node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,286
2
IOS_version_history:ios version history ios mobile operating system developed apple inc. iphone ipad ipod touch updates ios released itunes software since ios 5 via over-the-air software updates announcement ios 5 june 6 2011 usb connection itunes longer needed activate ios devices data synchronization happen automatically wirelessly apple icloud service major new ios releases announced yearly apple worldwide developers conference wwdc usually released september year usually coinciding release new iphone models recent stable release ios 12.4 released july 22 2019 june 3 2019 wwdc apple announced ios 13 new features include limited dark interface reworks reminders app redesign maps app recent ios 13 beta release ios 13.0 beta 7 released august 15 2019 june 2007 saw official release eventually became ios – concurrently first iphone ios official name official release iphone software development kit iphone sdk march 6 2008 apple marketing simply stated iphone ran version mac os x made specifically iphone ios introduced named iphone os officially renamed ios june 7 2010 announcement introduction ipad introduction ipad existence ipod touch meant iphone longer device run mobile operating system ios 4 first major ios release reflected name change apple licensed ios trademark cisco systems apple concurrently provides version ios comparable model iphone ipod touch usually devices released calendar year iphone users receive software updates free ipod touch users paid 2.0 3.0 major software updates ios 4 apple longer charges money ipod touch updates apple announced iphone os 1 iphone keynote january 9 2007 released public alongside original iphone june 29 2007 official name given initial release apple marketing literature simply stated iphone runs version apple desktop operating system os x release iphone os 1.1 brought support ipod touch 1st generation iphone os 1.1.5 final version iphone os 1 became unsupported 18 may 2010.what apple announce prototype code name acorn os looked like ipod classic style= background ececec padding:0 0.5em colspan= 5 |table versions iphone os 1.0.x
[ 4609, 10755, 9732, 1541, 1549, 4111, 5647, 7697, 4114, 11289, 8735, 6186, 4139, 6700, 1074, 5682, 8754, 5176, 9784, 9275, 8253, 8767, 576, 5696, 8262, 5191, 8774, 1103, 8783, 4180, 10838, 1623, 3672, 9308, 3167, 3681, 9826, 5733, 8806, 36...
Train
3,287
8
Tricentis_Tosca:tricentis tosca tricentis tosca software testing tool used automate end-to-end testing software applications developed tricentis tricentis tosca combines multiple aspects software testing test case design test automation test data design generation analytics test guis apis business perspective two frequently-noted technologies used tricentis tosca related model-based testing risk-based testing instead using scripting test automation tricentis tosca applies model-based testing approach creates model application test technical details application test test case logic test data saved separately joined together test execution time element application test changes technical details updated central model since test cases inherit model various test cases test updated element need modified manually reflect change based risk assessment application test ’ requirements tricentis tosca uses risk-based test design suggest effective test cases identify risk contribution test cases also uses variety methodologies equivalence partitioning boundary testing combinatorial methods linear expansion try minimize number test cases increasing risk coverage tests executed tool aggregates risk coverage business technical compliance perspectives tricentis tosca features technologies gui testing api testing mobile testing service virtualization test data design generation business intelligence data warehouse testing exploratory testing sap-certified integration sap solutions used automate testing sap technologies sap s/4hana sap fiori 2.0 successfactors sap crm concur technologies sap ariba sap business information warehouse
[ 9780, 6797, 7983 ]
Test
3,288
0
GloVe_(machine_learning):glove machine learning glove coined global vectors model distributed word representation model unsupervised learning algorithm obtaining vector representations words achieved mapping words meaningful space distance words related semantic similarity training performed aggregated global word-word co-occurrence statistics corpus resulting representations showcase interesting linear substructures word vector space developed open-source project stanford log-bilinear regression model unsupervised learning word representations combines features two model families namely global matrix factorization local context window methods glove used find relations words like synonyms company product relations zip codes cities etc also used spacy model build semantic word embeddings/feature vectors computing top list words match distance measures cosine similarity euclidean distance approach also used word representation framework online offline systems designed detect psychological distress patient interviews
[ 3288, 4468, 7910 ]
None
3,289
6
MetaSAN:metasan metasan cross-platform storage area network san management software developed sold tiger technology product ceased developed company 2014 however supported end 2016. metasan enables one share one physical virtual disk devices multiple hosts using fibre channel iscsi ethernet infiniband interconnect every computer participating san could read write storage volume folder time metasan file system distributed lock manager existing ntfs hfs+ file systems hardware agnostic worked off-the-shelf storage networking components offered per-node bandwidth control aimed enable fair distribution available storage bandwidth cross-platform setup metasan provided file-system translation services allowed mac windows linux workstations transparently access non-native volumes arbitrate accesses shared storage device one computer elected master san computer became metadata controller mdc computers clients san communicated sent metadata requests mdc lan request acknowledged clients could access storage device directly metasan setup member san could act mdc default first computer boot became mdc possible define priorities assign dedicated computer task metasan superseded tiger store http //www.tiger-technology.com/products/tiger-series/tiger-store/
[ 4615, 5647, 1042, 11283, 10780, 3618, 9762, 11301, 6697, 6700, 1581, 1074, 10817, 582, 1098, 5713, 3670, 4184, 2141, 4702, 8798, 10338, 2149, 8296, 5225, 8299, 8303, 6771, 2676, 6265, 8315, 636, 639, 641, 7812, 8326, 3719, 10888, 11402, 6...
Validation
3,290
4
Hacking_tool:hacking tool hacking tool program designed assist hacking piece software used hacking purposes another example hacking tool computer worm malicious programs detect vulnerabilities operating systems worms however malicious nachi worms actually fixed operating system vulnerabilities downloading installing security patches microsoft website although much said threats linux system exist could increase future one biggest threats linux system given so-called rootkits programs special privileges able hide presence system administrator
[ 5636, 10756, 2060, 3473, 8978, 4883, 3604, 10392, 7449, 5404, 5284, 939, 4140, 7855, 7983, 1970, 7739, 6588, 9791, 3525, 4813, 4435, 7515, 4956, 733, 2275, 107, 3310, 2807, 2041, 7547, 2558 ]
None
3,291
1
Tanzania_Zanzibar_International_Register_of_Shipping:tanzania zanzibar international register shipping tanzania zanzibar international register shipping tzirs body appointed tanzania zanzibar government register ships tanzanian flag
[]
None
3,292
4
Paping:paping paping pronounced pah ping computer network administration utility used test reachability host internet protocol tcp/ip network measure time takes connect specified port name play word ping another computer network administration utility icmp used identify operating system remote machine sometimes blocked icmp blocked ping used identify service responding publicly available services must keep relevant tcp udp ports open paping attempt make connections ports determine service responding similar utilities nmap allow range ports scanned however allow repetitively scan ports paping operates attempting connect internet protocol tcp/ip port target process measures time taken connection established records connection failures results test printed form statistical summary connections made including minimum maximum mean connection times paping cross-platform software currently supporting windows linux april 2013 project appears abandoned new fixes versions produced following sample output paping en.wikipedia.org tcp/ip port 80 http linux host
[ 5472, 5612, 7983, 2739, 8692, 823 ]
Test
3,293
2
IPad_(1st_generation):ipad 1st generation first-generation ipad tablet computer designed marketed apple inc. first ipad line device features apple a4 processor 9.7 touchscreen display certain variants capability accessing cellular networks using ios operating system ipad play music send receive email browse web functions include ability play games access references gps navigation software social network services enabled downloading apps device announced unveiled january 27 2010 media conference april 3 2010 wi-fi variant device released united states followed release wi-fi cellular variant april 30 may 28 released australia canada france japan italy germany spain switzerland united kingdom device received primarily positive reviews various technology blogs publications reviewers praised device wide range capabilities labelled competitor laptops netbooks aspects criticized including closed nature operating system lack support adobe flash multimedia format first 80 days three million ipads sold launch ipad 2 apple sold 15 million ipads march 2 2011 apple announced ipad 2 reduced price first-generation ipad apple co-founder steve jobs stated 1983 speech company ’ apple ’ first tablet computer newton messagepad 100 introduced 1993 led creation arm6 processor core acorn computers apple also developed prototype powerbook duo-based tablet penlite decided sell order avoid hurting messagepad sales apple released several newton-based pdas final one messagepad 2100 discontinued 1998 apple reentered mobile-computing market 2007 iphone smaller yet announced ipad featuring camera mobile phone pioneered multitouch finger-sensitive touchscreen interface apple ’ ios mobile operating system late 2009 ipad release rumored several years speculation mostly talked “ apple ’ tablet ” specific names included itablet islate actual name reportedly homage star trek padd fictional device similar appearance ipad ipad announced january 27 2010 jobs apple press conference yerba buena center arts san francisco jobs later said apple began developing ipad iphone temporarily shelved effort upon realizing ideas would work well mobile phone ipad ’ internal codename k48 revealed court case surrounding leaking ipad information launch apple began taking pre-orders ipad us customers march 12 2010 major change device announcement available pre-order change behavior side switch sound muting screen rotation lock wi-fi version ipad went sale united states april 3 2010 wi-fi 3g version released april 30 3g service ipad united states provided initially sold two prepaid contract-free data plan options one unlimited data 250 mb per month half price june 2 2010 announced effective june 7 unlimited plan would replaced new customers 2 gb plan slightly lower cost existing customers would option keep unlimited plan plans activated ipad cancelled time ipad initially available purchase apple ’ online store retail locations since become available retailers including amazon walmart network operators ipad launched countries including australia canada france germany japan united kingdom may 28 online pre-orders countries began may 10 apple released ipad hong kong ireland mexico new zealand singapore july 23 2010 israel briefly prohibited importation ipad concerns wi-fi might interfere devices september 17 2010 ipad officially launched china ipad originally shipped iphone os 3.2 september 1 2010 announced ipad would get ios 4.2 november 2010 fulfill apple released ios 4.2.1 public november 22 comes several applications including safari mail photos video ipod itunes app store maps notes calendar contacts several improved versions applications developed iphone mac ipad syncs itunes mac windows pc apple ported iwork suite mac ipad sells pared-down versions pages numbers keynote apps app store although ipad designed replace mobile phone user use wired headset built-in speaker microphone place phone calls wi-fi 3g using voip application october 12 2011 ios 5 released various ios devices including first-generation ipad downloadable itunes update reported contain hundreds new features tweaks including twitter integration notification center imessage feature allows users send messages multimedia files users ios os x operating system apple computers icloud ios app apple-provided internet storage service allows users sync backup user data settings to/from devices also made available update june 11 2012 announced ios 6 would released first-generation ipad making ios 5.1.1 final operating system officially available device first-generation ipad features apple a4 soc comprises 1 ghz processor 256 mb ram powervr sgx535 gpu four physical switches ipad including home button near display returns user main menu three plastic physical switches sides wake/sleep volume up/down plus software-controlled switch whose function changed software updates originally switch locked screen current orientation ios 4.2 changed mute switch moving rotation lock function onscreen menu ios 4.3 update setting added allow user specify whether side switch used rotation lock mute unlike successors first-generation ipad cameras ipad touchscreen display 1,024 768 pixel liquid crystal display diagonal fingerprint- scratch-resistant glass result device screen dimensions resolution screen pixel density 132 ppi display responds sensors ambient light sensor adjust screen brightness 3-axis accelerometer sense ipad orientation switch portrait landscape modes unlike iphone ipod touch built-in applications work three orientations portrait landscape-left landscape-right ipad built-in applications support screen rotation four orientations including upside-down consequently device intrinsic native orientation relative position home button changes ipad equipped 16 gb 32 gb 64 gb solid-state flash memory program data storage furthermore device available two connectivity options wi-fi wi-fi cellular unlike successors wi-fi cellular variant first-generation ipad could support carriers utilized gsm/umts standards compatible cdma networks however like successors assisted gps services supported bluetooth also available models weight first-generation ipad varied dependent upon connectivity options chosen wi-fi variant weighs whereas variant wi-fi cellular weighs dimensions however identical across entire range variants measuring 9.56×7.47×0.50 243×190×13 mm apple offers several ipad accessories adapters proprietary 30-pin dock connector ipad port besides headphone jack dock holds ipad upright angle dock connector audio line-out port generation ipad requires corresponding dock dock included physical keyboard supported original ipad generations compatible bluetooth keyboards also work macs pcs ipad charged 10 w standalone power adapter also compatible ipods iphones media reaction announcement device device mixed media noted thousands people queued first day sale number countries many waited claiming worth walt mossberg wall street journal wrote software stupid meaning hardware features build less important ipad success software user interface first impressions largely positive mossberg also called price modest device capabilities praised ten-hour battery life others including pc advisor sydney morning herald wrote ipad would also compete proliferating netbooks use microsoft windows base model price 499 lower pre-release estimates wall street analysts apple competitors expecting much higher entry price point media also praised quantity applications well bookstore media applications contrast sources including bbc criticized ipad closed system mentioned ipad faces competition android-based tablets however time first-generation ipad launch yahoo news noted android tablet os known honeycomb open source fewer apps available ipad although later google released source code honeycomb independent criticized ipad readable bright light paper praised able store large quantities books uk release daily telegraph said ipad lack adobe flash support annoying ipad selected time magazine one 50 best inventions year 2010 popular science chose top gadget behind overall best new 2010 winner groasis waterboxx 300,000 ipads sold first day availability may 3 2010 apple sold million ipads half time took apple sell number original iphones passing one million mark continued selling rapidly reaching 3 million sales 80 days financial conference call october 18 2010 steve jobs announced apple sold ipads macs fiscal quarter total apple sold 15 million first-generation ipads prior launch ipad 2 – tablet pcs combined since ipad release reaching 75 tablet pc sales end 2010 cnet criticized ipad apparent lack wireless sync portable devices microsoft zune number years walt mossberg called pretty close laptop killer david pogue new york times wrote dual review one part technology-minded people part non-technology-minded people former section notes laptop offers features cheaper price ipad review latter audience however claims readers like concept device understand intended uses enjoy using device pc magazine tim gideon wrote winner undoubtedly driving force shaping emerging tablet landscape michael arrington techcrunch said ipad beats even optimistic expectations new category device also replace laptops many people pc world criticized ipad file sharing printing abilities arstechnica critically noted sharing files computer one least favorite parts ipad experience
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 5681, 1074, 8754, 9784, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 3681, 9826, 8806, 3691, 2673, 6258, 10357, 6264, ...
Validation
3,294
3
Advanced_Programmable_Interrupt_Controller:advanced programmable interrupt controller computing intel advanced programmable interrupt controller apic family interrupt controllers name suggests apic advanced intel 8259 programmable interrupt controller pic particularly enabling construction multiprocessor systems one several architectural designs intended solve interrupt routing efficiency issues multiprocessor computer systems apic split architecture design local component lapic usually integrated processor optional i/o apic system bus first apic 82489dx discrete chip functioned local i/o apic 82489dx enabled construction symmetric multiprocessor smp systems intel 486 early pentium processors example reference two-way 486 smp system used three 82489dx chips two local apics one i/o apic starting p54c processor local apic functionality integrated intel processors silicon first dedicated i/o apic intel 82093aa intended piix3-based systems two components intel apic system local apic lapic i/o apic one lapic cpu system first implementation 82489dx lapic discrete circuit opposed thereafter implementation intel processors silicon typically one i/o apic peripheral bus system original system designs lapics i/o apics connected dedicated apic bus newer systems use system bus communication apic components apic whether discrete chip integrated cpu version register containing four-bit version number specific apic implementation example 82489dx apic version number 0 version 1 assigned first generation local apics integrated pentium 90 100 processors systems containing 8259 pic 8259 may connected lapic system bootstrap processor bsp one system i/o apics logically however 8259 connected given time first-generation intel apic chip 82489dx meant used intel 80486 early pentium processors actually external local i/o apic one circuit intel mp 1.4 specification refers discrete apic contrast integrated apic found pentium processors 82489dx 16 interrupt lines also quirk could lose isa interrupts multiprocessor 486 system cpu paired 82489dx additionally supplementary 82489dx used i/o apic 82489dx could emulate 8259a xt-pic also included physical chips backwards compatibility 82489dx packaged 132-pin pqfp local apics lapics manage external interrupts specific processor smp system addition able accept generate inter-processor interrupts ipis lapics lapics may support 224 usable interrupt vectors i/o apic vector numbers 0 31 0 255 reserved exception handling x86 processors intel processors starting p5 microarchitecture p54c built-in local apic however local apic disabled p5 processor re-enabled software limitation longer exists p6 processors later ones single-processor systems major advantage local apic pci cards longer need interrupts mapped isa interrupts use virtual pci irqs 15 resulting fewer conflicts better performance microsoft family operating systems windows xp first properly make use virtual irqs provided local apic partial support present windows 2000 windows 2000 spreading pci card interrupts virtual irq happens machine also i/o apic microsoft blamed windows 2000 implementation information received intel supposedly promising future systems would contain i/o apic well something retrospect happen microsoft document era even claimed without i/o apic system local apics useless situation windows 2000 revert using 8259 pic sudden widespread use local apic windows xp expose number bugs various bios implementations particular microsoft forced retain pci irq stacking behavior machine cardbus controller without i/o apic message signaled interrupts msi feature pci 2.2 later specifications used without local apic enabled use msi obviates need i/o apic additionally 224 interrupts supported msi mode irq sharing allowed another advantage local apic also provides high-resolution order one microsecond better timer used interval one-off mode apic timer initial acceptance woes microsoft document 2002 advocated adoption high precision event timer instead criticized lapic timer poor resolution stating clocks silicon sometimes buggy nevertheless apic timer used example windows 7 profiling enabled windows 8 circumstances windows 8 claimed exclusive rights timer also used programs like cpu-z microsoft windows apic timer shareable resource aperiodic interrupts offered apic timer used linux kernel 2.6.18 onwards implement tickless kernel feature legacy 8253 programmable interval timer longer used tickless kernels vmware document notes software reliable way determine frequency generally way determine local apic timer ’ frequency measure using pit cmos timer yields approximate result i/o apics contain redirection table used route interrupts receives peripheral buses one local apics first-generation dedicated i/o apic 82093aa support 24 interrupt lines packaged 64-pin pqfp 82093aa normally connected piix3 used integrated legacy 8259 pics according 2009 intel benchmark using linux i/o apic reduced interrupt latency factor almost three relative 8259 emulation xt-pic using msi reduced latency even factor nearly seven relative xt-pic baseline xapic introduced pentium 4 x2apic recent generation intel programmable interrupt controller introduced nehalem microarchitecture november 2008 major improvements x2apic address number supported cpus performance interface x2apic uses 32 bits address cpus allowing address 2 − 1 cpus using physical destination mode logical destination mode works differently introduces clusters using mode one address 2 − 16 processors x2apic architecture also provides backward compatibility modes original intel apic architecture introduced pentium/p6 xapic architecture introduced pentium 4 improved interface reduces number needed apic register access sending inter-processor interrupts ipis advantage qemu emulate x2apic older processors physically support going back conroe even amd opteron g-series processors neither natively support x2apic apicv intel brand name hardware virtualization support aimed reducing interrupt overhead guests apicv introduced ivy bridge-ep processor series sold xeon e5-26xx v2 launched late 2013 xeon e5-46xx v2 launched early 2014 amd announced similar technology called avic available family 15h models 6xh carrizo processors newer number known bugs implementations apic systems especially concern 8254 connected defective bioses may set interrupt routing properly provide incorrect acpi tables intel multiprocessor specification mps tables apic also cause system failure operating system support properly older operating systems i/o local apics often disabled possible anymore due prevalence symmetric multiprocessor multi-core systems bugs firmware operating systems rare occurrence amd cyrix proposed somewhat similar-in-purpose openpic architecture supporting 32 processors least declarative support ibm compaq around 1995 x86 motherboard released openpic however openpic failure x86 market amd licensed intel apic amd athlon later processors ibm however developed multiprocessor interrupt controller mpic based openpic register specifications mpic used powerpc based designs including ibm instance rs/6000 systems also apple late power mac g5s
[ 6153, 4491, 6924, 4237, 4622, 7313, 9105, 533, 6806, 1176, 5529, 9369, 9500, 2719, 1058, 7463, 1972, 823, 3255, 9655, 6971, 1085, 8125, 5823, 704, 833, 6339, 9541, 3272, 6730, 2379, 7755, 4173, 3537, 2514, 3027, 2516, 5457, 6911, 4695, ...
Test
3,295
7
IBM_Websphere_Business_Events:ibm websphere business events websphere business events ibm implementation event-processing engine event processing involves altering existing server software organization emit events small messages whenever notable event occurs event-processing software software monitor events look certain patterns interest useful prevention credit card fraud giving executives high-level view going company e.g share price drops extended period time detailed description see complex event processing software components following details websphere business events released june 2008 based upon acquisition aptsoft software
[ 3323 ]
Test
3,296
6
Info-ZIP:info-zip info-zip set open-source software handle zip archives circulation since 1989 consists 4 separately-installable packages zip unzip command-line utilities wiz maczip graphical user interfaces archiving programs microsoft windows classic mac os respectively info-zip zip unzip ported dozens computing platforms unzip web page describes unzip third portable program world surpassed hello world c-kermit possibly linux kernel zip unzip programs included linux unix distributions info-zip zip unzip addition info-zip releases parts info-zip including zlib used numerous file archivers programs many info-zip programmers also involved projects closely related deflate compression algorithm png image format zlib software library unzip package also includes three additional utilities zip package includes three additional utilities unzip 1.0 march 1989 released samuel m. smith written pascal c. pascal abandoned soon unzip 2.0 september 1989 released samuel m. smith included support unimploding method 6 introduced pkzip 1.01 george sipe created unix version unzip 2.0a december 1989 released carl mascott john cowan spring 1990 info-zip formed mailing list simtel20 released unzip 3.0 may 1990 became first public release info-zip group unzip 4.0 december 1990 adds support central directory within .zip archive unzip 5.0 august 1992 introduces support deflate method 8 compression method used pkzip 1.93a method 8 become de facto base standard zip archives 1994 1995 info-zip turned corner effectively became de facto zip program non-ms-dos systems huge number ports released year including numerous minicomputers mainframes practically every microcomputer ever developed unzip 5.41 april 2000 relicensed info-zip license unzip 5.50 february 2002 adds support deflate64 method 9 decompression unzip 6.0 adds support zip64 .zip archive bzip2 method 12 decompression support bzip2-style compression also zip 3.0f beta zip 1.9 august 1992 introduces support deflate method 8 compression method method 8 become de facto base standard zip archives zip 2.3 december 1999 first info-zip archiver tool new bsd-like info-zip license zip 3.0 2008-07-07 supports zip64 .zip archive 65536 files per archive multi-part archive bzip2 compression unicode utf-8 filename partial comment unix 32-bit uids/gids wiz 4.0 november 1997 released info-zip wiz 5.01 april 2000 relicensed info-zip license maczip 1.05 july 2000 released info-zip license maczip 1.06 released february 2001 written dirk hasse
[ 3969, 5380, 6022, 10121, 1420, 6797, 1940, 3222, 9880, 546, 3114, 10027, 4780, 7983, 2864, 950, 6713, 2755, 11076, 3142, 7366, 1352, 4296, 8524, 1101, 8909, 9166, 10317, 4561, 722, 8147, 10575, 10971, 11614, 1631, 3296, 9953, 5858, 10851, ...
Test
3,297
5
Bootstrap_Protocol:bootstrap protocol bootstrap protocol bootp computer networking protocol used internet protocol networks automatically assign ip address network devices configuration server bootp originally defined rfc 951 computer connected network powered boots operating system system software broadcasts bootp messages onto network request ip address assignment bootp configuration server assigns ip address based request pool addresses configured administrator bootp implemented using user datagram protocol udp transport protocol port number 67 used dhcp server receive client requests port number 68 used client receive dhcp server responses bootp operates ipv4 networks historically bootp also used unix-like diskless workstations obtain network location boot image addition ip address assignment enterprises used roll pre-configured client e.g. windows installation newly installed pcs originally requiring use boot floppy disk establish initial network connection manufacturers network cards later embedded protocol bios interface cards well system boards on-board network adapters thus allowing direct network booting parts bootp effectively superseded dynamic host configuration protocol dhcp adds feature leases parts bootp used provide service dhcp protocol dhcp servers also provide legacy bootp functionality bootp first defined september 1985 rfc 951 replacement reverse address resolution protocol rarp published rfc 903 june 1984 primary motivation replacing rarp bootp rarp link layer protocol made implementation difficult many server platforms required server present individual ip subnet bootp introduced innovation relay agents forwarded bootp packets local network using standard ip routing one central bootp server could serve hosts many subnets case 1 client server network case 2 client server different networks
[ 10242, 3847, 649, 9868, 6797, 3218, 3731, 5397, 9365, 10005, 11413, 5402, 5531, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 10924, 10926, 7984, 562, 2996, 9909, 6651, 10171, 3133, 3006, 4797, 5181, 5437, 7364, 2887, 328, 8265, 2509, 4687, ...
Test
3,298
4
David_Venable:david venable david dave venable born january 11 1978 little rock arkansas former intelligence officer united states national security agency current cyber security professional businessman author speaker topics cyber security cyberwarfare international security also developed security-related internet protocols dave venable grew little rock arkansas arkansas later attended university arkansas majoring mathematics college venable joined united states air force studied korean defense language institute monterey california department defense educational research institution provides linguistic cultural instruction dod federal agencies venable also pursued graduate education mathematics university texas international relations harvard university 2005 venable served several intelligence roles national security agency including computer network exploitation cyberwarfare information operations digital network intelligence support global anti-terrorism operations also taught subjects serving adjunct faculty national cryptologic school school within national security agency provides training members united states intelligence community leaving federal service venable founded served ceo vanda security dallas-based security consultancy ultimately became security professional services practice masergy communications venable currently serves vice president cyber security venable regularly speaks industry government conferences including black hat briefings warsaw security forum serves cyber security expert think tanks policy research institutes serves colony texas technology board venable frequently contributes appears forbes bbc harvard business review bloomberg businessweek informationweek idg connect media outlets matters pertaining cyber security cyberwarfare international security
[ 9688, 2275, 7887 ]
Test
3,299
4
Cisco_PIX:cisco pix cisco pix private internet exchange popular ip firewall network address translation nat appliance one first products market segment 2005 cisco introduced newer cisco adaptive security appliance cisco asa inherited many pix features 2008 announced pix end-of-sale pix technology sold blade firewall services module fwsm cisco catalyst 6500 switch series 7600 router series reached end support status september 26 2007 pix originally conceived early 1994 john mayes redwood city california designed coded brantley coile athens georgia pix name derived creators aim creating functional equivalent ip pbx solve then-emerging registered ip address shortage time nat investigated viable approach wanted conceal block blocks ip addresses behind single multiple registered ip addresses much pbxs internal phone extensions began rfc 1597 rfc 1631 discussed now-familiar rfc 1918 yet submitted design testing carried 1994 john mayes brantley coile johnson wu network translation inc. brantley coile sole software developer beta testing pix serial number 000000 completed first customer acceptance december 21 1994 kla instruments san jose california pix quickly became one leading enterprise firewall products awarded data communications magazine hot product year award january 1995 shortly cisco acquired network translation november 1995 mayes coile hired two longtime associates richard chip howes pete tenereillo shortly acquisition 2 longtime associates jim jordan tom bohannon together continued development finesse os original version cisco pix firewall known pix classic time pix shared code another cisco product localdirector january 28 2008 cisco announced end-of-sale end-of-life dates cisco pix security appliances software accessories licenses last day purchasing cisco pix security appliance platforms bundles july 28 2008 last day purchase accessories licenses january 27 2009 cisco ended support cisco pix security appliance customers july 29 2013 may 2005 cisco introduced asa combines functionality pix vpn 3000 series ips product lines asa series devices run pix code 7.0 later pix os release 7.x pix asa use software images beginning pix os version 8.x operating system code diverges asa using linux kernel pix continuing use traditional finesse/pix os combination pix runs custom-written proprietary operating system originally called finese fast internet service executive software known simply pix os though classified network-layer firewall stateful inspection technically pix would precisely called layer 4 transport layer firewall access restricted network layer routing socket-based connections port ip address port communications occur layer 4 default allows internal connections outbound traffic allows inbound traffic response valid request allowed access control list acl conduit administrators configure pix perform many functions including network address translation nat port address translation pat well serving virtual private network vpn endpoint appliance pix became first commercially available firewall product introduce protocol specific filtering introduction fixup command pix fixup capability allows firewall apply additional security policies connections identified using specific protocols protocols specific fixup behaviors developed include dns smtp dns fixup originally implemented simple effective security policy allowed one dns response dns server internet known outside interface dns request client protected known inside interface inspect superseded fixup later versions pix os cisco pix also one first commercially available security appliances incorporate ipsec vpn gateway functionality administrators manage pix via command line interface cli via graphical user interface gui access cli serial console telnet ssh gui administration originated version 4.1 several incarnations cisco acquired pix network translation cli originally align cisco ios syntax starting version 7.0 configuration became much ios-like original nti pix pix classic cases sourced oem provider appro flash cards early encryption acceleration cards pix-pl pix-pl2 sourced productivity enhancement products pep later models cases cisco oem manufacturers pix constructed using intel-based/intel-compatible motherboards pix 501 used amd 5x86 processor standalone models used intel 80486 pentium iii processors pix boots proprietary isa flash memory daughtercard case nti pix pix classic 10000 510 520 535 boots integrated flash memory case pix 501 506/506e 515/515e 525 ws-svc-fwm-1-k9 latter part code pix technology implemented fire wall services module catalyst 6500 7600 router adaptive security appliance network firewall made cisco introduced 2005 replace cisco pix line along stateful firewall functionality another focus asa virtual private network vpn functionality also features intrusion prevention voice ip asa 5500 series followed 5500-x series 5500-x series focuses virtualization hardware acceleration security modules 2005 cisco released 5510 5520 5540 models asa continues using pix codebase asa os software transitioned major version 7.x 8.x moved finesse/pix os operating system platform linux operating system platform also integrates features cisco ips 4200 intrusion prevention system cisco vpn 3000 concentrator asa continues pix lineage intel 80x86 hardware cisco pix vpn product hacked nsa-tied group equation group somewhere 2016 equation group developed tool code-named benigncertain reveals pre-shared password attacker cve-2016-6415 equation group later hacked another group called shadow brokers published exploit publicly among others according ars technica nsa likely used vulnerability wiretap vpn-connections decade citing snowden leaks cisco asa-brand also hacked equation group vulnerability requires ssh snmp accessible attacker codename given exploit nsa extrabacon bug exploit cve-2016-6366 also leaked shadowbrokers batch exploits backdoors according ars technica exploit easily made work modern versions cisco asa leaked exploit handle 29th january 2018 security problem cisco asa-brand disclosed cedric halbronn ncc group use free-bug secure sockets layer ssl vpn functionality cisco adaptive security appliance asa software could allow unauthenticated remote attacker cause reload affected system remotely execute code bug listed cve-2018-0101
[ 7426, 3473, 2709, 5531, 3742, 1440, 1954, 9764, 8998, 3495, 3885, 5677, 7983, 823, 3133, 7887, 7893, 6364, 10341, 5749, 5368 ]
Test
3,300
2
Nokia_N900:nokia n900 nokia n900 smartphone made nokia supersedes nokia n810 default operating system maemo 5 linux-based os originally developed nokia 770 internet tablet first nokia device based upon texas instruments omap3 microprocessor arm cortex-a8 core unlike three nokia internet tablets preceding nokia n900 first maemo device include phone functionality quad-band gsm 3g umts/hsdpa n900 functions mobile internet device includes e-mail web browsing access online services 5-megapixel digital camera still video photography portable media player music video calculator games console word processor sms well mobile telephony using either mobile network voip via internet mobile wi-fi maemo provides x-terminal interface interacting core operating system launched nokia world 2 september 2009 released 11 november 2009 united states 9 european countries n900 launched alongside maemo 5 giving device overall touch-friendly interface predecessors customizable home screen mixes application icons shortcuts widgets maemo 5 supports adobe flash player 9.4 includes many applications designed specifically mobile platform new touch-friendly media player nokia n900 announced 17 september 2008 keynote presentation dr. ari jaaksi nokia new supported features announced maemo 5 cellular connectivity 3g/hspa ti omap3 processor high definition camera support news backward compatibility older internet tablets time frame established release pre-alpha maemo 5 software development kit december 2008 targeted exclusively omap3 architecture revamped user interface included support hardware graphics acceleration functionalities found internet tablets time cellular data connectivity high definition camera support first photo specifications n900 codenamed rover developed came may 2009 release fcc approval documents august 2009 confirmed device provided second codename rx-51 nokia n900 officially announced 2 september 2009 nokia world 2009 germany nokia says step 4 5 line maemo devices started 2005 nokia 770 device initially available selected markets starting november 2009 4 december uk retail price €599 finland germany italy netherlands spain €649 france 2499 zł poland 5995 kr sweden £499 united kingdom prices including vat excluding subsidies retail price launch us 649 united states excluding sales taxes subsidies available canada independent retailers around c 800 march 2010 nokia site australia lists n900 homepage hinting launch time near future black color available launch initially availability extremely limited leading delays statement nokia higher pre-order demand expected nokia n900 launched hong kong 29 may 2010 added features facilitate character handwriting input price launch 4998 hkd already released australia via optus nokia n900 powered omap 3430 arm cortex-a8 system-on-a-chip made texas instruments based 65 nanometer cmos process omap 3430 composed three microprocessors cortex a8 running 600 mhz 1.15 ghz correct overclocking used run os applications powervr sgx530 gpu made imagination technologies supports opengl es 2.0 capable 14 mpolys/s tms320c64x digital signal processors running 430 mhz used run image processing camera audio processing telephony data transmission tms320 c64x main purpose offload cortex a8 process audio video signal moreover omap 3430 n900 devices successfully over-clocked 1150 mhz using modified kernel editing kernel power configuration file system 256 mb dedicated high performance ram mobile ddr paired access 768 mb swap space managed os provides total 1 gb virtual memory nokia n900 resistive touchscreen resolution 800 × 480 pixel wvga 267 ppi according nokia xorg.log capable displaying 65k colours 565 rgb nokia n900 camera capability 2592x1944 pixels carl zeiss optics autofocus dual led flash video light geo-tagging lcd transflective permit usability wide range luminosity daylight dark haptic feedback provided touchscreen input applying small vibration sound user choose whether feature enabled stylus provided allow precise touch input access smaller user interface elements 3-axis accelerometer allows orientation screen change portrait landscape mode certain applications used user input games applications dashboard desktop active rotating device landscape portrait mode activates phone application feature also disabled user discretion update pr1.2 became possible view web pages portrait mode developers may add support portrait mode applications desired proximity sensor deactivates display touchscreen device brought near face call slide-out 4-row keyboard d-pad nokia n810 replaced nokia n900 slide-out 3-row backlit keyboard arrow keys previous internet tablets on-screen keyboard also available addition english qwerty layout slide keyboard available variants italian french german russian czech nordic finnish swedish spanish nokia n900 ambient light sensor adjusts display brightness activates backlit keyboard os comes word prediction software configured user preferences auto capitalization word completion auto spacing words device autonomous gps optional a-gps functionality comes pre-loaded ovi maps application ovi maps provides typical mapping features alternate views 3d landmarks satellite hybrid maps address/places interest searching route planning although turn-by-turn navigation yet 5-megapixel back camera autofocus feature dual led flash 4:3 16:9 aspect ratio options 3× digital zoom focal length camera 5.2 mm aperture f/2.8 focus range 10 cm infinity capable video recording 848 × 480 pixels 25 fps lens use protected sliding hatch opening hatch launches camera application although 0.3-megapixel front camera capable video recording 640 × 480 pixels pre-production units could used video calls ip using google talk retail version delivered without software enabling video calling video chatting update pr1.2 ota over-the-air skype video calling added enabling fascia camera software updates phone becomes capable play/record/stream 720p video holding device facing screen top left right rocking buttons function volume up/down zoom in/out depending context power on/off camera button pressing power button brings menu change profile activate offline mode a.k.a airplane flight mode turns emitted signals lock device either secure key code simple lock option end current task nokia n900 fewer hardware buttons makes use touchscreen display on-screen buttons example accept reject end call n900 microphone stereo speakers located side device 3.5 mm four-contact trrs connector simultaneously provides stereo audio output either microphone input video output pal ntsc tv possible using nokia video connectivity cable included upon purchase standard trrs 3x rca cable high-speed usb 2.0 usb micro-b connector provided data synchronization mass storage mode client battery charging micro-usb connector prone failure nokia n900 unlike previous versions nokia internet tablet n't enabled support usb on-the-go ability act usb host default order meet deadlines production usb certification ongoing community effort add support subsequently currently software beta stage requiring non-standard usb cable usb a-a adapter software development repository built-in bluetooth v2.1 supports wireless earpieces headphones hsp profile nokia n900 supports hardware capable stereo audio output a2dp profile built-in car hands-free kits also supported hfp profile file transfer supported ftp along opp profile sending/receiving objects possible remote control device avrcp profile dun profile permits access internet laptop dialing mobile phone wirelessly tethering hid profile provides support devices bluetooth keyboards pan profile networking using bluetooth unsupported enabled bluetooth set also functions fm receiver allowing one listen fm radio n900 also 88.1–107.9 mhz fm transmitter example play music separate radio note fm transmitter frequency range extended 76.0–107.9 mhz community supported modifications operating system furthermore nokia n900 wi-fi b/g connectivity support wep wpa wpa2 aes/tkip security protocols nokia n900 synchronize microsoft outlook activesync various e-mail calendar clients syncml bluetooth micro-usb contact information also exchanged via vcard file format supported commonly e-mail programs including evolution microsoft outlook device also features infrared port compatible irda used turn nokia n900 remote controller using third-party software battery life shipped bl-5j 1320mah battery n900 seems deficient able make full working day internet connection call usage press release nokia stated aiming one day full usage always online 2-4 days tcp/ip connected active online usage 1+ day early reports users range 12 hours wi-fi web browsing video gps 2 days online used continuously value appears highly dependent user choice background software active desktop widgets im email polling well mobile network signal quality especially 3g cases software bugs nokia reported talk times around 9 hours gsm 5 hours 3g battery life extended significantly switching gps/a-gps wi-fi bluetooth replacing 3g 2g gprs previous internet tablets used larger batteries 1500 mah compared n900 1320 mah based less efficient microprocessor typical battery time nokia n810 around 7 hours continuous full usage display wi-fi principle n900 figures expected much higher third party extended batteries 2400 mah capacity available n900 also community supported modifications performed 3rd party n900 compatible batteries usually involving putting two said batteries parallel increase effective battery capacity nokia n900 3000 mah sim card located battery accessed removing back panel nokia n900 microsd hc card socket also located back cover battery tool necessary remove back panel nokia n900 32 gb emmc 256 mb nand non-removable storage additional storage available via hot swappable microsdhc card socket claimed support 200 gb additional storage however sdhc specification supports cards 32 gb size difficulty reported use 64+ gb sdxc cards sandisk claims sdxc cards compatible n900 hot swapping achieved via software-supported magnetic sensor detects removal back cover partition residing microsdhc card unmounted back cover removed microsdhc card formatted supported file system ext2 ext3 fat16 fat32 32 gb emmc split 3 partitions 256 mb nand formatted ubifs contains bootloader kernel image root directory 100 mb free space programs larger 500 kb including dependencies stored /opt symlinked /home/opt therefore located 2 gb ext3 partition vfat partition also available storage needs used carefully unmounted exported usb cable connected device maemo 5 also known fremantle default operating system nokia n900 maemo 5 nokia adaptation linux desktop environment pocket-sized device ui fully customizable user able move widgets around add/remove widgets change background add shortcuts applications n900 comes preloaded variety applications 1500 additional applications overwhelming majority free download use created 3rd party developers custom kernels also available via app manager users need devices maemo uses upstart reduce boot time application called easy debian installs debian lxde image internal memory enabling applications iceweasel firefox browser openoffice.org suite run within maemo applications synaptic package manager included debian installation gimp run within lxde interface software also added debian using maemo chroot utility using synaptic apt-get command line stellarium zim desktop wiki accessed either via lxde desktop icons program manager shortcuts desktop nokia n900 sim application toolkit available also known operator menu possible use services require result support sim interact directly outside world initiate commands independently handset network making n900 vulnerable installation malicious sim java applications via text messages issues various value-added services resulting availability sim application toolkit include following nokia often offers new n8 e7 devices warranty replacements n900s although warranty terms consumer rights legislation differ across jurisdictions users reported success refusing pressing n900 least eu india recently august 2011 owners confident getting n900 warranty replacement often attempt repair devices sell nokia-provided replacement buy n900 instead n900 proximity sensor designed lock touch screen phone user ear prevent accidental operation locks screen unintentionally bright light usually outdoors call placed received nokia acknowledged hardware issue addressed unlock screen phone call tactile unlock switch right side device used however keep touch screen active accidental operation phone keys call may occur device used handset issue blamed application screen protectors however n900 users without screen protectors also experiencing problem n900 microusb charger port fragile people successfully fixed problem either epoxy glue resoldering usb port onto circuit board chips n900 gsm module might badly soldered circuit board resulting multiple n900 devices reported troubled inability sim card detected issue fixable putting something gsm-related chips shielding though proper fix would reballing announced may 2010 nokia n900 last mobile communication device running maemo 5 operating system replaced meego nokia continue support n900 updates necessary transition succeeding meego operating system possible mainly interest developers rather consumers officially supported nokia interest within user community working backporting meego developments maemo n900 places interesting device people within wider open source community consumers download meego operating system available officially supported nokia nokia used say meego going succeed maemo new devices however 11 february 2011 nokia announced primarily concentrating alliance microsoft meego development stopped one meego device become available 2011 3 march 2011 jukka eklund product manager meego os nokia announced meego-dev mailing list meego 1.2 developer edition n900 developed dedicated nokia team led mika leppinen target particular edition usable primary phone device developer/hacker person regular end users september 2011 announcement intel linux foundation abandoning meego favor tizen prompted developer community begin seriously doubt future meego n900 meego developer edition rename meego community edition evolved nemo based mer currently october 2012 actively developed nitdroid project ports android devices alternate operating system also available n900 however little progress made achieving voice calling nitdroid n900 main developer goes online handle e-yes moved developing devices nokia n9 community-based project aiming provide hardware upgrade n900 called neo900 began late 2013 collaboration openmoko maemo communities hardware upgrade quadruple device ram provide processor nearly twice fast one original n900 integrate additional sensors gyroscope compass likely modern lte modem also included
[ 1537, 3585, 529, 10770, 5143, 2072, 5659, 6178, 9762, 4132, 40, 3626, 9266, 10802, 7220, 5175, 1083, 3649, 10820, 11337, 9292, 7246, 1615, 5201, 7253, 10329, 5211, 6748, 10332, 1633, 10855, 109, 3205, 9359, 1682, 2197, 2199, 10393, 5274, ...
Test
3,301
3
Telechips:telechips telechips fabless company headquartered seoul founded 1999 regional offices japan china singapore designs integrated circuits company sells system chip products used automotive entertainment systems consumer electronics based arm architecture support android windows embedded compact nucleus rtos linux telechips also sells development kits
[ 644, 392, 8842, 781, 146, 659, 1428, 9235, 2838, 11282, 7833, 666, 5786, 4508, 6391, 11289, 1057, 4258, 7077, 38, 9638, 5417, 4139, 2862, 2097, 7988, 11062, 9913, 6971, 8253, 8383, 321, 7745, 7747, 8003, 6981, 9155, 10562, 10945, 2635, ...
Test
3,302
7
ServedBy_The_Net:servedby net servedby net llc cloud computing provider specializing infrastructure service company provides infrastructure efforts virtual servers storage server backup company current slogan serving clouds seattle servedby net founded seattle washington joshua breeds breeds developed interest cloud technology sector age 10 developed first web hosting company years later breeds founded servedby net llc 2011 working biochemistry degree university washington 2014 organization technology partner microsoft vmware parallels suse f5 networks servedby net offers cloud iaas infrastructure service well hosted services managed cloud services domain name registration
[ 4194, 5178, 4429, 10020 ]
Test
3,303
2
Windows_Internal_Database:windows internal database windows internal database codenamed wyukon sometimes referred sql server embedded edition variant sql server express 2005–2014 included windows server 2008 sql 2005 windows server 2008 r2 sql 2005 windows server 2012 sql 2012 windows server 2012 r2 sql 2012 windows server 2016 sql 2014 included free microsoft products released 2007 require sql server database backend windows sharepoint services 3.0 windows server update services 3.0 include windows internal database used alternative using retail edition sql server wid 32-bit application even component windows server 2008 64-bit installs path windows server 2012 later 64-bit application installed windows internal database available standalone product use end-user applications microsoft provides sql server express microsoft sql server purpose additionally designed accessible windows services running machine several components windows server 2008 2012 use windows internal database data storage active directory rights management services windows system resource manager uddi services active directory federation services 2.0 ipam windows sharepoint services windows server 2003 sharepoint windows server update services install windows internal database use default data store retail sql server database instance provided knowledge base article published microsoft states windows internal database identify removable component provides instructions may uninstalled calling windows installer directly sql server management studio express used connect instance windows internal database using codice_1 2003–2008 codice_2 2012 instance name work locally remote connections enabled edition sql server also note windows authentication used opposed sql server authentication administrators seem best results authenticating successfully logged using administrative account created windows installed
[ 10900, 10902, 11030, 7064, 5401, 4505, 11414, 4384, 8227, 11683, 11559, 4010, 10157, 9263, 11570, 6709, 8246, 7486, 4674, 1347, 1348, 5320, 4174, 847, 83, 1366, 1498, 603, 9434, 8159, 608, 2401, 8161, 7523, 11498, 3821, 10991, 3573, 9205, ...
Test
3,304
3
ThinkPad:thinkpad thinkpad line business-oriented laptop computers tablets designed developed marketed sold lenovo formerly ibm thinkpads known minimalist black boxy design initially modeled 1990 industrial designer richard sapper based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened thinkpad line first developed ibm yamato facility japan led arimasa naitoh dubbed father thinkpad first thinkpads released october 1992 considered innovative became large success ibm decade thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years aftermarket parts developed models custom motherboards current processors created x60 x200 thinkpad laptops used outer space 2003 laptops certified use international space station name thinkpad product ibm corporate history culture thomas j. watson sr. first introduced think ibm slogan 1920s every minicomputer mainframe ibm installed almost leased – sold blue plastic sign placed atop operator console think command aluminum plate decades ibm distributed small notepads word think emblazoned brown leatherette cover customers employees name thinkpad suggested ibm employee denny wainwright think notepad pocket name opposed ibm corporate naming committee names ibm computers numeric time thinkpad kept due praise journalists public thinkpad ibm answer toshiba compaq notebook market well apple dec task making notebook given yamato facility japan led arimasa naitoh japanese man joined ibm 1970s dubbed father thinkpad ibm pushing thinkpad 1992 launch keep harvard business school happy april 1992 ibm announced first thinkpad tablet computer news conference first thinkpad tablet penpoint-based device formally known ibm 2521 thinkpad positioned developer release thinkpad tablet became available purchase general public october year addition giving innovative name ibm marketed thinkpad imaginative activities early customer pilot programs numerous pre-launch announcements extensive loaner program designed showcase product strengths weaknesses ibm even worked archaeologists excavating ancient egyptian city leontopolis field test thinkpad device loaned dig team summer resulting report documented thinkpad excellent performance difficult conditions report said thinkpad impressive machine rugged enough used without special care worst conditions egypt offer first thinkpad model announced april 1992 700 renamed 700t release three newer models 300 new 700 700c october 1992 bright red trackpoint kind pointing stick embedded keyboard enabled notebook used without external pointing device first thinkpads successful collecting 300 awards design quality thinkpad 755c laptop computers used payload general support computers aboard space shuttle 1990s thinkpad 760ed also tested part shuttle–mir program period 760ed computer used without modification model used space program contained intel 133 mega hertz pentium processor 48 megabytes ram four speed cd-rom power supply unit 1.44 megabyte floppy disk drive two 1.2 gigabyte hard drives accessories use space laptops subject radiation could cause errors 760ed noted improvement area 755c traditionally black thinkpads commonly featured magnesium carbon fiber reinforced plastic titanium composite cases thinkpad introduced innovations including trackpoint pointing device thinklight led keyboard light top lcd screen active protection system accelerometer sensor detects thinkpad falling shuts hard disk drive prevent damage roll cage design minimize motherboard flex stainless steel hinges biometric fingerprint reader client security solution improves security using built-in trusted platform module tpm facilitates deployment corporate environment thinkvantage technologies suite computer management applications drain holes help reduce damage keyboard components accidental spillage original design concept thinkpad created 1990 italy-based designer richard sapper corporate design consultant ibm since 2005 lenovo sapper noted design classic products tizio lamp artemide office chair knoll kitchenwares alessi ballpoint lamy design based concept traditional japanese bento lunchbox revealing nature opened according later interviews sapper also characterized simple thinkpad form elementary simple black cigar box similar proportions offers 'surprise opened computers also known iconic red trackpoint variation joystick middle keyboard first thinkpad notebook 700c announced 1992 first new product emerge ibm differentiated product personality strategy resulting collaboration sapper tom hardy head corporate ibm design program development 700c also involved close working relationship sapper kazuhiko yamazaki lead notebook designer ibm yamato design center japan liaison sapper yamato engineering 1990–1992 pre-internet collaboration italy japan facilitated special sony digital communications system transmitted high-res images telephone lines system established several key global design centers hardy ibm designers could visually communicate effectively interact directly sapper advice projects innovative design management leadership thinkpad development hardy named innovator year 1992 pc magazine since 1992 thinkpad design regularly updated developed refined years sapper respective teams ibm later lenovo included yamazaki tom takahashi sam lucente since 1995 david hill vice president user experience design leads manages design/user experience thinkpad hill approach maintaining evolution sapper original thinkpad design analogous porsche manages evolution classic 911 fold-out butterfly keyboard appeared thinkpad 701 series designed sapper collaboration sam lucente john karidis widely considered design masterpiece display museum modern art new york city thinkpad 760 series also included unusual keyboard design keyboard elevated two arms riding small rails side screen tilting keyboard achieve ergonomic design although almost models feature trackpoint models touchpad left right buttons possibly making mouse clicks less ergonomic touchpads x220 double regular mouse buttons also case newer models december 2013 cause problems accidental clicking much pressure exerted mouse movements occasion 20th anniversary thinkpad introduction david hill authored designed commemorative book thinkpad design titled thinkpad design spirit essence book revealed event held moma thinkpads especially popular businesses older models revered technology enthusiasts collectors power users due durable design relatively high resale value abundance aftermarket replacement parts thinkpads received somewhat cult following small loyal fanbase throughout years laptop magazine 2006 called thinkpad highest-quality laptop computer keyboard available ranked first reliability support pc magazine 2007 survey lenovo thinkpad pc magazine 2006 reader choice pc based laptops ranked number 1 support pc based laptops thinkpad series first product receive pc world hall fame award enderle group rob enderle said constant thing thinkpad brand stands quality build best keyboard business thinkpad x tablet-series pc magazine editor choice tablet pcs thinkpad x60s ranked number one ultraportable laptops pc world lasted 8 hours 21 minutes single charge 8-cell battery lenovo thinkpad x60s series pc world top 100 products 2006 2005 pc world reliability service survey ranked thinkpad products ahead brands reliability 2004 survey ranked second behind emachines lenovo named environment-friendly company electronics industry greenpeace 2007 since dropped place 14 17 october 2010 lenovo thinkpad t60p received editor choice award mobile graphic workstation pc magazine lenovo thinkpad x60 pc magazine editor choice among ultra-portable laptops lenovo thinkpad t400-series pc world top 100 products 2009 thinkpad laptops 2003 laptops certified use international space station 2017 currently operate linux windows xp windows vista software nasa purchased 500 thinkpad 750 laptops flight qualification software development crew training astronaut senator john glenn used thinkpad laptops spaceflight mission sts-95 1998 thinkpad models used shuttle missions include least three thinkpad 750c left spektr module mir module depressurized laptops used aboard space shuttle international space station feature safety operational improvements weightless environment must operate modifications include velcro tape attach surfaces upgrades cpu video card cooling fans accommodate microgravity hotter air n't rise lower density cabin air adapter station 28 volt dc power thinkpad 750 flew aboard space shuttle endeavour mission repair hubble space telescope 2 december 1993 thinkpad 750c task run nasa test program determined radiation inherent space environment causes memory anomalies 750c generates unexpected problems 755c also used 760ed tested well part shuttle–mir test thinkpads used conjunction joystick portable in-flight landing operations trainer pilot throughout 2006 thinkpad a31p used service module central post international space station seven thinkpad a31p laptops service orbit aboard international space station 2010 space station equipped 68 thinkpad a31 computers along 32 new lenovo thinkpad t61p laptops plus dedicated ip phone also limited video phone capabilities work incorporating laptops station lan continued june 2011 laptops aboard iss connected station lan via wi-fi connected ground 3 mbit/s 10 mbit/s comparable home dsl connection speeds 2005 chinese technology company lenovo purchased ibm personal computer business thinkpad flagship brand along speaking purchase ibm personal computer division liu chuanzhi said benefited three ways ibm acquisition got thinkpad brand ibm advanced pc manufacturing technology company international resources global sales channels operation teams three elements shored sales revenue past several years although lenovo acquired right use ibm brand name five years acquisition ibm personal computer business lenovo used three years majority thinkpad computers since 2005 acquisition brand lenovo made china addition chinese manufacturing facilities lenovo employs 300 people combined manufacturing distribution center near american headquarters morrisville north carolina device made facility packed box sports red-white-and-blue sticker proclaiming whitsett north carolina 2012 lenovo partially moved production thinkpad line computers japan thinkpads produced nec yonezawa yamagata akaemi watanabe president lenovo japan said japanese glad see return domestic production goal realize full-scale production improve image make products acceptable japanese customers 2014 although sales rose 5.6 percent previous year lenovo lost position top commercial notebook maker however company celebrated milestone 2015 shipment 100 millionth unit thinkpad line lenovo laptops x230 w530 t430 block third-party batteries lenovo calls feature battery safeguard first introduced models may 2012 laptops feature scan security chips thinkpad-branded batteries contain affected thinkpads flash message stating genuine lenovo battery attached third-party batteries used thinkpad yoga ultrabook-class convertible device functions laptop tablet computer yoga gets name consumer-oriented ideapad yoga line computers form factor thinkpad yoga backlit keyboard flattens flipped tablet mode accomplished platform surrounding keys rises level keyboard buttons locking mechanism prevents key presses feet pop prevent keyboard directly resting flat surfaces lenovo implemented design response complaints earlier yoga 13 11 models awkward use tablet mode reinforced hinge required implement design convertible form factor thinkpad yoga retains standard thinkpad features black magnesium-reinforced chassis island keyboard red trackpoint large buttonless trackpad released august 2011 thinkpad tablet first lenovo line business-oriented tablets thinkpad brand tablet described gadget mix premium business tablet since tablet primarily business-oriented includes features security anti-theft software ability remotely disable tablet sd card encryption layered data encryption cisco virtual private network vpn additionally thinkpad tablet able run software ibm lotus notes traveler stylus could used write notes tablet also included software convert handwritten content text another feature tablet drag-and-drop utility designed take advantage tablet touch capabilities feature could used transfer data usb devices internal storage sd card slashgear summarized thinkpad tablet saying stylus styling add distinctive slate n't merely attempt ape apple ipad order celebrate 20th anniversary thinkpad lenovo held large party new york announced several products including tablet 2 lenovo says thinkpad tablet 2 available 28 october 2012 windows 8 released thinkpad tablet 2 runs windows 8 professional operating system able run desktop software compatible version windows tablet 2 based clover trail version intel atom processor customized tablets tablet 2 2 gigabytes ram 64gb ssd tablet 2 10.1-inch ips display 16:9 aspect ratio resolution preview cnet wrote windows 8 looked readable functional metro standard windows-based interfaces mini-hdmi port included video output 8-megapixel rear camera 2-megapixel front camera included along noise-canceling microphone order facilitate video conferencing announced released january 2014 thinkpad 8 based intel bay trail atom z3770 processor 2 gb ram 128 gb built-in storage thinkpad 8 8.3-inch ips display 16:10 aspect ratio resolution pixels features include aluminum chassis micro-hdmi port 8-megapixel back camera flash optional 4g connectivity runs windows 8 operating system announced may 2014 lenovo thinkpad 10 successor thinkpad tablet 2 scheduled launch summer 2014 along accessories docking station external detachable magnetic keyboards used windows 8.1 pro operating system available 64 128gb variants 1.6ghz quad-core intel atom baytrail processor 2gb 4gb ram optionally supported 3g 4g lte display resolution announced paired stylus pen thinkpad x1 tablet fanless tablet powered core cpus available 4 8 16gb lpddr3 ram sata pcie nvme ssds 1tb ips screen supports touch pen input thinkpad 11e budget laptop computer schools students 11-inch screen without trackpoint 11e yoga convertible version 11e e series low-cost thinkpad line designed small business mass-market requirements currently contains 14 15 sub-lines e series line laptops replaced lenovo edge series somewhere countries currently may 2019 offered thinkpad edge/e series names l series replaced former r series positioned mid-range thinkpad offering mainstream intel core i3/i5/i7 cpus l series 3 sub-lines long-running 14 15.6 launched line two models l412 l512 2010 2018 also 13 l380 available replaces thinkpad 13 main difference e series l series basic mil-std-810 certification l series thinkpads series historically high-end features magnesium alloy rollcages high-density ips screens known flexview discontinued t60 series 7-row keyboards screen latches lenovo ultrabay thinklight models included 14.1-inch 15.4-inch displays available 4:3 16:10 aspect ratios since 2012 entire thinkpad line given complete overhaul modifications removal separate buttons use trackpoint reintroduced 2015 removal separate audio control buttons removal screen latch removal led indicator lights new ultra-portable models t430u t431s non-replaceable batteries newer models combination built-in replaceable battery enabling user switch replaceable without putting computer hibernation also non-widescreen displays longer available 16:9 aspect ratio remaining choice x series main high-end ultraportable thinkpad line offering lightweight highly portable laptop moderate performance current sub-lines x series includes daughter line includes x1 tablet confused 2005-2013 x series tablets mainstream current workhorse models x390 x390 yoga 13 successors classic discountinued 12 line lenovo x series thinkpads premium 14 /15 thin-and-light line 13.3 thinkpad models x300/x301 ultrabay cd-rom removable battery replaced modern premium x1-series ultrabook line x1 carbon x1 yoga x1 extreme sub-series discountinued mainstream lines 12 x200 x201 x220 models could ordered high-end thinkpad features like trackpoint thinklight 7-row keyboard docking port hot-swappable hdd solid magnesium case optional slice battery discontinued 12.5 x220 x230 still featured roll cage thinklight optional premium ips display first ips display non-tablet thinkpad since t60p 7-row keyboard offered x220 however lacked lid latch mechanism present previous x200 x201 versions discontinued slim 12 line contained x200s x201s low power cpus high resolution displays x230s low power cpus 12.5 x series thinkpads x240 later simplified design last 12 x280 model trackpoint feature partially magnesium case simplified docking port obsolete low-cost 11.6 netbook line x100e x120e plastic lacking latch thinklight using variant island keyboard known chiclet keyboard found edge series x100e also offered red addition blue white countries like high-end netbooks whereas x200 series like full ultraportables featuring intel core previously core 2 celeron series cpus rather amd netbook cpus x series tablet suffixes outdated variant 12 x series models low voltage cpus flip-screen tablet resistive touchscreen include traditional thinkpad features noted using higher quality affs-type screen better viewing angles compared screens used thinkpads p series line laptops replaced lenovo w series p series excluding models suffix designed engineers architects animators etc comes variety high-end options p series models included fingerprint readers first generation comes variety high-end options intel xeon processors 4k screens ddr4 ram 64gb 1080p screens intel core series cpus pcie ssds come standard p series uses cooling system known flex features two fans connected heat pipe located near cpu gpu three-button touchpad included color calibrator dropped nvidia pascal gpus new dock stations side connection port hardware update optional oled screen p1 gen2 thinkpad stack line products includes accessories designed portability interoperability line includes external hard drives wireless router power bank bluetooth 4.0 speaker stack device includes rubber feet magnets pogo-pin power connections allow use single cable combined weight stack devices slightly less two pounds stack series announced january 2015 international ces stack series accessories expanded 2016 international ces include 720p resolution projector 150 lumens brightness wireless charging station stack blocky black rectangular look thinkpad logo shares common design language thinkpad laptop computers dock stations finder thinkpad usb 3.0 secure hard drive thinkpad keyboards thinkpad stands japan-only thinkpad 235 type 2607 progeny ibm/ricoh rios project also known clavius chandra2 contains unusual features like presence three pcmcia slots use dual camcorder batteries source power features intel pentium mmx 233 mhz cpu support 160 mb edo memory built-in hard drive udma support hitachi marketed chandra2 prius note 210 ultraportable thinkpad 240 x z started intel celeron processor went 600 mhz intel pentium iii models using intel 440bx chipset ram expandable 320 mb max bios update screen key pitch standard key pitch also one first thinkpad series contain built-in mini pci card slot form factor 3b 240s optical disc drives external floppy drive optional extended battery sticks bottom like bar props back laptop weighing smallest lightest thinkpads ever made 300-series 300 310 340 350 360 365 380 385 390 various sub-series long-running value series starting 386sl/25 processor way pentium iii 450 300 series offered slightly lower-price alternative 700 series exceptions thinkpad 360pe unique model series could used regular laptop transform tablet flipping monitor top retailing 3,699 1995 360pe featured touch sensitive monitor operated stylus machine could run operating systems supported touch screen pendos 2.2 500-series 500 510 560 e x z 570 e main line ultraportable thinkpads starting 486slc2-50 blue lightning pentium iii 500 machines hard disk board drives external 570 case ultrabase weighed around 600-series 600 600e 600x direct predecessors series 600-series packed svga xga tft lcd pentium mmx pentium ii iii processor full-sized keyboard optical bay package weighing roughly ibm able create light fully featured machine using lightweight strong carbon fiber composite plastics battery shipped 600-series models manufacturing defect left vulnerable memory effect resulted poor battery life problem avoided use third-party battery 700-series 700 701 720 730 tablet 750 755 760 765 770 various sub-models considered cutting-edge intel-based thinkpads featured best screens largest hard drives fastest processors available time first successful thinkpad introduced 1992 first thinkpad tablet pc 700t model without keyboard mouse thinkpad 800-series 800/820/821/822/823/850/851/860 unique based powerpc architecture rather intel x86 architecture 800 series laptops used powerpc 603e cpu speeds 100 mhz 166 mhz 860 model although earliest 800 type 6020 direct ancestor 850 used 603 apparently offered developers units used scsi-2 instead ide hard disks id every scsi device system could configured cursor driven gui-based bios another unusual aspect series unique startup chime reminiscent apple macintosh computers time powerpc thinkpad line considerably expensive standard x86 thinkpads—even modestly configured 850 cost upwards 12,000 hand 800 850 851 later 860 861 capable supporting optional web camera one first commercially available webcams available laptop units could also record pal ntsc signals onboard composite connectors batteries contained internal processors regulate power usage optimized battery longevity powerpc thinkpads could run windows nt 3.5 4.0 os/2 warp connect powerpc edition aix 4.1.x solaris desktop 2.5.1 powerpc edition many powerpc operating systems corresponding compilers scarce hard find however also possible run certain powerpc versions linux 800 series thinkpad series introduced ibm 1999 geared towards multimedia focus many models featuring independent integrated cd players multimedia access buttons 1400 1500 models designed acer ibm contract featured similar hardware found acer laptops including ali chipsets three way audio jacks internal plastics painted copper paint series thinkpads particularly acer developed models prone broken hinges stress damage chassis one notable thinkpad series lineup s3x s30/s31 models featuring unique keyboard lid design allowing standard size keyboard fit chassis otherwise would n't able support protruding keyboard models largely available asia pacific ibm offered optional piano black lid models designed yamato design lab thinkpad since 701c feature special design accommodate keyboard physically larger laptop also thinkpad aside z61 deviate away standard matte lid a-series developed all-around productivity machine equipped hardware powerful enough make desktop replacement hence biggest heaviest thinkpad series time also features even found t-series age a-series dropped favor g-series r-series a31 released 2002 desktop replacement system equipped pentium 4-m processor clocked 1.6 1.8 1.9 2.0 ghz max supported 2.6 ghz ati mobility radeon 7500 128 256 mb pc2100 ram officially upgradable 1 gb unofficially upgraded 2 gb ibm high rate wireless prism 2.5 based modified support wpa-tkip equipped 20 30 40 gb hard disk drive r series budget line beginning r30 2001 ending r400 r500 presented 2008 successor r400 r500 models thinkpad l series l412 l512 models notable model r50p optional 15 ips lcd screen introduced 2003 g-series consisted three models g40 g41 g50 large heavy machines equipped powerful desktop processors line thinkpads consequently served mainly replacements desktop computers z series released high-end multimedia laptop result first thinkpad feature widescreen 16:10 aspect ratio display z-series also unique certain models featured optional titanium lid integrated wwan webcam also found configurations series ever included z60 z60m z60t z61 z61m z61t z61p latter first z-series thinkpad intel yonah dual core technology processor supports intel vt-x disabled bios turned bios update running fully virtualised operating systems via xen vmware therefore possible despite z61 carrying number t61 hardware z61 closer t60 likewise z60 closer t43 15-year anniversary thinkpad model based x60s laptop model initially known inside lenovo scout name horse ridden tonto sidekick 1950s television series lone ranger lenovo envisioned scout high-end thinkpad would analogous luxury car unit covered fine leather embossed owners initials extensive market research conducted consumers would perceive form factor determined appreciated emphasised warmth nature human relations technology scout soon renamed thinkpad reserve edition came bundled premium services including dedicated 24-hour technical support hotline would answered immediately released 2007 sold 5,000 united states sl series launched 2008 low-end thinkpad targeted mainly geared toward small businesses lacked several traditional thinkpad features thinklight magnesium alloy roll cage ultrabay lid latch use 6-row keyboard different layout traditional 7-row thinkpad keyboard also sl-series models ideapad-based firmware models offered included 14 sl400 sl410 15.6 sl500 sl510 13.3 model sl300 previously offered discontinued w series introduced 2008 replace p-suffixed performance series e.g t61p geared towards cad users photographers power users others need high-performance system demanding tasks w530 released june 2012 minimum specifications include intel core i5 i7 cpu 15.6 hd screen nvidia quadro k1000m graphics processor four dimm slots capable accepting maximum 32 gb ram previously available w7xx series 17 widescreen model w500 15.4 16:10 ratio model w510 15.6 16:9 ratio model w520 15.6 16:9 ratio model w700ds w701ds two displays 17 main lcd 10 slide-out secondary lcd w7xx series also available wacom digitizer built palm rest high-performance workstation models offered high-end components quad core cpus higher-end workstation graphics compared t-series powerful thinkpad laptops available w540 retained thinklight ultrabay roll cage lid latch found t-series w540 release marked end lid latch thinklight hot-swappable ultrabays found earlier models thinkpad w series discontinued replaced p series mobile workstations edge series released early 2010 small business consumer-end machines design radical departure compared traditional black boxy thinkpad design glossy surfaces optional matte finish later models rounded corners silver trim also offered red first traditionally black thinkpads like sl series targeted towards small businesses consumers lack roll cage ultrabay lid latch thinklight traditional thinkpads though 2011 e220s e420s thinklights also introduced island-style keyboard significantly different layout models included 12.5 e220 e220s 13.3 edge 13 14 edge 14 e420 e420s 15.6 edge 15 e520 e545 sizes 11.6 edge 11 model offered available united states series positioned mid-range thinkpad offering containing ultrabooks derived edge series august 2013 series includes s531 s440 models cases made aluminum magnesium alloy available silver gunmetal colors lenovo thinkpad twist s230u laptop/tablet computer hybrid aimed high-end users twist gets name screen ability twist manner converts device tablet twist 12.5 screen makes use intel core i7 processor ssd technology lieu hard drive review engadget dana wollman wrote lately feel like reviews windows 8 convertibles end way thinkpad twist plenty going bright ips display good port selection affordable price unrivaled typing experience like thinkpads past also offers useful software features businesses lacking dedicated departments good things road warrior battery barely lasts four hours something tells us twist still appeal lenovo loyalists folks trust thinkpad build quality would n't caught dead using keyboard 're brand-agnostic though windows 8 convertibles comfortable keyboards – mention sharper screens faster performance longer battery life helix convertible laptop satisfying tablet conventional notebook users uses rip flip design allows user detach display replace facing different direction sports 11.6 full hd 1920 × 1080 display support windows 8 multi-touch essential processing hardware contained display assembly multitouch capability detached monitor used standalone tablet computer helix high-end hardware build quality including gorilla glass stylus-based input intel vpro hardware-based security features designed appeal business users review published forbes jason evangelho wrote first laptop owned thinkpad t20 next one may likely thinkpad helix lenovo unveiled ces 2013 sea touch-inspired windows 8 hardware first ultrabook convertible form factor gets everything right first batch windows 8 ultrabooks get high marks inspired designs n't quite flexible enough truly byod bring device solutions lenovo ideapad yoga came close sensation feeling keyboard underneath fingers transformed tablet mode slightly jarring dell xps 12 solved problem clever rotating hinge design wanted ability remove tablet display entirely products thinkpad 13 also known thinkpad s2 mainland china budget model 13-inch screen versions running windows 10 google chrome os options powerful configuration skylake core i7 processor 512gb ssd connectivity includes hdmi usb 3.0 onelink+ usb type-c etc weighs thick 2017 second generation ultrabook model released kaby lake core i7 processor fhd touchscreen available certain countries lineup merged l-series 2018 l380 successor 13 second generation lenovo released 25th anniversary retro thinkpad 25 october 2017 model based t470 difference 7-row classic keyboard layout found −20 series logo received splash colour reminiscent ibm era last thinkpad models 7-row keyboard introduced 2011 september 2017 lenovo announced two thinkpad models featuring amd pro chipset technology – a275 a475 sees revival series nameplate seen since early 2000s thinkpads ibm ownership however likely moniker emphasised uses amd technology rather comparative product segment workstation class previous line n't first time lenovo offered amd derived thinkpad first released alternative premium offering established series x series thinkpads use intel chipsets instead
[ 8578, 6148, 6153, 271, 8976, 4244, 3605, 9498, 4641, 1186, 4259, 10658, 1832, 11438, 7983, 5681, 5939, 823, 3514, 7354, 8900, 4816, 1874, 4306, 4565, 10838, 10972, 1380, 5606, 11623, 3304, 5481, 6129, 499, 5235, 2165, 1400, 3323, 8700 ]
Validation
3,305
4
Michael_Hayden_(general):michael hayden general michael vincent hayden born march 17 1945 retired united states air force four-star general former director national security agency principal deputy director national intelligence director central intelligence agency hayden currently co-chairs bipartisan policy center electric grid cyber security initiative 2017 hayden became national security analyst cnn director national security agency nsa 1999 2005 tenure director oversaw controversial nsa surveillance technological communications persons united states alleged foreign terrorist groups resulted nsa warrantless surveillance controversy april 21 2005 lt. gen hayden confirmed united states senate first principal deputy director national intelligence awarded fourth star-making highest-ranking military intelligence officer armed forces served position dni john negroponte may 26 2006 may 8 2006 hayden nominated position director central intelligence agency following resignation porter j. goss 23 may united states senate select committee intelligence voted 12–3 send nomination senate floor nomination confirmed united states senate 26 may vote 78–15 may 30 2006 following day cia lobby president george w. bush attendance hayden sworn director central intelligence agency july 1 2008 hayden retired air force 41 years service continued serve director cia february 12 2009 received honorary doctorate institute world politics washington d.c. 2009 currently principal chertoff group security consultancy co-founded former homeland security secretary michael chertoff also serves board directors caliburn international military contractor oversees operations homestead temporary shelter unaccompanied children hayden distinguished visiting professor george mason university schar school policy government elected board directors motorola solutions effective january 4 2011 michael vincent hayden born march 17 1945 pittsburgh pennsylvania irish-american couple sadie murray harry v. hayden jr. worked welder pennsylvania manufacturing company sister debby brother harry hayden attended st. peter elementary school 7th 8th grade played quarterback school football team coached late dan rooney son founder pittsburgh steelers former chairman team hayden graduated north catholic high school one first jobs equipment manager steelers went duquesne university pittsburgh earned bachelor arts history 1967 commissioned second lieutenant attended graduate school duquesne master degree modern american history continues avid fan hometown pittsburgh steelers since 1990s traveling wife family least three four games year hayden commissioned duquesne university air force reserve officers training corps program hayden entered active military service 1969 hayden married former jeanine carrier daughter margaret two sons michael liam november 2018 hayden hospitalized suffering stroke hayden served commander air intelligence agency director joint command control warfare center headquartered lackland air force base also served senior staff positions pentagon headquarters u.s. european command stuttgart germany national security council washington d.c. u.s. embassy then-people republic bulgaria prior becoming director national security agency general served deputy chief staff united nations command u.s forces korea yongsan garrison also worked intelligence guam 1996 1997 hayden served commander aia agency 16,000 charged defending exploiting information domain hayden served director national security agency chief central security service fort george g. meade maryland march 1999 april 2005 director nsa chief css responsible combat support agency department defense military civilian personnel stationed worldwide hayden came nsa time great trouble agency internal government analysis indicated suffered lack quality management outdated infrastructure fact soon came board huge part nsa network system crashed several days part plan revitalize agency introduce outside contractors induce lot old managers retire get rid old management structures part plan also included increased openness agency historically one secretive organs government notably allowed james bamford access book body secrets hayden also initially extremely concerned following laws domestic surveillance many reports say 9/11 became concerned stopping terrorism allegedly softened stance domestic surveillance hayden however said believed everything agency effective appropriate lawful 9/11 hayden immediately evacuated non-essential personnel nsa headquarters 9/11 agency greatly increased activity details operations largely hidden played major role wars afghanistan iraq war terror one notable example relationship unmanned aerial vehicle 'drone program may 2006 usa today reported hayden leadership nsa created domestic telephone call database nomination hearings hayden defended actions senator russ feingold others stating relied upon legal advice white house building database supported article two united states constitution executive branch powers president must take care laws faithfully executed overriding legislative branch statutes forbidding warrantless surveillance domestic calls included foreign intelligence surveillance act fisa previously action would required warrant fisa court stated purpose database eavesdrop international communications persons within u.s. individuals groups overseas order locate terrorists hayden also championed trailblazer project transformation project large information technology component project criticized several nsa staffers including privacy protections united states citizens waste money critics included diane roark house intelligence committee nsa workers thomas andrews drake william binney j. kirk wiebe loomis others hayden severely rebuked critics several quit protest investigations nsa inspector general dod inspector general congress trailblazer shut part intelligence reform terrorism prevention act 2004 cia chief longer would run intelligence community instead new office created purpose director national intelligence general hayden became principal deputy director national intelligence may 2005 may 2006 first dni john negroponte january 23 2006 hayden participated news conference youtube video posted michael hayden telling reporters press conference probable cause required searches seizures fourth amendment claiming instead standard whether search seizure reasonable probable cause required warrants whether search seizure deemed unreasonable hayden referred people believed torture cia detainees never yielded useful intelligence interrogation deniers may 8 2006 hayden nominated president george w. bush director central intelligence agency resignation porter j. goss may 5 2006 later confirmed may 26 2006 director 78–15 full u.s. senate vote critics nomination hayden attempts increase domestic surveillance included senator dianne feinstein stated may 11 2006 happen believe way major constitutional confrontation fourth amendment guarantees unreasonable search seizure hayden accused lying congress 2007 testimony cia 'enhanced interrogation program 2007 hayden lobbied allow cia conduct drone strikes purely behavior ground vehicles evidence connection terrorism 2008 hayden warned destabilizing consequences muslim migration europe might raise possibility civil unrest 2013 p5+1 reached nuclear agreement iran hayden said accepted iranian uranium enrichment 2014 senate intelligence committee report cia torture cited email prepared subordinate indicated cia director hayden instructed out-of-date information used briefing congress fewer 100 guantanamo bay detainees would reported september 2013 hayden stressed indisputable legality nsa called edward snowden troubled young man morally arrogant tremendous degree also said prospects russia suspect end like rest defectors went old soviet union isolated bored lonely depressed—and ended alcoholics 2008 native northside neighborhood city pittsburgh named part street going past heinz field honor july 26 2011 hayden inducted air force reserve officer training corps distinguished alumni ceremony maxwell afb alabama officiated lt. gen. allen g. peck commander air university serves member board advisors military cyber professionals association mcpa playing edge one new york times book review 100 notable books 2016
[ 6017, 3843, 1930, 8726, 8356, 1189, 3495, 297, 9517, 1838, 5308, 10305, 1986, 6343, 6344, 11335, 7119, 208, 7759, 3154, 7887, 8276, 7893, 9688, 991, 7137, 7145, 2419, 6005, 6136, 766 ]
Validation
3,306
4
Estonian_Defence_League's_Cyber_Unit:estonian defence league cyber unit estonian defence league ’ cyber unit kkl group units within certain malevs estonian defense league established 2010 created inspiration 2007 cyberattacks estonia spearheaded informatics scientist ülo jaaksoo focuses defense estonian state private telecommunications infrastructure outside-derived cyberattacks mostly employs volunteer participation professionals kkl headquartered grounds tartu tallinn malevs jointly headed tallinn jaan priisalu tartu kuido külm kkl mission protect estonia high-tech way life protecting information infrastructure thus carrying broad defense goals defence minister jaak aaviksoo publicly suggested desire spread kkl units branches option conscripted estonian military
[]
Test
3,307
3
Zaxxon:zaxxon zaxxon first game employ axonometric projection lent name game axxon axon ometric projection type axonometric projection isometric projection effect simulates three dimensions third-person viewpoint also first arcade game advertised television commercial produced paramount pictures 150,000 world record zaxxon 4,680,740 points scored vernon kalanikaus lā'ie hawai march 15 1982 according twin galaxies intergalactic scoreboard object game hit many targets possible without shot running fuel—which replenished paradoxically blowing fuel drums 300 points blowing satellites gun turrets score 200 500 1,000 points two fortresses fly outer space segment end second fortress boss form zaxxon robot destroying robot rocket six hits firing scores 1,000 otherwise 200 surviving ordeal outer space scene destroying 20 ships scores 1,000 points player ship casts shadow indicate height altimeter also displayed space nothing ship cast shadow walls entrance exit fortress openings ship must right altitude pass within fortress additional walls ship shadow altimeter aid flying successfully extra ship awarded usually 10,000 points thereafter lives 19 levels completed give appear lower right corner screen 1982 1985 zaxxon ported apple ii atari 8-bit family atari 2600 atari 5200 msx zx spectrum commodore 64 dragon 32 colecovision intellivision ibm pc compatibles sega sg-1000 trs-80 color computer trs-80 atari 2600 intellivision ports noticeably different used 3rd-person behind-the-ship 3d perspective instead isometric graphics versions colecovision version programmed coleco staffer lawrence schick first home version use isometric graphics 1983 coleco released table top version zaxxon double-panel vfd screen bandai released 2 zaxxon handhelds one vfd table top european japanese market lcd card game sold worldwide video games 1983 called colecovision version zaxxon coup new system video magazine also praised colecovision version arcade alley column describing one thrilling games available noting passing serious criticism arcade original many players felt needed flying lessons even ghost chance performing well k-power rated color computer version 8 points 10 magazine praised excellent three-dimensional graphics concluded zaxxon game ca n't praised enough softline 1983 called atari 8-bit version superb three-dimensional computer game ... since choplifter game looked impressive magazine also liked graphics apple ii trs-80 versions despite computers hardware limitations predicted zaxxon would long-lived bestseller 1984 magazine readers named game fifth most-popular apple program worst apple program third-worst atari program 1983 ii computing listed zaxxon fourth list top apple ii games late 1985 based sales market-share data 2006 zaxxon games included bonuses sega genesis collection sony playstation 2 psp consoles original zaxxon game included ps2 super zaxxon one available psp zaxxon also included unlockable arcade game sonic ultimate genesis collection xbox 360 playstation 3 arcade version released wii virtual console japan december 15 2009 pal region march 5 2010 north america april 12 2010 zaxxon spawned arcade sequel super zaxxon color scheme different player ship flies faster making game difficult robot end second fortress replaced dragon well original future spy released sega 1984 uses hardware zaxxon similar gameplay realistic military theme 1982 milton bradley made zaxxon board game 1987 zaxxon 3-d released master system console variation made use 3-d glasses add-on extra depth perception atari 2600 intellivision ports forward-scrolling rather isometric october 1993 atari corporation filed lawsuit sega alleged infringement patent originally created atari corp. 1980s former seeking preliminary injunction stop manufacturing usage sales hardware software sega genesis game gear september 28 1994 parties reached settlement involved cross-licensing agreement publish five titles year across systems 2001 zaxxon 3-d one first five titles approved deal sega order converted atari jaguar never released zaxxon motherbase 2000 released sega 32x 1995 first zaxxon game incorporate polygon graphics game bore zaxxon brand united states japanese version named parasquad european version named motherbase u.s. gaming critics generally remarked game similar enough zaxxon justify use brand zaxxon escape released october 4 2012 ios android devices game criticized little resemblance original bootleg released arcades 1982 called jackson unauthorized adaptations game published ti 99/4a arcturus amstrad cpc zaxx bbc micro fortress 1984 trs-80 color computer zakssund 1983 hostile terrain encounter h.a.t.e zaxxon clone developed vortex software several 8-bit 16-bit computers published gremlin graphics 1989 2012 zaxxon shown art video games exhibition smithsonian home video game console port zaxxon shown music video new order track blue monday character tommy jarvis played corey feldman paramount feature film seen playing zaxxon character introduction zaxxon featured plot device 1986 independent feature film hollywood zap zaxxon seen numerous times video gamed-themed storyline show remington steele episode steele waters run deep npr podcast pop culture happy hour holds hosts zaxxon rule wherein forbidden bring topics unrelatable audience events one personal life season 1 episode alley abc sitcom home improvement randy plays zaxxon bowling alley attempting set record bully tries stop playing
[ 8937, 4716, 5260, 8300, 9006, 1776, 6129, 10316, 5011, 10544, 10931, 919, 11448, 921, 986, 5820, 11231 ]
None
3,308
2
Microsoft_Tinker:microsoft tinker tinker also known microsoft tinker puzzle video game developed fuel industries player controls robot various mazes obstacle courses originally released september 23 2008 part windows ultimate extras contained 60 levels including 20-level tutorial free map editor level builder also released however compatible games windows – live version tinker compatible windows ultimate extras version december 15 2009 expanded live-enabled version game released games windows – live client game available windows xp windows vista windows 7 including users access windows vista ultimate extras windows vista editions contains 160 levels including tutorial version also 15 achievements worth 200g similar many xbox live arcade games like every games windows live game requires user sign using gamertag assigned windows live id however windows vista ultimate extras version requirement tinker spatial/environmental puzzle game players must guide robot end point moving objects activating switches traversing obstacles playing field square board divided checkerboard pattern robot given limited number moves make runs energy player must guide goal marker without expiring motions essentially action robot makes counts move including taking step activating switch turning around players must carefully plan actions stage waste moves players replenish robot energy collecting batteries thus extend possible number moves allowed make players earn achievement star level completing course par time energy cog collection cogs exist level obstacles objects present levels include movable objects pushed pulled two objects row pushed even movable objects stacked top pushed bottom object movable e.g. tower consisting two dice blocks metal block moved one dice blocks bottom attempting push immovable object row objects result wasted move though attempting walk obstacle waste move robot destroyed rendered inoperable hit laser beam falling height greater two blocks running energy hazards destroy robot process reaching exit e.g. robot walks laser beam crosses exit square hazard trumps exit robot destroyed however level completed exit reached zero energy live-enabled version tinker previously possible earn achievement star set 07 level 19 due energy par value -1 player could unlock perfection achieved achievement thus able obtain 175 achievement points 200 fuel industries game developer nick iannitti mentioned tinker blog fix sent gfwl march 7 2010 fix hours removed due bug auto-update code required unnecessary reboot update officially released april 10 2010 making perfection achieved achievement obtainable
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 8798, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9...
Test
3,309
5
Time-based_One-time_Password_algorithm:time-based one-time password algorithm time-based one-time password algorithm totp extension hmac-based one-time password algorithm hotp generating one-time password instead taking uniqueness current time adopted internet engineering task force standard rfc 6238 cornerstone initiative open authentication oath used number two-factor authentication systems latency network human unsynchronised clocks one-time password must validate range times authenticator authenticated time downsampled larger durations e.g. 30 seconds allow validity parties however hotp decreased uniqueness requires additional countermeasures rate limiting establish totp authentication authenticated authenticator must pre-establish hotp parameters following totp parameters authenticator authenticatee compute totpvalue authenticator checks totpvalue supplied authenticated matches locally-generated totpvalue authenticators allow values generated current time order account slight clock skews network latency user delays totp uses hotp algorithm substituting counter non-decreasing value based current time time counter c integer counting number durations difference current unix time epoch cf unix epoch latter values integer seconds note unix time strictly increasing specifically leap seconds inserted utc subsequent authentications work clocks authenticated authenticator need roughly synchronized authenticator typically accept one-time passwords generated timestamps differ ±1 time interval authenticated timestamp totpvalues phished passwords though require attackers proxy credentials real time rather collect later time implementations n't limit login attempts vulnerable brute forcing values attacker steals shared secret generate new valid totpvalues particular problem attacker breaches large authentication database totp devices batteries go flat clocks de-sync totp software versions run phones lost and/or stolen real-world implementations methods bypass protection e.g printed codes email-resets etc. cause considerable support burden large user-bases also gives fraudulent users additional vectors exploit totpvalues valid longer amount time show screen typically twice long concession authenticating authenticated sides clocks skewed large margin totp draft developed collaboration several oath members order create industry-backed standard complements event-based one-time standard hotp offers end user organizations enterprises choice selecting technologies best fit application requirements security guidelines 2008 oath submitted draft version specification ietf version incorporates feedback commentary authors received technical community based prior versions submitted ietf may 2011 totp officially became rfc 6238
[ 8260, 3590, 10566, 11244, 10961, 5077, 7958, 5373, 4575 ]
Test
3,310
4
Burp_Suite:burp suite burp burp suite graphical tool testing web application security tool written java developed portswigger web security tool three editions community edition downloaded free charge professional edition enterprise edition purchased trial period community edition significantly reduced functionality developed provide comprehensive solution web application security checks addition basic functionality proxy server scanner intruder tool also contains advanced options spider repeater decoder comparer extender sequencer company behind burp suite also developed mobile application containing similar tools compatible ios 8 portswigger founded 2004 dafydd stuttard leading expert web security also authored popular manual web application security
[ 5677, 461, 3604, 4725, 3290, 7228 ]
Validation
3,311
1
Corpus_of_Electronic_Texts:corpus electronic texts corpus electronic texts celt online database contemporary historical documents relating irish history culture 8 december 2016 celt contained 1,601 documents total 18 million words 1992 celt originated ashes unsuccessful partnership university college cork ucc/nui royal irish academy ria project named curia according celt database caters academic scholars teachers students general public world
[ 2901, 3311 ]
None
3,312
6
Be_File_System:file system file system bfs native file system beos linux kernel referred befs avoid confusion boot file system bfs developed dominic giampaolo cyril meurillon ten-month period starting september 1996 provide beos modern 64-bit capable journaling file system case-sensitive capable used floppy hard disks read-only media cd-roms however use small removable media advised file-system headers consume 600 kb 2 mb rendering floppy disks virtually useless like predecessor ofs old file system written benoit schillings formerly bfs includes support extended file attributes metadata indexing querying characteristics provide functionality similar relational database whilst intended 64-bit-capable file system size on-disk structures mean practical size limit approximately 2 exabytes similarly extent-based file allocation reduces maximum practical file size approximately 260 gigabytes best little blocks pathological worst case depending degree fragmentation design process application programming interface internal workings part documented book practical file system design file system addition original 1996 bfs used beos several implementations linux early 1999 makoto kato developed file system driver linux however driver never reached complete stable state 2001 dyson developed version linux bfs driver 2002 axel dörfler developers created released reimplemented bfs called openbfs haiku openbeos back january 2004 robert szeleney announced developed fork openbfs file system use skyos operating system regular openbfs implementation also ported syllable included since version 0.6.5
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 3631, 4665, 7225, 11323, 8772, 9286, 1109, 6236, 10851, 4708, 8298, 9836, 7789, 9333, 6263, 9335, 2687, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1...
None
3,313
9
Immediately_invoked_function_expression:immediately invoked function expression immediately invoked function expression iife pronounced iffy javascript programming language idiom produces lexical scope using javascript function scoping immediately invoked function expressions used avoid variable hoisting within blocks protect polluting global environment simultaneously allow public access methods retaining privacy variables defined within function immediately invoked function expressions may written number different ways common convention enclose function expressionand optionally invocation operatorwith grouping operator parentheses tell parser explicitly expect expression otherwise situations parser encounters codice_1 keyword treats function declaration statement function expression function /* ... */ function /* ... */ ways enforce function expression function /* ... */ ~function /* ... */ -function /* ... */ +function /* ... */ void function /* ... */ contexts expression expected wrapping parentheses necessary var f function /* ... */ true function /* ... */ 0 function /* ... */ passing variables scope done follows function b /* ... */ hello world initial parenthesis one case automatic semicolon insertion asi javascript cause problems expression instead interpreted call last term preceding line styles omit optional semicolons semicolon placed front parenthesis known defensive semicolon example b c // code ... avoid parsed codice_2 key understanding design patterns iife realize prior es6 javascript featured function scope thus lacking block scope passing values reference inside closures longer case es6 version javascript implements block scoping using new codice_3 codice_4 keywords lack block scope means variables defined inside example loop definition hoisted top enclosing function evaluating function depends variables modified outer function including iteration difficult see without loop update value defining invoking function var v getvalue v 1 getvalue function return v v 2 getvalue // 2 result may seem obvious updating codice_5 manually produce unintended results codice_6 defined inside loop hereafter function passes codice_5 argument invoked immediately preserving inner function execution context var v getvalue v 1 getvalue function x v v 2 getvalue // 1 equivalent following code var v getvalue v 1 function f x getvalue f v v 2 getvalue // 1 david herman effective javascript contains example illustrating problems evaluation context inside loops herman example deliberately convoluted arises directly lack block scope iifes also useful establishing private methods accessible functions still exposing properties later use following example comes alman post iifes // counter function returns object properties case functions var counter function // calls access function properties returned counter counter.get // 0 counter.set 3 counter.increment // 4 counter.increment // 5 attempt access codice_8 global environment undefined enclosed within invoked function property codice_9 likewise attempt access codice_10 result error declared codice_10 global environment originally known self-executing anonymous function ben alman later introduced current term iife semantically accurate name idiom shortly discussion arose comp.lang.javascript notably immediately invoked functions need anonymous inherently ecmascript5 strict mode forbids codice_12 rendering original term misnomer
[ 1152, 8289, 803, 5635, 3462, 10510, 10991, 8854 ]
Test
3,314
2
Boot_disk:boot disk boot disk removable digital data storage medium computer load run boot operating system utility program computer must built-in program load execute program boot disk meeting certain standards almost modern computers boot hard drive containing operating system software would normally called boot disks removable media cd-roms common forms media used media magnetic paper tape drives zip drives recently usb flash drives used computer bios must support booting device question boot disks used term boot comes idea lifting oneself one bootstraps computer contains tiny program bootstrap loader load run program found boot device program may small program designed load larger capable program i.e. full operating system enable booting without requirement either mass storage device write boot medium usual boot program use system ram ram disk temporary file storage example computer compatible ibm pc able built-in software load contents first 512 bytes floppy execute viable program boot floppies simple loader program bytes process vulnerable abuse data floppies could virus written first sector silently infects host computer switched disk drive bootable floppy disks boot floppies pcs usually contain dos miniature versions linux commonly available floppy disk hold 1.4 mb data standard format making impractical loading large operating systems use boot floppies decline due availability higher-capacity options cd-roms usb flash drives modern pc configured attempt boot various devices certain order computer booting device desired floppy drive user may enter bios setup function pressing special key computer first turned delete f1 f2 f10 f12 changing boot order recent bioses permit interruption final stage boot process pressing function key usually f11 results list bootable devices presented selection may made modern apple computers boot appropriate disk user presses c key machine starting different operating systems use different boot disk contents boot disks must compatible computer designed files must version operating system complete boot disks prepared one operation installed operating system details vary
[ 1408, 2432, 516, 1801, 2196, 8857, 4637, 7983, 5425, 3382, 823, 9910, 954, 2107, 831, 5596, 6494, 4581, 1515, 6768, 6393, 2811, 1150, 639 ]
Test
3,315
6
Disk_sector:disk sector computer disk storage sector subdivision track magnetic disk optical disc sector stores fixed amount user-accessible data traditionally 512 bytes hard disk drives hdds 2048 bytes cd-roms dvd-roms newer hdds use 4096-byte 4 kib sectors known advanced format af sector minimum storage unit hard drive disk partitioning schemes designed files occupy integral number sectors regardless file actual size files fill whole sector remainder last sector filled zeroes practice operating systems typically operate blocks data may span multiple sectors geometrically word sector means portion disk center two radii corresponding arc see figure 1 item b shaped like slice pie thus disk sector figure 1 item c refers intersection track geometrical sector modern disk drives physical sector made two basic parts sector header area typically called id data area sector header contains information used drive controller information includes sync bytes address identification flaw flag error detection correction information header may also include alternate address used data area undependable address identification used ensure mechanics drive positioned read/write head correct location data area contains sync bytes user data error-correcting code ecc used check possibly correct errors may introduced data first disk drive 1957 ibm 350 disk storage ten 100 character sectors per track character six bits included parity bit number sectors per track identical recording surfaces recorded identifier field id associated sector 1961 ibm 1301 disk storage introduced variable length sectors termed records ibm added record record address field separate data record sector modern disk drives sector address fields called id fields separate data sector also 1961 bryant 4000 series introduced concept zoned recording allowed number sectors per track vary function track diameter sectors outer track inner track became industry practice 1990s standard today disk drives announced ibm system/360 1964 detected errors fields sectors records cyclic redundancy check crc replacing parity per character detection prior generations ibm sectors records time added third field physical sector key field aid searching data ibm physical sectors called records three basic parts count field acts id field key field present disk drive sectors data field frequently called ckd format record 1970 ibm 3330 disk storage replaced crc data field sector error correcting code ecc improve data integrity detecting errors allowing correction many errors ultimately fields disk sectors eccs prior 1980s little standardization sector sizes disk drives maximum number bits per track various system manufacturers subdivided track different sector sizes suit oses applications popularity pc beginning 1980s advent ide interface late 1980s led 512-byte sector becoming industry standard sector size hdds similar storage devices 1970s ibm added fixed-block architecture direct access storage devices fba dasds line ckd dasd ckd dasd supported multiple variable length sectors ibm fba dasd supported sector sizes 512 1024 2048 4096 bytes 2000 industry trade organization international disk drive equipment materials association idema started work define implementation standards would govern sector size formats exceeding 512 bytes accommodate future increases data storage capacities.by end 2007 anticipation future idema standard samsung toshiba began shipments 1.8-inch hard disk drives 4096 byte sectors 2010 idema completed advanced format standard 4096 sector drives setting date transition 512 4096 byte sectors january 2011 manufacturers advanced format drives soon became prevalent sector specifically means physical disk area term block used loosely refer small chunk data block multiple meanings depending context context data storage filesystem block abstraction disk sectors possibly encompassing multiple sectors contexts may unit data stream unit operation utility example unix program dd allows one set block size used execution parameter codice_1 specifies size chunks data delivered dd unrelated sectors filesystem blocks linux disk sector size determined codice_2 block size determined codice_3 sector defined intersection radius track case early hard drives floppy disks sectors towards outside disk physically longer nearer spindle sector still contains number bytes outer sectors lower bit density inner ones inefficient use magnetic surface solution zone bit recording wherein disk divided zones encompassing small number contiguous tracks zone divided sectors sector similar physical size outer zones greater circumference inner zones allocated sectors known zoned bit rate consequence zone bit recording contiguous reads writes noticeably faster outer tracks corresponding lower block addresses inner tracks bits pass head rotation difference 25 1998 traditional 512-byte sector size identified one impediment increasing capacity time growing rate exceeding moore law increasing length data field implementation advanced format using 4096-byte sectors removed impediment increased efficiency data surface area five thirteen percent increasing strength ecc turn allowed higher capacity format standardized industry consortium 2005 2011 incorporated new products hard drive manufacturers
[ 2432, 3841, 10508, 10382, 6289, 9874, 6297, 6939, 7969, 2221, 7342, 819, 5816, 3257, 7229, 8129, 4563, 7767, 6494, 5598, 9319, 11368, 8301, 8049, 5492, 8951, 3323 ]
Validation
3,316
0
Lexical_choice:lexical choice lexical choice subtask natural language generation involves choosing content words nouns verbs adjectives adverbs generated text function words determiners example usually chosen realisation simplest type lexical choice involves mapping domain concept perhaps represented ontology word example concept finger might mapped word finger complex situation domain concept expressed using different words different situations example domain concept value-change expressed many ways sometimes words communicate additional contextual information example contextual information especially significant vague terms tall example 2m tall man tall 2m tall horse small lexical choice modules must informed linguistic knowledge system input data maps onto words question semantics also influenced syntactic factors collocation effects pragmatic factors context hence nlg systems need linguistic models meaning mapped words target domain genre nlg system genre tends important example verb veer specific meaning weather forecasts wind direction changing clockwise direction general english weather-forecast generator must aware genre-specific meaning cases major differences different people use word example people use evening mean 6pm others use mean midnight psycholinguists shown people speak agree common interpretation via lexical alignment something nlg systems yet ultimately lexical choice must deal fundamental issue language relates non-linguistic world example system chose colour terms red describe objects digital image would need know rgb pixel values could generally described red influenced visual lighting objects scene linguistic objects discussed context pragmatic connotations associated red example apple called red assumed ripe well colour red forth number algorithms models developed lexical choice research community example edmonds developed model choosing near-synonyms words similar core meanings different connotations however algorithms models widely used applied nlg systems systems instead often used quite simple computational models invested development effort linguistic analysis instead algorithm development
[ 2440, 5508 ]
None
3,317
3
P6_(microarchitecture):p6 microarchitecture p6 microarchitecture sixth-generation intel x86 microarchitecture implemented pentium pro microprocessor introduced november 1995 frequently referred i686 succeeded netburst microarchitecture 2000 eventually revived pentium line microprocessors successor pentium variant p6 microarchitecture core microarchitecture turn also derived p6 microarchitecture p6 core sixth generation intel microprocessor x86 line first implementation p6 core pentium pro cpu 1995 immediate successor original pentium design p5 p6 processors dynamically translate ia-32 instructions sequences buffered risc-like micro-operations analyze reorder micro-operations order detect parallelizable operations may issued one execution unit pentium pro first x86 chip use technique — nexgen nx586 introduced 1994 also used — first intel x86 chip techniques first used x86 space p6 core include p6 architecture lasted three generations pentium pro pentium iii widely known low power consumption excellent integer performance relatively high instructions per cycle ipc p6 line processing cores succeeded netburst p68 architecture appeared introduction pentium 4 completely different design based use long pipelines favoured high clock speed cost lower ipc higher power consumption upon release pentium 4-m mobile pentium 4 quickly realized new mobile netburst processors ideal mobile computing netburst-based processors simply efficient per clock per watt compared p6 predecessors mobile pentium 4 processors ran much hotter pentium iii-m processors n't offer significant performance advantages inefficiency affected cooling system complexity also all-important battery life realizing new microarchitecture n't best choice mobile space intel went back drawing board design would optimally suited market segment result modernized p6 design called pentium design overview pentium power efficient x86 processor notebooks several years consuming maximum 27 watts maximum load 4-5 watts idle processing efficiency gains brought modernization allowed rival mobile pentium 4 clocked 1 ghz higher fastest-clocked mobile pentium 4 compared fastest-clocked pentium equipped much memory bus bandwidth first pentium family processors banias internally support pae show pae support flag cpuid information causes operating systems primarily linux distributions refuse boot processors since pae support required kernels yonah cpu launched january 2006 core brand single dual-core mobile version sold core solo core duo pentium dual-core brands server version released xeon lv processors provided partial solutions pentium shortcomings adding resulted interim microarchitecture low-voltage cpus part way p6 following core microarchitecture july 27 2006 core microarchitecture derivative p6 launched form core 2 processor subsequently processors released core microarchitecture core 2 xeon pentium celeron brand names core microarchitecture intel final mainstream processor line use fsb later intel processors based nehalem later intel microarchitectures featuring integrated memory controller qpi dmi bus communication rest system improvements relative intel core processors chips technically derivatives pentium pro architecture gone several radical changes since inception
[ 4108, 9741, 5649, 7714, 6192, 2620, 6730, 2638, 4185, 1119, 3175, 4204, 8815, 8820, 630, 4217, 8834, 8325, 7313, 8851, 6804, 6815, 9391, 4276, 2237, 5309, 6339, 5844, 3798, 3294, 10468, 5356, 5871, 1776, 3317, 5883, 5380, 5892, 5386, 6926...
Test
3,318
5
Data_link_connection_identifier:data link connection identifier data link connection identifier dlci frame relay 10-bit-wide link-local virtual circuit identifier used assign frames specific pvc svc frame relay networks use dlcis statistically multiplex frames dlcis preloaded switch act road signs traveling frames standard allows existence 1024 dlcis dlci 0 reserved ansi/q993a lmi standard—only numbers 16 976 usable end-user equipment dlci 1023 reserved cisco lmi however numbers 16 1007 usable summary using cisco lmi numbers 16 1007 available end-user equipment rest reserved various management purposes dlci layer 2 addresses locally significant two devices dlci mapped interface one frame relay cloud
[ 5437, 835, 1893 ]
Validation
3,319
3
Freescale_683XX:freescale 683xx freescale 683xx formerly motorola 683xx family compatible microcontrollers use motorola 68000-based cpu core family designed using hardware description language making parts synthesizable amenable improved fabrication processes die shrinks two cpu cores used 683xx family 68ec000 cpu32 instruction set cpu32 core similar 68020 without bitfield instructions instructions unique cpu32 core table lookup interpolate instructions low-power stop mode modules microcontroller designed independently released new cpus could tested process let architects perform design-ahead silicon technologies available motorola designs ready implement go market many submodules carried forward coldfire line processors microcontrollers consist series modules connected internal bus modules available various processors 683xx family
[ 7299, 3844, 4868, 1158, 7302, 9338, 7305, 10501, 3467, 1548, 6415, 2073, 7065, 4897, 8102, 5297, 11314, 11447, 8761, 6715, 1983, 10945, 3017, 2383, 336, 8530, 3540, 3159, 3932, 3936, 869, 7269, 9964, 1776, 3185, 8048, 5235, 10224, 7286, 8...
Test
3,320
4
Scareware:scareware scareware form malware uses social engineering cause shock anxiety perception threat order manipulate users buying unwanted software scareware part class malicious software includes rogue security software ransomware scam software tricks users believing computer infected virus suggests download pay fake antivirus software remove usually virus fictional software non-functional malware according anti-phishing working group number scareware packages circulation rose 2,850 9,287 second half 2008 first half 2009 apwg identified 585 increase scareware programs scareware label also apply application virus pranks users intent cause anxiety panic internet security writers use term scareware describe software products produce frivolous alarming warnings threat notices typically fictitious useless commercial firewall registry cleaner software class program tries increase perceived value bombarding user constant warning messages increase effectiveness way software packaged look feel mimics legitimate security software order deceive consumers websites display pop-up advertisement windows banners text computer may infected harmful spyware programs immediate removal may required scan click 'yes websites go far saying user job career marriage would risk products using advertisements often considered scareware serious scareware applications qualify rogue software scareware affiliated installed programs user encounter pop-up website indicating pc infected scenarios possible become infected scareware even user attempts cancel notification popups especially designed look like come user operating system actually webpage 2010 study google found 11,000 domains hosting fake anti-virus software accounting 50 malware delivered via internet advertising starting march 29 2011 1.5 million web sites around world infected lizamoon sql injection attack spread scareware research google discovered scareware using servers check internet connectivity data suggested million machines infected scareware company placed warning search results users whose computers appear infected another example scareware smart fortress site scares people thinking lots viruses computer asks buy professional service forms spyware also qualify scareware change user desktop background install icons computer notification area microsoft windows claiming kind spyware infected user computer scareware application help remove infection cases scareware trojans replaced desktop victim large yellow text reading warning spyware box containing similar text even forced screensaver change bugs crawling across screen winwebsec term usually used address malware attacks users windows operating system produces fake claims similar genuine anti-malware software spysheriff exemplifies spyware scareware purports remove spyware actually piece spyware often accompanying smitfraud infections antispyware scareware may promoted using phishing scam another approach trick users uninstalling legitimate antivirus software microsoft security essentials disabling firewall since antivirus programs typically include protection tampered disabled software scareware may use social engineering convince user disable programs would otherwise prevent malware working 2005 microsoft washington state successfully sued secure computer makers spyware cleaner 1 million charges using scareware pop-ups washington attorney general also brought lawsuits securelink networks high falls media makers quick shield october 2008 microsoft washington attorney general filed lawsuit two texas firms branch software alpha red producers registry cleaner xp scareware lawsuit alleges company sent incessant pop-ups resembling system warnings consumers personal computers stating critical error message registry damaged corrupted instructing users visit web site download registry cleaner xp cost 39.95 december 2 2008 u.s. federal trade commission ftc filed complaint federal court innovative marketing inc. bytehosting internet services llc well individuals sam jain daniel sundin james reno marc ’ souza kristy ross complaint also listed maurice ’ souza relief defendant alleged held proceeds wrongful conduct accusing violating law ftc alleged defendants violated ftc act deceptively marketing software including winfixer winantivirus drivecleaner errorsafe xp antivirus according complaint defendants falsely represented scans consumer computer showed compromised infected offered sell software fix alleged problems another type scareware involves software designed literally scare user use unanticipated shocking images sounds video
[ 3072, 2049, 3969, 899, 5764, 6786, 7044, 8064, 9351, 1417, 10245, 8703, 9227, 6797, 9102, 9356, 7441, 8978, 4863, 4883, 4245, 278, 4374, 9233, 10392, 1690, 2075, 3867, 9242, 10141, 5281, 9761, 2213, 8998, 9256, 939, 300, 9771, 2864, 1970,...
Test
3,321
2
Setcontext:setcontext setcontext one family c library functions others getcontext makecontext swapcontext used context control codice_1 family allows implementation c advanced control flow patterns iterators fibers coroutines may viewed advanced version setjmp/longjmp whereas latter allows single non-local jump stack codice_1 allows creation multiple cooperative threads control stack codice_1 specified posix.1-2001 single unix specification version 2 unix-like operating systems provide posix.1-2004 obsoleted functions posix.1-2008 removed posix threads indicated possible replacement citing ieee std 1003.1 2004 edition incorporation iso/iec 9899:1999 standard specification found iso c standard subclause 6.11.6 specifies use function declarators empty parentheses obsolescent feature therefore using function prototype making use obsolescent feature iso c standard therefore strictly conforming posix application use form therefore use getcontext makecontext swapcontext marked obsolescent way iso c standard specify non-obsolescent function prototype indicating function called arbitrary number including zero arguments arbitrary types including integers pointers data pointers functions composite types functions associated types defined codice_4 system header file includes codice_5 type four functions operate codice_6 points context resumed current context exits context created codice_7 secondary context codice_8 used store set signals blocked context codice_9 stack used context codice_10 stores execution state including registers cpu flags instruction pointer stack pointer codice_11 opaque type functions example demonstrates iterator using codice_1 note example correct may work intended cases function codice_7 requires additional parameters type codice_36 example passes pointers thus example may fail 64-bit machines specifically lp64-architectures problem worked around breaking reconstructing 64-bit values introduces performance penalty get set context smaller context handy makes infinite loop context holds program counter
[ 9794, 3076, 2345, 9911, 7983, 1776, 5040, 2804, 5397, 823, 2045 ]
Test
3,322
5
L2TPv3:l2tpv3 layer 2 tunnelling protocol version 3 ietf standard related l2tp used alternative protocol multiprotocol label switching mpls encapsulation multiprotocol layer 2 communications traffic ip networks like l2tp l2tpv3 provides pseudo-wire service scaled fit carrier requirements l2tpv3 regarded mpls ip atm simplified version concept much benefit achieved fraction effort cost losing technical features considered less important market case l2tpv3 features lost teletraffic engineering features considered important mpls however reason features could re-engineered top l2tpv3 later products protocol overhead l2tpv3 also significantly bigger mpls
[ 10242, 3847, 649, 10889, 9868, 3218, 8211, 9365, 10005, 11413, 5402, 5531, 11162, 3742, 10271, 9380, 2085, 9381, 3751, 3752, 9764, 4268, 10924, 10417, 562, 7859, 2228, 2996, 9909, 10171, 3133, 3006, 4797, 5181, 3777, 5437, 2884, 7364, 2887,...
Train
3,323
7
IBM:ibm international business machines corporation ibm american multinational information technology company headquartered armonk new york operations 170 countries company began 1911 founded endicott new york computing-tabulating-recording company ctr renamed international business machines 1924 ibm produces sells computer hardware middleware software provides hosting consulting services areas ranging mainframe computers nanotechnology ibm also major research organization holding record u.s. patents generated business 26 consecutive years inventions ibm include automated teller machine atm floppy disk hard disk drive magnetic stripe card relational database sql programming language upc barcode dynamic random-access memory dram ibm mainframe exemplified system/360 dominant computing platform 1960s 1970s ibm continually shifted business operations focusing higher-value profitable markets includes spinning printer manufacturer lexmark 1991 sale personal computer thinkpad/thinkcentre x86-based server businesses lenovo 2005 2014 respectively acquiring companies pwc consulting 2002 spss 2009 weather company 2016 red hat 2019 also 2015 ibm announced would go fabless continuing design semiconductors offloading manufacturing globalfoundries nicknamed big blue ibm one 30 companies included dow jones industrial average one world largest employers 380,000 employees known ibmers least 70 ibmers based outside united states country largest number ibmers india ibm employees awarded five nobel prizes six turing awards ten national medals technology usa five national medals science usa 1880s technologies emerged would ultimately form core international business machines ibm julius e. pitrap patented computing scale 1885 alexander dey invented dial recorder 1888 herman hollerith 1860–1929 patented electric tabulating machine willard bundy invented time clock record worker arrival departure time paper tape 1889 june 16 1911 four companies amalgamated new york state charles ranlett flint forming fifth company computing-tabulating-recording company ctr based endicott new york five companies 1,300 employees offices plants endicott binghamton new york dayton ohio detroit michigan washington d.c. toronto manufactured machinery sale lease ranging commercial scales industrial time recorders meat cheese slicers tabulators punched cards thomas j. watson sr. fired national cash register company john henry patterson called flint 1914 offered position ctr watson joined ctr general manager 11 months later made president court cases relating time ncr resolved learned patterson pioneering business practices watson proceeded put stamp ncr onto ctr companies implemented sales conventions generous sales incentives focus customer service insistence well-groomed dark-suited salesmen evangelical fervor instilling company pride loyalty every worker favorite slogan think became mantra company employees watson first four years revenues reached 9 million company operations expanded europe south america asia australia watson never liked clumsy hyphenated name computing-tabulating-recording company february 14 1924 chose replace expansive title international business machines 1933 subsidiaries merged one company ibm 1937 ibm tabulating equipment enabled organizations process unprecedented amounts data clients including u.s. government first effort maintain employment records 26 million people pursuant social security act tracking persecuted groups hitler third reich largely german subsidiary dehomag 1949 thomas watson sr. created ibm world trade corporation subsidiary ibm focused foreign operations 1952 stepped almost 40 years company helm son thomas watson jr. named president 1956 company demonstrated first practical example artificial intelligence arthur l. samuel ibm poughkeepsie new york laboratory programmed ibm 704 merely play checkers learn experience 1957 fortran scientific programming language developed 1961 ibm developed sabre reservation system american airlines introduced highly successful selectric typewriter 1963 ibm employees computers helped nasa track orbital flights mercury astronauts year later moved corporate headquarters new york city armonk new york latter half 1960s saw ibm continue support space exploration participating 1965 gemini flights 1966 saturn flights 1969 lunar mission april 7 1964 ibm announced first computer system family ibm system/360 spanned complete range commercial scientific applications large small allowing companies first time upgrade models greater computing capability without rewrite applications followed ibm system/370 1970 together 360 370 made ibm mainframe dominant mainframe computer dominant computing platform industry throughout period early 1980s operating systems ran os/vs1 mvs middleware built top cics transaction processing monitor near-monopoly-level hold computer industry became almost synonymous ibm products due marketshare 1974 ibm engineer george j. laurer developed universal product code ibm world bank first introduced financial swaps public 1981 entered swap agreement ibm pc originally designated ibm 5150 introduced 1981 soon became industry standard 1991 ibm spun printer manufacturing new business called lexmark 1993 ibm posted us 8 billion loss – time biggest american corporate history lou gerstner hired ceo rjr nabisco turn company around 2002 ibm acquired pwc consulting 2003 initiated project redefine company values hosting three-day online discussion key business issues 50,000 employees result three values dedication every client success innovation matters—for company world trust personal responsibility relationships 2005 company sold personal computer business chinese technology company lenovo 2009 acquired software company spss inc. later 2009 ibm blue gene supercomputing program awarded national medal technology innovation u.s. president barack obama 2011 ibm gained worldwide attention artificial intelligence program watson exhibited jeopardy game-show champions ken jennings brad rutter company also celebrated 100th anniversary year june 16 2012 ibm announced agreed buy kenexa year later also acquired softlayer technologies web hosting service deal worth around 2 billion 2014 ibm announced would sell x86 server division lenovo 2.1 billion also year ibm began announcing several major partnerships companies including apple inc. twitter facebook tencent cisco underarmour box microsoft vmware csc macy sesame workshop parent company sesame street salesforce.com 2015 ibm announced three major acquisitions merge healthcare 1 billion data storage vendor cleversafe digital assets weather company including weather.com weather channel mobile app also year ibmers created film boy atom first molecule movie tell story 2016 ibm acquired video conferencing service ustream formed new cloud video unit april 2016 posted 14-year low quarterly sales following month groupon sued ibm accusing patent infringement two months ibm accused groupon patent infringement separate lawsuit 2015 ibm bought digital part weather company october 2018 ibm announced intention acquire red hat 34 billion acquisition completed july 9 2019 june 2019 ibm cut 2,000 jobs ibm headquartered armonk new york community north midtown manhattan principal building referred chq glass stone edifice parcel amid 432-acre former apple orchard company purchased mid-1950s two ibm buildings within walking distance chq north castle office previously served ibm headquarters louis v. gerstner jr. center learning formerly known ibm learning center ilc resort hotel training center 182 guest rooms 31 meeting rooms various amenities ibm operates 174 countries mobility centers smaller markets areas major campuses larger ones new york city ibm several offices besides chq including ibm watson headquarters astor place manhattan outside new york major campuses united states include austin texas research triangle park raleigh-durham north carolina rochester minnesota silicon valley california ibm real estate holdings varied globally diverse towers occupied ibm include 1250 rené-lévesque montreal canada tour descartes paris france one atlantic center atlanta georgia usa beijing china ibm occupies pangu plaza city seventh tallest building overlooking beijing national stadium bird nest home 2008 summer olympics ibm india private limited indian subsidiary ibm headquartered bengaluru karnataka facilities bengaluru ahmedabad delhi kolkata mumbai chennai pune gurugram noida bhubaneshwar coimbatore visakhapatnam hyderabad notable buildings include ibm rome software lab rome italy hursley house winchester uk 330 north wabash chicago illinois united states cambridge scientific center cambridge massachusetts united states ibm toronto software lab toronto canada ibm building johannesburg johannesburg south africa ibm building seattle seattle washington united states ibm hakozaki facility tokyo japan ibm yamato facility yamato japan ibm canada head office building ontario canada watson iot headquarters munich germany defunct ibm campuses include ibm somers office complex somers new york company contributions industrial architecture design include works eero saarinen ludwig mies van der rohe i.m pei van der rohe building chicago recognized 1990 honor award national building museum ibm recognized one top 20 best workplaces commuters united states environmental protection agency epa 2005 recognized fortune 500 companies provided employees excellent commuter benefits help reduce traffic air pollution 2004 concerns raised related ibm contribution early days pollution original location endicott new york fiscal year 2017 ibm reported earnings us 5.7 billion annual revenue us 79.1 billion decline 1.0 previous fiscal cycle ibm shares traded 125 per share market capitalization valued us 113.9 billion september 2018 ibm ranked 34 2018 fortune 500 rankings largest united states corporations total revenue ibm large diverse portfolio products services offerings fall categories cloud computing artificial intelligence commerce data analytics internet things iot infrastructure mobile security ibm cloud includes infrastructure service iaas software service saas platform service paas offered public private hybrid cloud delivery models instance ibm bluemix paas enables developers quickly create complex websites pay-as-you-go model ibm softlayer dedicated server managed hosting cloud computing provider 2011 reported hosting 81,000 servers 26,000 customers ibm also provides cloud data encryption services icdes using cryptographic splitting secure customer data ibm also hosts industry-wide cloud computing mobile technologies conference interconnect year hardware designed ibm categories include ibm power microprocessors employed inside many console gaming systems including xbox 360 playstation 3 nintendo wii u. ibm secure blue encryption hardware built microprocessors 2014 company revealed truenorth neuromorphic cmos integrated circuit announced 3 billion investment following five years design neural chip mimics human brain 10 billion neurons 100 trillion synapses uses 1 kilowatt power 2016 company launched all-flash arrays designed small midsized companies includes software data compression provisioning snapshots across various systems outsourcing also represents major service provided ibm 40 data centers worldwide alphaworks ibm source emerging software technologies spss software package used statistical analysis ibm kenexa suite provides employment retention solutions includes brassring applicant tracking system used thousands companies recruiting ibm also owns weather company provides weather forecasting includes weather.com weather underground smarter planet initiative seeks achieve economic growth near-term efficiency sustainable development societal progress targeting opportunities smart grids water management systems solutions traffic congestion greener buildings services provisions include redbooks publicly available online books best practices ibm products developerworks website software developers professionals how-to articles tutorials well software downloads code samples discussion forums podcasts blogs wikis resources developers technical professionals ibm watson technology platform uses natural language processing machine learning reveal insights large amounts unstructured data watson debuted 2011 american game-show jeopardy competed champions ken jennings brad rutter three-game tournament watson since applied business healthcare developers universities example ibm partnered memorial sloan kettering cancer center assist considering treatment options oncology patients melanoma screenings also several companies begun using watson call centers either replacing assisting customer service agents january 2019 ibm introduced first commercial quantum computer ibm q system one ibm also provides infrastructure new york city police department ibm cognos analytics perform data visualizations compstat crime data research part ibm since founding organized efforts trace roots back 1945 watson scientific computing laboratory founded columbia university new york city converting renovated fraternity house manhattan west side ibm first laboratory ibm research constitutes largest industrial research organization world 12 labs 6 continents ibm research headquartered thomas j. watson research center new york facilities include almaden lab california austin lab texas australia lab melbourne brazil lab são paulo rio de janeiro china lab beijing shanghai ireland lab dublin haifa lab israel india lab delhi bangalore tokyo lab zurich lab africa lab nairobi terms investment ibm r expenditure totals several billion dollars year 2012 expenditure approximately us 6.9 billion recent allocations included 1 billion create business unit watson 2014 3 billion create next-gen semiconductor along 4 billion towards growing company strategic imperatives cloud analytics mobile security social 2015 ibm leading proponent open source initiative began supporting linux 1998 company invests billions dollars services software based linux ibm linux technology center includes 300 linux kernel developers ibm also released code different open source licenses platform-independent software framework eclipse worth approximately us 40 million time donation three-sentence international components unicode icu license java-based relational database management system rdbms apache derby ibm open source involvement trouble-free however see sco v. ibm famous inventions developments ibm include automated teller machine atm dynamic random access memory dram electronic keypunch financial swap floppy disk hard disk drive magnetic stripe card relational database risc sabre airline reservation system sql universal product code upc bar code virtual machine additionally 1990 company scientists used scanning tunneling microscope arrange 35 individual xenon atoms spell company acronym marking first structure assembled one atom time major part ibm research generation patents since first patent traffic signaling device ibm one world prolific patent sources 2018 company holds record patents generated business marking 25 consecutive years achievement five ibmers received nobel prize leo esaki thomas j. watson research center yorktown heights n.y. 1973 work semiconductors gerd binnig heinrich rohrer zurich research center 1986 scanning tunneling microscope georg bednorz alex müller also zurich 1987 research superconductivity several ibmers also turing award including first female recipient frances e. allen current research includes collaboration university michigan see computers act academic advisor undergraduate computer science engineering students university partnership combining cloud internet things iot platforms make interoperable provide developers easier tools company also involved research advanced algorithms machine learning decision-making processes end company recently released analysis tool algorithms make decisions scanning biases automated decision-making ibm nicknamed big blue part due blue logo color scheme also partially since ibm de facto dress code white shirts blue suits company logo undergone several changes years current 8-bar logo designed 1972 graphic designer paul rand general replacement 13-bar logo since period photocopiers render large areas well aside logo ibm used helvetica corporate typeface 50 years replaced 2017 custom-designed ibm plex ibm valuable brand result 100 years operations marketing campaigns since 1996 ibm exclusive technology partner masters tournament one four major championships professional golf ibm creating first masters.org 1996 first course cam 1998 first iphone app live streaming 2009 first-ever live 4k ultra high definition feed united states major sporting event 2016 result ibm ceo ginni rometty became third female member master governing body augusta national golf club ibm also major sponsor professional tennis engagements u.s. open wimbledon australian open french open company also sponsored olympic games 1960–2000 national football league 2003–2012 2012 ibm brand valued 75.5 billion ranked interbrand second-best brand worldwide year also ranked top company leaders fortune number two green company u.s. newsweek second-most respected company barron fifth-most admired company fortune 18th-most innovative company fast company number one technology consulting number two outsourcing vault 2015 forbes ranked ibm fifth-most valuable brand january 1969 last day johnson administration united states department justice antitrust division filed suit ibm alleging company engaged monopolistic business practices talks ibm would agree settlement consent decree two sides unable come terms case went trial 1975 legal matter justice department estimated would take 60 days three years millions pages evidence justice department decided drop suit new york times article states ibm never publicly disclosed much spent defending suit estimated tens millions dollars ibm one largest workforces world employees big blue referred ibmers company among first corporations provide group life insurance 1934 survivor benefits 1935 training women 1935 paid vacations 1937 training disabled people 1942 ibm hired first black salesperson 1946 1952 ceo thomas j. watson jr. published company first written equal opportunity policy letter one year u.s. supreme court decision brown vs. board education 11 years civil rights act 1964 human rights campaign rated ibm 100 index gay-friendliness every year since 2003 ibm providing same-sex partners employees health benefits anti-discrimination clause additionally 2005 ibm became first major company world commit formally use genetic information employment decisions 2017 ibm named working mother 100 best companies list 32nd consecutive year ibm several leadership development recognition programs recognize employee potential achievements early-career high potential employees ibm sponsors leadership development programs discipline e.g. general management gmldp human resources hrldp finance fldp year company also selects 500 ibmers ibm corporate service corps csc described corporate equivalent peace corps gives top employees month humanitarian work abroad certain interns ibm also program called extreme blue partners top business technical students develop high-value technology compete present business case company ceo internship end company also various designations exceptional individual contributors senior technical staff member stsm research staff member rsm distinguished engineer de distinguished designer dd prolific inventors also achieve patent plateaus earn designation master inventor company prestigious designation ibm fellow since 1963 company names handful fellows year based technical achievement programs recognize years service quarter century club established 1924 sellers eligible join hundred percent club composed ibm salesmen meet quotas convened atlantic city new jersey year company also selects 1,000 ibmers annually award best ibm award includes all-expenses paid trip awards ceremony exotic location ibm culture evolved significantly century operations early days dark gray suit white shirt sincere tie constituted public uniform ibm employees ibm management transformation 1990s ceo louis v. gerstner jr. relaxed codes normalizing dress behavior ibm employees company culture also given different plays company acronym ibm saying stands 've moved due relocations layoffs others saying stands 'm pursuant prevalent work-from-anywhere norm others saying stands 'm mentored due company open door policy encouragement mentoring levels terms labor relations company traditionally resisted labor union organizing although unions represent ibm workers outside united states japan ibm employees also american football team complete pro stadium cheerleaders televised games competing japanese x-league big blue 2015 ibm started giving employees option choosing either pc mac primary work device resulting ibm becoming world largest mac shop 2016 ibm eliminated forced rankings changed annual performance review system focus frequent feedback coaching skills development many ibmers also achieved notability outside work leaving ibm business former ibm employees include apple inc. ceo tim cook former eds ceo politician ross perot microsoft chairman john w. thompson sap co-founder hasso plattner gartner founder gideon gartner advanced micro devices amd ceo lisa su former citizens financial group ceo ellen alemany former yahoo chairman alfred amoroso former ceo c. michael armstrong former xerox corporation ceos david t. kearns g. richard thoman former fair isaac corporation ceo mark n. greene citrix systems co-founder ed iacobucci asos.com chairman brian mcbride former lenovo ceo steve ward former teradata ceo kenneth simonds government alumna patricia roberts harris served united states secretary housing urban development first african american woman serve united states cabinet samuel k. skinner served u.s. secretary transportation white house chief staff alumni also include u.s senators mack mattingly thom tillis wisconsin governor scott walker former u.s ambassadors vincent obsitnik slovakia arthur k. watson france thomas watson jr. soviet union former u.s representatives todd akin glenn andrews robert garcia katherine harris amo houghton jim ross lightfoot thomas j. manton donald w. riegle jr. ed zschau others nasa astronaut michael j. massimino canadian astronaut governor-general julie payette harvey mudd college president maria klawe western governors university president emeritus robert mendenhall former university kentucky president lee t. todd jr. nfl referee bill carollo former rangers f.c chairman john mcclelland recipient nobel prize literature j. m. coetzee thomas watson jr. also served 11th national president boy scouts america company 14 member board directors responsible overall corporate management includes ceos american express ford motor company boeing dow chemical johnson johnson cemex well president rensselaer polytechnic institute 2011 ibm became first technology company warren buffett holding company berkshire hathaway invested initially bought 64 million shares costing 10.5 billion dollars years increased ibm holdings however reduced 94.5 2.05 million shares end 2017 may 2018 completely ibm
[ 6148, 7, 6153, 8201, 8203, 6157, 8208, 10265, 10267, 2077, 10273, 8227, 8231, 10280, 2089, 8233, 10283, 10286, 8241, 10289, 4149, 2106, 6207, 2112, 10303, 10316, 6221, 10320, 2132, 10325, 6230, 2138, 6234, 6235, 8287, 4194, 6242, 10340, 103...
None
3,324
2
New_World_ROM:new world rom new world rom computers macintosh models use macintosh toolbox rom logic board due mac os x requiring availability toolbox allowed rom sizes shrink dramatically typically facilitated use flash memory system firmware instead expensive less flexible mask rom previous macs used facility loading toolbox startup device however made available allowing use mac os 8 mac os 9 new world machines new world architecture developed macintosh network computer unrealized project eventually contributed several key technologies first-generation imac powerpc macs imac ibook blue white power mac g3 bronze keyboard lombard powerbook g3 forward new world rom machines previous models including beige power mac g3 beige platinum macs old world rom machines intel based macs incapable running mac os 9 machines efi used instead open firmware new world old world machines based new world rom macs first macs direct usage open firmware subsystem encouraged previous pci power macs used open firmware booting implementation complete machines expected probe pci devices immediately hand control mac os rom versions 1.0.5 2.x several serious bugs well missing functionality able load files hfs partition tftp server apple also set default input output devices ttya modem port beige macs made difficult normal users get open firmware necessary either hook terminal change open firmware settings inside mac os using tool boot variables apple system disk new world rom introduced much-improved version open firmware interpreter version 3.0 added many missing features fixed bugs earlier versions capability run chrp boot scripts toolbox rom embedded inside chrp script system folder called mac os rom along short loader stub copy happy mac icon suitable display open firmware rom loaded disk mac boot sequence continued usual open firmware could also run binary boot loader version 3.0 added support elf objects well xcoff files versions 1.0.5 2.0 supported also version 3.0 well last releases version 2.x starting powerbook 3400 officially supported direct access open firmware command prompt console setting auto-boot variable false mac os holding command-option-o-f boot one major difference old world rom macs new world rom macs least classic mac os gestalt selector machine type longer usable new world rom macs use mach id 406 decimal actual machine id encoded model compatible properties root node open firmware device tree new world rom also sets compatible property root node macrisc2 machines boot classic mac os using mac os rom macrisc3 machines boot mac os x another unix-like system somewhat easier boot non-mac-os operating system new world system indeed openbsd bootloader works new world system simplest way distinguish new world rom mac factory built-in usb port old world rom mac usb port factory equipment instead used adb keyboard mouse mini-din-8 modem printer serial ports peripherals also new world rom macs generally built-in floppy drive
[ 1542, 3598, 5520, 10130, 5397, 11037, 6048, 11171, 10149, 3371, 8114, 1592, 576, 10432, 713, 9035, 209, 3410, 213, 5976, 3167, 9700, 4581, 6377, 4844, 10481, 499, 5619, 6771, 7163, 8700 ]
Validation
3,325
3
Bandit_Kings_of_Ancient_China:bandit kings ancient china bandit kings ancient china also known japan turn-based strategy video game developed published koei released 1989 ms-dos amiga macintosh 1990 nintendo entertainment system 1996 koei issued remake japanese sega saturn sony playstation featuring vastly improved graphics new arrangements original songs based great classical novel water margin game takes place ancient china reign emperor huizong song dynasty bandit kings ancient china—a band ten bandits—engage war china minister war gao qiu evil person unlimited power objective game build sustain command army troops capture gao qiu jurchen invasion january 1127 players hold certain attributes strength dexterity wisdom players must also deal situations taxes care troops maintenance replacement weapons equipment forces nature troop unrest desertion battlefields take place hexagonal grids players move armies across various terrain order strategically engage defeat enemy army troops capability fighting either melee weapons bows arrows magic dueling swords player defeats enemy army option recruiting imprisoning exiling executing captured enemy troops attacker 30 days win castles defeat deployed enemy commanders automatically defeated game ends defeat player game calendar hit january 1127 game map shows empire composed 48 prefectures prefecture may invaded adjacent territory exception imperial capital kaifeng player must built sufficient popularity gain attention emperor confer imperial decree permitting player march capital reviewing nes version bandit kings ancient china nintendo power suggested players might find game pace slow compared action-oriented games others would enjoy game depth involvement attention detail compute magazine praised game one complete entertaining role-playing simulations available gave honorable mention war/strategy category 1991 compute choice awards reviewer austin american-statesman suggested game depth overwhelming calling game richest complex role-playing game ever published saying trouble figuring ... supposed pc magazine reviewed game positively concluding bandit kings ancient china addictive game brought alive mixture computer-driven personalities romance departed culture large battery options unpredictability game play computer gaming world gave game three five stars 1990 two stars 1993 amiga version received positive reviews amiga magazines game reviewed 1994 dragon 211 jay dee eye monitor column reviewers gave game 3½ 5 stars computer gaming world named bandit kings ancient china antagonist gao qiu twelfth memorable game villain
[ 11477, 9166, 9006, 10999 ]
Validation
3,326
7
Distributed_lock_manager:distributed lock manager operating systems use lock managers organise serialise access resources distributed lock manager dlm runs every machine cluster identical copy cluster-wide lock database way dlm provides software applications distributed across cluster multiple machines means synchronize accesses shared resources dlms used foundation several successful clustered file systems machines cluster use storage via unified file system significant advantages performance availability main performance benefit comes solving problem disk cache coherency participating computers dlm used file locking also coordination disk access vmscluster first clustering system come widespread use relies openvms dlm way dec vms virtual memory system first widely available operating system implement dlm became available version 4 although user interface single-processor lock manager first implemented version 3 dlm uses generalized concept resource entity shared access must controlled relate file record area shared memory anything else application designer chooses hierarchy resources may defined number levels locking implemented instance hypothetical database might define resource hierarchy follows process acquire locks database whole particular parts database lock must obtained parent resource subordinate resource locked process running within vmscluster may obtain lock resource six lock modes granted determine level exclusivity granted possible convert lock higher lower level lock mode processes unlocked resource system information resource destroyed following truth table shows compatibility lock mode others process obtain lock resource enqueueing lock request similar qio technique used perform i/o enqueue lock request either complete synchronously case process waits lock granted asynchronously case ast occurs lock obtained also possible establish blocking ast triggered process obtained lock preventing access resource another process original process optionally take action allow access e.g demoting releasing lock lock value block associated resource read process obtained lock resource null lock updated process obtained protected update exclusive lock used hold information resource application designer chooses typical use hold version number resource time associated entity e.g database record updated holder lock increments lock value block another process wishes read resource obtains appropriate lock compares current lock value value last time process locked resource value process knows associated entity updated since last time read therefore unnecessary read hence technique used implement various types cache database similar application one processes obtained locks resources possible produce situation preventing another obtaining lock none proceed known deadlock e. w. dijkstra originally called deadly embrace simple example process 1 obtained exclusive lock resource process 2 obtained exclusive lock resource b process 1 tries lock resource b wait process 2 release process 2 tries lock resource processes wait forever openvms dlm periodically checks deadlock situations example second lock enqueue request one processes would return deadlock status would process take action resolve deadlock—in case releasing first lock obtained red hat oracle developed clustering software linux ocfs2 oracle cluster file system added official linux kernel version 2.6.16 january 2006 alpha-quality code warning ocfs2 removed 2.6.19 red hat cluster software including dlm gfs2 officially added linux kernel version 2.6.19 november 2006 systems use dlm modeled venerable vms dlm oracle dlm simpler api core function codice_1 eight parameters whereas vms service red hat dlm_lock 11 dlm implementations include following
[ 3328, 7816, 2314, 6669, 2322, 1049, 7581, 2974, 9762, 2339, 7983, 7347, 823, 5441, 3398, 4423, 7750, 7499, 11343, 3795, 2901, 3289, 11612, 9060, 9069, 10733, 9455, 118 ]
Test
3,327
7
Content_Guru:content guru content guru cloud communications provider based bracknell uk provides services 30 countries storm platform direct partners vodafone kpn signed five-year renewal june 2017 deliver storm services across benelux region april 2016 content guru received queen award innovation storm contact multi-channel cloud contact centre solution contact used organisations across multiple sectors connect customers information devices choose notable clients including national health service serco sodexo travisperkins recognition solution deployed national health service nhs content guru several awards including vertical application solution year europa awards 2019 best use cloud services uk industry awards 2015 2016 best class digital transformation uk cloud awards 2017 best public sector digital project computing technology leaders award 2017 content guru founded 2005 sean martin taylor sister company hardware manufacturer software developer redwood technologies 2010 company storm platform used comres behalf itv news provide live audience polling first televised election leaders debate build-up uk 2010 general election 2013 content guru co-founded berkshire community foundation bcf business philanthropy club bpc enables businesses berkshire provide funding grassroots organisations projects local communities content guru sponsor along parent company redwood technologies group lead organiser pride bracknell forest awards since 2016 company announced would delivering services united states world largest contact centre market march 2017 later year august content guru vodafone handled 16,000 student enquiries ucas uk higher education applications service.. 2015 2016 2017 content guru positioned challenger gartner magic quadrant ccaas contact center service western europe january 2018 minority stake content guru sister company redwood technologies group sold scottish equity partners £25 million cash deal content guru announced partnership rakuten communications february 2018 deliver cloud contact centre services japan company came fire role manchester arena bombing may 2017 storm telecommunications platform failed operate resulted affected attack able contact police emergency services vodafone subcontracted services content guru providing national mutual aid telephony system however tried use found inability amend recorded message technical difficulties server suggests inadequate level knowledge expertise within vodafone sub-contractor content guru vodafone content guru continue partnership vodafone marketing content guru platform brand vodafone storm
[ 8934 ]
None
3,328
6
Lustre_(file_system):lustre file system lustre type parallel distributed file system generally used large-scale cluster computing name lustre portmanteau word derived linux cluster lustre file system software available gnu general public license version 2 provides high performance file systems computer clusters ranging size small workgroup clusters large-scale multi-site clusters lustre file systems high performance capabilities open licensing often used supercomputers since june 2005 consistently used least half top ten 60 top 100 fastest supercomputers world including world 2 3 ranked top500 supercomputers 2014 titan sequoia lustre file systems scalable part multiple computer clusters tens thousands client nodes tens petabytes pb storage hundreds servers terabyte per second tb/s aggregate i/o throughput makes lustre file systems popular choice businesses large data centers including industries meteorology simulation oil gas life science rich media finance i/o performance lustre widespread impact applications attracted broad attention lustre file system architecture started research project 1999 peter j. braam staff carnegie mellon university cmu time braam went found company cluster file systems 2001 starting work intermezzo file system coda project cmu lustre developed accelerated strategic computing initiative path forward project funded united states department energy included hewlett-packard intel september 2007 sun microsystems acquired assets cluster file systems inc. including intellectual property sun included lustre high-performance computing hardware offerings intent bring lustre technologies sun zfs file system solaris operating system november 2008 braam left sun microsystems eric barton andreas dilger took control project 2010 oracle corporation way acquisition sun began manage release lustre december 2010 oracle announced would cease lustre 2.x development place lustre 1.8 maintenance-only support creating uncertainty around future development file system following announcement several new organizations sprang provide support development open community development model including whamcloud open scalable file systems inc. opensfs european open file systems eofs others end 2010 lustre developers left oracle braam several associates joined hardware-oriented xyratex acquired assets clusterstor barton dilger others formed software startup whamcloud continued work lustre august 2011 opensfs awarded contract lustre feature development whamcloud contract covered completion features including improved single server metadata performance scaling allows lustre better take advantage many-core metadata server online lustre distributed filesystem checking lfsck allows verification distributed filesystem state data metadata servers filesystem mounted use distributed namespace environment dne formerly clustered metadata cmd allows lustre metadata distributed across multiple servers development also continued zfs-based back-end object storage lawrence livermore national laboratory features lustre 2.2 2.4 community release roadmap november 2011 separate contract awarded whamcloud maintenance lustre 2.x source code ensure lustre code would receive sufficient testing bug fixing new features developed july 2012 whamcloud acquired intel whamcloud fastforward doe contract extend lustre exascale computing systems 2018 timeframe opensfs transitioned contracts lustre development intel february 2013 xyratex ltd. announced acquired original lustre trademark logo website associated intellectual property oracle june 2013 intel began expanding lustre usage beyond traditional hpc within hadoop 2013 whole opensfs announced request proposals rfp cover lustre feature development parallel file system tools addressing lustre technical debt parallel file system incubators opensfs also established lustre community portal technical site provides collection information documentation one area reference guidance support lustre open source community april 8 2014 ken claffey announced xyratex/seagate donating domain back user community completed march 2015 june 2018 lustre team assets acquired intel ddn ddn organized new acquisition independent division reviving whamcloud name new division lustre file system first installed production use march 2003 mcr linux cluster lawrence livermore national laboratory one largest supercomputers time lustre 1.0.0 released december 2003 provided basic lustre filesystem functionality including server failover recovery lustre 1.2.0 released march 2004 worked linux kernel 2.6 size glimpse feature avoid lock revocation files undergoing write client side data write-back cache accounting grant lustre 1.4.0 released november 2004 provided protocol compatibility versions could use infiniband networks could exploit extents/mballoc ldiskfs on-disk filesystem lustre 1.6.0 released april 2007 allowed mount configuration “ mountconf ” allowing servers configured mkfs mount allowed dynamic addition object storage targets osts enabled lustre distributed lock manager ldlm scalability symmetric multiprocessing smp servers provided free space management object allocations lustre 1.8.0 released may 2009 provided oss read cache improved recovery face multiple failures added basic heterogeneous storage management via ost pools adaptive network timeouts version-based recovery transition release interoperable lustre 1.6 lustre 2.0 lustre 2.0 released august 2010 based significant internally restructured code prepare major architectural advancements lustre 2.x clients interoperate 1.8 earlier servers however lustre 1.8.6 later clients interoperate lustre 2.0 later servers metadata target mdt ost on-disk format 1.8 upgraded 2.0 later without need reformat filesystem lustre 2.1 released september 2011 community-wide initiative response oracle suspending development lustre 2.x releases added ability run servers red hat linux 6 increased maximum ext4-based ost size 24 tb 128 tb well number performance stability improvements lustre 2.1 servers remained inter-operable 1.8.6 later clients lustre 2.2 released march 2012 focused providing metadata performance improvements new features added parallel directory operations allowing multiple clients traverse modify single large directory concurrently faster recovery server failures increased stripe counts single file across 2000 osts improved single-client directory traversal performance lustre 2.3 released october 2012 continued improve metadata server code remove internal locking bottlenecks nodes many cpu cores 16 object store added preliminary ability use zfs backing file system lustre file system check lfsck feature verify repair mds object index oi file system use file-level backup/restore case mds corruption server-side io statistics enhanced allow integration batch job schedulers slurm track per-job statistics client-side software updated work linux kernels version 3.0 lustre 2.4 released may 2013 added considerable number major features many funded directly opensfs distributed namespace environment dne allows horizontal metadata capacity performance scaling 2.4 clients allowing subdirectory trees single namespace located separate mdts zfs used backing filesystem mdt ost storage lfsck feature added ability scan verify internal consistency mdt fid linkea attributes network request scheduler nrs adds policies optimize client request processing disk ordering fairness clients optionally send bulk rpcs 4 mb size client-side software updated work linux kernels version 3.6 still interoperable 1.8 clients lustre 2.5 released october 2013 added highly anticipated feature hierarchical storage management hsm core requirement enterprise environments hsm allows customers easily implement tiered storage solutions operational environment release current opensfs-designated maintenance release branch lustre recent maintenance version 2.5.3 released september 2014 lustre 2.6 released july 2014 modest release feature wise adding lfsck functionality local consistency checks ost well consistency checks mdt ost objects nrs token bucket filter tbf policy added single-client io performance improved previous releases release also added preview dne striped directories allowing single large directories stored multiple mdts improve performance scalability lustre 2.7 released march 2015 added lfsck functionality verify dne consistency remote striped directories multiple mdts dynamic lnet config adds ability configure modify lnet network interfaces routes routers runtime new evaluation feature added uid/gid mapping clients different administrative domains along improvements dne striped directory functionality lustre 2.8 released march 2016 finished dne striped directory feature including support migrating directories mdts cross-mdt hard link rename well included improved support security-enhanced linux selinux client kerberos authentication rpc encryption network performance improvements lfsck lustre 2.9 released december 2016 included number features related security performance shared secret key security flavour uses gssapi mechanism kerberos provide client server node authentication rpc message integrity security encryption nodemap feature allows categorizing client nodes groups mapping uid/gid clients allowing remotely administered clients transparently use shared filesystem without single set uid/gids client nodes subdirectory mount feature allows clients mount subset filesystem namespace mds release also added support 16mib rpcs efficient i/o submission disk added codice_1 interface allow clients provide i/o hints servers prefetch file data server cache flush file data server cache improved support specifying filesystem-wide default ost pools improved inheritance ost pools conjunction file layout parameters lustre 2.10 released july 2017 number significant improvements lnet multi-rail lmr feature allows bonding multiple network interfaces infiniband omni-path and/or ethernet client server increase aggregate i/o bandwidth file layouts constructed multiple components based file offset allow different parameters stripe count ost pool etc determined based file size nrs token bucket filter tbf server-side scheduler implemented new rule types including rpc-type scheduling ability specify multiple parameters jobid nid rule matching tools managing zfs snapshots lustre filesystems added simplify creation mounting management mdt ost zfs snapshots separate lustre mountpoints lustre 2.11 released april 2018 contains two significant new features several smaller features file level redundancy flr feature expands 2.10 pfl implementation adding ability specify mirrored file layouts improved availability case storage server failure and/or improved performance highly concurrent reads data-on-mdt dom feature allows small mib files stored mdt leverage typical flash-based raid-10 storage lower latency reduced io contention instead typical hdd raid-6 storage used osts well lnet dynamic discovery feature allows auto-configuration lnet multi-rail peers share lnet network ldlm lock ahead feature allows appropriately modified applications libraries pre-fetch dlm extent locks osts files application knows predicts file extent modified near future reduce lock contention multiple clients writing file lustre 2.12 released december 21 2018 focused improving lustre usability stability improvements performance functionality flr dom features added lustre 2.11 well smaller changes nrs tbf hsm jobstats added lnet network health allow lnet multi-rail feature lustre 2.10 better handle network faults node multiple network interfaces lazy size mdt lsom feature allows storing estimate file size mdt use policy engines filesystem scanners management tools efficiently make decisions files without fully accurate file sizes blocks count without query osts information release also added ability manually restripe existing directory across multiple mdts allow migration directories large numbers files use capacity performance several mds nodes lustre rpc data checksum added scsi t10-pi integrated data checksums client kernel block layer scsi host adapter t10-enabled hard drives lustre file system three major functional units mdt ost client may node usually testing purposes typical production installations devices separate nodes communicating network mdt ost may part single filesystem though possible multiple mdts osts single node part different filesystems lustre network lnet layer use several types network interconnects including native infiniband verbs omni-path roce iwarp via ofed tcp/ip ethernet proprietary network technologies cray gemini interconnect lustre 2.3 earlier myrinet quadrics cray seastar rapidarray networks also supported network drivers deprecated networks longer commercially available support removed completely lustre 2.8 lustre take advantage remote direct memory access rdma transfers available improve throughput reduce cpu usage storage used mdt ost backing filesystems normally provided hardware raid devices though work block devices since lustre 2.4 mdt ost also use zfs backing filesystem addition ext4 allowing effectively use jbod storage instead hardware raid devices lustre oss mds servers read write modify data format imposed backing filesystem return data clients allows lustre take advantage improvements features underlying filesystem compression data checksums zfs clients direct access underlying storage ensures malfunctioning malicious client corrupt filesystem structure ost dedicated filesystem exports interface byte ranges file objects read/write operations extent locks protect data consistency mdt dedicated filesystem stores inodes directories posix extended file attributes controls file access permissions/acls tells clients layout object make regular file mdts osts currently use either enhanced version ext4 called ldiskfs zfs/dmu back-end data storage store files/objects using open source zfs-on-linux port client mounts lustre filesystem locally vfs driver linux kernel connects client server upon initial mount client provided file identifier fid root directory mountpoint client accesses file performs filename lookup mds mds filename lookup complete user client permission access and/or create file either layout existing file returned client new file created behalf client requested read write operations client interprets file layout logical object volume lov layer maps file logical offset size one objects client locks file range operated executes one parallel read write operations directly oss nodes hold data objects approach bottlenecks client-to-oss communications eliminated total bandwidth available clients read write data scales almost linearly number osts filesystem initial lookup file layout mds normally involved file io operations since block allocation data io managed internally ost clients directly modify objects data ost filesystems instead delegate task oss nodes approach ensures scalability large-scale clusters supercomputers well improved security reliability contrast shared block-based filesystems gpfs ocfs allow direct access underlying storage clients filesystem requires large back-end san attached clients increases risk filesystem corruption misbehaving/defective clients typical lustre installation linux client lustre filesystem driver module loaded kernel filesystem mounted like local network filesystem client applications see single unified filesystem even though may composed tens thousands individual servers mdt/ost filesystems massively parallel processor mpp installations computational processors access lustre file system redirecting i/o requests dedicated i/o node configured lustre client approach used blue gene installation lawrence livermore national laboratory another approach used early years lustre liblustre library cray xt3 using catamount operating system systems sandia red storm provided userspace applications direct filesystem access liblustre user-level library allows computational processors mount use lustre file system client using liblustre computational processors could access lustre file system even service node job launched linux client liblustre allowed data movement directly application space lustre osss without requiring intervening data copy kernel thus providing access computational processors lustre file system directly constrained operating environment liblustre functionality deleted lustre 2.7.0 disabled since lustre 2.6.0 untested since lustre 2.3.0 linux kernel version 4.18 incomplete port lustre client removed kernel staging area order speed development porting newer kernels out-of-tree lustre client server still available rhel sles ubuntu distro kernels well vanilla kernels traditional unix disk file system inode data structure contains basic information file data contained file stored lustre file system also uses inodes inodes mdts point one ost objects associated file rather data blocks objects implemented files osts client opens file file open operation transfers set object identifiers layout mds client client directly interact oss node object stored allows client perform i/o parallel across ost objects file without communication mds one ost object associated mdt inode object contains data lustre file one object associated file data file striped chunks round-robin manner across ost objects similar raid 0 striping file multiple ost objects provides significant performance benefits need high bandwidth access single large file striping used maximum file size limited size single target capacity aggregate i/o bandwidth scale number osts file striped also since locking object managed independently ost adding stripes one per ost scales file i/o locking capacity file proportionately file created filesystem may specify different layout parameters stripe count number ost objects making file stripe size unit data stored ost moving next ost selection performance capacity tuned optimally file many application threads reading writing separate files parallel optimal single stripe per file since application providing parallelism many threads reading writing single large file concurrently optimal one stripe ost maximize performance capacity file lustre 2.10 release ability specify composite layouts added allow files different layout parameters different regions file progressive file layout pfl feature uses composite layouts improve file io performance wider range workloads well simplify usage administration example small pfl file single stripe low access overhead larger files many stripes high aggregate bandwidth better ost load balancing composite layouts enhanced 2.11 release file level redundancy flr feature allows file multiple overlapping layouts file providing raid 0+1 redundancy files well improved read performance lustre 2.11 release also added data-on-metadata dom feature allows first component pfl file stored directly mdt inode reduces overhead accessing small files terms space usage ost object needed well network usage fewer rpcs needed access data dom also improves performance small files mdt ssd-based osts disk-based client initially mounts filesystem provided 128-bit lustre file identifier fid composed 64-bit sequence number 32-bit object id 32-bit version root directory mountpoint filename lookup client performs lookup pathname component mapping parent directory fid sequence number specific mdt via fid location database fldb lookup mds managing mdt using parent fid filename mds return fid requested pathname component along dlm lock mdt last parent directory determined directory operations non-striped directories take place exclusively mdt avoiding contention mdts dne striped directories per-directory layout stored parent directory provides hash function list mdt directory fids across directory distributed logical metadata volume lmv client hashes filename maps specific mdt directory shard handle operations file identical manner non-striped directory readdir operations entries directory shard returned client sorted local mdt directory hash order client performs merge sort interleave filenames hash order single 64-bit cookie used determine current offset within directory lustre distributed lock manager ldlm implemented openvms style protects integrity file data metadata access modification lustre file completely cache coherent among clients metadata locks managed mdt stores inode file using fid resource name metadata locks split separate bits protect lookup file file owner group permission mode access control list acl state inode directory size directory contents link count timestamps layout file striping since lustre 2.4 extended attributes xattrs since lustre 2.5 client fetch multiple metadata lock bits single inode single rpc request currently ever granted read lock inode mds manages modifications inode order avoid lock resource contention currently node gets write locks inodes file data locks managed ost object file striped using byte-range extent locks clients granted overlapping read extent locks part file allowing multiple concurrent readers file and/or non-overlapping write extent locks independent regions file allows many lustre clients access single file concurrently read write avoiding bottlenecks file i/o practice linux clients manage data cache units pages clients request locks always integer multiple page size 4096 bytes clients client requesting extent lock ost may grant lock larger extent originally requested order reduce number lock requests client makes actual size granted lock depends several factors including number currently granted locks object whether conflicting write locks requested lock extent number pending lock requests object granted lock never smaller originally requested extent ost extent locks use lustre fid object resource name lock since number extent lock servers scales number osts filesystem also scales aggregate locking performance filesystem single file striped multiple osts communication lustre clients servers implemented using lustre networking lnet originally based sandia portals network programming application programming interface disk storage connected lustre mds oss server nodes using direct attached storage sas fc iscsi traditional storage area network san technologies independent client-to-server network lnet use many commonly used network types infiniband tcp commonly ethernet networks allows simultaneous availability across multiple network types routing remote direct memory access rdma used data metadata transfer nodes provided underlying networks infiniband roce iwarp omni-path high availability recovery features enable transparent recovery conjunction failover servers since lustre 2.10 lnet multi-rail mr feature allows link aggregation two network interfaces client server improve bandwidth lnet interface types need network type 2.12 multi-rail enhanced improve fault tolerance multiple network interfaces available peers lnet provides end-to-end throughput gigabit ethernet networks excess 100 mb/s throughput 3 gb/s using infiniband quad data rate qdr links throughput 1 gb/s across 10 gigabit ethernet interfaces lustre file system high availability features include robust failover recovery mechanism making server failures reboots transparent version interoperability successive minor versions lustre software enables server upgraded taking offline failing standby server performing upgrade restarting active jobs continue run experiencing delay backup server takes storage lustre mdses configured active/passive pair one active/active mds pairs dne osses typically deployed active/active configuration provides redundancy without extra overhead often standby mds one filesystem mgs and/or monitoring node active mds another file system nodes idle cluster lustre provides capability multiple storage tiers within single filesystem namespace allows traditional hsm functionality copy archive files primary filesystem secondary archive storage tier archive tier typically tape-based system often fronted disk cache file archived released main filesystem leaving stub references archive copy released file opened coordinator blocks open sends restore request copytool completes open copytool completed restoring file addition external storage tiering possible multiple storage tiers within single filesystem namespace osts different types e.g hdd ssd declared named storage pools ost pools selected specifying file layouts different pools used within single pfl file layout files migrated storage tiers either manually control policy engine since lustre 2.11 also possible mirror file different ost pools flr file layout example pre-stage files flash computing job hsm includes additional lustre components manage interface primary filesystem archive hsm also defines new states files including lustre used many top500 supercomputers large multi-cluster sites six top 10 60 top 100 supercomputers use lustre file systems include k computer riken advanced institute computational science tianhe-1a national supercomputing center tianjin china jaguar titan oak ridge national laboratory ornl blue waters university illinois sequoia blue gene/l lawrence livermore national laboratory llnl also large lustre filesystems national energy research scientific computing center pacific northwest national laboratory texas advanced computing center brazilian national laboratory scientific computing nasa north america asia tokyo institute technology europe cea many others commercial technical support lustre often bundled along computing system storage hardware sold vendor vendors include cray dell hewlett-packard hp storageworks scalable file share circa 2004 2008 groupe bull silicon graphics international fujitsu vendors selling storage hardware bundled lustre support include hitachi data systems datadirect networks ddn netapp seagate technology others also possible get software-only support lustre file systems vendors including whamcloud amazon web services offers amazon fsx lustre fully managed service making easy launch run high-performance file systems cost effectively cloud
[ 5120, 9731, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 6179, 10789, 5158, 5677, 7225, 11323, 9277, 8772, 7248, 597, 1109, 2135, 10327, 11363, 4708, 8298, 8810, 9836, 7789, 5233, 9333, 1142, 631, 6263, 9335, 9343, 7...
None
3,329
4
Identity_Interrogation:identity interrogation identity interrogation method authentication identity proofing involves posing one knowledge-based authentication questions individual identity interrogation questions mother ’ maiden name last four digits social security number questioning process requires individuals reveal personally identifiable information pii order prove identity method businesses use prevent identity theft impersonation customers identity interrogation primarily employed remote in-person interactions teller bank many interactions require user authentication internet telephone employ identity interrogation substitute stronger authentication methods physical ownership authentication i.e presenting driver license bankcard biometrics i.e fingerprint facial recognition available mainly in-person interactions identity interrogation used assist risk management account security legal regulatory compliance remote interactions addition technique developed assist prevention identity fraud illegal use another person identity commit fraud criminal activities identity interrogation methods commonly used governments organizations companies banks financial intermediaries credit card companies internet providers telecommunications companies insurance providers others
[ 6562, 10207 ]
Test
3,330
6
Hidden_file_and_hidden_directory:hidden file hidden directory computing hidden folder sometimes hidden directory hidden file folder file filesystem utilities display default showing directory listing commonly used storing user preferences preserving state utility frequently created implicitly using various utilities security mechanism access restricted usually intent simply clutter display contents directory listing files user directly create unix-like operating systems file folder starts dot character example /home/user/.config commonly called dot file dotfile treated hidden – codice_1 command display unless codice_2 flag codice_3 used command-line shells wildcards match files whose names start codice_4 unless wildcard starts explicit codice_4 convention arose using dotfiles user home directory store per-user configuration informational text early uses well-known dotfiles codice_6 codice_7 codice_8 configuration files bourne shell c shell shells compatible codice_9 codice_10 used codice_11 codice_12 commands many applications bash desktop environments gnome store per-user configuration way unix/linux freedesktop.org xdg base directory specification aims migrate user config files individual dotfiles codice_13 non-hidden files hidden directory codice_14 android operating system uses empty codice_15 files tell smartphone apps display include contents folder prevents digital photos digital music files shown picture galleries played mp3 player apps useful prevent downloaded voicemail files playing songs playlist keep personal photos private still allowing folders shared person friends family colleagues codice_15 file effect filesystem even operating system instead depends entirely individual app respect presence different files gnome desktop environment well programs written using glib filenames listed file named codice_17 directory also excluded display gnome file manager keyboard shortcut enables display kinds hidden files addition dotfile behaviour files invisible attribute hidden finder although codice_1 invisible attribute set cleared using codice_19 command example invoking codice_20 hide file jimbo starting mac os x snow leopard codice_21 command also used example codice_22 hide file jimbo dos systems file directory entries include hidden file attribute manipulated using attrib command use command line command codice_23 display files attribute hidden windows explorer content directory hidden appending pre-defined clsid end folder name directory still visible content becomes one windows special folders however real content directory still seen using cli command codice_24
[ 2432, 9732, 5256, 5514, 5397, 537, 8988, 6813, 7325, 9762, 5158, 1193, 7983, 52, 1844, 1083, 2109, 9533, 10815, 3522, 3280, 5969, 6358, 5975, 1509, 9319, 8301, 6126, 7663, 9840, 3571, 7540, 10751 ]
Validation
3,331
7
GLite:glite glite pronounced gee-lite middleware computer software project grid computing used cern lhc experiments scientific domains implemented collaborative efforts 80 people 12 different academic industrial research centers europe glite provides framework building applications tapping distributed computing storage resources across internet glite services adopted 250 computing centres used 15000 researchers europe around world prototyping phases 2004 2005 convergence lhc computing grid lcg-2 distribution reached may 2006 glite 3.0 released became official middle-ware enabling grids e-science egee project ended 2010 development glite middle-ware taken european middleware initiative maintained part emi software stack distributed computing infrastructure built egee supported european grid infrastructure runs grid middle-ware produced european middleware initiative many components came glite middle-ware glite user community grouped virtual organisations vos user must join vo supported infrastructure running glite authenticated authorized using grid resources grid security infrastructure gsi wlcg/egee enables secure authentication communication open network gsi based public key encryption x.509 certificates secure sockets layer ssl communication protocol extensions single sign-on delegation authenticate him/herself user needs digital x.509 certificate issued certification authority ca trusted infrastructure running middle-ware authorization user specific grid resource done two different ways first simpler relies grid-mapfile mechanism second way relies virtual organisation membership service voms lcas/lcmaps mechanism allow detailed definition user privileges access point glite grid user interface ui machine users personal account user certificate installed ui user authenticated authorized use wlcg/egee resources access functionalities offered information workload data management systems provides cli tools perform basic grid operations computing element ce grid terminology set computing resources localized site i.e cluster computing farm ce includes grid gate gg acts generic interface cluster local resource management system lrms sometimes called batch system cluster collection worker nodes wns nodes jobs run two ce implementations glite 3.1 lcg ce developed edg used lcg-22 glite ce developed egee sites choose install provide types gg responsible accepting jobs dispatching execution wns via lrms glite 3.1 supported lrms types openpbs/pbspro platform lsf maui/torque bqs condor sun grid engine storage element se provides uniform access data storage resources storage element may control simple disk servers large disk arrays tape-based mass storage systems mss wlcg/egee sites provide least one se storage elements support different data access protocols interfaces simply speaking gsiftp gsi-secure ftp protocol whole-file transfers local remote file access performed using rfio gsidcap storage resources managed storage resource manager srm middle-ware service providing capabilities like transparent file migration disk tape file pinning space reservation etc however different ses may support different versions srm protocol capabilities vary number srm implementations use varying capabilities disk pool manager dpm used fairly small ses disk-based storage castor designed manage large-scale mss front-end disks back-end tape storage dcache targeted mss large-scale disk array storage systems srm implementations development srm protocol specification also evolving classic ses srm interface provide simple disk-based storage model process phased information service provides information wlcg/egee grid resources status information essential operation whole grid via resources discovered published information also used monitoring accounting purposes much data published conforms glue schema defines common conceptual data model used grid resource monitoring discovery information system used glite 3.1 inherits main concepts globus monitoring discovery service mds however gris giis mds replaced berkeley database information index essentially openldap server updated external process purpose workload management system wms accept user jobs assign appropriate computing element record status retrieve output resource broker rb machine wms services run jobs submitted described using job description language jdl specifies example executable run parameters files moved worker node job run input grid files needed requirements ce worker node choice ce job sent made process called match-making first selects among available ces fulfill requirements expressed user close specified input grid files chooses ce highest rank quantity derived ce status information expresses goodness ce typically function numbers running queued jobs rb locates grid input files specified job description using service called data location interface dli provides generic interface file catalogue way resource broker talk file catalogs lfc provided dli interface recent implementation wms egee allows submission single jobs also collections jobs possibly dependencies much efficient way old lcg-2 wms many new options finally logging bookkeeping service lb tracks jobs managed wms collects events many wms components records status history job glite components services contributing partners
[ 5956, 198, 3849, 7983, 9040, 3379, 2710, 5654, 8122, 7294 ]
Validation
3,332
9
Singleton_variable:singleton variable computer programming singleton variable variable referred examples variable might referenced dummy argument function call address assigned another variable subsequently accesses allocated storage singleton variables sometimes occur mistake made – assigning value variable forgetting use later mistyping one instance variable name compilers lint-like tools flag occurrences singleton variables
[ 1952 ]
Validation
3,333
4
Security_Shield:security shield security shield also known securityshield series rogue security software programs asks amount money get full version protection minor non-existent viruses
[ 7515, 4165, 9287 ]
Train
3,334
9
SCM_(Scheme_implementation):scm scheme implementation scm programming language dialect language scheme written language c aubrey jaffer author slib scheme library jacal interactive computer algebra symbolic mathematics program conforms standards r4rs r5rs ieee p1178 free open-source software released gnu lesser general public license lgpl scm runs many different operating systems amigaos also emulation linux atari-st macos scm mac dos os/2 nos/ve unicos vms unix similar systems scm includes hobbit scheme-to-c compiler written originally 2002 tanel tammet generates c files binaries dynamically statically linked scm executable scm includes linkable modules slib features like sequence comparison arrays records byte-number conversions modules portable operating system interface posix system calls network sockets readline curses xlib platforms scm supports unexec developed emacs bash dumps executable image running scm results fast startup scm scm developed scheme one defun siod 1990 gnu guile developed scm 1993
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 7805, 9345, 1159, 9865, 9877, 5803, 2225, 7867, 4799, 7880, 8908, 2...
None
3,335
0
Lessac_Technologies:lessac technologies lessac technologies inc. lti american firm develops voice synthesis software licenses technology sells synthesized novels mp3 files firm currently seven patents granted lti technology partly based work late arthur lessac professor theater state university new york creator lessac kinesensic training lti licensed exclusive rights exploit arthur lessac copyrighted works fields speech synthesis speech recognition based view music speech speech music lessac work books focused body speech energies go together arthur lessac textual annotation system originally developed assist actors singers orators marking scripts prepare performance adapted lti speech synthesis system basic representation speech synthesized lessemes contrast many systems use phonetic representation lti ’ software two major components 1 linguistic front-end converts plain text sequence prosodic phonosensory graphic symbols lessemes based arthur lessac annotation system specify speech units synthesized 2 signal-processing back-end takes lessemes acoustic data produces human-sounding synthesized speech output using unit selection concatenation lti ’ text-to-speech system came second world-wide blizzard challenge 2011 2012 first-place team 2011 also employed lti front-end technology back-end blizzard challenge conducted language technologies institute carnegie mellon university devised way evaluate speech synthesis techniques different research groups build voices voice-actor recordings comparing results listening tests lti founded 2000 h. donald wilson chairman lawyer lexisnexis entrepreneur business associate arthur lessac gary a. marple chief inventor marple suggested arthur lessac kinesensic voice training might applicable computational linguistics wilson ’ death 2006 nephew john reichenbach became firm ’ ceo
[ 1890, 4092, 3533 ]
Test
3,336
9
Paul_Graham_(programmer):paul graham programmer paul graham born 13 november 1964 english-born computer scientist entrepreneur venture capitalist author essayist best known work lisp former startup viaweb later renamed yahoo store co-founding influential startup accelerator seed capital firm combinator blog hacker news author several programming books lisp 1993 ansi common lisp 1995 hackers painters 2004 technology journalist steven levy described graham hacker philosopher paul graham family moved pittsburgh pennsylvania 1968 attended gateway high school graham received bachelor arts philosophy cornell university 1986 attended harvard university earning master science 1988 doctor philosophy 1990 degrees computer science also studied painting rhode island school design accademia di belle arti florence 1996 graham robert morris founded viaweb first application service provider asp viaweb software written mostly common lisp allowed users make internet stores summer 1998 viaweb sold yahoo 455,000 shares yahoo stock valued 49.6 million acquisition product became yahoo store later gained fame essays posts personal website paulgraham.com essay subjects range beating averages compares lisp programming languages introduced hypothetical programming language blub nerds unpopular discussion nerd life high school collection essays published hackers painters o'reilly includes discussion growth viaweb graham perceives advantages lisp program 2001 graham announced working new dialect lisp named arc years since written several essays describing features goals language internal projects combinator written arc notably hacker news web forum news aggregator program 2005 giving talk harvard computer society later published start startup graham along trevor blackwell jessica livingston robert morris started combinator provide seed funding large number startups particularly started younger technically oriented founders combinator invested 1300 startups including justin.tv xobni dropbox airbnb stripe businessweek included paul graham 2008 edition annual feature 25 influential people web 2008 paul graham married jessica livingston response proposed stop online piracy act sopa graham announced late 2011 representatives company supporting would invited combinator demo day events graham proposed disagreement hierarchy 2008 essay disagree putting types argument seven-point hierarchy observing moving disagreement hierarchy makes people less mean make happier graham also suggested hierarchy thought pyramid highest forms disagreement rarer following hierarchy graham notes articulate forms name-calling e.g author self-important dilettante different crude insults graham considers hierarchy programming languages example blub hypothetically average language right middle abstractness continuum powerful language powerful cobol machine language used graham illustrate comparison beyond turing completeness programming language power specifically illustrate difficulty comparing programming language one knows one one graham considers hypothetical blub programmer programmer looks power continuum considers lower languages less powerful miss feature blub programmer used looks fails realise looking merely sees weird languages unnecessary features assumes equivalent power hairy stuff thrown well graham considers point view programmer using language higher blub describes programmer looking blub noting missing features point view higher language graham describes blub paradox concludes induction programmers position see differences power various languages understand powerful one concept cited writers joel spolsky
[ 10752, 11269, 2062, 4623, 6160, 9231, 9749, 8728, 4633, 8735, 8226, 8747, 2105, 6717, 8258, 8771, 8262, 1613, 9299, 3675, 7267, 8293, 2666, 1653, 5751, 7805, 9877, 5803, 2225, 7867, 4799, 7880, 9416, 10953, 8908, 205, 4830, 10463, 7392, 7...
Test
3,337
4
AMD_Platform_Security_Processor:amd platform security processor amd platform security processor psp officially known amd secure technology trusted execution environment subsystem incorporated since 2013 amd microprocessors according amd developer guide subsystem responsible creating monitoring maintaining security environment functions include managing boot process initializing various security related mechanisms monitoring system suspicious activity events implementing appropriate response critics worry used backdoor security concern amd denied requests open source code runs psp psp similar intel management engine intel processors psp arm core inserted main cpu september 2017 google security researcher cfir cohen reported vulnerability amd psp subsystem could allow attacker access passwords certificates sensitive information patch rumored become available vendors december 2017 march 2018 handful alleged serious flaws announced amd zen architecture cpus epyc ryzen ryzen pro ryzen mobile israeli security company related psp could allow malware run gain access sensitive information amd announced firmware updates handle flaws claims flaws published purpose stock manipulation validity technical standpoint upheld independent security experts reviewed disclosures although high risks claimed cts labs often dismissed said independent experts
[ 7936, 9092, 4444, 2558 ]
Test
3,338
2
IPad_Air_(2019):ipad air 2019 third-generation ipad air tablet computer designed developed marketed apple inc announced march 18 2019 alongside 5th generation ipad mini device similar ipad air 2 10.5-inch ipad pro features apple a12 bionic chip 64 256 gb storage upgraded 10.5-inch retina display support apple pencil 1st generation bluetooth 5.0 faster memory lpddr4x instead ipad air 2 lpddr3 third-generation ipad air features upgraded front camera system 7mp 1080p camera used since 2016 starting iphone 7 continued iphone xs continues older 8mp 1080p rear camera system used since ipad air 2 2014 record 4k ipad air retains lightning port keeps headphone jack third-generation ipad air 2.49ghz six-core processor apple a12 bionic chip chip 66 faster clock speed 1.5ghz triple-core apple a8x third-generation ipad air predecessor ipad air 2 third-generation ipad air true tone display allows lcd adapt ambient lighting change color intensity different environments 3x faster ipad air 2 battery last 10 hours
[ 10755, 9732, 5647, 7697, 4114, 11289, 7706, 1057, 1576, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8783, 4180, 10838, 1623, 3672, 3681, 9826, 8806, 2673, 2686, 6783, 10878, 8842, 3228, 2207, 4258, 7842, 11430, 2735, 3248, 4283, 3772, 7869, ...
Test
3,339
3
Tao_ExDOS:tao exdos tao exdos emulator software application designed allow users old ms-dos applications run applications new operating systems windows 10 windows 8 windows 7 windows vista windows xp windows 2000 windows terminal server tao exdos enables users dos applications work applications new operating systems using built-in virtual 8086 mode x86 cpu tao exdos enables dos 16-bit windows applications run dos run effectively 32-bit windows desktop environments including windows 10/8/7/vista/xp/2000 windows terminal server 2003/2008 support 64-bit systems available windows 7 via virtual xp mode downloaded free microsoft windows 7 professional ultimate enterprise versions additional modules allow dos users print printers connected usb ports network printers fax printers pdf microsoft word html image files
[ 6730, 4074, 9166, 7983, 847, 477 ]
Validation
3,340
2
WebOS_version_history:webos version history webos linux operating system smart devices formerly mobile operating system initially developed palm later acquired hewlett-packard lg electronics palm launched webos january 2009 various versions webos featured several devices including pre pixi veer phones hp touchpad tablet latest version 3.0.5 released 12 january 2012
[ 6178, 2308, 424, 5384, 11337, 2285, 7983, 2258, 2259, 2420, 823 ]
Test
3,341
9
JavaServer_Pages_Standard_Tag_Library:javaserver pages standard tag library javaserver pages standard tag library jstl component java ee web application development platform extends jsp specification adding tag library jsp tags common tasks xml data processing conditional execution database access loops internationalization jstl developed java community process jcp java specification request jsr 52 may 8 2006 jstl 1.2 released followed jstl 1.2.1 dec 7 2011 jstl provides effective way embed logic within jsp page without using embedded java code directly use standardized tag set rather breaking java code leads maintainable code enables separation concerns development application code user interface total six jstl tag library descriptors addition jstl jcp following jsrs develop standard jsp tag libraries
[ 9988, 10526, 10020, 5677, 7983, 6067, 2106, 3517, 6334, 3518, 3008, 11582, 1223, 1095, 3278, 3920, 2901, 4959, 4960, 479, 3558, 1128, 3560, 9834, 6636, 3954 ]
Test
3,342
4
Virus_Bulletin:virus bulletin virus bulletin magazine prevention detection removal malware spam regularly features analyses latest virus threats articles exploring new developments fight viruses interviews anti-virus experts evaluations current anti-malware products virus bulletin founded 1989 monthly hardcopy magazine later distributed electronically pdf format monthly publication format discontinued july 2014 articles made available standalone pieces web site magazine located sophos headquarters abingdon oxfordshire uk co-founded owned jan hruska peter lammer co-founders sophos virus bulletin claims full editorial independence favour sophos products tests reviews technical experts anti-virus vendors written articles magazine also conducts comparison tests detection rates anti-virus software products manage detect 100 viruses wild without false alarming given vb100 award magazine holds annual conference late september early october computer security professionals recent years magazine conference branched discuss anti-spam security issues well malware notable previous speakers include mikko hyppönen eugene kaspersky graham cluley well representatives major anti-virus vendors
[ 7809, 131, 10372, 4247, 7449, 4889, 6683, 9246, 2721, 37, 2213, 3243, 5057, 4421, 5069, 5586, 4435, 2005, 8024, 7515, 2654, 9055, 4464, 8703 ]
None
3,343
7
IceWall_SSO:icewall sso icewall sso web federated single sign-on software developed marketed hewlett packard enterprise globe released 1997 icewall sso evolved last 18 years.originally developed hp japan marketed global markets provides highly convenient comfortable yet highly secure environment since first release 1997 icewall sso seen adoption intranet b-to-c b-to-b many services globally 40 million user licenses sold far world latest version icewall sso 10.0 provides support new leading-edge technologies cloud virtualization icewall sso product line extended include windows support addition existing hp-ux linux versions furthermore support services icewall sso planned continue 2024 making product long stable service life latest version available 10.0 august 2010 supported platforms red hat enterprise linux hp-ux windows server icewall sso mainly reverse proxy type implementation configured work agent type well depending requirements icewall sso mainly consists two modules cgi process works reverse proxy accepts http/https requests web browser forwards backend applications.forwarder also handles loginprocess authorizations communicating authentication module mentioned daemon program accepts requests forwarder performs authentication getting user information certification db directory services rdb icp icewall cert protocol used forwarder authentication module
[ 8355, 1638, 9286, 3323, 2485, 1304, 5435 ]
Validation
3,344
2
Collaboration_Data_Objects:collaboration data objects collaboration data objects cdo previously known ole messaging active messaging application programming interface included microsoft windows microsoft exchange server products library allows developers access global address list server objects addition contents mailboxes public folders cdo technology building messaging collaboration applications cdo used separately connection outlook object model gain access outlook cdo part outlook object model n't provide event-based functionality outlook objects manipulated using cdo starting exchange 2007 neither messaging api mapi client libraries cdo 1.2.1 provided part base product installation available downloads
[ 10886, 10026, 6797, 3250, 9909, 8607 ]
Test
3,345
4
Cube_attack:cube attack cube attack method cryptanalysis applicable wide variety symmetric-key algorithms published itai dinur adi shamir september 2008 preprint revised version preprint placed online january 2009 paper also accepted presentation eurocrypt 2009 cipher vulnerable output bit represented sufficiently low degree polynomial gf 2 key input bits particular describes many stream ciphers based lfsrs des aes believed immune attack works summing output bit value possible values subset public input bits chosen resulting sum linear combination secret bits repeated application technique gives set linear relations secret bits solved discover bits authors show cipher resembles random polynomial sufficiently low degree sets public input bits exist high probability discovered precomputation phase black box probing relationship input output various choices public secret input bits making use information construction cipher paper presents practical attack authors implemented tested stream cipher previous known attack would effective state 10,000 bit lfsr secret dense feedback polynomial filtered array 1000 secret 8-bit 1-bit s-boxes whose input based secret taps lfsr state whose output xored together bit lfsr initialized different secret dense quadratic polynomial 10 000 key iv bits lfsr clocked large secret number times without producing outputs first output bit given iv made available attacker short preprocessing phase attacker query output bits variety key iv combinations 2 bit operations required discover key cipher authors also claim attack version trivium reduced 735 initialization rounds complexity 2 conjecture techniques may extend breaking 1100 trivium 1152 initialization rounds maybe even original cipher best attack known trivium attack however embroiled two separate controversies firstly daniel j. bernstein disputes assertion previous attack 10,000-bit lfsr-based stream cipher existed claims attack reduced-round trivium n't give real reason think full trivium attacked claims cube paper failed cite existing paper xuejia lai detailing attack ciphers small-degree polynomials believes cube attack merely reinvention existing technique secondly dinur shamir credit michael vielhaber algebraic iv differential attack aida precursor cube attack dinur stated eurocrypt 2009 cube generalises improves upon aida however vielhaber contends cube attack attack another name however acknowledged parties involved cube use efficient linearity test blr test results new attack needing less time aida although substantial particular change remains dispute way cube aida differ vielhaber claims instance linear polynomials key bits obtained attack unusually sparse yet supplied evidence claims evidence appear forthcoming paper entitled algebraic iv differential attack aida attacking full trivium clear whether alleged sparsity applies ciphers trivium
[ 7034, 8674, 1941 ]
Test
3,346
3
The_Black_Onyx:black onyx memory limitations another part game released separately platforms added magic system two parts announced allowed party explore wilderness allowed party take part arena battles sg-1000 version one last releases console succeeded portrait loretta english-language fan-translation made available sg-1000 version back-porting abandoned source files similar hobby conversion project colecovision system group called team pixelboy later used source files complete project released unofficial english-language colecovision game 2013 player create five-member party 4 members gbc ask friendly encounters join party fill empty slots party explore dungeons town utsuro ウツロ obtain legendary black onyx break curse binds town eternal night combat system concept distance bows similar missile weapons melee weapons shields armor however hospital town offer examinations display pcs stats bank town heroes deposit money protects money thieves interest deposits since time system labyrinth town several entrances hidden one locations town labyrinth six floors corresponding six colors computer display must solved proper order depends platform order create stairway black tower onyx resides black onyx adapted manga titled published gamest comics collection april 1999 drawn kouta hirano
[ 10931, 6077, 9006, 7023 ]
Test
3,347
4
Festi_botnet:festi botnet festi botnet also known alias spamnost botnet mostly involved email spam denial service attacks festi botnet first discovered around autumn 2009 time estimated botnet consisted roughly infected machines spam volume capacity roughly 2.5 billion spam emails day recent estimates dated august 2012 display botnet sending spam unique ip addresses quarter total amount 1 million detected ip sending spam mails besides capable sending email spam research festi botnet demonstrated also capable performing denial service attacks
[ 3072, 10756, 3724, 4883, 2325, 278, 9630, 10657, 4648, 939, 46, 10297, 7739, 3643, 7996, 11583, 9664, 9154, 8133, 10952, 81, 8789, 10457, 7515, 988, 3807, 8032, 3941, 10477, 4462, 2041, 10875, 3581, 5886, 9087 ]
Train
3,348
3
Continental_Circus:continental circus continental circus racing simulation arcade game created manufactured taito 1987 1989 ports released amiga amstrad cpc atari st commodore 64 msx zx spectrum arcade version game comes upright sit-down models feature shutter-type 3d glasses hanging player head according computer video games 1988 world first three dimensional racing simulation home conversions continental circus lack full-on 3d special glasses arcade version circus common term racing france japan likely stemming latin term racecourse unrelated 1972 french film motor racing also called continental circus 2005 game made available playstation 2 xbox pc part taito legends in-game vehicle 1987 camel-sponsored honda/lotus 99t formula one car driven ayrton senna satoru nakajima due licensing reasons sponsor names camel delonghi intentionally misspelled prevent copyright infringement japanese law player must successfully qualify eight different races win beginning player must take 80th place better advance player advances worst possible position qualify player fails meet qualify timer runs game player however option continue player fails qualify final race game automatically player continue real f1 races car susceptible damage contact another car player hits car piece trackside scenery called pits let car smoke long catch fire message impending explosion appear either way fail make back hit another car crash explode costing several seconds also car reaches speeds excess 380 km/h speedometer turn yellow warning player let know car going much fast car hits another car behind collision send car devastating cartwheel explodes costing several seconds light going fast turn cause car lose grip road car loses grip spin control low chance wreck happening definitely take several seconds clock also time time thunderstorm occur causing track become wet causing car lose traction case message change tires appear player must immediately get pits change wet-tyres storm dies road covered puddles pose threat continental circus music race plays intro/outro music race vein pole position afterwards screen cuts start line race course announcement gentlemen start engines 30 seconds start spoken line lifted 1972 french documentary game bears name entire collection musical scores sound effects voice clips featured compilation soundtrack known 究極tiger -g.s.m.taito 2- musical score composed zuntata taito house band excerpts arcade soundtrack included sinclair user cover tape music home versions composed ben daglish game commercially successful number-two coinslot dedicated arcade game chart behind street fighter home conversion went number 2 uk sales chart behind power drift january 1989 issue sinclair user gave award 1988 cock-up year title continental circus appearing spell circuit incorrectly
[ 9957, 11690, 10316, 9006, 629, 6390, 1340 ]
Test
3,349
2
Soname:soname unix unix-like operating systems soname field data shared object file soname string used logical name describing functionality object typically name equal filename library prefix thereof e.g codice_1 soname often used provide version backwards-compatibility information instance versions 1.0 1.9 shared library codice_2 provide identical interfaces would soname e.g codice_3 system includes version 1.3 shared object filename codice_4 soname field shared object tells system used fill dependency binary originally compiled using version 1.2 note codice_5 particular case complex history see gnu c library application binary interface abi library changes backward-incompatible way soname would incremented e.g codice_6 codice_7 gnu linker uses codice_8 codice_9 specify library name field internally linker create codice_10 field populate codice_11 given shared object file one use following command get information within library file using objdump objdump -p libx.so.1.3 grep soname
[ 9921, 5492, 5397, 2804, 823, 1501 ]
Validation
3,350
5
Usenet:usenet usenet worldwide distributed discussion system available computers developed general-purpose unix-to-unix copy uucp dial-up network architecture tom truscott jim ellis conceived idea 1979 established 1980 users read post messages called articles posts collectively termed news one categories known newsgroups usenet resembles bulletin board system bbs many respects precursor internet forums widely used today discussions threaded web forums bbss though posts stored server sequentially name comes term users network major difference bbs web forum usenet absence central server dedicated administrator usenet distributed among large constantly changing conglomeration servers store forward messages one another so-called news feeds individual users may read messages post messages local server operated commercial usenet provider internet service provider university employer server usenet culturally historically significant networked world given rise popularized many widely recognized concepts terms faq flame sockpuppet spam 1990s internet became commonly affordable usenet connections via fidonet dial-up bbs networks made long-distance worldwide discussions communication widespread needing server local telephone service usenet conceived 1979 publicly established 1980 university north carolina chapel hill duke university decade world wide web went online general public received access internet making one oldest computer network communications systems still widespread use originally built poor man arpanet employing uucp transport protocol offer mail file transfers well announcements newly developed news software news name usenet emphasized creators hope usenix organization would take active role operation articles users post usenet organized topical categories known newsgroups logically organized hierarchies subjects instance sci.math sci.physics within sci hierarchy science talk.origins talk.atheism talk hierarchy user subscribes newsgroup news client software keeps track articles user read newsgroups majority articles responses article set articles traced one single non-reply article called thread modern newsreaders display articles arranged threads subthreads example wine-making newsgroup rec.crafts.winemaking someone might start thread called best yeast thread conversation might grow dozens replies long perhaps six eight different authors several days conversation different wine yeasts might branch several sub-threads tree-like form user posts article initially available user news server news server talks one servers newsfeeds exchanges articles fashion article copied server server eventually reach every server network later peer-to-peer networks operate similar principle usenet normally sender rather receiver initiates transfers usenet designed conditions networks much slower always available many sites original usenet network would connect twice day batch-transfer messages largely pots network typically used transfers phone charges lower night format transmission usenet articles similar internet e-mail messages difference two usenet articles read user whose news server carries group message posted opposed email messages one specific recipients today usenet diminished importance respect internet forums blogs mailing lists social media usenet differs media several ways usenet requires personal registration group concerned information need stored remote server archives always available reading messages require mail web client news client however possible read participate usenet newsgroups large degree using ordinary internet browsers since newsgroups copied several internet sites groups alt.binaries still widely used data transfer many internet service providers many internet sites operate news servers users access isps operate servers directly often offer users account another provider specifically operates newsfeeds early news implementations server newsreader single program suite running system today one uses separate newsreader client software program resembles email client accesses usenet servers instead clients mozilla thunderbird outlook express provide abilities isps run news servers news server one difficult internet services administer large amount data involved small customer base compared mainstream internet services email web access disproportionately high volume customer support incidents frequently complaining missing news articles isp fault isps outsource news operation specialist sites usually appear user though isp ran server many sites carry restricted newsfeed limited number newsgroups commonly omitted newsfeed foreign-language newsgroups alt.binaries hierarchy largely carries software music videos images accounts 99 percent article data also usenet providers specialize offering service users whose isps carry news carry restricted feed see also news server operation overview news systems implemented newsgroups typically accessed newsreaders applications allow users read reply postings newsgroups applications act clients one news servers although historically usenet associated unix operating system developed newsreaders available major operating systems modern mail clients communication suites commonly also integrated newsreader often however integrated clients low quality compared standalone newsreaders incorrectly implement usenet protocols standards conventions many integrated clients example one microsoft outlook express disliked purists misbehavior rise world wide web www web front-ends web2news become common web front ends lowered technical entry barrier requirements one application usenet nntp server account numerous websites offering web based gateways usenet groups although people begun filtering messages made web interfaces one reason another google groups one web based front end web browsers access google groups via news protocol links directly minority newsgroups moderated meaning messages submitted readers distributed directly usenet instead emailed moderators newsgroup approval moderator receive submitted articles review inject approved articles properly propagated worldwide articles approved moderator must bear approved header line moderators ensure messages readers see newsgroup conform charter newsgroup though required follow rules guidelines typically moderators appointed proposal newsgroup changes moderators follow succession plan historically mod hierarchy existed usenet reorganization moderated newsgroups may appear hierarchy typically .moderated added group name usenet newsgroups big-8 hierarchy created proposals called request discussion rfd rfd required following information newsgroup name checkgroups file entry moderated unmoderated status group moderated least one moderator valid email address must provided information beneficial required includes charter rationale moderation policy group moderated discussion new newsgroup proposal follows finished members big-8 management board making decision vote either approve disapprove new newsgroup unmoderated newsgroups form majority usenet newsgroups messages submitted readers unmoderated newsgroups immediately propagated everyone see minimal editorial content filtering vs propagation speed form one crux usenet community one little cited defense propagation canceling propagated message usenet users use command news readers offer cancellation commands part article storage expires relatively short order anyway almost unmoderated usenet groups become collections spam usenet set protocols generating storing retrieving news articles resemble internet mail messages exchanging among readership potentially widely distributed protocols commonly use flooding algorithm propagates copies throughout network participating servers whenever message reaches server server forwards message network neighbors n't yet seen article one copy message stored per server server makes available demand typically local readers able access server collection usenet servers thus certain peer-to-peer character share resources exchanging granularity exchange however different scale modern peer-to-peer system characteristic excludes actual users system connect news servers typical client-server application much like email reader rfc 850 first formal specification messages exchanged usenet servers superseded rfc 1036 subsequently rfc 5536 rfc 5537 cases unsuitable content posted usenet support automated removal posting whole network creating cancel message although due lack authentication resultant abuse capability frequently disabled copyright holders may still request manual deletion infringing material using provisions world intellectual property organization treaty implementations united states online copyright infringement liability limitation act would require giving notice individual news server administrator internet usenet transported via network news transfer protocol nntp tcp port 119 standard unprotected connections tcp port 563 ssl encrypted connections offered sites major set worldwide newsgroups contained within nine hierarchies eight operated consensual guidelines govern administration naming current big eight see also great renaming alt hierarchy subject procedures controlling groups big eight result less organized groups alt hierarchy tend specialized specific—for example might newsgroup big eight contains discussions children books group alt hierarchy may dedicated one specific author children books binaries posted alt.binaries making largest hierarchies many hierarchies newsgroups distributed alongside regional language-specific hierarchies ne serve specific countries regions japan malta new england companies projects administer hierarchies discuss products offer community technical support historical hierarchy free software foundation microsoft closed newsserver june 2010 providing support products forums users prefer use term usenet refer big eight hierarchies others include alt well general term netnews incorporates entire medium including private organizational news systems informal sub-hierarchy conventions also exist *.answers typically moderated cross-post groups faqs faq would posted within one group cross post *.answers group head hierarchy seen refining information news group subgroups recursive—to point silliness alt.* usenet originally created distribute text content encoded 7-bit ascii character set help programs encode 8-bit values ascii became practical distribute binary files content binary posts due size often-dubious copyright status time restricted specific newsgroups making easier administrators allow disallow traffic oldest widely used encoding method binary content uuencode unix uucp package late 1980s usenet articles often limited 60,000 characters larger hard limits exist today files therefore commonly split sections require reassembly reader header extensions base64 quoted-printable mime encodings new generation binary transport practice mime seen increased adoption text messages avoided binary attachments operating systems metadata attached files use specialized encoding formats mac os binhex special mime types used lesser known encoding systems may used one time btoa xx encoding boo usr encoding attempt reduce file transfer times informal file encoding known yenc introduced 2001 achieves 30 reduction data transferred assuming 8-bit characters safely transferred across network without first encoding 7-bit ascii space common method uploading large binary posts usenet convert files rar archives create parchive files parity files used recreate missing data every part files reaches server news server generally allocates certain amount storage space post content newsgroup storage filled time new post arrives old posts deleted make room new content network bandwidth available server high storage allocation small possible huge flood incoming content overflow allocation push everything group flood large enough beginning flood begin deleted even last part flood posted binary newsgroups able function reliably sufficient storage allocated group allow readers enough time download parts binary posting flushed group storage allocation one time posting undesired content countered newsgroup would flooded random garbage data posts sufficient quantity push content suppressed compensated service providers allocating enough storage retain everything posted day including spam floods without deleting anything average length time posts able stay group deleted commonly called retention time generally larger usenet servers enough capacity archive several years binary content even flooded new data maximum daily speed available good binaries service provider must accommodate users fast connections 3 megabit also users slow connections 256 kilobit less need time download content period several days weeks major nsps retention time 4 years results 33 petabytes 33000 terabytes storage part long retention times well growing internet upload speeds usenet also used individual users store backup data practice called usenet backup ubackup commercial providers offer easy use online backup services storing data usenet free charge although access usenet may method requires user manually select prepare upload data anyone potentially download backup files data typically encrypted files uploaded uploader control files automatically copied usenet providers multiple copies spread different geographical locations around world—desirable backup scheme binary newsgroups used distribute completely legal user-created works open-source software public domain material binary groups used illegally distribute commercial software copyrighted media pornographic material isp-operated usenet servers frequently block access alt.binaries groups reduce network traffic avoid related legal issues commercial usenet service providers claim operate telecommunications service assert responsible user-posted binary content transferred via equipment united states usenet providers qualify protection dmca safe harbor regulations provided establish mechanism comply respond takedown notices copyright holders removal copyrighted content entire usenet network nearly impossible task due rapid propagation servers retention done server petitioning usenet provider removal removes one server retention cache others possible special post cancellation message distributed remove servers many providers ignore cancel messages standard policy easily falsified submitted anyone takedown petition effective across whole network would issued origin server content posted propagated servers removal content early stage would prevent propagation modern high speed links content propagated fast arrives allowing time content review takedown issuance copyright holders establishing identity person posting illegal content equally difficult due trust-based design network like smtp email servers generally assume header origin information post true accurate however smtp email usenet post headers easily falsified obscure true identity location message source manner usenet significantly different modern p2p services p2p users distributing content typically immediately identifiable users network address origin information usenet posting completely obscured unobtainable propagated past original server also unlike modern p2p services identity downloaders hidden view p2p services downloader identifiable others network address usenet downloader connects directly server server knows address connecting usenet providers keep usage logs make logged information casually available outside parties recording industry association america existence anonymising gateways usenet also complicates tracing postings true origin newsgroup experiments first occurred 1979 tom truscott jim ellis duke university came idea replacement local announcement program established link nearby university north carolina using bourne shell scripts written steve bellovin public release news form conventional compiled software written steve daniel truscott 1980 usenet connected arpanet connections usenet arpanet mark horton graduate student set connection began feeding mailing lists arpanet usenet fa arpanet identifier usenet gained 50 member sites first year including reed college university oklahoma bell labs number people using network increased dramatically however still longer usenet users could contribute arpanet uucp networks spread quickly due lower costs involved ability use existing leased lines x.25 links even arpanet connections 1983 thousands people participated 500 hosts mostly universities bell labs sites also growing number unix-related companies number hosts nearly doubled 940 1984 100 newsgroups existed 20 devoted unix computer-related topics least third recreation mesh uucp hosts rapidly expanded became desirable distinguish usenet subset overall network vote taken 1982 usenix conference choose new name name usenet retained established applied news name uucpnet became common name overall network addition uucp early usenet traffic also exchanged fidonet dial-up bbs networks mid-1990s almost 40,000 fidonet systems operation possible communicate millions users around world local telephone service widespread use usenet bbs community facilitated introduction uucp feeds made possible ms-dos implementations uucp ufgate uucp fidonet gateway fsuucp uupc 1986 rfc 977 provided network news transfer protocol nntp specification distribution usenet articles tcp/ip flexible alternative informal internet transfers uucp traffic since internet boom 1990s almost usenet distribution nntp early versions usenet used duke news software designed one two articles day matt glickman horton berkeley produced improved version called b news could handle rising traffic 50 articles day late 1983 message format offered compatibility internet mail improved performance became dominant server software c news developed geoff collyer henry spencer university toronto comparable b news features offered considerably faster processing early 1990s internetnews rich salz developed take advantage continuous message flow made possible nntp versus batched store-and-forward design uucp since time inn development continued news server software also developed usenet first internet community place many important public developments pre-commercial internet place tim berners-lee announced launch world wide web linus torvalds announced linux project marc andreessen announced creation mosaic browser introduction image tag revolutionized world wide web turning graphical medium many jargon terms common use internet originated popularized usenet likewise many conflicts later spread rest internet ongoing difficulties spamming began usenet sascha segan pc magazine said 2008 usenet dying years segan said people pointed eternal september 1993 beginning usenet decline segan believes pornographers software crackers began putting large non-text files usenet late 1990s usenet disk space traffic increased correspondingly internet service providers questioned needed host space pornography unauthorized software state new york opened investigation child pornographers used usenet many isps dropped usenet access access alt hierarchy response john biggs techcrunch said long folks think command line better mouse original text-only social network live aol discontinued usenet access 2005 may 2010 duke university whose implementation kicked usenet 30 years earlier decommissioned usenet server citing low usage rising costs 32 years usenet news service link university north carolina chapel hill news.unc.edu retired february 4 2011 time amount usenet traffic steadily increased number text posts made big-8 newsgroups averaged 1,800 new messages every hour average 25,000 messages per day however averages minuscule comparison traffic binary groups much traffic increase reflects increase discrete users newsgroup discussions instead combination massive automated spamming increase use .binaries newsgroups large files often posted publicly small sampling change measured feed size per day follows 2008 verizon communications time warner cable sprint nextel signed agreement attorney general new york andrew cuomo shut access sources child pornography time warner cable stopped offering access usenet verizon reduced access big 8 hierarchies sprint stopped access alt hierarchies stopped access alt.binaries hierarchies cuomo never specifically named usenet anti-child pornography campaign david dejean pc world said worry isps used cuomo campaign excuse end portions usenet access costly internet service providers high demand customers 2008 aol longer offered usenet access four providers responded cuomo campaign five largest internet service providers united states 50 u.s. isp marketshare june 8 2009 announced would longer provide access usenet service july 15 2009 aol announced would discontinue integrated usenet service early 2005 citing growing popularity weblogs chat forums on-line conferencing aol community tremendous role popularizing usenet 11 years earlier august 2009 verizon announced would discontinue access usenet september 30 2009 janet announced would discontinue usenet service effective july 31 2010 citing google groups alternative microsoft announced would discontinue support public newsgroups msnews.microsoft.com june 1 2010 offering web forums alternative primary reasons cited discontinuance usenet service general isps include decline volume actual readers due competition blogs along cost liability concerns increasing proportion traffic devoted file-sharing spam unused discontinued groups isps include pressure cuomo campaign child pornography one reasons dropping usenet feeds part services isps cox atlantic communications resisted 2008 trend eventually drop respective usenet feeds 2010 public archives usenet articles existed since early days usenet system created kenneth almquist late 1982 distributed archiving usenet posts suggested november 1982 scott orshan proposed every site keep articles posted forever also november year rick adams responded post asking anyone archived netnews anyone plan stating afraid admit started archiving 'useful newsgroups september 18 june 1982 gregory g. woodbury proposed automatic access archives system consisted automatic answering fixed-format messages special mail recipient specified machines 1985 two news archiving systems one rfc posted internet first system called keepnews mark m. swenson university arizona described program attempts provide sane way extracting keeping information comes usenet main advantage system allow users mark articles worthwhile retain second system ya news archiver chuq von rospach similar keepnews designed work much larger archives wonderful quadratic search time feature unix ... becomes real problem von rospach early 1985 posted detailed rfc archiving accessing usenet articles keyword lookup rfc described program could generate maintain archive usenet articles allow looking articles based article-id subject lines keywords pulled article also included c code internal data structure system desire fulltext search index archived news articles new either one request made april 1991 alex martelli sought build sort keyword index news archive early may mr. martelli posted summary responses usenet noting popular suggestion award must definitely go 'lq-text package liam quin recently posted alt.sources huge site http //asstr.org archives indexes erotic pornographic stories posted usenet group alt.sex.stories today archiving usenet led fear loss privacy archive simplifies ways profile people partly countered introduction x-no-archive yes header controversial web-based archiving usenet posts began 1995 deja news large searchable database 2001 database acquired google google groups hosts archive usenet posts dating back may 1981 earliest posts date may 1981 june 1991 donated google university western ontario help david wiseman others originally archived henry spencer university toronto zoology department archives late 1991 early 1995 provided kent landfield netnews cd series jürgen christoffel gmd archive posts march 1995 onward started company dejanews later deja purchased google february 2001 google began archiving usenet posts starting second week august 2000 google criticized vice wired contributors well former employees stewardship archive breaking search functionality usenet whole administrators server administrator free whatever pleases long end users peer servers tolerate accept nevertheless famous administrators
[ 6657, 5634, 2563, 1028, 7173, 9736, 9225, 11274, 3597, 6171, 2076, 7709, 9757, 10270, 7713, 3618, 10791, 3629, 9264, 4661, 3639, 7739, 2110, 9283, 8260, 8773, 589, 5711, 6231, 8281, 3676, 1632, 6242, 5731, 10850, 6762, 9325, 10862, 6772, ...
Test
3,351
4
Winlogon:winlogon computing winlogon component microsoft windows operating systems responsible handling secure attention sequence loading user profile logon optionally locking computer screensaver running requiring another authentication step actual obtainment verification user credentials left components winlogon common target several threats could modify function memory usage increased memory usage process might indicate hijacked windows vista later operating systems winlogon roles responsibilities changed significantly winlogon handles interface functions independent authentication policy creates desktops window station implements time-out operations versions windows prior windows vista provides set support functions gina takes responsibility configuring machine user group policy winlogon also checks copy windows legitimate license windows xp later versions winlogon following responsibilities
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 7207, 1577, 10281, 2101, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 93, 3170, 5225, 622, 9839, 4210, 7796, 1656, 6265, 7290, 5243, 4731, 10879, 884...
Test
3,352
3
Intel_Core_(microarchitecture):intel core microarchitecture intel core microarchitecture previously known next-generation micro-architecture multi-core processor microarchitecture unveiled intel q1 2006 based yonah processor design considered iteration p6 microarchitecture introduced 1995 pentium pro high power consumption heat intensity resulting inability effectively increase clock speed shortcomings inefficient pipeline primary reasons intel abandoned netburst microarchitecture switched completely different architectural design delivering high efficiency small pipeline rather high clock speeds core microarchitecture never reached clock speeds netburst microarchitecture even moving 45 nm lithography however many generations successor microarchitectures developed core basis nehalem sandy bridge intel managed surpass clock speeds netburst using devil canyon improved version haswell microarchitecture reached base frequency 4 ghz maximum tested frequency 4.4 ghz using 22 nm lithography ultimately derives p6 microarchitecture core microarchitecture many succeeding improvements first processors used architecture code-named 'merom 'conroe 'woodcrest merom mobile computing conroe desktop systems woodcrest servers workstations architecturally identical three processor lines differ socket used bus speed power consumption mainstream core-based processors branded pentium dual-core pentium low end branded celeron server workstation core-based processors branded xeon intel first 64-bit desktop mobile core-based processors branded core 2 core microarchitecture returned lower clock rates improved usage available clock cycles power compared preceding netburst microarchitecture pentium 4/d-branded cpus core microarchitecture provides efficient decoding stages execution units caches buses reducing power consumption core 2-branded cpus increasing processing capacity intel cpus varied widely power consumption according clock rate architecture semiconductor process shown cpu power dissipation tables like last netburst cpus core based processors feature multiple cores hardware virtualization support marketed intel vt-x well intel 64 ssse3 however core-based processors hyper-threading technology found pentium 4 processors core microarchitecture descendant p6 microarchitecture used pentium pro pentium ii pentium iii pentium m. l1 cache size enlarged core microarchitecture 32 kb pentium ii iii 16 kb l1 data 16 kb l1 instruction 64 kb l1 cache/core 32 kb l1 data 32 kb l1 instruction pentium core/core 2 consumer version also lacks l3 cache found gallatin core pentium 4 extreme edition though exclusively present high-end versions core-based xeons l3 cache hyper-threading reintroduced consumer line nehalem microarchitecture core microarchitecture major architectural revision based part pentium processor family designed intel israel penryn pipeline 12–14 stages long — less half prescott signature feature wide order execution cores penryn successor nehalem borrowed heavily pentium 4 20-24 pipeline stages core execution unit 4 issues wide compared 3-issue cores p6 pentium 2-issue cores netburst microarchitectures new architecture dual core design linked l1 cache shared l2 cache engineered maximum performance per watt improved scalability one new technology included design macro-ops fusion combines two x86 instructions single micro-operation example common code sequence like compare followed conditional jump would become single micro-op unfortunately technology work 64-bit mode new technologies include 1 cycle throughput 2 cycles previously 128-bit sse instructions new power saving design components run minimum speed ramping speed dynamically needed similar amd cool n'quiet power-saving technology well intel speedstep technology earlier mobile processors allows chip produce less heat consume little power possible woodcrest cpus front side bus fsb runs 1333 mt/s however scaled 1066 mt/s lower end 1.60 1.86 ghz variants merom mobile variant initially targeted run fsb 667 mt/s second wave meroms supporting 800 mt/s fsb released part santa rosa platform different socket may 2007 desktop-oriented conroe began models fsb 800 mt/s 1066 mt/s 1333 mt/s line officially launched july 22 2007 power consumption new processors extremely low—average use energy consumption 1–2 watt range ultra low voltage variants thermal design powers tdps 65 watts conroe woodcrests 80 watts 3.0 ghz woodcrest 40 watts low-voltage woodcrest comparison amd opteron 875he processor consumes 55 watts energy efficient socket am2 line fits 35 watt thermal envelope specified different way directly comparable merom mobile variant listed 35 watts tdp standard versions 5 watts tdp ultra low voltage ulv versions previously intel announced would focus power efficiency rather raw performance however idf spring 2006 intel advertised promised numbers processors core microarchitecture categorized number cores cache size socket combination unique code name product code used across number brands instance code name allendale product code 80557 two cores 2 mb l2 cache uses desktop socket 775 marketed celeron pentium core 2 xeon different sets features enabled mobile desktop processors come two variants differ size l2 cache specific amount l2 cache product also reduced disabling parts production time wolfdale-dp quad-core processors except dunnington qc multi-chip modules combining two dies 65 nm processors product code shared processors different dies specific information one used derived stepping original core 2 processors based around dies identified cpuid family 6 model 15 depending configuration packaging code names conroe lga 775 4 mb l2 cache allendale lga 775 2 mb l2 cache merom socket 4 mb l2 cache kentsfield multi-chip module lga 775 2x4mb l2 cache merom allendale processors limited features found pentium dual core celeron processors conroe allendale kentsfield also sold xeon processors additional code names processors based model woodcrest lga 771 4 mb l2 cache clovertown mcm lga 771 2×4mb l2 cache tigerton mcm socket 604 2×4mb l2 cache marketed xeon brand conroe-l merom-l processors based around core conroe merom contain single core 1 mb l2 cache significantly reducing production cost power consumption processor expense performance compared dual-core version used ultra-low voltage core 2 solo u2xxx celeron processors identified cpuid family 6 model 22 intel tick-tock cycle 2007/2008 tick shrink core microarchitecture 45 nanometers cpuid model 23 core 2 processors used code names penryn socket p wolfdale lga 775 yorkfield mcm lga 775 also sold celeron pentium xeon processors xeon brand wolfdale-dp harpertown code names used lga 771 based mcms two four active wolfdale cores architecturally 45nm core 2 processors feature sse4.1 new divide/shuffle engine chips come two sizes 6 mb 3 mb l2 cache smaller version commonly called penryn-3m wolfdale-3m well yorkfield-6m respectively single-core version penryn listed penryn-l separate model like merom-l version penryn-3m model one active core xeon dunnington processor cpuid family 6 model 29 closely related wolfdale comes six cores on-chip l3 cache designed servers socket 604 marketed xeon core 2 core microarchitecture uses number steppings unlike previous microarchitectures represent incremental improvements also different sets features like cache size low power modes steppings used across brands typically disabling features limiting clock frequencies low-end chips steppings reduced cache size use separate naming scheme means releases longer alphabetic order additional steppings used internal engineering samples listed tables many high-end core 2 xeon processors use multi-chip modules two three chips order get larger cache sizes two cores early es/qs steppings b0 cpuid 6f4h b1 6f5h e0 6f9h steppings b2/b3 e1 g0 model 15 cpuid 06fx processors evolutionary steps standard merom/conroe die 4 mib l2 cache short-lived e1 stepping used mobile processors stepping l2 m0 allendale chips 2 mib l2 cache reducing production cost power consumption low-end processors g0 m0 steppings improve idle power consumption c1e state add c2e state desktop processors mobile processors support c1 c4 idle states steppings e1 g0 m0 add support mobile intel 965 express santa rosa platform socket p earlier b2 l2 steppings appear socket based mobile intel 945 express napa refresh platform model 22 stepping a1 cpuid 10661h marks significant design change single core 1 mib l2 cache reducing power consumption manufacturing cost low-end like earlier steppings a1 used mobile intel 965 express platform steppings g0 m0 a1 mostly replaced older steppings 2008 2009 new stepping g2 introduced replace original stepping b2 model 23 cpuid 01067xh intel started marketing stepping full 6 mib reduced 3 mib l2 cache time giving identical cpuid values steppings new sse4.1 instructions stepping c1/m1 bug fix version c0/m0 specifically quad core processors used stepping e0/r0 adds two new instructions xsave/xrstor replaces earlier steppings mobile processors stepping c0/m0 used intel mobile 965 express santa rosa refresh platform whereas stepping e0/r0 supports later intel mobile 4 express montevina platform model 30 stepping a1 cpuid 106d1h adds l3 cache well six instead usual two cores leads unusually large die size 503 mm² february 2008 found way high-end xeon 7400 series dunnington conroe conroe xe allendale use socket lga 775 however every motherboard compatible processors supporting chipsets yorkfield xe model qx9770 45 nm 1600 mt/s fsb limited chipset compatibility x38 p35 overclocking high-performance x48 p45 motherboards compatible bios updates gradually released provide support penryn technology qx9775 compatible intel d5400xs motherboard wolfdale-3m model e7200 also limited compatibility least xpress 200 chipset incompatible although motherboard may required chipset support conroe motherboards based above-mentioned chipsets support conroe conroe-based processors require new power delivery feature set specified voltage regulator-down vrd 11.0 requirement result conroe significantly lower power consumption compared pentium 4/d cpus replaced motherboard supporting chipset vrd 11 supports conroe processors even boards need updated bios recognize conroe fid frequency id vid voltage id unlike previous pentium 4 pentium design core 2 technology sees greater benefit memory running synchronously front side bus fsb means conroe cpus fsb 1066 mt/s ideal memory performance ddr2 pc2-8500 configurations using pc2-5300 instead pc2-4200 actually decrease performance going pc2-6400 significant performance increase ddr2 memory models tighter timing specifications improve performance difference real world games applications often negligible optimally memory bandwidth afforded match bandwidth fsb say cpu 533 mt/s rated bus speed paired ram matching rated speed example ddr2 533 pc2-4200 common myth installing interleaved ram offer double bandwidth however increase bandwidth installing interleaved ram roughly 5–10 agtl+ psb used netburst processors well current medium-term pre-quickpath core 2 processors provide 64-bit data path current chipsets provide couple either ddr2 ddr3 channels jobs requiring large amounts memory access quad-core core 2 processors benefit significantly using pc2-8500 memory runs exactly speed cpu fsb officially supported configuration number motherboards support core 2 processor require use ddr2 intel 975x p965 chipsets require memory motherboards chipsets support core 2 processors ddr memory using ddr memory performance may reduced lower available memory bandwidth core 2 memory management unit mmu x6800 e6000 e4000 processors operate previous specifications implemented previous generations x86 hardware may cause problems many serious security stability issues existing operating system software intel documentation states programming manuals updated coming months information recommended methods managing translation lookaside buffer tlb core 2 avoid issues admits rare instances improper tlb invalidation may result unpredictable system behavior hangs incorrect data among issues stated intel errata ax39 ax43 ax65 ax79 ax90 ax99 said particularly serious 39 43 79 cause unpredictable behavior system hang fixed recent steppings among stated errata particularly serious openbsd theo de raadt dragonfly bsd matthew dillon taking contrasting view linus torvalds calling tlb issue totally insignificant adding biggest problem intel documented tlb behavior better microsoft issued update kb936357 address errata microcode update performance penalty bios updates also available fix issue
[ 7173, 4108, 9741, 5649, 6175, 2088, 2604, 6192, 7218, 2638, 1119, 3175, 4204, 8820, 630, 4217, 8325, 7313, 8851, 6804, 9391, 4276, 2237, 5309, 6339, 6352, 5844, 5356, 4334, 5871, 1776, 3317, 5883, 5380, 5386, 6924, 6926, 4886, 3352, 3882,...
None
3,353
4
Tripwire_(company):tripwire company tripwire inc. software company based portland oregon develops markets sells information technology security compliance automation graduate student purdue university gene kim tripwire co-founder former chief technology officer along professor gene spafford created initial version software 1992 academic source release pioneered many techniques used intrusion detection received widespread support among corporate education government security professionals 1997 gene kim co-founded tripwire inc rights tripwire name technology attained commercial version product tripwire servers released soon thereafter 2000 tripwire contributed source code functionally equivalent academic source release open source community enable open source tripwire 2005 tripwire released first version tripwire enterprise company flagship product designed help organizations configuration control detecting assessing reporting remediating file configuration changes january 2010 tripwire announced release tripwire log center log security information event management siem software stores correlates reports log security event data two products integrated enable correlation change event data august 21 2009 tripwire acquired activeworx technologies crosstec corporation includes log center security center event management snort management center revenues grew 74 million 2009 october 2009 company 261 employees number grew 336 june 2010 may–june 2010 company 5,500 customers announced filed registration statement securities exchange commission proposed initial public offering common stock year later company announced sale private equity firm thoma bravo llc ending 86 million ipo plans ceo jim johnson cited firm failure reach 100 million revenue milestone 2010 well changing ipo market expectations reasons going ipo day following acquisition company laid 50 350 employees johnson expects company eventually go public though unlikely happen 2015 acquisition ncircle 2013 tripwire added asset discovery vulnerability management portfolio tripwire ip360™ enables organizations identify system vulnerabilities advanced intelligence prioritizes critical issues fix december 2014 belden inc announced plans buy tripwire 710 million acquisition completed january 2 2015
[ 6372, 3112, 2538, 687, 9049 ]
Test
3,354
4
InfraGard:infragard infragard non-profit organization serving public-private partnership u.s. businesses federal bureau investigation organization information sharing analysis effort serving interests combining knowledge base wide range private sector government members infragard association individuals facilitates information sharing intelligence businesses academic institutions state local law enforcement agencies participants dedicated prevent hostile acts united states infragard mutual nondisclosure agreements among members individuals fbi promotes trusted discussions vulnerabilities solutions companies individuals may hesitant place public domain provide access additional threat information fbi infragard began cleveland ohio field office 1996 since expanded become national-level program infragard coordinators every fbi field office originally local effort gain support information technology industry academia fbi investigative efforts cyber arena since expanded much wider range activities surrounding nation critical infrastructure program expanded fbi field offices 1998 fbi assigned national program responsibility infragard former national infrastructure protection center nipc directed radm james b. plehal fbi cyber division 2003 since 2003 infragard alliances fbi said developed trust-based public-private sector partnership ensure reliability integrity information exchanged various terrorism intelligence criminal security matters supports fbi priorities areas counterterrorism foreign counterintelligence cybercrime infragard focused protecting 16 critical infrastructures outlined presidential directive 21 critical infrastructure security resilience sharing threat information assisting fbi finding prosecuting attack critical infrastructure physical cyber means provide training active shooter scenarios cyber defense threats nation organization committed providing tools resources needed operate nation critical infrastructure protect enterprises maintain services necessary safe prosperous nation infragard chapters also participate assure critical infrastructure owners operators—estimated 85 private sector—are engaged represented local regional planning efforts working 16 critical infrastructure sectors organization provides resources information prevention also building resilience response capabilities infragard chapters around nation also provide cyber physical security training sessions focus latest threats identified fbi sessions include threat briefings technical sessions cyber physical attack vectors response training resources help cisos csos protect enterprise infragard approaches threats critical infrastructure tactical strategic level addressing needs front lines security well decision makers tasked assessing enterprise vulnerabilities allocating resources protect information sharing organization government criticized protecting civil liberties concerned membership would surrogate eyes ears fbi group also subject hacking attacks intended embarrass fbi local chapters regularly meet discuss latest threats listen talks subject matter experts security issues membership open u.s. citizens cost july 2012 organization reported membership 54,677 including fbi infragard focuses development management protection critical infrastructure infragard nationwide focus group reviews threats could disrupt critical infrastructure nationwide month named electromagnetic pulse special interest group emp sig all-hazards approach looks manmade natural electromagnetic pulse emp cyber attack coordinated physical attack pandemics insider threats mitigating actions could minimize threats mitigation strategies include hardening prevention strategies addition development local infrastructure could make local communities robust sustainable see emp sig press release guidance document see also website association universities involved public policy policy studies organization produces technology policy conference called dupont summit infragard national emp sig brought public private sector leaders discuss emerging threat issues http //www.ipsonet.org/conferences/the-dupont-summit/dupont-summit-2012/infragard-emp-sig partnerships government agencies private organizations critics concerned civil liberties american civil liberties union aclu warned evidence infragard may closer corporate tips program turning private-sector corporations — may position observe activities millions individual customers — surrogate eyes ears fbi concluding program institutionalizes close secretive ties organizations raises serious questions scope activities future others describing infragard state architecture internet—and many possible methods attack— requires governments corporations private parties work together protect network security head threats occur responding aclu criticism chairwoman kathleen kiernan infragard national members alliance inma denies infragard anything beneficial americans stating elitist group way shape form says 're trying protect everybody u.s. citizen planet eligible apply infragard 2011 lulzsec claimed responsibility attacking chapter websites managed local members connecticut atlanta order embarrass fbi simple hacks group leaked infragard member e-mails database local users group defaced website posting following message let flow stupid fbi battleships accompanied video lulzsec posted following message regarding attack
[ 7600, 4945, 4625, 10935, 4956, 2558 ]
Train
3,355
7
Dropbox_Carousel:dropbox carousel dropbox carousel photo video management app offered dropbox third-party native app available android ios allowed users store manage organize photos photos organized date time event backed dropbox competed space online photo storage services google google photos apple icloud yahoo flickr chris lee dropbox head product development carousel described app add-on dropbox “ dedicated experience photos videos ” space “ reliving personal memories ” mailbox founder gentry underwood unveiled carousel gathering san francisco april 9 2014 much features carousel come snapjoy photo start-up dropbox acquired december 19 2012 carousel launched marked amongst many others series acquisitions made dropbox prep opening stock public offering acquisitions would help demonstrate expansive product offerings pitching potential profitability investors december 2015 dropbox announced carousel would shut carousel features would integrated primary dropbox application march 31 2016 carousel deactivated carousel prompted users free local storage synced backed-up local photos cloud flashback feature enabled default showed past photos videos taken day year years back flashback used algorithm designed identify human faces resulting greater likelihood user picture people user close circle appearing scrollable timeline earlier scroll wheel bottom let user scroll photo specific date finger swipe
[ 236, 7983, 4623 ]
None
3,356
4
Maureen_Baginski:maureen baginski maureen a. baginski former signals intelligence sigint director national security agency nsa executive assistant director intelligence federal bureau investigation fbi beginning intelligence career baginski graduated ba slavic languages linguistics university albany also received honorary doctorate humane letters 2005 service nation baginski began career intelligence 1979 russian language instructor nsa cold war held various positions nearly quarter-century nsa including lead analyst soviet union assistant deputy director technology systems chief officer director executive assistant director nsa/central security service senior operations officer national security operations center sigint director nsa third highest position baginski sigint director september 11 2001 critical nsa response terrorist attacks also directing extended sigint enterprise order acquire produce disseminate foreign sigint variety government military customers documentary film “ good american ” then-senior nsa executive thomas drake quotes baginski saying “ 9/11 gift nsa ’ gon na get money need ” immediate aftermath 9/11 retired nsa analyst bill binney star film describes baginski ’ reaction “ sickening. ” 2003 baginski left position nsa become executive assistant director intelligence fbi executive assistant director intelligence fbi 2003-2005 baginski successfully led bureau first-ever intelligence program charge adapting fbi intelligence capabilities information technologies created intelligence-sharing platform helped identify stop terror plots head intelligence fbi baginski helped develop intelligence career service intelligence professionals would able advance careers fbi many high-ranking government officials including president george w. bush fbi director mueller acknowledged applauded baginski significant changes fbi improved capabilities safeguard united states america upon retirement fbi director mueller asked baginski remain senior advisor fbi position accepted since retiring fbi baginski held multiple positions within private sector board member bearingpoint inc. argon st si international inc. baginski also president national security systems sparta inc. chief executive officer national security partners llc chairwoman emeriti afcea throughout distinguished career public sector baginski received several awards including two presidential rank awards two director central intelligence national achievement medals director military intelligence ’ leadership award nsa ’ exceptional civilian service award fbi intelligence analysts association award
[ 9900 ]
Validation
3,357
3
Compaq_Presario_3000:compaq presario 3000 compaq presario 3000 series line notebook computers produced 2000 2001 compaq noted intel processors desktop-like feature list heat heavy weight 16-inch lcd screens 3000 series sported intel chipset pentium 4 chips came variety speeds ranging 2.0 ghz 2.67 ghz however performance varied slightly models noted r3000 model appeared amd processor source model list compaq site notebook computers product range came hitachi hard disk drive teac optical media drive also came on-board altec lansing stereo speakers synaptics touchpads systems preinstalled windows xp though also designed run windows vista supplied quick restore disc returned system factory condition event change ownership wish reinstall os system failure main memory upgradeable via two 200-pin so-dimm slots using ddr pc2100 ddr pc2700 rated modules memory controller addressed maximum 1024 mb 1024 mib ram main memory also memory graphics processing unit sharing memory way reduced usable main memory reported operating system 64 mb compaq presario 3000 notebook pc series 3070us came equipped speaker placed arrow keys tends rust palm hands resting top makes laptop discolored easy repaint part new paint applied clogs holes blocks audio
[ 6765 ]
None
3,358
2
VPS/VM:vps/vm vps/vm virtual processing system/virtual machine operating system ran ibm system/370 – ibm 3090 computers boston university general use 1977 around 1990 limited use least 1993 1980s vps/vm main operating system boston university often ran 250 users time rival vm/cms computing systems could run 120 users user ran virtual machine vm ibm hypervisor operating system vm provided virtual ibm 370 machine vps operating system ran vm code modified allow vps virtual machines share pages storage read write access vps utilized shared nucleus well pages used facilitate passing data one vps virtual machine another organization similar mvs substituting address spaces virtual machines according craig estey worked boston university academic computing center 1974 1977 vps original name racs remote access computing system originally developed mcgill university montreal 1966 onward name got shortened rax running least 1973 bu probably earlier although period joint development 1972 mcgill bu started diverge mcgill rebranded version rax music/sp time music/sp wiki entry details fair amount applicable bu/rax vps development evolutionary rather revolutionary changes necessary phased time system called rax rebranded vps mostly resulting system good enough effort afoot monetize commercially music/sp remained standalone os bu ibm 370/145 ran ibm vm/370 virtual machine hypervisor rax became client os originally used one vm users rax became hypervisor aware eventually gave rax user vm parent os vm/370 invisible rax user eventually rax control resembled multicore/distributed architecture many virtual machines single shared memory copy rax client work completed renamed vps ibm-based operating system quite like dos/vse time sharing options vps/vm provided user ibm 3270 full screen terminal green screen user interface like vm/cms user 11 megabyte virtual machine strange 3 megabyte memory gap middle 1984 onwards could run several programs time operating system sparsely documented written first charles brown bu doctoral student john h. porter physics phd later became head vps project marian moore wrote much later vm code necessary run vps system josie bondoc wrote later vps additions like unix piping many mvs/vm programs ran vps/vm xedit compilers pascal pl/1 c cobol mvs/vm programs ran os simulation program simulated os/vm supervisor calls svcs margorie orr supervised os simulation program development maintenance programmers wrote parts os simulation package maintained margorie orr timothy greiser daniel levbre john coldwell lotz paul cheffers michael krugman wrote early main utilities ifmsg jcl language vps also mail early email program sendmail written francis costanzo implemented email bitnet system pre sql databases installed vps focus nomad2 michael gettes wrote early quick help system file system hierarchical originally file unique 8 character filename eventually grew onerous user given private directory tapes ibm disk files supported well native vps text files simple shell patterns supported except paw computer program written paul cheffers graphics department glenn bresnahan essentially ported unix utilities mid 1980s william marshall much early system documentation well providing pl/1 support joe dempty user services director diana robanske statistics consultant ran student assistance services 1980-1985 john houlihan also user services statistics consultant vps/vm working pre-gui ibm operating system could often run users ibm tso-based systems university-based systems provided editors compilers vps provided services 10,000 bu university community 10 years vps/vm policy operating system main utilities written ibm 370 assembler language decision restricted development system ultimately could compete unix-based systems eventually replaced however vps eventually modeled many features then-current operating systems around world keen trainer many companies needed ibm370 assembler programmers 1980s
[ 6529, 2179, 421, 8524, 7053, 5678, 7983, 5463, 5562, 284, 2045 ]
None
3,359
2
BOS/360:bos/360 bos/360 basic operating system/360 early ibm system/360 operating system bos one four system/360 operating system versions developed ibm general products division gpd endicott new york fill gap low end system/360 line became apparent os/360 able run smallest systems bps basic programming support designed run systems minimum 8,192 bytes memory disk bos intended disk systems least 8,192 bytes one 2311 disk drive dos tos developed systems least 16,384 bytes either disks tape drives bos released october 1965 nearly two years os/360 thus bos disk based operating system available launch machine marketed disk based bos consisted following components ibm 1070 process communication supervisor dedicated process control system ran extension bos
[ 2179, 4996, 6148, 10883, 10508, 7053, 8077, 9361, 6675, 9468, 789, 5397, 9619, 11673, 9370, 6557, 10273, 421, 7848, 6442, 1323, 7983, 5936, 7217, 8879, 9139, 10803, 6325, 7477, 7733, 10040, 5562, 573, 1219, 964, 8388, 6342, 3148, 1235, 75...
None
3,360
4
Biba_Model:biba model biba model biba integrity model developed kenneth j. biba 1975 formal state transition system computer security policy describes set access control rules designed ensure data integrity data subjects grouped ordered levels integrity model designed subjects may corrupt data level ranked higher subject corrupted data lower level subject general model developed address integrity core principle direct inverse bell–lapadula model general preservation data integrity three goals security model directed toward data integrity rather confidentiality characterized phrase read write contrast bell-lapadula model characterized phrase read write biba model users create content integrity level monk may write prayer book read commoners one read high priest conversely users view content integrity level monk may read book written high priest may read pamphlet written lowly commoner another analogy consider military chain command general may write orders colonel issue orders major fashion general original orders kept intact mission military protected thus read integrity conversely private never issue orders sergeant may never issue orders lieutenant also protecting integrity mission write biba model defines set security rules first two similar bell–lapadula model first two rules reverse bell–lapadula rules
[ 1225, 4299, 8302, 3440, 2737, 4912, 10034, 10580, 11184, 8150, 823, 10968, 10170, 2558 ]
Test
3,361
4
Brian_Snow:brian snow brian snow born september 5 1943 served u.s. national security agency 1971 2006 including six-year term technical director information assurance directorate iad defensive arm nsa charged protecting u.s. information security time research management positions nsa played key role promoting open collaborative relationship agency broader community security professionals early career snow mathematics professor ohio university helped develop college computer science department 1971 started working nsa 1970s 1980s designed cryptographic components secure systems several cryptographic systems employed u.s. government military used algorithms purposes nuclear command control tactical voice communications network security technical person high managerial responsibilities neal koblitz alfred menezes written snow strong supporter transition rsa elliptic curve cryptography ecc public key cryptographic technology cybersecurity policy expert susan landau attributes nsa harmonious collaboration industry academia selection advanced encryption standard aes 2000 — agency support choice strong encryption algorithm designed europeans rather americans — part snow represented nsa cochairman technical working group aes competition terrorist attacks 11 september 2001 nsa believed public support dramatic expansion surveillance activities according koblitz menezes period nsa trusted partner academia industry development cryptographic standards came end part change nsa post-september 11 era snow replaced technical director could longer effectively oppose proposed actions offensive arm nsa snow last years nsa retirement 2006 along clinton brooks led group drew draft ethics code intelligence officers since retiring nsa snow worked security ethics consultant member u.s. national academy sciences committee future research goals directions foundational science cybersecurity 2019 brian snow inducted national cyber security hall fame
[ 7107, 7887 ]
Train
3,362
5
Glftpd:glftpd glftpd freely available ftp server runs unix linux bsd operating systems number features like logins restricted particular set ip addresses transfer quotas per-user per-group basis user/groups stored system files make attractive private warez servers including topsites legitimate uses though—a number web development books recommend amongst general purpose ftp servers linux certification exams sair required knowledge integrate eggdrop irc channels glftpd stands greyline file transfer protocol daemon named initial developer greyline first public release glftpd dates back beginning 1998. glftpd well known detailed user permissions extensive scripting features securely efficiently transferring files sites using fxp support glftpd available irc efnet glftpd glhelp
[ 7364, 5612, 2797, 7983, 5492, 3030, 823, 5435, 2045 ]
Test
3,363
9
SrcML:srcml srcml source l document-oriented xml representation source code created collaborative effort michael l. collard jonathan i. maletic abbreviation srcml short source markup language srcml wraps source code text information abstract syntax tree ast tags single xml document original text preserved original source code document recreated srcml markup exception possibility newline normalization purpose srcml provide full access source code lexical documentary structural syntactic levels format also provides easy support fact-extraction transformation supported srcml toolkit maintained srcml website shown perform scalable lightweight fact-extraction transformation srcml toolkit consists command-line program called srcml translates source code srcml provided code file command line translates srcml source code srcml archive provided command line program also supports direct queries transformations srcml archives using tools like xpath xslt relaxng srcml toolkit actively maintained currently support c c++ c java srcml format consists text original source code file plus xml tags specifically text wrapped srcml elements indicate syntactic structure code short explicitly identifies syntactic structures code tags used srcml listed along category fall within srcml uses xml namespaces list prefix used denote namespace namespaces note srcml archive entire project contained within single root unit element individual file contained unit element within root unit element following shows srcml used single files following example converts c++ file main.cpp srcml file main.cpp.xml following command extract source code file main.cpp.xml place c++ file main.cpp following shows src2srcml srcml2src used entire project following example converts project 'project srcml file project.xml following command extract source code files file project.xml place directory project srcml allows use current xml apis tools write transformations also allows use xslt directly using argument—xslt= name .xls srcml2src command using srcml markup xslt allows user apply program transformations xml-like structure srcml obtain transformed xml written back source code representation using srcml2src tool application srcml program transformation explained detail collard et al following command run xslt program program.xsl srcml archive project.xml simplest form fact extraction using srcml leverages xpath order address parts srcml document pull information various entities characteristics source code course limited standard xml api may used application srcml fact extraction explained detail kagdi et al cpp directive cpp file cpp include cpp define cpp undef cpp line cpp cpp ifdef cpp ifndef cpp else cpp elif cpp endif cpp cpp pragma cpp errorliteral operator modifier example create srcml archive entire software project following command runs xpath path srcml archive project.xml work done providing convenient extension functions srcml brings lot advantages difference analysis source code one advantages ability query differences specific sections codebase well across versions codebase application srcml difference analysis explained detail maletic et al example srcml used xpath expression could used find classes source document //src class another example might finding comments within functions /src function//src comment due fact srcml based xml xml tools used srcml provides rich functionality
[ 10474, 4980 ]
Test
3,364
5
Isochronous_media_access_controller:isochronous media access controller isochronous media access controller i-mac media access control whereby data must transferred isochronously—in words data must transmitted steady rate without interruption
[ 3847 ]
Validation
3,365
7
Contact_Telecom:contact telecom contact telecom telecommunications services company develops data processing software services telecommunications industry established 1998 based manchester new hampshire contact telecom offers carriers service providers telecommunication companies internet service providers wireless voice ip competitive local exchange carriers incumbent local exchange carriers cable companies cloud computing providers way manage invoice usage data cost management revenue assurance customer care initiatives flagship service billing data analyzer bda automates data processing drive company overall profitability models
[ 4194 ]
Validation
3,366
4
Backup:backup information technology backup data backup copy computer data taken stored elsewhere may used restore original data loss event verb form referring process back whereas noun adjective form backup backups used recover data loss data deletion corruption recover data earlier time backups provide simple form disaster recovery however backup systems able reconstitute computer system complex configuration computer cluster active directory server database server backup system contains least one copy data considered worth saving data storage requirements large information repository model may used provide structure storage different types data storage devices used copying backups data already secondary storage onto archive files. ref group note name=archivefilemaynotcontainold/historicalmaterial contrast everyday use term archive data stored archive file necessarily old historical interest. /ref also different ways devices arranged provide geographic dispersion data security portability data selected extracted manipulated storage process include methods dealing live data including open files well compression encryption de-duplication additional techniques apply enterprise client-server backup backup schemes may include dry runs validate reliability data backed limitations human factors involved backup scheme backup strategy requires information repository secondary storage space data aggregates backups data sources repository could simple list backup media dvds etc dates produced could include computerized index catalog relational database backup data needs stored requiring backup rotation scheme system backing data computer media limits number backups different dates retained separately appropriate re-use data storage media overwriting backups longer needed scheme determines piece removable storage used backup operation long retained backup data stored unstructured repository may simply stack tapes dvd-rs external hdds minimal information backed method easiest implement unlikely achieve high level recoverability lacks automation repository using backup method contains complete source data copies taken one specific points time copying system images method frequently used computer technicians record known good configurations however imaging generally useful way deploying standard configuration many systems rather tool making ongoing backups diverse systems incremental backup stores data changed since reference point time duplicate copies unchanged data n't copied typically full backup files infrequent intervals serving reference point incremental repository subsequently number incremental backups made successive time periods restores begin last full backup apply incrementals backup systems create series incrementals thus providing equivalent frequently full backup done modify single archive file speeds restores recent versions files true continuous data protection cdp refers backup instantly saves copy every change made data allows restoration data point time comprehensive advanced data protection near-cdp backup applications frequently marketed cdp automatically take incremental backups specific intervals example every 15 minutes one hour 24 hours therefore allow restores fixed interval near-cdp backup applications use journaling typically based periodic snapshots read-only copy data frozen particular point time near-cdp except apple time machine intent-logs every change host system often saving byte block-level differences rather file-level differences backup method differs simple disk mirroring enables roll-back log thus restoration old images data intent-logging allows precautions consistency live data protecting self-consistent files requiring applications quiesced made ready backup near-cdp practicable ordinary personal backup applications opposed cdp must run conjunction virtual machine equivalent therefore generally used enterprise client-server backups reverse incremental backup method stores recent archive file mirror source data series differences mirror current state previous states reverse incremental backup method starts non-image full backup full backup performed system periodically synchronizes full backup live copy storing data necessary reconstruct older versions either done using hard links—as apple time machine using binary diffs differential backup saves data changed since last full backup means maximum two backups repository used restore data however time last full backup thus accumulated changes data increases time perform differential backup restoring entire system requires starting recent full backup applying last differential backup differential backup copies files created changed since last full backup regardless whether differential backups made since whereas incremental backup copies files created changed since recent backup type full incremental variations incremental backup include multi-level incrementals block-level incrementals compare parts files instead entire files regardless repository model used data copied onto archive file data storage medium medium used also referred type backup destination magnetic tape long time commonly used medium bulk data storage backup archiving interchange previously less expensive option longer case smaller amounts data tape sequential access medium rate continuously writing reading data fast many tape formats proprietary specific certain markets like mainframes particular brand personal computer 2014 lto become primary tape technology remaining viable super formats ibm 3592 also referred ts11xx series oracle storagetek t10000 use hard disk storage increased time become progressively cheaper hard disks usually easy use widely available accessed quickly however hard disk backups close-tolerance mechanical devices may easily damaged tapes especially transported mid-2000s several drive manufacturers began produce portable drives employing ramp loading accelerometer technology sometimes termed shock sensor 2010 industry average drop tests drives technology showed drives remaining intact working 36-inch non-operating drop onto industrial carpeting manufacturers also offer 'ruggedized portable hard drives include shock-absorbing case around hard disk claim range higher drop specifications period years stability hard disk backups shorter tape backups external hard disks connected via local interfaces like scsi usb firewire esata via longer-distance technologies like ethernet iscsi fibre channel disk-based backup systems via virtual tape libraries otherwise support data deduplication reduce amount disk storage capacity consumed daily weekly backup data optical storage uses lasers store retrieve data recordable cds dvds blu-ray discs commonly used personal computers generally cheap past capacities speeds discs lower hard disks tapes although advances optical media slowly shrinking gap many optical disc formats worm type makes useful archival purposes since data changed optical storage systems allow cataloged data backups without human contact discs allowing longer data integrity french study 2008 indicated lifespan typically-sold cd-rs 2–10 years one manufacturer later estimated longevity cd-rs gold-sputtered layer high 100 years sony optical disc archive 2016 reach read rate 250mb/s solid-state drives ssds use integrated circuit assemblies store data flash memory thumb drives usb flash drives compactflash smartmedia memory sticks secure digital card devices relatively expensive low capacity convenient backing relatively low data volumes solid-state drive contain movable parts making less susceptible physical damage huge throughput around 500 mbit/s 6 gbit/s available ssds become capacious cheaper flash memory backups stable fewer years hard disk backups remote backup services cloud backups involve service providers storing data offsite used protect events fires floods earthquakes could destroy locally stored backups cloud-based backup provides layer data protection however users must trust provider maintain privacy integrity data confidentiality enhanced use encryption speed availability limited user online connection users large amounts data may need use cloud seeding large-scale recovery various methods used manage backup media striking balance accessibility security cost media management methods mutually exclusive frequently combined meet user needs using on-line disks staging data sent near-line tape library common example online backup storage typically accessible type data storage begin restore milliseconds internal hard disk disk array maybe connected san example online backup type storage convenient speedy vulnerable deleted overwritten either accident malevolent action wake data-deleting virus payload nearline storage typically less accessible less expensive online storage still useful backup data storage mechanical device usually used move media units storage drive data read written generally safety properties similar on-line storage example tape library restore times ranging seconds minutes off-line storage requires direct action provide access storage media example inserting tape tape drive plugging cable data accessible via computer except limited periods written read back largely immune on-line backup failure modes access time varies depending whether media on-site off-site backup media may sent off-site vault protect disaster site-specific problem vault simple system administrator home office sophisticated disaster-hardened temperature-controlled high-security bunker facilities backup media storage data replica off-site also on-line e.g. off-site raid mirror replica fairly limited value backup backup site disaster recovery center used store data enable computer systems networks restored properly configure event disaster organisations heir data recovery centres others contract third-party due high costs backing rarely considered preferred method moving data dr site typical way would remote disk mirroring keeps dr data date possible backup operation starts selecting extracting coherent units data data modern computer systems stored discrete units known files files organized filesystems deciding back given time involves tradeoffs backing much redundant data information repository fill quickly backing insufficient amount data eventually lead loss critical information files actively updated called live present challenge back effective way back live data temporarily quiesce e.g. close files take snapshot resume live operations point snapshot backed normal methods snapshot instantaneous function filesystems presents copy filesystem frozen specific point time often copy-on-write mechanism snapshotting file changed results corrupted file unusable also case across interrelated files may found conventional database applications microsoft exchange server term fuzzy backup used describe backup live data looks like ran correctly represent state data single point time backup options data files quiesced include information stored computer stored files accurately recovering complete system scratch requires keeping track non-file data frequently useful required manipulate data backed optimize backup process manipulations improve backup speed restore speed data security media usage and/or reduced bandwidth requirements out-of-date data automatically deleted personal backup applications—as opposed enterprise client-server backup applications automated data grooming customized—the deletion globally delayed disabled various schemes employed shrink size source data stored uses less storage space compression frequently built-in feature tape drive hardware redundancy due backing similarly configured workstations reduced thus storing one copy technique applied file raw block level potentially large reduction called deduplication occur server data moves backup media sometimes referred source/client side deduplication approach also reduces bandwidth required send backup data target media process also occur target storage device sometimes referred inline back-end deduplication sometimes backups duplicated second set storage media done rearrange archive files optimize restore speed second copy different location different storage medium—as disk-to-disk-to-tape capability enterprise client-server backup high-capacity removable storage media backup tapes present data security risk lost stolen encrypting data media mitigate problem however encryption cpu intensive process slow backup speeds security encrypted backups effective security key management policy many computers backed destination storage devices ability use single storage device several simultaneous backups useful however cramming scheduled backup window via multiplexed backup used tape destinations process rearranging backup sets archive file known refactoring example backup system uses single tape day store incremental backups protected computers restoring one computers could require many tapes refactoring could used consolidate backups single computer onto single tape creating synthetic full backup especially useful backup systems incrementals forever style backups sometimes backups copied staging disk copied tape process sometimes referred d2d2t acronym disk disk tape useful problem matching speed final destination device source device frequently faced network-based backup systems also serve centralized location applying data manipulation techniques
[ 5120, 2051, 6149, 7685, 1551, 7189, 535, 1560, 1049, 4637, 9762, 7715, 6692, 10276, 5158, 3629, 2095, 8239, 1594, 7739, 8254, 10302, 7238, 9286, 4170, 9802, 7761, 3676, 5728, 2658, 9314, 11366, 3692, 9332, 9335, 7804, 10876, 9343, 7297, 6...
Test
3,367
4
Off-by-one_error:off-by-one error off-by-one error oboe also commonly known obob off-by-one bug ob1 error logic error involving discrete equivalent boundary condition often occurs computer programming iterative loop iterates one time many problem could arise programmer makes mistakes using less equal less used comparison fails take account sequence starts zero rather one array indices many languages also occur mathematical context consider array items items n inclusive processed many items intuitive answer may n − one exhibiting fencepost error correct answer n – 1 reason ranges computing often represented half-open intervals range n inclusive represented range inclusive n 1 exclusive avoid fencepost errors example loop iterates five times 0 4 inclusive written half-open interval 0 5 loop body executed first index equal 0 becomes 1 2 3 finally 4 successive iterations point index becomes 5 index 5 false loop ends however comparison used less equal loop would carried six times index takes values 0 1 2 3 4 5 likewise index initialized 1 rather 0 would four iterations index takes values 1 2 3 4 alternatives cause off-by-one errors another error occur do-while loop used place loop vice versa do-while loop guaranteed run least array-related confusion may also result differences programming languages numbering 0 common languages start array numbering 1 pascal arrays user-defined indices makes possible model array indices problem domain fencepost error occasionally called telegraph pole lamp-post picket fence error specific type off-by-one error early description error appears works vitruvius following problem illustrates error naive answer 10 wrong fence 10 sections 11 posts reverse error occurs number posts known number sections assumed actual number sections one less number posts generally problem stated follows correct answer may line posts open-ended n form loop posts occur end fence instance fence runs two walls precise problem definition must carefully considered setup one situation may give wrong answer situations fencepost errors come counting things rather spaces vice versa neglecting consider whether one count one ends row fencepost errors also occur units length example time pyramid consisting 120 blocks placed 10-year intervals blocks scheduled take 1,190 years build 1,200 installation first block last block one earliest fencepost errors involved time julian calendar originally calculated leap years incorrectly due counting inclusively rather exclusively yielding leap year every three years rather every four fencepost error rare occasions refer error induced unexpected regularities input values instance completely thwart theoretically efficient binary tree hash function implementation error involves difference expected worst case behaviours algorithm larger numbers one often major issue smaller numbers however specific cases accuracy paramount committing off-by-one error disastrous sometimes issue also repeated therefore worsened someone passing incorrect calculation following person makes kind mistake course error might also reversed example error occur computational language matlab codice_1 linear interpolation function whose parameters codice_2 codice_3 programmer misunderstands third parameter number increments might hope codice_4 would achieve sequence instead would get common off-by-one error results security-related bug caused misuse c standard library codice_5 routine common misconception codice_5 guaranteed null termination write beyond maximum length reality write terminating null character one byte beyond maximum length specified following code contains bug off-by-one errors common using c library consistent respect whether one needs subtract 1 byte – functions like codice_7 codice_8 never write past length given codice_7 subtracts 1 retrieves length − 1 bytes whereas others like codice_5 write past length given programmer remember functions need subtract 1 systems little endian architectures particular result overwriting least significant byte frame pointer cause exploitable condition attacker hijack local variables calling routine one approach often helps avoid problems use variants functions calculate much write based total length buffer rather maximum number characters write functions include codice_11 codice_12 often considered safer make easier avoid accidentally writing past end buffer code example calling codice_13 instead would remove bug
[ 9700, 6568, 428, 8524, 815, 4823, 155, 7292, 2717, 7326 ]
None
3,368
6
Fork_(file_system):fork file system computer file system fork set data associated file-system object file systems without forks allow single set data contents file systems forks allow multiple contents every non-empty file must least one fork often default type depending file system file may one associated forks turn may contain primary data integral file metadata unlike extended attributes similar file system feature typically fixed size forks variable size possibly even larger file primary data fork size file sum sizes fork file systems without forks one may instead use multiple separate files associated particularly sidecar files metadata however connection files automatically preserved file system must instead handled program works files another alternative container file stores additional data within given file format archive file allows storing several files metadata within file within single fork requires programs process container file archive file rather file system handling forks alternatives require additional work programs using data benefit portability file systems support forks file system forks associated apple hierarchical file system hfs apple hfs original apple macintosh file system mfs allowed file system object two kinds forks data fork resource fork resource fork designed store non-compiled data would used system graphical user interface gui localizable text strings file icon used finder menus dialog boxes associated application however feature flexible additional uses found splitting word processing document content presentation storing part separate resources compiled software code also stored resource often applications would consist resource fork data fork one hfs+ obscure features file may arbitrary number custom named forks addition traditional data resource forks feature gone largely unused apple never added support mac os 8.1-10.3.9 beginning 10.4 partial implementation made support apple extended inline attributes mac os x v10.4 users running unix command line utilities tar included mac os x would risk data loss utilities updated handle resource forks files v10.4 starting 1985 novell netware file system nwfs successor novell storage services nss designed ground use variety methods store file metadata metadata resides novell directory services nds stored directory structure disk stored novell terms 'multiple data streams file multiple data streams also allow macintosh clients attach use netware servers ntfs file system introduced windows nt 3.1 supports file system forks known alternate data streams ads refs new file system introduced windows server 2012 originally support ads windows 8.1 64-bit server 2012 r2 support ads lengths 128k added refs ads originally intended add compatibility existing operating systems support forks computer program may directed open ads specifying name ads colon sign file path spite support programs including windows explorer dir command windows vista ignore ads windows explorer copies ads warns target file system support calculates main stream size list file folder streams dir command windows vista supports showing ads windows powershell v3.0 later supports manipulating ads windows 2000 uses ads store thumbnails image files store summary information title author file without changing main stream windows xp microsoft realized ads susceptible loss files containing moved ntfs volumes thus windows xp stores main stream whenever file format supports windows vista discontinued support adding summary information altogether microsoft decided sensitive ads handle use ads purposes stop service pack 2 windows xp introduced attachment execution service stores details origin downloaded files ads called zone identifier effort protect users downloaded files may present risk internet explorer windows 8 extended function smartscreen internet explorer also uses ads store favicons internet shortcut files solaris version 9 later allows files forks forks called extended attributes solaris although within usual meaning extended attribute maximum size solaris-type extended attribute maximum size file read written fashion files internally actually stored accessed like normal files ownership permissions differ parent file sub-directories administratively disabled names contain characters extended attributes network file system version 4 similar solaris-style extended attributes file system supports different forks applications aware security risks arise allowing legacy software access data without appropriate shims place primary culprit problems different system utilities disk explorer antivirus software archivers aware different forks following problems arise
[ 5120, 2564, 6669, 3598, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 2095, 7225, 7739, 11323, 576, 8772, 1109, 4708, 9836, 7789, 9333, 6263, 9335, 639, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 938...
Test
3,369
2
Linuxcare:linuxcare linuxcare founded san francisco 1998 dave sifry arthur tyde dave laduke company initial goal 800 number linux operate 24 hours day due dot-com bubble early millennium years version linuxcare morphed levanta eventually closed doors 2008 1999 linuxcare developed linuxcare bootable toolbox also known linuxcare bbc bootable business card bbc live cd bootable linux distribution designed run entirely cd 1999 new concept preceded one linux distribution designed exclusively run cd demolinux demolinux designed show whole desktop experience linux distribution linuxcare bbc designed used mainly utility cd first live cd focus bbc distribution 50mb designed fit mini cd shaped like standard business card included utilities designed assist system administrators primarily text console operating system minimal blackbox x11 ui included linuxcare produced initial launch unversioned release pressed business card cds distributed linuxworld 1999 versions 1.2 1.5 1.6 later released online pressed released conventions linux user groups 1999 2001 may 8 2001 seth schoen announced original three developers linuxcare bootable toolbox left linuxcare fork project new community project named lnx-bbc release 1.6 released may 2001 served transition release linuxcare lnx-bbc projects offering release respective sites lnx-bbc produced three bbc releases 1.618 august 2001 2.0 january 2003 2.1 may 1 2003 early versions assembled hand later versions utilized gar software build system built around gnu automake lnx-bbc discontinued 2.1 release linuxcare brand repurchased arthur tyde incorporated llc dr. scott s. elliott partners state california new company provides services businesses related cloud computing linuxcare llc offices san francisco manila
[ 11648, 8837, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 3903, 4673, 10694, 2375, 4039, 8907, 1110, 6489, 9693, 2914, 4194, 485, 3685, 9064, 4841, 6890, 7913, 7020, 10860, 7534...
Validation
3,370
9
CAR_and_CDR:car cdr computer programming car codice_1 cdr codice_2 primitive operations cons cells non-atomic s-expressions introduced lisp programming language cons cell composed two pointers car operation extracts first pointer cdr operation extracts second thus expression codice_3 evaluates codice_4 codice_5 evaluates codice_6 cons cells used implement singly linked lists rather trees complicated structures car operation returns first element list cdr returns rest list reason operations sometimes given names first rest head tail lisp originally implemented ibm 704 computer late 1950s popular explanation car cdr stand contents address register contents decrement register quite match ibm 704 architecture ibm 704 programmer-accessible address register three address modification registers called index registers ibm 704 successors 36-bit word length 15-bit address space computers two instruction formats one type short 3-bit operation code prefix two 15-bit fields separated 3-bit tag first 15-bit field operand address second held decrement count tag specified one three index registers indexing subtractive process 704 hence value loaded index register called decrement 704 hardware special instructions accessing address decrement fields word result efficient use two fields store within single word two pointers needed list thus car contents address part register term register context refers memory location precursors lisp included functions took machine address argument loaded corresponding word memory extracted appropriate bits 704 assembler macro codice_1 704 assembler macro codice_2 machine word could reassembled cons took four arguments p prefix tag parts dropped early stages lisp design leaving car cdr two-argument cons compositions codice_1 codice_2 given short less pronounceable names form lisp codice_15 equivalent codice_16 value codice_17 similarly codice_18 codice_19 value codice_20 lisps example common lisp scheme systematically define variations two four compositions codice_1 codice_2 many languages particularly functional languages languages influenced functional paradigm use singly linked list basic data structure provide primitives functions similar codice_1 codice_2 named variously codice_25 codice_26 codice_27 codice_28 etc lisp however cons cell used build linked lists also build pair nested pair structures i.e codice_2 cons cell need list case languages provide different primitives typically distinguish pair structures list structures either typefully semantically particularly typed languages lists pairs trees different accessor functions different type signatures haskell example codice_1 codice_2 become codice_32 codice_33 dealing pair type exact analogues codice_1 codice_2 thus rare languages
[ 8352, 9345, 10083, 3876, 4101, 6502, 7805, 3336, 10403, 2062, 372, 11390, 5917, 5598, 4799 ]
None
3,371
2
List_of_macOS_components:list macos components list macos earlier called mac os x components features included current mac operating system automator application developed apple inc. macos implements point-and-click drag drop creation workflows automating repetitive tasks batches quicker alteration thus saving time effort human intervention manually change file separately automator enables repetition tasks across wide variety programs including finder safari calendar contacts others also work third-party applications microsoft office adobe photoshop pixelmator icon features robot holding pipe reference pipelines computer science term connected data workflows automator first released mac os x tiger 10.4 automator provides graphical user interface automating tasks without knowledge programming scripting languages tasks recorded performed user selected list output previous action become input next action automator comes library actions file renaming finding linked images creating new mail message etc act individual steps workflow document workflow document used carry repetitive tasks workflows saved reused unix command line scripts applescripts also invoked actions actions linked together workflow workflow saved application workflow file contextual menu item options set workflow created workflow run workflow file created automator saved /users/ user name /library/services calculator basic calculator application made apple inc. bundled macos three modes basic scientific programmer basic includes number pad buttons adding subtracting multiplying dividing well memory keys scientific mode supports exponents trigonometric functions programmer mode gives user access options related computer programming calculator program long history going back beginning macintosh platform simple four-function calculator program standard desk accessory earliest system versions though higher math capability included third-party developers provided upgrades apple released graphing calculator application first powerpc release 7.1.2 mac os standard component mac os 9 apple currently ships different application called grapher calculator reverse polish notation support also speak buttons pressed result returned calculator appeared first desk accessory first version macintosh system 1984 macintosh 128k original incarnation developed chris espinosa appearance designed part steve jobs espinosa flustered jobs dissatisfaction prototype designs conceived application called steve jobs roll calculator construction set allowed jobs tailor look calculator liking design maintained basic math operations final release classic mac os 2002 dashboard calculator widget included versions macos mac os x tiger onwards basic mode desktop counterpart since release os x yosemite also simple calculator widget available notifications area since release mac os x leopard simple arithmetic functions calculated spotlight feature include standard addition subtraction division multiplication exponentiation use percent sign denote percentage apple chess 3d chess game macos developed apple inc supports chess variants crazyhouse suicide chess originates openstep mac os x 10.2 based open source software apple redistributes source code apple sample code license contacts called address book os x mountain lion computerized address book included apple inc. macos includes various synchronizing capabilities integrates macos applications features address book two viewing modes view card column view card user switch modes control upper-left portion window close box releases prior lion view card column address book window divided three panes first pane title group pane lists directories user-made group users add new groups pulling file menu new group typing command-shift-n selecting user-made group second column title name lists names people cards group names selected group alphabetical order first last name depending user preference third pane card corresponding selected name card include information user classify customizable categories like home work many fields duplicate entries example person card describes several email addresses user edit fields pressing edit button bottom-left third pane address book search ldap network directories users customize ldap tab preferences users search selecting directories first pane selecting directory second pane typing search search box top-left third pane results appear third pane computer must connected local area network directories reside location changed network connection lost address book ’ look contacts directories network computer set access directory services one local area network address book automatically searches directory services addresses one also set address book search lightweight directory access protocol ldap servers addresses ldap internet protocol used looking contact information servers information network directories appears one searching search network directory select directories group column directory directory column type text search field add someone network directory one personal address book drag card directory group column instructions setting one computer access directory services one local area network open directory utility choose help directory utility help dictionary application includes in-built dictionary thesaurus photo booth application user take pictures quicktime player application play video sound files safari web browser time machine application user back files activity monitor system monitor macos operating system also incorporates task manager functionality activity monitor appeared mac os x v10.3 subsumed functionality programs process viewer task manager cpu monitor found previous version os x os x 10.9 activity monitor significantly revamped gained 5th tab energy addition cpu memory disk network airport utility program allows users configure airport wireless network manage services associated devices connected airport routers comes pre-installed macos available download microsoft windows ios airport utility unique offers network configuration native application opposed web application provides graphical overview airport devices attached network provides tools manage one individually allows users configure network preferences assign back mac accounts network configure usb attached printers hard drives current versions 6.3.6 recent versions macos 5.6.1 microsoft windows older versions mac os x 1.3.4 ios january 30 2013 apple released airport utility 6.0 macos featuring redesign user interface focused increasing usability novice users reception mixed media outlets reporting professionals network administrators frustrated removed features reported end users however ’ notice feature omissions users requiring removed features still access previous version airport utility using workaround audio midi setup utility program comes macos operating system adjusting computer audio input output configuration settings managing midi devices first introduced mac os x 10.5 leopard simplified way configure midi devices users need aware prior release midi devices require step mention might omitted midi devices third-party manufactures bluetooth file exchange utility comes macos operating system used exchange files bluetooth-enabled device example could used send image cellphone receive image documents pda assists users installing windows mac using boot camp colorsync utility software ships macos used management color profiles filters used apple pdf workflow applying filters pdf documents interface composed two parts document browser utility window document browser lets zoom image apply filter utility window several options profile first aid profiles devices filters calculator profile first aid allows repair colorsync color profiles conform international color consortium specification profiles allows browse profiles installed system grouped location class space graphically compare two profiles profile map displayed rotatable scalable 3d object plotted cielab cieluv yxy yuv ciexyz devices section allows see list registered colorsync devices displays printers see colorsync profile applied one also override default setting filters section allows build modify pdf filters available rest operating system filter set appear one three domains application pdf workflows printing filters set printing appear drop-down menu save pdf ... button standard mac os x print dialog box filters set pdf workflow appear quartz filters drop-down menu colorsync section print dialog box default filters ship mac os x user-created filters color management image effects pdf retouch domain selection comments color management section allows assigning profile choosing default profile rendering intent converting profile intermediate transform intermediate transform section allows adjustment brightness tint hue saturation bilevel high pass filter profile assignment either grayscale rgb cmyk data file applied either text graphics images shading complex filters created stacking multiple effects changes made pdf file saved new pdf file calculator convert rgb cmyk color value schemes features interactive color-picker identifying color screen duplicating feature another bundled utility digitalcolor meter colorsync apple inc. color management api classic mac os macos apple developed original 1.0 version colorsync mac-only architecture made operating system release 1993 year apple co-founded international color consortium icc develop cross-platform profile format became part colorsync 2.0 system color management module cmm linocolorcmm developed linotype-hell ag part heidelberger druckmaschinen ag cmm used microsoft windows 2000 xp rubric image color management icm apple help adobe ported colorsync 2.0 sdk microsoft windows colorsync 3.0 windows version initially planned discontinued colorsync 4.0 latest version introduced mac os x 10.1 human color perception complex subtle process different devices widely different color gamuts ranges color display deal issues colorsync provides several different methods color matching instance perceptual matching tries preserve closely possible relative relationships colors even colors must systematically distorted order get fit within gamut destination device human eye sensitive color differences rather absolute colors method tends produce best-looking results subjectively speaking many common uses methods work better cases dictated icc system profile connection space colorsync cie xyz color space image input output devices scanners printers displays characterized providing icc profile defines color information interpreted relative reference color space profile might provided device manufacturer better quality results might generated performing actual measurements device colorimeter thus image scanned scanner image file include copy scanner profile characterize meaning color information image sent output device matching process converts color information time rendering source profile attached image destination profile attached output device resulting colors print display closely possible original image console log viewer developed apple inc. included macos allows users search system logged messages alert user certain types messages logged console generally used troubleshooting problem computer macos well applications used send constant stream messages system form log files console allows read system logs help find certain ones monitor filter contents clicking show log list toolbar bring log list log list opens sidebar shows different logs system maintains list helps viewing many different logs maintained various parts system bringing together one place clicking particular log category logs shown system log queries contains logs entire system includes system logs well individual application logs selecting messages gives live look computer activities updated live includes activities system well applications running logs section console formatted uniformly include timestamp name process application actual message log message displayed includes paperclip icon next means shortened version longer report clicking icon show complete report addition viewing messages users also create custom queries criteria like custom queries filter messages also shown messages section order make new query choose new system log query file menu migration assistant application migrating information another computer computer use may windows computer mac system information application shows system information macintosh product voiceover application user listen spoken descriptions computer finder default file manager graphical interface shell macos archive utility bomarchivehelper mac os x 10.5 default archive file handler macos usually invoked automatically opening file one supported formats used create compressed zip archives choosing create archive 'file leopard compress finder file contextual menu located /system/library/coreservices/applications/archive utility.app mac os x 10.10 /system/library/coreservices/archive utility.app 10.5 later /system/library/coreservices/bomarchivehelper.app 10.4 prior archive utility inclusion mac os x v10.3 beginning mac os 7.6 apple bundled freeware stuffit expander operating system invoking archive utility manually shows minimal gui letting user change archive utility preferences choose files compress uncompress bom abbreviation bill materials bill materials files .bom files used macos installer program document files installer bundle installed file permissions file metadata thus bill materials read installer archive utility helps extracting files specified bom crash reporter standard crash reporter macos crash reporter send crash logs apple inc. engineers review crash reporter three modes operations developer tool crashreporterprefs used change modes using terminal command defaults write com.apple.crashreporter dialogtype basic|developer|server basic mode crash reporter notices application crashed twice succession offer rename application preference file try corrupted preference files common cause crashes reporting crash top text field window crash log bottom field user comments users may also copy paste log e-mail client send third-party application developer developer use classic environment usually referred classic hardware software abstraction layer powerpc versions mac os x allows legacy applications compatible mac os 9 run mac os x name classic also sometimes used software vendors refer application programming interface available classic applications differentiate programming mac os x classic version mac os classic environment supported powerpc-based macintosh computers running versions mac os x 10.4 tiger supported 10.5 leopard intel-based macintosh computers running version mac os x classic environment descendant rhapsody blue box virtualization layer served proof concept previously apple a/ux also offered virtualized mac os environment top unix operating system uses mac os 9 system folder new world rom file bridge differences older powerpc macintosh platforms xnu kernel environment classic environment created key element apple strategy replace classic mac os versions 9 mac os x standard operating system os used macintosh computers eliminating need use older os directly classic environment loaded login faster activation needed later command whenever mac os application requires launched reduce use system resources needed requires full version mac os 9 installed system loads instance os sandbox environment replacing low-level system calls equivalent calls mac os x via updated system files classic support system enabler sandbox used launch classic mac os applications—there one instance classic process running given user one user per machine may running classic time user chooses launch classic environment needed launching classic application first launches classic environment configured appear window resembling display computer booting mac os 9 classic environment finished loading application launches classic application foreground menu bar top screen changes look like older mac os system menu dialog boxes user-interface elements retain traditional appearance classic environment provides way run classic applications apple g5 systems well g4 based computers sold january 2003 machines boot mac os 9 earlier without bridging capabilities classic environment software see sheepshaver classic supported versions mac os x run apple systems incorporating intel microprocessors includes new shipping apple computers september 2006 last version mac os x support classic environment powerpcs mac os x v10.4 tiger classic environment compatibility usually good provided application using require direct access hardware engage full-screen drawing however complete clone mac os 9 finder included mac os x v10.2 later support reveal object apple events used mac os 9 applications causing reveal finder functionality applications lost early releases mac os x would often fail draw window frames classic applications correctly classic environment windowing made double buffered mac os x panther older applications games sometimes failed update screen properly original macintosh port doom however classic environment resurrected older applications previously unusable macintosh quadra power macintosh series mac os x replaced mac os 9 virtual memory system standard less fragile implementation classic environment performance also generally acceptable exceptions application run directly powerpc code would possible intel-based macs motorola 68k code handled motorola 68lc040 emulator mac os 9 uses application functions actually faster classic environment mac os 9 equivalent hardware due performance improvements newer operating system device drivers applications largely use heavy disk processing often quickly ported mac os x developers hand applications rely heavy processing share resources mac os 9 co-operative multitasking model interrupted non-classic processes mac os x preemptive multitasking greater processing power systems run mac os x compared systems intended run mac os 8 9 helps mitigate performance degradation classic environment virtualization mac os 9 earlier versions mac os x software update standalone tool program part coreservices os x could automatically inform users new updates new features bug security fixes operating system applications device drivers firmware updates required user enter administrative password required system restart could set check updates daily weekly monthly addition could download store associated .pkg file type used installer installed later date maintained history installed updates starting mac os x 10.5 leopard updates required reboot logged user prior installation automatically restarted computer complete earlier versions os x updates installed critical files replaced next system startup beginning os x 10.8 software update became part app store application beginning macos mojave 10.14 became part system preferences mac os x v10.4 x11.app optional install included install dvd mac os x v10.5 mac os x v10.6 mac os x v10.7 installed x11.app default os x mountain lion 10.8 apple dropped dedicated support x11.app users directed open source xquartz project contributes instead
[ 4615, 4111, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 3670, 4184, 2141, 4702, 3167, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 7307, 6797, 8852, 1686, 7318, 5784, 3228, 2207, 7842, 1699, 10406, 168, 3241, 5292, 8877, 1710, 376...
None
3,372
4
Sam_Fisher_(Splinter_Cell):sam fisher splinter cell samuel fisher fictional character protagonist tom clancy splinter cell series video games developed ubisoft well series tie-in novels endorsed tom clancy full name first seen tom clancy splinter cell first game series using computer v-22 osprey encrypt home call fisher originally voiced veteran actor michael ironside first five installments series 2013 eric johnson assumed voice physical role ironside later returned role 2018 participating crossover downloadable content height 5 10 weight 170lbs samuel fisher lcdr usn-ret former member third echelon top-secret black bag operation sub-branch within national security agency nsa currently commander/head field operative fourth echelon newly created covert special operations/counter-terrorism group reports president united states fisher born 1957 affluent baltimore suburbs towson maryland much known childhood known sam attended military boarding school death parents child accepted united states naval academy graduated 1977 bachelor degree political science commissioned ensign u.s. navy soon personnel file flagged recruitment navy seals joined passing grueling selection process training program mid-1980s fisher attached cia though still active duty navy working official diplomatic cover georgia time part ussr met nsa crypt-analyst named regan burns married 1984/85 small ceremony rhein-main air base frankfurt germany learning regan pregnant 31 may 1985 regan gave birth child named sarah fisher regan divorced three years marriage gaining custody sarah regan reverted maiden name changed sarah well regan died ovarian cancer sometime 2000 fisher gained guardianship sarah moved back u.s. took bureaucratic job cia worked weapons development well studied experimental weaponry information warfare order spend time focus upbringing fisher mission iceland informed sarah allegedly killed drunk driver late 2007 early 2008 however three years later heard rumor death accident went malta investigate captured third echelon malta grim revealed sarah alive sam wanted see daughter help investigate tom reed third echelon hq grim played recording lambert made death new york explaining sarah death faked prevent used leverage mole inside third echelon compromise sam agency learning revelation sam reluctantly continued help grim stopping reed assassinating united states president reuniting daughter retiring government work bored civilian life fisher accept job old associate best-friend victor coste paladin nine security specialized high-tech defense solutions kidnapping recovery work coste injured blacklist attack anderson air base guam offered president patricia caldwell commander fourth echelon consisted sam alongside civilian hacker charlie cole former cia officer isaac briggs lastly co-worker third echelon anna grimsdottir sam direct supervisor handler third echelon irving lambert colonel usa-ret deceased 2008 maintained constant radio contact sam missions providing updates support even one fisher oldest friends especially closest assisting lambert several third echelon employees provided additional reconnaissance logistical technical support sam operating field vernon 'junior wilkes deceased anna grímsdóttir frances coen william redding introduced chaos theory reassigned sometime double agent another sam fisher oldest friends douglas shetland major usmc-ret former usmc recon officer ceo private military corporation plays prominent role third game established fisher served shetland kuwait gulf war shetland unit operating alongside navy seals became close friends stationed aboard uss nimitz shortly fisher rescues hostage situation east timor mission second game shetland asks rest seals sam replies establishing left u.s. navy reserve 1996 saying came alone n't navy decade role shetland pmc displace international chaos theory becomes clear sam hunted kills roof bathhouse tokyo victor 'vic coste another one sam fisher oldest closest friends two served together navy seals iraq persian gulf war 1991 time iraq vic sam part four-man navy seal team ambushed soldiers iraqi republican guard routine foot patrol traversing along road leading baghdad two four men within squad killed ambush sam squad leader time captured vic coste left dead disobeyed direct orders hold position wait evacuation coste single-handedly fought way sam behind enemy lines rescued despite heavily outnumbered outgunned debt sam never forgotten result vic one people sam trusts unconditionally often turns covert assistance field sam 177 cm 5 ft 10 tall weighs 78 kg 170 pounds greying brown-black hair green eyes still athletic build physique man early 60s first person recruited field agent splinter cell program third echelon highly clandestine black ops project highly decorated veteran jsoc devgru cia special activities division fisher master art stealth trained various undercover covert infiltration tactics specializes night-time combat close-quarters combat urban warfare fieldcraft-related skills well addition sam extremely proficient tradecraft skills surveillance tactics computer hacking handling explosives use nearly conventional firearm ambidextrously also highly trained expert various forms martial arts far excels israeli self-defense combat system krav maga utilized center axis relock modern shooting stance used close-quarters combat invented paul castle prefers work alone field established novels sam known command startling number languages including native english spanish german russian korean chinese arabic burmese georgian persian assignment stationed fort meade working third echelon fisher resided townhouse towson farmhouse rural germantown maryland according novelizations series according 2013 graphic novel splinter cell echoes takes place end conviction events happened beginning splinter cell blacklist sam resides two-story house falls church virginia daughter currently lives atlanta georgia stayed book moving new york sam signature sidearm fn five-seven also preferred weapon choice throughout splinter cell franchise washington monument level conviction retrieves five-seven victor coste refers sam favorite pistol fisher conducted operations world bolivia canada cuba former east germany democratic republic congo mainland china iceland israel east timor indonesia guam japan kyrgyzstan russia ukraine turkey azerbaijan libya iraq iran afghanistan north south korea mexico panama peru paraguay myanmar serbia part yugoslavia georgia france also conducted operations inside united states places los angeles international airport denver international airport sabine pass chicago philadelphia fort meade new york city new orleans washington d.c. ellsworth federal penitentiary kansas cia headquarters langley virginia novel version tom clancy splinter cell establishes sam hated time cia working mid-late 1980s mostly official cover i.e diplomatic aide bank mission chaos theory reveals fisher served panama operation cause part cia team raided bank conflict searching manuel noriega drug money around time conflict panama ended january 1990 fisher called back active duty seals deployed iraqi republic spent next several months leading gulf war sleeping ditch road baghdad kuwait prior iraqi invasion kuwait august 1990 already present western military intervention u.s.-led coalition forces began beginning gulf war january 1991 covert operative whose existence completely deniable u.s. government fisher approaches target objectives gruff no-nonsense manner maintains lighthearted relationship colleagues even momentary hostages even going kill fisher little patience government bureaucracy behind-the-scenes political maneuvering realist well aware overarching political ramifications behind assignments specific manner authorized completion fisher maintains cynical jaded sarcastic sense humor covert illegal often morally ambiguous nature work pandora tomorrow lambert informs fisher nobody knows whether norman soth u.s. intelligence agent terrorist fisher replies things n't mutually exclusive time highly loyal staunch believer ideals work ultimately protects quickly angered casual and/or intentional slaughter innocent civilians unarmed military personnel enemies original splinter cell fisher original trial agent nascent third echelon initiative inaugural splinter cell program thus interactions handler colonel lambert relatively straightforward respectful time fisher drop occasional sarcastic wisecrack particularly unusual obtuse instructions instance final level pandora tomorrow sam elevator shuts enemies cut power lambert informs elevator stopped sam retorts sarcastic thanks lambert splinter cell chaos theory fisher blunt appears fairly disappointed lambert orders avoid enemy fatalities part mission parameters frequently holding captured enemies knife-point dialog creative highly intimidating though often morbidly humorous audience splinter cell conviction fisher personality takes leap towards ruthlessness intimidating threats lethal force chaos theory become standard practice fisher often tortures subjects interrogation creative use surrounding objects pianos fire extinguishers windowsills tie-in novels expand fisher character portray detached preferring solitude buying non-perishables cds wants online living first novel explained one-sentence paragraph fisher like way avoids relationships due demands job though eventually engages relationship krav maga instructor katia katia killed sniper shot meant however close relationship daughter sarah used bait trap first novel sarah kidnapped order get fisher novels fisher also mentions ability fall asleep command unlike people sleep tired says asset line work often requires obtain sleep awkward places tom hardy playing younger sam fisher film adaptation splinter cell expected released 2019 2008 age ranked fisher seventh greatest xbox character time stating man action rather words lone wolf sometimes 've got respect hand pc zone staff listed fisher eighth worst character pc gaming history declaring great iconic character one freefall due genuine lack imagination part creators text critique targets splinter cell double agent 2010 game informer readers voted fisher twelfth top character 2000s decade although fisher ultimately make cut game informer staff considered inclusion 30 characters defined decade collection bryan vore saying splinter cell ... easy assume sam fisher simply poor man solid snake quickly gamers thanks quiet deadly efficiency gruff yet sarcastic demeanor willingness disobey orders n't believe 2011 guinness world records gamer edition lists character twenty-fourth popular video game character ugo networks featured fisher list coolest helmets headgear video games number 5 remarking unrecognizable without three-eyed night vision goggles perched forehead 2012 gamesradar ranked 37th memorable influential badass protagonist games adding voiced michael ironside wears awesome night vision goggles good enough right fine ... like macgyver-meets-james bond-meets-batman since list updated annually 2013 complex ranked sam fisher number 18 list greatest soldiers video games calling little bit like american james bond—only without things james bond besides kill dudes
[ 7424, 7887 ]
None
3,373
2
Pmset:pmset computing pmset command line utility manipulate power management settings darwin macos operating systems assign sleep settings schedule sleep wake times display power information pmset utility first appeared darwin 6.0.1 mac os x 10.2 jaguar updated periodically since introduction still available darwin 17.0 macos 10.13 high sierra utility sets lists power management settings functionality provided utility available gui interface energy saver preference pane however pmset allows greater flexibility access several options available gui utility set different power management settings depending usage scenario different settings applied machine running charger battery ups three appropriate flags follows additional arguments supplied assigning power management settings power management arguments discussed greater detail invoking command specified arguments modify power management options arguments already set unmodified pmset unless arguments specifically included utility schedule wake sleep power power events events recurring based arbitrary weekday time combinations scheduled future dates times syntax scheduling event follows previously stored events overwritten upon running command schedule multiple events must entered one command string example set shutdown event every day week 23:59 wake power event every day week 7:00 enter following get flag displays information current power management configuration log recent activity additional arguments supplied flag display current settings additional get arguments discussed greater detail get flag follows view currently scheduled events type utility also able configure hibernation safe sleep options change energy saver profiles pmset utility recognizes following arguments arguments passed serial form order bad syntax unrecognized argument cause entire command fail resulting error message brief help screen power management settings changed privileged user settings may adjusted independently circumstances machine attached charger running battery case laptop running ups available settings also adjusted four scenarios simultaneously default option usage flag specified power management options specified different profiles appending -c charger -b battery -u ups -a flags following example set machine sleep 10 minutes sleep display five minutes powered battery following command assign slightly different power management settings circumstances machine powered charger machine set sleep 30 minutes display set never sleep set charger issuing commands interfere arguments entered serial form set modify several power management parameters one command following command set machine never sleep sleep 0 enable sudden motion sensor sms 1 set display sleep 20 minutes displaysleep 20 disable processor speed reduction reduce 0 enable intermediate display dimness halfdim 1 enable machine wake lid opened lidwake 1 prevent system sleeping tty session ssh active ttyskeepawake 1 disable waking machine ac adapter inserted acwake 0 disable automatic restart power removed restored autorestart 0 enable dynamic change processor speed based system load dps 1 enable wake modem ring ring 1 enable wake receipt magic ethernet packet womp 1 disable hard disk sleep disksleep 0 example include usage flag settings specified apply usage scenarios subsequent commands specify usage flag affect settings usage scenario instance pmset -b sleep 10 cause machine sleep 10 minutes battery attached settings apply battery attached settings example apply charger ups attached least darwin 9.4 os x 10.5.4 leopard changes made pmset saved persistent preferences file /library/preferences/systemconfiguration/com.apple.powermanagement.plist file modified manually using defaults command changes taken immediately power management system manual edits com.apple.powermanagement.plist also stand risk overwritten command pmset touch reread existing settings disk apply system autopoweroff enabled machine got hibernate mode even hibernatemode 0 value autopoweroffdelay may seconds despite man page mavericks nov 9 2012 documenting minutes pmset command able schedule system sleep shutdown wakeup power events schedule argument setting one-time power events repeat setting daily weekly events scheduling events done privileged user schedule argument recognizes following additional arguments utility unforgiving improper syntax errors syntax cause command fail display brief help message syntax scheduled event follows one type event sleep wake et cetera specified date chosen must future utility expects able store information pmu may work reliably non-apple hardware date time string must enclosed quotation marks syntax repeating event follows scheduled wake sleep power events stored persistent preferences file /library/preferences/systemconfiguration/com.apple.autowake.plist file manually edited using defaults command changes made stand serious risk overwritten also edits immediately taken system list flag -g displays information current power configuration flag alone additional arguments display current power management settings additional arguments display specific information get functions pmset require privileged access utility recognizes following arguments one get argument passed pmset must preceded get flag instance display scheduled events type pmset -g sched utility return error one get argument provided first ignored sleep displaysleep show imposed value 0 disabled together list process ids impose value processes backup programs need machine stay awake example backup finished following examples demonstrate output pmset command apple powerbook g4 running mac os x 10.5.4 leopard following example put relevant computer sleep immediately following example apply laptops powered battery set machine sleep 5 minutes inactivity put display sleep 2 minutes spin hard disk 3 minutes privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply machines powered ups set machine perform emergency shutdown 5 percent battery remains ups 5 minutes estimated draw time remains whichever comes first privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example apply usage scenarios set machine wake receipt magic ethernet packet wake modem detects ring prevent system sleeping tty session active privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g. following example sets one-time scheduled power event machine set shut 01/10/2009 10:00 pm 10 january 2009 – note us centric mm/dd/yyy time syntax privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched following example sets repeating power event machine wake power every weekday 8:00 privileged users issue command command issued successfully without syntax errors pmset exit silently exit code 0 verify system took new configuration issue command pmset -g sched example output pmset -g. time machine powered charger simultaneously charging battery command prints current configuration example output pmset -g sched example machine already configured repeating event start wake every weekday 8:00 command prints repeating event note next occurrence appears scheduled power event example output pmset -g. time machine backed output shows pid backup program
[ 9035, 3181, 7983 ]
Test
3,374
9
Babbage_(programming_language):babbage programming language babbage high level assembly language gec 4000 series minicomputers named charles babbage english computing pioneer
[ 9345, 1349, 8262, 9835, 7983 ]
None
3,375
8
SemanticGov:semanticgov semanticgov european union-funded research development project lasted 2006 2009 aimed building infrastructure software models services etc necessary enabling offering semantic web services public administration pa semanticgov aimed address longstanding challenges faced public administrations achieving interoperability amongst pa agencies within country well amongst countries easing discovery pa services customers facilitating execution complex services often involving multiple pa agencies interworkflows semanticgov project aimed capitalizing service oriented architectures paradigm implemented state-of-the-art semantic web services technology supported rigorous reusable public administration domain analysis modelling line major european programmes initiatives field e.g european interoperability framework previous work conducted eu idabc programme i2010 group member states representatives competitiveness innovation cip programme semanticgov project objectives support pa client identify needed services providing infrastructure mapping client needs pa services b discover service interest federal/national pa service directory c. execute monitor service workflow providing infrastructure on-the-fly semi-automated composition execution monitoring complex pa services ii support european citizens businesses access pan-european egovernment services pegs providing communal semantic gateway resolve semantic incompatibilities amongst different administration systems semanticgov project meant simply provide new electronic government solutions a. enhance administrative capacity national public administration systems providing new paradigm service provision b. pave way administrative dimension european unification aka “ common european administrative space ” facilitating communication amongst eu national administrative systems list consortium partners follows
[ 7897 ]
Validation
3,376
4
DivvyCloud:divvycloud divvy cloud corporation privately held venture-backed american cybersecurity company headquarters arlington virginia core product protects cloud container environments misconfigurations policy violations threats iam challenges automated real-time remediation divvycloud customers achieve continuous security compliance fully realize benefits cloud container technology divvycloud supports aws microsoft azure google cloud platform alibiba cloud kubernetes divvycloud category technology classified gartner cloud security posture management divvycloud founded may 2013 former electronic arts employees brian johnson chris deramus tenure electronic arts responsible large-scale infrastructure mmorpg titles writing proprietary tools manage complex environment left electronic arts created divvycloud may 2019 divvycloud secured 19 million funding round led providence strategic growth arm providence equity partners contributions existing investors missionog rtp ventures investment brought total capital raised date 29 million following 6 million series round september 2017 company numerous awards including cyber defense magazine editor ’ choice winner 2019 infosec awards cloud security category 2019 cyber security excellence awards
[ 7248, 5295, 1935 ]
Validation
3,377
4
Linked_timestamping:linked timestamping linked timestamping type trusted timestamping issued time-stamps related linked timestamping creates time-stamp tokens dependent entangled authenticated data structure later modification issued time-stamps would invalidate structure temporal order issued time-stamps also protected data structure making backdating issued time-stamps impossible even issuing server top authenticated data structure generally published hard-to-modify widely witnessed media like printed newspaper public blockchain long-term private keys use avoiding pki-related risks suitable candidates authenticated data structure include simplest linear hash chain-based time-stamping scheme illustrated following diagram linking-based time-stamping authority tsa usually performs following distinct functions linked timestamping inherently secure usual public-key signature based time-stamping consequential time-stamps seal previously issued ones hash chain authenticated dictionary use could built one way modifying issued time-stamps nearly hard finding preimage used cryptographic hash function continuity operation observable users periodic publications widely witnessed media provide extra transparency tampering absolute time values could detected users whose time-stamps relatively comparable system design absence secret keys increases system trustworthiness keys leak hash algorithms considered future-proof modular arithmetic based algorithms e.g rsa linked timestamping scales well hashing much faster public key cryptography need specific cryptographic hardware limitations common technology guaranteeing long-term attestation value issued time-stamps digitally signed data periodic over-time-stamping time-stamp token missing key-related risks plausible safety margin reasonably chosen hash function over-time-stamping period hash-linked token could order magnitude longer public-key signed token haber stornetta proposed 1990 link issued time-stamps together linear hash-chain using collision-resistant hash function main rationale diminish tsa trust requirements tree-like schemes operating rounds proposed benaloh de mare 1991 bayer haber stornetta 1992 benaloh de mare constructed one-way accumulator 1994 proposed use time-stamping used aggregation one-way accumulator requires one constant-time computation round membership verification surety started first commercial linked timestamping service january 1995 linking scheme described security analyzed following article haber sornetta buldas et al continued optimization formal analysis binary tree threaded tree based schemes skip-list based time-stamping system implemented 2005 related algorithms quite efficient security proof hash-function based time-stamping schemes presented buldas saarepera 2004 explicit upper bound formula_1 number time stamps issued aggregation period suggested probably impossible prove security without explicit bound so-called black-box reductions fail task considering known practically relevant efficient security proofs black-box negative result quite strong next 2005 shown bounded time-stamping schemes trusted audit party periodically reviews list time-stamps issued aggregation period made universally composable remain secure arbitrary environments compositions protocols instances time-stamping protocol buldas laur showed 2007 bounded time-stamping schemes secure strong sense satisfy so-called knowledge-binding condition security guarantee offered buldas saarepera 2004 improved diminishing security loss coefficient formula_1 formula_3 hash functions used secure time-stamping schemes necessarily collision-resistant even one-way secure time-stamping schemes probably possible even presence universal collision-finding algorithm i.e universal attacking program able find collisions hash function suggests possible find even stronger proofs based properties hash functions illustration hash tree based time-stamping system works rounds formula_4 formula_5 formula_6 ... one aggregation tree per round capacity system formula_1 determined tree size formula_8 formula_9 denotes binary tree depth current security proofs work assumption hard limit aggregation tree size possibly enforced subtree length restriction iso 18014 part 3 covers 'mechanisms producing linked tokens american national standard financial services trusted timestamp management security ansi asc x9.95 standard june 2005 covers linking-based hybrid time-stamping schemes ietf rfc standard draft linking based time-stamping rfc 4998 evidence record syntax encompasses hash tree time-stamp integrity guarantee long-term archiving
[ 9248, 8674, 11684, 10831, 5433 ]
Test
3,378
2
Open_(process):open process open nextstep macos command line process opens file folder url gui though user double clicked files opened default application type folders opened finder file system gui urls opened default browser
[ 5397, 6797 ]
Validation
3,379
7
GLite-AMGA:glite-amga arda metadata grid application amga general purpose metadata catalogue part european middleware initiative middleware distribution originally developed egee project part glite middleware became clear many grid applications needed metadata information files organize work-flow amga developed supported european middleware initiative amga metadata service allows users attach metadata information files stored grid metadata relationally organized data typically stored relational database system rdbms addition metadata amga also stored independently associated files allows amga used general access tool relational databases grid amga features simple learn metadata access language useful adoption amga smaller grid applications considerably lowers technical hurdle make use relational data access via sql92 also supported one main features amga one unique possibility replicate metadata different amga instances allowing federation metadata e.g health-e-child project also increase scalability improve access times globally deployed grid done wisdom project performance efficiency access across wans independently targeted access protocol optimised bulk transfer metadata across wans using data streaming security grid major concern amga features different authentication methods via grid-proxy- certificates well flexible accesses control mechanisms individual data items based acls particular security features made amga de facto standard metadata relational database access grid biomedical applications prominent projects making use amga field wisdom amga used campaigns avian flu malaria health e-child project
[ 3331, 5956, 3849, 7983, 8122 ]
None
3,380
2
XDA_Developers:xda developers xda developers also known simply xda often stylized xda-developers mobile software development community launched 20 december 2002 although discussion primarily revolves around android members also talk many operating systems mobile development topics many software hardware hacks rooting methods phone tablet specific tweaks originate members xda forum xda developers also hosts xda portal source android mobile phone development news well xda labs android app repository acts third-party application provider launched 2010 2016 respectively xda-developers.com created nah6 crypto products bv launched december 20th 2002 10 january 2011 xda-developers bought jb online media llc name xda developers originally derived xda marketed personal digital assistant pda extra features 2013 xda partnered swappa become official marketplace users buy sell devices site main purpose discussion troubleshooting development android sailfish os windows phone webos ubuntu touch firefox os tizen phones site also offers windows mobile android users general information devices rom upgrades technical support q reviews device applications accessories separate forums exist model phones manufactured google sony htc samsung lg electronics motorola nokia many others forums also available tablets many devices recently added new domain link shortener restricted devs joshua solan manages owns xda developers via company jb online media llc february 2009 microsoft asked xda developers remove roms created oems response petition raised signed 10,000 xda developers members petition put aside microsoft pursue removal customized images microsoft felt using custom images based roms originally provided microsoft acceptable roms work specific models portable devices original rom designed cnet asia suggested xda developers offers potential solutions problems many android-based mobile devices mobile phone reviews testers cnet preferred using xda developers roms carrying detailed reviews
[ 5892, 5637, 1670, 7428, 9610, 2828, 5262, 8719, 3600, 10129, 5522, 1427, 7700, 10645, 280, 10009, 10393, 7835, 9244, 10525, 798, 11294, 288, 673, 2978, 2852, 8486, 8870, 424, 937, 1578, 6057, 7595, 10537, 5431, 2875, 3900, 10045, 196, 69,...
Validation
3,381
4
Check_Point_GO:check point go check point go usb drive combines encrypted usb flash drive virtualization vpn computer security technologies turn pc secure corporate desktop plugging check point go usb port microsoft windows os-based pc laptop users launch secure virtual workspace segregated host pc allows users securely access company files applications remote location including insecure host environments hotel business center internet café check point go uses hardware software encryption protect user credentials documents sensitive data data compromised transit event device lost system uses authentication process enforces minimum levels password strength well certificates security tokens multifactor authentication remote connectivity device interfaces software corporate server support company policies security updates security gateways check point go formerly abra first introduced check point software technologies ltd. sandisk corporation march 2010 address security compliance issues companies remote employees workers increasingly demanding remote access company applications data personal equipment accessing network pose risk corporate networks creating potential avenue corporate data loss allowing unsecure connections companies cite check point go system provides solution companies want let employees purchase manage pcs laptops needing high security including encryption computing devices outside workplace well contractors/vendors require access company network working site since release product industry awards including product 2010 computerworld named one “ 25 hot products watch ” 2010 rsa conference crn magazine checkpoint go went end-of-sale 31-dec-2013 support ending 31-dec-2018 check point go inserted usb port pc user presented login screen upon successful login new explorer.exe instance started check point go secure workspace subsequent processes started child processes new explorer check point go uses software installed host pc run applications microsoft word microsoft excel user ’ documents remain secure check point go environment – virtual workspace runs parallel host environment file registry input/output calls secure application inside check point go redirected flash drive applications running check point go desktop including new explorer operate virtual file system registry virtual files registry data instantly written flash drive immediately encrypted currently check point go work windows workstations due incompatibility enterprise client settings
[ 2049, 9764, 8998, 4972, 3885, 3629, 6797, 6262, 5433, 5435, 8668, 2558, 4287 ]
None
3,382
6
Comparison_of_disk_encryption_software:comparison disk encryption software technical feature comparison different disk encryption software different modes operation supported software note encrypted volume use one mode operation
[ 2050, 4100, 7557, 10631, 4746, 8331, 4366, 5391, 8976, 1810, 3350, 1052, 1310, 3109, 10405, 3880, 1456, 5552, 434, 10801, 823, 7354, 7994, 7229, 704, 8640, 9281, 6602, 6993, 9306, 8283, 8668, 3422, 8414, 9055, 9569, 10850, 7139, 8676, 932...
Validation
3,383
5
Subnetwork_Access_Protocol:subnetwork access protocol subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap lsap fields added packets transmitting node order allow receiving node pass received frame appropriate device driver understands given protocol open systems interconnect osi model uses sap define communication layers like network transport session layers seven-layered model identify protocol process incoming message within given layer programs exchange data mutually agreed upon protocol mechanism pair programs support common protocol communicate thus multiple protocols coexist within layer necessary determine protocol invoked process service data unit delivered lower layer common reference sap including source service access point ssap destination service access point dsap refers boundary data link layer network layer common think sap terms use layer 2 specifically logical link control llc sub-layer defined ieee 802.2 standards link service access point lsap includes destination service access point dsap source service access point ssap enables mac station communicate upper layers via different protocols standard network layer protocols assigned reserved llc addresses recorded iso/iec tr 11802-1 one half llc address space reserved assignment protocols accommodated two ways one way local assignment lsaps half llc address space available second way use particular reserved llc address value assigned use conjunction sub-network access protocol snap called snap address snap address identifies mac sap single lsap thus protocol using snap must employ protocol identifier thus subnetwork access protocol snap mechanism multiplexing networks using ieee 802.2 llc protocols distinguished 8-bit 802.2 service access point sap fields snap supports identifying protocols ethernet type field values also supports vendor-private protocol identifier spaces used ieee 802.3 ieee 802.4 ieee 802.5 ieee 802.11 ieee 802 physical network layers well non-ieee 802 physical network layers fddi use 802.2 llc snap extension 802.2 llc specified ieee 802 overview architecture document 5-octet snap header follows 802.2 llc header destination sap dsap source sap ssap contain hexadecimal values aa ab snap header consists 3-octet ieee organizationally unique identifier oui followed 2-octet protocol id oui hexadecimal 000000 protocol id ethernet type ethertype field value protocol running top snap oui oui particular organization protocol id value assigned organization protocol running top snap snap usually used unnumbered information 802.2 protocol data units pdus control field value 3 lsap values usually hexadecimal aa 802.2 llc header snap packet usually aa aa 03 however snap used pdu types well ethernet 8 octets occupied llc snap headers reduce size available payload protocols internet protocol 1492 bytes compared use ethernet ii framing therefore protocols ethertype values packets usually transmitted ethernet ii headers rather llc snap headers network types llc snap headers required order multiplex different protocols link layer mac layer n't ethertype field alternative framing would larger available payload one might ask separate sub-network header necessary answer augment decision made layout llc header time llc header designed thought single octet 256 possible values header would enough specify protocol values vendors would want register values began reserved discovered llc header would soon run open values hexadecimal aa ab values reserved additional header—the snap header—was developed support ethertype values well multiple spaces private protocol values per ietf rfc 1042 ip datagrams arp datagrams transmitted ieee 802 networks using llc snap headers except ethernet/ieee 802.3 transmitted ethernet ii headers per rfc 894
[ 2912, 5472, 751, 2961, 1618, 2994, 5270, 5118, 5439 ]
Test
3,384
5
Simple_Update_Protocol:simple update protocol simple update protocol sup protocol developed friendfeed simplify speed rss atom websites supported sup meaning updates services appeared friendfeed within seconds support dropped eventually friendfeed shutdown 2015-04-09 sites include disqus identi.ca reddit brightkite supported sup shutdown april 2012 youtube supported sup according youtube v2 api sup documentation yet reference says youtube data api v2 officially deprecated march 4 2014 youtube data api v3 supports push notifications via pubsubhubbub instead longer sup section
[]
Test
3,385
0
Lesk_algorithm:lesk algorithm lesk algorithm classical algorithm word sense disambiguation introduced michael e. lesk 1986 lesk algorithm based assumption words given neighborhood section text tend share common topic simplified version lesk algorithm compare dictionary definition ambiguous word terms contained neighborhood versions adapted use wordnet implementation might look like frequently used example illustrating algorithm context pine cone following dictionary definitions used seen best intersection pine 1 ⋂ cone 3 2 simplified lesk algorithm correct meaning word given context determined individually locating sense overlaps dictionary definition given context rather simultaneously determining meanings words given context approach tackles word individually independent meaning words occurring context comparative evaluation performed vasilescu et al 2004 shown simplified lesk algorithm significantly outperform original definition algorithm terms precision efficiency evaluating disambiguation algorithms senseval-2 english words data measure 58 precision using simplified lesk algorithm compared 42 original algorithm note vasilescu et al implementation considers back-off strategy words covered algorithm consisting frequent sense defined wordnet means words possible meanings lead zero overlap current context word definitions default assigned sense number one wordnet simplified lesk algorithm smart default word sense vasilescu et al. 2004 computeoverlap function returns number words common two sets ignoring function words words stop list original lesk algorithm defines context complex way unfortunately lesk ’ approach sensitive exact wording definitions absence certain word radically change results algorithm determines overlaps among glosses senses considered significant limitation dictionary glosses tend fairly short provide sufficient vocabulary relate fine-grained sense distinctions lot work appeared offering different modifications algorithm works use resources analysis thesauruses synonyms dictionaries morphological syntactic models instance may use information synonyms different derivatives words definitions words definitions lot studies concerning lesk extensions
[ 416, 538, 6304, 3504 ]
Test