corvision procedures procedures corvision eventually become executable images .edo three types procedures essentially true consider procedure program fact procedure set instructions builder commands build program program builder actually called process program procedure therefore set builder commands instruct builder build process save program library compiled file .sav extension corvision keeps data structure files separate manipulated builder builder keeps structure file key structure file dataset used application process compiled data structures bound process time thus binding data structures takes place precise moment process compiled structure key structure files kept separate dataset definitions altered development major strength corvision allowing prototyping environment code data structures changed throughout development brought together compile time structure key structure files loaded process compiled done load file builder makes assumption data structures already loaded compiles process point compilation binds data structures code following files created following files also added following files created compiling
[ 11075, 3142, 9286, 8393, 4042, 5677, 10413, 847, 6129, 5492, 11604, 987, 11228, 10590 ]
Test
3,231
4
Qualified_digital_certificate:qualified digital certificate context regulation eu 910/2014 eidas qualified digital certificate public key certificate issued qualified trust service provider ensures authenticity data integrity electronic signature accompanying message and/or attached data eidas defines several tiers electronic signatures used conducting public sector private transactions within across borders eu member states qualified digital certificate addition specific services provided qualified trust service provider required elevate status electronic signature considered qualified electronic signature using cryptography digital certificate also known public key certificate contains information link owner digital signature trust entity verifies authenticity content signed according eidas considered qualified digital certificate certificate must meet requirements provided annex regulation eu 910/2014 including limited need non-repudiation authentication electronic signatures originally addressed electronic signatures directive 1999/93/ec help facilitate secure transactions specifically occur across borders eu member states eidas regulation later replaced directive defined standards used creation qualified digital certificates trust service providers qualified digital certificate issued qualified trust service provider received authorization member state ’ supervisory body provide qualified trust services creating qualified electronic signatures provider must listed upon eu trust list otherwise permitted provide qualified digital certificates qualified trust services trust service provider required abide guidelines established eidas creating qualified digital certificate include court qualified electronic signature provided highest level probative value makes difficult refute authorship qualified electronic signature along qualified certificate given consideration handwritten signature used evidence legal proceedings validity qualified electronic signature created qualified certificate must accepted eu member states regardless member state signature produced parts world similar concepts created define standards electronic signatures switzerland digital signing standard zertes comparable standards address conformity regulation trust service providers product digital certificates united states nist digital signature standard dss provide comparable standard regulating qualified certificates would address non-repudiation signatory ’ qualified certificate amendment nist dss currently discussed would in-line eidas zertes handle trusted services
[ 3264, 9576, 2286, 5200, 9744, 8018, 1496, 5433, 1821 ]
Test
3,232
7
Logging_as_a_service:logging service logging service laas architectural model centrally ingesting collecting type log files coming given source location servers applications devices etc files normalized filtered reformatting forwarding dependent systems processed “ native ” data managed displayed ultimately disposed according predesignated retention schedule based number criteria enterprise situation datacenter becomes hub log files normalization managed service provider msp environment log sources would coming applications outside enterprise still hosted managed msp needed model datacenter acts private cloud concept cloud computing provision logs various stakeholders within organization future forensics analysis identify risks patterns activity predict behaviors based data collected within logs becomes hub service stakeholders become beneficiaries centralized data form alerts reports periphery applications predictive analysis insight big data graphical display
[ 4194 ]
Test
3,233
9
AmigaBASIC:amigabasic amigabasic interpreted basic programming language implementation amiga designed written microsoft amigabasic shipped amigaos versions 1.1 1.3 succeeded metacomco abasic included amigaos 1.0 1.1 superseded arexx rexx-style scripting language amigaos version 2.0 onwards amigabasic provided common basic language also attempted provide easy-to-use api amiga unique graphics sound capabilities object commands example made easy create moving objects – sprites bobs could drawn external drawing program object editor supplied amigabasic unusual feature language theoretically allowed calling handwritten assembly language subprograms however feature never worked bug failed align assembly language instructions correctly word boundary required amiga native mc68000 processor compute popular computer magazine published amigabasic still shipped included many amigabasic type programs articles typically implementations simple programs rudimentary games system file utilities desk accessories analog clocks address books amigabasic rendered obsolete incompatibilities amigaos 2.0 hardware successors motorola 68000 cpu incompatibilities due disregard programming guidelines set forth commodore however number third-party compiled basic languages released amiga could compile amigabasic programs minimal changes like a/c basic cursor see compiled basics continued work amigaos 2.0 compiled rather interpreted generally ran much faster original although amigabasic superseded arexx amigaos 2.0 two languages different functions capabilities hobbyist programmers changed time amigaos 2.0 release likely interested scripting existing third party applications writing new programs entirely scratch arexx seen better fitting needs basic along microsoft similar basic apple macintosh amigabasic first basic interpreter require line numbers adopting instead top-down approach executing lines code labels indicate goto instruction jump however programs contained line numbers able run line numbers simply treated labels purpose flow control also first microsoft interpreted language capable calling os functions dynamic libraries command library example codice_1 command invokes standard amiga graphics.library call functions go one better adding following line amiga say hello world using speech synthesis addition displaying screen
[ 3718, 139, 7691, 1805, 9997, 5264, 2193, 786, 9236, 11412, 22, 3736, 3481, 9881, 797, 9249, 11683, 5925, 8101, 4136, 8618, 10666, 6062, 303, 432, 7343, 8369, 8115, 8494, 9780, 11315, 4152, 315, 6075, 7355, 7486, 7870, 4160, 4674, 11076, ...
None
3,234
4
Heap_feng_shui:heap feng shui computer security heap feng shui technique used exploits facilitate arbitrary code execution technique attempts manipulate layout heap making heap allocations carefully selected sizes named feng shui ancient chinese system aesthetics involves selection precise alignments space term general used describe variety techniques bypassing heap protection strategies paper often credited naming technique heap feng shui javascript used refer exploit dangling pointer aligned portion attacker-controlled chunk however also found usage capture flag events describe attacks exploit characteristics heap layout spacing chunks
[ 1954, 3270, 8167, 10894, 3473, 5682, 11537, 2558 ]
Test
3,235
3
Architecture_of_Windows_NT:architecture windows nt architecture windows nt line operating systems produced sold microsoft layered design consists two main components user mode kernel mode preemptive reentrant multitasking operating system designed work uniprocessor symmetrical multiprocessor smp -based computers process input/output i/o requests use packet-driven i/o utilizes i/o request packets irps asynchronous i/o starting windows xp microsoft began making 64-bit versions windows available 32-bit versions operating systems programs subsystems user mode limited terms system resources access kernel mode unrestricted access system memory external devices kernel mode windows nt full access hardware system resources computer windows nt kernel hybrid kernel architecture comprises simple kernel hardware abstraction layer hal drivers range services collectively named executive exist kernel mode user mode windows nt made subsystems capable passing i/o requests appropriate kernel mode device drivers using i/o manager user mode layer windows nt made environment subsystems run applications written many different types operating systems integral subsystem operates system-specific functions behalf environment subsystems kernel mode stops user mode services applications accessing critical areas operating system access executive interfaces user mode subsystems deal i/o object management security process management kernel sits hardware abstraction layer executive provide multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching kernel also responsible initializing device drivers bootup kernel mode drivers exist three levels highest level drivers intermediate drivers low-level drivers windows driver model wdm exists intermediate layer mainly designed binary source compatible windows 98 windows 2000 lowest level drivers either legacy windows nt device drivers control device directly plug play pnp hardware bus user mode made various system-defined processes dlls interface user mode applications operating system kernel functions called environment subsystem windows nt one implementing different api set mechanism designed support applications written many different types operating systems none environment subsystems directly access hardware access hardware functions done calling kernel mode routines four main environment subsystems win32 subsystem os/2 subsystem windows subsystem linux posix subsystem security subsystem deals security tokens grants denies access user accounts based resource permissions handles login requests initiates login authentication determines system resources need audited windows nt also looks active directory workstation service implements network redirector client side windows file print sharing implements local requests remote files printers redirecting appropriate servers network conversely server service allows computers network access file shares shared printers offered local system windows nt kernel mode full access hardware system resources computer runs code protected memory area controls access scheduling thread prioritization memory management interaction hardware kernel mode stops user mode services applications accessing critical areas operating system access user mode processes must ask kernel mode perform operations behalf x86 architecture supports four different privilege levels numbered 0 3 two extreme privilege levels used usermode programs run cpl 3 kernel runs cpl 0 two levels often referred ring 3 ring 0 respectively design decision done achieve code portability risc platforms support two privilege levels though breaks compatibility os/2 applications contain i/o privilege segments attempt directly access hardware code running kernel mode includes executive made many modules specific tasks kernel provides low-level services used executive hardware abstraction layer hal kernel drivers windows executive services make low-level kernel-mode portion contained file ntoskrnl.exe deals i/o object management security process management divided several subsystems among cache manager configuration manager i/o manager local procedure call lpc memory manager object manager process structure security reference monitor srm grouped together components called executive services internal name ex system services internal name nt i.e. system calls implemented level except call directly kernel layer better performance term service context generally refers callable routine set callable routines distinct concept service process user mode component somewhat analogous daemon unix-like operating systems kernel sits hal executive provides multiprocessor synchronization thread interrupt scheduling dispatching trap handling exception dispatching also responsible initializing device drivers bootup necessary get operating system running kernel performs almost tasks traditional microkernel strict distinction executive kernel prominent remnant original microkernel design historical design documentation consistently refers kernel component microkernel kernel often interfaces process manager level abstraction kernel never calls process manager way around save handful corner cases still never point functional dependence windows nt uses kernel-mode device drivers enable interact hardware devices drivers well defined system routines internal routines exports rest operating system devices seen user mode code file object i/o manager though i/o manager devices seen device objects defines either file device driver objects kernel mode drivers exist three levels highest level drivers intermediate drivers low level drivers highest level drivers file system drivers fat ntfs rely intermediate drivers intermediate drivers consist function drivers—or main driver device—that optionally sandwiched lower higher level filter drivers function driver relies bus driver—or driver services bus controller adapter bridge—which optional bus filter driver sits function driver intermediate drivers rely lowest level drivers function windows driver model wdm exists intermediate layer lowest level drivers either legacy windows nt device drivers control device directly pnp hardware bus lower level drivers directly control hardware rely drivers windows nt hardware abstraction layer hal layer physical hardware computer rest operating system designed hide differences hardware provide consistent platform kernel run hal includes hardware-specific code controls i/o interfaces interrupt controllers multiple processors however despite purpose designated place within architecture hal n't layer sits entirely kernel way kernel sits executive known hal implementations depend measure kernel even executive practice means kernel hal variants come matching sets specifically constructed work together particular hardware abstraction involve abstracting instruction set generally falls wider concept portability abstracting instruction set necessary handling several revisions x86 instruction set emulating missing math coprocessor performed kernel via hardware virtualization
[ 11270, 5643, 4624, 7187, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 7728, 2101, 8246, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 7760, 9808, 4178, 10839, 603, 9819, 93, 1632, 3170, 8301, 622, 9839, 4210, 7796, 1656, 6265, 5754...
Test
3,236
8
JackBe:jackbe jackbe corporation privately held vendor enterprise mashup software real-time intelligence applications august 2013 jackbe acquired software ag jackbe flagship product enterprise mashup platform called presto used enterprise mashups business management dashboards real-time intelligence applications jackbe ’ main product presto enterprise mashup platform presto provides real-time intelligence functionality self-service on-demand data integration business dashboards jackbe launched cloud computing-based version presto product march 2010 hosted amazon ec2 jackbe launched mashup sites sharepoint mss july 2010 jackbe announced enterprise app depot 2010 platform creating internal application directories enterprise app depot aimed non-developers business users allowing create new business applications share applications users industry analyst joe mckendrick described enterprise app store cool idea zdnet
[ 4194 ]
None
3,237
8
Nginx:nginx nginx like engine x stylized nginx nginx web server also used reverse proxy load balancer mail proxy http cache software created igor sysoev first publicly released 2004 company name founded 2011 provide support nginx plus paid software nginx free open-source software released terms bsd-like license large fraction web servers use nginx often load balancer march 2019 nginx company acquired f5 networks 670 million netcraft estimated nginx served 32 active websites ranked ranking first apache 29 top million websites neither ranked first ranked first 33 sources still estimate apache ahead overall according netcraft november 2016 web server survey nginx found second widely used web server across active sites 18.22 surveyed sites top million busiest sites 27.83 surveyed sites according w3techs used 37.7 top 1 million websites 49.7 top 100,000 websites 57.0 top 10,000 websites according builtwith used 38.2 top 10,000 websites growth within top 10k 100k 1 million segments increased 2018 survey docker usage found nginx commonly deployed technology docker containers wikipedia uses nginx ssl termination proxy openbsd release 5.2 1 november 2012 nginx became part openbsd base system providing alternative system fork apache 1.3 intended replace later replaced openbsd httpd 8 nginx deployed serve dynamic http content network using fastcgi scgi handlers scripts wsgi application servers phusion passenger modules serve software load balancer nginx uses asynchronous event-driven approach rather threads handle requests nginx modular event-driven architecture provide predictable performance high loads nginx default configuration file codice_1 features include upgrading executable configuration without client connections loss module-based architecture core third-party module support paid plus product includes additional features advanced load balancing access expanded suite metrics performance monitoring two versions nginx oss nginx nginx plus nginx plus offers additional features included oss nginx active health checks session persistence based cookies dns service discovery integration cache purging api appdynamic datalog dynatrace new relic plug-ins active-active ha config sync key-value store on-the-fly zero downtime updates upstream configurations key‑value stores using nginx plus api web application firewall waf dynamic module nginx written explicit goal outperforming apache web server box serving static files nginx uses dramatically less memory apache handle roughly four times many requests per second however performance boost comes cost decreased flexibility ability override systemwide access settings per-file basis apache accomplishes .htaccess file nginx feature built nginx also reputation harder install configure apache formerly adding third party modules nginx required recompiling application source modules statically linked partially overcome version 1.9.11 february 2016 addition dynamic module loading however modules still must compiled time nginx modules compatible system—some require older static linking process nginx generally considered less stable windows server linux apache equal support igor sysoev began development nginx 2002 originally nginx developed solve c10k problem fill needs websites including rambler search engine portal serving 500 million requests per day september 2008 nginx inc. founded july 2011 sysoev provide commercial products support software company principal place business san francisco california legally incorporated british virgin islands october 2011 nginx raised 3 million bv capital runa capital msd capital michael dell venture fund company announced commercial support options companies using nginx production nginx offered commercial support february 2012 paid nginx plus subscription august 2013 support packages focus installation configuration performance improvement etc support includes proactive notifications major changes security patches updates patches wordpress developer automattic inc. content delivery network provider maxcdn became funding partners update google spdy version 3.1 slated early 2014 nginx also offers consulting services assist customers custom configuration adding additional features october 2013 nginx raised 10 million series b investment round led new enterprise associates round included previous investors well aaron levie ceo founder box.com december 2014 nginx raised 20 million series b1 round led new enterprise associates participation e.ventures formerly bv capital runa capital index ventures nginx ceo gus robertson october 2017 nginx inc. announced general available nginx amplify saas providing monitoring analytics capabilities nginx september 2017 nginx announced api management tool nginx controller would build api gateway nginx plus june 2018 nginx raised 43 million series c funding round led goldman sachs accelerate application modernization digital transformation enterprises 11 march 2019 f5 networks acquired nginx
[ 2060, 9229, 10254, 7695, 1556, 7702, 2596, 8745, 44, 10800, 2098, 9780, 5178, 6714, 4668, 10815, 64, 595, 4186, 6246, 9320, 9834, 11376, 9844, 4725, 11386, 3707, 8350, 3746, 8358, 4777, 7338, 9387, 11439, 9909, 1206, 5815, 5314, 711, 225,...
Test
3,238
3
Plug_compatible:plug compatible plug compatible refers hardware designed perform exactly like another vendor product term pcm refer term pcm originally applied manufacturers made replacements ibm peripherals later term used refer ibm-compatible computers rise pcm peripheral industry computing systems either many peripherals originally designed used specific central processing unit cpu term pcm originally applied manufacturers made replacements ibm peripherals first example plug compatible ibm subsystems tape drives controls offered telex beginning 1965 memorex 1968 first enter ibm plug-compatible disk followed shortly thereafter number suppliers cdc itel storage technology corporation boosted world largest user computing equipment directions ultimately plug-compatible products offered peripherals system main memory plug-compatible machine one designed backward compatible prior machine particular new computer system plug-compatible connectors protocol interfaces peripherals also binary-code compatibility—it runs software old system plug compatible manufacturer pcm company makes products one recurring theme plug-compatible systems ability bug compatible well forerunner system software interface problems successor must simulate problems otherwise new system may generate unpredictable results defeating full compatibility objective thus important customers understand difference bug feature latter defined intentional modification previous system e.g higher speed lighter weight smaller package better operator controls etc. original example pcm mainframes amdahl 470 mainframe computer plug-compatible ibm system 360 370 costing millions dollars develop ibm customer could literally remove 360 370 friday install amdahl 470 attach connectors peripherals channel interfaces new mainframe running software sunday night unfortunately system status indicators operators new system different introduced learning curve operators service technicians similar systems available comparex fujitsu hitachi large systems system vendors eventually left pcm market term may also used define replacement criteria components available multiple sources example plug-compatible cooling fan may need physical size shape also similar capability run voltage use similar power attach standard electrical connector similar mounting arrangements non-conforming units may re-packaged modified meet plug-compatible requirements adapter plate provided mounting different tool instructions supplied installation modifications would reflected bill materials components similar issues arise computer system interfaces competitors wish offer easy upgrade path general plug-compatible systems designed industry de facto standards rigorously defined environment large installed population machines benefit third-party enhancements plug compatible mean identical replacement however nothing prevents company developing follow-on products backward-compatible early products
[ 6020, 8474, 8301, 9137, 9363, 10803, 8502, 6618, 3323, 1501 ]
None
3,239
7
Benchmark_Email:benchmark email benchmark email international internet-based service provider email marketing headquarters los alamitos ca company founded curt denise keller 2004 company offers various free paid editions benchmark member returnpath.net email sender provider coalition industry consortiums expansion international markets pursued company translating software english spanish french german chinese japanese portuguese italian establishing offices philippines japan china india spain taiwan italy among several countries recently website also launched french 2017 benchmark email named one 20 b2b technologies try 2017 forbes
[]
Test
3,240
1
Relational_data_mining:relational data mining relational data mining data mining technique relational databases unlike traditional data mining algorithms look patterns single table propositional patterns relational data mining algorithms look patterns among multiple tables relational patterns types propositional patterns corresponding relational patterns example relational classification rules relational classification relational regression tree relational association rules several approaches relational data mining multi-relation association rules multi-relation association rules mrar new class association rules contrast primitive simple even multi-relational association rules usually extracted multi-relational databases rule item consists one entity several relations relations indicate indirect relationship entities consider following mrar first item consists three relations live nearby humid “ live place near city humid climate type also younger 20 health condition good ” association rules extractable rdbms data semantic web data
[ 2901 ]
Test
3,241
2
A/UX:a/ux a/ux discontinued unix-based operating system apple computer custom integrated system 7 graphical interface application compatibility launched 1988 discontinued 1995 version 3.1.1 apple first official unix-based operating system a/ux requires select models 68k-based macintosh fpu paged memory management unit pmmu including macintosh ii se/30 quadra centris series predecessor macos variant unix currently bundled apple desktop computers described infoworld open systems solution macintosh heart operating system based unix system v release 2.2 includes additional features system v releases 3 4 bsd versions 4.2 4.3 posix system v interface definition svid compliant includes tcp/ip networking version 2 onward unix-compatible posix-compliant operating system made possible apple bid large contracts supply computers u.s. federal government institutes a/ux provides graphical user interface including familiar finder windows menus controls a/ux finder customized version system 7 finder adapted run unix process designed interact underlying unix file systems a/ux includes codice_1 terminal program offers command line interface underlying unix system x window system server application called macx terminal program also used interface system run x applications alongside finder alternatively user choose run fullscreen x11r4 session without finder apple compatibility layer allows a/ux run macintosh system 7.0.1 unix hybrid applications hybrid application uses functions macintosh toolbox unix system example run macintosh application calls unix system functions unix application calls macintosh toolbox functions quickdraw hypercard stack graphical frontend command-line unix application a/ux compatibility layer uses existing toolbox functions computer ’ rom function calls translated native unix system calls cooperatively multitasks macintosh apps single address space using token-passing system access toolbox a/ux includes utility called codice_2 similar tool name included macintosh programmer workshop assist users entering unix commands opening unix executable file finder opens dialog box allows user choose command-line options program using standard controls radio buttons check boxes display resulting command line argument user executing command program feature intended ease learning curve users new unix decrease user reliance unix manual a/ux utility allows user reformat third-party scsi drives way used macs era a/ux runs 68k-based macintoshes floating point unit fpu paged memory management unit pmmu even runs select models example quadra 840av apple fastest 68k macintosh run a/ux a/ux 1.0 announced february 1988 uniforum conference seven months behind schedule initially aimed existing unix customers universities vars. ref name= apple breaks unix market a/ux /ref system initially sold pre-installed macintosh ii although one could add larger monitor higher price purchase kit upgrading existing mac ii lower price third-party software announced system first release includes ingres database statview developer tools various productivity software packages based unix system v.2.2 additional features bsd unix networking support included tcp/ip appletalk nfs implementations developed unisoft base system gui running command line capable running single mac program time using system 6 interface although 10 existing mac software would run released 1989 a/ux 1.1 supplies basic gui system 6 finder chooser desk accessories control panels provisions unix x window system x11r3 gui draft 12 posix standard overall improved speed comparable low end sun workstation. ref name= a/ux release 1.1 supports x window /ref first posix compliant platform allowed apple join growing list industry heavyweights allowed us federal government burgeoning 6 billion bid market 1991 based aim alliance apple envisioned a/ux becoming basis drastically scaling concept macintosh system architecture application compatibility across computing industry personal enterprise markets apple formed new business division enterprise systems led director jim groff serve large businesses government higher education basing division upon maturing a/ux groff admitted apple major player unix market performed merely quiet marketing operating system fully intended become major player broad-based marketing objectives 1992 apple believed alliance ibm would merge a/ux aix system 7—thus ultimately scaling execution macintosh applications mac desktops ibm huge rs/6000 systems november 1991 apple launched a/ux 3.0 planning synchronize two ongoing release schedules a/ux system 7 time company also preannounced a/ux 4.0 expected release 1993 1994 announcement expounded upon historic technology partnership apple ibm expecting merge apple user-friendly graphical interface desktop applications market ibm highly scalable unix server market allowing two companies enter apple believed emerging general desktop open systems market upcoming a/ux 4.0 would target poweropen environment abi merge features ibm aix variant unix a/ux use osf/1 kernel open software foundation a/ux 3.0 would serve important migration path new system making unix system 7 applications compliant poweropen specification future a/ux 4.0 aix operating systems intended run variety ibm power powerpc hardware apple powerpc-based hardware april 1992 c2-level secure version a/ux released coincidentally aim alliance launched apple/ibm partner corporation taligent inc. one month earlier mission bringing pink market grandly universal operating system application framework contrary announcements apple eventually abandoned plans a/ux 4.0 never releasing product 1995 company withdrew taligent partnership poweropen discontinued 1996 discontinued two-year copland project intended become mac os 8 host taligent software 1996 1997 company deployed short-lived platform apple network server systems based upon powerpc hardware customized ibm aix operating system company overall failed operating system strategy left badly aged system 7 successor following apple 1996 acquisition next apple introduced 1999 mac os x server descendant unix-based nextstep operating system final release a/ux version 3.1.1 1995 apple abandoned a/ux platform completely 1996 a/ux 1.0 criticized 1988 infoworld review largely command-driven user interface unix variants rather graphical system 6 networking support praised though byte 1989 listed a/ux 1.1 among excellence winners byte awards stating could make unix multitasking operating system choice next decade challenge os/2 compared contemporary workstations unix vendors however macintosh hardware lacks features demand paging first two versions a/ux consequently suffer poor performance poor sales users also complained amount disk space uses standard macintosh though comparable unix system august 1992 issue infoworld author favorably reviewed a/ux 3.0 describing open systems solution macintosh heart apple finally gets unix right praised gui single-button point-and-click installer one year personal tech support graphical help dialogs user manuals saying a/ux defies stereotype unix difficult use easiest version unix learn list price much higher much weaker competing pc operating systems system 7 os/2 ms-dos windows 3.1 low compared prevailing proprietary unix licenses review found system speed acceptable great even fastest quadra 950 blaming software incomplete unix optimization found apple hardware though good value system price-performance ratio judged altogether uncompetitive sun sparcstation 2 reviewers thought unlikely users want buy macs run a/ux would awarded infoworld top score os proprietary macintosh hardware tony bove bove rhodes report generally complained f unix super-users compelling reason buy apple unix apple a/ux always way sell macs unix check-off item users a/ux requires specific raw hardware access execution a/ux within macintosh emulation software impossible 2014 introduction macintosh ii emulator named shoebill vintage a/ux users one central repository a/ux applications internet server nasa called jagubox administered jim jagielski also editor a/ux faq
[ 2560, 7682, 10755, 9732, 8207, 4114, 6675, 8725, 1561, 8222, 9762, 6186, 8754, 7224, 9784, 1595, 8767, 576, 8774, 2120, 6218, 2132, 86, 1623, 9308, 3167, 3681, 5731, 11363, 7269, 6760, 633, 6780, 7806, 640, 2179, 132, 4741, 6787, 6283, ...
Validation
3,242
4
System_Reconfiguration_Attacks:system reconfiguration attacks system reconfiguration attacks modify settings user ’ pc malicious purposes example urls favorites file might modified direct users look-alike websites e.g. bank website url may changed “ bankofabc.com ” “ bancofabc.com ” بتعديل الإعدادات على جهاز الكمبيوتر الخاص بالمستخدم والهدف من هذا التعديل أهداف ضارة system reconfiguration attacks تقوم هجمات إعادة تهيئة النظام
[ 2945, 2558 ]
Validation
3,243
4
Agnitum:agnitum agnitum ltd founded 1999 st. petersburg russia software company 2000 agnitum hired 2 developers increased number staff people 20 2002 agnitum originally focused anti-trojan pc connections monitoring solutions targeted windows pcs users company known mostly personal firewall internet security products provider outpost firewall pro flagship product company released 2002 together freeware solution updated 2009 agnitum products mostly consumer-oriented taking account licensing agnitum products technologies several national security software publishers january 14 2016 agnitum confirmed official blog company acquired yandex december 2015 february 28 2017 final phase sale yandex agnitum site user forum shut agnitum established software producer 1999 st. petersburg russia two students baltic state technical university distributing software online shareware agnitum sold niche software entering 2002 pc firewalls market agnitum software become rather popular 2002 agnitum began formally implement international distribution strategy putting place agreements partners major european markets well germany italy spain poland 2003 2006 agnitum strengthened european american far east market positions personal firewall engine company became basis company products thus integrated several firms security solutions partnering security vendors provide personal firewall anti-spyware technologies 2003-2006 agnitum announced contracts anti-virus solutions vendors whole re-branded software part vendor suite sophos uk usa lavasoft sweden novell usa virusbuster hungary others 2006 agnitum criticized microsoft onecare firewall agnitum claimed leaks faced simplest attacks programs test firewalls leaks agnitum chief software architect posted less-than-glowing assessment microsoft windows firewall part company entry security software business 2006 agnitum entered strategic alliance virusbuster experienced anti-virus vendor hungary agnitum aimed enter market internet security suite solutions compete anti-virus vendors kaspersky zonelabs etc already integrated personal firewalls personal security solutions mostly personal anti-viruses additional spyware adware spam web content filtering engines 2007-2008 agnitum finally entered market anti-virus solutions anti-virus products began participating international domestic test labs tests virus bulletin vb100 anti-malware.ru anti-virus tests outpost firewall pro tested leaktests killtests independent research portals 2009 2010 agnitum released 2 freeware editions outpost software outpost firewall pro free edition outpost security suite free continue competition well-known zonealarm comodo free pc firewall vendors agnitum first software products anti-trojan tool tauscan pc connections monitoring tool jammer anti-trojan software tauscan occasionally achieved attention media received awards jammer focused detecting blocking attacks hackers prototype outpost personal firewall launched simultaneously “ free ” “ pro ” versions march 2002 march 2007 agnitum released free anti-spam plug-in filtering microsoft outlook outlook express mail supports bat since 2008 may 2007 agnitum released combined internet security suite solution — outpost security suite pro ossp proactive solution basis outpost firewall agnitum anti-spam licensed anti-virus combined agnitum anti-spyware october 2007 agnitum released microsoft vista-compatible outpost 2008 products outpost firewall pro began pass leak-tests kill-tests matousec transparent security firewall challenge project independent project proactive security software testing 2010 agnitum released extension freeware solution outpost security suite free include anti-virus anti-spyware anti-spam free internet security suite moment agnitum security products available following languages english german french spanish russian default also lot localized outpost software versions like italian polish hungarian japanese traditional simplified chinese korean turkish dutch brazilian portuguese agnitum firewall anti-spyware anti-virus engines became almost independent products several security companies licensing agnitum technologies integrate products list companies made publicity licensing novell novell os client security agent sophos corporate edition client agent bullguard internet security solution lavasoft personal firewall client agent cat/quickheal indian anti-virus solutions vendor total security solution
[ 2049, 1052, 550, 10790, 2601, 6699, 8753, 569, 5178, 10308, 2118, 2654, 8816, 10872, 9341, 127, 7809, 131, 6797, 1172, 156, 2721, 2213, 6823, 1708, 6834, 704, 10433, 7362, 202, 4814, 9423, 1242, 6364, 5860, 6382, 8943, 9971, 1273, 9983, ...
Validation
3,244
9
System/34_BASIC:system/34 basic ibm system/34 basic interpreter ibm system/34 midrange computer system/34 basic first offered 1978 contained many trappings basic program would encountered time period trs-80 many offerings seventies early eighties s/34 basic uses conventions longer standard modern basics line numbers support newer features while/wend do/enddo with/end procedures properties forth basic interpreters written seventies tended odd things odd ways example apple ii programmer could embed dos command program via print prefaced character string chr 4 peek poke could used various basics examine memory content change even create ad hoc machine language program run system/34 basic tends stay away odd conventions however programmer could call alarm buzzing sound made terminal via print chr 7 basic statements expected entered capital letters operator press cmd2 use lowercase basic interpreter convert non-comment keywords uppercase basic could useful midrange computing environment ibm added extensions language specific hardware software conventions ibm system/34 family workstn file support indexed direct sequential disk files ability open close multiple printer files load/save libraries fixed disk core basic statements functions commands used advanced ibm-supplied statements included error error-trapping statement allows basic suspend error might otherwise stop basic program running perform error-handling routine instead variants include suffixing oflow zdiv error types statement immediately trap errors option allows basic program meet special criteria sometimes basic much user space since s/34 programs limited 64k area called code space contains current user program must reside within user space therefore users could choose option lprec causes basic compute double-precision long numerics option sprec provides space single-precision short numerics programmers prefer matrix mathematics lowest-numbered index 0 others prefer 1 option base 0 option base 1 accomplish uses option rpg ii programs s/34 could call basic programs could using chain statement chain passes control current basic module named module bearing list arguments become variables new module loaded def fn allows definition user function basic named referred program fnend placed last statement function four ways format basic input output first unformatted print input heart content second print using s/34 basic incorporate constant string variable line number label third print fields input fields place 5250-type display fields crt immediate mode fourth using workstation file opened open x ws name= forth performing various combinations write read workstation file using sda-generated screen formats similar s/34 applications write read well print using input using direct basic line number label contains keyword image image statement contains decimals commas dollar signs dashes pound signs representation substituted numeric alphameric values 3540 image form statement denotes size variables read written save numeric value .00 99,999.99 use notation 2959 form n 7.2 label tag line follows 260 begin_calculations 270 x 1 12 280 x*1.08 290 next x desired statement gosub begin_calculations used instead gosub 260 open close write rewrite delete append already familiar cobol programmers describe actions taken access s/34 disk files using basic n't possible access every single type s/34 file include system files libraries folders every user-created s/34 file fixed record length fortran programs use variable record lengths suffice disk files opened sequentially index relatively record number file delete-capable records deleted using delete statement add record use write append specified open statement update use rewrite s/34 basic print printer device file must used default printer file called 255 always exists basic started printer name basic255 opens device default printer terminal begins basic session desired possible create different printer file numbered 1 254 use open x printer name= forth specifying columns device id parameters needed pageoflow keyword used trap page overflow condition printer versions basic allow programmer sort array s/34 basic n't provide function provide interesting remedy programmer define array number elements target array use aidx didx create ascending descending index element new array contain number representing ordinal sorted position target array america sixth element array first alphabetical order setting aidx would cause 1 contain value 6 writing basic program much fun rewriting program time use therefore authors basic allow programmers save program code library member replace changes made save prog1 pgmrlib causes current module saved subroutine member type r named prog1 user library named pgmrlib note system/34 files part libraries disk file named fnf001 open statement like one work open 3 name=fnf001 sequential input n't matter library used access file fnf001 renumber s/34 basic command used renumber statements internal references statement numbers immediately recalculated system/34 basic dangerous command called free typing free followed filename deletes file without trace work every user file unless conflict security in-use condition blocks system/34 basic another dangerous command called lock lock command make current program source code inaccessible reversible always save unlocked copy using lock 1983 ibm announced system/36 family midrange computers system/34 basic system/36 basic similar however machine code incompatibility makes impossible port subroutine member basic program systems
[ 9714, 3323, 7421 ]
None
3,245
2
Freespire:freespire freespire community-driven linux distribution currently owned pc/open systems llc derived linspire composed mostly free open source software providing users choice including proprietary software including multimedia codecs device drivers application software freespire 1.0 based debian freespire 2.0 based ubuntu linspire bought xandros originally planned switch back debian future freespire releases january 1 2018 pc/open systems announced purchased linspire xandros released freespire 3.0 linspire 7 available 79.99 freespire 3.0 free august 2005 distribution live cd based linspire source pools named freespire hit web accident distribution created andrew betts produced released linspire inc. freespire confused users actual product linspire request linspire distribution adopted development codename squiggle began looking new name linspire back generated publicity offered users free linspire purchase price discounted 0 using coupon code freespire september 9 2005 squiggle os longer active development april 24 2006 linspire announced project named freespire new freespire distribution announced linspire president former ceo kevin carmony follows model fedora supported red hat community since 2003 novell also started similar community project name opensuse suse linux product line second half 2005 xandros acquired linspire/freespire summer 2008 xandros plans keep freespire community developed distribution similar opensuse fedora respective commercial distributions freespire 2.0.8 released 30 november 2007 based ubuntu 7.04 final release distribution revived 3.0 january 2018 distribution debian-based community-driven -supported project tied commercial linspire distribution freespire includes previously proprietary elements linspire click n run cnr client elements linspire licenses like windows media audio compatibility libraries remain proprietary closed source consequently two versions freespire one proprietary closed source libraries one called freespire oss edition includes mostly open-source components freespire number in-house programs written haskell ocaml iso image builder hardware detection autoconfiguration package autobuilder debian library also programs managing cgi
[ 9253, 11305, 56, 3131, 59, 4673, 3654, 1107, 1110, 5721, 4192, 3685, 10860, 9324, 2671, 3189, 5755, 11388, 1150, 8837, 6797, 10394, 673, 3745, 7854, 2738, 4790, 8907, 3791, 5343, 4841, 6890, 7913, 5356, 9455, 7920, 5363, 9971, 9461, 6393,...
Train
3,246
5
MDaemon:mdaemon mdaemon email server email server application groupware functions microsoft windows first released alt-n technologies 1996 mdaemon supports multiple client-side protocols including imap pop3 smtp/msa webmail caldav carddav optionally activesync mobile clients outlook connector outlook add-on mdaemon features include built-in spam filter heuristic bayesian analysis ssl tls encryption client-side server-side email attachment encryption public shared folder support mailing list support sharing groupware data calendar contacts tasks notes also basis mdaemon tech security gateway email servers according securityspace.com mail mx server survey june 2018 mdaemon provides approximately 1 percent known internet mail servers fifth largest installation base identified servers
[ 1125, 2695, 6762, 6797, 7983, 499, 2679 ]
Test
3,247
3
Sun_Enterprise:sun enterprise sun enterprise range unix server computers produced sun microsystems 1996 2001 line launched sun ultra enterprise series ultra prefix dropped around 1998 systems based 64-bit ultrasparc microprocessor architecture related contemporary ultra series computer workstations like ultra series run solaris various models single-processor entry-level servers large high-end multiprocessor servers produced enterprise brand phased favor sun fire model line 2001 onwards first ultrasparc-i-based servers produced sun launched 1995 ultraserver 1 ultraserver 2 server configurations ultra 1 ultra 2 workstations respectively later renamed ultra enterprise 1 ultra enterprise 2 consistency server models later joined ultra enterprise 150 comprises ultra 1 motherboard tower-style enclosure 12 internal disk bays 1998 sun launched server configurations ultrasparc-iii-based ultra 5 ultra 10 workstations called enterprise ultra 5s enterprise ultra 10s respectively sun enterprise 450 rack-mountable entry-level multiprocessor server launched 1997 capable four ultrasparc ii processors sun enterprise 250 two-processor version launched 1998 later joined enterprise 220r enterprise 420r rack-mount servers 1999 220r 420r models respectively based motherboards ultra 60 ultra 80 workstations 250 replaced sun fire v250 450 sun fire v880 220r superseded sun fire 280r 420r sun fire v480 1996 sun replaced sparcserver 1000e sparccenter 2000e models ultra enterprise 3000 4000 5000 6000 servers multiprocessor servers based common hardware architecture incorporating gigaplane packet-switched processor/memory bus ultrasparc-i ii processors high availability fault-tolerance features included x000 systems intended mission-critical applications 3000 model deskside server configurable six processors 10 internal disks 4000 rack-mount system 14 processors 5000 essentially 4000 rack cabinet 6000 cabinet-housed data center server 30 processors 1999 enterprise 3500 4500 5500 6500 models announced upgraded x000 systems faster gigaplane bus 100 mhz depending processor clock speed compared 83 mhz 3500 also differs 3000 additional gigaplane slot resulting increased maximum eight processors enterprise x500 series replaced sun fire 3800/4800/6800 line enterprise 10000 e10k starfire development code name also used marketing purposes high-end multiprocessor data center server capable configured 64 ultrasparc ii processors largely designed cray research business systems division successor cray superserver 6400 related sun earlier sun-4d architecture servers cray acquired silicon graphics 1996 division sold sun launched starfire ultra enterprise 10000 1997 starfire based around fault-tolerant gigaplane-xb processor/memory interconnect like x000 x500 series servers starfire incorporates many high-availability features including ability partitioned multiple domains booted individually run instance solaris also possible remove resources running domain short notice reassign freed resources domains domain granularity one cpu board single system may 1-16 single cpu board carry 4 processors 4gb ram 4 sbus io boards rare option replace 4 sbus boards dual pci boards starfire first server vendor exceed 2000 tpc-d 300 gb benchmark starfire systems used number high-profile customers dot-com boom notably ebay typically sold well 1 million fully configured system starfire contains one two controller modules connected via ethernet external computer system service processor ssp controller modules interface system centerplane via jtag control partitioning available cpus memory i/o devices one domains effect distinct computer system partitioned booted without original ssp contains encrypted keys issued manufacturer e10k preserved computer history museum mountain view starfire superseded sun fire 12k/15k models
[ 3328, 9090, 9731, 1801, 1675, 4235, 1809, 4241, 2710, 26, 1818, 8863, 7072, 9343, 8994, 1316, 10789, 1707, 2731, 5677, 6322, 2871, 4664, 4285, 6464, 7104, 6338, 9665, 10051, 10436, 8007, 1480, 2895, 3919, 597, 3285, 10327, 10200, 2269, 54...
Test
3,248
2
WatchOS:watchos watchos operating system apple watch developed apple inc based ios operating system many similar features released april 24 2015 along apple watch device runs watchos api called watchkit second version watchos 2 included support native third-party apps improvements released september 21 2015 third version watchos 3 released september 13 2016 emphasizing better performance including new watch faces stock apps fourth version watchos 4 released september 19 2017 fifth version watchos 5 released september 17 2018 adding third-party support new workouts along “ walkie-talkie ” feature sixth version watchos 6 announced june 3 2019 home screen rendered also known carousel composed circular application icons zoomed digital crown dragged launched touching display many apps miniaturized simplified versions ios counterparts prior watchos 3 glances provided fast access summarized view popular native third party applications used apple watch glances view opened swipe gesture watch face screen watchos 3 glances replaced redesigned control center much like one ios friends menu invoked side button acts dedicated dock apps different actions options appear depending user taps deep presses apple watch detects pressure-sensitive force touch display several years apple developing healthkit product bid change way people interact devices also conscious attempt penetrate lucrative healthcare wellness industry many observers believe hold huge growth opportunity apple confirmed jony ive apple chief designer interview said health crucial element apple watch since day inception developmental trajectory hardware watchos geared towards health-based capabilities ive pointed one primary apps shipped first watchos allowed users track communicate well encourage move exercise stand said many us phones us time ’ connected imagine something powerful times opportunities might present user opportunity phenomenal particularly ’ understand today terms technology capability headed.one recent updates watchos included applications keep users active also diagnose illnesses example app called deepheart deep learning network detect atrial fibrillation hypertension sleep apnea diabetes taps healthkit platform collect data particularly collected apple watch heart sensor watchos 5 first shown public san jose wwdc developer conference held apple instant watch-to-watch walkie-talkie mode first version watchos support first generation apple watch apple announced new version watchos contain features app store calculator tip tools audiobooks app apple voice memos app
[ 6155, 4114, 25, 6180, 6186, 4139, 8253, 8262, 2120, 6218, 8266, 6221, 2132, 4180, 10333, 97, 8303, 8304, 6264, 8316, 2179, 132, 6276, 10382, 6296, 2201, 10393, 4251, 6301, 2207, 2212, 171, 178, 6329, 4283, 8388, 10436, 2248, 8395, 2259, ...
Test
3,249
9
IBM_System/36_BASIC:ibm system/36 basic ibm system/36 basic interpreter ibm system/36 midrange computer system/36 basic first offered 1983 contained many trappings basic program would encountered time period ibm pc commodore 64 vic-20 trs-80 many offerings seventies early eighties s/36 basic uses conventions longer standard modern basics line numbers support newer features while/wend do/enddo with/end procedures properties forth basic interpreters written seventies tended odd things odd ways example apple ii programmer could embed command program via print prefaced character string chr 4 peek poke could used various basics examine memory content change even create ad hoc machine language program run system/36 basic tends stay away odd conventions however programmer could call alarm buzzing sound made terminal via print chr 7 basic statements expected entered capital letters operator press cmd2 use lowercase basic interpreter convert non-comment keywords uppercase basic could useful midrange computing environment ibm added extensions language specific hardware software conventions ibm system/36 family workstn file support indexed direct sequential disk files ability open close multiple printer files load/save libraries fixed disk core basic statements functions commands used advanced ibm-supplied statements included error error-trapping statement allows basic suspend error might otherwise stop basic program running perform error-handling routine instead variants include suffixing oflow zdiv error types statement immediately trap errors option allows basic program meet special criteria sometimes basic much user space since s/36 programs limited 64k area called code space contains current user program must reside within user space therefore users could choose option lprec causes basic compute double-precision long numerics option sprec provides space single-precision short numerics programmers prefer matrix mathematics lowest-numbered index 0 others prefer 1 option base 0 option base 1 accomplish uses option rpg ii programs s/34 s/36 could call basic programs could using chain statement chain passes control current basic module named module bearing list arguments become variables new module loaded def fn allows definition user function basic named referred program fnend placed last statement function four ways format basic input output first unformatted print input heart content second print using s/36 basic incorporate constant string variable line number label third print fields input fields place 5250-type display fields crt immediate mode fourth using workstation file opened open x ws name= forth performing various combinations write read workstation file using sda-generated screen formats similar s/36 applications write read well print using input using direct basic line number label contains keyword image image statement contains decimals commas dollar signs dashes pound signs representation substituted numeric alphameric values form statement denotes size variables read written save numeric value .00 99,999.99 use notation label tag line follows desired statement gosub begin_calculations used instead gosub 260 open close write rewrite delete append already familiar cobol programmers describe actions taken access s/36 disk files using basic n't possible access every single type s/36 file include system files libraries folders every user-created s/36 file fixed record length fortran programs use variable record lengths suffice disk files opened sequentially index relatively record number file delete-capable records deleted using delete statement add record use write append specified open statement update use rewrite s/36 basic print printer device file must used default printer file called 255 always exists basic started printer name basic255 opens device default printer terminal begins basic session desired possible create different printer file numbered 1 254 use open x printer name= forth specifying columns device id parameters needed pageoflow keyword used trap page overflow condition printer versions basic allow programmer sort array s/36 basic n't provide function provide interesting remedy programmer define array number elements target array use aidx didx create ascending descending index element new array contain number representing ordinal sorted position target array america sixth element array first alphabetical order setting didx would cause 6 contain value 1 writing basic program much fun rewriting program time use therefore authors basic allow programmers save program code library member replace changes made save prog1 pgmrlib causes current module saved subroutine member type r named prog1 user library named pgmrlib note system/36 files part libraries disk file named fnf001 open statement like one work n't matter library used access file fnf001 renumber s/36 basic command used renumber statements internal references statement numbers immediately recalculated system/36 basic dangerous command called free typing free followed filename deletes file without trace work every user file unless conflict security in-use condition blocks system/36 basic another dangerous command called lock lock command make current program source code inaccessible reversible always save unlocked copy using lock system/34 basic system/36 basic similar however machine code incompatibility makes impossible port subroutine member basic program systems see also square root 2 pi π solution solution published mainframes 1980s 1990s
[ 9714, 3323 ]
Test
3,250
3
Windows_NT_4.0:windows nt 4.0 windows nt 4.0 operating system part microsoft windows nt family operating systems released manufacturing july 31 1996 launched retail august 24 1996 microsoft primary business-oriented operating system introduction windows 2000 workstation server embedded editions sold editions feature graphical user interface similar windows 95 microsoft ended mainstream support windows nt 4.0 workstation june 30 2002 extended support june 30 2004 windows nt 4.0 server mainstream support ended december 31 2002 extended support december 31 2004 editions succeeded windows 2000 professional server respectively successor windows nt 3.51 windows nt 4.0 introduced user interface windows 95 windows nt family including windows shell file explorer known windows nt explorer time use nomenclature shell folders e.g computer also includes components introduced windows 95 internally windows nt 4.0 known shell update release sur many administrative tools notably user manager domains server manager domain name service manager still used old graphical user interfaces start menu windows nt 4.0 separated per-user shortcuts folders shared shortcuts folders separator line windows nt 4.0 includes enhancements microsoft plus windows 95 space cadet pinball table font smoothing showing window contents dragging high-color icons stretching wallpaper fit screen windows desktop update could also installed windows nt 4.0 update shell version install task scheduler windows nt 4.0 resource kit included desktop themes utility windows nt 4.0 preemptively multitasked 32-bit operating system designed work either uniprocessor symmetric multi-processor computers windows nt 4.0 last major release microsoft windows support alpha mips powerpc cpu architectures remained use businesses number years despite microsoft many efforts get customers upgrade windows 2000 newer versions also last release windows nt family branded windows nt although windows 2000 carried designation built nt technology although chief enhancement addition windows 95 shell several major performance scalability feature improvements core architecture kernel user32 com msrpc windows nt 4.0 also introduced concept system policies system policy editor important features server editions windows nt 4.0 include internet information services 2.0 microsoft frontpage 1.1 netshow services remote access service includes pptp server vpn functionality multi-protocol routing service new administrative wizards lite version network monitor utility shipped system management server enterprise edition introduced microsoft cluster server one significant difference previous versions windows nt graphics device interface gdi moved kernel mode rather user mode csrss process eliminated process-to-process context switch calling gdi functions resulting significant performance improvement windows nt 3.51 particularly graphical user interface however also mandated graphics printer drivers run kernel mode well resulting potential stability issues windows nt 4.0 first release microsoft windows include directx standard—version 2 shipped initial release windows nt 4.0 version 3 included release service pack 3 mid-1997 later versions directx released windows nt 4.0 however opengl supported used quake 3 unreal tournament early releases 4.0 numerous stability issues occur graphics printer vendors change drivers compatible kernel mode interfaces exported gdi change move gdi run process context caller prompted complaints nt workstation users real-time graphics performance change put considerable onus hardware manufacturers update device drivers windows nt 4.0 also included new windows task manager utility previous versions windows nt included task list utility shows applications currently desktop monitor cpu memory usage users forced use performance monitor task manager offers convenient way getting snapshot processes running system given time internet explorer 2 bundled windows nt 4 updated versions included service pack service pack 6 last service pack windows nt 4 included internet explorer 5.01 although also supports internet explorer 6.0 windows nt 4.0 upgraded ntvdm x86 emulation risc versions 286 486 sysprep introduced deployment tool windows nt 4.0 providing much greater stability windows 95 windows nt 4.0 less flexible desktop perspective much stability gained use protected memory hardware abstraction layer direct hardware access disallowed misbehaving programs terminated without needing computer restarted trade-off nt required much memory 32 mb normal desktop use 128 mb heavy 3d applications comparison consumer targeted products windows 95 nearly programs written windows 95 run windows nt many 3d games would partly limited directx support windows nt 4.0 third-party device drivers alternative access hardware directly poorly written drivers became frequent source infamous error known blue screen death bsod would require system restarted spite shipping year later windows 95 default plug play support device manager windows nt 4.0 greatly simplifies installation hardware devices although limited support could installed later many basic dos programs would run however graphical dos programs would run way accessed graphics hardware although windows nt 4.0 introduced application programming interface api defragmentation built-in defragmentation utility unlike windows 95 also windows nt 4.0 lacked usb support preliminary version would added oem editions windows 95 osr 2.1 difference nt family 9x family would remain release windows xp 2001 time apis — opengl directx — matured sufficiently efficient write common pc hardware hand hardware become powerful enough handle api processing overhead maximum amount supported physical random-access memory ram windows nt 4.0 4 gb maximum possible purely 32-bit x86 operating system comparison windows 95 fails boot computers approximately 480 mb memory like previous versions nt version 4.0 run multiple processor architectures windows 95 however run x86 windows nt 4.0 server included versions 4.0 4.5 backoffice small business server suite option pack available free-bundled cd starting around 1998 included iis 4.0 active server pages frontpage server extensions certificate server mts msmq cdonts internet authentication service ias indexing service microsoft management console 1.0 microsoft site server smtp nntp services new software several features distributed file system windows nt load balancing service wlbs delivered addons windows nt server 4.0 routing remote access service also downloadable feature replaced windows nt 4.0 separate ras multi-protocol routing services last version microsoft office compatible windows nt 4.0 office xp last version internet explorer compatible operating system internet explorer 6 sp1 service pack 6 6a required respectively windows nt 4.0 could directly upgraded windows 2000 windows xp professional windows nt 4.0 received seven service packs lifecycle well numerous service rollup packages option packs first service pack made available mips architecture service pack 3 final release powerpc architecture last full service pack service pack 6a sp6a service pack 7 planned one stage early 2001 became post sp6a security rollup full service pack released july 26 2001 16 months release windows 2000 nearly three months prior release windows xp addition bug fixes service packs also added multitude new features newer versions improvements internet information services public-key certificate authority functionality user accounts user profile improvements smart card support improved symmetric multiprocessing smp scalability clustering capabilities com support improvements user profile disk quotas event log service security configuration manager mmc snap-in ms-chapv2 ntlmv2 smb packet signing syskey boot improvements wins improvements routing remote access service rras pptp dcom/http tunneling improvements igmpv2 wmi active accessibility ntfs 3.0 support among others microsoft released five revisions windows nt 4.0 workstation server resource kit original release plus four supplements contained large number tools utilities desktops.exe allowed user multiple desktops well third-party software microsoft stopped providing security updates windows nt 4.0 workstation june 30 2004 windows nt 4.0 server december 31 2004 due major security flaws including microsoft security bulletin ms03-010 according microsoft could patched without significant changes core operating system according security bulletin due fundamental differences windows nt 4.0 windows 2000 successors infeasible rebuild software windows nt 4.0 eliminate vulnerability would require re-architecting significant amount windows nt 4.0 operating system ... would assurance applications designed run windows nt 4.0 would continue operate patched system june 2003 june 2007 127 security flaws identified patched windows 2000 server many may also affect windows nt 4.0 server however microsoft test security bulletins unsupported software
[ 2568, 10257, 6675, 8211, 11283, 9757, 11301, 6697, 1581, 9276, 11325, 9791, 7234, 582, 3142, 1098, 4174, 10839, 1113, 601, 8281, 8798, 7776, 10338, 8296, 5225, 8299, 5231, 7796, 6265, 8315, 636, 3197, 637, 639, 641, 7810, 2179, 8834, 651,...
None
3,251
8
Renewables.ninja:renewables.ninja renewables.ninja web tool developed imperial college london eth zürich shows estimate amount energy could generated wind solar farms location model tested iain staffell codeveloper renewables.ninja centre environmental policy imperial college london stefan pfenninger eth zürich estimate productivity wind farms planned construction europe next 20 years german electrical supplier rwe using test models output
[ 119 ]
Test
3,252
4
Christopher_Soghoian:christopher soghoian christopher soghoian born 1981 privacy researcher activist currently working senator ron wyden senator ’ senior advisor privacy cybersecurity 2012 2016 principal technologist american civil liberties union soghoian nephew sal soghoian former automation product manager apple inc. responsible applescript automator soghoian holds british us nationality received b.s james madison university computer science 2002 masters johns hopkins university security informatics 2005 phd indiana university informatics 2012 dissertation focused role third-party internet telecommunications service providers play facilitating law enforcement surveillance customers soghoian visiting fellow yale law school information society project ted senior fellow previously open society foundations fellow student fellow berkman center internet society harvard university soghoian research advocacy largely focused government surveillance research shed significant light use sophisticated surveillance technologies us law enforcement agencies exposing techniques public debate criticism august 2013 presentation hacker conference def con soghoian highlighted existence dedicated fbi team delivers malware computers mobile devices surveillance targets presentation soghoian stated discovered team reading heavily redacted government documents looking profiles ex-fbi contractors social network website linkedin october 2014 soghoian called attention fact fbi 2007 impersonated associated press effort deliver malware teenager washington state threatened bomb high school act deception strongly condemned leading news organizations including general counsel associated press february 2012 public speech soghoian criticized commercial market called zero-day security vulnerabilities topic yet receive significant attention mainstream press one month later soghoian quoted forbes lengthy article zero day market describing firms individuals sell software exploits “ modern-day merchants death ” selling “ bullets cyberwar. ” next several years several major media outlets published front-page stories industry often quotes soghoian criticizing providing hacking software governments december 2009 employee federal trade commission soghoian secretly audio recorded closed-door surveillance industry conference agency inspector general opened investigation soghoian conduct subsequently let go ftc recording executive sprint nextel revealed company created special website law enforcement agents obtain gps information subscribers website used process 8 million requests previous year recording subsequently cited alex kozinski chief judge ninth circuit court appeals u.s. v. pineda-moreno support view 1984 may come bit later predicted last june 2009 soghoian co-authored open letter google 37 prominent security privacy experts urging company protect privacy customers enabling https encryption default gmail cloud based services january 2010 google enabled https default users gmail subsequently products including search according google already considering https default soghoian recent years continued https advocacy calling news media law firms government agencies organizations encrypt websites may 2011 soghoian approached public relations firm burson-marsteller asked write anti-google op-ed criticizing company privacy issues associated social search product soghoian refused instead published email conversation subsequent investigation journalists revealed pr firm refused identify client soghoian retained facebook may 2011 soghoian filed complaint ftc claimed online backup service dropbox deceiving customers security services soon soghoian first publicly voiced concerns dropbox updated terms service privacy policy make clear company fact encrypt user data key known user company disclose users private data forced law enforcement agencies october 2010 soghoian filed complaint ftc claimed google intentionally leaking search queries sites users visited clicked link search results page two weeks later law firm filed class action lawsuit google practice lawsuit extensively quoted soghoian ftc complaint october 2011 google stopped leaking search queries sites users visited 2015 company settled search query leakage class action lawsuit 8.5 million dollars 2009 2010 worked us federal trade commission first ever in-house technical advisor division privacy identity protection ftc assisted investigations facebook twitter myspace netflix soghoian first gained public attention 2006 creator website generated fake airline boarding passes october 26 2006 soghoian created website allowed visitors generate fake boarding passes northwest airlines users could change boarding document name flight number city wished generator defaulted creating document osama bin laden soghoian claimed motivation website focus national attention ease passenger could evade no-fly lists information describing security vulnerabilities associated boarding pass modification widely publicized others including senator charles schumer d-ny security expert bruce schneier october 27 2006 then-congressman edward markey called soghoian arrest 2 october 28 2006 home raided agents fbi seize computers materials soghoian internet service provider voluntarily shut website received letter fbi claiming site posed national security threat october 29 2006 congressman markey issued revised statement stating soghoian go jail instead department homeland security put work fix boarding pass security flaws fbi closed criminal investigation november 2006 without filing charges tsa june 2007
[ 1315, 3495, 1783, 7515, 2110 ]
Validation
3,253
6
Opera_File_System:opera file system opera file system file system used 3do discs recently implemented linux operafs read copied clonecd v4.2 later
[ 9762 ]
None
3,254
1
SQL_programming_tool:sql programming tool field software sql programming tools provide platforms database administrators dbas application developers perform daily tasks efficiently accurately database administrators application developers often face constantly changing environments rarely completely control many changes result new development projects modifications existing code deployed production always produce expected result organizations better manage development projects teams develop code suppliers sql programming tools normally provide facility database administrator application developer aid database management quality code-deployment practices sql programming tools may include following features sql editors allow users edit execute sql statements may support following features tools may display information database objects relevant developers database administrators users may tools also provide features display dependencies among objects allow users expand dependent objects recursively example packages may reference views views generally reference tables super/subtypes database administrators application developers use session browsing tools view current activities user database check resource-usage individual users statistics information locked objects current running sql individual session dbas create edit delete disable enable user-accounts database using security-management tools dbas also assign roles system privileges object privileges storage-quotas users tools offer features debugging stored procedures step step step run exception breakpoints view set variables view call stack users debug program-unit without making modification including triggers object types monitoring tools may show database resources — usage summary service time summary recent activities top sessions session history top sql — easy-to-read graphs database administrators easily monitor health various components monitoring instance application developers may also make use tools diagnose correct application-performance problems well improve sql server performance test data generation tools populate database realistic test data server client side testing purposes also kind software upload sample blob files database
[ 2780, 10413, 10737, 2068, 9112, 9177, 5403, 7804 ]
Test
3,255
3
OpenPIC_and_MPIC:openpic mpic order compete intel advanced programmable interrupt controller apic enabled first intel 486-based multiprocessor systems early 1995 amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors openpic architecture least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic architecture amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specification reference ibm design processors share mpic dcr bus access bus controlled dcr arbiter mpic supports four processors 128 interrupt sources various implementations mpic included powerpc reference designs retail computers ibm used mpic based openpic 1.0 rs/6000 f50 one based openpic 1.2 rs/6000 s70 systems also used dual 8259 pci-isa bridges ibm mpic also used rs/6000 7046 model b50 apple hydra mac i/o mio chip 1990s classic mac os era implemented mpic alongside scsi controller adb controller geoport controller timers apple implementation open pic apple documentation era spells first mio chip common hardware reference platform based version 1.2 register specification supported two processors 20 interrupt sources mpic also incorporated newer k2 i/o controller used power mac g5s freescale also uses mpic compatible open pic powerquicc qoriq processors linux kernel-based virtual machine kvm supports virtualized mpic 256 interrupts based freescale variants
[ 576, 1058, 8439, 7065, 8058, 3323, 8700, 3294 ]
Test
3,256
3
Ikari_Warriors:ikari warriors ikari warriors vertically scrolling run gun shoot 'em arcade game developed snk published north america europe tradewest released 1986 originally titled japan ikari warriors snk first major breakthrough us release game released time many commando clones market distinguished ikari warriors rotary joysticks two-player mode player characters ikari warriors colonel ralf second lieutenant clark later king fighters series known outside japan paul vince ikari series battling hordes enemies according designer keiko iju game inspired popular rambo films takes name japanese title rambo ikari dasshutsu furious escape ralf clark also make appearance playable characters metal slug 6 metal slug 7 well king fighters series stan szczepanski holds official guinness world record 1,799,000 points player takes role commando-like warriors named ralf red clark blue must try reach village ikari enemy units attempting kill player include tanks enemy soldiers helicopters number power-ups along way help player achieve victory players must proceed bottom screen upwards towards village ikari trying prevent reaching village enemy soldiers units along way players may commandeer enemy tanks helicopters nes version help fight way enemy personnel tanks immune enemy bullets limited supply fuel sustain damage runs tank caught explosion taking player unless exit tank get clear blows helicopters two different weapons spread gun cannon may fly water rotating joystick changes direction character faced independent direction character moving controlled pushing joystick gives player freedom attack walk eight different directions shot fired directly front player warrior uses machine gun right hand throws grenades left player character takes long moving screen computer starts using call fire red spot appears tracking fire speed game ikari warriors first popular video game used rotary joysticks rotated addition pushed eight directions less successful tnk iii released 1985 also snk first used joysticks system also features two buttons one standard gun another lobbing grenades one games time allow two-player cooperative side-by-side gameplay use vehicles game cabinet standard upright model ikari warriors printed circuit boards pcbs manufactured two different versions snk pinout jamma pinout snk-pinout units put ikari warriors cabinets jamma-pinout units supplied conversion kits snk-pinout boards 22/44-pin edge connectors jamma-pinout pcbs 28/56-pin edge connectors types consist stack three boards interconnects ikari warriors uses snk model ls-30 joysticks contain 12-way rotary switch box joysticks connected pcb via auxiliary wiring harnesses game known simply ikari japan ikari warriors united states europe addition changing names main characters ralf clark paul vince military commander player rescues end game named general kawasaki japanese version named snk founder eikichi kawasaki colonel cook us/euro version named tradewest founder leland cook general kawasaki name unchanged nes version enemies game actually neo-nazis evidenced presence swastika middle final room ikari warriors ported nintendo entertainment system ibm pc apple ii atari st atari 2600 atari 7800 amiga commodore 64 zx spectrum amstrad cpc msx port conversions 16-bit machines released 1987 pc commodore 64 ports developed quicksilver software 1989 second c64 version released uk elite software nes version developed micronics atari 2600 atari 7800 ports released 1990 one final published games systems game also included snk 40th anniversary collection nintendo switch playstation 4 1996 next generation listed arcade version ikari warriors number 61 top 100 games time lauding innovative joysticks play balance power-ups offer invigorating boost player character capabilities without taking away game challenge computer video games enthusiastically reviewed classy amstrad personal computer conversion calling graphics simply brilliant gameplay awesomely addictive said players wo n't see better ... probably quite amstrad graphics close dammit arcade machine playability goes c+vg scale pc version game received 4 5 stars dragon ikari warriors spawned sequels victory road 1986 1989 snk released ikari warriors clone 1987 called guerrilla war known guevara japan game features communist fighters che guevara fidel castro heroes
[ 11238, 7916, 9006, 1776, 11477, 1624, 4540, 3256 ]
None
3,257
6
Free_space_bitmap:free space bitmap free-space bitmaps one method used track allocated sectors file systems simplistic design highly inefficient advanced hybrid implementations free space bitmaps used modern file systems simplest form free space bitmap bit array i.e block bits example zero would indicate free sector one indicates sector use sector would fixed size explanatory purposes use 4 gib hard drive 4096 byte sectors assume bitmap stored elsewhere example disk would require 1,048,576 bits one sector 128 kib increasing size drive proportionately increase size bitmap multiplying sector size produce proportionate reduction operating system os needs write file scan bitmap finds enough free locations fit file 12 kib file stored example drive three zero bits would found changed ones data would written across three sectors represented bits file subsequently truncated 8 kib final sector bit would set back zero indicating available use drive size grows amount time needed scan free space become unreasonable address real world implementations free space bitmaps find ways centralize information free space one approach split bitmap many chunks separate array stores number free sectors chunk chunks insufficient space easily skipped total amount free space easier compute finding free space entails searching summary array first searching associated bitmap chunk exact sectors available approach drastically reduces cost finding free space n't help process freeing space combined size summary array bitmap greater readily stored memory large number files scattered sectors freed enormous amount disk access necessary find sectors decrement summary counter flip bits back zero greatly reduces benefits bitmap longer performing function summarizing free space rapidly without reading disk
[ 7969, 9762, 8772, 2383, 7983, 2194, 3315, 8114, 3640, 3834, 2687 ]
Test
3,258
3
Super_Cars:super cars super cars top-view racing game gremlin interactive later produced lotus series games stylistically game influenced super sprint 9 tracks 4 difficulty levels raced order although last track race made harder usual races win money spent temporary handling power upgrades plus armour plating front/rear shooting missiles knock racers player must finish top 3 race progress initially 4 computer opponents added progress game car upgraded throughout game via shop section player given initial price also number options things say salesman right combination price drop followed super cars ii 1991 three cars available purchase game taraco neoroder turbo vaug interceptor turbo retron parsec turbo appears based real car time retron parsec turbo based cizeta-moroder v16t vaug interceptor based honda nsx taraco neoroder based alfa romeo sz sprint zagato slight changes slight contrast box art blue starter car taraco instead closely resembles contemporary european ford fiesta escort cosworth convertible retron also portrayed differently box art lamborghini countach instead cizeta
[ 9006 ]
None
3,259
4
Hillar_Aarelaid:hillar aarelaid hillar aarelaid born december 31 1967 founder first ceo estonia computer emergency response team cert-ee director general estonian data protection inspectorate 1999 2003 aarelaid one central officials charge responding computer attacks estonia bronze soldier tallinn controversy american expert bill woodcock observers praised aarelaid calm professionalism displayed attacks
[ 3207 ]
Train
3,260
8
WebMacro:webmacro webmacro framework developing java servlets enforces model-view-controller framework project allowing clean separation concerns design particular webmacro keeps program source code absolutely separate presentation html code webmacro open source software webmacro initially created designed justin wells semiotek inc. mid-2000 project taken team sourceforge extensive discussions webmacro java servlet-interest mailing list time may influential sun microsystems decision move java server pages product model-view-controller architecture webmacro also used generate arbitrary text output templates one uses automated code generation template language similar language used apache velocity automated script perform migration apache velocity project started clean room re-implementation jon scott stevens geir magnusson jason van zyl agreement could reached adoption apache license current version webmacro bsd licensed
[ 9665, 8860 ]
Test
3,261
9
William_A._Martin:william a. martin william arthur martin 1938-1981 computer scientist oklahoma city oklahoma graduating northwest classen high school state wrestling champion attended mit received bachelor degree 1960 master 1962 ph.d. 1967 electrical engineering supervision marvin minsky dissertation symbolic mathematical laboratory obtaining degrees worked teaching assistant mit beginning 1960 became assistant professor 1968 promoted associate professor electrical engineering 1972 1975 received academic tenure held joint appointment mit sloan school management research pulled towards project mac became laboratory computer science artificial intelligence laboratory researched expert systems finishing ph.d. dissertation symbolic mathematics martin co-founded macsyma project 1968 directed 1971 macsyma later became successful commercial product also core free maxima system martin worked automatic programming knowledge representation natural language processing
[ 7048, 7780 ]
Test
3,262
4
Data-centric_security:data-centric security data-centric security approach security emphasizes security data rather security networks servers applications data-centric security evolving rapidly enterprises increasingly rely digital information run business big data projects become mainstream data-centric security also allows organizations overcome disconnect security technology objectives business strategy relating security services directly data implicitly protect relationship often obscured presentation security end common processes data-centric security model include technical point view information data -centric security relies implementation following data access control selective restriction access data accessing may mean viewing editing using defining proper access controls requires map information resides important important sensitive data designing appropriate controls encryption proven data-centric technique address risk data theft smartphones laptops desktops even servers including cloud one limitation encryption always effective network intrusion occurred cybercriminals operate stolen valid user credentials data masking process hiding specific data within database table cell ensure data security maintained sensitive information exposed unauthorized personnel may include masking data users developers third-party outsourcing vendors etc data masking achieved multiple ways duplicating data eliminate subset data needs hidden obscuring data dynamically users perform requests monitoring activity data layer key component data-centric security strategy provides visibility types actions users tools requested authorized specific data elements continuous monitoring data layer combined precise access control contribute significantly real-time detection data breaches limits damages inflicted breach even stop intrusion proper controls place 2016 survey shows organizations still n't assess database activity continuously lack capability identify database breaches timely fashion cloud computing evolving paradigm tremendous momentum unique aspects exacerbate security privacy challenges heterogeneity diversity cloud services environments demand fine-grained access control policies services flexible enough capture dynamic context attribute-based access requirements data protection recent decades many organizations rely managing database services public clouds amazon web services oracle cloud google cloud platform microsoft azure organize data approach limitations users managing security sensitive data instance hardware security appliances agents running database servers longer option requires innovative ways secure data databases using reverse proxy sitting clients applications database servers requirements supporting load balancing high availability fail-over data-centric security brings additional challenges database security vendors must meet
[ 899, 5636, 10756, 9607, 4236, 5389, 9356, 1935, 9488, 3473, 8978, 10392, 5373, 5246, 4892, 5404, 2975, 2084, 2213, 8998, 3880, 939, 2733, 3629, 3887, 7855, 2737, 1970, 9646, 5433, 7739, 9791, 3525, 5573, 7368, 9160, 5325, 7248, 2262, 6360...
Test
3,263
9
Parametricity:parametricity programming language theory parametricity abstract uniformity property enjoyed parametrically polymorphic functions captures intuition instances polymorphic function act way consider example based set x type x x → x functions x higher-order function twice x → x given twice f f ∘ f intuitively independent set x family functions twice parametrized sets x called parametrically polymorphic function simply write twice entire family functions write type formula_1 x x → x individual functions twice called components instances polymorphic function notice component functions twice act way given rule families functions obtained picking one arbitrary function x → x would uniformity called ad hoc polymorphic functions parametricity abstract property enjoyed uniformly acting families twice distinguishes ad hoc families adequate formalization parametricity possible prove parametrically polymorphic functions type formula_1 x x → x one-to-one natural numbers function corresponding natural number n given rule f formula_3 f i.e. polymorphic church numeral n contrast collection ad hoc families would large set parametricity theorem originally stated john c. reynolds called abstraction theorem paper theorems free philip wadler described application parametricity derive theorems parametrically polymorphic functions based types parametricity basis many program transformations implemented compilers haskell programming language transformations traditionally thought correct haskell haskell non-strict semantics despite lazy programming language haskell support certain primitive operations—such operator codice_1—that enable so-called selective strictness allowing programmer force evaluation certain expressions paper free theorems presence seq patricia johann janis voigtlaender showed presence operations general parametricity theorem hold haskell programs thus transformations unsound general
[ 8738, 10246, 4392, 6536, 10729, 5585, 8722, 4980, 11574 ]
Test
3,264
4
Trust_service_provider:trust service provider trust service provider tsp person legal entity providing preserving digital certificates create validate electronic signatures authenticate signatories well websites general trust service providers qualified certificate authorities required european union switzerland context regulated electronic signing procedures term trust service provider coined european parliament european council important relevant authority providing non-repudiation regulated electronic signing procedure first brought electronic signatures directive 1999/93/ec initially named certification-service provider directive repealed eidas regulation became official july 1 2016. ref name= 1999/93/ec /ref regulation binding legislative act requires eu member states follow trust service provider responsibility assure integrity electronic identification signatories services strong mechanisms authentication electronic signatures digital certificates eidas defines standards trust service providers perform services authentication non-repudiation regulation provides guidance eu member states trust service providers shall regulated recognized trust service defined electronic service entails one three possible actions first may concern creation verification validation electronic signatures well time stamps seals electronically registered delivery services certifications required services second action entails creation verification well validation certificates used authenticate websites third action preservation electronic signatures seals related certificates elevated level qualified trust service service must meet requirements set eidas regulation trust services provide trust framework facilitates continued relations electronic transactions conducted participating eu member states organizations qualified trust service provider plays important role process qualified electronic signing trust service providers must given qualified status permission supervisory government body provide qualified digital certificates used create qualified electronic signatures eidas requires eu maintain eu trust list lists providers services received qualified status trust service provider entitled provide qualified trust services eu trust list trust service providers eu trust list required follow strict guidelines established eidas need provide stamps valid time date creating certificates signatures expired certificates need revoked immediately eu obliges trust service providers deliver appropriate training personnel employed trust service provider shall provide tools software hardware trustworthy capable preventing forgeries certificates produced one major intents eidas facilitate public business services especially conducted parties across eu member state borders transactions safely expedited means electronic signing services provided trust service providers regards ensuring integrity signatures eu member states required eidas establish “ points single contact ” pscs trust services ensure electronic id schemes used cross-board public sector transactions including exchange access healthcare information across borders advanced electronic signature legally binding eidas qualified electronic signature created qualified trust service provider carries higher probative value used evidence court signature ’ authorship considered non-repudiable authenticity signature easily challenged eu member states obligated accept qualified electronic signatures created qualified certificate member states valid according eidas regulation i.e article 24 2 signature created qualified certificate legal value handwritten signature court standards evolving additional standards including policy definitions trust service providers development european telecommunication standards institute etsi swiss digital signing standard zertes defined comparable concept certificate service providers certificate service providers need audited conformity assessment bodies appointed schweizerische akkreditierungsstelle united states nist digital signature standard dss current release know anything comparable qualified trust service provider would allow enhance non-repudiation signatory qualified certificate however authors forthcoming review commentators publicly discussing amendment similar eidas zertes approach trusted service provision allow stringent non-repudiable global transactions legal relevance international harmonization would required several research institutes associations expressed concern respect establishment small group centralized trust service providers per country authenticate digital transactions state construct may negative impact privacy given central role trust service providers many transactions council european professional informatics societies cepis fears trust service providers would gain collect information distinguishing attributes citizens subject authentication regard requirement preserve data resulting expected efforts keep evidence potential liability requests inaccurate id cepis sees risk trust service providers could create store log entries authentication processes information gained allows monitoring profiling involved citizens transaction counterpart also identifies user interests communication behaviour additionally sharpen profiles gained big data analysis would allow far-reaching insights citizens privacy relationships direct connection qualifying governmental bodies could allow gain access gained data profiles authors claim truly take advantage secure seamless cross-border electronic transactions assurance levels definitions technical deployment need specified precisely
[ 7075, 517, 5674, 2286, 4015, 5200, 8018, 10452, 1496, 5433, 3231 ]
Validation
3,265
6
Global_file_system:global file system computer science global file system historically referred distributed virtual name space built set local file systems provide transparent access multiple potentially distributed systems global file systems properties blocking interface buffering etc guaranteed path name corresponds object computers deploying filesystem also called distributed file systems file systems rely redirection distributed systems therefore latency scalability affect file access depending target systems reside andrew file system attempted solve campus environment using caching weak consistency model achieve local access remote files recently global file systems emerged combine cloud object storage versioning local caching create single unified globally accessible file system rely redirection storage device serves files local cache maintaining single file system meta data object storage described google patents advantages global file systems include ability scale object storage use snapshots stored object storage versioning replace backup create centrally managed consolidated storage repository object storage
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 7344, 2230, 5816, 1212, 8380, 10951, 9420, 3795, 4819, 8404, ...
Validation
3,266
3
Moonsound:moonsound moonsound name sound card released msx home-computer system tilburg computer fair 1995 name moonsound originated software moonblaster written people use hardware plug-in synthesizer moonsound sound-card produced msx home-computer system based yamaha ymf278 opl4 sound chip capable 18 channels fm sound well 24 channels 12 16 bit sample-based synthesis arrived us branch microsoft abandoned msx system focusing ibm pc 2 mb instrument rom containing multisampled instruments unusual time factory came equipped one 128 kb sram chip user samples designed electronic engineer henrik gilvad produced sunrise swiss semi-hobby basis two generations made first small size pcb without box later larger size pcb fit msx cartridge available later version room two sample sram chips resulting 1 mb compressed user samples moonblaster software designed remco schrijvers based time-step sequencer software msx sound cards moonblaster came two versions one fm one sample-based synthesis later marcel delorme took software development sound effects like chorus delay reverb omitted due cost size usability reasons yamaha effect chip requires specialised memory effect routing basic 18 fm channels 24 channels sample-based sound shares effect setting creative step-time sequencer programmers made pseudo effects like chorus reverb delay overdubbing using dedicated channels repeat notes delay stereo panning effective quickly reduces musical complexity possible moonsound version 1.0 1 socket user sample ram moonsound version 1.1 1.2 2 sockets 1mb sram hackers found stack 2 additional sram chips resulting 2mb sram based opl4 chip moonsound compatible fm register opl1 opl2 opl3 msx-audio contains chip also compatible opl1 therefore older software make use moonsound 2 mb rom contained 330 mono samples mostly 22.050 khz 12 bits drums 44.1 khz fm part opl4 chip configured several ways four-operator fm allows complex sounds reduces polyphony eight waveforms available fm synthesis moonsound audio power supply isolated digital supply attempt reduce noise separate stereo audio output mixed internal msx sound additional software tools able rip sound loops digitally audio cds inserted cd-rom drive connected scsi ata-ide interfaces software designed henrik gilvad msx club gouda sunrise swiss today moonsound emulated msx emulators bluemsx openmsx
[ 2861, 9006 ]
Test
3,267
9
John_Ousterhout:john ousterhout john kenneth ousterhout born october 15 1954 professor computer science stanford university founded electric cloud john graham-cumming ousterhout professor computer science university california berkeley created tcl scripting language tk platform-independent widget toolkit proposed idea coscheduling ousterhout also led research group designed experimental sprite operating system first log-structured file system ousterhout author magic vlsi computer-aided design cad program received bachelor degree physics yale university 1975 ph.d. computer science carnegie mellon university 1980 ousterhout received grace murray hopper award 1987 work cad systems very-large-scale integrated circuits work inducted 1994 fellow association computing machinery ousterhout member national academy engineering 1994 ousterhout left berkeley join sun microsystems laboratories hired team join tcl development several years sun left co-founded scriptics inc. later renamed ajuba solutions january 1998 provide professional tcl development tools tcl team followed sun ajuba purchased interwoven october 2000 joined faculty stanford university 2008
[ 5634, 3725, 7315, 10008, 8987, 1316, 692, 9780, 3512, 9019, 9665, 3013, 1613, 1236, 9300, 346, 11099, 739, 11501, 2798, 8057 ]
Validation
3,268
3
Jack_Nicklaus'_Greatest_18_Holes_of_Major_Championship_Golf:jack nicklaus greatest 18 holes major championship golf jack nicklaus greatest 18 holes major championship golf golf-simulation video game developed sculptured software published accolade beginning 1988 released amiga amstrad cpc apple ii atari st commodore 64 c64 ms-dos macintosh msx nintendo entertainment system nes pc-88 sharp x68000 1990 1991 game released hucard cartridge cd-rom formats u.s turbografx-16 foreign counterpart pc engine turbografx-16 versions game titled jack nicklaus turbo golf pc engine version titled jack nicklaus world golf tour cd-rom format game boy version released jack nicklaus golf 1992 first series golf games named golfer jack nicklaus followed jack nicklaus unlimited golf course design 1990 game features jack nicklaus favorite 18 golf holes put together single course includes holes augusta national golf club muirfield pebble beach golf links royal lytham st annes golf club old course st andrews two courses designed nicklaus also featured game castle pines colorado desert mountain arizona additionally game boy version includes muirfield village course several add-on disks released computer versions add additional courses game features two game modes stroke play skins multiplayer option allows maximum total four players able play player also compete selection eight different cpu players includes jack nicklaus image nicklaus also appears holes gives tips player jack nicklaus turbo golf turbografx-16 differs versions cd-rom format game five courses including castle pines courses previously featured game early add-on disks australian golf club royal troon golf club kemper lakes golf club st. creek golf club cd-rom version allows player take 360-degree look around courses nicklaus appears courses give advice hole hucard cartridge version jack nicklaus turbo golf includes one course australian golf club includes eight golfer rivals well jack nicklaus accolade began publishing jack nicklaus greatest 18 holes major championship golf 1988 longest title software product time release august 1989 versions released united kingdom commodore 64 pc versions amiga amstrad cpc atari st scheduled release autumn apple ii version released late 1989 1990 macintosh version published accolade nes version published konami released united states march 1990 united kingdom release came august 1991 versions also released msx pc-88 sharp x68000 u.s. turbografx-16 game released jack nicklaus turbo golf hucard cd-rom formats game also released turbografx-16 foreign counterpart pc engine cd-rom format pc engine version published title jack nicklaus world golf tour game hucard format retained original jack nicklaus greatest 18 holes major championship golf title jack nicklaus turbo golf foreign counterparts released 1990 1991 game boy version jack nicklaus golf released united states may 1992 published tradewest along unrelated game title super nes computer versions game received criticism slow load times generating new screen criticized computer version including off-disc copy protection scheme deemed difficult use critics favorably compared game leader board golfing game series praise given graphics amiga amstrad cpc commodore 64 versions amstrad action called cpc version beyond shadow doubt best golf sim ever cpc however magazine also wrote game would immediately appeal golf fans people played computer golf games stating limitations unfairly cripple game popularity – crime entertaining well-programmed sports sim cu amiga-64 praised amiga version gameplay critical minimal sounds putting agonisingly slow computer golfer opponent zzap 64 reviewed commodore 64 version criticized sound effects well blocky scenery unusual color schemes games machine reviewing cpc st versions criticized blocky scenery murky colors well simple sound effects poorly animated golfer sprites reviewing amiga version magazine praised digitized image jack nicklaus appears holes criticized rest graphics tom malcom .info reviewed commodore 64 version called graphics adequate sound abominable concluded game overall good choice malcom subsequently reviewed amiga version praised gameplay felt graphics could also wished option turn jack nicklaus advice hole stating slowed gameplay considerably bob wade amiga format praised sound tony hetherington amiga criticized bad putting controls called game perfectly playable competently programmed still considered bland amiga action praised game recommended considered leader board superior amiga user international recommended game people already purchased mean 18 similar golf game also accolade dan muse incider praised apple ii version new standard computer golf games best sports game period regarding image nicklaus appears holes muse wrote okay little corny like michael dashe macworld praised macintosh version graphics realistic gameplay variety courses nes turbografx-16 versions also criticized slow reanimation raze reviewed nes version stated easy gameplay fun play people rather alone mean machines criticized nes version blocky scenery stating hampered gameplay magazine also criticized golfer sprite average sound effects lack music concluded tedious golf sim die-hard fans genre take chance chicago sun-times reviewing one game versions wrote great golfing enthusiasts good new golf chip jonathan carter writing philadelphia daily news reviewed turbografx-16 cartridge version stated additional courses would nice although praised gameplay graphics gamepro reviewed turbografx-16 cd-rom version recommended game golf fans criticized slow reanimation stated game offer much distinguish golf games
[ 10931, 9166, 9006 ]
Test
3,269
8
BigQuery:bigquery bigquery restful web service enables interactive analysis massive datasets working conjunction google storage serverless platform service paas may used complementarily mapreduce limited testing period 2010 bigquery generally available november 2011 google atmosphere conference april 2016 european users service suffered 12-hour outage may 2016 support announced google sheets bigquery provides external access dremel technology scalable interactive ad hoc query system analysis read-only nested data bigquery requires requests authenticated supporting number google-proprietary mechanisms well oauth
[ 4096, 3, 4623, 3600, 8719, 7700, 9244, 9766, 5159, 10284, 3121, 3633, 4683, 11343, 3664, 7248, 10836, 8285, 6750, 2658, 4194, 5732, 8821, 2170, 7816, 4236, 10893, 5262, 6800, 11408, 10393, 8858, 10912, 7841, 6307, 1203, 7352, 7359, 4289, ...
Validation
3,270
4
JIT_spraying:jit spraying jit spraying class computer security exploit circumvents protection address space layout randomization aslr data execution prevention dep exploiting behavior just-in-time compilation used exploit pdf format adobe flash just-in-time compiler jit definition produces code data since purpose produce executable data jit compiler one types programs run no-executable-data environment jit compilers normally exempt data execution prevention jit spray attack heap spraying generated code produce exploit code jit idea dion blazakis used input program usually javascript actionscript typically contains numerous constant values erroneously executed code example xor operation could used jit transform bytecode native x86 code like attacker uses suitable bug redirect code execution newly generated code example buffer overflow use free bug could allow attack modify function pointer return address causes cpu execute instructions way unintended jit authors attacker usually even limited expected instruction boundaries possible jump middle intended instruction cpu interpret something else non-jit rop attacks may enough operations usefully take control computer continuing example jumping second byte mov instruction results inc instruction computer hardware allows jumping middle instruction includes x86 x86-64 arm although especially effective type hardware jit spraying works systems well protect jit spraying jit code disabled made less predictable attacker
[ 8609, 1954, 1474, 3234, 3462, 5356, 9964, 1103, 10097, 11537, 499, 8627, 5176, 1820, 2558 ]
Validation
3,271
4
FIDO2_Project:fido2 project fido2 project joint effort fido alliance world wide web consortium w3c whose goal create strong authentication solution web core fido2 consists w3c web authentication webauthn standard fido client authenticator protocol ctap fido2 based upon previous work done fido alliance particular universal 2nd factor u2f authentication standard taken together webauthn ctap specify standard authentication protocol protocol endpoints consist user-controlled cryptographic authenticator smartphone hardware security key webauthn relying party also called fido2 server web user agent i.e. web browser together webauthn client form intermediary authenticator relying party single webauthn client device may support multiple webauthn clients example laptop may support multiple clients one conforming user agent running laptop conforming user agent implements webauthn javascript api name implies client authenticator protocol ctap enables conforming cryptographic authenticator interoperate webauthn client ctap specification refers two protocol versions called ctap1/u2f ctap2 authenticator implements one protocols typically referred u2f authenticator fido2 authenticator respectively fido2 authenticator also implements ctap1/u2f protocol backward compatible u2f
[ 4965, 10566, 6316, 7212, 5918, 10801, 124, 1054 ]
Validation
3,272
3
Interrupt_request_(PC_architecture):interrupt request pc architecture computer interrupt request irq hardware signal sent processor temporarily stops running program allows special program interrupt handler run instead hardware interrupts used handle events receiving data modem network card key presses mouse movements interrupt lines often identified index format irq followed number example intel 8259 family pics eight interrupt inputs commonly referred irq0 irq7 x86 based computer systems use two pics combined set lines referred irq0 irq15 technically lines named ir0 ir7 lines isa bus historically attached named irq0 irq15 newer x86 systems integrate advanced programmable interrupt controller apic conforms intel apic architecture apics support programming interface 255 physical hardware irq lines per apic typical system implementing support around 24 total hardware lines working personal computer hardware installing removing devices system relies interrupt requests default settings configured system bios recognized operating system default settings altered advanced users modern plug play technology reduced need concern settings also virtually eliminated manual configuration typically systems using intel 8259 pic 16 irqs used irqs 0 7 managed one intel 8259 pic irqs 8 15 second intel 8259 pic first pic master one directly signals cpu second pic slave instead signals master irq 2 line master passes signal cpu therefore 15 interrupt request lines available hardware newer systems using intel apic architecture typically 24 irqs available extra 8 irqs used route pci interrupts avoiding conflict dynamically configured pci interrupts statically configured isa interrupts early apic systems 16 irqs intel 8259 interrupt controllers pci interrupt lines routed 16 irqs using pir integrated southbridge easiest way viewing information windows use device manager system information msinfo32.exe linux irq mappings viewed executing cat /proc/interrupts using procinfo utility early ibm-compatible personal computers irq conflict common hardware error received two devices trying use interrupt request irq signal interrupt programmable interrupt controller pic pic expects interrupt requests one device per line thus one device sending irq signals along line generally cause irq conflict freeze computer example modem expansion card added system assigned irq4 traditionally assigned serial port 1 likely cause irq conflict initially irq 7 common choice use sound card later irq 5 used found irq 7 would interfere printer port lpt1 serial ports frequently disabled free irq line another device irq 2/9 traditional interrupt line mpu-401 midi port conflicts acpi system control interrupt sci hardwired irq9 intel chipsets means isa mpu-401 cards hardwired irq 2/9 mpu-401 device drivers hardcoded irq 2/9 used interrupt-driven mode system acpi enabled rare conditions two devices could share irq long used simultaneously solve problem later pci bus specification allows irq sharing additional support message signaled interrupts msi later revisions pci express physical interrupt lines uses msi exclusively
[ 780, 6797, 7313, 6806, 1176, 1058, 2476, 6063, 8625, 1461, 823, 5823, 10183, 3272, 2379, 5457, 11477, 10969, 4699, 3294, 1121, 2019, 5348, 1515, 6510, 6129, 7281, 499, 7538, 3445, 5368, 11130, 1791 ]
None
3,273
5
Radio_Link_Protocol:radio link protocol radio link protocol rlp automatic repeat request arq fragmentation protocol used wireless typically cellular air interface wireless air interfaces tuned provide 1 packet loss vocoders mutually tuned sacrifice little voice quality 1 packet loss however 1 packet loss intolerable variants tcp something must done improve reliability voice networks carrying tcp/ip data rlp detects packet losses performs retransmissions bring packet loss .01 even .0001 suitable tcp/ip applications rlp also implements stream fragmentation reassembly sometimes in-order delivery newer forms rlp also provide framing compression older forms rlp rely upon higher-layer ppp protocols provide functions rlp transport ask air interface provide certain payload size instead air interface scheduler determines packet size based upon constantly changing channel conditions upcalls rlp chosen packet payload size right transmission fragmentation protocols 802.11b ip used payload sizes determined upper layers call upon mac create payload certain size protocols flexible rlp sometimes fail transmit deep fade wireless environment rlp payload size little 11 bytes based upon cdma is-95 network smallest voice packet size rlp headers must small minimize overhead typically achieved allowing ends negotiate variable 'sequence number space used number byte transmission stream variants rlp sequence counter small 6 bits rlp protocol ack-based nak-based rlps nak-based meaning forward-link sender assumes transmission got receiver naks out-of-order segment received greatly reduces reverse-link transmissions spectrally inefficient longer latency cellular networks transmit pipeline goes idle nak-based rlp must eventually retransmit last segment second time case last fragment lost reach .01 packet loss rate duplicate transmission typically controlled flush timer set expire 200-500 milliseconds channel goes idle concept rlp protocol invented phil karn 1990 cdma is-95 networks january 2006 ieee 802.20 specification uses one newest forms rlp cellular networks gsm cdma use different variations rlp umts lte protocol called rlc radio link control
[ 2752, 10924, 5071, 8432, 2329 ]
None
3,274
4
Dshell:dshell dshell open source python-based forensic analysis framework developed u.s. army research laboratory md tool provides users ability develop custom analysis modules helps understand events cyber intrusion framework handles stream reassembly ipv4 ipv6 network traffic also includes geolocation ip-to-asn mapping connection additionally framework plug-ins designed aid understanding network traffic present results user concise useful manner since dshell written entirely python code base customized particular problems modifying existing decoder extract different information existing protocols u.s. army research laboratory arl released version dshell github social coding website december 17 2014 100 downloads 2,000 unique visitors 18 countries publicly released dshell small select community users several government organizations users could use tool tool find exact information needed network data including looking names reassembled website requests decoded malware traffic arl chose release dshell github sharing world created security teams gaining another specialized tool keep networks secure furthermore increasing security internet whole increasing number skilled eyes looking bugs potential improvements throughout code 2014 nasa released 1,000 dshell agencies national security agency national guard air force research laboratory joined shortly following year github chosen dshell allows members easily download software code store edits provide mechanism offer feedback original designer additionally rolling enhancements official version make easier share software across organizations bypassing constant emailing sending cds june 2016 users created 11,000 copies tool offered approximately 62 suggested modifications original software additional modules within dshell framework accessed increase network security however ability rapidly develop share analytical modules core strength framework
[ 8554, 7887, 11221, 5469, 5470 ]
Test
3,275
5
Internet_Imaging_Protocol:internet imaging protocol internet imaging protocol iip internet protocol designed international imaging industry association iip built top http communicate images metadata took inspiration flashpix image architecture emerged tackle problem image sizes resolution growing faster internet bandwidth difficult quickly browse high quality images web browsers iip allows detail fetched user needs whole data file downloaded practically defines software fetches image tiles server includes scale image small overview image retrieved initially zooming panning carried fetching higher resolution image tiles server means size image viewed web without downloading iip also makes possible use variety viewer software whereas systems may force use one server file format one viewer iip currently version 1.05 actively developing
[]
None
3,276
0
METEO_System:meteo system meteo system machine translation system specifically designed translation weather forecasts issued daily environment canada system used 1981 30 september 2001 environment canada translate forecasts issued french province quebec english issued english canadian provinces french since competitor program replaced meteo system open governmental bid system developed john chandioux often mentioned one success stories field machine translation meteo system operational use environment canada 1982 2001 stems prototype developed 1975-76 taum group known taum-meteo initial motivation develop prototype junior translator came taum ask help translating weather bulletins environment canada since official communications emanating canadian government must available french english official languages act 1969 weather bulletins represent large amount translation real time junior translators spend several months producing first draft translations revised seniors difficult tedious job specificities english french sublanguages used rewarding lifetime bulletin 4 hours taum proposed build prototype mt system environment canada agreed fund project prototype ready months basic integration workflow translation source target bulletins travelled telex lines time mt happened mainframe computer first version system meteo 1 went operation control data cdc 7600 supercomputer march 1977 chandioux left taum group manage operation improve taum group embarked different project taum-aviation 1977–81 benoit thouin made improvements initial prototype subsequent year turned operational system three years meteo 1 demonstrated feasibility microcomputer-based machine translation satisfaction canadian government translation bureau public works government services canada meteo 1 formally adopted 1981 replacing junior translators workflow need high quality translation revision step done senior translators maintained quality measured percentage edit operations inserting deleting word counts 1 replacing 2 mt results reached 85 1985 time mt part still implemented sequence q-systems q-systems formalism rule-based sllp specialized language linguistic programming invented alain colmerauer 1967 postdoc coopérant taum group later invented prolog language 1972 returning france becoming university professor marseille-luminy engine q-systems highly non-deterministic manipulated data structures ways simple without types string number chandioux encountered limitations efforts raise translation quality lower computation time point could run microcomputers 1981 chandioux created new sllp metalanguage linguistic applications based basic algorithmic ideas q-systems deterministic offering typed labels tree nodes following advice bernard vauquois colmerauer created gram r developed microcomputers 1982 could start developing gram r new system translating weather bulletins high-end cromemco microcomputer meteo 2 went operation 1983 software ran 48kb central memory 5mb hard disk paging meteo 2 first mt application run microcomputer 1985 system nothing left initial prototype officially renamed meteo translated 20 million words per year english french 10 million words french english quality 97 typically took 4 minutes bulletin english sent winnipeg come back french mt human revision 1996 chandioux developed special version system meteo 96 used translate weather forecasts different kinds bulletins issued us national weather service 1996 summer olympics atlanta last known version system meteo 5 dates 1997 ran ibm pc network windows nt translated 10 pages per second able fit 1.44mb floppy disk
[ 5187, 8421, 8976, 1269, 4025, 7164 ]
Test
3,277
9
Compiler_Description_Language:compiler description language compiler description language cdl programming language based affix grammars similar backus–naur form bnf notation designed development compilers limited capabilities control flow intentionally benefits limitations twofold one hand make possible sophisticated data control flow analysis used cdl2 optimizers resulting extremely efficient code benefit foster highly verbose naming convention turn leads programs great extent self-documenting language looks bit like prolog surprising since languages arose time work affix grammars opposed prolog however control flow cdl deterministically based success/failure i.e. alternatives tried current one succeeds idea also used parsing expression grammars cdl3 third version cdl language significantly different previous two versions original version designed cornelis h. a. koster university nijmegen emerged 1971 rather unusual concept core typical programming language source translated machine instructions canned sequences instructions represent core basic abstractions given language supports primitives additions numbers copying variables cdl1 lacks core responsibility programmer provide primitive operations form turned machine instructions means assembler compiler traditional language cdl1 language concept primitives concept data types apart machine word abstract unit storage necessarily real machine word evaluation rules rather similar backus–naur form syntax descriptions fact writing parser language described bnf rather simple cdl1 basically language consists rules rule either succeed fail rule consists alternatives sequences rule invocations rule succeeds alternatives succeeds tried sequence alternative succeeds rule invocations succeed language provides operators create evaluation loops without recursion although strictly necessary cdl2 optimizer achieves effect shortcuts increase efficiency otherwise recursive evaluation basic concept apart obvious application context-free grammar parsing cdl also well suited control applications since lot control applications essentially deeply nested if-then rules cdl1 rule evaluated act data unspecified type ideally data changed unless rule successful side effects failure causes problems although rule may succeed rule invoking might still fail case data change take effect fairly easy albeit memory intensive assure behavior data dynamically allocated stack rather hard static data often case cdl2 compiler able flag possible violations thanks requirement direction parameters input output input-output type rules fail test predicate fail function action side effect predicate action side effect test function must specified programmer rule evaluation based calling simpler simpler rules bottom primitive rules actual work cdl1 surprising primitives provide rules need addition program create rule two input parameters one output parameter output set sum two inputs code cdl compiler uses code strings conventions refer input output variables simply emits needed describe adding rule using assembly need assembler translate cdl compiler output machine code describe primitive rules macros cdl terminology pascal c need pascal c compiler run cdl compiler lack core primitives painful write snippet code even simplest machine instruction operation hand gives great flexibility implementing esoteric abstract primitives acting exotic abstract objects 'machine word cdl like 'unit data storage reference kind data stored additionally large projects made use carefully crafted libraries primitives replicated target architecture os allowing production highly efficient code get feel language small code fragment adapted cdl2 manual primitive operations defined terms java c complete program must define java array items elsewhere cdl2 appeared 1976 kept principles cdl1 made language suitable large projects introduced modules enforced data-change-only-on-success extended capabilities language somewhat optimizers cdl2 compiler especially cdl2 laboratory ide cdl2 world class time one feature cdl2 laboratory optimizer almost unique perform optimizations across compilation units i.e. treating entire program single compilation cdl3 recent language gave open-ended feature previous cdl versions provides primitives basic arithmetic storage access extremely puritan syntax earlier cdl versions number keywords symbols run single digits also relaxed basic concepts expressed syntax rather explicit semantics addition data types introduced language commercial mbp cobol cobol compiler pc well mprolog system industrial strength prolog implementation ran numerous architectures ibm mainframe vax pdp-11 intel 8086 etc os-s dos/os/cms/bs2000 vms/unix dos/windows/os2 latter particular testimony cdl2 portability programs written cdl compilers least one commercial gui application developed maintained cdl application dental image acquisition application owned dexis dental office management system also developed cdl software mephisto iii chess computer written cdl2
[ 1952, 10560, 7876, 8421, 8262, 1672, 1611 ]
None
3,278
9
J2EE_Management:j2ee management j2ee management specification java specification request jsr-77 standardization j2ee server management j2ee management specification abstracts manageable parts j2ee architecture defines interface accessing management information helps system administrators integrate j2ee servers system management environment also helps application developers create management tools scratch goal jsr 77 abstract fundamental manageable aspects j2ee architecture provide well defined model implementing instrumentation information access addition specification defines standardized api inter-operating j2ee components participate monitoring control platform ’ resources implementation jsr-77 enterprise applications done application server done web container j2ee management model specification attributes operations architecture managed objects required compliant j2ee platform implementations model designed interoperable variety industry standard management systems protocols management ejb mejb component provides interoperable remote access model j2ee application components compliant implementations must support mejb component specification also provides standard mappings model cim/wbem common information model cim snmp management information base mib implementation support snmp cim/wbem optional latest version jsr 1.1 released 08 may 2006
[ 9988, 3341, 10526, 10020, 6067, 2106, 3517, 6334, 3518, 3008, 11582, 1095, 3920, 11344, 4959, 4960, 3558, 1128, 3560, 9834, 3954 ]
Validation
3,279
4
World_Reuse,_Repair_and_Recycling_Association:world reuse repair recycling association world reuse repair recycling association wr3a business consortium dedicated reform trade e-waste wr3a inspired fair trade organizations wr3a fair trade association tradename fair trade recycling reserved 2013 established improve export markets surplus electronics e-waste defend biased reporting racial profiling wr3a conceived 2006 following visit china group including usa electronics recycler american retroworks inc. university california davis recycling program director seattle recycler zero-export policy group inspired visit three china semi knock factories factories purchased usa computer monitors still functional crts crts knocked bare tube inserted new tv monitor case complete new tuner board etc wr3a founders observed western journalists reporting purchase import used crts invariably described primitive wire burning operations rather re-manufacturers often contract manufacturers originally assembled brand new crt monitors rebuilt second-hand crts usa crt refurbishing factory video display corp tucker georgia wr3a proposed form coalition usa companies export functional crt monitors directly reuse factories removing imploded damaged screen-burned older non-compliant raster e.g trinitron crts loads destined crt factories usa companies remove recycle bad 1/3 crts would benefit higher prices chinese factories would bypass sorting villages guiyu wr3a swamped orders asian factories year chinese government took new crt manufacturing capacity worldwide 1990s eventually opposed import used crts many skd factory owners relocated businesses countries indonesia malaysia thailand others relocated used monitor sourcing operations hong kong vietnam trucking crts overland chinese factories period several anti-globalist ngos began campaign end trade used electronics especially crts cbs 60 minutes economist businessweek others ran reports claiming 80 displays exported reused burned copper primitive scrapyards source 80 dumping claim later retracted eventually reuse operations asia turned re-export africa used local sources urban asian cities used crts used remanufacturing new tv monitor displays decline purchases used displays usa 2011 wr3a recognized organizational conflicts cooperative suppliers competing declining market organization refined mission 2013 emphasize anti-defamation overseas refurbishing companies promoted used electronics exports peer-reviewed fair trade agreements importers used equipment africa asia latin america consider organization defender tech sector refurbishers wr3a remains dedicated principle used computer exports outlawed outlaws export used computers organization members south america africa asia north america europe dedicated defending legitimate used electronics exporters organization considers false defamatory declarations e-waste toxics externalization 2015 2017 2018 wr3a led visits agbogbloshie district central accra bringing journalists al jazeera independent smithsonian others meet dagbani speaking translators visit led journalists discredit allegations agbogbloshie largest e-waste dump world former wetland outskirts city received hundreds sea containers full junk electronics wr3a found credible evidence dumping site exaggerated accra metropolitan association representatives interested relocating economic refugees develop property three months forced evictions used electronics processed site shown delivered carters wheelbarrows consist devices vcrs imported decades previously wr3a provided reporters world bank statistics showing domestic ghana generation accounted e-waste observed ghana recorded organization interviews ghana tech sector representatives uploaded youtube wr3a september 2013 wr3a adapted tradename fair trade recycling trademark registered uspto registered supplemental certification may 26 2015 organization claim recognized fairtrade one word april 2013 wr3a held fair trade recycling summit middlebury college vermont summit brought together researchers memorial university canada pontificia universidad catholica de peru university southern california usa massachusetts institute technology mit representatives usa international trade office basel convention secretariat interpol several used electronics importers africa asia latin america group deliberated beneficial development emerging markets electronics reuse repair labelled tinkerer blessing yuzo takahashi 2000 technology history network tinkerers. role electronics repair reverse engineering development contrasted so-called resource curse economic development natural resource exploitation middlebury students presenters discussed whether balanced approach recycling secondary materials may warranted follow meeting wr3a interpol held july 2013 november 2013 interpol announced new research program study used electronics trade continuing arrests african importers project eden debate fair trade recycling advocates anti-export organization basel action network profiled usa today september 26 2013 discovery magazine nih 2006 july 2012 memorial university newfoundland canada announced 5-year research project study map routes used electronics weee e-waste exports wr3a partner research grant along researchers universities peru california first year group document efforts develop fair trade recycling model mexico see npr pbs ap coverage research possible application model peru bangladesh china wr3a formerly adapted registered tradename fair trade recycling 2012 wr3a collaborated massachusetts institute technology publication mit january 2012 study e-waste generation exports wr3a provided researchers detailed reconciliations 3 years exports wr3a members mit compared wr3a data corroborating data isri usepa basel secretariat ghana nigeria studies may 2011 wr3a interviewed part e-waste german news magazine zdf.kultur investigated assumptions african imports primitive linked exports egypt green revolution march 2011 wr3a profiled motherboard.tv organization case reduced exports used electronics stewards unintended consequences october 2010 wr3a announced partnership basel action network reduce unnecessary breakage destruction working computer monitors california california sb20 laws followed report critical california cancellation policies published sacramento bee july 19 2010 july 30 2010 discovery news presented analysis contrasting wr3a fair trade engagement approach basel action network ban trade restriction approach abstained choosing sides. may 15 2009 national public radio npr program living earth profiled one wr3a members women cooperative tv repair recycling mexico january 2009 organization presented statistics film keynote address ces 2009 las vegas statistics demonstrated rate growth internet access much higher countries low incomes logically unlikely growth achieved new computers wr3a also presented film reuse refurbishing operations demonstrate proper recycling practices best available practices ten countries wr3a contracted consultant us environmental protection agency july 2008 publication electronic waste management united states
[ 3009, 7579 ]
Validation
3,280
2
.DS_Store:.ds store apple macos operating system .ds_store file stores custom attributes containing folder position icons choice background image name abbreviation desktop services store reflecting purpose created maintained finder application every folder functions similar file desktop.ini microsoft windows starting full stop period character hidden finder many unix utilities internal structure proprietary file .ds_store created directory folder accessed finder application even remote file systems mounted servers share files example via server message block smb protocol apple filing protocol afp remote file systems however could excluded operating system settings permissions although primarily used finder files envisioned general-purpose store metadata display options folders icon positions view settings example mac os x 10.4 tiger later .ds_store files contain spotlight comments folder files comments also stored extended file attributes finder read earlier apple operating systems finder applications created similar files root volume accessed including foreign file systems collecting settings files volume instead separate files respective folder complaints many users prompted apple publish means disable creation files remotely mounted network file systems however instructions apply local drives including usb flash drives although workarounds mac os x 10.5 .ds_store files visible remote filesystems .ds_store files impose additional burdens revision control process inasmuch frequently changed therefore appear commits unless specifically excluded .ds_store files included archives zip created os x users along hidden files directories .ds_store files known adversely affect copy operations multiple files selected file transfer copy operation retroactively cancel progress upon reaching .ds_store file forcing user restart copy operation beginning 2015 .ds_store file led leakage tcl corporation admin portal
[ 3330, 9762, 6797, 7663, 2095, 3921, 8404 ]
Test
3,281
3
HP_200LX:hp 200lx hp 200lx palmtop pc f1060a f1061a f1216a also known project felix personal digital assistant introduced hewlett-packard august 1994 often called palmtop pc notable minor exceptions ms-dos-compatible computer palmtop format complete monochrome graphic display qwerty keyboard serial port pcmcia expansion slot input accomplished via small qwerty-keyboard numeric keypad enclosed clamshell-style case less 25 size standard notebook computer palmtop runs 30–40 hours two size aa alkaline ni-cd rechargeable cells charge batteries ni-cd nimh via 12v dc wall adapter hp 200lx intel 80186 compatible embedded central processing unit named hornet runs ~7.91 megahertz upgraded overclocked 15.8 mhz 1 2 4 mb memory 640 kb ram rest used expanded memory ems memory-based storage space after-market updates bring memory chips 64 mb frees pcmcia slot modem ethernet card use silicom accton 2212/2216 netgear fa411 sohoware nd5120 network cards compatible ibm pc/xt compatible running ms-dos 5.0 rom hp 200lx run virtually program would run full-size pc compatible computer long code written intel 8086 8088 80186 cpu run using cga graphics also run programs written 80286 cpu provided require use protected mode 16-bit pcmcia type ii expansion slot supports 5 v 150 maximum sir compatible infrared port full serial port proprietary mini connector space constraint reasons built-in software suite runs rom includes lotus 1-2-3 release 2.4 spreadsheet calendar phone book terminal capable scientific/business calculator among applications large compactflash storage card serial mouse even microsoft windows 3.0 run palmtop running windows limited hardware maximum version could run windows 3.0 real mode however word 1.x excel 2.x windows would run since could run real mode allowing authoring ms office format-compatible files 640×200 resolution cga compatible 4-shade gray-scale lcd screen back light electroluminescent technology back light installation available third party since 2004 keen eyesight still required use small palmtop effectively without resorting using 2× 4× zoom modes true cga displays allow redefinable fonts text mode support hardware code page 437 hp 95lx supports code page 850 instead starting hp 100lx lx series even supports user-switchable text mode rom fonts code page 437 850 well software-definable ram fonts codepages 437g 437t 852 866 via keybez lotus 1-2-3 internally uses lotus international character set lics characters translated code page 850 display printing purposes hp 100lx palmtop pc f1020a 1 mb f1022a 2 mb model also known project cougar direct predecessor 200lx released 1993 available international english u.s. english french german spanish variants localized keyboard messages almost including hornet cpu ms-dos 5.0 earlier built-in application versions hp palmtop fx variant hp 100lx 2 mb flashable memory 1993 fat flash disk images could created written drive f special flashdsk.exe utility according one source developed korean insurance company hp 200lx aia 2 mb double-speed variant hp 200lx manufactured insurance company american international assurance aia hp 1000cx palmtop pc f1203a 1 mb march 1995 f1222a 2 mb model february 1997 also known project puma economy version 200lx hornet cpu without built-in software except ms-dos 5.0 operating system rom widespread use among example coca-cola warehouse managers loaded logistics software onto machine black clamshell 200lx dark green casing hp omnigo 700lx communicator plus f1206a codenamed columbia project hp calculator branch singapore hp omnigo 700lx essentially 2 mb hp 200lx including hornet cpu redesigned piggyback nokia 2110 gsm mobile telephone wireless mobility hp 200lx motherboard factory-modified support second pcmcia slot nokia data card owing relatively large size nokia telephone hp omnigo 700lx large pebble-shaped casing making handheld phone attached announced late 1995 part plans collaboration hp nokia shipment starting march 1996 production hp omnigo 700lx ceased nokia 2110 mobile telephone rendered obsolete later telephones device seen forerunner first smartphone nokia communicator 9000 hp 95lx palmtop pc f1000a 512 kb f1010a 1 mb model introduced basic design april 1991 known internally project jaguar nec v20 cpu enhanced intel 8088 clone intel 80186 instruction set compatibility additional intel 8080 emulation mode running 5.37 mhz hampered running pc applications quarter-cga resolution lcd screen mda compatible instead cga graphics chip hp 95lx part displayed graphics special lx graphics mode ran ms-dos 3.22 lotus 1-2-3 release 2.2 built also included cr2032 battery memory backup aa mains ran hp omnigo 100 organizer plus f1305a/f1310a designed sophisticated successor lx series incorporated hp-12c calculator functionality gui based controlled pen input keyboard however lacked versatility running unmodified dos programs normal operation mode dos-based pen/geos 2.1 graffiti handwriting recognition running datalight rom-dos 6.22 widely accepted calculator replacement palm pocket pcs became acceptable pdas equipped 1 mb ram based vadem vg230/v5h highly integrated system controller 16 mhz nec v30hl cpu instruction set compatible intel 80186 although product line discontinued hp order introduce windows ce product line starting hp 300lx strong interest hardware continued last palmtop hp ran ms-dos operating system much software desktop pcs came useful bundle software including 1-2-3 quicken compared machines windows-based operating systems ce dos programs compact efficient programs software carousel many applications programs could loaded third-party upgrades repairs renovations available maintain extend device small size hp 200lx popular japan much demise prompted open-source initiative design market amd elan sc400-based replacement fill place 'morphy one club organization created blueprints device prototype ever built reasons remain unclear argue scam scheme hundreds people lost deposits placed new palmtop advance project leaders argued key electronic components unavailable due strong demand mobile telephone manufacturing industry many easter eggs built hp 200lx known ones listed follows easter egg hp 200lx built game lair squid startup screen game user types word gallery gallerie french palmtop siegergalerie german palmtop galeria spanish palmtop he/she placed part maze contains photographs primary software developers worked hp 200lx user may exit gallery exiting door end corridor software developers photographs listed starting left right left right follows last panel right corridor contains thank message photographs developers described a-maze-ing easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing enter 14 times step various screens user comes screen example text form limerick poem poem follows easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing ctrl enter holding alt pressing enter 13 times user comes cryptic poem relating business issues faced software development team poem follows easter egg hp 200lx self test mode palmtop powered user may press esc start self test mode cursor display option pressing ctrl enter holding shift pressing enter 13 times user comes allegorical poem history future hp lx palmtops poem follows note project names hp 95lx hp 100lx hp 200lx 'jaguar 'cougar 'felix respectively 'felix first lx include quicken easter egg built system manager hp 200lx 'easter egg probably development tool easter egg case user may display function first pressing blue ... key start 'more applications user may hold alt pressing f9 4 times followed f10 long alt key held user observe columns data system manager compliant .exm programs registered system manager along arcane program information hp 200lx includes undocumented calculator application named hexcalc written andrew gryc provides arithmetical logical operations binary octal decimal hexadecimal system utility added applications menu entry following fields
[ 2179, 5384, 3214, 10768, 9363, 1304, 8229, 7983, 5681, 1083, 321, 6090, 7243, 9166, 2258, 11100, 1121, 1638, 1515, 6765, 4334, 1776, 5756 ]
None
3,282
4
Distributed.net:distributed.net distributed.net distributed computing effort attempting solve large scale problems using otherwise idle cpu gpu time governed distributed computing technologies incorporated dcti non-profit organization u.s. tax code 501 c 3 distributed.net working rc5-72 breaking rc5 72-bit key ogr-28 searching optimal 28-mark golomb ruler rc5-72 project pace exhaust keyspace 150 years although project end whenever required key found problems part series ogr part infinite series rc5 eight unsolved challenges rsa security although may 2007 rsa security announced would longer providing prize money correct key secret key challenges distributed.net decided sponsor original prize offer finding key result 2001 distributed.net estimated throughput 30 tflops 2009 throughput estimated much higher coordinated effort started february 1997 earle ady christopher g. stach ii hotjobs.com new media labs effort break rc5-56 portion rsa secret-key challenge 56-bit encryption algorithm 10,000 usd prize available anyone could find key unfortunately initial effort suspended result syn flood attacks participants upon server new independent effort named distributed.net coordinated jeffrey a. lawson adam l. beberg david c. mcnett along several others would serve board operate infrastructure late march 1997 new proxies released resume rc5-56 work began enhanced clients cow head selected icon application project mascot rc5-56 challenge solved october 19 1997 250 days correct key 0x532b744cc20999 plaintext message read unknown message time move longer key length rc5-64 challenge solved july 14 2002 1,757 days correct key 0x63de7dc154f4d039 plaintext message read unknown message things better left unread search ogrs order 24 25 26 27 completed distributed.net 13 october 2004 25 october 2008 24 february 2009 19 february 2014 respectively dnetc file name software application users run participate active distributed.net project command line program interface configure available wide variety platforms distributed.net refers software application simply client volunteers running 32-bit windows ati/amd stream enabled gpus contributed processing power rc5-72 project volunteers running 64-bit gnu/linux contributed processing power ogr-28 project portions source code client publicly available although users permitted distribute modified versions distributed.net rc5-72 ogr-28 projects available boinc client moo wrapper yoyo home projects respectively recent years work rc5-72 project submitted clients run gpu modern graphics cards although project already underway almost 6 years first gpus began submitting results march 2018 gpus represent 78 completed work units complete nearly 93 work units day
[ 833, 10658, 5956, 2053, 6916, 7556, 2154, 3629, 1806, 1776, 915, 1941, 6421, 7318, 2299, 8029 ]
Validation
3,283
2
Comparison_of_Windows_Vista_and_Windows_XP:comparison windows vista windows xp page comparison windows vista windows xp windows xp windows vista differ considerably regards security architecture networking technologies management administration shell user interface mobile computing windows xp suffered criticism security problems issues performance vista received criticism issues performance product activation another common criticism vista concerns integration new forms drm operating system user account control uac security technology windows vista faces backward compatibility problems many games utility programs work windows xp july 2008 2,000 applications specifically carried 'vista compatibility logo although majority applications without logo run without problems number low compared number programs currently work xp either natively simulation modality initial performance tests demonstrated windows xp outperforms vista several productivity areas file copy operations speculated one area vista performs better xp test run crn test center 1.25 gb file copied network share desktop xp took 2 minutes 54 seconds vista sp1 took 2 minutes 29 seconds vista implementation file copy arguably complete correct file register transferred completely transferred windows xp file completed dialogue box displayed prior file actually finishing copy transfer file completing dialogue displayed cause issue storage device ejected prior file successfully transferred copied windows xp due dialogue box premature prompt another test performed tom hardware january 2007 applications unreal tournament 2004 graphics benchmarking suite specviewperf 9.03 suffered heavily lack support opengl graphics library vista reached conclusion windows vista clearly great new performer comes executing single applications maximum speed hand find evidence windows vista desktop window manager dwm consumes energy windows xp window manager tests performed computer 2.93 ghz intel core 2 extreme x6800 processor 2× 1024 mb ddr2-800 ram radeon x1900xtx iceq3 graphics card 150 gb western digital wd1500adfd hard drive gigabyte ga-965p-dq6 motherboard scientific paper performance evaluation recent windows operating system performance concludes windows vista n't provide better overall performance high-end computer system compared windows xp performance improvements seen memory management graphics display parts os equal lower performance windows xp low-end computer system windows xp outperforms windows vista tested areas windows os network performance depends packet size used protocol however general windows vista compared windows xp shows better network performance particularly medium-sized packets security top priority windows vista development windows xp every user set administrator default unless added computer management result home users ran software administrator access however left users unwittingly open potential security threats hacking malware downloads large amount existing software ’ run well standard user due developers implementing principle least privilege design testing example many poorly written applications often assume incorrectly read write access entire filesystem system registry denying application access assumed rights cause application fail sometimes person logged standard user windows xp ca n't perform user-specific tasks changing system clock calendar changing computer time zone changing computer power management settings due so-called lua bugs user account control windows vista improves limiting application software standard user privileges administrator authorizes increase privilege level way uac prevents users making inadvertent changes system settings locks computer prevent unauthorized applications installing performing malicious actions windows vista able work around many lua bugs third party applications file registry virtualisation feature well application compatibility shims internet explorer 7 protected mode utilizes user account control isolate ie applications prevent writing content location except temporary internet files folder internet explorer 7 available xp support protected mode xp windows vista also includes windows defender spyware scanning removal tool also available windows xp free enterprise ultimate editions windows vista include bitlocker drive encryption aims help protect data case stolen devices vista implements address space layout randomization makes considerably difficult malicious code exploit return-to-libc attacks previous versions windows particularly 64-bit systems furthermore vista implements heap management enhancements make much difficult carry buffer overflow attacks 64-bit editions windows vista require kernel-mode drivers digitally signed initially making difficult rootkits install alureon managed overcome obstacle 2010 subverting master boot record firewall vista rewritten allowing outbound well inbound traffic blocked luna default visual style windows xp available three color schemes blue default olive green silver windows xp media center edition comes royale default theme editions windows vista default theme windows aero aero offers translucent window effects well live thumbnails animated transitions flip 3d however requires compatible graphics card wddm driver directx 9 support 32-bit color otherwise windows vista displayed using windows vista basic visual style
[ 6028, 8080, 3857, 11283, 537, 9505, 11301, 1577, 6697, 1581, 2221, 11184, 1077, 5176, 1337, 700, 6972, 6462, 9791, 1474, 8391, 1098, 2383, 10835, 11605, 7515, 1501, 11103, 6114, 617, 5225, 2027, 7151, 8315, 9854, 2943 ]
Test
3,284
5
Coccinella_(software):coccinella software coccinella latin coccinella ladybird free open-source cross-platform client xmpp/jabber-instant messaging-protocol software written tcl/tk language runs bsd linux mac os x solaris windows platforms support tcl/tk mats bengtsson published 1999 name whiteboard renamed coccinella 2003
[ 10242, 5251, 5382, 4746, 1036, 6797, 11408, 3228, 10271, 3105, 9511, 1960, 1962, 7983, 9519, 692, 8758, 823, 1467, 9151, 6208, 1218, 2760, 2892, 4318, 3812, 4068, 6628, 5612, 5492, 7928, 10748 ]
None
3,285
9
JavaFX_Script:javafx script javafx script scripting language designed sun microsystems forming part javafx family technologies java platform javafx targeted rich internet application domain competing adobe flex microsoft silverlight specializing rapid development visually rich applications desktop mobile markets javafx script works integrated development environments netbeans eclipse intellij idea javafx released gnu general public license via sun sponsored openjfx project javafx script used called f3 form follows function f3 primarily developed chris oliver became sun employee acquisition seebeyond technology corporation september 2005 name changed javafx script became open sourced javaone 2007 javafx 1.0 released december 4 2008 september 10 2010 oracle announced javaone javafx script would discontinued although javafx api would made available languages java virtual machine september 27 2010 stephen chin announced visage declarative user-interface language based javafx script enhancements recently original f3 programming language process resurrected enhanced javafx script compiled statically typed declarative scripting language java platform provided automatic data-binding mutation triggers declarative animation using expression language syntax code blocks potentially yield values standard javafx apis supported retained mode vector graphics video playback standard swing components although f3 began life interpreted language prior first preview release q3 2008 javafx script shifted focus predominantly compiled interpreted javafx script still possible via jsr 223 'scripting java bridge built top java platform easy use java classes javafx script code compiled javafx script able run platform recent java runtime installed javafx script declarative syntax constructing user interfaces contrasts sharply verbose series method calls required construct equivalent interface swing directly simple hello world program javafx script shows following window/frame program also written way
[ 3328, 9731, 1801, 4235, 1809, 2710, 1316, 10789, 11559, 1707, 5677, 3247, 7983, 6322, 9780, 7104, 9665, 6338, 10436, 1480, 2895, 597, 10200, 220, 4960, 9955, 11363, 11626, 5612, 7148, 7022, 3442, 8179, 9333, 1399, 9343 ]
None