node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,386
9
Object_file:object file object file file containing object code meaning relocatable format machine code usually directly executable various formats object files object code packaged different object files object file may also work like shared library addition object code object files may contain metadata used linking debugging including information resolve symbolic cross-references different modules relocation information stack unwinding information comments program symbols debugging profiling information object file format computer file format used storage object code related data many different object file formats originally type computer unique format advent unix portable operating systems formats coff elf defined used different kinds systems possible file format used linker input output thus library executable file format design and/or choice object file format key part overall system design affects performance linker thus programmer turnaround developing format used executables design also affects time programs take begin running thus responsiveness users object file formats structured separate sections data section containing certain type data sections known segments due term memory segment previously common form memory management program loaded memory loader loader allocates various regions memory program regions correspond segments object file thus usually known names others stack exist run time cases relocation done loader linker specify actual memory addresses however many programs architectures relocation necessary due handled memory management unit position-independent code systems segments object file copied paged memory executed without needing processing systems may done lazily segments referenced execution example via memory-mapped file backed object file types data supported typical object file formats segments different object files may combined linker according rules specified segments defined conventions exist segments shared object files instance dos different memory models specify names special segments whether may combined debugging information may either integral part object file format coff semi-independent format may used several object formats stabs dwarf gnu project binary file descriptor library bfd library provides common api manipulation object files variety formats
[ 1922, 6020, 8966, 6664, 6921, 9996, 10510, 4884, 8213, 7204, 8874, 6829, 4398, 7728, 5557, 9921, 2627, 4424, 5065, 2762, 1100, 10703, 1106, 3410, 3413, 6753, 8037, 4712, 10991, 2672, 9331, 2804, 5492, 7421, 2942, 8959 ]
Test
3,387
2
Think_Blue_Linux:think blue linux think blue linux sometimes thinkblue linux port linux ibm s/390 later zseries mainframe computers done millenux subsidiary german company thinking objects software gmbh distribution consisted primarily collection red hat linux 6.1 packages rpms top ibm port linux kernel distribution product scheduled cease early 2006 packages date linux distributions support ibm mainframes modern linux distributions support ibm mainframes making special dedicated distribution unnecessary
[ 8837, 9353, 7435, 10127, 2321, 4887, 10394, 673, 3745, 10530, 9253, 10149, 11305, 7854, 2738, 4790, 823, 439, 56, 59, 3903, 4673, 2375, 4039, 8907, 1110, 9693, 863, 2914, 485, 3685, 5096, 4841, 6890, 7913, 7020, 9064, 7534, 2671, 7920, ...
None
3,388
1
Data_access:data access data access generic term referring process it-specific meaning connotations involving access rights broader legal and/or political sense former typically refers software activities related storing retrieving acting data housed database repository two fundamental types data access exist data access crucially involves authorization access different data repositories data access help distinguish abilities administrators users example administrators may ability remove edit add data general users may even read rights lack access particular information historically repository including different database file system etc might require use different methods languages many repositories stored content different incompatible formats years standardized languages methods formats developed serve interfaces often proprietary always idiosyncratic specific languages methods standards include sql 1974- odbc ca 1990- jdbc xqj ado.net xml xquery xpath 1999- web services standards enable translation data unstructured html free-text files structured xml sql structures connection strings dburls attempt standardise methods connecting databases right_of_access_to_personal_data
[ 9762, 10020, 6775, 2344, 7175, 7368, 10413, 6286, 9263, 6417, 5202, 2901, 853, 2775, 3573, 8446, 479 ]
Validation
3,389
9
AI_winter:ai winter history artificial intelligence ai winter period reduced funding interest artificial intelligence research term coined analogy idea nuclear winter field experienced several hype cycles followed disappointment criticism followed funding cuts followed renewed interest years decades later term first appeared 1984 topic public debate annual meeting aaai called american association artificial intelligence chain reaction begins pessimism ai community followed pessimism press followed severe cutback funding followed end serious research meeting roger schank marvin minsky—two leading ai researchers survived winter 1970s—warned business community enthusiasm ai spiraled control 1980s disappointment would certainly follow three years later billion-dollar ai industry began collapse hype common many emerging technologies railway mania dot-com bubble ai winter primarily collapse perception ai government bureaucrats venture capitalists despite rise fall ai reputation continued develop new successful technologies ai researcher rodney brooks would complain 2002 stupid myth ai failed ai around every second day 2005 ray kurzweil agreed many observers still think ai winter end story nothing since come ai field yet today many thousands ai applications deeply embedded infrastructure every industry enthusiasm optimism ai increased since low point early 1990s beginning 2012 artificial intelligence especially sub-field machine learning gained commercial acceptance funding increased dramatically two major winters 1974–1980 1987–1993 several smaller episodes including following cold war us government particularly interested automatic instant translation russian documents scientific reports government aggressively supported efforts machine translation starting 1954 outset researchers optimistic noam chomsky new work grammar streamlining translation process many predictions imminent 'breakthroughs however researchers underestimated profound difficulty word-sense disambiguation order translate sentence machine needed idea sentence otherwise made mistakes apocryphal example spirit willing flesh weak translated back forth russian became vodka good meat rotten similarly sight mind became blind idiot later researchers would call commonsense knowledge problem 1964 national research council become concerned lack progress formed automatic language processing advisory committee alpac look problem concluded famous 1966 report machine translation expensive less accurate slower human translation spending 20 million dollars nrc ended support careers destroyed research ended machine translation still open research problem 21st century met success google translate yahoo babel fish earliest work ai used networks circuits connected units simulate intelligent behavior examples kind work called connectionism include walter pitts warren mccullough first description neural network logic marvin minsky work snarc system late 1950s approaches abandoned researchers began explore symbolic reasoning essence intelligence following success programs like logic theorist general problem solver however one type connectionist work continued study perceptrons invented frank rosenblatt kept field alive salesmanship sheer force personality optimistically predicted perceptron may eventually able learn make decisions translate languages mainstream research perceptrons came abrupt end 1969 marvin minsky seymour papert published book perceptrons perceived outlining limits perceptrons could connectionist approaches abandoned next decade important work paul werbos discovery backpropagation continued limited way major funding connectionist projects difficult find 1970s early 1980s winter connectionist research came end middle 1980s work john hopfield david rumelhart others revived large scale interest neural networks rosenblatt live see however died boating accident shortly perceptrons published 1973 professor sir james lighthill asked uk parliament evaluate state ai research united kingdom report called lighthill report criticized utter failure ai achieve grandiose objectives concluded nothing done ai could n't done sciences specifically mentioned problem combinatorial explosion intractability implied many ai successful algorithms would grind halt real world problems suitable solving toy versions report contested debate broadcast bbc controversy series 1973 debate general purpose robot mirage royal institution lighthill versus team donald michie john mccarthy richard gregory mccarthy later wrote combinatorial explosion problem recognized ai beginning report led complete dismantling ai research england ai research continued universities edinburgh essex sussex created bow-wave effect led funding cuts across europe writes james hendler research would revive large scale 1983 alvey research project british government began fund ai war chest £350 million response japanese fifth generation project see alvey number uk-only requirements sit well internationally especially us partners lost phase 2 funding 1960s defense advanced research projects agency known arpa known darpa provided millions dollars ai research almost strings attached darpa director years j. c. r. licklider believed funding people projects allowed ai leaders marvin minsky john mccarthy herbert a. simon allen newell spend almost way liked attitude changed passage mansfield amendment 1969 required darpa fund mission-oriented direct research rather basic undirected research pure undirected research kind gone 1960s would longer funded darpa researchers show work would soon produce useful military technology ai research proposals held high standard situation helped lighthill report darpa study american study group suggested ai research unlikely produce anything truly useful foreseeable future darpa money directed specific projects identifiable goals autonomous tanks battle management systems 1974 funding ai projects hard find ai researcher hans moravec blamed crisis unrealistic predictions colleagues many researchers caught web increasing exaggeration initial promises darpa much optimistic course delivered stopped considerably short felt could n't next proposal promise less first one promised result moravec claims staff darpa lost patience ai research literally phrased darpa 'some people going taught lesson two-million-dollar-a-year contracts cut almost nothing moravec told daniel crevier autonomous tank project failure battle management system dynamic analysis replanning tool proved enormously successful saving billions first gulf war repaying darpas investment ai justifying darpa pragmatic policy darpa deeply disappointed researchers working speech understanding research program carnegie mellon university darpa hoped felt promised system could respond voice commands pilot sur team developed system could recognize spoken english words spoken particular order darpa felt duped 1974 cancelled three million dollar year grant many years later successful commercial speech recognition systems would use technology developed carnegie mellon team hidden markov models market speech recognition systems would reach 4 billion 2001 1980s form ai program called expert system adopted corporations around world first commercial expert system xcon developed carnegie mellon digital equipment corporation enormous success estimated saved company 40 million dollars six years operation corporations around world began develop deploy expert systems 1985 spending billion dollars ai in-house ai departments industry grew support including software companies like teknowledge intellicorp kee hardware companies like symbolics lisp machines inc. built specialized computers called lisp machines optimized process programming language lisp preferred language ai 1987 three years minsky schank prediction market specialized ai hardware collapsed workstations companies like sun microsystems offered powerful alternative lisp machines companies like lucid offered lisp environment new class workstations performance general workstations became increasingly difficult challenge lisp machines companies like lucid franz lisp offered increasingly powerful versions lisp example benchmarks published showing workstations maintaining performance advantage lisp machines later desktop computers built apple ibm would also offer simpler popular architecture run lisp applications 1987 become powerful expensive lisp machines desktop computers rule-based engines clips available alternatives left consumers reason buy expensive machine specialized running lisp entire industry worth half billion dollars replaced single year commercially many lisp companies failed like symbolics lisp machines inc. lucid inc. etc companies like texas instruments xerox abandoned field however number customer companies companies using systems written lisp developed lisp machine platforms continued maintain systems cases maintenance involved assumption resulting support work early 1990s earliest successful expert systems xcon proved expensive maintain difficult update could learn brittle i.e. could make grotesque mistakes given unusual inputs fell prey problems qualification problem identified years earlier research nonmonotonic logic expert systems proved useful special contexts another problem dealt computational hardness truth maintenance efforts general knowledge kee used assumption-based approach see nasa texsys supporting multiple-world scenarios difficult understand apply remaining expert system shell companies eventually forced downsize search new markets software paradigms like case-based reasoning universal database access maturation common lisp saved many systems icad found application knowledge-based engineering systems intellicorp kee moved lisp c++ variant pc helped establish object-oriented technology including providing major support development uml see uml partners 1981 japanese ministry international trade industry set aside 850 million fifth generation computer project objectives write programs build machines could carry conversations translate languages interpret pictures reason like human beings 1991 impressive list goals penned 1981 met indeed met 2001 2011 ai projects expectations run much higher actually possible 1983 response fifth generation project darpa began fund ai research strategic computing initiative originally proposed project would begin practical achievable goals even included artificial general intelligence long term objective program direction information processing technology office ipto also directed supercomputing microelectronics 1985 spent 100 million 92 projects underway 60 institutions half industry half universities government labs ai research generously funded sci jack schwarz ascended leadership ipto 1987 dismissed expert systems clever programming cut funding ai deeply brutally eviscerating sci schwarz felt darpa focus funding technologies showed promise words darpa surf rather dog paddle felt strongly ai next wave insiders program cited problems communication organization integration projects survived funding cuts including pilot assistant autonomous land vehicle never delivered dart battle management system noted successful survey reports early 2000s suggests ai reputation still less stellar many researchers ai mid 2000s deliberately called work names informatics machine learning analytics knowledge-based systems business rules management cognitive systems intelligent systems intelligent agents computational intelligence indicate work emphasizes particular tools directed particular sub-problem although may partly consider field fundamentally different ai also true new names help procure funding avoiding stigma false promises attached name artificial intelligence late 1990s early 21st century ai technology became widely used elements larger systems field rarely credited successes 2006 nick bostrom explained lot cutting edge ai filtered general applications often without called ai something becomes useful enough common enough labeled ai anymore rodney brooks stated around time stupid myth ai failed ai around every second day technologies developed ai researchers achieved commercial success number domains machine translation data mining industrial robotics logistics speech recognition banking software medical diagnosis google search engine fuzzy logic controllers developed automatic gearboxes automobiles 2006 audi tt vw touareg vw caravell feature dsp transmission utilizes fuzzy logic number škoda variants škoda fabia also currently include fuzzy logic-based controller camera sensors widely utilize fuzzy logic enable focus heuristic search data analytics technologies developed evolutionary computing machine learning subdivision ai research community techniques applied wide range real world problems considerable commercial success data analytics technology utilizing algorithms automated formation classifiers developed supervised machine learning community 1990s example tdidt support vector machines neural nets ibl used pervasively companies marketing survey targeting discovery trends features data sets researchers economists frequently judged status ai winter reviewing ai projects funded much trends funding often set major funding agencies developed world currently darpa civilian funding program called eu-fp7 provide much funding ai research us european union 2007 darpa soliciting ai research proposals number programs including grand challenge program cognitive technology threat warning system ct2ws human assisted neural devices sn07-43 autonomous real-time ground ubiquitous surveillance-imaging system argus-is urban reasoning geospatial exploitation technology urgent perhaps best known darpa grand challenge program developed fully automated road vehicles successfully navigate real world terrain fully autonomous fashion darpa also supported programs semantic web great deal emphasis intelligent management content automated understanding however james hendler manager darpa program time expressed disappointment government ability create rapid change moved working world wide web consortium transition technologies private sector eu-fp7 funding program provides financial support researchers within european union 2007–2008 funding ai research cognitive systems interaction robotics programme €193m digital libraries content programme €203m fet programme €185m marked increase ai funding development deployment commercial use led idea ai winter long concerns occasionally raised new ai winter could triggered overly ambitious unrealistic promise prominent ai scientists overpromising part commercial vendors several explanations put forth cause ai winters general ai progressed government-funded applications commercial ones new dynamics came play hype commonly cited cause explanations necessarily mutually exclusive ai winters partly understood sequence over-inflated expectations subsequent crash seen stock-markets exemplified railway mania dotcom bubble common pattern development new technology known hype cycle event typically technological breakthrough creates publicity feeds create peak inflated expectations followed trough disillusionment since scientific technological progress ca n't keep pace publicity-fueled increase expectations among investors stakeholders crash must follow ai technology seems exception rule another factor ai place organisation universities research ai often takes form interdisciplinary research ai therefore prone problems types interdisciplinary research face funding channeled established departments budget cuts tendency shield core contents department expense interdisciplinary less traditional research projects downturns country national economy cause budget cuts universities core contents tendency worsen effect ai research investors market likely put money less risky ventures crisis together may amplify economic downturn ai winter worth noting lighthill report came time economic crisis uk universities make cuts question programs go early computing history potential neural networks understood never realized fairly simple networks require significant computing capacity even today standards common see relationship basic research technology pipeline advances basic research give birth advances applied research turn leads new commercial applications often argued lack basic research lead drop marketable technology years line view advanced james hendler 2008 claimed fall expert systems late '80s due inherent unavoidable brittleness expert systems funding cuts basic research 1970s expert systems advanced 1980s applied research product development end decade pipeline run dry expert systems unable produce improvements could overcome brittleness secured funding fall lisp machine market failure fifth generation computers cases expensive advanced products overtaken simpler cheaper alternatives fits definition low-end disruptive technology lisp machine makers marginalized expert systems carried new desktop computers instance clips fall lisp machine market fall expert systems strictly speaking two separate events still failure adapt change outside computing milieu cited one reason 1980s ai winter several philosophers cognitive scientists computer scientists speculated ai might failed lies future hubert dreyfus highlighted flawed assumptions ai research past early 1966 correctly predicted first wave ai research would fail fulfill public promises making critics like noam chomsky argued ai headed wrong direction part heavy reliance statistical techniques chomsky comments fit larger debate peter norvig centered around role statistical methods ai exchange two started comments made chomsky symposium mit norvig wrote response
[ 7048, 9975, 9103, 9231, 538, 10557, 4799, 9665, 10320, 10452, 2901, 7780, 6502, 8046, 124, 11255, 10104, 3323, 7164 ]
Test
3,390
4
Anti-worm:anti-worm anti-worm sometimes helpful worm computer worm designed something author feels helpful though necessarily permission executing computer owner concept anti-worm helpful worm proactive method dealing virus computer worm outbreaks type worm delivers payload helpful actions instead malicious actions like malicious computer worms anti-worms reach computers scanning ip ranges placing copy vulnerable hosts anti-worm patches computer vulnerability uses affected computer find vulnerable hosts anti-worms ability spread fast regular computer worms utilizing scan infect repeat model malicious computer worms use anti-worms used combat effects code red blaster santy worms welchia example helpful worm utilizing deficiencies exploited blaster worm welchia infected computers automatically began downloading microsoft security updates windows without users consent welchia automatically reboots computers infects installing updates one updates patch fixed exploit examples helpful worms den_zuko cheeze codegreen millenium santy worm released shortly christmas 2004 spread quickly using google search vulnerable versions phpbb worm exploited bug phpbb software infect host defacing website deleting messages stored forums worm poised spread hundreds thousands websites running phpbb forum approximately 10 days worm launch someone released another worm combat santy worm patch vulnerable phpbb forum anti-santy worm spread quickly affecting thousands servers running phpbb anti-santy worm however caused problems many site administrators reported anti-worm crashed systems flooding requests resulting denial-of-service attack still others reported patch work whether anti-worm significant positive impact curtailing spread santy worm unknown within several hours santy release google blocked search string worm using find vulnerable hosts thus worm could find new hosts infect way determine google actions anti-santy worm protect hosts many computer security experts denounced so-called anti-worm position code run system without system owner consent even though anything malicious helpful worms log events automatically reboot computer without user consent part installation process put strain network spread download updates worm code even author good intentions wreak havoc network overflow traffic capacity network author know exact configuration systems code run could render system useless intended purpose jurisdictions computer crime laws covering worms distinguish worms anti-worms though factors take account considering whether prosecute author code
[ 2409, 3852, 6797, 2041, 2811, 2558 ]
Test
3,391
4
Cross-application_scripting:cross-application scripting cross-application scripting cas vulnerability affecting desktop applications n't check input exhaustive way cas allows attacker insert data modifies behaviour particular desktop application makes possible extract data inside users systems attackers may gain full privileges attacked application exploiting cas vulnerabilities attack degree independent underlying operating system hardware architecture initially discovered emanuele gentili presented two researchers alessandro scoscia emanuele acri participated study technique implications presented first time security summit 2010 milan format string attack similar concept attack cas could considered generalization attack method aspects technique previously demonstrated clickjacking techniques like web interfaces modern frameworks realization graphical applications particular gtk+ qt allow use tags inside widgets attacker gains possibility inject tags gains ability manipulate appearance behaviour application exactly phenomenon seen use cross-site scripting xss web pages kind behavior named cross-application scripting cas typically desktop applications get considerable amount input support large number features certainly web interface makes harder developer check whether input program might get untrusted sources filtered correctly cross-application scripting application equivalent xss web applications cross-application request forgery carf equivalent cross-site request forgery csrf desktop applications carf concept “ link ” “ protocol ” inherited web extended involves components graphical environment cases operating system exploiting vulnerabilities amenable csrf requires interaction user requirement n't particularly limiting user easily led execute certain actions graphical interface altered right way many misleading changes look applications obtained use cas new kind “ phishing ” whose dangerousness amplified lack tools detect kind attack outside websites emails contrast xss techniques manipulate later execute commands users browser cas possible talk directly operating system graphical interface
[ 2878, 4198, 7044, 2470 ]
Test
3,392
4
ITIL_security_management:itil security management itil security management originally information technology infrastructure library describes structured fitting security organization itil security management based iso 27001 standard iso/iec 27001:2005 covers types organizations e.g commercial enterprises government agencies not-for profit organizations iso/iec 27001:2005 specifies requirements establishing implementing operating monitoring reviewing maintaining improving documented information security management system within context organization overall business risks specifies requirements implementation security controls customized needs individual organizations parts thereof iso/iec 27001:2005 designed ensure selection adequate proportionate security controls protect information assets give confidence interested parties basic concept security management information security primary goal information security control access information value information must protected values include confidentiality integrity availability inferred aspects privacy anonymity verifiability goal security management comes two parts slas define security requirements along legislation applicable contracts requirements act key performance indicators kpis used process management interpreting results security management process security management process relates itil-processes however particular section obvious relations relations service level management incident management change management processes security management continuous process compared w. edwards deming quality circle plan check act inputs requirements clients requirements translated security services security metrics client plan sub-process affect sla sla input client process provider develops security plans organization plans contain policies operational level agreements security plans plan implemented implementation evaluated check evaluation plans plan implementation maintained act activities results/products process documented external reports written sent clients clients able adapt requirements based information received reports furthermore service provider adjust plan implementation based findings order satisfy requirements stated sla including new requirements first activity security management process “ control ” sub-process control sub-process organizes manages security management process control sub-process defines processes allocation responsibility policy statements management framework security management framework defines sub-processes development implementation evaluations action plans furthermore management framework defines results reported clients meta-process model control sub-process based uml activity diagram gives overview activities control sub-process grey rectangle represents control sub-process smaller beam shapes inside represent activities take place inside meta-data model control sub-process based uml class diagram figure 2.1.2 shows metamodel control sub-process figure 2.1.2 meta-process model control sub-process control rectangle white shadow open complex concept means control rectangle consists collection sub concepts figure 2.1.3 process data model control sub-process shows integration two models dotted arrows indicate concepts created adjusted corresponding activities figure 2.1.3 process-data model control sub-process plan sub-process contains activities cooperation service level management lead information security section sla furthermore plan sub-process contains activities related underpinning contracts specific information security plan sub-process goals formulated sla specified form operational level agreements ola ola ’ defined security plans specific internal organization entity service provider besides input sla plan sub-process also works policy statements service provider said earlier policy statements defined control sub-process operational level agreements information security set implemented based itil process requires cooperation itil processes example security management wishes change infrastructure order enhance security changes done change management process security management delivers input request change change change manager responsible change management process plan consists combination unordered ordered sub activities sub-process contains three complex activities closed activities one standard activity control sub-process plan sub-process modeled using meta-modeling technique left side figure 2.2.1 meta-data model plan sub-process plan rectangle open complex concept aggregation type relationship two closed complex concepts one standard concept two closed concepts expanded particular context following picture figure 2.2.1 process-data diagram plan sub-process picture shows integration two models dotted arrows indicate concepts created adjusted corresponding activities plan sub-process figure 2.2.1 process-data model plan sub-process implementation sub-process makes sure measures specified plans properly implemented implementation sub-process measures defined changed definition change measures takes place plan sub-process cooperation change management process left side figure 2.3.1 meta-process model implementation phase four labels black shadow mean activities closed concepts expanded context arrows connect four activities meaning activities unordered reporting carried completion four activities implementation phase concepts created /or adjusted concepts created and/or adjusted modeled using meta-modeling technique right side figure 2.3.1 meta-data model implementation sub-process implementation documents open concept expanded upon context consists four closed concepts expanded irrelevant particular context order make relations two models clearer integration two models illustrated figure 2.3.1 dotted arrows running activities concepts illustrate concepts created/ adjusted corresponding activities figure 2.3.1 process-data model implementation sub-process evaluation necessary measure success implementation security plans evaluation important clients possibly third parties results evaluation sub-process used maintain agreed measures implementation evaluation results lead new requirements corresponding request change request change defined sent change management three sorts evaluation self-assessment internal audit external audit self-assessment mainly carried organization processes internal audits carried internal it-auditors external audits carried external independent it-auditors besides already mentioned evaluation based communicated security incidents occurs important activities evaluation security monitoring it-systems verify security legislation security plan implementation trace react undesirable use it-supplies figure 2.4.1 process-data model evaluation sub-process process-data diagram illustrated figure 2.4.1 consists meta-process model meta-data model evaluation sub-process modeled using meta-modeling technique dotted arrows running meta-process diagram left meta-data diagram right indicate concepts created/ adjusted corresponding activities activities evaluation phase standard activities short description evaluation phase concepts see table 2.4.2 concepts listed defined table 2.4.2 concept definition evaluation sub-process security management organizational it-infrastructure changes security risks change time requiring revisions security section service level agreements security plans maintenance based results evaluation sub-process insight changing risks activities produce proposals proposals either serve inputs plan sub-process travel cycle adopted part maintaining service level agreements cases proposals could lead activities action plan actual changes made change management process figure 2.5.1 process-data diagram implementation sub-process picture shows integration meta-process model left meta-data model right dotted arrows indicate concepts created adjusted activities implementation phase figure 2.5.1 process-data model maintenance sub-process maintenance sub-process starts maintenance service level agreements maintenance operational level agreements activities take place particular order request change request change activity take place request change activity concluded reporting activity starts request change reporting activity start directly first two activities concepts meta-data model created/ adjusted maintenance phase list concepts definition take look table 2.5.2 table 2.5.2 concept definition plan sub-process security management figure 2.6.1 complete process-data model security management process security management process stated introduction relations almost itil-processes processes within processes activities concerning security required concerning process process manager responsible activities however security management gives indications concerning process structure activities internal e-mail subject multiple security risks requiring corresponding security plan policies example itil security management approach used implement e-mail policies security management team formed process guidelines formulated communicated employees providers actions carried control phase subsequent planning phase policies formulated policies specific e-mail security formulated added service level agreements end phase entire plan ready implemented implementation done according plan implementation policies evaluated either self-assessments via internal external auditors maintenance phase e-policies adjusted based evaluation needed changes processed via requests change
[ 5373, 3125 ]
None
3,393
4
Md5deep:md5deep md5deep software package used computer security system administration computer forensics communities run large numbers files several different cryptographic digests originally authored jesse kornblum time special agent air force office special investigations still maintains name md5deep misleading version 2.0 md5deep package contains several different programs able perform md5 sha-1 sha-256 tiger192 whirlpool digests named digest type followed word deep thus name may confuse people thinking provides md5 algorithm package supports many md5deep invoked several different ways typically users operate recursively md5deep walks one directory time giving digests file found recursing subdirectories within recursive behavior approximately depth-first search benefit presenting files lexicographical order unix-like systems similar functionality often obtained combining find hashing utilities md5sum sha256sum tthsum md5deep exists windows unix-based systems including os x present os x fink homebrew macports projects binary packages exist free unix systems many vendors initially resist including md5deep mistakenly believe functions reproduced one line shell scripting matching function program however done easily shell md5deep written employee u.s. government government time public domain software surrounding graphical front-ends may copyrighted
[ 2432, 4834, 1379, 741, 9319, 5612, 6797, 7983, 9487, 5492, 5397, 11221, 6238, 2558 ]
None
3,394
2
Local_Security_Authority_Subsystem_Service:local security authority subsystem service local security authority subsystem service lsass process microsoft windows operating systems responsible enforcing security policy system verifies users logging windows computer server handles password changes creates access tokens also writes windows security log forcible termination lsass.exe result welcome screen losing accounts prompting restart machine lsass.exe crucial system file name often faked malware lsass.exe file used windows located directory codice_1 running location lsass.exe likely virus spyware trojan worm due way systems display fonts malicious developers may name file something like isass.exe capital instead lowercase l efforts trick users installing executing malicious file instead trusted system file
[ 10756, 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 7207, 1577, 10281, 2101, 7739, 10812, 3648, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 93, 3170, 622, 9839, 4210, 7796, 1656, 6265, 7290, 4731, 10879, 88...
Validation
3,395
2
Linux_malware:linux malware linux malware includes viruses trojans worms types malware affect linux operating system linux unix unix-like computer operating systems generally regarded well-protected immune computer viruses 2018 yet single widespread linux virus malware infection type common microsoft windows attributable generally malware lack root access fast updates linux vulnerabilities like unix systems linux implements multi-user environment users granted specific privileges form access control implemented gain control linux system cause serious consequences system malware would gain root access system past suggested linux little malware low market share made less profitable target rick moen experienced linux system administrator counters 2008 quantity malware targeting linux noted increasing shane coursen senior technical consultant kaspersky lab said time growth linux malware simply due increasing popularity particularly desktop operating system ... use operating system directly correlated interest malware writers develop malware os tom ferris researcher security protocols commented one kaspersky reports stating people minds non-windows secure case think nobody writes malware linux mac os x necessarily true linux users run linux-based anti-virus software scan insecure documents email comes going windows users securityfocus scott granneman stated predominantly used mail servers may send mail computers running operating systems linux virus scanners generally use definitions scan known viruses computer platforms example open source clamav detects ... viruses worms trojans including microsoft office macro viruses mobile malware threats viruses listed pose potential although minimal threat linux systems infected binary containing one viruses run system would temporarily infected linux kernel memory resident read-only infection level would depend user privileges ran binary binary run root account would able infect entire system privilege escalation vulnerabilities may permit malware running limited account infect entire system worth noting true malicious program run without special steps taken limit privileges trivial add code snippet program user may download let additional code download modified login server open mail relay similar program make additional component run time user logs special malware writing skills needed special skill may needed tricking user run trojan program first place use software repositories significantly reduces threat installation malware software repositories checked maintainers try ensure repository malware-free subsequently ensure safe distribution software checksums made available make possible reveal modified versions may introduced e.g hijacking communications using man-in-the-middle attack via redirection attack arp dns poisoning careful use digital signatures provides additional line defense limits scope attacks include original authors package release maintainers possibly others suitable administrative access depending keys checksums handled reproducible builds ensure digitally signed source code reliably transformed binary application classical threat unix-like systems vulnerabilities network daemons ssh web servers used worms attacks specific targets servers patched quite quickly vulnerability found widespread worms kind specific targets attacked vulnerability publicly known guarantee certain installation secure also servers without vulnerabilities successfully attacked weak passwords linux servers may also used malware without attack system e.g web content scripts insufficiently restricted checked used malware attack visitors attacks use complicated malware attack linux servers get full root access hackers able attack modifying anything like replacing binaries injecting modules may allow redirection users different content web typically cgi script meant leaving comments could mistake allow inclusion code exploiting vulnerabilities web browser older linux distributions relatively sensitive buffer overrun attacks program care size buffer kernel provided limited protection allowing attacker execute arbitrary code rights vulnerable application attack programs gain root access even launched non-root user via setuid bit particularly attractive attack however 2009 kernels include address space layout randomization aslr enhanced memory protection extensions making attacks much difficult arrange area concern identified 2007 cross-platform viruses driven popularity cross-platform applications brought forefront malware awareness distribution openoffice.org virus called badbunny stuart smith symantec wrote following makes virus worth mentioning illustrates easily scripting platforms extensibility plug-ins activex etc abused often forgotten pursuit match features another vendor ... ability malware survive cross-platform cross-application environment particular relevance malware pushed via web sites long someone uses something like drop javascript infecter web server regardless platform case operating system linux vulnerable malware tricks user installing social engineering december 2009 malicious waterfall screensaver contained script used infected linux pc denial-of-service attacks discovered number anti-virus applications available run linux operating system applications looking exploits could affect users microsoft windows applications useful computers typically servers pass files ms windows users look linux-specific threats applications look actual threats linux computers running linux malware also detected analyzed using memory forensics tools following following partial list known linux malware however wild rendered obsolete linux updates never threat known malware even important threat new malware attacks directed specific sites use vulnerabilities previously unknown community unused malware
[ 3072, 5636, 10245, 10756, 9227, 9233, 9242, 10780, 9761, 3618, 9256, 9771, 5176, 10297, 3643, 7739, 9791, 1088, 10817, 4165, 8805, 107, 7804, 5245, 127, 7809, 6786, 131, 5764, 7812, 8326, 9353, 9356, 6797, 2195, 4245, 10392, 1690, 11418, ...
None
3,396
3
Eddie_Kidd_Jump_Challenge:eddie kidd jump challenge eddie kidd jump challenge stunt bike video game released acorn electron bbc micro commodore 64 msx zx spectrum first released 1984 licensed british stunt performer eddie kidd player takes role eddie kidd must make series jumps like real kidd player must start jumping bmx oil barrels work jumping cars motorbike player starts riding away jump get big enough run must set correct speed correctly selecting gears hit ramp enough speed clear obstacles much miss landing ramp air player lean forward back land correctly game first released late 1984 zx spectrum published software communications martech label version ported msx 1985 similar version released bbc micro acorn electron modified version game much zoomed camera angle screen display released commodore 64 also 1985 game cassette came sticker numbered competition entry card could used win prizes including bmx bikes computers tvs game reissued budget price part mastertronic ricochet label 1987 crash gave game overall score 56 concluding good simulation game exciting particularly addictive difficulty curve criticised early bmx-based levels skipped described doddle skill mastered game holds challenge clare edgeley sinclair user agreed replay bmx section failing advanced jumps seems waste time gave similar score 6/10 computer video games gave scores 7/10 8/10 particularly praising zoomed graphics improved sound commodore 64 version calling superb outshining spectrum game miles
[ 10931, 9006 ]
Test
3,397
0
Automated_Similarity_Judgment_Program:automated similarity judgment program automated similarity judgment program asjp collaborative project applying computational approaches comparative linguistics using database word lists database open access consists 40-item basic-vocabulary lists well half world languages continuously expanded addition isolates languages demonstrated genealogical groups database includes pidgins creoles mixed languages constructed languages words database transcribed simplified standard orthography asjpcode database used estimate dates language families diverged daughter languages method related still different glottochronology determine homeland urheimat proto-language investigate sound symbolism evaluate different phylogenetic methods several purposes asjp originally developed means objectively evaluating similarity words meaning different languages ultimate goal classifying languages computationally based lexical similarities observed first asjp paper two semantically identical words compared languages judged similar showed least two identical sound segments similarity two languages calculated percentage total number words compared judged similar method applied 100-item word lists 250 languages language families including austroasiatic indo-european mayan muskogean asjp consortium founded around 2008 came involve around 25 professional linguists interested parties working volunteer transcribers and/or extending aid project ways main driving force behind founding consortium cecil h. brown søren wichmann daily curator project third central member consortium eric w. holman created software used project word lists used originally based 100-item swadesh list statistically determined subset 40 100 items produced good slightly better classificatory results whole list subsequently word lists gathered contain 40 items less attestations lacking papers published since 2008 asjp employed similarity judgment program based levenshtein distance ld approach found produce better classificatory results measured expert opinion method used initially ld defined minimum number successive changes necessary convert one word another change insertion deletion substitution symbol within levenshtein approach differences word length corrected dividing ld number symbols longer two compared words produces normalized ld ldn ldn divided ldnd two languages calculated dividing average ldn word pairs involving meaning average ldn word pairs involving different meanings second normalization intended correct chance similarity asjp uses following 40-word list similar swadesh–yakhontov list differences asjp version 2016 uses following symbols encode phonemes p b f v w 8 z c n r l z c j 5 k g x n q x h 7 l 4 g e e 3 u represent 7 vowels 34 consonants found standard qwerty keyboard
[]
Test
3,398
1
Serializability:serializability concurrency control databases transaction processing transaction management various transactional applications e.g. transactional memory software transactional memory centralized distributed transaction schedule serializable outcome e.g. resulting database state equal outcome transactions executed serially i.e without overlapping time transactions normally executed concurrently overlap since efficient way serializability major correctness criterion concurrent transactions executions considered highest level isolation transactions plays essential role concurrency control supported general purpose database systems strong strict two-phase locking ss2pl popular serializability mechanism utilized database systems various variants since early days 1970s serializability theory provides formal framework reason analyze serializability techniques though mathematical nature fundamentals informally without mathematics notation introduced serializability used keep data data item consistent state serializability property transaction schedule history relates isolation property database transaction schedules serializable likely generate erroneous outcomes well known examples transactions debit credit accounts money related schedules serializable total sum money may preserved money could disappear generated nowhere violations possibly needed invariant preservations caused one transaction writing stepping erasing written another transaction become permanent database happen serializability maintained specific order transactions requested application enforced independently underlying serializability mechanisms mechanisms typically indifferent specific order generate unpredictable partial order typically compatible multiple serial orders transactions partial order results scheduling orders concurrent transactions data access operations depend many factors major characteristic database transaction atomicity means either commits i.e. operations results take effect database aborts rolled-back operations results effect database nothing semantics transaction real systems transactions abort many reasons serializability sufficient correctness schedules also need possess recoverability abort property recoverability means committed transactions read data written aborted transactions whose effects exist resulting database states serializability currently compromised purpose many applications better performance cases application correctness harmed compromising recoverability would quickly violate database integrity well transactions results external database schedule recoverability property recoverable schedule recovers aborts i.e. aborts harm integrity committed transactions resulting database false without recoverability likely integrity violations resulting incorrect database data need special typically manual corrective actions database implementing recoverability general form may result cascading aborts aborting one transaction may result need abort second transaction third results waste already partially executed transactions may result also performance penalty avoiding cascading aborts aca cascadelessness special case recoverability exactly prevents phenomena often practice special case aca utilized strictness strictness allows efficient database recovery failure note recoverability property needed even database failure occurs database recovery failure needed rather needed correctly automatically handle aborts may unrelated database failure recovery failure many applications unlike finances absolute correctness needed example retrieving list products according specification cases matter much product whose data updated short time ago appear list even meets specification typically appear list tried short time later commercial databases provide concurrency control whole range isolation levels fact controlled serializability violations order achieve higher performance higher performance means better transaction execution rate shorter average transaction response time transaction duration snapshot isolation example popular widely utilized efficient relaxed serializability method many characteristics full serializability still short unfit many situations another common reason nowadays distributed serializability relaxation see requirement availability internet products services requirement typically answered large-scale data replication straightforward solution synchronizing replicas updates database object including updates single atomic distributed transaction however many replicas transaction large may span enough number several computers networks likely unavailable thus transaction likely end abort miss purpose consequently optimistic replication lazy replication often utilized e.g. many products services google amazon yahoo like serializability relaxed compromised eventual consistency case relaxation done applications expected harmed technique classes schedules defined relaxed serializability properties either contain serializability class incomparable mechanisms enforce serializability need execute real time almost real time transactions running high rates order meet requirement special cases serializability sufficient conditions serializability enforced effectively utilized two major types serializability exist view-serializability conflict-serializability view-serializability matches general definition serializability given conflict-serializability broad special case i.e. schedule conflict-serializable also view-serializable necessarily opposite conflict-serializability widely utilized easier determine covers substantial portion view-serializable schedules determining view-serializability schedule np-complete problem class problems difficult-to-compute excessively time-consuming known solutions operations upon data read write write either insert modify delete two operations conflicting different transactions upon datum data item least one write pair conflicting operations conflict type either read-write write-read write-write conflict transaction second operation pair said conflict transaction first operation general definition conflicting operations also complex operations may consist several simple read/write operations requires noncommutative changing order also changes combined result operation needs atomic using proper system support order considered operation commutativity check example read-read operations commutative unlike read-write possibilities thus read-read conflict another complex example operations increment decrement counter write operations modify counter need considered conflicting write-write conflict type since commutative thus increment-decrement conflict e.g. already supported old ibm ims fast path precedence time order pairs conflicting non-commutative operations important checking equivalence serial schedule since different schedules consisting transactions transformed one another changing orders different transactions operations different transactions interleaving since changing orders commutative operations non-conflicting change overall operation sequence result i.e. schedule outcome outcome preserved order change non-conflicting operations typically conflicting operations change order means schedule transformed serial schedule without changing orders conflicting operations changing orders non-conflicting preserving operation order inside transaction outcome schedules schedule conflict-serializable definition conflicts reason blocking transactions delays non-materialized conflicts aborting transactions due serializability violation prevention possibilities reduce performance thus reducing number conflicts e.g. commutativity possible way increase performance transaction issue/request conflicting operation conflict another transaction conflicting operation delayed executed e.g. blocked lock executed materialized conflicting operations relevant conflict serializability see schedule compliance conflict serializability tested precedence graph serializability graph serialization graph conflict graph committed transactions schedule directed graph representing precedence transactions schedule reflected precedence conflicting operations transactions following observation key characterization conflict serializability cycles committed transactions prevented aborting undecided neither committed aborted transaction cycle precedence graph transactions otherwise turn cycle committed transactions committed transaction aborted one transaction aborted per cycle required sufficient number break eliminate cycle aborts possible happen mechanisms unnecessary serializability probability cycle generation typically low nevertheless situation carefully handled typically considerable amount overhead since correctness involved transactions aborted due serializability violation prevention restarted executed immediately serializability-enforcing mechanisms typically maintain precedence graph data structure rather prevent break cycles implicitly e.g. ss2pl strong strict two-phase locking ss2pl common mechanism utilized database systems since early days 1970s ss name ss2pl newer though enforce conflict serializability strictness special case recoverability allows effective database recovery failure schedule mechanism datum locked transaction accessing read write operation item marked associated lock certain type depending operation performed specific transaction implementation various models different lock types exist models locks may change type transaction life result access another transaction may blocked typically upon conflict lock delays completely prevents conflict materialized reflected precedence graph blocking conflicting operation depending lock type transaction access operation type employing ss2pl mechanism means locks data behalf transaction released transaction ended either committed aborted ss2pl name resulting schedule property well also called rigorousness ss2pl special case proper subset two-phase locking 2pl mutual blocking transactions results deadlock execution transactions stalled completion reached thus deadlocks need resolved complete transactions execution release related computing resources deadlock reflection potential cycle precedence graph would occur without blocking conflicts materialized deadlock resolved aborting transaction involved potential cycle breaking cycle often detected using wait-for graph graph conflicts blocked locks materialized also defined graph non-materialized conflicts conflicts materialized reflected precedence graph affect serializability indicates transaction waiting release one locks transaction transactions cycle graph means deadlock aborting one transaction per cycle sufficient break cycle transactions aborted due deadlock resolution restarted executed immediately known mechanisms include conflict serializability techniques general form provide recoverability special enhancements needed adding recoverability concurrency control techniques three major types main differences technique types conflict types generated pessimistic method blocks transaction operation upon conflict generates non-materialized conflict optimistic method block generates materialized conflict semi-optimistic method generates conflict types conflict types generated chronological orders transaction operations invoked independently type conflict cycle committed transactions materialized conflicts precedence graph conflict graph represents serializability violation avoided maintaining serializability cycle non-materialized conflicts wait-for graph represents deadlock situation resolved breaking cycle cycle types result conflicts broken technique type conflicts detected considered similar overhead materialized non-materialized conflicts typically using mechanisms like locking either blocking locks blocking recording conflict materialized conflicts blocking method typically context switching occurs upon conflict additional incurred overhead otherwise blocked transactions related computing resources remain idle unutilized may worse alternative conflicts occur frequently optimistic methods typically advantage different transaction loads mixes transaction types one technique type i.e. either optimistic pessimistic may provide better performance unless schedule classes inherently blocking i.e. implemented without data-access operations blocking e.g. 2pl ss2pl sco see chart also implemented using optimistic techniques e.g. serializability recoverability multi-version concurrency control mvcc common way today increase concurrency performance generating new version database object time object written allowing transactions read operations several last relevant versions object depending scheduling method mvcc combined serializability techniques listed except serializablesi originally mvcc-based utilized general-purpose dbms products mvcc especially popular nowadays relaxed serializability see method snapshot isolation si provides better performance known serializability mechanisms cost possible serializability violation certain cases serializablesi efficient enhancement si make serializable intended provide efficient serializable solution serializablesi analyzed via general theory mvcc distributed serializability serializability schedule transactional distributed system e.g. distributed database system system characterized distributed transactions also called global transactions i.e. transactions span computer processes process abstraction general sense depending computing environment e.g. operating system thread possibly network nodes distributed transaction comprises one several local sub-transactions states described database transaction local sub-transaction comprises single process processes typically fail together e.g. single processor core distributed transactions imply need atomic commit protocol reach consensus among local sub-transactions whether commit abort protocols vary simple one-phase handshake among processes fail together sophisticated protocols like two-phase commit handle complicated cases failure e.g. process node communication etc failure distributed serializability major goal distributed concurrency control correctness proliferation internet cloud computing grid computing small portable powerful computing devices e.g. smartphones need effective distributed serializability techniques ensure correctness among distributed applications seems increase distributed serializability achieved implementing distributed versions known centralized techniques typically distributed versions require utilizing conflict information either materialized non-materialized conflicts equivalently transaction precedence blocking information conflict serializability usually utilized generated locally rather different processes remote locations thus information distribution needed e.g. precedence relations lock information timestamps tickets distributed system relatively small scale message delays across system small centralized concurrency control methods used unchanged certain processes nodes system manage related algorithms however large-scale system e.g. grid cloud due distribution information substantial performance penalty typically incurred even distributed versions methods vs. centralized ones used primarily due computer communication latency also information distributed related techniques typically scale well well-known example respect scalability problems distributed lock manager distributes lock non-materialized conflict information across distributed system implement locking techniques
[ 9224, 11024, 7446, 1049, 5658, 7581, 1701, 7983, 1083, 9663, 5441, 5956, 3398, 5452, 4308, 2901, 10201, 8539, 4194, 11620, 1382, 9069, 11377, 3326 ]
Test
3,399
5
AICCU:aiccu aiccu automatic ipv6 connectivity client utility popular cross-platform utility automatically configuring ipv6 tunnel free software available bsd license utility originally provided sixxs tunnel broker also used variety tunnel brokers aiccu written maintained jeroen massar various patches persons incorporated persons acknowledged field contributions aiccu successor windows-only linux/bsd-variety heartbeat tool provided sixxs solely use heartbeat protocol ayiya protocol came existence decided support new protocol would better merge windows unix trees one program give better appearance name heartbeat tool changed reflect providing mere support heartbeats aiccu award excellence implementation category 2004 edition ipv6 application contest following tunneling protocols currently supported aiccu primarily uses tic protocol retrieve configuration parameters tunnel automatically user wants configured aiccu finds available tunnel brokers looking txt dns records _aiccu.sixxs.net latter allows local network add tunnel broker adding records domains configured search path non-local tunnel brokers added requesting sixxs staff add entry global dns records following operating systems/platforms/distributions supported aiccu various distributions aiccu package included distribution main usage aiccu combination sixxs tunnel broker service isps implemented parts protocols aiccu support instance czech isp netbox uses aiccu configure tunnels automatically users providing tic tunnel information control protocol implementation ignores username/password/tunnel_id uses source address tic connection originates determine return tunnel configuration using tic protocol aiccu uses configure tunnel
[ 9320, 5612, 6797, 9868, 7983, 823, 6361, 2045, 5470 ]
Train
3,400
1
Empress_Embedded_Database:empress embedded database empress embedded database relational database management system embedded applications including medical systems network routers nuclear power plant monitors satellite management systems empress acid compliant relational database management system rdbms two-phase commit several transaction isolation levels real-time embedded applications supports persistent in-memory storage data works text binary multimedia well traditional data first version empress created john kornatowski ivor ladd 1979 originally named mistress based research done mrs microcomputer database management system university toronto published association computing machinery sigsmall sigmod 1981 commercial version one first available relational database management systems rdbms named empress first customer ship early 1981 empress first commercial database available linux linux release dates back early 1995 empress supports many application programming interfaces several programming languages c programming language apis including low-level kernel mr routines embedded sql mscall odbc also apis c++ java layered architecture design provides levels system optimization application development applications developed using apis may run standalone and/or server modes empress runs major android linux- real-time- windows-supported platforms
[ 10048, 321, 9353, 10921, 5612, 3629, 10286, 7983, 10413, 5492, 10389, 823, 1304, 8188 ]
None
3,401
8
Analog_(program):analog program analog free web log analysis computer program runs windows mac os linux unix-like operating systems first released june 21 1995 stephen turner generic freeware license changed gnu general public license november 2004 software downloaded several computing platforms source code downloaded compiled desired analog support 35 languages provides ability reverse dns lookups log files indicate web site hits originate analyze several different types web server logs including apache iis iplanet 200 configuration options generate 32 reports also supports log files multiple virtual hosts program comparable webalizer awstats though use many images preferring stick simple bar charts lists communicate similar information analog export reports number formats including html xhtml xml latex delimited output mode example csv importing programs delimited computer output analog often used generate structured graphically rich reports using third party report magic program popularity analog largely unknown download count information released historic dissemination 1998 survey graphic visualization usability center gvu analog reportedly used 24.9 19.9 year nearest rival web trends holding 20.3 market clear analog usage changed decade leading 2010 usage profile impacted on-line analysis services google analytics analog operate individual web-farm basis single process requiring modification web page web script code order use stand-alone utility possible visiting clients block logging traffic directly client analog officially updated since version 6.0 release december 2004 original author moved commercial traffic analysis updates analog continued informally user community end 2009 official mailing list currently formally compiled updated redistributable analog analog ce focused fixing issues analog xml dtd adding new operating system web browser detection original code branch analog first released june 1995 research project creator dr. stephen turner working research fellow sidney sussex college university cambridge larger release milestones include full list changes release recorded analog new changelog full list changes maintenance release recorded analog c amie edition page
[ 4640, 865, 10814, 10604, 823, 6797, 7983, 8941, 5397, 1943, 4439 ]
None
3,402
9
Toi_(programming_language):toi programming language toi imperative type-sensitive language provides basic functionality programming language language designed developed ground-up paul longtine written c toi created intent educational experience serves learning tool toy hence name looking familiarize inner-workings programming language 0 void null data runtime context keeps track individual threads metadata context gives definition 'environment code executed key part operational computer language notion 'namespace notion 'namespace refers ability declare name along needed metadata call upon name retrieve values associated name definition namespace provide following key mechanisms scope argument single byte format follows scopes handled referencing either global scope local scope local scope denoted 0 scope argument referring names scope initialized evaluating new block code different block code called new scope added new namespace level namespace levels act context switches within function contexts example local namespace must 'returned local namespace context needs preserved return pushing 'namespace levels ensures every n function calls traverse n instances previous namespaces example take namespace level graphic level namespace instance function called another namespace level created local level increases like global scope names lsb == 1 scope argument persistent runtime handle function definitions objects names declared global scope local level references scope argument 0 refer accessing names namespace argument refers namespace variable exists namespace argument equals 0 current namespace referenced global namespace 1 default namespaces must declared using variables definition provide following mechanisms given variable v v defines following attributes variable handled generic container previous section notion namespace levels introduced much like names scoped generic variable containers must communicate scope terms location within given set scopes called 'ownership given runtime variable containers exist following structures stack instance bytecode arguments namespaces concept ownership differentiates variables existing one structures set place prevent accidental deallocation variable containers copied instead passed references structures functions virtual machine pointer set instructions program metadata parameters defined paradigm objects units encapsulate separate namespace collection methods bytecode arranged following order opcode single byte denoting subroutine call following arguments executed different opcodes different argument lengths 0 arguments others 3 arguments bytecode instruction single-byte opcode followed maximum 3 arguments following forms specification instructions short description instruction instruction category keywords 1 stack manipulation 2 variable management 3 type management types air moment 'll detail types time comes 4 binary ops ops take two top elements stack perform operation push result stack 5 conditional expressions things comparison forth behaves like arithmetic instructions besides instruction pushes boolean tos 6 loops 7 code flow instructions dictate code flow 8 generic object interface expects object tos f functions/classes 0 special bytes going code bytecode section first abstract notation code broken binary tree node argument parent node next instruction instruction nodes nodes produce instruction multiple based bytecode interpretation instruction example line code would translate functions expressed individual binary trees root file treated individual binary tree also function various instruction nodes follows various instruction nodes within tree call specific functions take arguments specified lookahead lookbehind formulate correct bytecode equivalent developer language paul longtine operates publicly available website blog called banna.tech named online alias 'banna
[ 1952, 5635, 8262, 655, 372 ]
Test
3,403
3
LGA_2066:lga 2066 lga 2066 also called socket r4 cpu socket intel debuted skylake-x kaby lake-x cascade lake-x processors june 2017 2018 replaces intel lga 2011-3 r3 performance high-end desktop workstation platforms based x299 basin falls c422 chipsets lga 3647 socket p replace lga 2011-3 r3 server platforms based skylake-sp xeon purley desktop processors lga 2066 socket listed table
[ 3588, 5901, 5649, 5523, 2455, 3992, 8855, 11417, 3995, 4252, 6175, 7714, 10019, 4523, 2604, 2350, 6192, 9649, 4537, 7105, 4805, 7110, 8394, 4427, 4179, 2516, 3798, 4185, 7002, 9945, 10715, 11484, 9570, 10468, 613, 1000, 8552, 1260, 4717, ...
None
3,404
2
OpenBSD_Journal:openbsd journal openbsd journal online newspaper dedicated coverage openbsd software related events openbsd journal founded 2000 operated 1 april 2004 1 april 2004 editors james phillips jose nazario announced site ceased operation daniel hartmeier backed contents journal order preserve investigation articles structure lead creation cgi-based engine would enable access deadly.org content backup server consequently functionality adding new articles implemented previous editors allowed re-publish articles openbsd journal therefore reintroduced 9 april 2004 openbsd journal widely recognized openbsd-related information primary reporter events hackathons site also hosts openbsd developers blogs current editors openbsd journal
[ 3975, 9223, 2825, 3465, 10631, 1932, 2193, 274, 7702, 10105, 6702, 9520, 11698, 2485, 2245, 1993, 8778, 11086, 5970, 5084, 735, 865, 7139, 1637, 4071, 5230, 119, 1785, 8954, 7547 ]
None
3,405
7
OpSource:opsource opsource inc. cloud managed services hosting company headquartered santa clara california company also offices ashburn virginia ireland india data centers california virginia united kingdom opsource part ict company dimension data acquired opsource 2011 cloud business unit 2002 michael piacente dan rasmussen john rowell treb ryan founded opsource sunnyvale california company initially began provide application support microsoft hotmail product customers 2005 term software service saas becoming popular opsource began focus saas helping isvs focus software development marketing sales part product opsource created saas enablement product helped isvs adobe business objects bmc take product market created saas incubation program small businesses 2006 opsource launched annual saas summit conference held san francisco area since 2010 event renamed cloud presented conjunction software information industry association 2009 opsource released cloud computing service bills utility computing basis opsource received 56.5m funding artiman ventures crosslink capital intel capital key venture partners ntt nippon telegraph telephone corporation velocity mark spagnolo past ceo uunet flag telecom universal access metromedia fiber network chairman board opsource acquired dublin ireland based lecayla technologies 2008 founded 2004 lecayla technologies metering billing services allowed isvs offer software applications utility perpetual licensing hybrid pricing basis june 30 2011 opsource inc. acquired dimension data holdings named steve nola ceo dimension data cloud solutions new division included opsource opsource two main products managed hosting cloud computing managed hosting dedicated hosting service support multiple applications operating systems databases originally called optimal on-demand services designed support software service market opsource offers 100 uptime guarantee customers host applications managed hosting product cloud computing delivered infrastructure service offering cloud computing customers physical infrastructure instead avoiding capital expenditure renting usage third-party provider consume resources service pay resources use utility computing model paying services consumed opsource cloud offers 100 network uptime 1ms intra network latency guarantee opsource cloud product competes similar offerings rackspace amazon ibm service levels receive support via usual means e-mail telephone ticket systems designed fit needs different businesses 2010 always demand top 100 category winner br 2010 top 20 coolest cloud vendors
[ 4194, 6856, 3819, 4429, 4655, 10194, 467, 3323 ]
Validation
3,406
3
SVI-728:svi-728 svi-728 first home computer spectravideo complied fully msx home computer specification introduced 1985 design virtually identical earlier sv-328 comply fully msx standard svi-738 portable version computer
[ 4257, 10658, 1801, 9006, 7983, 1776, 9998, 1403, 9947 ]
None
3,407
8
KHTML:khtml khtml browser engine developed kde project engine used konqueror web browser although seen significant development since 2016 still actively maintained engines descended khtml used world widely used browsers among google chrome safari opera vivaldi microsoft edge switch chromium distributed terms gnu lesser general public license khtml free software built kparts framework written c++ khtml relatively good support web standards render many pages possible extra abilities quirks internet explorer also supported even though non-standard khtml preceded earlier engine called khtmlw kde html widget developed torben weis martin jones implemented support html 3.2 http 1.0 html frames w3c dom css scripting khtml came existence november 4 1998 copy khtmlw library slight refactoring addition unicode support changes support move qt 2 waldo bastian among work creating early version khtml real work khtml actually started may october 1999 realization choice facing project either significant effort move khtml forward use mozilla adding support scripting highest priority may 1999 lars knoll began research eye toward implementing w3c dom specification finally announcing august 16 1999 checked amounted complete rewrite khtml library — changing khtml use standard w3c dom internal document representation turn allowed beginnings javascript support added october 1999 integration harri porten kjs following shortly afterwards closing months 1999 first months 2000 knoll work antti koivisto dirk mueller add css support refine stabilize khtml architecture work completed march 2000 among things changes enabled khtml become second browser internet explorer correctly support hebrew arabic languages written right-to-left — mozilla support kde 2.0 first kde release october 23 2000 include khtml rendering engine new konqueror file web browser replaced monolithic kde file manager ksvg first developed 2001 nikolas zimmermann rob buis however 2003 decided fork then-current ksvg implementation two new projects kdom/ksvg2 improve state dom rendering khtml underneath formidable svg 1.0 render state kcanvas abstract rendering done within khtml/ksvg2 single shared library multiple backends e.g. cairo/qt etc. ksvg2 also part webkit following standards supported khtml engine khtml kjs adopted apple 2002 use safari web browser apple publishes source code fork khtml engine called webkit 2013 google began development fork webkit called blink
[ 3971, 3462, 8584, 7181, 7951, 543, 6694, 8621, 7346, 438, 4797, 3407, 4048, 6991, 4310, 11223, 7384, 2139, 8923, 4326, 487, 7399, 5101, 6257, 3828, 6389, 4728 ]
Validation
3,408
9
Phyllis_Fox:phyllis fox phyllis ann fox american mathematician computer scientist fox raised colorado undergraduate studies wellesley college earning b.a mathematics 1944 1944 1946 worked general electric operator differential analyser project earned second baccalaureate b.s electrical engineering university colorado 1948 moved graduate studies massachusetts institute technology earning m.s 1949 electrical engineering doctorate sc.d mathematics 1954 supervision chia-chiao lin time also worked assistant whirlwind project mit jay forrester 1954 1958 fox worked numerical solution partial differential equations univac computing center united states atomic energy commission courant institute mathematical sciences new york university 1958 following husband returned forester system dynamics research group mit became part team wrote dynamo programming language became collaborator first lisp interpreter principal author first lisp manual 1963 moved mit newark college engineering became full professor 1972 time also consulted bell labs moved 1973 work highly portable numerics library port retired bell labs 1984
[ 4992, 10752, 11269, 3334, 5751, 6919, 7562, 2062, 9231, 2577, 1301, 9749, 9877, 8728, 4633, 6556, 3869, 10012, 2335, 6047, 8226, 4516, 5031, 9128, 5803, 3119, 2225, 10547, 11255, 311, 2105, 7867, 6717, 4799, 5569, 6594, 8771, 4550, 7880, ...
Test
3,409
2
Android_Ice_Cream_Sandwich:android ice cream sandwich android ice cream sandwich ninth version android mobile operating system developed google unveiled october 19 2011 android 4.0 builds upon significant changes made tablet-only release android honeycomb effort create unified platform smartphones tablets android 4.0 focused simplifying modernizing overall android experience around new set human interface guidelines part efforts introduced new visual appearance codenamed holo built around cleaner minimalist design new default typeface named roboto also introduced number new features including refreshed home screen near-field communication nfc support ability beam content another user using technology updated web browser new contacts manager social network integration ability access camera control music playback lock screen visual voicemail support face recognition device unlocking face unlock ability monitor limit mobile data usage internal improvements android 4.0 received positive reviews critics praised cleaner revamped appearance operating system comparison previous versions along improved performance functionality however critics still felt android 4.0 stock apps still lacking quality functionality comparison third-party equivalents regarded operating system new features particularly face unlock feature gimmicks statistics issued google indicate 0.3 android devices accessing google play run ice cream sandwich following tablet-only release honeycomb announced google i/o 2011 next version android code named ice cream sandwich ics would emphasized providing unified user experience smartphones tablets june 2011 details also began surface surrounding new nexus phone samsung accompany ics would notably exclude hardware navigation keys android blog rootzwiki released photos august 2011 showing nexus running build ics depicting new application menu layout resembling honeycomb new interface blue-colored accenting official launch event android 4.0 new nexus phone originally scheduled october 11 2011 ctia trade show san diego however respect death apple co-founder steve jobs google samsung postponed event october 19 2011 hong kong android 4.0 launch device galaxy nexus officially unveiled october 19 2011 andy rubin explained 4.0 intended provide enticing intuitive user experience across smartphones tablets matias duarte google vice president design explained development ice cream sandwich based around question soul new machine user studies concluded existing android interface complicated thus prevented users empowered devices overall visual appearance android streamlined ice cream sandwich building upon changes made tablet-oriented android 3.0 first project google duarte admitted team cut back support smaller screens honeycomb prioritize sufficient tablet support wanted android oems stop silly things like taking phone ui stretching 10-inch tablet judging android major competitors duarte felt interface ios skeuomorphic kitschy windows phone metro design language looked much like airport lavatory signage operating systems tried hard enforce conformity without leaving room content express ice cream sandwich team aimed provide interface design guidelines would evoke modern appearance still allowing flexibility application developers characterized revised look ice cream sandwich toned geeky nerd quotient comparison honeycomb carried futuristic appearance compared critics aesthetics tron january 2012 following official launch ice cream sandwich duarte google launched android design portal features human interface guidelines best practices resources developers building android apps designed ice cream sandwich galaxy nexus first android device ship android 4.0 android 4.0.3 released december 16 2011 providing bug fixes new social stream api internal improvements day google began rollout ice cream sandwich predecessor galaxy nexus nexus s. however december 20 2011 nexus roll-out paused company could monitor feedback related update march 29 2012 android 4.0.4 released promising performance improvements camera screen rotation bug fixes google play services support 4.0 ended february 2019 user interface android4.0 represents evolution design introduced honeycomb although futuristic aesthetics honeycomb scaled back favor flatter cleaner feel neon blue accenting hard edges drop shadows depth ice cream sandwich also introduces new default system font roboto designed in-house replace droid font family roboto primarily optimized use high-resolution mobile displays new visual appearance ice cream sandwich implemented widget toolkit known holo ensure access holo style across devices—even use customized interface skin elsewhere android devices certified ship google play store formerly android market must provide capability apps use unmodified holo theme honeycomb devices render navigation buttons— back home recent apps —on system bar across bottom screen removing need physical equivalents menu button present previous generations android devices deprecated favor presenting buttons actions within apps action bars menu items fit bar action overflow menus designated three vertical dots hardware search buttons also deprecated favor search buttons within action bars devices without menu key temporary menu key displayed on-screen running apps coded support new navigation scheme devices use hardware menu key action overflow buttons hidden apps mapped menu key default home screen ice cream sandwich displays persistent google search bar across top screen dock across bottom containing app drawer button middle four slots app shortcuts alongside folders apps formed dragging app hovering another app drawer split two tabs one apps latter holding widgets placed home screen pages widgets resizable contain scrolling content android4.0 contains increased use swiping gestures apps notifications removed recent apps menu dismissed notifications area sliding away number stock google apps use new form tabs users navigate different panes either tapping name strip swiping left right phone app updated holo design ability send pre-configured text message responses response incoming calls visual voicemail integration within call log display web browser app incorporates updated versions webkit v8 supports syncing google chrome override mode loading desktop-oriented version website rather mobile-oriented version well offline browsing contacts section phone app split new people app offers integration social networks google+ display recent posts synchronize contacts profile device user camera app redesigned reduction shutter lag face detection new panorama mode ability take still photos video recorded camcorder mode photo gallery app contains basic photo editing tools lock screen supports face unlock includes shortcut launching camera app house playback controls music players keyboard incorporates improved autocomplete algorithms improvements voice input allow continuous dictation ability take screenshots holding power volume buttons together also added devices supporting near-field communication nfc android beam allows users share links content compatible apps holding back device back another nfc-equipped android device tapping screen prompted certain system apps particularly pre-loaded carriers uninstalled disabled hides application prevents launching application removed storage android4.0 introduced features managing data usage mobile networks users display total amount data used period time display data usage per-app background data usage disabled globally per-app basis cap set automatically disable data usage reaches certain quota calculated device android 4.0 inherits platform additions honeycomb also adds support ambient temperature humidity sensors bluetooth health device profile near-field communication nfc wi-fi direct operating system also provides improved support stylus mouse input along new accessibility calendar keychain spell checking social networking virtual private network apis multimedia support android4.0 also adds support adts aac matroska containers vorbis vp8 webp streaming vp8 openmax al http live streaming 3.0 android4.0 released positive reception ars technica praised holo user interface sense identity visual coherence previously lacking comparison previous versions android also believing new interface style could help improve quality third-party apps stock apps android4.0 also praised slightly better functionality comparison previous versions features noted improvements text voice input along data usage controls especially given increasing use metered data plans overall performance improvements comparison gingerbread however face unlock feature panned insecure gimmick although providing improved experience previous version stock applications email client panned still inferior third-party alternatives engadget also acknowledged maturing quality android experience ice cream sandwich praised modern feel new interface comparison android 2.3 along new features provided google stock apps operating system conclusion engadget felt android4.0 gorgeous os offers great performance and—for part—does n't feel like half-baked effort however engadget still felt android4.0 new features face unlock beta feel noted lack facebook integration new people app operating system still intuitive new users competitors pc magazine acknowledged influence windows phone 7 new people app improved benchmark performance web browser considered android beam face unlock gimmicks criticized lack support certain apps adobe flash launch
[ 5637, 8719, 3600, 7700, 9244, 11294, 1578, 10284, 5677, 1083, 6212, 69, 2630, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 5749, 8821, 11391, 2179, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3782, 890...
Test
3,410
2
XCOFF:xcoff xcoff extended coff improved expanded version coff object file format defined ibm used aix early versions powerpc macintosh also supported xcoff beos xcoff additions include use csects provide subsection granularity cross-references use stabs debugging information handling shared libraries also elaborate plain coff recently ibm defined xcoff64 version supporting 64-bit aix used xcoff32 mean original file format
[ 10176, 1922, 8037, 4712, 6664, 6921, 2672, 2804, 5492, 5557, 8700, 3386, 3323, 3324, 2942, 8959 ]
Validation
3,411
4
Alexander_Petrov_(hacker):alexander petrov hacker alexander petrov two men responsible ddos hire extortion multinational law enforcement group british american russian private individuals law enforcement agents captured alexander petrov two accomplices ivan maksakov denis stepanov three heading extortion ring extorting money various online services e.g banks internet casinos web based businesses reportedly damages caused ring millions dollars range october 8 2007 petrov maksakov stenanov found guilty sentenced eight years prison russian federation 100,000 ruble penalty
[]
Test
3,412
2
Robot_Operating_System:robot operating system robot operating system ros ros robotics middleware i.e collection software frameworks robot software development although ros operating system provides services designed heterogeneous computer cluster hardware abstraction low-level device control implementation commonly used functionality message-passing processes package management running sets ros-based processes represented graph architecture processing takes place nodes may receive post multiplex sensor data control state planning actuator messages despite importance reactivity low latency robot control ros real-time os rtos possible however integrate ros real-time code lack support real-time systems addressed creation ros 2.0 major revision ros api take advantage modern libraries technologies core ros functionality add support real-time code embedded hardware software ros ecosystem separated three groups language-independent tools main client libraries c++ python lisp released terms bsd license open source software free commercial research use majority packages licensed variety open source licenses packages implement commonly used functionality applications hardware drivers robot models datatypes planning perception simultaneous localization mapping simulation tools algorithms main ros client libraries geared toward unix-like system primarily dependence large collections open-source software dependencies client libraries ubuntu linux listed supported variants fedora linux macos microsoft windows designated experimental supported community native java ros client library rosjava however share limitations enabled ros-based software written android os rosjava also enabled ros integrated officially supported matlab toolbox used linux macos microsoft windows javascript client library roslibjs also developed enables integration software ros system via standards-compliant web browser sometime 2007 first pieces eventually would become ros beginning come together stanford university eric berger keenan wyrobek phd students working kenneth sailsbury robotics laboratory stanford leading personal robotics program working robots manipulation tasks human environments two students noticed many colleagues held back diverse nature robotics excellent software developer might hardware knowledge required someone developing state art path planning might know computer vision required attempt remedy situation two students set make baseline system would provide starting place others academia build upon words eric berger “ something ’ suck different dimensions ” first steps towards unifying system two build pr1 hardware prototype began work software borrowing best practices early open source robotic software frameworks particularly switchyard system morgan quigley another stanford phd student working support stair stanford artificial intelligence robot stanford artificial intelligence laboratory early funding us 50,000 provided joanna hoffman alain rossmann supported development pr1 seeking funding development eric berger keenan wyrobek met scott hassan founder willow garage technology incubator working autonomous suv solar autonomous boat hassan shared berger wyrobek vision “ linux robotics ” invited come work willow garage willow garage started january 2007 first commit ros code made sourceforge seventh november 2007 willow garage began developing pr2 robot follow-up pr1 ros software run groups twenty institutions made contributions ros core software growing number packages worked ros form greater software ecosystem fact people outside willow contributing ros particularly stanford stair project meant ros multi-robot platform beginning willow garage originally projects progress scrapped favor personal robotics program focused producing pr2 research platform academia ros open source robotics stack would underlie academic research tech startups much like lamp stack web-based startups december 2008 willow garage met first three internal milestones continuous navigation pr2 period two days distance pi kilometers soon early version ros 0.4 mango tango released followed first rviz documentation first paper ros early summer second internal milestone pr2 navigate office open doors plug reached followed august initiation ros.org website early tutorials ros posted december preparing release ros 1.0 january 2010 milestone 3 producing tons documentation tutorials enormous capabilities willow garage engineers developed preceding 3 years following willow garage achieved one longest held goals giving away 10 pr2 robots worthy academic institutions long goal founders felt pr2 could kick-start robotics research around world ended awarding eleven pr2s different institutions including university freiburg germany bosch georgia tech ku leuven belgium mit stanford tu munich germany uc berkeley u penn usc university tokyo japan combined willow garage highly successful internship program run 2008 2010 melonee wise helped spread word ros throughout robotics world first official ros distribution release ros box turtle released march 2nd 2010 marking first time ros official distributed set versioned packages public use developments lead first drone running ros first autonomous car running ros adaption ros lego mindstorms pr2 beta program well underway pr2 robot officially released commercial purchase september 9th 2010 2011 banner year ros launch ros answers q/a forum ros users february 15th introduction highly successful turtlebot robot kit april 18th total number ros repositories passing 100 may 5th willow garage began 2012 creating open source robotics foundation osrf april osrf immediately awarded software contract darpa later year first roscon held st. paul mn first book ros ros example published baxter first commercial robot run ros announced rethink robotics soon passing fifth anniversary november ros began running every continent december 3rd 2012 february 2013 osrf became primary software maintainers ros foreshadowing announcement august willow garage would absorbed founders suitable technologies point ros released seven major versions ros groovy users globe chapter ros development would finalized clearpath robotics took support responsibilities pr2 early 2014 years since osrf took primary development ros new version released every year interest ros continues grow roscons occurred every year since 2012 co-located either icra iros two flagship robotics conferences meetups ros developers organized variety countries number ros books published many educational programs initiated september 1st 2014 nasa announced first robot run ros space robotnaut 2 international space station 2017 osrf changed name open robotics tech giants amazon microsoft began take interest ros time microsoft porting core ros windows september 2018 followed amazon web services releasing robomaker november perhaps important development osrf/open robotics years thus far discount explosion robot platforms began support ros enormous improvements ros version proposal ros2 significant api change ros intended support real time programming wider variety computing environments utilize modern technology ros2 announced roscon 2014 first commits ros2 repository made february 2015 followed alpha releases august 2015 first distribution release ros2 ardent apalone released december 8th 2017 ushering new era next-generation ros development ros designed open-source mind intending users would able choose configuration tools libraries interacted core ros users could shift software stacks fit robot application area little actually core ros beyond general structure within programs must exist communicate one sense ros underlying plumbing behind nodes message passing however reality ros plumbing rich mature set tools wide-ranging set robot-agnostic capabilities provided packages greater ecosystem additions ros ros processes represented nodes graph structure connected edges called topics ros nodes pass messages one another topics make service calls nodes provide service nodes set retrieve shared data communal database called parameter server process called ros master makes possible registering nodes setting node-to-node communication topics controlling parameter server updates messages service calls pass master rather master sets peer-to-peer communication node processes register master decentralized architecture lends well robots often consist subset networked computer hardware may communicate off-board computers heavy computation commands node represents single process running ros graph every node name registers ros master take actions multiple nodes different names exist different namespaces node defined anonymous case randomly generate additional identifier add given name nodes center ros programming ros client code form ros node takes actions based information received nodes sends information nodes sends receives requests actions nodes topics named buses nodes send receive messages topic names must unique within namespace well send messages topic node must publish said topic receive messages must subscribe publish/subscribe model anonymous node knows nodes sending receiving topic sending/receiving topic types messages passed topic vary widely user-defined content messages sensor data motor control commands state information actuator commands anything else node may also advertise services service represents action node take single result services often used actions defined beginning end capturing single-frame image rather processing velocity commands wheel motor odometer data wheel encoder nodes advertise services call services one another parameter server database shared nodes allows communal access static semi-static information data change frequently infrequently accessed distance two fixed points environment weight robot good candidates storage parameter server ros core functionality augmented variety tools allow developers visualize record data easily navigate ros package structures create scripts automating complex configuration setup processes addition tools greatly increases capabilities systems using ros simplifying providing solutions number common robotics development tools provided packages like algorithm rather providing implementations hardware drivers algorithms various robotic tasks packages provide task robot-agnostic tools come core modern ros installations rviz three-dimensional visualizer used visualize robots environments work sensor data highly configurable tool many different types visualizations plugins rosbag command line tool used record playback ros message data rosbag uses file format called bags log ros messages listening topics recording messages come playing messages back bag largely original nodes produced data ros computation graph making bags useful tool recording data used later development rosbag command line tool rqt_bag provides gui interface rosbag catkin ros build system replaced rosbuild ros groovy catkin based cmake similarly cross-platform open source language-independent rosbash package provides suite tools augment functionality bash shell tools include rosls roscd roscp replicate functionalities ls cd cp respectively ros versions tools allow users use ros package names place filepath package located package also adds tab-completion ros utilities includes rosed edits given file chosen default text editor well rosrun runs executes ros packages rosbash supports functionalities zsh tcsh lesser extent roslaunch tool used launch multiple ros nodes locally remotely well setting parameters ros parameter server roslaunch configuration files written using xml easily automate complex startup configuration process single command roslaunch scripts include roslaunch scripts launch nodes specific machines even restart processes die execution ros contains many open source implementations common robotics functionality algorithms open source implementations organized packages many packages included part ros distributions others may developed individuals distributed code sharing sites github packages note include ros releases may incompatible releases often referred code name rather version number ros currently releases version every year may odd numbered years release supported two years even numbered years release designated long-term support release supported five years loosely follows ubuntu release cycle ros2 currently releases new version every six months december july releases supported single year ros-industrial open-source project bsd legacy apache 2.0 preferred license extends advanced capabilities ros manufacturing automation robotics ros-industrial repository includes interfaces common industrial manipulators grippers sensors device networks also provides software libraries automatic 2d/3d sensor calibration process path/motion planning applications like scan-n-plan developer tools like qt creator ros plugin training curriculum specific needs manufacturers ros-i supported international consortium industry research members project began collaborative endeavor yaskawa motoman robotics southwest research institute willow garage support use ros manufacturing automation github repository founded january 2012 shaun edwards swri currently consortium divided three groups ros-industrial consortium americas led swri located san antonio texas ros-industrial consortium europe led fraunhofer ipa located stuttgart germany ros-industrial consortium asia pacific led advanced remanufacturing technology centre artc nanyang technological university ntu located singapore consortia supports global ros-industrial community conducting ros-i training providing technical support setting future roadmap ros-i well conducting pre-competitive joint industry projects develop new ros-i capabilities
[ 3462, 6797, 11156, 5397, 2198, 9366, 6554, 7326, 10791, 7983, 823, 968, 6993, 8921, 9946, 479, 6502, 8554, 6128, 2804, 10494 ]
None
3,413
9
Runtime_system:runtime system runtime system also called run-time system runtime environment run-time environment primarily implements portions execution model confused runtime lifecycle phase program runtime system operation languages form runtime system provides environment programs run environment may address number issues including layout application memory program accesses variables mechanisms passing parameters procedures interfacing operating system otherwise compiler makes assumptions depending specific runtime system generate correct code typically runtime system responsibility setting managing stack heap may include features garbage collection threads dynamic features built language every programming language specifies execution model many implement least part model runtime system one possible definition runtime system behavior among others behavior directly attributable program definition includes part runtime system things putting parameters onto stack function call behavior disk i/o parallel execution related behaviors definition essentially every language runtime system including compiled languages interpreted languages embedded domain-specific languages even api invoked stand alone execution models pthreads runtime system implementation execution model behavior scholarly papers runtime systems focus implementation details parallel runtime systems notable example parallel runtime system cilk popular parallel programming model addition proto-runtime toolkit created simplify creation parallel runtime systems addition execution model behavior runtime system may also perform support services type checking debugging code generation optimization runtime system also gateway running program interacts runtime environment contains state values accessible program execution also active entities interacted program execution like disk drives people via keyboards example environment variables features many operating systems part runtime environment running program access via runtime system likewise hardware devices dvd drive active entities program interact via runtime system unique application runtime environment rte within operating system os allows rte run meaning boot power-down entire os dedicated application running within rte code tries run failures application break rte breaks os stops processing requires re-boot boot read-only memory extremely secure simple single-mission system created simple example basic runtime system runtime system c language particular set instructions inserted executable image compiler among things instructions manage processor stack create space local variables copy function-call parameters onto top stack often clear criteria deciding language behavior considered inside runtime system versus behavior part source program c setup stack part runtime system opposed part semantics individual program maintains global invariant holds executions systematic behavior implements execution model language opposed implementing semantics particular program text directly translated code computes results one way observe separation semantics particular program runtime environment compile program object file containing functions versus compiling entire program executable binary object file contain assembly code relevant functions executable binary contain additional code used implement runtime environment object file one hand may missing information runtime environment resolved linking hand code object file still depends assumptions runtime system example function may read parameters particular register stack location depending calling convention used runtime environment another example case using application programming interface api interact runtime system calls api look calls regular software library however point call execution model changes runtime system implements execution model different language library written terms person reading code normal library would able understand library behavior knowing language library written however person reading code api invokes runtime system would able understand behavior api call knowing language call written point via mechanism execution model stops language call written switches execution model implemented runtime system example trap instruction one method switching execution models difference distinguishes api-invoked execution model posix threads usual software library posix threads calls software library calls invoked via api posix threads behavior understood terms language call rather posix threads calls bring play outside execution model implemented posix threads runtime system runtime system often os kernel extreme example physical cpu viewed implementation runtime system specific assembly language view execution model implemented physical cpu memory systems analogy runtime systems higher-level languages implemented using languages creates hierarchy runtime systems cpu itself—or actually logic microcode layer below—acting lowest-level runtime system compiled interpreted languages provide interface allows application code interact directly runtime system example codice_1 class java language class allows code animated one thread things start stop threads normally core aspects language behavior task scheduling resource management accessible fashion higher-level behaviors implemented runtime system may include tasks drawing text screen making internet connection often case operating systems provide kinds behaviors well available runtime system implemented abstraction layer translates invocation runtime system invocation operating system hides complexity variations services offered different operating systems also implies os kernel viewed runtime system set os calls invoke os behaviors may viewed interactions runtime system limit runtime system may provide services p-code machine virtual machine hide even processor instruction set approach followed many interpreted languages awk languages like java meant compiled machine-independent intermediate representation code bytecode arrangement simplifies task language implementation adaptation different machines improves efficiency sophisticated language features reflection also allows program executed machine without explicit recompiling step feature become important since proliferation world wide web speed execution runtime systems feature just-in-time compilation machine code modern aspect runtime systems parallel execution behaviors behaviors exhibited mutex constructs pthreads parallel section constructs openmp runtime system parallel execution behaviors may modularized according proto-runtime approach notable early examples runtime systems interpreters basic lisp environments also included garbage collector forth early example language designed compiled intermediate representation code runtime system virtual machine interpreted code another popular theoretical example donald knuth mix computer c later languages supported dynamic memory allocation runtime system also included library managed program memory pool object-oriented programming languages runtime system often also responsible dynamic type checking resolving method references
[ 515, 7173, 6664, 4112, 3603, 9749, 3613, 31, 5154, 10282, 5677, 7739, 60, 2620, 8258, 7753, 3665, 8280, 1632, 7273, 2666, 8301, 119, 6778, 5260, 4255, 8868, 1703, 7847, 7341, 6837, 716, 8908, 214, 9432, 9434, 1253, 10470, 2798, 5872, 24...
Test
3,414
9
ABAP:abap abap advanced business application programming originally allgemeiner berichts-aufbereitungs-prozessor german general report creation processor high-level programming language created german software company sap se currently positioned alongside java language programming sap netweaver application server part sap netweaver platform building business applications abap one many application-specific fourth-generation languages 4gls first developed 1980s originally report language sap r/2 platform enabled large corporations build mainframe business applications materials management financial management accounting.abap establish integration independent softwares abap used abbreviation allgemeiner berichts-aufbereitungs-prozessor german generic report preparation processor later renamed english advanced business application programming abap one first languages include concept logical databases ldbs provides high level abstraction basic database level supports every platform language units abap language originally used developers develop sap r/3 platform also intended used sap customers enhance sap applications – customers develop custom reports interfaces abap programming language geared towards technical customers programming experience extracted base computing languages java c c++ python abap remains language creating programs client-server r/3 system sap first released 1992 computer hardware evolved 1990s sap applications systems written abap 2001 basic functions written abap 1999 sap released object-oriented extension abap called abap objects along r/3 release 4.6 sap current development platform netweaver supports abap java abap abstraction business applications operating system database ensures applications depend directly upon specific server database platform easily ported one platform another sap netweaver currently runs unix aix hp-ux solaris linux microsoft windows i5/os ibm system formerly iseries as/400 z/os ibm system z formerly zseries s/390 supported databases hana sap ase formerly sybase ibm db2 informix maxdb oracle microsoft sql server support informix discontinued sap basis release 7.00 abap programs reside inside sap database stored separate external files like java c++ programs database abap code exists two forms source code viewed edited abap workbench tools generated code binary representation somewhat comparable java bytecode abap programs execute control runtime system part sap kernel runtime system responsible processing abap statements controlling flow logic screens responding events user clicking screen button respect seen virtual machine comparable java vm key component abap runtime system database interface turns database-independent abap statements open sql statements understood underlying dbms native sql database interface handles communication relational database behalf abap programs also contains extra features buffering tables frequently accessed data local memory application server sap data exists sap software runs context sap system system consists central relational database one application instances accessing data programs database sap system contains least one instance may contain mostly reasons sizing performance system multiple instances load balancing mechanisms ensure load spread evenly available application servers installations web application server landscapes typically consist three systems one development one testing quality assurance one production landscape may contain systems e.g. separate systems unit testing pre-production testing may contain fewer e.g. development production without separate qa nevertheless three common configuration abap programs created undergo first testing development system afterwards distributed systems landscape actions take place control change transport system cts responsible concurrency control e.g. preventing two developers changing code time version management deployment programs qa production systems web application server consists three layers database layer application layer presentation layer layers may run different physical machines database layer contains relational database database software application layer knowledge contains instance instances system application processes including business transactions abap development run application layer presentation layer handles interaction users system online access abap application servers go via proprietary graphical interface called sap gui via web browser abap software deployed software components examples transaction sap terminology execution program normal way executing abap code sap system entering transaction code instance va01 transaction code create sales order transactions called via system-defined user-specific role-based menus also started entering transaction code directly command field present every sap screen transactions also invoked programmatically means abap statements call transaction leave transaction general notion transaction called logical unit work luw sap terminology short form transaction code t-code programming languages abap program either executable unit library provides reusable code programs independently executable abap distinguishes two types executable programs reports follow relatively simple programming model whereby user optionally enters set parameters e.g. selection subset data program uses input parameters produce report form interactive list term report somewhat misleading reports also designed modify data reason programs called reports list-oriented nature output produce module pools define complex patterns user interaction using collection screens term “ screen ” refers actual physical image user sees screen also flow logic refers abap code implicitly invoked screens divided pbo process output pai process input section sap documentation term “ dynpro ” dynamic program refers combination screen flow logic non-executable program types include module gets included generation time calling unit often used subdivide large programs br subroutine pools contain abap subroutines blocks code enclosed form/endform statements invoked perform br function groups libraries self-contained function modules enclosed function/endfunction invoked call function br object classes interfaces similar java classes interfaces first define set methods attributes second contain empty method definitions class implementing interface must provide explicit code br type pools define collections data types constants abap programs composed individual sentences statements first word statement called abap keyword statement ends period words must always separated least one space statements indented wish keywords additions operands abap runtime system differentiate upper lowercase statements extend beyond one line several statements single line though recommended lines begin asterisk first column recognized comment lines abap runtime system ignored double quotations marks indicate remainder line comment two possible ways develop abap availability depends release abap system abap workbench part abap system accessed via sapgui contains different tools editing programs important transaction codes shown parentheses object navigator transaction se80 provides single integrated interface various tools abap development tools adt formally known abap eclipse set plugins eclipse platform develop abap scenario abap developer installs required tools computer works locally whereas continuous synchronization backend performed abap dictionary contains metadata data sap system closely linked abap workbench reference data e.g. table view data type obtained dictionary developers use abap dictionary transactions directly se80 object navigator inside abap workbench display maintain metadata dictionary object changed program references changed object automatically reference new version next time program runs abap interpreted necessary recompile programs reference changed dictionary objects brief description important types dictionary objects follows brief description abap syntax begins ubiquitous hello world program report test write 'hello world example contains two statements codice_1 codice_2 program displays list screen case list consists single line hello world codice_1 statement indicates program report program could module pool replacing codice_1 statement codice_5 consecutive statements identical first leftmost part combined chained statement using chain operator codice_6 common part statements written left colon differing parts written right colon separated commas colon operator attached directly preceding token without space applies commas token list seen examples chaining often used codice_2 statements codice_2 accepts one argument instance wanted display three fields structure called flightinfo would code write flightinfo-cityfrom write flightinfo-cityto write flightinfo-airpto chaining statements results readable intuitive form write flightinfo-cityfrom flightinfo-cityto flightinfo-airpto chain statement first part colon limited statement name alone entire common part consecutive statements placed colon example replace b lastname replace b firstname replace b cityname could rewritten chained form replace b lastname firstname cityname abap 2 ways defining text comment example report bookings select flightinfo code abap whitespace-sensitive x a+b c assigns variable x substring variable starting b length defined variable c. x b c assigns variable x sum variable result call method b parameter c. contrast languages like c/c++ java define limited set language-specific statements provide functionality via libraries abap contains extensive amount built-in statements statements traditionally used sentence-like structures avoided symbols making abap programs relatively verbose however recent versions abap language terser style possible example statement based syntax whose syntax originates cobol versus expression-based syntax c/java add tax price price price tax abap provides set built-in data types addition every structure table view data element defined abap dictionary used type variable also object classes interfaces used types built-in data types date variables constants type contain number days since january 1 1 ad time variables constants type contain number seconds since midnight special characteristic types accessed integers character strings internal format yyyymmdd dates hhmmss times used date time handling example code snippet calculates last day previous month note sy-datum system-defined variable containing current date data last_eom type d. last end-of-month date last_eom sy-datum last_eom+6 2 '01 last_eom last_eom 1 abap variables explicitly declared order used declared either individual statements explicit typing since abap 7.40 inline inferred typing normally declarations placed top code module program subroutine function first executable statement placement convention enforced syntax rule declaration consists name type length applicable additional modifiers e.g number implied decimals packed decimal field optionally initial value data counter type data origin type country data t_flights type table flightinfo data booking type ref cl_flt_booking notice use colon chain together consecutive data statements since abap 7.40 variables declared inline following syntax data variable_name 'value type declaration must possible infer type statically e.g method signature database table structure syntax also possible opensql statements select ekko data lt_ekko ebeln eq lv_ebeln abap language supports object-oriented programming feature known abap objects helps simplify applications make controllable abap objects fully compatible existing language one use existing statements modularization units programs use abap objects also use abap objects existing abap programs syntax checking stronger abap objects programs syntactical forms usually older ones certain statements permitted objects form capsule combines character respective behavior objects enable programmers map real problem proposed software solution one-to-one basis typical objects business environment example ‘ customer ’ ‘ order ’ ‘ invoice ’ release 3.1 onwards business object repository bor sap web application server abap contained examples objects bor object model integrated abap objects next release migrating bor object types abap class library comprehensive introduction object orientation whole would go far beyond limits introduction abap objects documentation introduces selection terms used universally object orientation also occur abap objects subsequent sections goes discuss detail terms used abap objects end section contains list reading selection titles object orientation object-oriented programming objects usually following properties abap core data services abap cds implementation general cds concept abap abap cds makes possible define semantic data models central database application server abap models defined independently database system entities models provide enhanced access functions compared existing database tables views defined abap dictionary making possible optimize open sql-based applications particularly clear abap uses sap hana database since in-memory characteristics implemented optimum manner. br data models defined using data definition language ddl data control language dcl provided abap cds abap cds syntax objects defined using languages integrated abap dictionary managed br cds source code programmed eclipse-based abap development tools adt data definition language ddl data control language dcl use different editors internal tables important feature abap language internal table defined similarly vector struct c++ vector objects java main difference languages abap provides collection statements easily access manipulate contents internal tables note abap support arrays way define multi-element data object use internal table internal tables way store variable data sets fixed structure working memory abap provides functionality dynamic arrays data stored row-by-row basis row structure internal tables preferably used store format content database tables within program furthermore internal tables connection structures important means defining complex data structures abap program following example defines internal table two fields format database table vbrk types begin t_vbrk data gt_vbrk type standard table t_vbrk data gs_vbrk type t_vbrk types tt_vbrk type standard table t_vbrk following list gives rough overview important milestones history language abap details see abap release-specific changes
[ 9345, 6797, 11030, 1304, 5658, 2168, 10398, 2596, 5677, 10413, 7983, 5684, 823, 1343, 6850, 963, 5961, 4042, 5210, 10340, 10470, 11625, 5612, 9330, 5492, 8312, 4604 ]
None
3,415
1
Kaii-Yōkai_Denshō_Database:kaii-yōkai denshō database database yōkai mystery stories collected japanese folklore database published international research center japanese studies prototype created march 19 2002 first live version released june 20 2002. project supervisor kazuhiko komatsu japanese folklorist professor study yōkai database includes verbal information without visual information data collected item database abstract around 100 characters full text searchable database searched name region item found
[]
Test
3,416
9
Java_Mobile_Media_API:java mobile media api mobile media api mmapi api specification java platform cdc cldc devices mobile phones depending implemented apis allow applications play record sounds video capture still images mmapi developed java community process jsr 135 multimedia java api based around four main types classes codice_1 package—the codice_2 codice_3 codice_4 various types codice_5 java programmers wishing use jsr 135 would first make use static methods codice_2 class although methods codice_7 main method used codice_8 takes either uri mime type cases uris used common uri protocols used include mime type optional inferred data passed supplied codice_8 method returns implementation codice_3 interface even use capture protocol uri core methods applicable players starting stopping media requesting loop also codice_11 object implementing codice_4 interface receive various events related clip starting stopping media finishing etc codice_3 classes also codice_14 method returns implementation particular codice_5 codice_5 handles optional apis applicable media types given codice_3 may may able supply implementation given codice_5 set controls implemented codice_3 limited however standard ones defined codice_22 package jsr others may defined jsr 234 advanced multimedia supplements subset jsr 135 defined jsr 118 midp 2.0 regardless protocol media type involved codice_3 moves discrete states lifecycle states listed table java specifications implementations differ despite best efforts specification authors ensure consistency two obvious areas differences controls supported acceptable uri types first place obscure areas whether mixing supported many games would like play midi music track layer pcm sound effects top another source extreme variance performance example http clip requested point clip get downloaded specification recognises providing two codice_3 methods called advance actually playing codice_25 codice_26 depending implementation may work getting clip playable state thus making quicker actually play clip needed implementations sophisticated enough actually stream clip request whilst played symbian os contains complete implementation jsr 135 even highly dependent underlying multimedia capabilities device device manufacturers may choose expose obscure parts java recording implementation consistency ensured forcing implementations pass java technology compatibility kit tck ensures supported uri schema mime type control tested test every permutation optional parts
[ 4960, 7108, 9350, 3561, 8880, 690, 9011, 2556 ]
Test
3,417
4
Brewer_and_Nash_model:brewer nash model brewer nash model constructed provide information security access controls change dynamically security model also known chinese wall model designed provide controls mitigate conflict interest commercial organizations built upon information flow model brewer nash model information flow subjects objects way would create conflict interest
[ 3616, 3440, 6162, 1364, 5373 ]
Validation
3,418
9
DG/L:dg/l dg/l programming language developed data general corp nova eclipse eclipse/mv families minicomputers 1970s early 1980s actually two separate versions language extended version algol 60 supported integers single double precision floating point complex numbers fixed arbitrary precision strings also supported full arbitrary precision bcd arithmetic strings large number convenient program flow features designed mid 70s lacked user defined data structures dg/l substantial runtime library day used systems programming within outside data general originally called algol/5 product renamed dg/l shortly first commercial release 1978 officially name meaningless apparently supposed imply data general language first commercial release targeting 16 bit eclipse nova several subsequent updates major versions released approximately one year appendix data general 1982 revision dg/l language reference manual 093-00229-01 describes dg/l based algol 60 programming language gives data types operations statements algol 60 lacks specific differences extensions algol 60 standard introduced dg/l carried data general previous algol implementation 1971
[ 96, 512, 1610, 8902 ]
None
3,419
4
Trust_boundary:trust boundary trust boundary term computer science security used describe boundary program data execution changes level trust term refers distinct boundary within system trusts sub-systems including data example execution trust boundary would application attains increased privilege level root data trust boundary point data comes untrusted source example user input network socket trust boundary violation refers vulnerability computer software trusts data validated crossing boundary
[ 700, 5636, 2262, 7804, 2558 ]
Validation
3,420
4
FSArchiver:fsarchiver fsarchiver disk cloning utility linux fsarchiver save partitions containing different popular file systems disk image continuation partimage project one authors implements new features partimage lacks fsarchiver strives feature-rich less ux partimage result used software toolsets functionality two widely used features partimage lacks support multi-core compression support commonly used ext4 filesystem windows users fsarchiver includes experimental support ntfs fsarchiver supports modern linux file systems ext4 reiser4 btrfs notable features include modern multi-threaded compression disk image files combined file-based images opposed block-based images similar tools use enhance compression ignoring unused clusters
[ 9762, 1801, 5612, 6797, 7983, 2193, 823, 8254, 8857, 1150 ]
None
3,421
3
Microarchitecture_simulation:microarchitecture simulation microarchitecture simulation important technique computer architecture research computer science education tool modeling design behavior microprocessor components alu cache memory control unit data path among others simulation allows researchers explore design space well evaluate performance efficiency novel microarchitecture features example several microarchitecture components branch predictors re-order buffer trace cache went numerous simulation cycles become common components contemporary microprocessors today addition simulation also enables educators teach computer organization architecture courses hand-on experiences system-level simulation computer hardware please refer full system simulation microarchitecture simulation classified multiple categories according input types level details specifically input trace collected execution program real microprocessor called trace-driven simulation program called execution-driven simulation trace-driven simulation reads fixed sequence trace records file input trace records usually represent memory references branch outcomes specific machine instructions among others trace-driven simulation known comparatively fast results highly reproducible also requires large storage space hand execution-driven simulation reads program simulates execution machine instructions fly program file typically several magnitudes smaller trace file however execution-driven simulation much slower trace-driven simulation process instruction one-by-one update statuses microarchitecture components involved thus selection input types simulation trade-off space time particular detailed trace highly accurate simulation requires large storage space whereas accurate execution-driven simulation takes long time execute instructions program apart input types level details also used classify simulation particular piece software simulates microprocessor executing program cycle-by-cycle basis known cycle-accurate simulator whereas instruction set simulator models execution program microprocessor eyes instruction scheduler along coarse timing instruction execution computer science classes computer architecture hand-on experiences adopt instruction set simulators tools teaching whereas cycle-accurate simulators deployed mostly research projects due complexities resource consumption microarchitecture simulators deployed variety purposes allows researchers evaluate ideas without need fabricate real microprocessor chip expensive time consuming instance simulating microprocessor thousand cores along multiple levels cache memory incurs little cost comparing fabrication prototyping chip researchers also play several configurations cache hierarchy using different cache models simulator instead fabricate new chip every time want test something different another usage microarchitecture simulator education given course computer architecture teaches students many different microprocessor features architectures microarchitecture simulator ideal modeling experimenting different features architectures course semester example students may start microarchitecture simulator models simple microprocessor design beginning semester semester progresses additional features instruction pipelining register renaming reservation stations out-of-order execution scoreboarding modeled added simulator introduced classroom microarchitecture simulator provides flexibility reconfiguration testing minimal costs
[ 2241, 2435, 7653, 8231, 9932, 3470, 398, 6926, 4465, 7598, 7954, 10734, 8501, 10746 ]
Test
3,422
6
Linux_Unified_Key_Setup:linux unified key setup linux unified key setup luks disk encryption specification created clemens fruhwirth 2004 originally intended linux disk encryption software implements different incompatible undocumented formats luks implements platform-independent standard on-disk format use various tools facilitates compatibility interoperability among different programs also assures implement password management secure documented manner reference implementation luks operates linux based enhanced version cryptsetup using dm-crypt disk encryption backend microsoft windows luks-encrypted disks used defunct librecrypt formerly doxbox luks designed conform tks1 secure key setup scheme
[ 2050, 7938, 7812, 8326, 10631, 4360, 4746, 8331, 4493, 2195, 3859, 1813, 11155, 9882, 10780, 1694, 3618, 8106, 4011, 9646, 3382, 823, 7354, 9660, 8640, 9281, 10817, 8772, 5067, 8147, 8283, 3422, 1761, 7139, 4841, 7794, 3572, 5749 ]
Test
3,423
4
Cyberweapon:cyberweapon cyberweapon malware agent employed military paramilitary intelligence objectives requirements term vary widely common criteria seem malware agent part distinction malware agent sponsored —that commissioned developed and/or actually used—not black-hat hacker organized criminal group instead state non-state actor latter potentially including terrorist groups entities proposed fourth-generation warfare 4gw doctrines cyberweapon performs action would normally require soldier spy would considered either illegal act war performed directly human agent sponsor peacetime legal issues include violating privacy target sovereignty host nation actions include limited cyberweapon almost certainly results either direct indirect financial damages target group direct financial gains sponsor transfer funds primary objective class agent unlike malware used script kiddies organize botnets ownership physical location normal role machines attacked largely irrelevant cyberweapons show high selectivity either employment operation attack cyberweapons usually identify target using different methods likewise malware employed fraudsters theft personal financial information demonstrates lower selectivity wider distribution note self-replication requirement cyberweapons viruses viruses necessarily cyberweapons without capability however alternate vector required get agent onto target system likewise compromised access alone provided rootkit diagnostic employment cyberweapon term frequently used press articles avoid instead using terms like internet weapon virus mainstream researchers debate requirements term still referring employment agent weapon software development community particular uses term rarely following malware agents generally meet criteria formally referred manner industry security experts described way government military statements 2017 data breaches showed supposedly secure hacking tools used government agencies obtained − sometimes exposed − third parties furthermore reported losing control tools government appears leave exploits open re-used scammers criminals anyone else − purpose claudio guarnieri technologist amnesty international states learn disclosures leaks last months unknown vulnerabilities maintained secret even 've clearly lost plain irresponsible unacceptable also year wikileaks released vault 7 documents series contain details cia exploits tools julian assange stating working disarm publication disarmament cyber weapons may come form contacting respective software vendors information vulnerabilities products well potential help autonomous development open source software patches
[ 9375, 1251, 3843, 2661, 5764, 7739, 3944, 297, 4813, 9791, 3473, 4883, 3092, 9460, 9688, 3225, 7515, 3807 ]
Test
3,424
2
Alastair_Sweeny:alastair sweeny alastair sweeny born august 15 1946 canadian publisher historian author born toronto ontario attended st. andrew college received bachelor degree trinity college university toronto master letters doctor philosophy trinity college dublin sweeny managed research programs produced reference learning materials consulted many private public sector organizations including adviser canadian government task force national unity pepin-robarts commission library archives canada parks canada federation saskatchewan indian nations national indian veterans association assembly first nations canadian heritage elibrary proquest nelson thomson learning quebecor media electric library canada canwest global 1989 produced canadisk canada first multimedia cd-rom joint venture encyclopædia britannica 1990s developed learning materials apple computer eworld online service produced original encarta book quotations 1999 microsoft inc. bloomsbury publishing london 1990s helped get canada schoolnet way developed day canadian history online service bell globemedia sweeny produced written corporate history number canadian companies including investors group alberta energy company encana magna international gendis inc.. done background research canadian authors w. l. morton research biography lord strathcona peter c. newman hudson bay company series background history richard gwyn 49th paradox canada north america pierre berton promised land jeffrey simpson spoils power author several books including biography sir george-étienne cartier 1976 canquiz 2002 business biography blackberry blackberry planet published john wiley canada ltd september 2009 book canada oilsands industry black bonanza published wiley april 2010 book fire along frontier great battles war 1812 published dundurn press mark bicentennial war 1812 sweeny currently executive director non-profit educational foundation civics channel dedicated research teaching learning areas citizenship society politics human rights justice system co-author producer civics canada online well print version civics canada 2005 sponsored canadawiki portal also vice president northern blue publishing waterloo ontario co-author producer history canada online canada digital history canada first people history canada native aboriginal nations
[]
None
3,425
2
Blackbird_(online_platform):blackbird online platform blackbird codename online content authoring platform developed microsoft mid-90s intended online publishing tool first version msn microsoft network blackbird born microsoft acquisition daily planet software tool first conceived prior advent internet web know today time aol compuserve primary online venues introduction web mass consumers begin even low-bandwidth dialup connections dominated blackbird based concept object-based backend file system microsoft data centers microsoft cairo /nt low-bandwidth-streaming rendering client page-based layout similar aldus pagemaker based online streaming embedded interactive client-side activex objects ole fundamentally based sgml standard direct ancestor html client-side layout unfortunately became microsoft-promoted alternative html brief time commercial internet web browser born scripting capability html yet demonstrated means serve dynamic media-rich applications documents contained processing logic similar user would experience desktop environment pages blackbird application would able contain video audio graphs ole based document formats without need plug-ins technology already demonstrated microsoft dial-up service time msn plans progress port internet use dedicated protocol work platform cancelled due overwhelming move html/www/internet standards commercialized consuming computing world example netscape time need backend server-side scripting technologies lacking performance problems also plagued pre-releases beta testing 1995 microsoft hence refocused efforts online development around web/html standards including asp activex blackbird designer refashioned visual interdev technology integrated first version visual studio vs 97 web-standards based core trademarked microsoft visual studio ancestor one leading web development tools dating commercial birth web today prior name codename derived cold war era stealth spy plane lockheed sr-71 blackbird centerpiece blackbird ole container format already use windows applications allow objects documents communicate share information blackbird documents would stored called blackbird data format bdf structured format based ole storage sgml-based markup language blackbird markup language bml also created help automate creation documents though documents based markup would processed native data format used ole objects would suffer performance disadvantages give developers flexibility microsoft planned include utility would allow conversion bdf bml well html direction additionally would application resource installer packaged custom fonts ole controls resource files blackbird application package would download user activated application first time otherwise update package already user system microsoft also advertised blackbird would take advantage features within windows 95 like shortcuts would allow user automatically schedule delivery content three components platform — authoring system called blackbird designer visual drag-and drop environment similar included visual basic blackbird server ran windows nt blackbird client runtime module lets users access run blackbird applications urls blackbird applications ole monikers microsoft argued blackbird development would cross-platform since ole support already existed macintosh work progress porting unix systems guarantee security company planned act certifying authority ole controls ocxs encourage third parties certifying authorities blackbird announced march 1995 part upcoming microsoft network august clear microsoft intended run widely internet protocols technology later demonstrated msn microsoft released beta version developer tools end 1996 plans new version announced designer renamed visual studio disclosed would use proprietary blackbird file formats rather standard html soon became clear original project effectively scrapped designer later became visual interdev general web content creation tool creating html developing server pages using asp key web technology glue first version visual studio visual studio 97 visual interdev key web ingredient visual studio internet advent microsoft web development tools binding previously mass-successful products visual basic visual c++ internet also included ability author activex controls — ole controls could embedded html pages plug-in would key parts microsoft active platform strategy later revealed blackbird severe performance problems over-complex architecture made excessive use multi-threading prototypes trident html layout engine completed shown goals complex layout blackbird could achieved html better performance led executives rethink project mark anders former head iis team microsoft cited blackbird example microsoft tendency over-complicate software compared projects like longhorn blackbird later referenced united states anti-trust suit microsoft argued prosecution netscape efforts transform web suite internet os seen competition plans proprietary internet led adopt aggressive internet strategy netscape many documents cited prosecution described competition windows however pointed netscape planned compete possible internet platform microsoft windows os
[ 488, 10026, 4331, 1581, 7822, 847, 10029, 119 ]
None
3,426
2
TurboDOS:turbodos turbodos multi user cp/m like operating system z80 8086 cpus developed software 2000 inc released around 1982 s100 bus based systems northstar horizon commercial systems line multiprocessor systems including csi-50 csi-75 sci-100 csi-150 multiprocessor nature turbodos unusual feature unlike operating systems time networking processors either afterthought support file transfer protocol turbodos designed ground multiprocessor operating system modular construction operating system generation based relocating linking loader program makes incorporation different hardware driver modules quite easy particularly bus-oriented machines ieee-696 s-100 bus commonly used turbodos systems turbodos highly modular consisting forty separate functional modules distributed relocatable form modules building blocks combine various ways produce family compatible operating systems section describes modules detail describes combine various configurations possible turbodos configurations include numerous subtle variations possible categories architecture turbodos viewed three-level hierarchy highest level hierarchy process level turbodos support many concurrent processes level intermediate level hierarchy kernel level kernel supports 93 c-functions t-functions controls sharing computer resources processor time memory peripheral devices disk files processes make requests kernel entrypoint module osntry decodes c-function t-function number invokes appropriate kernel module c functions include cp/m bdos functions selected mp/m functions lowest level hierarchy driver level contains device-dependent drivers necessary interface turbodos particular hardware used drivers must provided peripherals including console printers disks communications channels network interface drivers also required real-time clock periodic interrupt source bank-switched memory applicable turbodos designed interface almost kind peripheral hardware operates efficiently interrupt-driven dma-type interfaces also work fine using polled programmed-i/o devices turbodos loader osload.com program containing abbreviated version kernel drivers purpose load full turbodos operating system disk file osserver.sys memory system cold-start functional modules distributed relocatable format .rel gen command specialized linker builds executable version system turbodos resident commands commands executable files standard commands
[ 2179, 10499, 10883, 394, 3978, 1804, 6797, 273, 6289, 6675, 7057, 7187, 9366, 11539, 6296, 25, 10776, 11667, 8092, 4637, 7325, 9887, 10016, 9762, 421, 5158, 10235, 2345, 7983, 3248, 7217, 11184, 6837, 823, 9784, 4409, 10809, 6075, 7483, 6...
Test
3,427
1
Tokyo_Cabinet_and_Kyoto_Cabinet:tokyo cabinet kyoto cabinet tokyo cabinet kyoto cabinet two libraries routines managing key-value databases tokyo cabinet sponsored japanese social networking site mixi multithreaded embedded database manager announced authors modern implementation dbm kyoto cabinet designated successor tokyo cabinet tokyo cabinet features on-disk b+ trees hash tables key-value storage support transactions
[ 10921, 5546, 10413, 2804, 10292, 4598, 2966, 5560, 1594 ]
Test
3,428
5
BitTorrent:bittorrent bittorrent abbreviated bt communication protocol peer-to-peer file sharing p2p used distribute data electronic files internet bittorrent one common protocols transferring large files digital video files containing tv shows video clips digital audio files containing songs peer-to-peer networks estimated collectively account approximately 43 70 internet traffic depending location february 2013 bittorrent responsible 3.35 worldwide bandwidth half 6 total bandwidth dedicated file sharing send receive files person uses bittorrent client internet-connected computer bittorrent client computer program implements bittorrent protocol popular clients include μtorrent xunlei transmission qbittorrent vuze deluge bitcomet tixati bittorrent trackers provide list files available transfer allow client find peer users known seeds may transfer files programmer bram cohen former university buffalo student designed protocol april 2001 released first available version 2 july 2001 recent version 2013 bittorrent clients available variety computing platforms operating systems including official client released bittorrent inc. bittorrent 15–27 million concurrent users time bittorrent utilized 150 million active users based figure total number monthly bittorrent users may estimated quarter billion bittorrent protocol used reduce server network impact distributing large files rather downloading file single source server bittorrent protocol allows users join swarm hosts upload to/download simultaneously protocol alternative older single source multiple mirror sources technique distributing data work effectively networks lower bandwidth using bittorrent protocol several basic computers home computers replace large servers efficiently distributing files many recipients lower bandwidth usage also helps prevent large spikes internet traffic given area keeping internet speeds higher users general regardless whether use bittorrent protocol first release bittorrent client search engine peer exchange users wanted upload file create small torrent descriptor file would upload torrent index site first uploader acted seed downloaders would initially connect peers see diagram right wish download file would download torrent client would use connect tracker list ip addresses seeds peers swarm peer completed download complete file could turn function seed file distributed divided segments called pieces peer receives new piece file becomes source piece peers relieving original seed send piece every computer user wishing copy bittorrent task distributing file shared want entirely possible seed send single copy file eventually distribute unlimited number peers piece protected cryptographic hash contained torrent descriptor ensures modification piece reliably detected thus prevents accidental malicious modifications pieces received nodes node starts authentic copy torrent descriptor verify authenticity entire file receives pieces typically downloaded non-sequentially rearranged correct order bittorrent client monitors pieces needs pieces upload peers pieces size throughout single download example 10 mb file may transmitted ten 1 mb pieces forty 256 kb pieces due nature approach download file halted time resumed later date without loss previously downloaded information turn makes bittorrent particularly useful transfer larger files also enables client seek readily available pieces download immediately rather halting download waiting next possibly unavailable piece line typically reduces overall time download eventual transition peers seeders determines overall health file determined number times file available complete form distributed nature bittorrent lead flood-like spreading file throughout many peer computer nodes peers join swarm likelihood successful download particular node increases relative traditional internet distribution schemes permits significant reduction original distributor hardware bandwidth resource costs distributed downloading protocols general provide redundancy system problems reduce dependence original distributor provide sources file generally transient therefore single point failure one way server-client transfers bittorrent client capable preparing requesting transmitting type computer file network using protocol 2005 way share files creating small text file called torrent files contain metadata files shared trackers keep track seeds peers users want download file first obtain torrent file connect tracker seeds 2005 first vuze bittorrent client introduced distributed tracking using distributed hash tables allowed clients exchange data swarms directly without need torrent file 2006 peer exchange functionality added allowing clients add peers based data found connected nodes though ultimately transfer files network bittorrent download differs one way server-client download typical http ftp request example several fundamental ways taken together differences allow bittorrent achieve much lower cost content provider much higher redundancy much greater resistance abuse flash crowds regular server software however protection theoretically comes cost downloads take time rise full speed may take time enough peer connections established may take time node receive sufficient data become effective uploader contrasts regular downloads http server example vulnerable overload abuse rise full speed quickly maintain speed throughout beginning bittorrent non-contiguous download methods made harder support streaming playback however recently clients offering streaming options bittorrent protocol provides way index torrent files result comparatively small number websites hosted large majority torrents many linking copyrighted works without authorization copyright holders rendering sites especially vulnerable lawsuits bittorrent index list .torrent files typically includes descriptions information torrent content several types websites support discovery distribution data bittorrent network public torrent-hosting sites pirate bay allow users search download collection torrent files users typically also upload torrent files content wish distribute often sites also run bittorrent trackers hosted torrent files two functions mutually dependent torrent file could hosted one site tracked another unrelated site private host/tracker sites operate like public ones except may restrict access registered users may also keep track amount data user uploads downloads attempt reduce leeching web search engines allow discovery torrent files hosted tracked sites examples include pirate bay torrentz isohunt btdigg sites allow user ask content meeting specific criteria containing given word phrase retrieve list links torrent files matching criteria list often sorted respect several criteria relevance seeders-leechers ratio one popular useful due way protocol behaves download bandwidth achievable sensitive value metasearch engines allow one search several bittorrent indices search engines dht search engines monitors dht network indexes torrents via metadata exchange peers tribler bittorrent client among first incorporate built-in search capabilities tribler users find .torrent files held random peers taste buddies adds ability bittorrent protocol using gossip protocol somewhat similar exeem network shut 2005 software includes ability recommend content well dozen downloads tribler software roughly estimate download taste user recommend additional content may 2007 researchers cornell university published paper proposing new approach searching peer-to-peer network inexact strings could replace functionality central indexing site year later team implemented system plugin vuze called cubit published follow-up paper reporting success somewhat similar facility slightly different approach provided bitcomet client torrent exchange feature whenever two peers using bitcomet torrent exchange enabled connect exchange lists torrents name info-hash torrent share storage torrent files previously downloaded user chose enable sharing torrent exchange thus client builds list torrents shared peers connected current session even maintain list sessions instructed time user search torrent collection list certain torrent sort list categories user chooses download torrent list .torrent file automatically searched info-hash value dht network found downloaded querying client create initiate downloading task users find torrent interest torrent index site using search engine built client download open bittorrent client client connects tracker seeds specified torrent file receives list seeds peers currently transferring pieces file client connects peers obtain various pieces swarm contains initial seeder client connects directly begins request pieces clients incorporate mechanisms optimize download upload rates effectiveness data exchange depends largely policies clients use determine send data clients may prefer send data peers send data back tit tat exchange scheme encourages fair trading strict policies often result suboptimal situations newly joined peers unable receive data n't pieces yet trade two peers good connection exchange data simply neither takes initiative counter effects official bittorrent client program uses mechanism called optimistic unchoking whereby client reserves portion available bandwidth sending pieces random peers necessarily known good partners called preferred peers hopes discovering even better partners ensure newcomers get chance join swarm although swarming scales well tolerate flash crowds popular content less useful unpopular niche market content peers arriving initial rush might find content unavailable need wait arrival seed order complete downloads seed arrival turn may take long happen termed seeder promotion problem since maintaining seeds unpopular content entails high bandwidth administrative costs runs counter goals publishers value bittorrent cheap alternative client-server approach occurs huge scale measurements shown 38 new torrents become unavailable within first month strategy adopted many publishers significantly increases availability unpopular content consists bundling multiple files single swarm sophisticated solutions also proposed generally use cross-torrent mechanisms multiple torrents cooperate better share content peer distributing data file treats file number identically sized pieces usually byte sizes power 2 typically 32 kb 16 mb peer creates hash piece using sha-1 hash function records torrent file pieces sizes greater 512 kb reduce size torrent file large payload claimed reduce efficiency protocol another peer later receives particular piece hash piece compared recorded hash test piece error-free peers provide complete file called seeders peer providing initial copy called initial seeder exact information contained torrent file depends version bittorrent protocol convention name torrent file suffix codice_1 torrent files announce section specifies url tracker info section containing suggested names files lengths piece length used sha-1 hash code piece used clients verify integrity data receive though sha-1 shown signs cryptographic weakness bram cohen initially consider risk big enough backward incompatible change example sha-3 bittorrent preparing move sha-256 early days torrent files typically published torrent index websites registered least one tracker tracker maintained lists clients currently connected swarm alternatively trackerless system decentralized tracking every peer acts tracker azureus first bittorrent client implement system distributed hash table dht method alternative incompatible dht system known mainline dht released mainline bittorrent client three weeks later though development since 2002 subsequently adopted µtorrent transmission rtorrent ktorrent bitcomet deluge clients dht adopted private flag – analogous broadcast flag – unofficially introduced telling clients restrict use decentralized tracking regardless user desires flag intentionally placed info section torrent disabled removed without changing identity torrent purpose flag prevent torrents shared clients access tracker flag requested inclusion official specification august 2008 accepted yet clients ignored private flag banned many trackers discouraging practice bittorrent offer users anonymity one usually see ip addresses peers swarm one client firewall program may expose users insecure systems attacks countries copyright organizations scrape lists peers send takedown notices internet service provider users participating swarms files copyright jurisdictions copyright holders may launch lawsuits uploaders downloaders infringement police may arrest suspects cases various means used promote anonymity example bittorrent client tribler makes available tor-like onion network optionally routing transfers peers obscure client requested data exit node would visible peers swarm tribler organization provides exit nodes one advantage tribler clearnet torrents downloaded small decrease download speed one hop routing i2p provides similar anonymity layer although case one download torrents uploaded i2p network bittorrent client vuze allows users concerned anonymity take clearnet torrents make available i2p network bittorrent clients designed provide anonymity used tor debate whether torrenting tor acts drag network private torrent trackers usually invitation require members participate uploading downside single centralized point failure oink pink palace what.cd examples private trackers shut seedbox services download torrent files first company servers allowing user direct download file one ip address would visible seedbox provider third parties virtual private networks encrypt transfers substitute different ip address user anyone monitoring torrent swarm see address growing number individuals organizations using bittorrent distribute licensed works e.g indie bands distributing digital files new songs independent adopters report without using bittorrent technology dramatically reduced demands private networking hardware bandwidth could afford distribute files uses bittorrent file sharing may violate laws jurisdictions see legal issues section bittorrent 100 million users greater share network bandwidth netflix hulu combined early 2015 estimates bittorrent represents 20 broadband traffic routers use network address translation nat must maintain tables source destination ip addresses ports typical home routers limited 2000 table entries expensive routers larger table capacities bittorrent frequently contacts 20–30 servers per second rapidly filling nat tables known cause home routers ceasing work correctly bittorrent protocol still development may therefore still acquire new features enhancements improved efficiency 2 may 2005 azureus 2.3.0.0 known vuze released introducing support trackerless torrents system called distributed database system distributed hash table implementation allows client use torrents working bittorrent tracker following month bittorrent inc. released version 4.2.0 mainline bittorrent client supported alternative dht implementation popularly known mainline dht outlined draft website incompatible azureus recent measurement shows users mainline dht 10 million 25 million daily churn least 10 million mainline dht arguably largest realistic dht world current versions official bittorrent client µtorrent bitcomet transmission bitspirit share compatibility mainline dht dht implementations based kademlia version 3.0.5.0 azureus also supports mainline dht addition distributed database use optional application plugin potentially allows azureus/vuze client reach bigger swarm another idea surfaced vuze virtual torrents idea based distributed tracker approach used describe web resource currently used instant messaging implemented using special messaging protocol requires appropriate plugin anatomic p2p another approach uses decentralized network nodes route traffic dynamic trackers bittorrent clients also use peer exchange pex gather peers addition trackers dht peer exchange checks known peers see know peers 3.0.5.0 release vuze major bittorrent clients compatible peer exchange web seeding implemented 2006 ability bittorrent clients download torrent pieces http source addition swarm advantage feature website may distribute torrent particular file batch files make files available download web server simplify long-term seeding load balancing use existing cheap web hosting setups theory would make using bittorrent almost easy web publisher creating direct http download addition would allow web seed disabled swarm becomes popular still allowing file readily available feature two distinct specifications supported libtorrent 26+ clients use first created john theshad0w hoffman created bittornado first specification requires running web service serves content info-hash piece number rather filename specification created getright authors rely basic http download space using byte serving september 2010 new service named burnbit launched generates torrent url using webseeding server-side solutions provide initial seeding file webserver via standard bittorrent protocol number external seeders reach limit stop serving file original source technique called broadcatching combines rss feeds bittorrent protocol create content delivery system simplifying automating content distribution steve gillmor explained concept column ziff-davis december 2003 discussion spread quickly among bloggers ernest miller chris pirillo etc. article entitled broadcatching bittorrent scott raymond explained rss feed track content bittorrent ensures content integrity cryptographic hashing data feed subscribers receive uncorrupted content one first popular software clients free open source broadcatching miro free software clients penguintv katchtv also supporting broadcatching bittorrent web-service movedigital added ability make torrents available web application capable parsing xml standard rest-based interface 2006 though since discontinued additionally torrenthut developing similar torrent api provide features help bring torrent community web 2.0 standards alongside release first php application built using api called pep parse really simple syndication rss 2.0 feed automatically create seed torrent enclosure found feed since bittorrent makes large proportion total traffic isps chosen throttle slow bittorrent transfers reason methods developed disguise bittorrent traffic attempt thwart efforts protocol header encrypt phe message stream encryption/protocol encryption mse/pe features bittorrent clients attempt make bittorrent hard detect throttle november 2015 vuze bitcomet ktorrent transmission deluge µtorrent moopolice halite qbittorrent rtorrent latest official bittorrent client v6 support mse/pe encryption september 2006 reported software could detect throttle bittorrent traffic masquerading http traffic reports august 2007 indicated comcast preventing bittorrent seeding monitoring interfering communication peers protection efforts provided proxying client-tracker traffic via encrypted tunnel point outside comcast network comcast recently called truce bittorrent inc. intention shaping traffic protocol-agnostic manner questions ethics legality comcast behavior led renewed debate net neutrality united states general although encryption make difficult determine shared bittorrent vulnerable traffic analysis thus even mse/pe may possible isp recognize bittorrent also determine system longer downloading uploading data terminate connection injecting tcp rst reset flag packets another unofficial feature extension bittorrent metadata format proposed john hoffman implemented several indexing websites allows use multiple trackers per file one tracker fails others continue support file transfer implemented several clients bitcomet bittornado bittorrent ktorrent transmission deluge µtorrent rtorrent vuze frostwire trackers placed groups tiers tracker randomly chosen top tier tried moving next tier trackers top tier fail torrents multiple trackers decrease time takes download file also consequences bittorrent specification free use many clients open source bittorrent clients created common operating systems using variety programming languages official bittorrent client µtorrent qbittorrent transmission vuze bitcomet popular clients bittorrent implementations mldonkey torrentflux designed run servers example used centralize file sharing single dedicated server users share access network server-oriented bittorrent implementations also hosted hosting providers co-located facilities high bandwidth internet connectivity e.g. datacenter provide dramatic speed benefits using bittorrent regular home broadband connection services imageshack download files bittorrent user allowing download entire file http finished opera web browser supports bittorrent wyzo bitlet allows users download torrents directly browser using java applet increasing number hardware devices made support bittorrent include routers nas devices containing bittorrent-capable firmware like openwrt proprietary versions protocol implement drm encryption authentication found within managed clients pando unimplemented unofficial feature similarity enhanced transfer set technique improving speed peer-to-peer file sharing content distribution systems share data set proposed researchers pucha andersen kaminsky works spotting chunks identical data files exact near match one needed transferring data client exact data present experiments suggested set help greatly less popular files much popular data many peers already downloading andersen believes technique could immediately used developers bittorrent file sharing system bittorrent inc. working oversi new policy discover protocols query isp capabilities network architecture information oversi isp hosted netenhancer box designed improve peer selection helping peers find local nodes improving download speeds reducing loads isp network although protocol legal problems stem using protocol traffic copyright infringing works much controversy use bittorrent trackers bittorrent metafiles store file contents whether publishers bittorrent metafiles violate copyrights linking copyrighted works without authorization copyright holders controversial various jurisdictions pursued legal action websites host bittorrent trackers high-profile examples include closing suprnova.org torrentspy lokitorrent btjunkie mininova oink pink palace what.cd pirate bay torrent website formed swedish group noted legal section website letters replies subject alleged copyright infringements publicly displayed 31 may 2006 pirate bay servers sweden raided swedish police allegations mpaa copyright infringement however tracker running three days later study used value nbc universal merger comcast envisional examined 10,000 torrent swarms managed publicbt active downloaders excluding pornographic unidentifiable content found one swarm offered legitimate content united states 200,000 lawsuits filed copyright infringement bittorrent since 2010 30 april 2012 uk high court ordered five isps block bittorrent search engine pirate bay see list websites blocked united kingdom one concern udp flood attack bittorrent implementations often use µtp communication achieve high bandwidths underlying protocol used udp allows spoofing source addresses internet traffic possible carry denial-of-service attacks p2p lab environment users running bittorrent clients act amplifiers attack another service however always effective attack isps check source address correct leeches users download share bittorrent collaborative distributed platform section community wants solutions punish discourage behaviour several studies bittorrent indicated exist files containing malware available download via bittorrent particular one small sample indicated 18 executable programs available download contained malware another study claims much 14.5 bittorrent downloads contain zero-day malware bittorrent used distribution mechanism 47 zero-day malware found due sha1 collisions attacker alter execution path executable serving altered chunks victim downloading executable using bittorrent protocol despite fact proof concept exists attack may succeed limited cases small chunk size 32kb selecting larger chunks i.e 256kb amount resources required find sha1 collision tremendous makes attack virtually impossible
[ 11274, 4623, 534, 535, 2075, 2076, 10270, 9766, 5159, 3121, 574, 8772, 7248, 7761, 6747, 3676, 4194, 5732, 9325, 9843, 9332, 4725, 5749, 119, 9337, 2170, 8833, 4229, 2182, 6280, 4236, 9868, 10893, 11413, 6307, 10924, 7352, 3770, 4797, 428...
Test
3,429
2
IBM_7090/94_IBSYS:ibm 7090/94 ibsys ibsys discontinued tape-based operating system ibm supplied ibm 7090 ibm 7094 computers similar operating system several significant differences also called ibsys provided ibm 7040 ibm 7044 computers ibsys based fortran monitor system fms likely bell labs besys q.v rather share operating system ibsys really basic monitor program read control card images placed decks program data cards individual jobs ibsys control card began column 1 immediately followed control name selected various ibsys utility programs needed set run job card deck images read magnetic tapes prepared offline usually directly punched card reader
[ 2179, 4996, 6148, 10883, 7053, 8077, 9361, 11153, 6675, 9468, 789, 5397, 9619, 11673, 9370, 6557, 3359, 10273, 421, 7848, 6442, 1323, 7983, 8879, 7217, 9139, 10803, 6325, 7477, 7733, 10040, 5562, 573, 1219, 964, 8388, 6342, 4423, 1235, 75...
Test
3,430
2
The_Hessling_Editor:hessling editor hessling editor open source text editor first released august 1992 ten years written maintained mark hessling along original author also maintainer regina open source rexx interpreter ported unix platforms according developers text editor modeled vm/cms editor xedit adding best features mansfield software kedit folding controlled command permits one display work lines file contain given pattern example command codice_1 display lines include string global changes one makes slice example replace string command reflected file cases convenient way make global changes file order restore visibility lines one needs enter without target string similar xedit uses ibms rexx macro language makes highly configurable versatile provides ability create powerful extensions editor and/or customize specialized needs example one create edit commands would allows one manipulate columns text e.g copy/move insert/delete column text within file rexx one also integrate os commands external functions edit session since version 3.0 also user-configurable syntax highlighting xedit gui editors syntax highlighting language definition codice_2 file format comparable kedit codice_3 format free software distributed terms gnu general public license available many operating systems posix unix platforms program text-mode native x11 qnx os/2 dos beos amiga windows 95/98/me/nt/2000/xp
[ 6797, 7983, 5492, 5463, 3323, 2045 ]
Train
3,431
3
SPARC64_V:sparc64 v sparc64 v zeus sparc v9 microprocessor designed fujitsu sparc64 v basis series successive processors designed servers later supercomputers servers series sparc64 v+ vi vi+ vii vii+ x x+ xii sparc64 vi successors vii+ used fujitsu sun later oracle sparc enterprise m-series servers addition servers version sparc64 vii also used commercially available fujitsu fx1 supercomputer october 2017 sparc64 xii latest server processor used fujitsu oracle m12 servers supercomputer series based sparc64 vii sparc64 viifx ixfx xifx sparc64 viiifx used k computer sparc64 ixfx commercially available primehpc fx10 july 2016 sparc64 xifx latest supercomputer processor used fujitsu primehpc fx100 supercomputer late 1990s hal computer systems subsidiary fujitsu designing successor sparc64 gp sparc64 v. first announced microprocessor forum 1999 hal sparc64 v would operated 1 ghz wide superscalar organization superspeculation l1 instruction trace cache small fast 8 kb l1 data cache separate l2 caches instructions data designed fujitsu cs85 process 0.17 μm cmos process six levels copper interconnect would consisted 65 million transistors 380 mm die originally scheduled late 2001 release fujitsu granpower servers canceled mid-2001 hal closed fujitsu replaced fujitsu design first fujitsu sparc64 vs fabricated december 2001 operated 1.1 1.35 ghz fujitsu 2003 sparc64 roadmap showed company planned 1.62 ghz version release late 2003 early 2004 canceled favor sparc64 v+ sparc64 v used fujitsu primepower servers sparc64 v first presented microprocessor forum 2002 introduction highest clock frequency sparc 64-bit server processors production highest spec rating sparc processor sparc64 v four-issue superscalar microprocessor out-of-order execution based fujitsu gs8900 mainframe microprocessor sparc64 v fetches eight instructions instruction cache first stage places 48-entry instruction buffer next stage four instructions taken buffer decoded issued appropriate reserve stations sparc64 v six reserve stations two serve integer units one address generators two floating-point units one branch instructions integer address generator floating-point unit eight-entry reserve station reserve station dispatch instruction execution unit instruction dispatched firstly depends operand availability age older instructions given higher priority newer ones reserve stations dispatch instructions speculatively speculative dispatch instructions dispatched execution units even operands yet available execution begins stage six six instructions dispatched register files read stage seven sparc architecture separate register files integer floating-point instructions integer register file eight register windows jwr joint work register contains 64 entries eight read ports two write ports jwr contains subset eight register windows previous current next register windows purpose reduce size register file microprocessor operate higher clock frequencies floating-point register file contains 64 entries six read ports two write ports execution begins stage nine six execution units two integer two loads stores two floating-point two integer execution units designated exa exb arithmetic logic unit alu shift unit exa multiply divide units loads stores executed two address generators ags designated aga agb simple alus used calculate virtual addresses two floating-point units fpus designated fla flb fpu contains adder multiplier fla graphics unit attached execute add subtract multiply divide square root multiply–add instructions unlike successor sparc64 vi sparc64 v performs multiply–add separate multiplication addition operations thus two rounding errors graphics unit executes visual instruction set vis instructions set single instruction multiple data simd instructions instructions pipelined except divide square root executed using iterative algorithms fma instruction implemented reading three operands operand register multiplying two operands forwarding result third operand adder adding produce final result results execution units loads written register file maintain program order written update buffers reside committed sparc64 v separate update buffers integer floating-point units 32 entries integer register eight read ports four write ports half write ports used results integer execution units half data returned loads floating-point update buffer six read ports four write ports commit takes place stage ten earliest sparc64 v commit four instructions per cycle stage eleven results written register file becomes visible software sparc64 v two-level cache hierarchy first level consists two caches instruction cache data cache second level consists on-die unified cache level 1 l1 caches capacity 128 kb two-way set associative 64-byte line size virtually indexed physically tagged instruction cache accessed via 256-bit bus data cache accessed two 128-bit buses data cache consists eight banks separated 32-bit boundaries uses write-back policy data cache writes l2 cache 128-bit unidirectional bus second level cache capacity 1 2 mb set associativity depends capacity microprocessor 128-bit system bus operates 260 mhz bus operate two modes single-data rate sdr double-data ddr rate yielding peak bandwidth 4.16 8.32 gb/s respectively sparc64 v consisted 191 million transistors 19 million contained logic circuits fabricated 0.13 µm eight-layer copper metallization complementary metal–oxide–semiconductor cmos silicon insulator soi process die measured 18.14 mm 15.99 mm die area 290 mm 1.3 ghz sparc64 v power dissipation 34.7 w. fujitsu primepower servers use sparc64 v supply slightly higher voltage microprocessor enable operate 1.35 ghz increased power supply voltage operating frequency increased power dissipation ~45 w. sparc64 v+ code-named olympus-b development sparc64 v. improvements sparc64 v included higher clock frequencies 1.82–2.16 ghz larger 3 4 mb l2 cache first sparc64 v+ 1.89 ghz version shipped september 2004 fujitsu primepower 650 850 december 2004 1.82 ghz version shipped primepower 2500 versions 3 mb l2 cache february 2006 four versions introduced 1.65 1.98 ghz versions 3 mb l2 caches shipped primepower 250 450 2.08 2.16 ghz versions 4 mb l2 caches shipped mid-range high-end models contained approximately 400 million transistors 18.46 mm 15.94 mm die area 294.25 mm fabricated 90 nm cmos process ten levels copper interconnect sparc64 vi code-named olympus-c two-core processor first multi-core sparc64 processor succeeded sparc64 v+ fabricated fujitsu 90 nm 10-layer copper cmos silicon insulator soi process enabled two cores l2 cache integrated die core modified sparc64 v+ processor one main improvements addition two-way coarse-grained multi-threading cmt fujitsu called vertical multi-threading vmt cmt thread executed determined time-sharing thread executing long-latency operation execution switched thread addition cmt required duplication program counter control integer floating-point registers one set every thread floating-point fused multiply-add fma instruction also added first sparc processor cores share 6 mb on-die unified l2 cache l2 cache 12-way set associative 256-byte lines cache accessed via two unidirectional buses 256-bit read bus 128-bit write bus sparc64 vi new system bus jupiter bus sparc64 vi consisted 540 million transistors die measures 20.38 mm 20.67 mm 421.25 mm sparc64 vi originally introduced mid-2004 fujitsu primepower servers development primerpowers canceled fujitsu sun microsystems announced june 2004 would collaborate new servers called advanced product line apl servers scheduled introduced mid-2006 delayed april 2007 introduced sparc enterprise sparc64 vi processors featured sparc enterprise announcement 2.15 ghz version 5 mb l2 cache 2.28 2.4 ghz versions 6 mb l2 caches sparc64 vii previously called sparc64 vi+ code-named jupiter development sparc64 vi announced july 2008 quad-core microprocessor core capable two-way simultaneous multithreading smt replaces two-way coarse-grained multithreading termed vertical multithreading vmt fujitsu thus execute eight threads simultaneously changes include ras features integer register file protected ecc number error checkers increased around 3,400 consists 600 million transistors 21.31 mm × 20.86 mm 444.63 mm large fabricated fujitsu 65 nm cmos copper interconnect process sparc64 vii featured sparc enterprise socket-compatible predecessor sparc64 vi field-upgradeable sparc64 viis could coexist whilst operating native clock frequency alongside sparc64 vis first versions sparc64 vii 2.4 ghz version 5 mb l2 cache used sparc enterprise m4000 m5000 2.52 ghz version 6 mb l2 cache 28 october 2008 2.52 ghz version 5 mb l2 cache introduced sparc enterprise m3000 13 october 2009 fujitsu sun introduced new versions sparc64 vii code-named jupiter+ 2.53 ghz version 5.5 mb l2 cache m4000 m5000 2.88 ghz version 6 mb l2 cache m8000 m9000 12 january 2010 2.75 ghz version 5 mb l2 cache introduced m3000 sparc64 vii+ jupiter-e referred m3 oracle development sparc64 vii clock frequency increased 3 ghz l2 cache size doubled 12 mb version announced 2 december 2010 high-end sparc enterprise m8000 m9000 servers improvements resulted approximately 20 increase overall performance 2.66 ghz version mid-range m4000 m5000 models 12 april 2011 2.86 ghz version two four cores 5.5 mb l2 cache announced low-end m3000 vii+ socket-compatible predecessor vii existing high-end sparc enterprise m-series servers able upgrade vii+ processors field sparc64 viiifx venus eight-core processor based sparc64 vii designed high-performance computing hpc result viiifx succeed vii existed concurrently consists 760 million transistors measures 22.7 mm 22.6 513.02 mm fabricated fujitu 45 nm cmos process copper interconnects 1,271 i/o pins viiifx peak performance 128 gflops typical power consumption 58 w 30 °c efficiency 2.2 gflops/w viiifx four integrated memory controllers total eight memory channels connects 64 gb ddr3 sdram peak memory bandwidth 64 gb/s viiifx developed next-generation supercomputer project also called kei soku keisenki project keisoku initiated japan ministry education culture sports science technology january 2006 project aimed produce world fastest supercomputer performance 10 pflops march 2011 companies contracted develop supercomputer fujitsu hitachi nec supercomputer originally envisioned hybrid architecture containing scalar vector processors fujitsu-designed viiifx scalar processor vector processor jointly designed hitachi nec however due financial crisis 2007–2008 hitachi nec announced may 2009 would leave project manufacturing hardware responsible would result financial losses afterwards fujitsu redesigned supercomputer use viiifx processor type 2010 supercomputer would built project named k computer located riken advanced institute computational science aics kobe japan obtains performance 88,128 viiifx processors june 2011 top500 project committee announced k computer still incomplete 68,544 processors topped linpack benchmark 8.162 pflops realizing 93 peak performance making fastest supercomputer world time viiifx core based sparc64 vii numerous modifications hpc namely high performance computing-arithmetic computational extensions hpc-ace fujitsu-designed extension sparc v9 architecture front-end coarse-grained multi-threading removed l1 instruction cache halved size 32 kb number branch target address cache btac entries reduced 1,024 8,192 associativity reduced two eight extra pipeline stage inserted instruction decoder stage accommodated greater number integer floating-point registers defined hpc-ace sparc v9 architecture designed 32 integer 32 floating-point number registers sparc v9 instruction encoding limited number registers specifiable 32 specify extra registers hpc-ace prefix instruction would immediately follow one two sparc v9 instructions prefix instruction contained primarily portions register numbers could fit within sparc v9 instruction extra pipeline stage four sparc v9 instructions combined two prefix instructions preceding stage combined instructions decoded next pipeline stage back-end also heavily modified number reservation station entries branch integer instructions reduced six ten respectively integer floating-point register files registers added integer register file gained 32 total 256 floating-point registers extra integer registers part register windows defined sparc v9 always accessible via prefix instruction 256 floating-point registers could used scalar floating-point instructions integer floating-point simd instructions extra pipeline stage added beginning floating-point execution pipeline access larger floating-point register file 128-bit simd instructions hpc-ace implemented adding two extra floating-point units total four simd execution perform four single- double-precision fused-multiply-add operations eight flops per cycle number load queue entries increased 20 16 l1 data cache halved size 32 kb number commit stack entries determined number instructions could in-flight back-end reduced 48 64 sparc64 ixfx improved version sparc64 viiifx designed fujitsu lsi first revealed announcement primehpc fx10 supercomputer 7 november 2011 along primehpc fx10 commercialization technologies first appeared viiifx k computer compared viiifx organizational improvements included doubling number cores 16 doubling amount shared l2 cache 12 mb increasing peak ddr3 sdram memory bandwidth 85 gb/s ixfx operates 1.848 ghz peak performance 236.5 gflops consumes 110 w power efficiency 2 gflops per watt consisted 1 billion transistors implemented 40 nm cmos process copper interconnects sparc64 x 16-core server microprocessor announced 2012 used fujitsu m10 servers also marketed oracle sparc64 x based sparc64 vii+ significant enhancements core chip organization cores improved inclusion pattern history table branch prediction speculative execution loads execution units support hpc-ace extension originally sparc64 viiifx deeper pipeline 3.0 ghz clock frequency accelerators cryptography database decimal floating-point number arithmetic conversion functions 16 cores share unified 24 mb 24-way set-associative l2 cache chip organization improvements include four integrated ddr3 sdram memory controllers glueless four-way symmetrical multiprocessing ten serdes channels symmetrical multiprocessing scalability 64 sockets two integrated pci express 3.0 controllers sparc64 x contains 2.95 billion transistors measures 23.5 mm 25 mm 637.5 mm fabricated 28 nm cmos process copper interconnects sparc64 x+ enhanced sparc64 x processor announced 2013 features minor improvements core organization higher 3.5 ghz clock frequency obtained better circuit design layout contained 2.99 billion transistors measured 24 mm 25 mm 600 mm fabricated process sparc64 x 8 april 2014 3.7 ghz speed-binned parts became available response introduction new xeon e5 e7 models intel impending introduction power8 ibm fujitsu introduced sparc64 xifx august 2014 hot chips symposium used fujitsu primehpc fx100 supercomputer succeeded primehpc fx10 xifx operates 2.2 ghz peak performance 1.1 tflops consists 3.75 billion transistors fabricated taiwan semiconductor manufacturing company 20 nm high-κ metal gate hkmg process microprocessor report estimated die area 500 mm typical power consumption 200 w. xifx 34 cores 32 compute cores used run user applications 2 assistant cores used run operating system system services delegation user applications operating system dedicated cores improves performance ensuring private caches compute cores shared disrupted non-application instructions data 34 cores organized two core memory groups cmgs consisting 16 compute cores 1 assistant core sharing 12 mb l2 unified cache division cores cmgs enabled 34 cores integrated single die easing implementation cache coherence avoiding need l2 cache shared 34 cores two cmgs share memory ccnuma organization xifx core based sparc64 x+ organizational improvements xifx implements improved version hpc-ace extensions hpc-ace2 doubled width simd units 256 bits added new simd instructions compared sparc64 ixfx xifx improvement factor 3.2 double precision 6.1 single precision complement increased width simd units l1 cache bandwidth increased 4.4 tb/s improvements soc organization memory interconnect interfaces integrated memory controllers replaced four hybrid memory cube hmc interfaces decreased memory latency improved memory bandwidth according microprocessor report ixfx first processor use hmcs xifx connected 32 gb memory provided eight 4 gb hmcs hmcs 16-lane versions lane operating 15 gbit/s cmg two hmc interfaces hmc interface connected two hmcs via ports cmg 240 gb/s 120 gb/s 120 gb/s memory bandwidth xifx replaced ten serdes channels external tofu interconnect controller ten-port integrated controller second-generation tofu2 interconnect tofu2 6d mesh/torus network 25 gb/s full-duplex bandwidth 12.5 gb/s per direction 125 gb/s ten ports improved routing architecture sparc64-xii cores run 3.9 ghz 20 nanometer processes tsmc l3 cache 5.5 billion transistors 153 gb/sec memory bandwidth unix vendor able run solaris 10 bare metal fujitsu announced international supercomputing conference june 2016 future exascale supercomputer feature processors design implement armv8 architecture processors also implement extensions armv8 architecture equivalent hpc-ace2 fujitsu developing arm holdings
[ 6926, 528, 7702, 1309, 6815, 8355, 36, 9126, 8231, 9766, 1707, 10288, 9137, 7218, 9920, 8900, 8266, 2895, 2901, 9302, 10837, 2394, 731, 604, 7770, 1503, 3431, 7911, 10734, 8815, 1776, 4465, 1399, 9976, 3323, 10108 ]
Test
3,432
7
CloudSim:cloudsim cloudsim framework modeling simulation cloud computing infrastructures services originally built primarily cloud computing distributed systems clouds laboratory university melbourne australia cloudsim become one popular open source cloud simulators research academia cloudsim completely written java initially developed stand-alone cloud simulator cloudsim extended independent researchers multiple tutorials blog posts available cloudsim addition online course introducing cloudsim simulation framework covering installation architecture execution description sample simulations quick references quick tutorials flows
[ 4194, 11343 ]
None
3,433
4
User_behavior_analytics:user behavior analytics user behavior analytics uba defined gartner cybersecurity process detection insider threats targeted attacks financial fraud uba solutions look patterns human behavior apply algorithms statistical analysis detect meaningful anomalies patterns—anomalies indicate potential threats instead tracking devices security events uba tracks system users big data platforms like apache hadoop increasing uba functionality allowing analyze petabytes worth data detect insider threats advanced persistent threats problem uba responds described nemertes research ceo johna till johnson security systems provide much information tough uncover information truly indicates potential real attack analytics tools help make sense vast amount data siem ids/ips system logs tools gather uba tools use specialized type security analytics focuses behavior systems people using uba technology first evolved field marketing help companies understand predict consumer-buying patterns turns uba extraordinarily useful security context developments uba technology led gartner evolve category user entity behavior analytics ueba september 2015 gartner published market guide user entity analytics vice president distinguished analyst avivah litan provided thorough definition explanation ueba referred earlier gartner reports much depth expanding definition uba includes devices applications servers data anything ip address moves beyond fraud-oriented uba focus broader one encompassing malicious abusive behavior otherwise went unnoticed existing security monitoring systems siem dlp addition entity reflects devices may play role network attack may also valuable uncovering attack activity end users compromised malware lay dormant go undetected months rather trying find outsider entered uebas allow quicker detection using algorithms detect insider threats particularly computer security market many vendors ueba applications differentiated whether designed monitor on-premises cloud-based software service saas applications methods obtain source data type analytics use i.e. packaged analytics user-driven vendor-written service delivery method i.e. on-premises cloud-based according 2015 market guide released gartner ueba market grew substantially 2015 ueba vendors grew customer base market consolidation began gartner client interest ueba security analytics increased report projected next three years leading ueba platforms become preferred systems security operations investigations organizations serve be—and cases already is—much easier discover security events analyze individual offenders ueba many legacy security monitoring systems
[ 4194, 612, 5351, 4072, 5577, 10283, 10539, 4689, 11473, 467, 7893, 5722, 7515, 5245, 2558 ]
Test
3,434
8
Canvas_fingerprinting:canvas fingerprinting canvas fingerprinting one number browser fingerprinting techniques tracking online users allow websites identify track visitors using html5 canvas element instead browser cookies similar means technique received wide media coverage 2014 researchers princeton university ku leuven university described paper web never forgets canvas fingerprinting works exploiting html5 canvas element described acar et al variations graphics processing unit gpu installed graphics driver cause variations fingerprint fingerprint stored shared advertising partners identify users visit affiliated websites profile created user browsing activity allowing advertisers target advertising user inferred demographics preferences since fingerprint primarily based browser operating system installed graphics hardware uniquely identify users small-scale study 294 participants amazon mechanical turk experimental entropy 5.7 bits observed authors study suggest entropy could likely observed wild patterns used fingerprint sufficient uniquely identify users fingerprint could combined sources entropy provide unique identifier claimed technique effectively fingerprinting gpu entropy orthogonal entropy previous browser fingerprint techniques screen resolution browser javascript capabilities tor project reference documentation states plugins plugin-provided information believe html5 canvas single largest fingerprinting threat browsers face today tor browser notifies user canvas read attempts provides option return blank image data prevent fingerprinting however tor browser currently unable distinguish legitimate uses canvas element fingerprinting efforts warning taken proof website intent identify track visitors browser add-ons like privacy badger donottrackme adblock plus manually enhanced easyprivacy list able block third-party ad network trackers block canvas fingerprinting provided tracker served third party server opposed implemented visited website may 2012 keaton mowery hovav shacham researchers university california san diego wrote paper pixel perfect fingerprinting canvas html5 describing html5 canvas could used create digital fingerprints web users social bookmarking technology company addthis began experimenting canvas fingerprinting early 2014 potential replacement cookies 5 top 100,000 websites used canvas fingerprinting deployed according addthis ceo richard harris company used data collected tests conduct internal research users able install opt-out cookie computer prevent tracked addthis canvas fingerprinting software developer writing forbes stated device fingerprinting utilized purpose preventing unauthorized access systems long used tracking users without consent 2014 technique widespread many websites least dozen high-profile web ads user tracking suppliers using
[ 10658, 3462, 1001, 9395, 11319, 7965 ]
Test
3,435
9
XHarbour:xharbour xharbour free multi-platform extended clipper compiler offering multiple graphic terminals gts including console drivers guis hybrid console/guis xharbour backward-compatible clipper supports many language syntax extensions greatly extended run-time libraries extensive third party support like dynamic languages xharbour also available scripting language standalone application linkable library ms activescript engine windows script host html asp utilizing interpreter written xharbour language xharbour usenet newsgroup comp.lang.xharbour active community discussing xharbour related questions xharbour 6 scalar types nil string date logical number pointer 4 complex types array object codeblock hash scalar holds single value string number reference type arrays ordered lists scalars complex types indexed number starting 1 hashes associative arrays unordered collections type values indexed associated key may scalar complex type literal static representation scalar types complex types may also represent literal values hashes may use type including hashes key element hashes arrays may contain type value member including nesting arrays hashes codeblocks may references variables procedure/function method defined codeblocks may returned value means argument passed reference case codeblock outlive routine defined variables references detached variable detached variables maintain value long codeblock referencing still exists values shared codeblock may access variables codeblock outlive containing routine evaluated within lifetime routine defined changes detached variables means evaluation reflected back parent routine codeblocks evaluated number times means eval blockexp function types assigned named variables named variable identifiers 1 63 characters long start a-z|_ consist characters a-z|0-9|_ maximum 63 characters named variables case sensitive variables one following scopes local static global resolved compile time thus much faster private public variables dynamic entities accessed means runtime symbol table reason local static global variables exposed macro compiler macro code attempts reference generate runtime error due dynamic nature private public variables created destroyed runtime accessed modified means runtime macros accessed modified codeblocks created fly basic control structures include standard dbase clipper control structures well additional ones inspired c java programming languages conditionexp statement assignment expression evaluated prior first loop iteration expression evaluated compared value control variable prior iteration loop terminated evaluates numeric value greater numeric value control variable optional step expression evaluated iteration prior deciding whether perform next iteration var variable value scalar complex respective element collection value collection expression may array type combinations types hash table object type condexp ... represents 0 statement condition expression evaluate logical value case construct logically equivalent xharbour supports switch construct inspired c implementation switch begin sequence begin sequence structure allows well behaved abortion sequence even crossing nested procedures/functions means called procedure/function may issue break statement break expression force unfolding nested procedure/functions way back first outer begin sequence structure either respective end statement recover clause present break statement may optionally pass type expression may accepted recover statement allow recovery handing additionally xharbour error object supports candefault canretry cansubstitute properties allows error handlers perform preparations request retry operation resume return value replace expression triggering error condition try try construct similar begin sequence construct except automatically integrates error handling error intercepted recovered means catch statement forwarded outer catch handler otherwise finally section guaranteed executed try catch sections forward flow control means return break throw static procedure someprocedurename procedures/functions xharbour specified keywords codice_1 codice_2 naming rules variables 63 characters non case sensitive procedures functions may qualified scope qualifier static restrict usage scope module defined init exit optional qualifiers flag procedure automatically invoked calling application startup procedure quitting application respectively parameters passed procedure/function appear subroutine local variables may accept type including references changes argument variables reflected respective variables passed calling procedure/function/method unless explicitly passed reference using prefix procedure return value used expression context produce nil value function may return type means return statement anywhere body definition example procedure definition function call follows xharbour extends clipper replaceable database drivers rdd approach offers multiple rdds dbf dbfntx dbfcdx dbfdbt dbffpt xharbour multiple rdds used single application new logical rdds defined combination rdd rdd architecture allows inheritance given rdd may extend functionality existing rdd 3rd party rdds like rddsql rddsix rmdbfcdx advantage database server mediator exemplify rdd architecture features xharbour also offers odbc support means oop syntax ado support means ole one powerful features xbase languages macro operator xharbour ’ implementation macro operator allows runtime compilation valid xharbour expression compiled expression may used value i.e right side assignment compiled expression may used resolve left side assignment i.e private public variables database field additionally macro operator may compile execute function calls complete assignments even list arguments result macro may used resolve contexts compiled application iow xharbour application may extended and/or modified runtime compile execute additional code demand xharbour implementation feature complete xharbour interpreter xbscript uses heavily compile xharbour scripts syntax text value expression ... compiled value resulting execution compiled code result short form someid short form someid postfix typical hello world program would enclosed explicit procedure xharbour also available interpreted language flavors scripting engines
[ 6112, 4614, 6631, 10921, 5677, 2903, 2929, 3350, 3767, 2045, 5374 ]
None
3,436
3
Barbarian_(1987_video_game):barbarian 1987 video game barbarian 1987 computer platform game psygnosis first developed atari st ported amiga commodore 64 ms-dos msx amstrad cpc zx spectrum amiga port released 1987 others released 1988 like early psygnosis titles cover artwork part red dragon figure/landscape popular fantasy artist roger dean game spawned 1991 sequel barbarian ii released alongside leander ork platform-based action-adventures psygnosis game opens striking—for era—animation muscle-bound barbarian cutting chain sword amiga atari st versions animation accompanied loud digital sound effect game player hegor barbarian must traverse several dungeons underground habitats defeat brother evil sorcerer necron sword bow arsenal weapons running jumping many platform games comprises large part gameplay title game used unique control system make lack one joystick button many systems player would first press one button menu actions would appear along bottom screen player selected desired action cycling choices joystick pressing button desired action highlighted original versions game tried emulate visual style game cover opening animation game used detailed colorful sprites variety thoughtful sound effects accompany onscreen action dos version played digitized speech opening sequence featured sound effects using pc speaker game reviewed 1989 dragon 150 courtney harrington role computers column harrington gave game 4 5 stars review amstrad action issue 40 gave game 81 stating fun lacking long term
[ 10931, 9166, 9006 ]
None
3,437
5
Message_Send_Protocol:message send protocol message send protocol msp application layer protocol used send short message nodes network original version protocol published 1990 updated message send protocol 2 1992 one message send service defined connection-based application tcp service listens tcp connections port 18 connection established short message transmitted sender receiver connection sender closes connection sending message another message send service defined datagram-based application udp service listens udp datagrams port 18 datagram received receiver answering datagram sent back sender containing exactly data
[ 6993, 10924, 11413 ]
Validation
3,438
9
Paul_Irish:paul irish paul irish american front-end engineer developer advocate google chrome web browser widely recognized thought leader leading evangelist web technologies including javascript css 2011 named developer year net awards contributions web development landscape participation many popular open source projects irish created contributed led development many front-end web development projects javascript libraries irish created key contributor many websites effort encourage browser web developers move html5
[ 5067, 3462, 119 ]
Train
3,439
6
Arla_(file_system):arla file system arla implementation afs distributed file system developed royal institute technology stockholm arla started björn grönvall 1993 assar westerlund johan danielsson joined project shortly thereafter project died usable fall 1997 project restarted starting björn implementation rxkad assar ported xfs arla component confused xfs filesystem freebsd love hörnqvist-åstrand began working followed magnus ahltorp working linux kernel module artur grabowski working openbsd kernel module today arla afs client support openbsd freebsd netbsd linux solaris tru64 mac os x windows support way delayed insufficient windows knowledge experimental afs server available yet considered stable
[ 3826, 2395, 6797, 823 ]
None
3,440
4
Graham-Denning_model:graham-denning model graham-denning model computer security model shows subjects objects securely created deleted also addresses assign specific access rights mainly used access control mechanisms distributed systems three main parts model set subjects set objects set eight rules subject may process user makes request access resource object resource user process wants access model addresses security issues associated define set basic rights specific subjects execute security functions object model eight basic protection rules actions outline moreover object owner special rights subject another subject controller special rights model based access control matrix model rows correspond subjects columns correspond objects subjects element contains set rights subject object j subject subject k. example action contains rights subject object example execute executing one 8 rules example creating object matrix changed new column added object subject created becomes owner rule associated precondition example subject x wants delete object must owner x contains 'owner right harrison-ruzzo-ullman extended model defining system protection based commands made primitive operations conditions
[ 3360, 3616, 4583, 3480, 3417, 10170 ]
None
3,441
3
University_of_New_Hampshire_InterOperability_Laboratory:university new hampshire interoperability laboratory university new hampshire interoperability laboratory unh-iol independent test facility provides interoperability standards conformance testing networking telecommunications data storage consumer technology products founded 1988 employs approximately 25 full-time staff members 100 part-time undergraduate graduate students counts 150 companies members unh-iol began project university research computing center rcc 1988 rcc testing fiber distributed data interface fddi equipment intention deploying network rcc found equipment two vendors work together contacted vendors find solution two vendors cooperated rcc solve problem caused differences draft final fddi specification time period rcc testing 10base-t ethernet interfaces another project university recognized need interoperability testing networking equipment also opportunity provide students hands-on experience emerging technologies idea providing testing services companies vendor-neutral environment first unh-iol consortium 10base-t ethernet founded 1990 next decade unh-iol grew twelve consortia 100 member companies 2002 outgrown several smaller locations unh-iol moved 32,000 square foot facility outskirts unh campus one area unh-iol influential ipv6 standardization deployment 2003 2007 unh-iol organized moonv6 project multi-site ipv6 based network designed test interoperability ipv6 implementations time moonv6 project largest permanently deployed multi-vendor ipv6 network world unh-iol also north american laboratory offering iso/iec 17025 accredited testing designed specifically usgv6 test program unh-iol also known organizing hosting plugfests number industry trade organizations lab hosted plugests broadband forum nvm express scsi trade association ethernet alliance open compute project among others 2013 unh-iol awarded ieee-sa corporate award outstanding corporate leadership contribution ieee-sa january 2016 lab moved new 28,000 square foot location adjacent main unh campus durham nh unh-iol operates testing programs annual membership basis called consortia consortium collaboration equipment vendors test equipment manufacturers industry forums unh-iol particular technology collaborative testing model intended distribute costs associated maintaining high-quality testing program among consortium members unh-iol currently administers consortia 20 different technologies including
[ 6724, 4396, 7863, 2904, 7258, 3868, 5470 ]
None
3,442
9
Curl_(programming_language):curl programming language curl reflective object-oriented programming language interactive web applications whose goal provide smoother transition formatting programming makes possible embed complex objects simple documents without needing switch programming languages development platforms curl implementation initially consisted interpreter compiler added later curl combines text markup html scripting javascript heavy-duty computing java c c++ within one unified framework used range internal enterprise b2b b2c applications curl programs may compiled curl applets viewed using curl rte runtime environment plugin web browsers currently supported microsoft windows linux macos curl supports detached applets web deployed applet runs user desktop independent browser window much silverlight 3 adobe air curl language attempts address long-standing problem different building blocks make modern web document often require wildly different methods implementation different languages different tools different frameworks often completely different teams final — often difficult — hurdle getting blocks communicate consistent manner curl attempts side-step problems providing consistent syntactic semantic interface levels web content creation simple html complex object-oriented programming curl markup language like html—that plain text shown text time curl includes object-oriented programming language supports multiple inheritance curl applications required observe separation information style behavior html cascading style sheets css javascript imposed although style programming used curl desired curl language used html replacement presenting formatted text abilities range way compiled strongly typed object-oriented system programming language authoring html-level programming constructs curl extended user code language designed curl applications compiled native code client machine just-in-time compiler run high speed curl applets also written run off-line disconnected network occasionally connected computing fact curl ide application written curl simple curl applet helloworld might code run user least one curl versions 7.0 8.0 installed curl provides macros text-procedures addition anonymous procedures named methods alternative using text-procedure paragraph would recently style layout adopted builders groovy language jvm also familiar users css tcl/tk features web applications implemented combinations javascript libraries html css already found within curl language including features usually associated prototype script.aculo.us accordion panes curl sets callbacks manner also adopted groovy curl comments use vertical bar several variations simplest follows curl provides user-defined text procedures stylesheets curl used readily domain-specific lightweight markup major advantage plain text html markup text encoding set e.g. utf-8 text entered unicode-enabled editor without escaping characters like javascript curl unicode friendly poetry example would initially implemented defining poem stanza markup paragraph text formats stanza could refined include hidden navigation anchor page navigation using curl destination text procedure markup used different results one style text visible one context invisible another curl also permits top-level file inclusion source text markup included different parent files education example one could create source file test questions include student teacher version text
[ 9345, 3462, 6797, 1551, 8609, 11559, 5546, 5677, 7983, 10033, 823, 6074, 963, 10819, 8262, 3285, 4822, 8923, 4069, 6502, 9701, 5612, 8430, 9841, 2557 ]
None
3,443
2
EBCDIC:ebcdic extended binary coded decimal interchange code ebcdic eight-bit character encoding used mainly ibm mainframe ibm midrange computer operating systems descended code used punched cards corresponding six-bit binary-coded decimal code used ibm computer peripherals late 1950s early 1960s supported various non-ibm platforms fujitsu-siemens bs2000/osd os-iv msp msp-ex sds sigma series unisys vs/9 burroughs mcp icl vme ebcdic devised 1963 1964 ibm announced release ibm system/360 line mainframe computers eight-bit character encoding developed separately seven-bit ascii encoding scheme created extend existing binary-coded decimal bcd interchange code bcdic devised efficient means encoding two zone number punches punched cards six bits distinct encoding using position 2 instead 1 maintained punched cards desirable hole punches close ensure integrity physical card ibm chief proponent ascii standardization committee company time prepare ascii peripherals card punch machines ship system/360 computers company settled ebcdic system/360 became wildly successful together clones rca spectra 70 icl system 4 fujitsu facom thus ebcdic ibm mainframe midrange peripherals operating systems use ebcdic inherent encoding toleration ascii example ispf z/os browse edit ebcdic ascii encoded files software many hardware peripherals translate encodings modern mainframes ibm zseries include processor instructions hardware level accelerate translation character sets ebcdic-oriented unicode transformation format called utf-ebcdic proposed unicode consortium designed allow easy updating ebcdic software handle unicode intended used open interchange environments even systems extensive ebcdic support popular example z/os supports unicode preferring utf-16 specifically z/os limited support utf-ebcdic ibm aix running rs/6000 descendants including ibm power systems linux running z systems operating systems running ibm pc descendants use ascii aix/370 aix/390 running system/370 system/390 mainframes fact code points different less problem inter-operating ascii fact sorting ebcdic put lowercase letters uppercase letters letters numbers exactly opposite ascii programming languages file formats network protocols designed ascii quickly made use available punctuation marks curly braces exist ebcdic making translation ebcdic ambiguous also prevented various attempts make internationalized versions ascii also replaced punctuation marks letters gaps letters made simple code worked ascii fail ebcdic example codice_1 would set codice_2 26 letters ascii alphabet 41 characters including number unassigned ones ebcdic fixing required complicating code function calls greatly resisted programmers using eight bits ebcdic may encouraged use eight-bit byte ibm ascii likely adopted systems 36 bits five seven-bit ascii characters fit one word eight-bit bytes became widespread ascii systems sometimes used unused bit purposes metacharacters mark borders records words made difficult change code work ebcdic pdp-11 bytes high bit set treated negative numbers behavior copied c causing unexpected problems ebcdic problems also hindered adoption extended ascii character sets table shows invariant subset ebcdic characters assignments ebcdic code pages also shows gray missing ascii ebcdic punctuation located ccsid 037 one code page variants ebcdic unassigned codes typically filled international region-specific characters various ebcdic code page variants characters gray often moved around swapped well table cell first row abbreviation control code printable characters character second row unicode code blank controls n't exist unicode open-source software advocate software developer eric s. raymond writes jargon file ebcdic loathed hackers meant members subculture enthusiastic programmers jargon file 4.4.7 gives following definition ebcdic design also source many jokes one joke went references ebcdic character set made classic infocom adventure game series zork machine room zork ii ebcdic used imply incomprehensible language
[ 5888, 5384, 3594, 10508, 909, 7053, 11151, 7188, 2078, 421, 10235, 10108, 7983, 1841, 11059, 5557, 3642, 10426, 9920, 577, 7364, 73, 1610, 8138, 7504, 11217, 5714, 1235, 11218, 4565, 10072, 10585, 863, 479, 10474, 3563, 625, 2168, 9977, 3...
Test
3,444
5
Internet_Group_Management_Protocol_with_Access_Control:internet group management protocol access control internet group management protocol access control igmp-ac designed incorporating aaa protocol functionality existing ip multicast model enforce authentication authorization end user receiver joining leaving secured multicast group add aaa functionality access router one-hop router receiver act network access server nas igmp-ac extended version internet group management protocol provides generic client-server authentication protocol receiver end user act client aaa server act server access router one-hop router receiver perform forwarding task thus suitable authentication protocol e.g. extensible authentication protocol eap client-server entities encapsulated igmp-ac architecture igmp-ac disrupt usual function igmpv3 used classical multicast group access control mechanism igmp-ac take place join/leave secured restricted multicast group
[ 2737, 1411, 2509 ]
None
3,445
3
Extended_Industry_Standard_Architecture:extended industry standard architecture extended industry standard architecture practice almost always shortened eisa frequently pronounced eee-suh bus standard ibm pc compatible computers announced september 1988 consortium pc clone vendors gang nine counter ibm use proprietary micro channel architecture mca ps/2 series comparison bus –which gang nine retroactively renamed isa bus avoid infringing ibm trademark pc/at computer– eisa extended 32 bits allows one cpu share bus bus mastering support also enhanced provide access 4 gb memory unlike mca eisa accept older xt isa boards — lines slots eisa superset isa eisa much favoured manufacturers due proprietary nature mca even ibm produced machines supporting somewhat expensive implement though much mca never became particularly popular desktop pcs however reasonably successful server market better suited bandwidth-intensive tasks disk access networking eisa cards produced either scsi network cards eisa also available non-ibm compatible machines alphaserver hp 9000-d sgi indigo2 mips magnum time strong market need bus speeds capabilities desktop computers vesa local bus later pci filled niche eisa vanished obscurity original ibm pc included five 8-bit slots running system clock speed 4.77 mhz pc/at introduced 1984 three 8-bit slots five 16-bit slots running system clock speed 6 mhz earlier models 8 mhz last version computer 16-bit slots superset 8-bit configuration 8-bit cards able plug 16-bit slot cards used skirt design physically interfered extended portion slot continue run 8-bit mode one key reasons success ibm pc pc clones followed active ecosystem third-party expansion cards available machines ibm restricted patenting bus widely published bus specifications pc-clone industry continued build momentum mid- late-1980s several problems bus began apparent first slot known time managed central standards group nothing prevent manufacturer pushing standard one common issues pc clones became common pc manufacturers began ratcheting processor speed maintain competitive advantage unfortunately isa bus originally locked processor clock meant 286 machines isa buses ran 10 12 even 16 mhz fact first system clock isa bus 8 mhz turbo 8088 clones clocked processors 8 mhz caused many issues incompatibility true ibm-compatible third-party card designed 8 mhz 4.77 mhz bus might work higher speed system even worse would work unreliably pc makers eventually decoupled slot clock system clock still standards body police industry companies like dell modified bus design architecture well entrenched single clone manufacturer leverage create standardized alternative compelling reason cooperate new standard first 386-based system compaq deskpro 386 hit market 1986 still supported 16-bit slots 386 pcs followed suit later isa bus remained part systems even late 1990s meanwhile ibm began worry losing control industry created 1987 ibm released ps/2 line computers included mca bus mca included numerous enhancements 16-bit bus including bus mastering burst mode software configurable resources 32-bit capabilities however effort reassert dominant role ibm patented bus placed stringent licensing royalty policies use manufacturers produce licensed mca machines notably ncr overall industry balked ibm restrictions steve gibson proposed clone makers adopt nubus instead group gang nine led compaq created new bus named extended enhanced industry standard architecture eisa 16-bit bus became known industry standard architecture isa provided virtually technical advantages mca remaining compatible existing 8-bit 16-bit cards enticing system card makers minimal licensing cost eisa bus slot two-level staggered pin system upper part slot corresponding standard isa bus pin layout additional features eisa bus implemented lower part slot connector using thin traces inserted insulating gap upper isa card card edge connector additionally lower part bus five keying notches isa card unusually long traces accidentally extend lower part slot intel introduced first eisa chipset also first chipset modern sense word 82350 september 1989 intel introduced lower cost variant 82350dt announced april 1991 began shipping june year first eisa computer announced hp vectra 486 october 1989 first eisa computers hit market compaq deskpro 486 systempro systempro one first pc-style systems designed network server built ground take full advantage eisa bus included features multiprocessing hardware raid bus-mastering network cards one benefits come eisa standard final codification standard isa slots cards held particular clock speed fixed industry standard 8.33 mhz thus even systems n't use eisa bus gained advantage isa standardized contributed longevity gang nine informal name given consortium personal computer manufacturing companies together created eisa bus rival members generally acknowledged compaq leadership one stating 1989 within gang nine 10 people sit table write letter president someone write letter compaq sitting typewriter members although mca bus slight performance advantage eisa bus speed 10 mhz compared 8.33 mhz eisa contained almost technological benefits mca boasted including bus mastering burst mode software configurable resources 32-bit data/address buses brought eisa nearly par mca performance standpoint eisa easily defeated mca industry support eisa replaced tedious jumper configuration common isa cards software-based configuration every eisa system shipped eisa configuration utility usually slightly customized version standard utilities written eisa chipset makers user would boot utility either floppy disk dedicated hard drive partition utility software would detect eisa cards system could configure hardware resources interrupts memory ports etc eisa card eisa card would include disk information described available options card eisa system motherboard user could also enter information isa cards system allowing utility automatically reconfigure eisa cards avoid resource conflicts similarly windows 95 plug-and-play capability able change configuration eisa cards could detect cards read configuration reconfigure plug play hardware avoid resource conflicts windows 95 would also automatically attempt install appropriate drivers detected eisa cards eisa success far guaranteed many manufacturers including gang nine researched possibility using mca example compaq actually produced prototype deskpro systems using bus however never put production clear mca lost compaq allowed mca license expire license actually cost relatively little primary costs associated mca industry revolted royalties paid per system shipped hand became clear ibm micro channel dying ibm licensed eisa use server systems
[ 1400, 4228, 5384, 9742, 274, 408, 799, 2723, 8355, 6187, 11051, 7215, 8625, 5312, 3142, 6854, 3272, 10833, 9686, 2525, 5225, 1515, 11627, 8301, 6510, 7151, 1776, 6128, 6129, 5368, 9723, 5756 ]
None
3,446
9
NIL_(programming_language):nil programming language new implementation lisp nil programming language dialect language lisp developed massachusetts institute technology mit intended successor language maclisp 32-bit implementation part response digital equipment corporation dec vax computer project headed jon l white stated goal maintaining compatibility maclisp fixing many problems lisp language invented 1958 john mccarthy massachusetts institute technology mit inception lisp closely connected artificial intelligence ai research community especially pdp-10 systems 36-bit word size pdp-6 pdp-10 influenced usefulness two lisp 18-bit pointers one word pdp-6 project started early 1963 24-bit machine grew 36 bits lisp design goal lisp used implementation programming language micro planner foundation famous ai system shrdlu lisp particular maclisp named originated mit project mac also used implement macsyma computer algebra system 1970s ai research spawned commercial offshoots performance extant lisp systems became growing problem partly garbage collection lisp would use stop-and-copy garbage collection single heap memory allocation partly representation internal structures lisp became difficult run memory-limited stock computer hardware day led creating lisp machines dedicated hardware running lisp environments programs alternative use powerful commodity hardware becoming available especially digital equipment corporation dec vax nil implementation lisp developed mit mid late 1970s intended modern successor maclisp able run stock hardware contrast lisp machine lisp lisp machines originally designed first modern lisp dialect stock hardware development lisp machine lisp mit went become one main influences design common lisp pg 63/294 since users macsyma program represented large potential user base nil necessary nil would large complex system speed would imperative example high-speed bignums requirement support macsyma since nil would failure slow bignums consequently nil ended large base vax assembly language requirements led aggressive complex optimization strategy applied prematurely negative results final system concurrent effort write nil research group stanford university lawrence livermore national laboratory headed richard p. gabriel investigating design lisp run s-1 mark iia supercomputer s-1 lisp lisp never fully functional test bed implementing advanced compiler methods lisp eventually s-1 nil groups began collaborating although unsuccessful meeting goals used language nil important several ways first brought together jon l. white guy l. steele jr. richard p. gabriel later define common lisp second jonathan rees worked part nil project year away yale university returning yale hired computer science department write new lisp became optimizing native code scheme system named t. part nil begat name since nil
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 2105, 3132, 6717, 8258, 8771, 8262, 1613, 9299, 2135, 10841, 3675, 7267, 2660, 8293, 2666, 5751, 1147, 7805, 9345, 1159, 9865, 9877, 4774, 5803, 2225, 6840, 7...
Test
3,447
4
ISO/IEC_27002:iso/iec 27002 iso/iec 27002 information security standard published international organization standardization iso international electrotechnical commission iec titled information technology – security techniques – code practice information security controls iso/iec 27000-series standards descended corporate security standard donated shell uk government initiative early 1990s shell standard developed british standard bs 7799 mid-1990s adopted iso/iec 17799 2000 iso/iec standard revised 2005 renumbered iso/iec 27002 2007 align iso/iec 27000-series standards revised 2013 iso/iec 27002 provides best practice recommendations information security controls use responsible initiating implementing maintaining information security management systems isms information security defined within standard context cia triad standard starts 5 introductory chapters followed 14 main chapters within chapter information security controls objectives specified outlined information security controls generally regarded best practice means achieving objectives controls implementation guidance provided specific controls mandated since organizations implement wide range information security-related controls many recommended general terms iso/iec 27002 structuring information security controls infrastructure accordance iso/iec 27002 may advantageous since examples typical information security policies controls relating three parts iso/iec 27002 note merely illustration list example controls incomplete universally applicable iso/iec 27002 directly equivalent national standards several countries translation local publication often results several months delay main iso/iec standard revised released national standard bodies go great lengths ensure translated content accurately completely reflects iso/iec 27002 iso/iec 27002 advisory standard meant interpreted applied types sizes organization according particular information security risks face practice flexibility gives users lot latitude adopt information security controls make sense makes unsuitable relatively straightforward compliance testing implicit formal certification schemes iso/iec 27002 revised iso/iec jtc1/sc27 every years order keep current relevant revision involves instance incorporating references issued security standards iso/iec 27000 iso/iec 27004 iso/iec 27005 various good security practices emerged field since last published due significant 'installed base organizations already using iso/iec 27002 particularly relation information security controls supporting isms complies iso/iec 27001 changes justified wherever possible evolutionary rather revolutionary nature
[ 10752, 5636, 9607, 1934, 399, 8462, 5010, 8854, 5373, 11036, 5149, 2206, 9245, 5413, 8613, 7979, 10413, 6062, 11567, 11056, 433, 6834, 8627, 8881, 3126, 1079, 5816, 316, 62, 6977, 10307, 4936, 8904, 1610, 9290, 8524, 2519, 2904, 6105, 405...
None
3,448
9
Advanced_Continuous_Simulation_Language:advanced continuous simulation language advanced continuous simulation language acsl pronounced axle computer language designed modeling evaluating performance continuous systems described time-dependent nonlinear differential equations like simcos tutsim acsl dialect continuous system simulation language cssl originally designed simulation councils inc sci 1967 attempt unify continuous simulations field acsl equation-oriented language consisting set arithmetic operators standard functions set special acsl statements macro capability allows extension special acsl statements acsl intended provide simple method representing mathematical models digital computer working equation description problem block diagram user writes acsl statements describe system investigation important feature acsl sorting continuous model equations contrast general purpose programming languages fortran program execution depends critically statement order applications acsl new areas developed constantly typical areas acsl currently applied include control system design aerospace simulation chemical process dynamics power plant dynamics plant animal growth toxicology models vehicle handling microprocessor controllers robotics acslx family products aegis technologies group inc modular modeling system mms nhance technologies inc
[ 3104, 3960, 8262 ]
Test
3,449
7
Comparison_of_cluster_software:comparison cluster software following tables compare general technical information notable computer cluster software software grossly separated four categories job scheduler nodes management nodes installation integrated stack table explanation table explanation
[ 9602, 6797, 1806, 5397, 2710, 7318, 1185, 5414, 3753, 9137, 823, 5956, 2254, 4052, 11353, 3678, 10597, 5223, 8554, 875, 5492, 3323, 2045, 8447 ]
Test
3,450
3
Failover:failover computing related technologies networking failover switching redundant standby computer server system hardware component network upon failure abnormal termination previously active application server system hardware component network failover switchover essentially operation except failover automatic usually operates without warning switchover requires human intervention systems designers usually provide failover capability servers systems networks requiring near-continuous availability high degree reliability server level failover automation usually uses heartbeat system connects two servers either using separate cable example rs-232 serial ports/cable network connection long regular pulse heartbeat continues main server second server second server bring systems online may also third spare parts server running spare components hot switching prevent downtime second server takes work first soon detects alteration heartbeat first machine systems ability send notification failover certain systems intentionally failover entirely automatically require human intervention automated manual approval configuration runs automatically human approved failover failback process restoring system component service previously state failure back original working state standby system go functioning back standby use virtualization software allowed failover practices become less reliant physical hardware process referred migration running virtual machine moved one physical host another little disruption service term failover although probably use engineers much earlier found 1962 declassified nasa report term switchover found 1950s describing hot cold standby systems current meaning immediate switchover running system hot delayed switchover system needs starting cold conference proceedings 1957 describes computer systems emergency switchover i.e failover scheduled failover maintenance
[ 2944, 9990, 903, 7049, 8338, 3219, 1049, 154, 1307, 929, 8233, 3757, 2222, 10681, 4026, 6591, 9919, 5825, 11203, 1606, 1223, 1990, 1993, 970, 9677, 4435, 3927, 3931, 2395, 8670, 2913, 1891, 10340, 5093, 7016, 4074, 10733, 6514, 6003, 9844...
Test
3,451
3
Stanford_MIPS:stanford mips mips acronym microprocessor without interlocked pipeline stages research project conducted john l. hennessy stanford university 1981 1984 mips investigated type instruction set architecture isa called reduced instruction set computer risc implementation microprocessor large scale integration vlsi semiconductor technology effective exploitation risc architectures optimizing compilers mips together ibm 801 berkeley risc three research projects pioneered popularized risc technology mid-1980s recognition impact mips made computing hennessey awarded ieee john von neumann medal 2000 ieee shared david a. patterson eckert–mauchly award 2001 association computing machinery seymour cray computer engineering award 2001 ieee computer society david patterson turing award 2017 acm project initiated 1981 response reports similar projects ibm 801 university california berkeley risc mips conducted hennessy graduate students conclusion 1984 hennessey founded mips computer systems year commercialize technology developed project 1985 mips computer systems announced new isa also called mips first implementation r2000 microprocessor commercial mips isa implementations went widely used appearing embedded computers personal computers workstations servers supercomputers may 2017 commercial mips isa owned imagination technologies used mainly embedded computers late 1980s follow-up project called mips-x conducted hennessy stanford mips isa based 32-bit word supported 32-bit addressing word-addressed load/store architecture—all references memory used load store instructions copied data main memory 32 general-purpose registers gprs instructions integer arithmetic operated gprs possessed basic instruction set consisting instructions control flow integer arithmetic logical operations minimize pipeline stalls instructions except load store executed one clock cycle instructions integer multiplication division operations floating-point numbers architecture exposed hazards caused five-stage pipeline delay slots compiler scheduled instructions avoid hazards resulting incorrect computation whilst simultaneously ensuring generated code minimized execution time mips instructions 16 32 bit long decision expose hazards motivated desire maximize performance minimizing critical paths interlock circuits lengthened instructions packed 32-bit instruction words mips word-addressed 32-bit instruction word could contain two 16-bit operations included reduce size machine code mips microprocessor implemented nmos logic
[ 4098, 8450, 8327, 8711, 783, 1298, 5267, 7445, 409, 9371, 4124, 8861, 9851, 10781, 8481, 5028, 3493, 6311, 426, 682, 938, 4269, 7852, 8237, 2224, 4144, 9003, 9391, 1462, 2620, 7234, 6979, 6084, 3014, 3142, 1480, 10316, 6607, 2517, 7770, ...
Train
3,452
4
NebuAd:nebuad nebuad american online advertising company based redwood city california offices new york london funded investment companies sierra ventures menlo ventures one several companies originally developed behavioral targeting advertising systems sought deals isps enable analyse customer websurfing habits order provide relevant micro-targeted advertising phorm similar company operating europe adzilla project rialto also appear developing similar systems one point nebuad signed 30 customers mostly internet access providers agreements providers covered 10 percent broadband users america due fallout following public congressional concern nebuad largest isp customers pulled nebuad closed business uk august 2008 followed us may 2009 nebuad uk ltd dissolved february 2010 nebuad platform comprised three main parts hardware hosted within isp capable inserting content pages off-site server complex analyse categorise contents users internet communications relationships advertising networks willing present nebuad targeted advertising system consisted hardware device installed within isp client network device capable monitoring 50,000 users users could opt-out nebuad ’ information collection targeted ads way users prevent isps sending data nebuad first place since isps route customers traffic important vantage point monitor traffic to-and-from consumer using deep packet inspection dpi analysing traffic nebuad reported gained information customers particular interests less intrusive methods nebuad privacy policy claimed specifically store use information relating confidential medical information racial ethnic origins religious beliefs sexuality tied personally identifiable information 'sensitive personal information also advises information collect stored processed nebuad servers united states result information may subject access requests governments courts law enforcement least 2 customers middle america isp wow noticed unexpected cookies appearing sites nebuad.adjuggler.com using google read written wow support department contacted wow initially denied responsibility activity noticing problems google loading slowly creation non-google cookies one customer spent hours trying disinfect machine incorrectly thought infected spyware proved ineffective resorted reinstalling machine os scratch discover problem go away july 9 2008 wow suspended use nebuad services subscribers according nebuad sales less 1 users opt-out one isp expected earn least 2.50 per month user nebuad bought impressions ad networks including valueclick nebuad argued behavioral targeting enriches internet several fronts firstly website owners offered improved click-through rate ctr could increase profits reduce amount page-space dedicated advertising owners previously thought ad-unfriendly websites offered chance make money subject matter website interests visitors advertisers offered better targeted adverts hence reducing scattergun approach publishing many ads possible hope catching client users offered relevant adverts isps paid allowing nebuad access network per-user per-active profile basis nebuad used data web search terms page views page ad clicks time spent specific sites zip code browser info connection speed categorise user interests nebuad access user identification information isp may able discover traffic monitoring example email traffic may tie email address ip address bob dykes nebuad ceo claimed 2008 800 consumer interest segments today 're expanding multiple thousands generally nebuad provided additional revenue network operators may maintain lower consumers internet access bills critics dpi targeted advertising believe raw content internet communications entrusted isp handling without inspected modified sale privacy advocates criticize lack disclosure isps provided prior partnering nebuad weak opt-out method lack oversight third-party company contents internet communications conflicts united states wiretap laws company refusal name partner isps february 2008 one american cable operator wide open west wow started rolling nebuad roll-out completed first week march 2008 wow updated terms conditions include mention nebuad cases informed customers terms updated however customers explicitly notified nebuad later sometime third week march 2008 response inquiry members united states house representatives telecommunications subcommittee pilot test nebuad services embarq said notified consumers revising privacy policy 2 weeks prior sending users data streams nebuad knology user knoxville tennessee reported notified internet use monitored may 2008 charter communications announced planned monitor websites visited customers via partnership nebuad customers voiced concerns charter changed mind june plans implement nebuad agree isp employees including one employee planned re-route traffic avoid nebuad deep packet inspection hardware altogether members us congress ed markey chairman house subcommittee telecommunications internet joe barton ranking member house committee energy commerce argued services must opt-in comply provisions laid section 631 us communications act wrote charter request suspend test respectfully request move forward charter communications proposed venture nebuad opportunity discuss issues raised proposed venture writer wired news questioned whether charter users could really opt monitored able opt receiving targeted ads writer asked would breach anti-wiretapping laws engineer examined system confirmed way opt nebuad monitoring inbound outbound information intercepted sent nebuad offsite server processed even user opted service prevent isp sending data nebuad report robert m. topolski chief technology consultant free press public knowledge showed nebuad devices created cookies end-users machines injecting specious packet end data stream returned response web page requests submitted search engines including google yahoo content specious packet would added end web page rendered end-user browser contained html script tags cause browser request javascript http //a.faireagle.com critics concerned nebuad superimposed advertising ads advertisers placing additional advertising page concerns originated nebuad fair eagle operation patent application data mentioned inventions loose relationship claria corporation whose products history suggest tactics well following 2007 reported redmoon texas-based isp using nebuad technology inject redmoon advertising pages visited users fair eagle advertisement hardware provided nebuad inserted additional advertising alongside content web pages ads featured window fair eagle title bar injected ads stopped appearing toward end june 2007 senior staff members nebuad worked previously defunct ad company named claria corporation formerly gator corporation well known ad software known gator claria nebuad located redwood city california june 2006 creation nebuad.com coincides timing claria decision shut gator service nebuad repeatedly denied corporate connection claria describing hiring claria employees result company shedding employees tight market experienced advertising sales staff valley isps tried deployed prepared deploy nebuad included following following isps listed legal documents related class action notice see deployed nebuad hardware isps ended suspended relationship nebuad nebuad closed uk august 2008 us may 2009 proposed settlement class-action lawsuit nebuad underway october 2011 subscribers isps listed january 1 2007 july 1 2008 considered mandatory class members opt could choose opt terms proposed settlement nebuad would create settlement fund approximately 2,410,000 used administration settlement covering legal fees incentive award 5,000 individual brought complaint providing 1000 named representatives money going support non-profits providing consumer education privacy research
[ 9168, 10417, 4732 ]
Test
3,453
3
VESA_Plug_and_Display:vesa plug display vesa plug display p video connector digital monitors flat panel displays video projectors ratified vesa introduced around time dfp marketed replacement vesa enhanced video connector extension dvi unlike dvi never achieved widespread implementation p connector shares pin layout vesa evc pins assigned carrying analogue audio video signals reused carry digital video signals basic p line carries single-link tmds digital video signal max 160 mhz supports vesa display data channel version 2 analogue video signals supported must capable carrying least 150 mhz bandwidth usb version specified supported would intended contemporary usb standards usb connector intended passing mouse movements projector wireless remote computer presentation software firewire supported must compliant ieee 1394-1995 specification although pin layout comes vesa evc connector shell slightly different p d-a/d compatible evc device except missing vesa evc features p d-d addition regular p connector standard also specifies 40-pin microribbon connector defined making digital video connection articles register sometimes mistake p port alternative form apple display connector adc carries higher current different pin layout support firewire
[ 9057, 7594, 10954, 6575, 11631, 4567, 7647 ]
None
3,454
1
Oracle_Spatial_and_Graph:oracle spatial graph oracle spatial graph formerly oracle spatial forms separately-licensed option component oracle database spatial features oracle spatial graph aid users managing geographic location-data native type within oracle database potentially supporting wide range applications — automated mapping facilities management geographic information systems am/fm/gis wireless location services location-enabled e-business graph features oracle spatial graph include oracle network data model ndm graphs used traditional network applications major transportation telcos utilities energy organizations rdf semantic graphs used social networks social interactions linking disparate data sets address requirements research health sciences finance media intelligence communities geospatial feature oracle spatial graph provides sql schema functions facilitate storage retrieval update query collections spatial features oracle database spatial component spatial feature consists geometric representation shape coordinate space — referred geometry oracle spatial geospatial data features consist network data model feature property graph model used model analyze physical logical networks used industries transportation logistics utilities features include rdf semantic graph feature supports world wide web consortium w3c rdf standards provides rdf data management querying inferencing commonly used variety applications ranging semantic data integration social network analysis linked open data applications features include oracle spatial graph option oracle enterprise edition must licensed separately also included oracle database cloud service high performance edition extreme performance edition included oracle standard edition oracle standard edition one however latter two editions allow use subset spatial features called oracle locator extra cost appendix oracle spatial graph developer guide specifies functions allowed locator oracle rdbms first incorporated spatial-data capability modification oracle 4 made scientists working canadian hydrographic service chs joint development team chs oracle personnel subsequently redesigned oracle kernel resulting spatial data option sdo oracle 7 sdo_ prefix continues use within oracle spatial implementations spatial indexing system sdo involved adaptation riemannian hypercube data-structures invoking helical spiral 3-dimensional space allows n-size features also permitted highly efficient compression resulting data suitable petabyte-size data repositories chs major corporate users required also improving search retrieval times helical hyperspatial code hhcode developed chs implemented oracle spatial comprises form space-filling curve oracle 8 oracle corporation marketing dubbed spatial extension simply oracle spatial primary spatial indexing system longer uses hhcode standard r-tree index since july 2012 option named oracle spatial graph highlight graph database capabilities product network data model graph introduced oracle database 10g release 1 rdf semantic graph introduced oracle database 10g release 2 oracle documentation library http //www.oracle.com/pls/db121/portal.portal_db selected=7 frame= see
[ 5632, 10145, 11651, 10340, 6629, 6953, 10505, 5612, 10413, 7983, 10452, 4058, 7868, 10525, 9631 ]
Test
3,455
4
Network_Crack_Program_Hacker_Group:network crack program hacker group network crack program hacker group ncph group chinese hacker group based zigong sichuan province group first gained notoriety hacking 40 hacker association websites china attacks grew sophistication notoriety 2006 received international media attention early 2007. idefense linked ginwui rootkit developed leader tan dailin wicked rose attacks us department defense may june 2006. idefense linked group many 35 zero-day hacker proof-of-concept codes used attacks period 90 days summer 2006 also known remote-network-control programs offer download wicked rose announced blog post group paid work group sponsor unknown group four core members 2006 wicked rose kungbim charles rodag approximately 10 members total group current membership unknown wicked rose also known meigui 玫瑰 pseudonym chinese hacker tan dailin first noted hacker patriotic attacks 2001 2005 wicked rose contracted sichuan military command communication department instructed participate chengdu military command network attack/defense competition winning local competition received month intense training simulating attacks designing hacking tools drafting network-infiltration strategies team represented sichuan military command competition provinces went win wicked rose also credited development ginwui rootkit used attacks us department defense 2006 group leader responsible managing relationships sponsors paying ncph members work april 2009 arrested committing distributed denial service attacks hackbase hackerxfiles 3800hk possibly purpose committing blackmail organizations attacked collected information attack turned public security department authorities conducted investigation shut website hackbase reported wicked rose arrested faces 7 years prison group expelled hacker wzt 20 may 2006 although cause unknown group ejected soon zero-day attacks publicly disclosed wzt coding expert within group former ncph member associates chinese hacker li0n founder honker union china huc wicked rose credits chinese hacker whg also known fig one developers ginwui rootkit whg expert malicious code security firms researching wicked rose activities connected chinese hacker group evil security team group known remote-network-control programs offer free website exploitation zero-day vulnerabilities microsoft office suite products founding 2004 group earned reputation among hacking groups hacking 40 hacker association websites china wicked rose creator ginwui rootkit code support posts chinese hacker message boards also available ncph blog security researchers discovered rootkit 18 may 2006 attackers utilized attacks us japan attackers introduced us attack department defense entity used two different versions rootkit attacks may june 2006 according f-secure ginwui fully featured backdoor rootkit characteristics distributed word documents backdoor ginwui creates allows controlling hacker control certain processes compromised computer including ability idefense links ncph many 35 zero-day proof-of-concept codes used attacks microsoft office products period 90 days summer 2006 due use malware developed wicked rose available public domain time group graduated early attacks exploiting microsoft word end 2006 also using power point excel attacks ncph utilizes exploits spear phishing attacks blog wicked rose discussed preference spear phishing attacks first collection phase information gathered using open source information employee databases mailboxes company system may also conduct analysis user id allows track understand activities finally conducts attack using information collected someone likely open infected document spear phishing attacks attributed ncph increased sophistication time phishing attacks beginning 2006 targeted large numbers employees one attack attributed group later year targeted one individual us oil company using socially engineered emails infected power point documents winning military network attack/defense competition group obtained sponsor paid 2000 rmb per month idefense believes sponsor likely people liberation army pla definitive evidence support claim 2006 attacks took place sponsor increased pay 5000 rmb group current sponsor unknown time reporter simon elegant interviewed eight members group december 2007 part article chinese government cyber operations us government interview members referred using code names security firm idefense published reports group exploits devoted webinar group capabilities relationships chinese hackers scott henderson chinese linguistics chinese hacker expert also devoted several blog posts group ongoing activities four core members group blogged activities one point another group blog ncph.net also offered network-infiltration programs download scott henderson describes wicked rose early blog posts revealing damning thing ever seen chinese hacker write interview time reporter wicked rose took group blog blog july 2008 group blog returned modified content withered rose also began blogging saying busy time blog new job allows time blog chinese officials removed blogs arrest april 2009 rodag also blogs recent post august 2008 last post ie vulnerabilities attackers used exploit user desktop
[ 11511, 7515, 9791 ]
Validation
3,456
4
Budapest_Declaration_on_Machine_Readable_Travel_Documents:budapest declaration machine readable travel documents budapest declaration machine readable travel documents declaration issued future identity information society fidis network excellence raise concern public risks associated security architecture related management machine readable travel documents mrtds current implementation passports european union creates threats related identity theft privacy declaration proclaimed budapest september 2006
[ 10685 ]
Validation
3,457
3
Execution_unit:execution unit computer engineering execution unit also called functional unit part central processing unit cpu performs operations calculations instructed computer program may internal control sequence unit confused cpu main control unit registers internal units arithmetic logic unit alu address generation unit agu floating-point unit fpu load-store unit lsu branch execution unit beu smaller specific components common modern cpus multiple parallel execution units referred superscalar design simplest arrangement use one bus manager manage memory interface others perform calculations additionally modern cpus execution units usually pipelined
[ 7173, 9739, 2066, 7699, 5655, 1563, 10779, 10781, 6181, 8231, 10796, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 7269, 3175, 8815, 630, 8822, 9851, 6268, 3197, 7313, 2708, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 78...
Test
3,458
2
Open_Source_and_Linux_Organization:open source linux organization hewlett-packard open source linux organization earlier known hp linux group 100 linux programmers 300 products free software released 300 open source printer drivers
[ 7938, 7812, 8326, 4360, 5384, 4493, 2195, 11155, 1813, 10780, 1694, 3618, 4011, 9646, 823, 9660, 10817, 5067, 8147, 1761, 4841 ]
None
3,459
3
X87:x87 x87 floating-point-related subset x86 architecture instruction set originated extension 8086 instruction set form optional floating-point coprocessors worked tandem corresponding x86 cpus microchips names ending 87 also known npx numeric processor extension like extensions basic instruction set x87 instructions strictly needed construct working programs provide hardware microcode implementations common numerical tasks allowing tasks performed much faster corresponding machine code routines x87 instruction set includes instructions basic floating-point operations addition subtraction comparison also complex numerical operations computation tangent function inverse example x86 processors since intel 80486 x87 instructions implemented main cpu term sometimes still used refer part instruction set x87 instructions standard pcs compilers programmers use rather slow library calls perform floating-point operations method still common low-cost embedded systems x87 registers form 8-level deep non-strict stack structure ranging st 0 st 7 registers directly accessed either operand using offset relative top well pushed popped scheme may compared stack frame may pushed/popped indexed instructions push calculate pop values top stack unary operations fsqrt fptan etc implicitly address topmost st 0 binary operations fadd fmul fcom etc implicitly address st 0 st 1 non-strict stack model also allows binary operations use st 0 together direct memory operand explicitly specified stack register st x role similar traditional accumulator combined destination left operand also reversed instruction-by-instruction basis st 0 unmodified operand st x destination furthermore contents st 0 exchanged another stack register using instruction called fxch st x properties make x87 stack usable seven freely addressable registers plus dedicated accumulator seven independent accumulators especially applicable superscalar x86 processors pentium 1993 later exchange instructions codes d9c8..d9cf optimized zero clock penalty using one integer paths fxch st x parallel fpu instruction despite natural convenient human assembly language programmers compiler writers found complicated construct automatic code generators schedule x87 code effectively stack-based interface potentially minimize need save scratch variables function calls compared register-based interface although historically design issues original implementation limited potential x87 provides single-precision double-precision 80-bit double-extended precision binary floating-point arithmetic per ieee 754-1985 standard default x87 processors use 80-bit double-extended precision internally allow sustained precision many calculations see ieee 754 design rationale given sequence arithmetic operations may thus behave slightly differently compared strict single-precision double-precision ieee 754 fpu may sometimes problematic semi-numerical calculations written assume double precision correct operation avoid problems x87 configured using special configuration/status register automatically round single double precision operation since introduction sse2 x87 instructions essential remain important high-precision scalar unit numerical calculations sensitive round-off error requiring 64-bit mantissa precision extended range available 80-bit format clock cycle counts examples typical x87 fpu instructions register-register versions shown ... b notation minimum maximum covers timing variations dependent transient pipeline status arithmetic precision chosen 32 64 80 bits also includes variations due numerical cases number set bits zero etc. l → h notation depicts values corresponding lowest l highest h maximal clock frequencies available companies designed manufactured floating-point units compatible intel 8087 later models include amd 287 387 486dx 5x86 k5 k6 k7 k8 chips technologies super math coprocessors cyrix fasmath cx87slc cx87dlc etc. 6x86 cyrix mii fujitsu early pentium mobile etc harris semiconductor manufactured 80387 486dx processors ibm various 387 486 designs idt winchip c3 c7 nano etc iit 2c87 3c87 etc lc technology green math coprocessors national semiconductor geode gx1 geode gxm etc nexgen nx587 rise technology mp6 st microelectronics manufactured 486dx 5x86 etc texas instruments manufactured 486dx processors etc transmeta tm5600 tm5800 ulsi math·co coprocessors via c3 c7 nano etc xtend 83s87sx-25 coprocessors 8087 first math coprocessor 16-bit processors designed intel built paired intel 8088 8086 microprocessors intel earlier 8231 8232 floating-point processors marketed use i8080 cpu fact licensed versions amd am9511 am9512 fpus 1977 1979 80187 80c187 math coprocessor intel 80186 cpu incapable operating 80188 80188 8-bit data bus 80188 use 8087 80187 appear time 80186 80188 fact launched 80287 80387 although interface main processor 8087 core 80387 thus fully ieee 754-compliant capable executing 80387 extra instructions 80287 i287 math coprocessor intel 80286 series microprocessors intel models included variants specified upper frequency limits ranging 6 12 mhz later followed i80287xl 387 microarchitecture i80287xlt special version intended laptops well variants 80287xl actually 80387sx 287 pinout contains internal 3/2 multiplier motherboards ran coprocessor 2/3 cpu speed could instead run fpu speed cpu 287 models 387-like performance intel 80c287 built using chmos iii amd 80ec287 manufactured amd cmos process using fully static gates 80287 80287xl work 80386 microprocessor initially coprocessors available 80386 introduction 80387 1987 finally able work cyrix cx486slc however chips 80387 strongly preferred higher performance greater capability instruction set 80387 387 i387 first intel coprocessor fully compliant ieee 754-1985 standard released 1987 full two years 386 chip i387 includes much improved speed intel previous 8087/80287 coprocessors improved characteristics trigonometric functions 8087 80287 fptan fpatan instructions limited argument range ±π/4 ±45° 8087 80287 direct instructions sin cos functions without coprocessor 386 normally performs floating-point arithmetic relatively slow software routines implemented runtime software exception handler math coprocessor paired 386 coprocessor performs floating-point arithmetic hardware returning results much faster emulating software library call i387 compatible standard i386 chip 32-bit processor bus later cost-reduced i386sx narrower 16-bit data bus interface i387 32-bit bus i386sx requires coprocessor 80387sx compatible sx narrower 16-bit data bus i487sx p23n marketed floating-point unit coprocessor intel i486sx machines actually contained full-blown i486dx implementation installed i486sx system i487 disabled main cpu took cpu operations i487 took measures detect presence i486sx would function without original cpu place nx587 last fpu x86 manufactured separately cpu case nexgen nx586
[ 5380, 1029, 1798, 3973, 6151, 7173, 5386, 8325, 4108, 1677, 6924, 6415, 9095, 5649, 9611, 5523, 6804, 8851, 4886, 9111, 3352, 5883, 1952, 6815, 6821, 2088, 3883, 10669, 9391, 9137, 4276, 1461, 10548, 2237, 5309, 8125, 8126, 6339, 5444, 58...
Test
3,460
5
Yahoo!_Messenger_Protocol:yahoo messenger protocol yahoo messenger protocol ymsg underlying network protocol used yahoo messenger instant messaging client yahoo instant messager supports many features beyond messaging including off-line messaging file transfer chat conferencing voice chat webcams avatars ymsg protocol provides language series conventions software communicating yahoo instant messaging service essence ymsg performs role yahoo im http world wide web unlike http however ymsg proprietary protocol closed standard aligned yahoo messaging service rival messaging services protocols based open standards others proprietary effectively fulfilling role different mechanics one fundamental tenets instant messaging notion users see someone connected network—known industry 'presence ymsg protocol uses mechanics standard internet connection achieve presence—the connection uses send receive data order user remain 'visible users service thereby signaling availability yahoo im client software must maintain functional open network connection linking client yahoo im servers organizations block communication port used yahoo im either choose whitelist certain types internet usage web surfing email example seek blacklist instant messaging services yahoo provides alternative route connecting service mimics http protocol used world wide web however http inherent sense persistent connection yahoo instead relies client frequently contacting server order approximate sense connection required give user presence im network originally ymsg login procedure suffered security flaw known replay attack given password authentication information always identically scrambled sent across network allowed attacker witnesses transmission merely reproduce message verbatim order successfully log without actually needing know original password details generated time around 2000 2001 yahoo upgraded service introduce random element login attempt defeating potential replay attacks exception login authentication details data sent ymsg connection encrypted ymsg uses binary format text portions data transmitted plain view therefore difficult attacker seize control yahoo im account quite easy read messages sent account holder along details list friends attacker control one computers data routed ymsg protocol communicates client application server using tcp/ip connection port 5050 default ports may used port blocked alternatively http route available clients behind well-secured firewall http requests used upload messages client downloading messages accumulated server since last request client remains logged long tcp/ip connection kept open case client connected via http client fails send request time 'ping messages sent every thirty seconds ymsg packets consist twenty byte header consists four bytes ymsg two bytes version current version 19 two bytes vendor id typically 0 two bytes packet length content include 20 byte header two bytes service type ymsg packet 4 bytes status related buddy status though used log invisible four bytes session id rest packet variable length table key/value pairs key ascii representation numeric code representing field type value associated data two byte separator hexadecimal values c0 80 used delimit entry table parts ymsg rely protocols example file transfer initially negotiated using ymsg actual transfer file done via http webcams also use ymsg discover request permission view http actually feed jpeg 2000 images one client another chatroom categories rooms lobbies retrieved using http xml documents regular webcam connections use h.323 yahoo voice uses sip calls voip handled indirectly yahoo servers chat client direct access yahoo chat conference voice however use older form audio compression called truespeech developed dsp group chatroom categories retrieved login process multi-step process spans two protocols client successfully establishing tcp connection ymsg server sends authentication packet contains user name user wishes log ymsg server ymsg server responds authentication packet containing challenge string key/value field 96 https process starts connecting login.yahoo.com sending token_get string constructed username password account client trying log https response token login successful contain token string another https request sent login.yahoo.com token_login constructed token successful response contain three strings crumb tcookie ycookie client combines crumb challenge strings performs md5 hash combined string converts resulting 16-byte value base64 string performs negligible amount manipulation resulting base64 string making three character replacements '+ '= '- '/ resultant base64 string used building authenticationresponse packet whose key 307 contains resultant base64 string value client sends authenticationresponse packet authenticationresponse packet successful client receive list listv15 statusv15 newmail ping number y7 buddy authorization message packets offline messages buddy requests list packet contains aliases user accounts yahooid listv15 contains users friends groups ignored user list statusv15 packet contains users listv15 online busy idle well status messages users may potentially string represents resource another http server user display image
[ 10242, 5251, 5382, 4746, 1036, 11408, 3228, 8735, 10271, 3105, 9511, 1962, 9519, 8758, 1467, 6208, 1218, 2760, 2892, 4318, 479, 3812, 4068, 6628, 488, 7407, 8692, 4085, 8694, 119, 7928, 10748 ]
Test
3,461
4
Source_code_virus:source code virus source code viruses subset computer viruses make modifications source code located infected machine source file overwritten includes call malicious code targeting generic programming language c source code viruses portable source code viruses rare partly due difficulty parsing source code programmatically reported exist
[ 7515, 2045 ]
None
3,462
9
JavaScript:javascript javascript often abbreviated js high-level interpreted scripting language conforms ecmascript specification javascript curly-bracket syntax dynamic typing prototype-based object-orientation first-class functions alongside html css javascript one core technologies world wide web javascript enables interactive web pages essential part web applications vast majority websites use major web browsers dedicated javascript engine execute multi-paradigm language javascript supports event-driven functional imperative including object-oriented prototype-based programming styles apis working text arrays dates regular expressions dom language include i/o networking storage graphics facilities relies upon host environment embedded provide features initially implemented client-side web browsers javascript engines embedded many types host software including server-side web servers databases non-web programs word processors pdf software runtime environments make javascript available writing mobile desktop applications including desktop widgets terms vanilla javascript vanilla js refer javascript extended frameworks additional libraries scripts written vanilla js plain javascript code although similarities javascript java including language name syntax respective standard libraries two languages distinct differ greatly design javascript influenced programming languages self scheme json serialization format used store data structures files transmit across networks based javascript 1993 national center supercomputing applications ncsa unit university illinois urbana-champaign released ncsa mosaic first popular graphical web browser played important part expanding growth nascent world wide web beyond nextstep niche worldwideweb formed three years earlier 1994 company called mosaic communications founded mountain view california employed many original ncsa mosaic authors create mosaic netscape however intentionally shared code ncsa mosaic internal codename company browser mozilla portmanteau mosaic godzilla first version web browser mosaic netscape 0.9 released late 1994 within four months already taken three-quarters browser market became main web browser 1990s avoid trademark ownership problems ncsa browser subsequently renamed netscape navigator year company took name netscape communications netscape communications realized web needed become dynamic marc andreessen founder company believed html needed glue language easy use web designers part-time programmers assemble components images plugins code could written directly web page markup 1995 netscape communications recruited brendan eich goal embedding scheme programming language netscape navigator could get started netscape communications collaborated sun microsystems include sun static programming language java netscape navigator compete microsoft user adoption web technologies platforms netscape communications decided scripting language wanted create would complement java similar syntax excluded adopting languages perl python tcl scheme defend idea javascript competing proposals company needed prototype eich wrote one 10 days may 1995 although developed name mocha language officially called livescript first shipped beta releases netscape navigator 2.0 september 1995 renamed javascript deployed netscape navigator 2.0 beta 3 december final choice name caused confusion giving impression language spin-off java programming language choice characterized marketing ploy netscape give javascript cachet hot new web programming language common misconception javascript influenced earlier web page scripting language developed nombas named cmm confused later c -- created 1997 brendan eich however never heard cmm created livescript nombas pitch embedded web page scripting netscape though web page scripting new concept shown violawww web browser nombas later switched offering javascript instead cmm scriptease product part tc39 group standardized ecmascript december 1995 soon releasing javascript browsers netscape introduced implementation language server-side scripting netscape enterprise server since 1996 iis web-server supported microsoft implementation server-side javascript—jscript—in asp .net pages since mid-2000s additional server-side javascript implementations introduced node.js 2009 microsoft script technologies including vbscript jscript released 1996 jscript reverse-engineered implementation netscape javascript part internet explorer 3 jscript also available server-side scripting internet information server internet explorer 3 also included microsoft first support css various extensions html case implementation noticeably different found netscape navigator time differences made difficult designers programmers make single website work well browsers leading use best viewed netscape best viewed internet explorer logos characterized early years browser wars javascript began acquire reputation one roadblocks cross-platform standards-driven web developers took difficult task trying make sites work major browsers many could afford time release internet explorer 4 microsoft introduced concept dynamic html differences language implementations different proprietary document object models remained obstacles widespread take-up javascript web november 1996 netscape submitted javascript ecma international carve standard specification browser vendors could implement based work done netscape led official release language specification ecmascript published first edition ecma-262 standard june 1997 javascript well known implementations actionscript jscript well-known implementations ecmascript release ecmascript 2 june 1998 continued standards process cycle conforming modifications iso/iec 16262 international standard ecmascript 3 released december 1999 modern-day baseline javascript original ecmascript 4 work led waldemar horwat netscape google started 2000 microsoft initially participated implemented proposals jscript .net language time clear microsoft intention cooperating implementing proper javascript internet explorer even though competing proposal partial diverged point implementation .net server side 2003 original ecmascript 4 work mothballed next major event 2005 two major happenings javascript history first brendan eich mozilla rejoined ecma international not-for-profit member work started ecmascript xml e4x ecma-357 standard came ex-microsoft employees bea systems originally acquired crossgain led working jointly macromedia later acquired adobe systems implementing e4x actionscript 3 actionscript 3 fork original ecmascript 4 along macromedia work restarted ecmascript 4 goal standardizing actionscript 3 end adobe systems released actionscript virtual machine 2 code named tamarin open source project tamarin actionscript 3 different web javascript converge realized parties 2007 2008 alas still turmoil various players douglas crockford—then yahoo —joined forces microsoft 2007 oppose ecmascript 4 led ecmascript 3.1 effort development ecmascript 4 never completed work influenced subsequent versions happening open source developer communities set work revolutionize could done javascript community effort sparked 2005 jesse james garrett released white paper coined term ajax described set technologies javascript backbone used create web applications data loaded background avoiding need full page reloads leading dynamic applications resulted renaissance period javascript usage spearheaded open source libraries communities formed around libraries prototype jquery dojo toolkit mootools others released july 2008 disparate parties either side came together oslo led eventual agreement early 2009 rename ecmascript 3.1 ecmascript 5 drive language forward using agenda known harmony ecmascript 5 finally released december 2009 june 2011 ecmascript 5.1 released fully align third edition iso/iec 16262 international standard ecmascript 2015 released june 2015 ecmascript 2016 released june 2016 current version ecmascript 2017 released june 2017 javascript become one popular programming languages web however many professional programmers initially denigrated language due perceived target audience web authors amateurs advent ajax returned javascript spotlight brought professional programming attention result proliferation comprehensive frameworks libraries improved javascript programming practices increased usage javascript outside web browsers seen proliferation server-side javascript platforms january 2009 commonjs project founded goal specifying common standard library mainly javascript development outside browser rise single-page applications javascript-heavy sites increasingly used compile target source-to-source compilers dynamic languages static languages javascript trademark oracle corporation united states used license technology invented implemented netscape communications current entities mozilla foundation following features common conforming ecmascript implementations unless explicitly specified otherwise popular modern web browsers support javascript built-in interpreters javascript supports much structured programming syntax c e.g. codice_1 statements codice_2 loops codice_3 statements codice_4 loops etc. one partial exception scoping javascript originally function scoping codice_5 ecmascript 2015 added keywords codice_6 codice_7 block scoping meaning javascript function block scoping like c javascript makes distinction expressions statements one syntactic difference c automatic semicolon insertion allows semicolons would normally terminate statements omitted javascript almost entirely object-based javascript object associative array augmented prototype see string key provides name object property two syntactical ways specify name dot notation codice_9 bracket notation codice_10 property may added rebound deleted run-time properties object property belongs object prototype inheritance chain enumerated using codice_11 loop javascript small number built-in objects including codice_12 codice_13 function first-class function considered object function may properties methods codice_23 codice_24 nested function function defined within another function created time outer function invoked addition nested function forms lexical closure lexical scope outer function including constant local variable argument value becomes part internal state inner function object even execution outer function concludes javascript also supports anonymous functions javascript supports implicit explicit delegation javascript officially managed mozilla foundation new language features added periodically however javascript engines support new features variables javascript defined using either codice_5 codice_6 codice_7 keywords var x // declares variable x assigns special value undefined confused undefined value var 2 // declares variable assigns value 2 var z hello world // declares variable z assigns string containing hello world note comments example preceded two forward slashes built-in input/output functionality javascript run-time environment provides ecmascript specification edition 5.1 mentions indeed provisions specification input external data output computed results however runtime environments codice_38 object used print output minimalist hello world program javascript console.log hello world simple recursive function function factorial n factorial 3 // returns 6 anonymous function lambda function counter var closure counter closure // returns 1 closure // returns 2 closure // returns 3 example shows javascript function closures capture non-local variables reference arrow functions first introduced 6th edition ecmascript 2015 shorten syntax writing functions javascript arrow functions anonymous nature variable needed refer order invoke creation example arrow function // arrow functions let us omit function keyword long_example // points anonymous function value const long_example input1 input2 // arrow functions also let us automatically return expression right // arrow input 5 omitting braces return keyword const short_example input input 5 long_example 2 3 // prints hello world returns 5. short_example 2 // returns 7 javascript objects created way functions known function object object example function ball r var myball new ball 5 // creates new instance ball object radius 5 myball.show // instance ball object show function performed variadic function demonstration codice_30 special variable function sum sum 1 2 // returns 3 sum 1 2 3 // returns 6 immediately-invoked function expressions often used create modules ecmascript 2015 built-in module construct language modules allow gathering properties methods namespace making private var counter function // module counter.get // shows 0 counter.set 6 counter.increment // shows 7 counter.increment // shows 8 exporting importing modules javascript export example /* mymodule.js */ // function remains private exported let sum b // export variables export var name 'alice export let age 23 // export named functions export function add num1 num2 // export class export class multiplication import example // import one property import add './mymodule.js console.log add 1 2 // 3 // import multiple properties import name age './mymodule.js console.log name age // alice 23 // import properties module import './module.js' console.log name age // alice 23 console.log add 1,2 // 3 sample code displays various javascript features /* finds lowest common multiple lcm two numbers */ function lcmcalculator x // constructor function // prototype object instances created constructor // constructor prototype property lcmcalculator.prototype // object literal // define generic output function implementation works web browsers function output x // note array map foreach defined javascript 1.6 // used demonstrate javascript inherent functional nature .map function pair // array literal mapping function function printresult obj following output displayed browser window lcmcalculator 28 b 56 gcd 28 lcm 56 lcmcalculator 21 b 56 gcd 7 lcm 168 lcmcalculator 25 b 55 gcd 5 lcm 275 lcmcalculator 22 b 58 gcd 2 lcm 638 94.5 10 million popular web pages used javascript common use javascript add client-side behavior html pages also known dynamic html dhtml scripts embedded included html pages interact document object model dom page simple examples usage javascript code run locally user browser rather remote server increasing application overall responsiveness user actions javascript code also detect user actions html alone individual keystrokes applications gmail take advantage much user-interface logic written javascript javascript dispatches requests information content e-mail message server wider trend ajax programming similarly exploits strength javascript engine also known javascript interpreter javascript implementation interpreter interprets javascript source code executes script accordingly first javascript engine created brendan eich netscape netscape navigator web browser engine code-named spidermonkey implemented c. since updated javascript 1.5 conform ecmascript 3 rhino engine created primarily norris boyd formerly netscape google javascript implementation java rhino like spidermonkey ecmascript 3 compliant web browser common host environment javascript however web browser execute javascript code example text-based browsers javascript engines users browsers may disable scripts preference extension web browser typically creates host objects represent dom javascript web server another common host environment javascript web server would typically expose host objects representing http request response objects javascript program could interrogate manipulate dynamically generate web pages javascript language popular browsers share support inadvertently become target language frameworks languages increasing speed javascript engines made language feasible compilation target despite performance limitations inherent dynamic nature minimal example standards-conforming web page containing javascript using html 5 syntax dom doctype html html /html javascript runs widely varying environments important part testing debugging test verify javascript works across multiple browsers dom interfaces officially defined w3c standardization effort separate javascript implementation dom interfaces differ web browsers javascript authors deal differences writing standards-compliant code executed correctly browsers failing write code behaves differently absence certain browser features authors may also find practical detect browser running two browsers may implement feature differing behavior libraries toolkits take browser differences account also useful programmers furthermore scripts may work users example user may support users web authors try create pages degrade gracefully user agents browsers support page javascript particular page remain usable albeit without extra features javascript would added sites use html codice_40 tag contains alt content js disabled alternative approach many find preferable first author content using basic technologies work browsers enhance content users javascript enabled javascript dom provide potential malicious authors deliver scripts run client computer via web browser authors minimize risk using two restrictions first scripts run sandbox perform web-related actions general-purpose programming tasks like creating files second scripts constrained same-origin policy scripts one web site access information usernames passwords cookies sent another site javascript-related security bugs breaches either origin policy sandbox subsets general javascript—adsafe secure ecmascript ses —that provide greater levels security especially code created third parties advertisements caja another project safe embedding isolation third-party javascript html content security policy main intended method ensuring trusted code executed web page common javascript-related security problem cross-site scripting xss violation same-origin policy xss vulnerabilities occur attacker able cause target web site online banking website include malicious script webpage presented victim script example access banking application privileges victim potentially disclosing secret information transferring money without victim authorization solution xss vulnerabilities use html escaping whenever displaying untrusted data browsers include partial protection reflected xss attacks attacker provides url including malicious script however even users browsers vulnerable xss attacks malicious code stored database correct design web applications server side fully prevent xss xss vulnerabilities also occur implementation mistakes browser authors another cross-site vulnerability cross-site request forgery csrf csrf code attacker site tricks victim browser taking actions user intend target site like transferring money bank target sites rely solely cookies request authentication requests originating code attacker site carry valid login credentials initiating user general solution csrf require authentication value hidden form field cookies authenticate request might lasting effects checking http referrer header also help javascript hijacking type csrf attack codice_29 tag attacker site exploits page victim site returns private information json javascript possible solutions include developers client-server applications must recognize untrusted clients may control attackers application author assume javascript code run intended secret embedded code could extracted determined adversary implications package management systems npm bower popular javascript developers systems allow developer easily manage program dependencies upon developer program libraries developers trust maintainers libraries keep secure date always case vulnerability emerged blind trust relied-upon libraries new releases cause bugs vulnerabilities appear programs rely upon libraries inversely library go unpatched known vulnerabilities wild study done looking sample 133k websites researchers found 37 websites included library at-least one known vulnerability median lag oldest library version used website newest available version library 1,177 days alexa development libraries still active use ceased years ago another possibility maintainer library may remove library entirely occurred march 2016 azer koçulu removed repository npm caused tens thousands programs websites depending upon libraries break javascript provides interface wide range browser capabilities may flaws buffer overflows flaws allow attackers write scripts would run code wish user system code means limited another javascript application example buffer overrun exploit allow attacker gain access operating system api superuser privileges flaws affected major browsers including firefox internet explorer safari plugins video players adobe flash wide range activex controls enabled default microsoft internet explorer may also flaws exploitable via javascript flaws exploited past windows vista microsoft attempted contain risks bugs buffer overflows running internet explorer process limited privileges google chrome similarly confines page renderers sandbox web browsers capable running javascript outside sandbox privileges necessary example create delete files privileges intended granted code web incorrectly granting privileges javascript web played role vulnerabilities internet explorer firefox windows xp service pack 2 microsoft demoted jscript privileges internet explorer microsoft windows allows javascript source files computer hard drive launched general-purpose non-sandboxed programs see windows script host makes javascript like vbscript theoretically viable vector trojan horse although javascript trojan horses uncommon practice 2015 javascript-based proof-of-concept implementation rowhammer attack described paper security researchers 2017 javascript-based attack via browser demonstrated could bypass aslr called aslr⊕cache anc addition web browsers servers javascript interpreters embedded number tools applications provides object model provides access host environment core javascript language remains mostly application within javascript access debugger becomes invaluable developing large non-trivial programs implementation differences various browsers particularly within dom useful access debugger browsers web application targets script debuggers integrated within many mainstream browsers internet explorer firefox safari google chrome opera node.js addition native internet explorer developer tools three debuggers available internet explorer microsoft visual studio features three closely followed microsoft script editor component microsoft office finally free microsoft script debugger free microsoft visual web developer express provides limited version javascript debugging functionality microsoft visual studio comparison internet explorer firefox comprehensive set developer tools includes debugger well old versions firefox without tools used firefox addon called firebug older venkman debugger webkit web inspector includes javascript debugger used safari modified version called blink devtools used google chrome node.js node inspector interactive debugger integrates blink devtools opera includes set tools called dragonfly addition native computer software online javascript integrated development environment ides debugging aids written javascript built run web example program jslint developed douglas crockford written extensively language jslint scans javascript code conformance set standards guidelines many libraries javascript three.js provide links demonstration code edited users demonstration codes also used pedagogical tool institutions khan academy allow students experience writing code environment see output programs without needing setup beyond web browser javascript increased usage web development warrants considerations performance frontend code inherited many responsibilities previously handled backend mobile devices particular may encounter problems rendering poorly optimized frontend code library benchmarks benchmark.js benchmarking library supports high-resolution timers returns statistically significant results another tool jsben.ch online javascript benchmarking tool code snippets tested javascript initially developed 1996 use netscape navigator web browser year microsoft released implementation internet explorer implementation called jscript due trademark issues 1997 first standardized version language released name ecmascript first edition ecma-262 standard explicit versioning opt-in language features mozilla-specific removed later firefox versions least firefox 59 firefox 4 last version referred explicit javascript version 1.8.5 new editions ecma-262 standard javascript language features often mentioned initial definition ecma-262 editions following table explicitly versioned javascript versions based information multiple sources javascript widely supported client-side language run within web browser become intermediate language languages also called transpilers target included newly created languages ports existing languages include javascript unusual limitations – explicit integer type double-precision binary floating point – languages compile javascript take care use integer-converting shift bitwise logical operators may slightly different behavior environments common misconception javascript similar closely related java true c-like syntax c language immediate common ancestor language also typically sandboxed used inside browser javascript designed java syntax standard library mind particular java keywords reserved original javascript javascript standard library follows java naming conventions javascript objects based classes java 1.0 similarities end java javascript first appeared 1995 java developed james gosling sun microsystems javascript brendan eich netscape communications differences two languages prominent similarities java static typing javascript typing dynamic java loaded compiled bytecode javascript loaded human-readable source code java objects class-based javascript prototype-based finally java support functional programming java 8 javascript done beginning influenced scheme starting 2017 web browsers began supporting webassembly technology standardized w3c webassembly standard specifies binary format produced compiler toolchain llvm execute browser near native speed webassembly allows programming languages c c++ c java used well javascript author client-side code world wide web
[ 8195, 4103, 6154, 11, 4111, 6160, 19, 2069, 8213, 24, 10266, 6171, 2076, 6176, 2081, 10284, 46, 6191, 2108, 64, 65, 6209, 8262, 2119, 72, 4171, 84, 6228, 6231, 8281, 2139, 8283, 10332, 8289, 8291, 102, 103, 4198, 4200, 8296, 107, 8297...
Test
3,463
2
Windows_Home_Server_2011:windows home server 2011 windows home server 2011 code named vail home server operating system microsoft designed small office/home offices homes multiple connected pcs offer protected file storage file sharing automated pc backup remote access remote control pc desktops released 6 april 2011 following release power pack 3 aging predecessor windows home server windows home server 2011 last windows home server release succeeded windows server 2012 essentials windows home server 2011 based windows server 2008 r2 windows 7 requires x86-64 cpus 64-bit predecessor worked older ia-32 32-bit architecture well coupled fundamental changes structure client backups shared folders clear method migrating previous version windows home server 2011 windows home server 2011 includes additional entertainment capabilities 'add feature app store including web-based media functionality initial speculation technology columnist mary jo foley fueled idea 'vail would integrate windows media center prompted response time tell microsoft windows home server product planner todd headrick time public beta microsoft decided integrate windows media center 'vail 23 november 2010 microsoft announced drive extender would removed windows home server 2011 announcement led astonishment outrage testers users criticism drive extender removal mainly related seen core feature windows home server key reason adoption windows home server 2011 developer michael leworthy expressed concern implementation drive extender might lead data error issues result third-party products entered market fill void left drive extender including drive bender division drivepool stablebit volume spanning feature drive extender two drives used one large storage volume available using dynamic disks feature windows server release
[ 8576, 641, 2179, 5380, 651, 6797, 8080, 3857, 7057, 6675, 2196, 8976, 10896, 11283, 4505, 4515, 11301, 3496, 6441, 6697, 1581, 7983, 3250, 3890, 9910, 9655, 2107, 6462, 7615, 321, 7106, 9025, 582, 1098, 10957, 3535, 9173, 11605, 2391, 328...
Test
3,464
3
Socket_G34:socket g34 socket g34 land grid array cpu socket designed amd support amd multi-chip module opteron 6000-series server processors g34 launched march 29 2010 alongside initial grouping opteron 6100 processors designed socket g34 supports four ddr3 sdram channels two die 1944 pin cpu package socket g34 available four-socket arrangements change socket f cpus supporting eight-socket arrangements however four socket g34 cpus eight dies identical eight socket f cpus amd declined extend socket g34 eight-way operation citing shrinking demand 4-socket market amd targeting socket g34 high-end two-socket market four-socket market lower-end two-socket market serviced monolithic-die socket c32 cpus half core count equivalent socket g34 cpus socket g34 originally started socket g3 used g3mx expand memory capacity socket g3 g3mx canceled altogether replaced socket g34 socket g34 introduced march 2010 k10-based 8-core 12-core magny-cours opteron 6100 series cpus socket g34 also supports bulldozer-based 4-core 8-core 12-core 16-core opteron 6200 interlagos cpus piledriver-based 4-core 8-core 12-core 16-core opteron 6300 abu dhabi cpus
[ 3586, 9475, 3588, 8452, 4872, 7058, 10260, 7963, 4767, 2463, 7712, 9122, 1322, 2094, 11183, 1329, 3892, 8629, 9400, 6978, 11331, 8004, 9157, 3783, 7247, 9551, 7122, 9427, 7132, 2525, 4451, 5859, 1260, 7788, 7151, 1137, 1651 ]
None
3,465
2
Fdm_(software):fdm software fdm fetch/filter deliver mail mail delivery agent email filtering software unix-like operating systems similar fetchmail procmail started 2006 developer later also started tmux 2007. fdm available package many unix-like operating systems included openbsd ports since 2007-01-18 2014 last maintainer procmail posted message openbsd mailing list suggesting remove procmail port suggested well-known openbsd ports maintainer fdm natural alternative procmail port however removed remains place 2019 fdm listed openbsd innovations page section projects maintained openbsd developers outside openbsd
[ 1664, 9986, 9223, 10631, 2825, 1932, 274, 9747, 788, 5397, 7702, 10105, 11418, 9642, 6702, 7983, 9520, 1075, 2101, 9909, 2245, 3015, 1993, 8778, 5067, 3404, 10956, 11086, 5970, 6231, 7255, 5084, 9053, 7139, 1637, 4071, 8954, 9451, 10861, ...
Test
3,466
7
XOS_Webtop:xos webtop xos webtop open source webtop os mainly written html5 php javascript xos includes desktop mobile environment features applications system utilities features continuously added accessible windows mac linux ios apple android operating system web browser first version xos webtop started development december 2010 later became available may 14 2011 several months development initial webtop work entirely planned xproduct posted version xos 2.0 desktop edition online public use quickly went back development work would later become xos webtop 3.0 development version follow version 2.0 first started beta testing version release xos 2.0 desktop edition beta reworked ground become entirely new version xos early july beta xos webtop 3.0 came soon xos webtop seen webtop catching market first development updates version fast-paced point rushed resulted sub-par experience many problems continued development desktop edition xos version 3.0 mobile version also released name xos 3.0 mobile continued tested developed well january 5 2012 xproduct released newest version xos desktop edition version 3.1 version includes heavily updated interface fix bugs glitches occurring version 3.0 well slightly improved setup additional features updated mobile edition also version 3.1 released coincide release version 3.1 desktop edition featuring updated interface design previous version version 3.1 first version webtop utilize xproduct new server website updated new domain xproduct.net upon release version 3.1 development cancelled original programmer however code open-sourced development includes fixing bugs uploading fixes soon possible testing make sure program works properly secure unlike earlier versions desktop edition xproduct releasing updates unless actually work tested tablet version xos works add desktop mobile platforms developer page available xos webtop website interested development
[ 8644, 3462, 1802, 5612, 7983, 823 ]
Test
3,467
3
NXP_ColdFire:nxp coldfire nxp coldfire microprocessor derives motorola 68000 family architecture manufactured embedded systems development nxp semiconductors formerly manufactured freescale semiconductor formerly semiconductor division motorola merged nxp 2015 coldfire instruction set assembly source compatible means translation software available vendor entirely object code compatible 68000 compared classic 68k hardware instruction set differs mainly longer support binary-coded decimal bcd packed data format removes number less used instructions instructions kept support fewer addressing modes also floating point intermediates 64 bits 80 bits 68881 68882 coprocessors instructions 16 32 48 bits long simplification compared 68000 series february 1999 μclinux project linux kernel ported two coldfire processors mcf5206 mcf5307 2006 debian project looking making m68k port compatible coldfires coldfire models clocked high 300 mhz much faster 68060 officially reach 75 mhz overclocked 110 mhz stallion technologies epipe secure computing snapgear security appliances arcturus networks system module products based coldfire processors coldfire linux-based single-board computers sbc ethernet compactflash small 23×55 mm 45×45 mm based compactflash 37×43 mm coldfire based products even deployed international space station electronic nose project five generations versions coldfire available freescale also fido 1100 microcontroller launched 2007 aimed predictable embedded control systems industrial ethernet applications using 68k/cpu32 instruction set however fido unique architecture shares instruction set 68k november 2006 freescale announced coldfire microprocessor cores available license semiconductor intellectual property ip licensing support partner ipextreme inc. coldfire v1 core available free license per use royalty altera cyclone-iii fpga september 2007 freescale launched 32-bit flexis microcontroller family coldfire cpu core june 2010 freescale announced coldfire+ line coldfire v1 core using 90 nm tfs technology 2010 freescale also launched kinetis arm-based product line leading industry observers speculate future coldfire range given freescale would several competing cpu ranges
[ 7170, 7299, 3844, 4868, 1158, 7302, 10501, 7305, 3467, 1548, 6925, 6415, 1170, 7445, 2073, 7065, 7452, 6815, 4773, 6821, 8102, 9638, 682, 2224, 5297, 11314, 1461, 823, 11447, 8761, 6715, 1983, 6207, 10945, 7235, 9928, 3017, 8268, 6607, 33...
None
3,468
9
Alfred_Aho:alfred aho alfred vaino aho born august 9 1941 canadian computer scientist best known work programming languages compilers related algorithms textbooks art science computer programming aho received b.a.sc engineering physics university toronto ph.d. electrical engineering/computer science princeton university conducted research bell labs 1967 1991 1997 2002 vice president computing sciences research center holds lawrence gussman chair computer science columbia university served chair department 1995 1997 spring 2003 phd thesis aho created indexed grammars nested-stack automaton vehicles extending power context-free languages retaining many decidability closure properties indexed grammars used model parallel rewriting systems particularly biological applications graduating princeton aho joined computing sciences research center bell labs devised efficient regular expression string-pattern matching algorithms implemented first versions unix tools codice_1 codice_2 codice_2 algorithm become known aho-corasick algorithm used several bibliographic search-systems including one developed margaret j. corasick string-searching applications bell labs aho worked closely steve johnson jeffrey ullman develop efficient algorithms analyzing translating programming languages steve johnson used bottom-up lalr parsing algorithms create syntax-analyzer generator yacc michael e. lesk eric schmidt used aho regular-expression pattern-matching algorithms create lexical-analyzer generator lex lex yacc tools derivatives used develop front ends many today programming language compilers aho ullman wrote series textbooks compiling techniques codified theory relevant compiler design 1977 textbook principles compiler design green dragon front cover became known green dragon book 1986 aho ullman joined ravi sethi create new edition red dragon book briefly shown 1995 movie hackers 2007 also monica lam create purple dragon book dragon books widely used compiler textbooks throughout world 1974 aho john hopcroft ullman wrote design analysis computer algorithms codifying early research algorithms book became one highly cited books computer science several decades helped stimulate creation algorithms data structures central course computer science curriculum aho also widely known co-authorship awk programming language peter j. weinberger brian kernighan stands aho aho research interests include programming languages compilers algorithms quantum computing part language compilers research-group columbia university overall works cited 81,040 times h-index 66 may 8 2019 aho received many prestigious honors including ieee john von neumann medal membership national academy engineering elected fellow american academy arts sciences 2003 holds honorary doctorates university waterloo university helsinki university toronto fellow american association advancement science acm bell labs ieee aho twice served chair advisory committee computer information science engineering directorate national science foundation past president acm special interest group algorithms computability theory aho taught columbia university city new york since 1995 great teacher award society columbia graduates 2003
[ 1952, 6304, 10881, 515, 8037, 8262, 11014, 5418, 9002, 2316, 1360, 5492, 1783, 5464 ]
Test
3,469
9
Adobe_ColdFusion_Builder:adobe coldfusion builder adobe coldfusion builder name adobe eclipse-based development ide used build applications coldfusion product original codename bolt reference original lightning icon coldfusion allaire days 2010 adobe released product officially renamed adobe coldfusion builder often referred cfbuilder coldfusion builder became available march 22 2010 along flash builder 4 features include coldfusion builder 2.0 codename storm confirmed previewed adobe max 2010 adobe major features include improved code navigation searching improvements code formatting automatic method stub creation product officially released may 3 2011 new features coldfusion builder 3.0 codename thunder officially released april 29 2014 new features coldfusion builder 2016 3.1.3.300344 officially released february 16 2016
[ 6797, 9618, 148, 4507, 11291, 4512, 8739, 7983, 4529, 8627, 8628, 7862, 3895, 5048, 9144, 576, 5314, 9666, 11237, 102, 10097 ]
Test
3,470
3
Register_renaming:register renaming computer architecture register renaming technique abstracts logical registers physical registers every logical register set physical registers associated programmer assembly language refers instance logical register codice_1 processor transposes name one specific physical register fly physical registers opaque referenced directly via canonical names technique used eliminate false data dependencies arising reuse registers successive instructions real data dependencies elimination false data dependencies reveals instruction-level parallelism instruction stream exploited various complementary techniques superscalar out-of-order execution better performance register machine programs composed instructions operate values instructions must name values order distinguish one another typical instruction might say “ add formula_1 formula_2 put result formula_3 ” instruction formula_1 formula_2 formula_3 names storage locations order compact instruction encoding processor instruction sets small set special locations referred special names registers example x86 instruction set architecture 8 integer registers x86-64 16 many riscs 32 ia-64 128 smaller processors names locations correspond directly elements register file different instructions may take different amounts time example processor may able execute hundreds instructions single load main memory progress shorter instructions executed load outstanding finish first thus instructions finishing original program order out-of-order execution used recent high-performance cpus achieve speed gains consider piece code running out-of-order cpu instructions final three lines independent first three instructions processor finish r1 ≔ 2048 preceding 1032 ≔ r1 done otherwise would write wrong value restriction eliminated changing names registers last three instruction executed parallel first three program run faster obliterating stalling due false data dependency many high-performance cpus implement renaming hardware achieve additional parallelism targets without appropriate data-flow detection good compilers would detect independent instruction sequences choose different registers code generation one instruction references particular location operand either reading input writing output executing instructions order different original program order lead three kinds data hazards instead delaying write reads completed two copies location maintained old value new value reads precede program order write new value provided old value even reads follow write provided new value false dependency broken additional opportunities out-of-order execution created reads need old value satisfied discarded essential concept behind register renaming anything read written renamed general-purpose floating-point registers discussed flag status registers even individual status bits commonly renamed well memory locations also renamed although commonly done extent practiced register renaming transmeta crusoe processor gated store buffer form memory renaming programs refrained reusing registers immediately would need register renaming instruction sets e.g. ia-64 specify large numbers registers specifically reason however limitations approach code size increases important program code larger instruction cache misses often processor stalls waiting new instructions machine language programs specify reads writes limited set registers specified instruction set architecture isa instance alpha isa specifies 32 integer registers 64 bits wide 32 floating-point registers 64 bits wide architectural registers programs written processors running alpha instruction set specify operations reading writing 64 registers programmer stops program debugger observe contents 64 registers status registers determine progress machine one particular processor implements isa alpha 21264 80 integer 72 floating-point physical registers alpha 21264 chip 80 physically separate locations store results integer operations 72 locations store results floating point operations following text describes two styles register renaming distinguished circuit holds data ready execution unit renaming schemes machine converts architectural registers referenced instruction stream tags architectural registers might specified 3 5 bits tags usually 6 8 bit number rename file must read port every input every instruction renamed every cycle write port every output every instruction renamed every cycle size register file generally grows square number ports rename file usually physically large consumes significant power tag-indexed register file style one large register file data values containing one register every tag example machine 80 physical registers would use 7 bit tags 48 possible tag values case unused style instruction issued execution unit tags source registers sent physical register file values corresponding tags read sent execution unit reservation station style many small associative register files usually one inputs execution unit operand instruction issue queue place value one register files style instruction issued execution unit register file entries corresponding issue queue entry read forwarded execution unit reorder buffers data-less data-ful willamette rob rob entries point registers physical register file prf also contain book keeping also first order design done andy glew illinois harrm p6 rob rob entries contain data separate prf data values rob copied rob rrf retirement one small detail temporal locality rob entries i.e. instructions close together von neumann instruction sequence write back close together time may possible perform write combining rob entries fewer ports separate rob/prf would clear makes difference since prf banked robs usually n't associative logic certainly none robs designed andy glew cams keith diefendorff insisted robs complex associative logic many years first rob proposal may cams renaming style used mips r10000 alpha 21264 fp section amd athlon renaming stage every architectural register referenced read write looked architecturally-indexed remap file file returns tag ready bit tag non-ready queued instruction write yet executed read operands tag takes place architectural register instruction every register write new tag pulled free tag fifo new mapping written remap file future instructions reading architectural register refer new tag tag marked unready instruction yet executed previous physical register allocated architectural register saved instruction reorder buffer fifo holds instructions program order decode graduation stages instructions placed various issue queues instructions executed tags results broadcast issue queues match tags tags non-ready source operands match means operand ready remap file also matches tags mark corresponding physical registers ready operands instruction issue queue ready instruction ready issue issue queues pick ready instructions send various functional units cycle non-ready instructions stay issue queues unordered removal instructions issue queues make large power-consuming issued instructions read tag-indexed physical register file bypassing just-broadcast operands execute execution results written tag-indexed physical register file well broadcast bypass network preceding functional unit graduation puts previous tag written architectural register free queue reused newly decoded instruction exception branch misprediction causes remap file back remap state last valid instruction via combination state snapshots cycling previous tags in-order pre-graduation queue since mechanism required since recover remap state state instruction currently graduated branch mispredictions handled branch reaches graduation potentially hiding branch misprediction latency style used integer section amd k7 k8 designs renaming stage every architectural register referenced reads looked architecturally-indexed future file rename file future file read gives value register outstanding instruction yet write i.e. ready instruction placed issue queue values read future file written corresponding entries reservation stations register writes instruction cause new non-ready tag written rename file tag number usually serially allocated instruction order—no free tag fifo necessary tag-indexed scheme issue queues wait non-ready operands see matching tag broadcasts unlike tag-indexed scheme matching tags cause corresponding broadcast value written issue queue entry reservation station issued instructions read arguments reservation station bypass just-broadcast operands execute mentioned earlier reservation station register files usually small perhaps eight entries execution results written reorder buffer reservation stations issue queue entry matching tag future file last instruction target architectural register case register marked ready graduation copies value reorder buffer architectural register file sole use architectural register file recover exceptions branch mispredictions exceptions branch mispredictions recognized graduation cause architectural file copied future file registers marked ready rename file usually way reconstruct state future file instruction intermediate decode graduation usually way early recovery branch mispredictions schemes instructions inserted in-order issue queues removed out-of-order queues collapse empty slots either many unused entries require sort variable priority encoding multiple instructions simultaneously ready go queues collapse holes simpler priority encoding require simple large circuitry advance instructions queue reservation stations better latency rename execute rename stage finds register values directly rather finding physical register number using find value latency shows component branch misprediction latency reservation stations also better latency instruction issue execution local register file smaller large central file tag-indexed scheme tag generation exception processing also simpler reservation station scheme discussed physical register files used reservation stations usually collapse unused entries parallel issue queue serve makes register files larger aggregate consume power complicated simpler register files used tag-indexed scheme worse yet every entry reservation station written every result bus reservation-station machine e.g. 8 issue queue entries per functional unit typically 9 times many bypass networks equivalent tag-indexed machine consequently result forwarding consumes much power area tag-indexed design furthermore reservation station scheme four places future file reservation station reorder buffer architectural file result value stored whereas tag-indexed scheme one physical register file results functional units broadcast storage locations must reach much larger number locations machine tag-indexed scheme function consumes power area time still machines equipped accurate branch prediction schemes execute latencies major concern reservation stations work remarkably well ibm system/360 model 91 early machine supported out-of-order execution instructions used tomasulo algorithm uses register renaming power1 first microprocessor used register renaming out-of-order execution 1990 original r10000 design neither collapsing issue queues variable priority encoding suffered starvation problems result—the oldest instruction queue would sometimes issued instruction decode stopped completely lack rename registers every instruction issued later revisions design starting r12000 used partially variable priority encoder mitigate problem early out-of-order machines separate renaming rob/prf storage functions matter earliest sohi ruu metaflow dcaf combined scheduling renaming storage structure modern machines renaming ram indexing map table logical register number e.g. p6 future files data storage structure however earlier machines used content-addressable memory cam renamer e.g. hpsm rat register alias table essentially used cam logical register number combination different versions register many ways story out-of-order microarchitecture cams progressively eliminated small cams useful large cams impractical p6 microarchitecture first microarchitecture intel implement out-of-order execution register renaming p6 microarchitecture used pentium pro pentium ii pentium iii pentium core core 2 microprocessors cyrix m1 released october 2 1995 first x86 processor use register renaming out-of-order execution x86 processors nexgen nx686 amd k5 released 1996 also featured register renaming out-of-order execution risc μ-operations rather native x86 instructions
[ 7173, 9739, 528, 2066, 7699, 5655, 10779, 10781, 6181, 8231, 3630, 6705, 7218, 2623, 2113, 7234, 3142, 2638, 1122, 3175, 6247, 8815, 630, 8822, 6268, 3197, 7313, 2708, 6804, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911...
None
3,471
2
Merge_Module:merge module merge module special kind windows installer database contains components needed install discrete software bundle merge module installed alone must merged standard windows installer installation creation installation typically merge module collection merge modules related dependencies installs software product portion product runtime purpose merge modules let add self-contained software modules multiple installations example number applications require specifically configured component would possible create merge module installs configures component merge module could added installation packages product required particular component saves effort individually add necessary files registry entries components every installation also saves time updates needed instead updating installations applications merge module updated installations need rebuilt standard merge modules .msm file extension merge modules may configurable merge modules merge modules contain certain values set specify module behaves installation example author configurable merge module may allow attributes set components enable disable isolated components specify bitmap dialog specify custom action run configurable merge modules supported windows installer 2.0 higher exist number pre-created merge modules install commonly used microsoft software packages mdac activex controls mfc sapi dcom
[ 10024, 10026, 6797, 4174, 214, 10654 ]
Test
3,472
3
PowerPC_970:powerpc 970 powerpc 970 powerpc 970fx powerpc 970gx powerpc 970mp 64-bit powerpc processors ibm introduced 2002 used powerpc-based macintosh computers apple referred powerpc g5 970 family created collaboration ibm apple project went codename gp-ul giga processor ultra light giga processor codename power4 core derived apple introduced power mac g5 stated five-year collaborative effort multiple future generations short-lived apple retract promise deliver 3 ghz processor one year introduction ibm could never get power consumption far enough processors fit portable computer apple used three variants processor ibm ’ js20/js21 blade modules low-end workstations system p servers based powerpc 970 also used high end embedded systems like mercury ’ momentum xsa-200 ibm also licensing powerpc 970 core use custom applications powerpc 970 single core derivative power4 process 32-bit 64-bit powerpc instructions natively hardware prefetch unit three way branch prediction unit like power4 front-end nine stages long powerpc 970 fetch decode eight instructions dispatch five reserve stations issue eight execution units retire five per cycle execution pipelines lengthened compared power4 achieve higher clock frequencies eight execution units two arithmetic logic units alus two double precision floating-point units two load/store units two altivec units one altivec units executes integer floating-point instructions permute instructions latter three subunits simple integer complex integer floating-point instructions units pipelines varying lengths 10 stages simple integer permute instructions 13 stages complex integer instructions 16 stage floating-point instructions processor two unidirectional 32-bit double data rate ddr buses one reads writes system controller chip northbridge running one quarter processor core speed buses also carry addresses control signals addition data percentage peak bandwidth realized 6.4 gb/s 450 mhz buses unidirectional direction realize half aggregate bandwidth 3.2 gb/s powerpc 970 announced ibm october 2002 released apple computer power mac g5 june 2003 keeping previous naming conventions apple termed powerpc 970 based products g5 fifth generation powerpc microprocessors ibm released first powerpc 970 blade servers bladecenter js20 november 2003 powerpc 970 512 kb full-speed l2 cache clock speeds 1.6 2.0 ghz front side bus ran half processor clock speed powerpc 970fx used 90 nm manufacturing process maximum power rating 11 watts 149 degrees fahrenheit 65 °c clocked 1 ghz maximum 48 watts 2 ghz powerpc 970 pipeline lengthened 9 stages 16 21 stages powerpc 970 fx 10 functional units 2 fixed-point units 2 load/store units 2 floating point units 1 branch unit 1 simd alu unit 1 simd permute unit 1 condition register supports 215 instructions in-flight 16 instruction fetch unit 67 instruction decode unit 100 functional units 32 store queue 64 kbytes directly-mapped instruction cache 32 kbytes d-cache apple released 970fx-powered machines throughout 2004 xserve g5 january power mac g5 june imac g5 august power mac introduced top clock speed 2.5 ghz liquid-cooled eventually reaching high 2.7 ghz april 2005 imac ran front side bus third clock speed despite intense user demand faster laptop cpu g4 apple never used g5 series cpu powerbook laptops original 970 used far much power never seriously viewed candidate portable computer 970fx reduced thermal design power tdp 30 w 1.5 ghz figure led many users believe powerbook g5 might possible however several obstacles prevented even 970fx used application 1.5 ghz g5 substantially faster 1.5 1.67 ghz g4 processors apple used powerbooks instead furthermore northbridge chips available interface 970fx memory devices designed portable computers consumed much power finally 970fx inadequate power saving features portable cpu minimum idle power much high would led poor battery life figures notebook computer ibm announced powerpc 970mp code-named antares 7 july 2005 power everywhere forum tokyo 970mp dual-core derivative 970fx clock speeds 1.2 2.5 ghz maximum power usage 75 w 1.8 ghz 100 w 2.0 ghz core 1 mb l2 cache twice 970fx like 970fx chip produced 90 nm process one cores idle enter doze state shut 970mp also includes partitioning virtualization features powerpc 970mp replaced powerpc 970fx apple high-end power mac g5 computers imac g5 legacy pci-x power mac g5 continued use powerpc 970fx processor powerpc 970mp used ibm js21 blade modules ibm intellistation power 185 workstation ydl powerstation due high power requirements ibm chosen discontinue parts running faster 2.0 ghz powerpc 970gx cancelled single-core version powerpc 970mp featured 1 mb l2 cache would available frequencies 1.2 3 ghz power dissipation would 16 w 1.6 ghz 85 w 3 ghz fabricated 90 nm fabrication process 970mp illustrations different generations 970 processors manufactured ibm east fishkill plant new york white ceramic substrate typical ibm high end processors era two dedicated northbridges powerpc 970-based computers manufactured ibm also cancelled cpc965 northbridge slated release 2007 uniprocessor-only northbridge features 533 mhz ddr2 controller supported 8 gb ecc memory 8x pcie bus integrated four-port gigabit ethernet ipv4 tcp/udp offloading usb 2.0 ports flash-interface northbridge contains integrated powerpc 405 core provide system management configuration capabilities ibm uses proprietary elastic interface bus modules
[ 6914, 4868, 10501, 3846, 4743, 6663, 5642, 1548, 1933, 4881, 11413, 7065, 1563, 1820, 1309, 799, 6815, 3493, 6949, 6311, 8102, 1321, 8231, 11174, 10924, 4270, 9391, 10543, 4017, 5297, 10675, 1461, 8120, 11449, 6715, 9020, 1725, 1983, 6207, ...
Validation
3,473
4
Exploit_(computer_security):exploit computer security exploit english verb exploit meaning use something one ’ advantage piece software chunk data sequence commands takes advantage bug vulnerability cause unintended unanticipated behavior occur computer software hardware something electronic usually computerized behavior frequently includes things like gaining control computer system allowing privilege escalation denial-of-service dos related ddos attack several methods classifying exploits common exploit communicates vulnerable software remote exploit works network exploits security vulnerability without prior access vulnerable system local exploit requires prior access vulnerable system usually increases privileges person running exploit past granted system administrator exploits client applications also exist usually consisting modified servers send exploit accessed client application exploits client applications may also require interaction user thus may used combination social engineering method another classification action vulnerable system unauthorized data access arbitrary code execution denial service examples many exploits designed provide superuser-level access computer system however also possible use several exploits first gain low-level access escalate privileges repeatedly one reaches highest administrative level often called root exploit made known authors affected software vulnerability often fixed patch exploit becomes unusable reason black hat hackers well military intelligence agencies hackers publish exploits keep private exploits unknown everyone people found developed referred zero day exploits exploitations commonly categorized named type vulnerability exploit see vulnerabilities list whether local/remote result running exploit e.g eop dos spoofing pivoting refers method used penetration testers uses compromised system attack systems network avoid restrictions firewall configurations may prohibit direct access machines example attacker compromises web server corporate network attacker use compromised web server attack systems network types attacks often called multi-layered attacks pivoting also known island hopping pivoting distinguished proxy pivoting vpn pivoting proxy pivoting generally describes practice channeling traffic compromised target using proxy payload machine launching attacks computer type pivoting restricted certain tcp udp ports supported proxy vpn pivoting enables attacker create encrypted layer tunnel compromised machine route network traffic target machine example run vulnerability scan internal network compromised machine effectively giving attacker full network access behind firewall typically proxy vpn applications enabling pivoting executed target computer payload software exploit pivoting usually done infiltrating part network infrastructure example vulnerable printer thermostat using scanner find devices connected attack attacking vulnerable piece networking attacker could infect network gain complete control
[ 5636, 5637, 10756, 5131, 5138, 3092, 2084, 3620, 7717, 5682, 5173, 5176, 7739, 7228, 1597, 9791, 4163, 4689, 6754, 612, 11365, 2152, 3178, 107, 2164, 4725, 4733, 5245, 5246, 6269, 642, 138, 9356, 5261, 5774, 8333, 11413, 8344, 10392, 9375...
None
3,474
3
Bad_command_or_file_name:bad command file name bad command file name common confusing error message ms-dos operating systems command.com primary user interface ms-dos produces error message first word command could interpreted ms-dos word must name internal command executable file batch file error message provided accurate description problem easily confused novices though source error often mistyped command wording gave impression files named later words damaged illegal filenames later wording error message changed clarity windows nt displays following error message instead foo replaced word causing error early unix shells produced equally cryptic reasons modern shells produce error message similar
[ 2571, 9166, 6319, 3856, 5744, 5520, 7795, 8852, 8976, 11442, 11444, 10333, 1694, 9919 ]
Train
3,475
9
Deforestation_(computer_science):deforestation computer science theory programming languages computer science deforestation also known fusion program transformation eliminate intermediate lists tree structures created immediately consumed program term deforestation originally coined philip wadler 1990 paper deforestation transforming programs eliminate trees deforestation typically applied programs functional programming languages particularly non-strict programming languages haskell one particular algorithm deforestation shortcut deforestation implemented glasgow haskell compiler deforestation closely related escape analysis
[ 8738, 8262, 4392, 7273, 7438, 4980, 10584, 2620 ]
Validation
3,476
4
Michael_Wertheimer:michael wertheimer michael wertheimer born february 6 1957 cryptologic mathematician october 31 2005 june 2009 assistant deputy director chief technology officer office director national intelligence analysis wertheimer oversaw coordination intelligence community efforts bring increased depth accuracy analysis technology 2008 wertheimer successfully launched a-space u.s. intelligence community facebook spies new social network opened september 2008 u.s. intelligence analysts covert operatives across 16 intelligence agencies share information continues advocate intelligence community reforms currently involved pressing adoption intellipedia classified wiki prior appointment wertheimer spent two years industry building research group focused intelligence community 1982 2003 cryptologic mathematician national security agency 1999 selected technical director data acquisition office nsa ’ signals intelligence directorate co-author 2001 signals intelligence strategy 2002 sigint architecture model wertheimer returned national security agency june 2009 june 2010 became current director research 2014 retired nsa works university maryland wertheimer received b.a degrees mathematics philosophy university rochester also received m.a ph.d. degrees mathematics university pennsylvania wertheimer married christina grot may 16 1993 two children daniel born may 13 1996 marissa born november 17 1993
[ 7887 ]
None
3,477
2
LAN_Manager:lan manager lan manager network operating system nos available multiple vendors developed microsoft cooperation 3com corporation designed succeed 3com 3+share network server software ran atop heavily modified version ms-dos lan manager based os/2 operating system co-developed ibm microsoft originally used server message block protocol atop either netbios frames protocol nbf specialized version xerox network systems xns protocol legacy protocols inherited previous products ms-net ms-dos xenix-net ms-xenix afore-mentioned 3+share version lan manager unix-based systems called lan manager/x also available 1990 microsoft announced lan manager 2.0 host improvements including support tcp/ip transport protocol last version lan manager 2.2 included ms-os/2 1.31 base operating system remained microsoft strategic server system release windows nt advanced server 1993 many vendors shipped licensed versions including lan manager authentication uses particularly weak method hashing user password known lm hash algorithm stemming mid 1980s floppy viruses major concern opposed potentially high-frequency attacks feedback high-bandwidth network makes hashes crackable matter seconds using rainbow tables hours using brute force use windows nt replaced ntlm older versions still vulnerable rainbow tables less vulnerable brute force attacks ntlm used logon local accounts except domain controllers since windows vista later versions longer maintain lm hash default kerberos used active directory environments major weaknesses lan manager authentication protocol lm hash also known lanman hash lan manager hash compromised password hashing function primary hash microsoft lan manager microsoft windows versions prior windows nt used store user passwords support legacy lan manager protocol continued later versions windows backward compatibility recommended microsoft turned administrators windows vista protocol disabled default continues used non-microsoft smb implementations lm hash computed follows although based des well-studied formerly secure block cipher lm hash true one-way function password determined hash several weaknesses design firstly passwords limited maximum 14 characters giving theoretical maximum keyspace formula_3 95 ascii printable characters secondly passwords longer 7 characters divided two pieces piece hashed separately weakness allows half password attacked separately exponentially lower cost whole formula_4 different 7-character password pieces possible character set mounting brute-force attack half separately modern desktop machines crack alphanumeric lm hashes hours addition lower case letters password changed upper case password hashed reduces key space half formula_5 lm hash also use cryptographic salt standard technique prevent pre-computed dictionary attacks time–memory tradeoff cryptanalysis attack rainbow table therefore feasible addition password shorter 8 characters result hashing 7 null bytes yielding constant value codice_5 hence making easy identify short passwords sight 2003 ophcrack implementation rainbow table technique published specifically targets weaknesses lm encryption includes pre-computed data sufficient crack virtually alphanumeric lm hashes seconds many cracking tools e.g rainbowcrack l0phtcrack cain incorporate similar attacks make cracking lm hashes fast trivial final weakness lm hashes lies implementation — since change user changes password used carry pass hash attack address security weaknesses inherent lm encryption authentication schemes microsoft introduced ntlmv1 protocol 1993 windows nt 3.1 hashing ntlm uses unicode support replacing codice_6 codice_7 require padding truncating would simplify key negative side des algorithm used 56-bit encryption subsequent authentication steps still salting furthermore windows machines many years configured default send accept responses derived lm hash ntlm hash use ntlm hash provided additional security weaker hash still present also took time artificial restrictions password length management tools user manager lifted lan manager considered obsolete current windows operating systems use stronger ntlmv2 kerberos authentication methods windows systems windows vista/windows server 2008 enabled lan manager hash default backward compatibility legacy lan manager windows earlier clients legacy netbios-enabled applications many years considered good security practice disable compromised lm ntlmv1 authentication protocols n't needed starting windows vista windows server 2008 microsoft disabled lm hash default feature enabled local accounts via security policy setting active directory accounts applying setting via domain group policy method used turn feature windows 2000 windows xp nt users also prevent lm hash generated password using password least fifteen characters length ntlm hashes turn become vulnerable recent years various attacks effectively make weak today lanman hashes back 1998 many legacy third party smb implementations taken considerable time add support stronger protocols microsoft created replace lm hashing open source communities supporting libraries first reverse engineer newer protocols—samba took 5 years add ntlmv2 support jcifs took 10 years poor patching regimes subsequent software releases supporting feature becoming available contributed organisations continuing use lm hashing environments even though protocol easily disabled active directory lastly prior release windows vista many unattended build processes still used dos boot disk instead windows pe start installation windows using winnt.exe something requires lm hashing enabled legacy lan manager networking stack work
[ 636, 641, 7426, 6787, 6916, 7556, 7557, 7, 5384, 8576, 6797, 3984, 3857, 4242, 4863, 8976, 1941, 3477, 10135, 5406, 2080, 929, 8098, 2083, 9635, 4389, 10273, 2087, 6954, 7983, 6321, 3250, 2357, 4663, 5433, 570, 10173, 3007, 5568, 321, 8...
None
3,478
2
Jane_Silber:jane silber jane silber board member canonical ltd. chief executive officer 2010 2017 silber also chair board sensible code company whose products include quickcode silber joined canonical july 2004 work included leading ubuntu one project ensuring large organizations find ubuntu enterprise-ready partially attributes increasing attention user research design open source since 2009 canonical leadership area silber announced transition ceo role april 2017 canonical founder mark shuttleworth resuming position july 2017 silber earlier roles include vice president interactive television company vice president general dynamics c4 systems also worked japan teijin ltd conducting artificial intelligence research product development us general health health risk assessment firm holds mba degree oxford university saïd business school msc degree management technology vanderbilt university concentrated machine learning artificial intelligence work bsc degree mathematics computer science haverford college
[ 1026, 5644, 4367, 8848, 657, 10642, 1939, 2581, 11669, 6808, 7450, 926, 6302, 7584, 802, 5410, 6691, 6947, 8354, 5931, 8364, 3245, 6445, 8112, 1717, 823, 439, 2109, 11069, 10687, 3654, 8263, 10822, 843, 589, 975, 6352, 4177, 11602, 1107, ...
None
3,479
4
Eugene_Schultz:eugene schultz eugene schultz 1946 2011 american computer security researcher expert cybersecurity schultz born september 10 1946 chicago e. eugene sr. elizabeth schultz married cathy brown 36 years couple three daughters died stroke october 2 2011 completed bachelor degree ucla later earned ms phd cognitive sciences purdue university founder u.s. department energy computer incident advisory capability ciac managed several years chief technology officer emagined security authored several books papers computer security editor-in-chief computers security oldest journal computing security adjunct professor several universities winner department energy excellence award
[ 4194, 307 ]
Test
3,480
4
Security_modes:security modes generally security modes refer information systems security modes operations used mandatory access control mac systems often systems contain information various levels security classification mode operation determined mode operation users must users access data system high mode operation users must users access data based need know mode operation users must users access data based need know formal access approval multilevel security mode operation also called controlled security mode users must users access data based need know clearance formal access approval
[ 1350, 11496, 4299, 3440, 2737, 10580, 6902, 10968, 5433, 10170 ]
Validation
3,481
9
LotusScript:lotusscript lotusscript object oriented programming language used lotus notes since version 4.0 ibm lotus software products lotusscript similar visual basic developers familiar one easily understand syntax structure code major differences two respective integrated development environments product-specific object classes provided language included vb includes richer set classes ui manipulation whereas lotusscript includes richer set application-specific classes lotus notes lotus word pro lotus 1-2-3 case lotus notes classes work notes databases documents records databases etc classes also used ole automation objects outside lotus notes environment visual basic lotusscript also allows definition user-defined types classes although possible inherit product-specific classes lotusscript programs access microsoft office documents using ole automation libraries ms office
[ 5633, 3718, 7691, 1805, 9997, 786, 11412, 22, 3736, 8473, 9881, 797, 3233, 11683, 5925, 8101, 4136, 10666, 10029, 8494, 303, 7343, 11315, 9780, 315, 7355, 7486, 7870, 4160, 4674, 10750, 712, 847, 1879, 92, 11229, 2915, 9188, 5733, 9828, ...
Test
3,482
4
Microsoft_Forefront_Threat_Management_Gateway:microsoft forefront threat management gateway microsoft forefront threat management gateway forefront tmg formerly known microsoft internet security acceleration server isa server network router firewall antivirus program vpn server web cache microsoft corporation runs windows server works inspecting network traffic passes microsoft forefront tmg offers set features include microsoft forefront threat management gateway product line originated microsoft proxy server developed code-name catapult microsoft proxy server v1.0 first launched january 1997 designed run windows nt 4.0 microsoft proxy server v1.0 basic product designed provide internet access clients lan environment via tcp/ip support also provided ipx/spx networks primarily used legacy novell netware environments winsock translation/tunnelling client allowed tcp/ip applications web browsers operate transparently without tcp/ip wire although well-integrated windows nt4 microsoft proxy server v1.0 basic functionality came one edition extended support microsoft proxy server v1.0 ended 31 march 2002 microsoft proxy server v2.0 launched december 1997 included better nt account integration improved packet filtering support support wider range network protocols microsoft proxy server v2.0 exited extended support phase reached end life 31 december 2004 18 march 2001 microsoft launched microsoft internet security acceleration server 2000 isa server 2000 isa server 2000 introduced standard enterprise editions enterprise-grade functionality high-availability clustering included standard edition isa server 2000 required windows 2000 edition also run windows server 2003 accordance microsoft support lifecycle policy isa server 2000 first isa server product use 10 year support lifecycle 5 years mainstream support five years extended support isa server 2000 reached end life 12 april 2011 microsoft internet security acceleration server 2004 isa server 2004 released 8 september 2004 isa server 2004 introduced multi-networking support integrated virtual private networking configuration extensible user authentication models application layer firewall support active directory integration securenat improved reporting management features rules based configuration also considerably simplified isa server 2000 version isa server 2004 enterprise edition included array support integrated network load balancing nlb cache array routing protocol carp one core capabilities isa server 2004 dubbed secure server publishing ability securely expose internal servers internet example organizations use isa server 2004 publish microsoft exchange server services outlook web access owa outlook mobile access oma activesync using forms-based authentication fba authentication type isa server used pre-authenticate web clients traffic unauthenticated clients published servers allowed isa server 2004 available two editions standard enterprise enterprise edition contains features enabling policies configured array level rather individual isa servers load-balancing across multiple isa servers edition isa server licensed per processor version included windows small business server 2000/2003 premium includes licensing 2 processors isa server 2004 runs windows server 2003 standard enterprise edition appliance hardware containing windows server 2003 appliance edition isa server standard edition available variety microsoft partners microsoft internet security acceleration server 2006 isa server 2006 released 17 october 2006 updated version isa server 2004 retains features isa server 2004 except message screener isa server 2006 introduced new features including isa server appliance edition microsoft also offered isa server 2006 appliance edition designed pre-installed onto oem hardware server appliances sold hardware manufacturers stand-alone firewall type device along appliance edition isa server 2006 standard edition enterprise edition available preconfigured hardware microsoft forefront threat management gateway medium business edition forefront tmg mbe next version isa server also included windows essential business server version runs 64-bit edition windows server 2008 support enterprise edition features array support enterprise policy mainstream support forefront tmg mbe ended november 12 2013 microsoft forefront threat management gateway 2010 forefront tmg 2010 released 17 november 2009 built foundation isa server 2006 provides enhanced web protection native 64-bit support support windows server 2008 windows server 2008 r2 malware protection bits caching service pack 1 product released 23 june 2010 includes several new features support windows server 2008 r2 sharepoint 2010 lines products service pack 2 product released 10 october 2011 9 september 2012 microsoft announced development take place forefront threat management gateway 2010 product longer available purchase 1 december 2012 mainstream support ceased 14 april 2015 extended support end 14 april 2020
[ 1792, 2049, 4480, 2563, 5636, 2309, 1417, 2443, 6797, 1172, 9496, 537, 1436, 4511, 6431, 929, 10531, 5924, 550, 5799, 8998, 5673, 10790, 3243, 1708, 3885, 7983, 7473, 3250, 8753, 823, 569, 5178, 11577, 9279, 5057, 1858, 10433, 11073, 2118...
None
3,483
2
IPhone_XR:iphone xr iphone xr stylized marketed iphone roman numeral x pronounced ten smartphone designed manufactured apple inc twelfth generation iphone announced phil schiller september 12 2018 steve jobs theater apple park campus alongside higher-priced iphone xs iphone xs max pre-orders began october 19 2018 official release october 26 2018 phone 6.1-inch liquid retina lcd display apple claims advanced lcd industry least expensive device apple iphone x line devices starting price 749 united states 1029 canada £749 united kingdom €849 eurozone countries 6499 yuan china features processor xs xs max apple a12 bionic chip built 7 nanometer process apple claims smartest powerful chip ever put smartphone available six colors black white capri yellow coral shade pink orange product red xr available three storage capacities 64gb 128gb 256gb second iphone released yellow capri first iphone 5c 2013 internationally phone supports dual sims nano-sim esim mainland china hong kong macau dual nano-sim single tray offered instead despite receiving criticism lower display resolution comparison previous iphone models roughly price point xr received mostly positive reviews critics users release xr apple best selling 2018 model according apple xr battery lasts one-and-a-half hours longer direct predecessor iphone 8 xr similar design iphone x iphone xs however slightly larger bezels aluminum frame available wide variety colors similar x-branded iphones models come black front xr ip67 rating dust water resistance means immersed 1-meter deep water 30 minutes xr similar hardware xs features removed reduce price instead 3d touch xr comes haptic touch user long presses feel vibration taptic engine xr also lcd display known liquid retina instead oled screen used x xs xs max display xr resolution 1792×828 pixels pixel density 326 ppi compared 458 ppi x-branded iphones screen-to-body ratio xr 79.3 much higher 67.5 iphone 8 plus still lower phones price category unlike phones x-series xr ships single camera rear phone featuring exactly main camera sensor xs xs max utilizing 1/2.55 sensor size 1.4μm pixel size unlike xs optical zoom single camera dxomark gave camera iphone xr rating 101 giving title “ top-ranked single-lens phone. ” despite rear single-camera setup modified version portrait mode included works unaltered using truedepth front camera rear camera attempts calculate depth field using combination focus pixels image sensor ai resulting limitations including lower resolution depth data subjects close enough due wide-angle lens used instead missing telephoto lens like iphone xs xs max iphone xr also offers adjustable depth field software allowing user adjust background bokeh effect taking photo xr shipped ios 12 installed box compatible ios 13
[ 10755, 9732, 1549, 5647, 7697, 4114, 6165, 11289, 7706, 8222, 1057, 6183, 1576, 6186, 4139, 6700, 7211, 1074, 8754, 9784, 1083, 8253, 576, 1090, 8783, 4180, 10838, 1623, 3672, 10840, 9312, 1121, 3681, 9826, 8806, 3691, 2673, 6258, 10357, ...
Test
3,484
4
Sandboxie:sandboxie sandboxie sandbox-based isolation program developed sophos acquired invincea acquired earlier original author ronen tzur 32- 64-bit windows nt-based operating systems creates sandbox-like isolated operating environment applications run installed without permanently modifying local mapped drive isolated virtual environment allows controlled testing untrusted programs web surfing december 2013 invincea announced acquisition sandboxie original developer ronen tzur announced longer involved program february 2017 sophos announced acquisition invincea invincea posted assurance sandboxie website time sandboxie development support continue normal april 2019 official site shut preventing downloads installations purchases prompted creation temporary forum company domain may 2019 official site partially back purchase options regular forums still shut version 4.02 sandboxie full support 64-bit versions windows exception windows xp 64-bit never supported sandboxie released proprietary end-user license agreement eula home users may continue using sandboxie free without paying register however two functions remain disabled automatically running programs sandboxie simultaneous use multiple sandboxes 30 days sandboxie starts registration nagware message user dismiss 5-second delay sandboxie included brothersoft 2010 editors pick list gizmo freeware gave sandboxie rating 9 10 stars included editors choice list best free browser protection utility softonic given sandboxie rating 8 10 elena santos stating review sandboxie handy tool test untrustworthy software without putting system danger
[ 5411, 5380, 6438, 5356, 4972, 10284, 7983, 8976, 9488, 8466, 7380, 925, 4382, 9055 ]
Test
3,485
4
Mitro:mitro mitro password manager individuals teams securely saved users logins allowed users log share access october 6 2015 mitro service shut successor mitro named passopolis password manager built upon mitro source code mitro founded 2012 vijay pandurangan evan jones adam hilss july 31 2014 mitro team announced would join twitter time released source code mitro github free software gpl mitro team announced shuttering mitro service following timeline mitro team explained reason shutting service cost administrative burden maintain service spare time money become much given could properly manage service people rely security needed stop running former customers encouraged move passopolis independent project uses open source mitro code use alternatives 1password dashlane lastpass october 5 2015 mitro officially terminated twitter mitro backed 1.2 million seed funding google ventures matrix partners mitro uses google keyczar server keyczar js implementation browser
[ 9922, 713, 10602, 10059, 5072, 9168, 11221, 5078, 7359 ]
None