node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
3,586
3
AMD_Accelerated_Processing_Unit:amd accelerated processing unit amd accelerated processing unit apu formerly known fusion marketing term series 64-bit microprocessors advanced micro devices amd designed act central processing unit cpu graphics processing unit gpu single die amd announced first generation apus llano high-performance brazos low-power devices january 2011 second generation trinity high-performance brazos-2 low-power devices announced june 2012 third generation kaveri high performance devices launched january 2014 kabini temash low-power devices announced summer 2013 sony playstation 4 microsoft xbox one eighth generation video game consoles use semi-custom third generation low-power apus intel cpus integrated hd graphics also cpu gpu single die offer hsa features see amd fusion project started 2006 aim developing system chip combined cpu gpu single die amd took key step toward realising vision acquired graphics chipset manufacturer ati 2006 project reportedly required three internal iterations fusion concept create product deemed worthy release reasons contributing delay project include technical difficulties combining cpu gpu die 45 nm process conflicting views role cpu gpu within project first generation desktop laptop apu codenamed llano announced january 4 2011 2011 ces show las vegas released shortly thereafter featured k10 cpu cores radeon hd 6000-series gpu die fm1 socket apu low-power devices announced brazos platform based bobcat microarchitecture radeon hd 6000-series gpu die conference january 2012 corporate fellow phil rogers announced amd would re-brand fusion platform heterogeneous system architecture hsa stating fitting name evolving architecture platform representative entire technical community leading way important area technology programming development however later revealed amd subject trademark infringement lawsuit swiss company arctic used name fusion line power supply products second generation desktop laptop apu codenamed trinity announced amd 2010 financial analyst day released october 2012 featured piledriver cpu cores radeon hd 7000 series gpu cores fm2 socket amd released new apu based piledriver microarchitecture march 12 2013 laptops/mobile june 4 2013 desktops codename richland second generation apu low-power devices brazos 2.0 used exactly apu chip ran higher clock speed rebranded gpu radeon hd7000 series used new io controller chip semi-custom chips introduced microsoft xbox one sony playstation 4 video game consoles third generation technology released 14 january 2014 featuring greater integration cpu gpu desktop laptop variant codenamed kaveri based steamroller architecture low-power variants codenamed kabini temash based jaguar architecture november 2017 hp released envy x360 featuring ryzen 5 2500u apu first 4th generation apu based zen cpu architecture vega graphics architecture amd founding member heterogeneous system architecture hsa foundation consequently actively working developing hsa cooperation members following hardware software implementations available amd apu-branded products amd apus unique architecture amd cpu modules cache discrete-class graphics processor die using bus architecture allows use graphics accelerators opencl integrated graphics processor goal create fully integrated apu according amd eventually feature 'heterogeneous cores capable processing cpu gpu work automatically depending workload requirement first generation apu released june 2011 used desktops laptops based k10 architecture built 32 nm process featuring two four cpu cores thermal design power tdp 65-100 w integrated graphics based radeon hd6000 series support directx 11 opengl 4.2 opencl 1.2 performance comparisons similarly priced intel core i3-2105 llano apu criticised poor cpu performance praised better gpu performance amd later criticised abandoning socket fm1 one generation amd brazos platform introduced january 4 2011 targeting subnotebook netbook low power small form factor markets features 9-watt amd c-series apu codename ontario netbooks low power devices well 18-watt amd e-series apu codename zacate mainstream value notebooks all-in-ones small form factor desktops apus feature one two bobcat x86 cores radeon evergreen series gpu full directx11 directcompute opencl support including uvd3 video acceleration hd video including 1080p amd expanded brazos platform june 5 2011 announcement 5.9-watt amd z-series apu codename desna designed tablet market desna apu based 9-watt ontario apu energy savings achieved lowering cpu gpu northbridge voltages reducing idle clocks cpu gpu well introducing hardware thermal control mode bidirectional turbo core mode also introduced amd announced brazos-t platform october 9 2012 comprised 4.5-watt amd z-series apu codenamed hondo a55t fusion controller hub fch designed tablet computer market hondo apu redesign desna apu amd lowered energy use optimizing apu fch tablet computers deccan platform including krishna wichita apus cancelled 2011 amd originally planned release second half 2012 first iteration second generation platform released october 2012 brought improvements cpu gpu performance desktops laptops platform features 2 4 piledriver cpu cores built 32 nm process tdp 65 w 100 w gpu based radeon hd7000 series support directx 11 opengl 4.2 opencl 1.2 trinity apu praised improvements cpu performance compared llano apu release second iteration generation 12 march 2013 mobile parts 5 june 2013 desktop parts january 2013 jaguar-based kabini temash apus unveiled successors bobcat-based ontario zacate hondo apus kabini apu aimed low-power subnotebook netbook ultra-thin small form factor markets temash apu aimed tablet ultra-low power small form factor markets two four jaguar cores kabini temash apus feature numerous architectural improvements regarding power requirement performance support newer x86-instructions higher ipc count cc6 power state mode clock gating kabini temash amd first also first ever quad-core x86 based socs integrated fusion controller hubs fch kabini temash codenamed yangtze salton respectively yangtze fch features support two usb 3.0 ports two sata 6 gbit/s ports well xhci 1.0 sd/sdio 3.0 protocols sd-card support chips feature directx 11.1-compliant gcn-based graphics well numerous hsa improvements fabricated 28 nm process ft3 ball grid array package taiwan semiconductor manufacturing company tsmc released may 23 2013 playstation 4 xbox one revealed powered 8-core semi-custom jaguar-derived apus third generation platform codenamed kaveri partly released january 14 2014 kaveri contains four steamroller cpu cores clocked 3.9 ghz turbo mode 4.1 ghz 512-core graphics core next gpu two decode units per module instead one allows core decode four instructions per cycle instead two amd trueaudio mantle api on-chip arm cortex-a5 mpcore release new socket fm2+ ian cutress rahul garg anandtech asserted kaveri represented unified system-on-a-chip realisation amd acquisition ati performance 45 w a8-7600 kaveri apu found similar 100 w richland part leading claim amd made significant improvements on-die graphics performance per watt however cpu performance found lag behind similarly-specified intel processors lag unlikely resolved bulldozer family apus a8-7600 component delayed q1 launch h1 launch steamroller architecture components allegedly scale well higher clock speeds amd announced release kaveri apu mobile market june 4 2014 computex 2014 shortly accidental announcement amd website may 26 2014 announcement included components targeted standard voltage low-voltage ultra-low voltage segments market early-access performance testing kaveri prototype laptop anandtech found 35 w fx-7600p competitive similarly-priced 17 w intel i7-4500u synthetic cpu-focused benchmarks significantly better previous integrated gpu systems gpu-focused benchmarks tom hardware reported performance kaveri fx-7600p 35 w intel i7-4702mq finding i7-4702mq significantly better fx-7600p synthetic cpu-focused benchmarks whereas fx-7600p significantly better i7-4702mq intel hd 4600 igpu four games could tested time available team
[ 3588, 6151, 5645, 10260, 7712, 9255, 2094, 5681, 6705, 7218, 7234, 11331, 7247, 4695, 7788, 1137, 1651, 3197, 638, 8322, 3204, 8327, 10375, 2719, 4767, 4276, 9400, 2237, 3783, 2764, 5840, 5329, 9427, 11485, 5858, 5859, 1260, 5356, 4334, 9...
Test
3,587
3
Language-based_system:language-based system language-based system type operating system uses language features provide security instead addition hardware mechanisms systems code referred trusted base responsible approving programs execution assuring perform operations detrimental system stability without first detected dealt common strategy guaranteeing operations impossible base system around high-level language java whose design precludes dangerous constructs many entirely written language minimum amount low-level code used since language-based systems assure ahead time things damage system corrupting memory dereferencing dangling pointers possible avoid expensive address space switches needed traditional oses microkernels popular traditional systems extreme form high-level language computer architecture trusted base pushed hardware entire system written high-level language
[ 1954, 6979, 8262, 3624, 9931, 5677, 7983, 5714, 5363, 7187, 9330, 9331 ]
Validation
3,588
3
Super_Socket_7:super socket 7 super socket 7 also referred super 7 hardware-level extension socket 7 zif socket specification x86 processors compatible motherboards chipsets utilize standard socket 7 connection cpu adding certain features including maximum 100 mhz front-side bus support agp graphics cards super socket 7 used amd k6-2 k6-iii processors final cyrix m-ii processors final idt winchip 2 processors rise mp6 processors backward compatible socket 7 cpu meaning socket 7 cpu used super socket 7 motherboard super socket 7 cpu operate full speed socket 7 motherboard socket 5 cpus pin-compatible super socket 7 motherboards designed super socket 7 supported voltages needed socket 5 cpus amd previously always used intel sockets processors socket 7 last one amd retained legal rights intel hoped discontinuing socket 7 development moving slot 1 amd would left outdated platform making processors non-competitive extending fsb 66 100 mhz super socket 7 gave amd stopgap solution needed developing independent motherboard infrastructure slot architecture cheap served intended purpose many third party chipsets provided via sis others low quality especially regard agp implementations reputation amd gained buggy incompatible motherboards lingered though internal program via raise standards chipsets begun show results k6-iii pentium iii era amd put place quality assurance program athlon processor
[ 3586, 9475, 8452, 3464, 4872, 1677, 5901, 7058, 10260, 4246, 2455, 3992, 8855, 11417, 3995, 4252, 2463, 799, 4767, 6175, 7712, 7714, 9122, 10019, 1322, 3883, 2604, 4523, 2350, 11183, 6192, 1329, 9649, 3892, 8629, 9400, 7105, 6978, 11331, ...
Test
3,589
1
Clinical_Practice_Research_Datalink:clinical practice research datalink clinical practice research datalink cprd observational interventional research service operates part uk department health jointly funded national institute health research nihr medicines healthcare products regulatory agency mhra cprd working closely extensive primary care topic specific comprehensive nihr research networks nhs digital programme would develop current organisation initially developed essex general practitioner dr alan dean facilitate day-to-day management general practice collaboration staff bata shoe factory east tilbury near practice early programmers included czech programmer jan boda 1987 venture capital company set named value added information medical products ltd vamp recruit practices form information base early development team three marcella devenish formerly midwife philip lee-warren formerly senior medical laboratory scientific officer leadership kieran o'mally developed computerised system using bos microcobol development environment period number uk practices using software product igp integrated general practice expanded hundred two half thousand return anonymous healthcare data vamp ltd offered gps cash equivalent gbp 500 month order build vamp research databank research purposes 1988 vamp research databank comprised 57 practices 543,100 patients figure doubled 1.2 million 1990 one year later 970 practices allowed vamp access data 1000 practices straightforward maintenance agreement vamp november 1993 parent company acquired reuters health information donated database department health 1994 time became general practice research database gprd contained data 650 practices 4.4 million active patients time two licensees data dr alan dean professor hershel jick database operated office national statistics 1999 point medicines control agency mca took agency became medicines healthcare products regulatory agency mhra 1 april 2003 following merger medical devices agency mda since use database expanded within uk overseas gprd run sub-division mhra direction dr john parkinson research utility gprd dramatically enhanced linkage datasets individual patient level external datasets included hospital episode statistics death certificates national cancer registry minap cardiovascular disease registry additionally dataset became choice fda major pharma companies following announcement chancellor plan growth commissioned study entitled research capability programme initiated aim assessing available research capabilities uk future potential growth areas sector opportunity identified collaboration department health mhra creating joint research service based upon consolidating expanding existing independent services new service known cprd developed meet expectations criteria outlined plan growth 29 march 2012 medicines healthcare products regulatory agency department health national institute health research nihr launched clinical practice research datalink cprd launch cprd sir kent woods chief executive mhra said clinical practice research datalink provide new data research services improve health patients also make uk world leader life sciences research david willetts minister universities science said uk world leader life sciences research base industry tell us could make better use data order drive medical breakthroughs clinical practice research datalink provide researchers access safeguarded data respects patient confidentiality give valuable insights serious health conditions ultimately help reduce time takes develop new treatments gprd became part data services provision cprd launch april 2012 cprd established new england-wide nhs observational interventional research service built research developments gprd also health research support service hrss previously managed nihr research capability program cprd remains housed within medicines healthcare products regulatory agency one three 'centres within agency cprd builds predecessors capabilities aims provide range services products areas medical research public health care fundamental work cprd collection linkage anonymised data sets provision research services cprd utilises maximum benefit linked data sets uk ’ health system provide researchers access high quality anonymous primary secondary health care data data collected allows researchers access wealth information including nhs provides free point delivery healthcare population 52 million england access data sets nhs england wales scotland northern ireland cprd provide population potentially 64 million patients uk access partnerships established include data sets european countries linking anonomysed primary care data large data registries related data sets means cprd offer huge array data information inclusion medical research studies include areas prescription drugs uses effect long term patient treatment strategy long term health benefit studies epidemic pandemic studies demographic health welfare studies example analysis 100 million gp consultations using cprd data 2016 provided first substantial evidence increase gp clinical workload england cprd range research experience expertise including cprd provides consulting services range research activities provided experienced internal team research service offers advice research methodology research governance well host services drawing expertise predecessors experience cprd research team built reputation conducting high-end research projects protocol development gaining approvals research data analysis report publication writing research capacity cprd resource expertise undertake research projects behalf customers independently variety undertakings commercial regulatory charitable academic sectors huge range studies cprd predecessors published list published papers found cprd research cprd offers range interventional research services facilitate running clinical trials primary health care data collected cprd taken participating gp surgeries united kingdom personal identifiers collected protecting privacy individuals data comes data collected includes
[ 626 ]
Test
3,590
4
Nitrokey:nitrokey nitrokey open source usb key enable secure encryption signing data secret keys always stored inside nitrokey protects malware computer viruses attackers user-chosen pin tamper-proof smart card protect nitrokey case loss theft hardware software nitrokey available open source free software open hardware enables independent parties verify security device nitrokey supported microsoft windows linux macos 2008 jan suhr rudolf böddeker another friend travelling found looking use encrypted emails internet cafés meant secret keys remain secure computer viruses proprietary usb dongles existed time lacked certain ways consequentially established open source project crypto stick august 2008 grew become nitrokey spare-time project founders develop hardware solution enable secure usage email encryption first version crypto stick released 27 december 2009 late 2014 founders decided professionalize project renamed nitrokey nitrokey firmware audited german cybersecurity firm cure53 may 2015 hardware audited company august 2015 first four nitrokey models became available 18 september 2015 several nitrokey models exist nitrokey pro flagship model contains following features upcoming nitrokey storage provides features nitrokey pro additionally contains encrypted mass storage nitrokey developers believes proprietary systems ca n't provide strong security security systems need open source instance cases nsa intercepts security devices shipped implanted backdoors 2011 rsa hacked secret keys securid tokens stolen allowed hackers circumvent authentication revealed 2010 many fips 140-2 level 2 certified usb storage devices various manufacturers could easily cracked using default password nitrokey open source transparency wants provide high secure system avoid security issues proprietary rivals facing nitrokey mission provide best open source security key protect digital lives users
[ 11046, 10631, 11175, 2154, 11211, 3309, 6797, 7887, 1297, 2228, 823, 11418, 7515 ]
Test
3,591
1
Propagation_constraint:propagation constraint database systems propagation constraint details happen related table update row rows target table paul beynon-davies 2004 p.108 tables linked using primary key foreign key relationships possible users update one table relationship way relationship longer consistent known breaking referential integrity example breaking referential integrity table employees includes department number 'housewares foreign key table departments user deletes department department table housewares employees records would refer non-existent department number propagation constraints methods used relational database management systems rdbms solve problem ensuring relationships tables preserved without error database textbook beynon-davies explains three ways rdbms handle deletions target related tuples
[ 10628, 7080, 10632, 6860, 5401 ]
None
3,592
4
Evil_bit:evil bit evil bit fictional ipv4 packet header field proposed rfc 3514 humorous april fools day rfc 2003 authored steve bellovin rfc recommended last remaining unused bit reserved bit ipv4 packet header used indicate whether packet sent malicious intent thus making computer security engineering easy problem simply ignore messages evil bit set trust rest evil bit become synonym attempts seek simple technical solutions difficult human social problems require willing participation malicious actors particular efforts implement internet censorship using simple technical solutions joke freebsd implemented day removed changes following day linux patch implementing iptables module ipt_evil posted next year furthermore patch freebsd 7 available kept up-to-date extension xmpp protocol xep-0076 malicious stanzas inspired evil bit rfc also quoted otherwise completely serious rfc 3675 .sex considered dangerous may caused proponents .xxx wonder whether internet engineering task force ietf commenting application top-level domain tld document related application april fool 2010 google added codice_1 parameter requests ajax apis
[ 3218, 11413, 3742, 10924, 6319, 562, 6456, 4797, 4158, 3006, 64, 7364, 2887, 5469, 5470, 10341, 10344, 11112, 5102, 8432, 6651, 2558 ]
None
3,593
7
WeVideo:wevideo wevideo u.s.-headquartered software service company provides collaborative web-based video editing platform works browser company formed 2011 based menlo park california wevideo inc. founded april 2011 initially creaza inc. creaza inc. owns related company norway called creaza education provides suite digital tools k-12 market including comic tools audio editing mind-mapping video editing applications wevideo publicly launched services september 2011 changing name creaza inc. allay confusion creaza education reflect social collaborative nature platform shortly 2011 launch wevideo invited youtube become youtube create partner embedded wevideo editor one number solutions offered youtube help users create better video compositions april 2012 wevideo announced launch partner google drive google ’ cloud-based collaboration storage service michael j. miller ziff brothers investments cited wevideo one favorites 2011 demo fall conference stating presents strong cloud-based consumer video editing solution network world also named wevideo one highlights conference labeling something keep eyes seattle times praised wevideo ability allow multiple editors work video noted videos five editors would require paid membership tech evangelist robert scoble noted wevideo ’ unique collaboration features stated “ wevideo yet another demonstration everything changing due cloud even video editing ” since inception wevideo received number awards including following
[ 467, 10227 ]
Validation
3,594
2
ICL_VME:icl vme vme virtual machine environment mainframe operating system developed uk company international computers limited icl part fujitsu group originally developed 1970s vme/b later vme 2900 drive icl new 2900 series mainframes operating system known openvme incorporating unix subsystem runs icl series 39 trimetra mainframe computers well industry-standard x64 servers development program new range system started merger international computers tabulators ict english electric computers 1968 one fundamental decisions would feature new operating system number different feasibility design studies carried within icl three notable chief architect vme/b brian warboys subsequently became professor software engineering university manchester number influences seen design example multics icl earlier george 3 operating system however essentially designed scratch vme viewed primarily competing system/360 ibm mainframe commercial operating system adopted ebcdic character encoding creation mid-1970s constraints compatible earlier operating systems vme many ways modern architecture today unix derivatives unix designed 1960s microsoft windows started operating system single-user computers still betrays origins new range first launched october 1974 operating system referred system b time first delivered become vme/b vme/k developed independently according campbell-kelly whim ed mack delivered later smaller mainframes 2960 following financial crisis 1980 new management brought icl christopher laidlaw chairman robb wilmot managing director early decision new management drop vme/k thus july 1981 vme2900 launched although presented customer base merger vme/b vme/k reality vme/b base selected features vme/k grafted provided opportunity drop obsolescent features remained available customers needed form bonvme option 2900 suffix dropped system version 213 sv213 icl launched series 39 1985 successor original 2900 series open prefix added sv294 vme became capable hosting applications written originally unix unix system v release 3 based subsystem called vme/x adapted run vme using ascii character encoding 2007 fujitsu announced vme version run hosted subsystem called supernova within microsoft windows suse red hat enterprise linux x86-64 hardware 2012 vme user group axis announced almost 40 years would disbanding reduced user base vme structured set layers layer access resources different levels abstraction virtual resources provided one layer constructed virtual resources offered layer access resources layer controlled set access levels order process use resource particular access level must access key offering access level concept similar rings protection multics architecture allows 16 access levels outer 6 reserved user-level code orthogonally access levels operating system makes resources available applications form virtual machine virtual machine run multiple processes practice vme virtual machine closer concept process operating systems vme process like thread allocation resources virtual machine uses stack model stack popped resources allocated stack level released calls application operating system therefore made call retains process stack change protection level resulting efficiency system calls one features makes architecture competitive communication virtual machines achieved means events named communication channels shared memory areas hardware architecture also provides semaphore instructions inct increment-and-test tdec test-and-decrement files persistent objects recorded repository called catalogue unlike operating systems file naming hierarchy independent location file particular tape disk volume days need offline storage made easy keep track files regardless location move files locations without renaming well files catalogue keeps track users user groups volumes devices network connections many resources metadata files held object called file description catalogue probably first example would later called entity-relationship database interrupts handled creating new stack frame stack relevant process handling interrupt using new environment popping stack return interrupted process run-time exceptions referred contingencies captured object program error handler opeh produce report equivalent stack trace either interactively written journal compiled object code maintained format called omf object module format unlike many operating systems also format used loader various compilers available well utilities notably collector links code several omf modules single module efficient loading run-time module amender allows patching instructions omf module fix bugs using assembly language syntax command language vme known scl system control language much recognizably typed high-level programming language job control shell languages found operating systems likened scripting languages javascript though surface syntax derived algol 68 scl designed allow line-at-a-time interactive use console command file creation executable scripts programs language compiled object module format way vme programming language declaration procedure within scl also acts definition simple form template allowing procedure invoked interactive terminal fields validated according data types underlying procedure parameters using default procedure parameter values built-in command vocabulary uses consistent naming convention imperative verb followed noun example delete_file display_library_details command written full abbreviated form combines standard abbreviations verb noun example xf x delete f file dlbd display lb library details scl block-structured begin/end blocks serving dual complementary roles defining lexical scope variable declarations defining points resources acquired operating system released variables language accessible applications form environment variables number simple types strings superstrings sequences strings booleans integers also used contain references system resources files network connections possible disassemble scl program omf back scl source code using read_scl rscl command however output always perfect often include errors would stop re-compilation without user intervention simple code example seen 99 bottles beer website realistic example scl used compile program written s3 shown example taken columbia university archive implementations kermit commands illustrated fragment include whenever declares error handling policy assign_library binds local name file directory delete_file makes permanent file temporary deleted end block s3_compile compiles program written s3 command breaks usual verb-noun convention new_message_text_module creates module containing parameterized error messages suitable localization compile_scl compiles scl program object code collect command combines different object code modules single module driven local command file incorporated inline scl delimiters -- -- ++++ sub-commands input newmodule identify names input output modules suppress retain determine external visibility named procedures within collected module listmodule requests report describing output module note used separate parts hierarchic file name leading asterisk denotes local name library bound using assign_library command number parentheses file name version number operating system associates version number every file requests file get latest version unless specified otherwise creating new file default create next version leave previous version intact program however deliberately choosing create version 101 identify public release result icl heavy involvement delivery computer services uk public sector particular special security requirements opcon ccis early entrant market secure systems vme formed core icl activities secure systems arena advantage last large-scale operating system ever designed one built scratch underlying architecture encompassed many primitives needed develop secure system particular hardware assisted access control registers acr limit privileges could taken process including users led uk government central computing telecommunications agency ccta funding project spaceman mid 1980s icl defence technology centre dtc develop enhanced security variant vme icl launched pair complementary products commercial release called high security option hso public sector release including government furnished encryption gfe technologies called government security option gso hso gso formally tested cesg uk security evaluation scheme one predecessors itsec common criteria became first mainstream operating system formally certified series 39 range introduced nodal architecture novel implementation distributed shared memory seen hybrid multiprocessor system cluster design machine consists number nodes node contains order-code processor cpu main memory virtual machines typically located one time one node capability run node relocated one node another discs peripherals shared nodes nodes connected using high-speed optical bus used provide applications virtual shared memory memory segments marked shared public global segments replicated node updates broadcast inter-node network processes use unshared memory segments nodal local run complete isolation nodes processes vme originally written almost entirely s3 specially-designed system programming language based algol 68r however vme/k written primarily sfl assembly language although high-level language used operating system designed independent underlying hardware architecture contrary software hardware architecture closely integrated early 1990s onwards entirely new vme subsystems written partly wholly c programming language earliest days vme developed aid software engineering repository known cades built purpose using underlying idms database cades merely version control system code modules manages aspects software lifecycle requirements capture field maintenance cades used vme module development hold separate definitions data structures modes constants literals procedural interfaces core algorithms multiple versions 'lives components could exist algorithms written system development language sdl converted s3 source pre-processor multiple versions modules could generated application development tools offered vme fall two categories toolset vme unusually homogeneous customers using core set languages tools result tools also well integrated third-party tools made relatively little impression many years large majority vme users wrote applications cobol usually making use idms database tpms transaction processing monitor programming languages included fortran pascal algol 68rs coral 66 rpg2 served minority interests later mid 1980s compilers c became available within outside unix subsystem largely enable porting software relational database systems interesting pl/i subset compiler written eec assist porting programs ibm icl hardware compilers developed within icl share common architecture cases share components code-generators many compilers used module named alice assembly language internal common environment produced early form precompiled code p-code termed rose making compiled object module format omf libraries loadable machine range primary language used developing vme operating system system software compilers transaction processing monitors s3 high level language based many ways algol 68 data types low-level functions operators aligned closely architecture 2900 series assembly language sfl system function language also available used development vme/k whose designers confident high-level language could give adequate performance also idms database system account origins third-party product sfl originally called macro assembler programming language maple 2900 architecture positioned consisting high level language machines name changed request icl marketing developed part toolkit system subsequently cancelled related families assemblers architectures calm-xx running vme palm-xx developed pascal running various hosts developed internal use neither s3 sfl ever promoted commercial development tool end-user applications neither normally delivered standard part operating system explicitly marketed products right sfl s3 however available options user organisations third parties specific need quickbuild application development environment vme highly successful despite fact applications largely locked vme environment environment centred data dictionary system dds also called opendds early successful attempt build comprehensive repository supporting tools full support development lifecycle well database schemas file record descriptions dictionary keeps track objects reports queries screen designs 4gl code also supports variety models requirements capture level entity-relationship models process models quickbuild 4gl packaged two forms high-level declarative languages using jackson structured programming design paradigm applicationmaster unusual approach application design focuses user session running single conversational process completely hiding complexity maintaining state across user interactions 4gl tools screen designer work dds dictionary also holds database schemas considerable reuse metadata rarely achieved 4gls
[ 512, 2179, 3462, 4998, 3594, 6797, 6675, 10387, 406, 5658, 7847, 6187, 7983, 9137, 2995, 8502, 4151, 4410, 1606, 8262, 8904, 9286, 1611, 8524, 3791, 5455, 5457, 2264, 477, 5730, 10467, 3816, 5356, 2541, 9330, 3443, 4595, 5492, 6772, 3960,...
None
3,595
4
SpyHunter_(software):spyhunter software spyhunter anti-spyware computer program microsoft windows windows xp later operating system designed remove malware trojan horses computer worms rootkits malicious software spyhunter currently version 4 receives daily definition updates spyhunter free version allows user scan computer purchase required remove found malware paid version user able receive support built-in helpdesk february 2016 enigma software filed lawsuit bleeping computer computer support website alleged latter engaged smear campaign purpose driving potential customers away spyhunter affiliate competing products turn bleeping computer filed lawsuit enigma software also alleged smear campaign march 2017 enigma software announced press release settlement reached lawsuit bleeping computer cases would dismissed october 2016 enigma software filed lawsuit popular security software vendor malwarebytes lawsuit arose malwarebytes software began targeting spyhunter potentially unwanted program november 7 2017 enigma case dismissed us district court
[ 10756, 9771, 6797, 7983, 4374, 2041, 7515, 11225, 9791 ]
Validation
3,596
3
Dennard_scaling:dennard scaling dennard scaling also known mosfet scaling scaling law based 1974 paper co-authored robert h. dennard named originally formulated mosfets states roughly transistors get smaller power density stays constant power use stays proportion area voltage current scale downward length dennard observes transistor dimensions scaled 30 0.7x every technology generation thus reducing area 50 reduces delay 30 0.7x therefore increases operating frequency 40 1.4x finally keep electric field constant voltage reduced 30 reducing energy 65 power 1.4x frequency 50 therefore every technology generation transistor density doubles circuit becomes 40 faster power consumption twice number transistors stays moore law says number transistors doubles every two years combined dennard scaling means performance per watt grows rate doubling every two years trend referred koomey law rate doubling originally suggested koomey 1.57 years somewhat faster doubling period moore law recent estimates suggest slowing dynamic switching power consumption cmos circuits proportional frequency historically transistor power reduction afforded dennard scaling allowed manufacturers drastically raise clock frequencies one generation next without significantly increasing overall circuit power consumption since around 2005–2007 dennard scaling appears broken 2016 transistor counts integrated circuits still growing resulting improvements performance gradual speed-ups resulting significant frequency increases primary reason cited breakdown small sizes current leakage poses greater challenges also causes chip heat creates threat thermal runaway therefore increases energy costs breakdown dennard scaling resulting inability increase clock frequencies significantly caused cpu manufacturers focus multicore processors alternative way improve performance increased core count benefits many though means workloads increase active switching elements multiple cores still results increased overall power consumption thus worsens cpu power dissipation issues end result fraction integrated circuit actually active given point time without violating power constraints remaining inactive area referred dark silicon
[ 2273, 3882, 7006 ]
None
3,597
3
Whitechapel_Computer_Works:whitechapel computer works whitechapel computer works ltd. wcw computer workstation company formed east end london united kingdom april 1983 investment greater london enterprise board department trade industry first workstation model mg-1 named milliard gargantubrain hitchhiker guide galaxy mg-1 based national semiconductor ns32016 microprocessor 1024 × 800 pixel monochrome display 40 mb rodime st-506 hard disk optional ethernet interface initially natsemi genix operating system port 4.1bsd unix provided later replaced port 4.2bsd called 42nix mg-1 also partially kernel-based graphical user interface called oriel mg-1 first shipped customers 1984 base price around although oriel released following year distributor united states mg-1 sold north america cybertool systems ltd. 1984 1986 colour version cg-1 also announced 1986 followed mg-200 ns32332 processor 1987 wcw went receivership 1986 soon revived whitechapel workstations ltd. go liquidation april 1988 new company launched hitech-10 hitech-20 workstations r2000 r3000 mips architecture processors respectively ran umips variant unix either x11 news-based guis aimed computer animation applications ex-whitechapel engineers went form algorithmics ltd. specialising mips-based embedded systems algorithmics later acquired mips technologies 2002 rights hitech workstations acquired mistral computer systems ltd. june 1988
[ 7234, 426, 6250, 783, 7983, 8179, 3350 ]
Train
3,598
6
Macintosh_File_System:macintosh file system macintosh file system mfs volume format disk file system created apple computer storing files 400k floppy disks mfs introduced original apple macintosh computer january 1984 mfs notable introducing resource forks allow storage structured data storing metadata needed support graphical user interface mac os mfs allows file names 255 characters length although finder allow users create names longer 63 characters 31 characters later versions mfs called flat file system support hierarchy directories folders exist concept original mfs-based macintosh work completely differently way modern systems visible finder windows open save dialog boxes always one empty folder volume altered way adding renaming files new empty folder appears thus providing way create new folders mfs stores file directory listing information single file finder creates illusion folders storing files pairs directory handles file handles display contents particular folder mfs scans directory files handle need find separate file containing directory listing macintosh file system support volumes 20 mb size 1,400 files small today standards time seemed expansive compared macintosh 400 kb floppy drive apple introduced hierarchical file system replacement mfs september 1985 mac os 7.6.1 apple removed support writing mfs volumes mac os 8.0 support mfs volumes removed altogether although macos built-in support mfs example vfs plug-in apple called mfslives provides read-only access mfs volumes
[ 5120, 2564, 1542, 6669, 10257, 9236, 6677, 5142, 8214, 3611, 9249, 9762, 5158, 1592, 7225, 11323, 576, 8772, 7244, 1109, 3167, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 52...
Test
3,599
4
Data_Protection_Act,_2012:data protection act 2012 data protection act 2012 act legislation enacted parliament republic ghana protect privacy personal data individuals regulates process personal information acquired kept used disclosed data controllers data processors requiring compliance certain data protection principles non compliance provisions act may attract either civil liability criminal sanctions depending nature infraction act also establishes data protection commission mandated ensure compliance provisions well maintain data protection register act first introduced ghana parliament 2010 subsequently withdrawn minister communications haruna iddrisu revised parliament passed bill 2012 received presidential assent may 10 2012 notice act gazetted 18 may 2012 accordance section 99 act came effect 16 october 2012 act made 99 sections arranged various headings follows key terms act defined interpretation section section 96 unless context otherwise requires section 96 provides following definitions notable terms “ data controller ” means person either alone jointly persons common persons statutory duty determines purposes manner personal data processed processed “ data processor ” relation personal data means person employee data controller processes data behalf data controller “ data subject ” means individual subject personal data “ foreign data subject ” means data subject information regulated laws foreign jurisdiction sent ghana foreign jurisdiction wholly processing “ personal data ” means data individual identified data b data information possession likely come possession data controller “ processing ” means operation activity set operations automatic means concerns data personal data collection organisation adaptation alteration information data b retrieval consultation use information data c disclosure information data transmission dissemination means available alignment combination blocking erasure destruction information data “ recipient ” means person data disclosed including employee agent data controller data processor data disclosed course processing data data controller include person disclosure made respect particular inquiry pursuant enactment “ special purposes ” means one following purpose journalism b purpose public interest c artistic purposes literary purposes act applicable data originates externally merely transits ghana however protected act section 45 4 act applies ghanaian government purpose government department treated data controller section 91 act provides 8 principles data processors take account processing data order protect privacy individuals principles similar oecd guidelines data protection directive european union data protection principles enumerated section 17 follows accountability principle data protection seen generally fundamental principle compliance requires data controller accountable compliance measures give effect data protection principles act requires person processes personal data ensure data processed without infringing rights data subject processed lawful reasonable manner section 18 1 data processed involves foreign data subject data controller processor must ensure personal data processed according data protection laws originating jurisdiction section 18 2 data processing lawful conditions justify processing present act minimality provision requires personal data processed purpose processed necessary relevant excessive section 19 prior consent data subject also required personal data processed section 20 requirement however subject exceptions instance purpose personal data processed necessary purpose contract data subject party authorised required law protect legitimate interest data subject necessary proper performance statutory duty necessary pursue legitimate interest data controller third party data supplied section 20 1 consent also required processing special personal data section 37 2 b data subject also object processing personal data section 20 2 data processor required stop processing data upon objection section 20 3 terms retention records act prohibits retention personal data period longer necessary achieve purpose collection unless retention required law reasonably necessary lawful purpose related function activity required contractual purposes data subject consented retention section 24 1 retention requirement however applicable personal data kept historical statistical research purposes section 24 2 except records must adequately protected access used unauthorized purposes section 24 3 person uses record personal data make decision data subject data must retained period required law code conduct law code conduct exists period afford data subject opportunity request access record upon expiration retention period personal data must however deleted destroyed manner prevents reconstruction intelligible form record personal data must de-identified sections 24 4 5 6 data subject may also request record personal data data subject held data controller destroyed deleted data controller longer authorisation retain data section 33 1 b act requires data controller collects personal data specific purpose explicitly defined lawful related functions activity person section 22 data controller collects data also required take necessary steps ensure data subject aware purpose data collected section 23 act requires data controller holds personal data collected connection specific purpose processing data must compatible purpose personal data initially obtained section 25 1 circumstances processing meets compatibility requirement include data subjects consents processing information data public domain processing necessary purposes fighting crime legislation concerns protection tax revenue collection conduct court proceedings protection national security public health life health data subject another person section 25 3 section 26 act data controller processes personal data must ensure data complete accurate date misleading regard purpose data collected processed openness principle ensures individuals know participate enforcing rights data protection regime section 27 1 makes mandatory data controller intends process personal data register data protection commission data controller intends collect data must also ensure data subject aware nature data collected persons responsible collection purpose collection well whether supply data mandatory discretionary among things section 27 2 data collected third party act requires data subject informed data collected soon practicable afterwards section 27 3 act provides circumstances notification requirement exempt include necessary avoid compromising law enforcement protect national security relates preparation conduct legal proceedings.section 27 4 also although mandatory data controller appoint data protection supervisor would responsible monitoring compliance act section 58 1 2 data protection supervisor may employee section 58 1 must meet qualification criteria set data protection commission section 58 7 act data controller duty prevent loss damage unauthorized destruction personal data well unlawful access unauthorized processing personal data data controller must therefore adopt appropriate reasonable technical organizational means take necessary steps ensure security personal data possession control section 28 1 data controller also required take reasonable measures identify forestall reasonably foreseeable risks ensure safeguards put place effectively implemented updated continually section 28 2 data controller must also observe generally accepted industry specific best practices securing data section 28 3 well ensure data processors comply security measures section 30 data processor domiciled ghana data controller must ensure data processor complies relevant laws country section 30 4 act also requires data controller soon reasonably practicable notify data protection commission data subject security breaches system take steps ensure integrity system restored section 31 data subject subject proving data subject ’ identity request data controller confirm data controller holds data subject ’ personal data describe nature personal data held identity third party previously access data section 32 1 request must however made reasonable manner within reasonable time paying prescribed fees form generally understandable section 32 2 data subject also request data controller correct delete personal data data subject held data controller inaccurate irrelevant excessive date incomplete misleading section 33 1 upon receipt request data controller must either comply request provide data subject credible evidence support data section 33 2 section 96 special personal data means personal data consists information relates race colour ethnic tribal origin data subject b political opinion data subject c religious beliefs beliefs similar nature data subject physical medical mental health mental condition dna data subject e sexual orientation data subject f commission alleged commission offence individual g proceedings offence committed alleged committed individual disposal proceedings sentence court proceedings act prohibits processing data relates children parental control religious philosophical beliefs ethnic origin race trade union membership political opinions health sexual life criminal behaviour individual section 37 1 special personal data may however processed necessary data subject given consent processing section 37 2 processing personal data necessary exercise right fulfil obligation conferred imposed law employer section 37 3 special personal data relating data subjects may also processed necessary protection vital interest data subject impossible data subject give consent data controller reasonably expected obtain consent consent data subject unreasonably withheld section 37 4 processing special personal data presumed necessary required purpose legal proceedings legal advice medical purposes undertaken health professional subject duty confidentiality patient health professional section 37 6 prohibition processing special personal data relating religious philosophical beliefs apply processing carried religious organisation data subject member institution founded upon religious philosophical principles respect persons associated institution necessary achieve aims institution section 38 1 act data subject right personal data corrected section 33 access personal data section 35 prevent processing personal data causes likely cause unwarranted damage distress section 39 prevent processing personal data purposes direct marketing section 40 require data controller take decision would significantly affect solely processing automatic means section 41 exempt manual data section 42 compensated data controller ’ failure comply provisions act upon proof damages section 43 inaccurate data rectified section 44 act establishes data protection commission two main objects functions dpc section 3 dpc governed 11-member board appointed president ghana act provides certain specific institutional representation section 4 board members allowed hold office period exceeding three years appointed two terms section 5 1 allowances board members approved minister responsible communications consultation minister responsible finance section 9 board officially sworn 1 november 2012 currently chaired prof. justice samuel kofi date-bah retired justice supreme court ghana dpc officially launched 18 november 2014 act also mandates president appoint executive director section 11 shall responsible day-to-day administration dpc well implementation decisions board section 12 mrs. teki akuetteh falconer current executive-director act sources dpc funds include money approved parliament donations grants money accrues dpc performance functions money minister responsible finance approves section 14 dpc also granted power serve enforcement notices data controllers requiring refrain contravening data protection principles section 75 enforcement notice may cancelled varied either dpc motion upon application recipient notice section 76 act provides establishment data protection register maintained dpc data controllers must compulsorily register section 46 applications registration data controller made writing act provides certain particulars business name address applicant description personal data collected description purpose processing personal data section 47 1 knowingly supplying false information amounts offence punishable fine imprisonment section 47 2 also separate entry register must made separate purpose data controller wishes process data section 47 3 dpc right refuse grant application particulars provided inclusion entry register insufficient data controller able provide appropriate safeguards protection privacy data subject opinion dpc applicant merit grant registration section 47 1 upon refusing registration application dpc required inform applicant reasons refusal event applicant may apply high court judicial review decision section 47 2 registration data controller subject renewal every two years section 50 dpc also power cancel registration good cause section 52 offence process personal data without registering section 56 act also provides access public register upon payment prescribed fee section 54 act provides several exemptions different purposes follows processing personal data exempt provisions act relates national security section 60 relation crime taxation section 61 disclosure personal data relating health education social work section 61 prohibited unless required law provisions act also applicable protection members public specified loss malpractice provisions section 63 processing personal data prohibited unless processing undertaken purpose literary artistic material data controller reasonably believes publication would public interest compliance provision incompatible special purposes section 64 provisions non-disclosure apply disclosure required law court section 66 act apply data processed purpose managing individual ’ domestic affairs section 67 data protection principles apply personal data consists references given confidence purposes education appointment office provision service data subject section 68 subject information provisions act apply personal data likely prejudice combat effectiveness armed forces section 69 processed assess suitability person judicial appointment confer national honour section 70 consists information respect claim professional privilege confidentiality section 74 personal data exempt provisions act relates examinations marks processed data controller relation individual ’ results section 72 consists information recorded candidate academic purposes section 73 act prohibits purchase personal data knowing reckless disclosure personal data contravention provision amounts offence section 88 act also makes sale offering sell advertising sale personal data offence section 89 minister responsible communications may consultation dpc make regulations effective implementation act
[ 2818, 3880, 1930, 9260, 5133, 9901, 1169, 3858, 10002, 6455, 1368 ]
Test
3,600
2
Glass_OS:glass os glass os google xe version google android operating system designed google glass glass-omap tag used referring modified android code found inside kernel repository following list shows main changes happened update release detailed release notes visit support website initial release xe5 updates included xe6 updates include glass updates automatically air glass check google servers periodically updates update available glass download device install update happens condition active battery charging reliable wi-fi connection root access easily obtained using following script using rooted bootloader adb reboot bootloader enter fastboot mode takes 10-15 seconds fastboot devices verify device fastboot see serial fastboot oem unlock unlocking erases data prompted run command twice sure fastboot flash boot boot.img gain root shell access rooted bootloader fastboot reboot reboot device adb root start adb root adb shell access shell root extract desired factory system image package flash glass back factory specifications run following script boot system images found google glass developer website adb reboot bootloader enter fastboot mode fastboot devices verify device fastboot see serial fastboot flash boot boot.img flash partitions factory images fastboot flash system system.img fastboot flash recovery recovery.img fastboot erase cache optional erase cache userdata partitition fastboot erase userdata fastboot oem lock optional want re-lock bootloader kernel source code easily attainable google repository using following script mkdir path-for-kernel-source cd path-for-kernel-source git clone https //android.googlesource.com/kernel/omap.git build kernel source code first download gcc toolchain repository git clone https //android.googlesource.com/platform/prebuilt export path= path-for-kernel-source /prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/bin path build kernel using commands export arch=arm export subarch=arm export cross_compile=arm-eabi- cd path-for-kernel-source /omap git checkout glass-omap-xrr02 choose suitable release make notle_defconfig make
[ 8719, 7700, 9244, 11294, 1578, 10284, 5677, 1083, 6212, 69, 8262, 4683, 4685, 11343, 3664, 8280, 8285, 2658, 8821, 1670, 7816, 5262, 10393, 8858, 7835, 673, 8870, 1191, 1203, 7359, 196, 3269, 3782, 8907, 3795, 1240, 8413, 9949, 6367, 1255...
None
3,601
9
Qualification_principle:qualification principle programming language theory qualification principle states semantically meaningful syntactic class may admit local definitions words possible include block syntactic class provided phrases class specify kind computation common examples principle includes
[ 5585, 7386, 2045, 8262 ]
None
3,602
4
PP_Jailbreak:pp jailbreak pp jailbreak also commonly known pp pp25 app pp25 jailbreak term describing free chinese app containing tools capable jailbreaking ios 8 devices except apple tv eligible products include ipod touch iphone ipad app developed chinese ios hacking community known pp assistant first released january 19 2015 tools pp jailbreak application help users bypass device restrictions order obtain root access operating system users able install applications customizations typically available app store ios pp jailbreak available chinese notable application able jailbreak ios 8.4 mac ios 8.4 windows pp jailbreak gives users access software unavailable ios app store using cydia ios application digital distribution platform although pp jailbreak initially incompatible cydia includes recommended resources cydia software tools openssh ios user removes pp jailbreak device update device latest ios version due firmware updates apple furthermore device loaded latest ios version go back previous ios version initial release pp jailbreak tool included support ios 9.3 team suspected imminent firmware update apple would fix vulnerabilities used tool pp assistant also known m949mm term ios community developed jailbreaking tools pp jailbreak said fake taig ios jailbreak 25pp pc pp helper freeware software created manage android ios devices including ios 12 using app easily install games create backups view files device automatically clean temp files created software etc also option install apps without using appstore user interface pp helper app chinese language difficult user interface quite easy navigate
[ 1346, 9732, 6023, 9063, 10631, 6539, 7983, 700, 4957 ]
None
3,603
2
W^X:w^x w^x write xor execute spoken w xor x security feature operating systems virtual machines memory protection policy whereby every page process kernel address space may either writable executable without protection program write data cpu instructions area memory intended data arrange run executable instructions dangerous writer memory malicious w^x relatively simple processors support fine-grained page permissions sun sparc sparc64 amd amd64 hewlett-packard pa-risc hp originally digital equipment corporation alpha arm early intel 64 processors lacked nx bit required w^x appeared later chips processors limited features intel i386 w^x requires using cs code segment limit line sand point address space execution permitted data located allowed executable pages placed linker changes generally required separate code trampolines code needed linker library runtime functions data w^x first implemented openbsd 3.3 released may 2003 2004 microsoft introduced similar feature called dep data execution prevention windows xp similar features available operating systems including pax exec shield patches linux netbsd implementation pax although w^x dep protected userland programs existence 2012 microsoft extended windows kernel x86 arm architectures late 2014 early 2015 w^x added openbsd kernel amd64 architecture early 2016 w^x fully implemented netbsd amd64 kernel partially i386 kernel since 2016 firefox 46 virtual machine javascript also implements w^x policy
[ 8066, 3462, 5384, 6664, 6797, 8725, 7702, 1820, 8609, 6829, 7983, 5040, 823, 9665, 1474, 3142, 4423, 1103, 5840, 4562, 3413, 5078, 5598, 10851, 4071, 8551, 5356, 9964, 1776, 8944, 5363, 2804, 1399, 7039 ]
Test
3,604
4
OWASP_ZAP:owasp zap owasp zap short zed attack proxy open-source web application security scanner intended used new application security well professional penetration testers one active open web application security project owasp projects given flagship status used proxy server allows user manipulate traffic passes including traffic using https also run daemon mode controlled via rest api zap added thoughtworks technology radar may 2015 trial ring built features include intercepting proxy server traditional ajax web crawlers automated scanner passive scanner forced browsing fuzzer websocket support scripting languages plug-n-hack support plugin-based architecture online ‘ marketplace ’ allows new updated features added gui control panel easy use
[ 7526, 8585, 1802, 9834, 10412, 461, 3310, 5677, 7983, 113, 9293, 9780, 4725, 10492, 823, 3290, 7228, 2558 ]
None
3,605
2
Surface_2:surface 2 surface 2 surface-series windows rt hybrid tablet computer created microsoft unveiled september 23 2013 released october 22 2013 successor original surface january 2015 microsoft longer manufactures surface 2 provide security updates device 2023 pre-orders surface 2 opened september 24 2013 device released october 22 2013 value-added services surface 2 includes 200 gb additional onedrive storage 2 years 1 year free skype calls landlines access skype wifi hotspots january 2015 stock sold microsoft store online microsoft confirmed discontinued production surface 2 surface 2 nokia lumia 2520 remaining windows rt device market discontinued well week later made magnesium alloy toughened glass outer shell surface 2 maintains similar design predecessor bare metal silver color scheme black bezel surface 2 also slightly thinner lighter previous model surface 2 uses 1.7 ghz quad-core nvidia tegra 4 chipset 2 gb ram microsoft claimed new chipset improvements internal hardware made surface 2 three four times faster original surface 10 hours battery life playing videos unlike original surface used 1366 x 768 display surface 2 uses 1080p display surface pro 2 display claimed almost 50 better color previous version well lowest reflectivity among competing tablets device also includes full-size usb 3.0 port 32 64 gb internal storage microsd slot surface 2 ships windows rt 8.1 4g lte model surface 2 launched march 18 2014 comes 64 gb model microsoft cellular partner surface 2 4g lte comes access app pre-installed device actually ships unlocked 4g models also come gps assisted gps glonass surface 2 includes microsoft calls silver-magnesium color scratch resistant compared original surface surface 2 ships windows rt 8.1 office 2013 rt unlike original surface launched office 2013 rt beta later received final release version bundled apps include mail calendar people contacts bing apps including food drink health fitness weather travel stocks sports apps later renamed msn apps like predecessor desktop apps already bundled os forbidden run surface 2 device unlike successor surface 3 classified 2-in-1 pc notable change surface surface 2 hiding desktop tile start screen updated versions surface cover accessories available surface 2 touch cover 2 type cover 2 slightly thinner previous versions include dynamic backlight system touch cover 2 1,092 sensors compared 80 original touch cover keyswitch length type cover 2 reduced 2.5 mm 1.5 mm new power cover accessory also available add 30 wh additional battery capacity device accompanying touch cover 2 type cover 2 wireless adapter allows connected 30 feet away via bluetooth updated kickstand tilted 55-degree angle alongside original 22-degree angle unveiling microsoft also showcased music cover variation touch cover serves dj mixer playback controls 16-button sampler three sliders mainstream public release announced distributed musicians surface remix project campaign initial reviews surface 2 mixed reviewers generally positive device hardware improvements compared original surface however surface 2 often criticized lack support traditional windows desktop programs low number high quality apps available windows store financial report microsoft second quarter 2014 revenue doubled 400 million first quarter 893 million however microsoft still lost 39 million since development costs equaled around 932 million skeptics acknowledged growth despite still losing money surface brand surface 2 reported overheating issues microsoft delivered update try fix issue
[ 4356, 11524, 5384, 6797, 782, 1935, 10900, 9498, 11549, 7970, 1832, 6827, 7983, 3890, 8757, 10303, 4289, 9033, 2635, 10957, 4816, 4051, 11221, 11605, 11103, 10338, 3304, 617, 8681, 9964, 1776, 1400 ]
Test
3,606
3
Palm_m500_series:palm m500 series palm m500 series handheld personal digital assistants consisted three devices palm m500 palm m505 palm m515 series follow-up popular palm v series similar though slightly shorter footprint form factor like palm v series metal cases although m500 plastic back plate 160x160 resolution screen distinguishing features common series sd/mmc expansion slot faster processor new faster usb sync interface new software functionality new vibrating alarms new indicator light mechanical fastener vs. hot-glue case construction later models introduced improved version color display memory palm m500 series palm pilot pdas released march 6 2001 based poll conducted palm computing formerly division 3com determined palm v definitive look ideal pda palm m500 models based palm v form factor slim case slight curvature left right edges power button lit green docking cradle important message available input included four programmable buttons two scrolling buttons touch-sensitive 2-1/4 x 3 screen including 2-1/4 x 3/4 input area palm devices data input stylus pen using graffiti method m500 series models featured secure digital sd multi media card mmc expansion slot sd/mmc slot allowed additional memory upgrades devices well expandable platform add-on devices m500 series also first palm devices incorporate new universal connector universal palm t3 abandoned allowed additional add-on devices common hotsync cradles m500 entry-level model m500 series 8 mb on-board memory featured monochrome screen features common m500 series devices released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb display 160x160 pixel b w display 4-bit 16 shades gray size 4.49 x 3.02 x .46 11.41 x 7.67 x 1.17 cm weight 4.162 oz 118 g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120 v 60 hz 10 w output 5.0 vdc 1.0 irda port expansion slot compatible sd mmc cards m505 time series rollout top-of-the-line model palm devices also 8 mb on-board memory addition standard m500 series features also featured 16-bit color frontlit screen released march 6 2001 part original rollout series operating system palm os version 4.0 upgrade 4.1 processor 33 mhz motorola dragonball vz memory 8 mb 4mb flash 8mb ram display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 136g battery internal lithium polymer rechargeable 2hr recharge time empty ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards march 4 2002 palm released m515 based consumer reviews surveys conducted company m515 developed improved version replacement m505 notable enhancements include 16 mb on-board memory enhanced backlighting system much criticism m505 even backlight dim difficult read environments m515 added additional setting allowing backlight put high considerably brighter predecessor operating system palm os version 4.1 processor 33 mhz motorola dragonball vz memory 16 mb ram 4 mb flash display 160x160 pixel color display 65,000+ colors size 4.48 x 3.03 x 0.50 11.38 x 7.70 x 1.27 cm weight 4.8 oz 139g battery internal lithium polymer rechargeable ac adapter input 120vac 60 hz 11w output 5.0vdc 1.0a irda port expansion slot compatible sd mmc cards
[ 2308, 10500, 6790, 3606, 8982, 6178, 5164, 9013, 694, 5318, 3017, 11337, 9037, 2258, 1621, 4832, 4449, 2285, 2420, 8952, 9598 ]
Test
3,607
3
Advanced_Dungeons_&_Dragons:_Heroes_of_the_Lance:advanced dungeons amp dragons heroes lance advanced dungeons dragons heroes lance video game released january 1988 various home computer systems consoles game based first dragonlance campaign module dungeons dragons fantasy role-playing game dragons despair first dragonlance novel dragons autumn twilight heroes lance focuses journey eight heroes ruined city xak tsaroth must face ancient dragon khisanth retrieve relic disks mishakal heroes lance side-scrolling action game game uses actual dungeons dragons statistics statistics characters exactly rule books eight heroes dragonlance novels series must assembled quest one visible screen time one on-screen hero dies next line appears heroes lance faithful representation books based departure usual role-playing video game style dungeons dragons games gameplay interface consists using one character time horizontally scrolling fighting character different types attacks spells making suited fighting different enemies merely act lives player traditional fighting games removing one main strategies role-playing games game eight heroes make party heroes lance based dragonlance novels margaret weis tracy hickman heroes lance part gold box series nickname titles silver box games nes version developed natsume heroes lance successful ssi 88,808 copies sold computers north america reviewing pre-production copy dos version heroes lance magazine g.m praised graphics excellent audio said would undoubtedly go straight top computer games charts stay several months good computer gaming world gave dos version game similarly positive review electronic gaming monthly columnist seanbaby listed nes version 2nd worst nes game 11th worst video game levi buchanan classic dungeons dragons videogame retrospective ign wrote n't plan well lose lot heroes short period time offered slight strategy angle fans largely preferred pool radiance straight rpg approach pool radiance sales triple heroes lance according gamespy game actually fairly decent side-scroller time frustrating level difficulty along fact could n't save game meant gamers gave game miss storyline game continued two subsequent video games dragons flame shadow sorcerer
[ 356, 9166 ]
Test
3,608
0
Data-oriented_parsing:data-oriented parsing data-oriented parsing dop also data-oriented processing probabilistic model computational linguistics dop conceived remko scha 1990 aim developing performance-oriented grammar framework unlike probabilistic models dop takes account subtrees contained treebank rather restricted example 2-level subtrees like pcfgs several variants dop developed initial version developed rens bod based tree-substitution grammar recently dop combined lexical-functional grammar lfg resulting dop-lfg finds application machine translation work learning parameter estimation dop also found way machine translation
[ 10610, 1490, 7164, 1890 ]
Validation
3,609
4
ACARM-ng:acarm-ng acarm-ng alert correlation assessment reaction module next generation open source ids/ips system acarm-ng alert correlation software significantly facilitate analyses traffic computer networks responsible collection correlation alerts sent network host sensors also referred nids hids respectively correlation process aims reduce total number messages need viewed system administrator possible merging similar events groups representing logical pieces malicious activity initial version acarm developed frame positif european research project 2004 2007 written java practical proof concept presented article despite poor scalability efficiency issues software proved highly useful end 2009 became obvious current design serious shortcomings poor performance first place result project discontinued later year new project nicknamed acarm-ng launched aiming replace original acarm acarm-ng bring alert correlation new dimension thank scalability plug-in-based architecture actively developed since 2009 wroclaw centre networking supercomputing part pl-grid project acarm-ng main features include acarm-ng consists 3 main elements correlation daemon wui optional database engine acarm-ng daemon designed scratch framework solution provides core system functionalities like logging alerts correlated meta-alerts passing system parts error recovery multi-threading etc.. rest package plug-ins separated following classes built-in software watchdog provides up-to-date information system status wui makes browsing correlated data easy via graphical tabular representation gathered correlated events system administrator easily see going every moment system lifetime wui daemon interoperate database daemon stores gathered data along correlation results runtime configuration wui entitled read display data notice even though data base engine required running daemon strongly recommended save data persistently rejecting use database makes impossible obtain system information via wui leads loss historical data system restarted events longer processed daemon discarded well often required limit amount incoming data example remove alerts raised periodically cron scripts order allow users adapt system input needs special preprocessor component provided allows define chain accept-if-match reject-if-match rules accept reject incoming alerts enter correlation engine acarm-ng daemon allows addition removal new plug-ins without need recompile core package makes system development testing much easier plug-in used configured main configuration file first persistency provides abstraction storage level generic interface used implement data-saving back-end long transaction mechanism provided recent stable release acarm-ng provides following persistency implementations input provides abstraction data gathering mechanism requirement implementation output alerts acarm-ng-compatible form recent stable release acarm-ng provides following input implementations filter provides abstraction correlation data update mechanism restrictions filter meta-alert though common use correlate similar alerts specially tuned api provided special case recent stable release acarm-ng provides following filter implementations trigger provides abstraction reporting reaction mechanism triggers design allowed change content data initiate response alerts typical use real-time reporting suspicious events administrators example via e-mail automatic reaction detected thread example blocking malicious host firewall recent stable release acarm-ng provides following trigger implementations trigger set independently react specific threshold correlated alerts count rule defined way daemon main preprocessor approach gives fully configurable solution allowing define arbitrary complex rules minimize false-positives especially system configured perform autonomous reaction suspicious events
[ 5472, 3778, 2887, 8554, 5677, 7983, 8349, 823, 5658, 8539, 5245, 3486, 479 ]
Validation
3,610
5
Microsoft_Messenger_service:microsoft messenger service messenger formerly msn messenger service .net messenger service windows live messenger service instant messaging presence system developed microsoft 1999 use msn messenger software used instant messaging clients including windows 8 windows live messenger microsoft messenger mac outlook.com xbox live third-party clients also connected service communicated using microsoft notification protocol proprietary instant messaging protocol service allowed anyone microsoft account sign communicate real time people signed well april 2013 microsoft merged service skype network existing users able sign skype existing accounts access contact list part merger skype instant messaging functionality running backbone former messenger service despite multiple name changes service client software years messenger service often referred colloquially msn due history msn messenger service known msn messenger service 1999 2001 time microsoft changed name .net messenger service began offering clients longer carried msn name windows messenger client included windows xp originally intended streamlined version msn messenger free advertisements integrated windows nevertheless company continued offer upgrades msn messenger end 2005 previous versions msn messenger windows messenger superseded new program windows live messenger part microsoft launch windows live online services several years official name service remained .net messenger service indicated official network status web page though microsoft rarely used name promote service main client used access service became known windows live messenger microsoft started referring entire service windows live messenger service support documentation mid-2000s service integrate windows operating system automatically simultaneously signing network user logs windows account organizations also integrate microsoft office communications server active directory service december 2011 microsoft released xmpp interface messenger service part larger effort rebrand many windows live services microsoft began referring service simply messenger 2012 microsoft offered following instant messaging clients connected messenger service additionally third-party clients others able access messenger service microsoft messenger criticized use microsoft notification protocol provide encryption makes wiretapping personal conversations messenger possible someone intercepts communication easy unencrypted public wi-fi networks
[ 10242, 5251, 9732, 5382, 4746, 6539, 1036, 6797, 11408, 3228, 10271, 2208, 929, 3105, 9511, 1962, 3629, 7983, 9519, 8758, 1467, 10748, 6208, 1218, 1346, 2760, 2892, 6993, 4318, 4704, 3812, 4068, 6628, 7928, 1148, 7551 ]
Test
3,611
6
WBFS:wbfs wbfs wii backup file system file system developed wii homebrew coder waninkoko uses waninkoko cios works creating wbfs partition sd usb device wii homebrew application may run dump wii game partition titles may launched using wii usb loader uses cios usb 2.0 load games external device although way natively load wbfs partition pc environment run wii emulator dolphin also several applications wbfs managers mac os x linux windows allow transfer iso image files wbfs formatted drive main advantage reduction file size wbfs format allows wii discs filled padding data must present iso wbfs file system strip away
[ 5120, 6669, 3598, 10257, 6677, 5142, 8214, 9762, 5158, 11323, 8772, 4708, 9836, 7789, 9333, 6263, 9335, 9343, 7818, 654, 2193, 2194, 2197, 2199, 11419, 6309, 1190, 5286, 10405, 7344, 2230, 5816, 1212, 8380, 10951, 9420, 3795, 4819, 8404, ...
None
3,612
1
Biometric_Database_Law:biometric database law biometric database law israeli law knesset passed december 2009 determining fingerprints facial contours would collected israeli residents collected data would integrated onto israeli digital identity cards digital passports biometric government database israeli citizens residents would created would used biometric identification would allow management access control identification individuals assist locating individuals suspected criminal activity law enforcement officials law passed december 2009 determined law gradually applied first phase inclusion one biometric data central database would voluntary laws targets presented first section law addresses serious issues identifying fake id cards passports producing double records person identity theft caused using documentation person identity stolen examples allow misuse identification documents illegal immigration criminal economic offenses activities harm israel national security nowadays identification documents easily forged criminals often try get assistance state workers 2005 2007 interior ministry reported loss theft destruction 150,000 id cards per year submitted requests handed new identity cards many cases question loss theft destruction id cards occurred several times resident three years data israeli police indicates 52 percent individuals submitted requests new identity cards lost stolen and/or destroyed years 1995 2006 criminal record 10 percent criminal record distribution counterfeit documents employees interior ministry would authorized collect biometric identification data israeli population transfer data database would managed biometric database management authority הרשות לניהול המאגר הביומטרי data would used issue resident identification documents verification individual identity means rechecking individual biometric identification data authorized officials police officer employee shin bet employee mossad etc. biometric database would stored separately government older existing identity database although selected government officials would capable linking two databases retrieve additional data opponents law including prominent israeli scientists security experts warned existence database could damage civil liberties state security leaks could used criminals hostile individuals israeli residents
[ 2737, 5373, 10685, 10207 ]
None
3,613
9
Compiled_language:compiled language compiled language programming language whose implementations typically compilers translators generate machine code source code interpreters step-by-step executors source code pre-runtime translation takes place term somewhat vague principle language implemented compiler interpreter combination solutions also common compiler translate source code intermediate form often called p-code bytecode passed interpreter executes programs compiled native code compile time tend faster translated run time due overhead translation process newer technologies just-in-time compilation general improvements translation process starting narrow gap though mixed solutions using bytecode tend toward intermediate efficiency low-level programming languages typically compiled especially efficiency main concern rather cross-platform support languages one-to-one correspondences programmed code hardware operations performed machine code making easier programmers control use central processing unit cpu memory fine detail effort always possible write compilers even traditionally interpreted languages example common lisp compiled java bytecode interpreted java virtual machine c code compiled native machine code directly native code programming languages support multiple compiling targets give control developers choose either execution speed cross-platform compatibility languages commonly considered compiled
[ 512, 9345, 2691, 6403, 9224, 2062, 8082, 5395, 5651, 5527, 5783, 9626, 1435, 6558, 1952, 8609, 4770, 3876, 934, 428, 5165, 5677, 5679, 5680, 7341, 9780, 8502, 1591, 11064, 2618, 4410, 6718, 191, 3904, 10819, 8644, 8262, 9926, 1610, 1611, ...
None
3,614
4
SolarWinds:solarwinds solarwinds inc. american company develops software businesses help manage networks systems information technology infrastructure solarwinds headquartered austin texas sales product development offices number locations united states several countries around world company publicly traded may 2009 end 2015 october 2018 also acquired number companies still operates original brand names including pingdom papertrail loggly solarwinds officially founded 1999 tulsa oklahoma 2009 maintained profitability since founding company co-founded donald yonce former executive walmart brother david yonce solarwinds released first products trace route ping sweep earlier march 1998 released first web-based network performance monitoring application november 2001 according michael bennett became chief executive officer 2006 solarwinds name chosen early employee company nothing solar wind power 2006 company moved headquarters austin texas 300 company total 450 employees based 2011 2007 solarwinds raised funding austin ventures bain capital insight venture partners solarwinds completed initial public offering 112.5 million may 2009 closing higher prices initial day trading ipo solarwinds followed another opentable online restaurant-reservation service perceived break dry spell caused great recession companies went public bain capital insight venture partners backed ipo used opportunity sell shares offering analysts company executives forecasted continued expansion post-ipo including several acquisitions 2010 bennett retired position ceo replaced company former chief financial officer kevin thompson may 2013 solarwinds announced plans invest operations hub salt lake city utah named forbes best small company america citing high-functioning products low costs impressive company growth 2013 solarwinds employing 900 people october 2015 company disclosed talks then-unnamed party interested acquiring company making solarwinds privately held company acquisition private equity technology investment firms silver lake partners thoma bravo llc announced late 2015 january 2016 solarwinds taken private ownership 4.5 billion deal sale company employed 1,770 people worldwide 510 based austin reported revenues half billion dollars year november 2017 solarwinds released appoptics integrates much solarwind acquired software portfolio including librato traceview single software-as-a-service package appoptics included compatibility amazon web services microsoft azure september 2018 solarwinds filed ipo three years owned private equity firms solarwinds completed ipo october 19 2018 solarwinds reportedly updated network performance monitor product december 2018 enhancements cisco application centric infrastructure aci according wall street journal solarwinds offers freely downloadable software potential clients markets advanced software offering trial versions following funding 2007 solarwinds acquired several companies including neon software ipmonitor corp. opened european sales office ireland ipo 2009 solarwinds acquired number companies products including acquisition new zealand-based software maker kiwi enterprises announced january 2009 solarwinds acquired several companies 2011 ranked 10 forbes magazine list fastest-growing tech companies january 2011 acquired hyper9 inc austin-based virtualization management company undisclosed terms july solarwinds completed acquisition idaho-based network security company trigeo 35 million trigeo offices post falls added list solarwinds location already included satellite offices dallas salt lake city tulsa well operations australia czech republic india ireland singapore early 2012 month acquiring dameware solarwinds acquired patch management software provider eminentware december solarwinds acquired rhinosoft adding company product ftp voyager solarwinds suite tools services may 2013 solarwinds acquired n-able technologies 2013 cloud-based information technology services provider deal reportedly valued 120 million cash october acquired boulder colorado-based database performance management company confio software 103 million agreement solarwinds gained sales office london confio main product ignite 2014 2015 company acquired swedish web-monitoring company pingdom san francisco-based metrics monitoring company librato 40 million log management service papertrail 41 million 2015 solarwinds announced acquisition librato monitoring company capzure technology msp manager software n-able solarwinds previously acquired june 2016 solarwinds acquired logicnow rival remote monitoring software company new subsidiary solarwinds msp formed merging logicnow n-able technologies company announced subsidiary led logicnow former ceo walter scott new title executive vice president 2017 2019 solarwinds acquired spamexperts email security company loggly log management analytics company trusted metrics provider threat monitoring management software samanage service desk asset management provider
[ 939, 2765, 1935, 7248, 6834, 467, 1111 ]
Test
3,615
2
Page_fault:page fault page fault sometimes called pf pf hard fault type exception raised computer hardware running program accesses memory page currently mapped memory management unit mmu virtual address space process logically page may accessible process requires mapping added process page tables may additionally require actual page contents loaded backing store disk processor mmu detects page fault exception handling software handles page faults generally part operating system kernel handling page fault operating system generally tries make required page accessible location physical memory terminates program case illegal memory access contrary fault might suggest valid page faults errors common necessary increase amount memory available programs operating system utilizes virtual memory including openvms microsoft windows unix-like systems including macos linux *bsd solaris aix hp-ux z/os page loaded memory time fault generated marked memory management unit loaded memory called minor soft page fault page fault handler operating system merely needs make entry page memory management unit point page memory indicate page loaded memory need read page memory could happen memory shared different programs page already brought memory programs page could also removed working set process yet written disk erased operating systems use secondary page caching example hp openvms may remove page need written disk remained unchanged since last read disk example place free page list working set deemed large however page contents overwritten page assigned elsewhere meaning still available referenced original process allocated since faults involve disk latency faster less expensive major page faults mechanism used operating system increase amount program memory available demand operating system delays loading parts program disk program attempts use page fault generated page loaded memory time fault called major hard page fault page fault handler os needs find free location either free page memory non-free page memory latter might used another process case os needs write data page written since last modified mark page loaded memory process page table space made available os read data new page memory add entry location memory management unit indicate page loaded thus major faults expensive minor faults add storage access latency interrupted program execution page fault occurs reference address part virtual address space meaning page memory corresponding called invalid page fault page fault handler operating system generally pass segmentation fault offending process indicating access invalid usually results abnormal termination code made invalid reference null pointer usually represented pointer address 0 address space many operating systems set memory management unit indicate page contains address memory include page virtual address space attempts read write memory referenced null pointer get invalid page fault illegal accesses invalid page faults invalid conditions result segmentation fault bus error resulting programming termination crash core dump depending operating system environment often problems caused software bugs hardware memory errors caused overclocking may corrupt pointers make correct software fail also crash operating system operating systems windows unix unix-like systems provide differing mechanisms reporting errors caused page faults windows uses structured exception handling report page fault-based invalid accesses access violation exceptions unix unix-like systems typically use signals sigsegv report error conditions programs program receiving error handle operating system performs default action typically involving termination running process caused error condition notifying user program malfunctioned recent versions windows often report problems simply stating something like program must close experienced user programmer access debugger still retrieve detailed information recent windows versions also write minidump similar principle core dump describing state crashed process unix unix-like operating systems report conditions user error messages segmentation violation bus error may also produce core dump page faults nature degrade performance program operating system degenerate case cause thrashing optimization programs operating system reduce number page faults improve performance program even entire system two primary focuses optimization effort reducing overall memory usage improving memory locality reduce page faults system programmers must make use appropriate page replacement algorithm suits current requirements maximizes page hits many proposed implementing heuristic algorithms reduce incidence page faults generally making physical memory available also reduces page faults major page faults conventional computers use hard disk drives storage significant impact performance average hard disk drive average rotational latency 3 ms seek time 5 ms transfer time 0.05 ms/page therefore total time paging near 8 ms 8,000 μs memory access time 0.2 μs page fault would make operation 40,000 times slower
[ 3725, 6797, 2066, 11539, 789, 5397, 1304, 6296, 7071, 10148, 6821, 2473, 6063, 7471, 7728, 7983, 823, 7351, 2745, 1593, 6078, 9151, 9919, 3010, 4423, 1736, 6087, 2250, 6221, 5840, 8273, 2514, 9300, 3157, 86, 10333, 5598, 8551, 7273, 4334,...
None
3,616
4
Computer_security_model:computer security model computer security model scheme specifying enforcing security policies security model may founded upon formal model access rights model computation model distributed computing particular theoretical grounding computer security model implemented computer security policy complete list available articles specific security models see
[ 1792, 10170, 4067, 5060, 4583, 5543, 4299, 3440, 4912, 210, 6162, 1364, 10580, 8150, 10968, 3417, 9690, 2558 ]
Test
3,617
0
Semantic_role_labeling:semantic role labeling natural language processing semantic role labeling also called shallow semantic parsing process assigns labels words phrases sentence indicate semantic role sentence agent goal result consists detection semantic arguments associated predicate verb sentence classification specific roles example given sentence like mary sold book john task would recognize verb sell representing predicate mary representing seller agent book representing goods theme john representing recipient important step towards making sense meaning sentence semantic analysis sort lower-level abstraction syntax tree i.e categories thus groups fewer clauses category instance book belongs would need two labels possessed possessor whereas book sold john would need two labels goal theme receiver recipient even though two clauses would similar far subject object functions concerned framenet project produced first major computational lexicon systematically described many predicates corresponding roles daniel gildea university california berkeley international computer science institute daniel jurafsky currently teaching stanford university previously working university colorado uc berkeley developed first automatic semantic role labeling system based framenet propbank corpus added manually created semantic role annotations penn treebank corpus wall street journal texts many automatic semantic role labeling systems used propbank training dataset learn annotate new sentences automatically
[ 5667, 7780, 9796, 5639, 1737, 2059, 11467, 5781, 3127, 538 ]
Test
3,618
2
GNU/Linux_naming_controversy:gnu/linux naming controversy gnu/linux naming controversy dispute members free software community open-source software community whether refer computer operating systems use combination gnu software linux kernel gnu/linux linux proponents term linux argue far commonly used public media serves generic term systems combine kernel software multiple sources proponents term gnu/linux note gnu alone would good name gnu variants combine gnu operating system software software sources gnu/linux term promoted free software foundation fsf founder richard stallman proponents call correction extended term grounds n't give credit major contributor associated free software philosophy gnu longstanding project begun 1984 develop free operating system argued linux kernel independently created 1991 merely provided substantial missing piece several distributions employ fsf-endorsed name debian trisquel parabola gnu/linux-libre 1983 richard stallman founder free software foundation set forth plans complete unix-like operating system called gnu composed entirely free software september year stallman published manifesto dr. dobb journal detailing new project publicly outlining vision free software software development work began january 1984 1991 gnu mid-level portions operating system almost complete upper level could supplied x window system lower level kernel device drivers system-level utilities daemons still mostly lacking gnu kernel called gnu hurd hurd followed ambitious design proved unexpectedly difficult implement marginally usable independently 1991 linus torvalds released first version linux kernel early linux developers ported gnu code including gnu c compiler run linux free software community adopted use linux kernel missing kernel gnu operating system work filled remaining gaps providing completely free operating system next years several suggestions arose naming operating systems using linux kernel gnu components 1992 yggdrasil linux distribution adopted name linux/gnu/x usenet mailing-list discussions one find usages gnu/linux early 1992 gnu+linux early 1993 debian project one time sponsored free software foundation switched calling product debian gnu/linux early 1994 change followed request richard stallman initially proposed lignux suggested gnu/linux instead hearing complaints awkwardness former term gnu june 1994 bulletin describes linux free unix system 386 machines many utilities libraries gnu january 1995 bulletin switched term gnu/linux instead stallman fsf efforts include gnu name started around 1994 reportedly mostly via private communications above-mentioned request debian 1996 may 1996 stallman released emacs 19.31 autoconf system target linux changed lignux shortly thereafter changed linux-gnu emacs 19.32 included essay linux gnu system suggesting people use terms linux-based gnu system gnu/linux system lignux short later used gnu/linux exclusively essay superseded stallman 1997 essay linux gnu project modern free software open-source software systems composed software many different authors including linux kernel developers gnu project vendors behind x window system desktop- server-based distributions use gnu components gnu c library glibc gnu core utilities coreutils bash 2002 analysis source code red hat linux 7.1 typical linux distribution total size packages gnu project found much larger linux kernel later 2011 analysis ubuntu natty release popular linux distribution main repository found 8 13 consisted gnu components range depending whether gnome considered part gnu 6 taken linux kernel 9 including direct dependencies determining exactly constitutes operating system per se matter continuing debate hand embedded systems handheld devices smartphones like google android residential gateways routers voice ip devices engineered space efficiency mind use linux kernel components gnu system running μclinux likely substitute uclibc glibc busybox coreutils google linux-based android operating system use gnu components libraries replacing glibc google bsd-based bionic c library fsf agrees gnu/linux appropriate name systems also systems use gnu userspace and/or c library top non-linux kernel example debian gnu/hurd gnu userland gnu kernel debian gnu/kfreebsd uses gnu coreutils c library kernel freebsd fsf justifies name gnu/linux primarily grounds gnu project specifically developing complete system argue linux kernel filled one final gaps large number gnu components gnu source code used systems secondary argument addition fsf also argues gnu/linux recognizes role idealism played building community helps public recognize practical importance ideals contrast focus technical advantage rather freedom linux kernel developers case linux kernel notable recurring examples focus technical advantage freedom come long-time inclusion linux kernel many non-free firmware files files non-free license terms ordinary understanding operating system includes kernel—the specific subsystem directly interfaces hardware—and userland software employed user application software control computer moreover name gnu name linux intentionally related name unix unix always conceptually included c library userland tools well kernel 1991 release notes versions 0.01 0.11 linux kernel released gnu general public license version 0.12 torvalds wrote torvalds also wrote 1992 tanenbaum-torvalds debate tanenbaum criticized torvalds developing linux monolithic kernel considered obsolete inferior microkernels mach believed linux would rejected favor gnu hurd microkernel stalled development years use word linux refer kernel operating system entire distributions often leads confusion distinctions among three many gnu packages key part almost every linux distribution particularly gnu toolchain present distros unless android included media sources sometimes make erroneous statements well claiming entire operating system rather simply kernel written torvalds confusion legal threats public relations campaigns apparently directed kernel launched sco group alexis de tocqueville institution adti misinterpreted many commentators assume whole operating system targeted sco adti even accused deliberately exploiting confusion regarding suggestions renaming efforts stem egotism personal pique stallman responded interest giving credit gnu project people think want ego fed course 'm asking call 'stallmanix stallman admitted irritation although believes justified response seeing idealistic project stymied made ineffective people n't usually give credit done concluding 're idealist like ruin whole decade response another common argument see fsf acknowledges many people contributed system short name credit argues justify calling system linux continuing speak subject 2010 stallman stated naming simply matter giving equal mention gnu project system widely referred linux people tend think linux started mr. torvalds 1991 think comes vision life really bad problem linux far widespread name eric s. raymond writes linux entry jargon file linus torvalds asked documentary revolution os whether name gnu/linux justified replied earlier comment torvalds naming controversy name gnu/linux particularly using stallman preferred pronunciation see criticized perceived clumsiness verbosity factor torvalds cited downfall operating systems 386bsd linux journal speculated stallman advocacy combined name stems frustration linus got glory stallman wanted others suggested regardless merits stallman persistence sometimes seems lost cause makes gnu look bad example larry mcvoy author bitkeeper used manage linux kernel development opined claiming credit makes one look foolish greedy many users vendors prefer name linux jim gettys one original developers x window system point inclusion non-gnu non-kernel tools kde libreoffice firefox end-user operating systems based linux kernel although gnu/linux often pronounced without slash stallman recommends explicitly saying word slash plus i.e gnu+linux order avoid mistaken suggestion linux kernel gnu package case gnu linux-libre
[ 2560, 2050, 516, 1028, 5644, 5139, 2581, 9237, 10780, 4637, 11297, 9257, 1584, 9266, 1083, 4673, 8258, 10817, 8772, 10822, 5703, 8268, 2134, 1112, 3162, 3674, 2658, 6244, 9320, 6763, 10860, 8304, 633, 11388, 5759, 11391, 2179, 2180, 7812, ...
Validation
3,619
4
Responsible_disclosure:responsible disclosure computer security elsewhere responsible disclosure vulnerability disclosure model vulnerability issue disclosed period time allows vulnerability issue patched mended period distinguishes model full disclosure developers hardware software often require time resources repair mistakes hackers computer security scientists opinion social responsibility make public aware vulnerabilities high impact hiding problems could cause feeling false security avoid involved parties join forces agree period time repairing vulnerability preventing future damage depending potential impact vulnerability expected time needed emergency fix workaround developed applied factors period may vary days several months easier patch software using internet distribution channel responsible disclosure fails satisfy security researchers expect financially compensated reporting vulnerabilities vendor expectation compensation might viewed extortion market vulnerabilities developed vulnerability commercialization remains hotly debated topic tied concept vulnerability disclosure today two primary players commercial vulnerability market idefense started vulnerability contributor program vcp 2003 tippingpoint zero-day initiative zdi started 2005 organisations follow responsible disclosure process material bought march 2003 december 2007 average 7.5 vulnerabilities affecting microsoft apple processed either vcp zdi independent firms financially supporting responsible disclosure paying bug bounties include facebook google mozilla barracuda networks vendor-sec responsible disclosure mailing list many cert groups coordinate responsible disclosures google project zero 90-day disclosure deadline starts notifying vendors vulnerability details shared public defensive community 90 days sooner vendor releases fix zdi 120-day disclosure deadline starts receiving response vendor selected security vulnerabilities resolved applying responsible disclosure
[ 9217, 5636, 1547, 11, 11539, 8212, 4117, 9375, 4644, 1861, 711, 4423, 8135, 6474, 10190, 7887, 2262, 5590, 2779, 4956, 8815, 5491, 2558 ]
Test
3,620
4
Mebroot:mebroot mebroot master boot record based rootkit used botnets including torpig sophisticated trojan horse uses stealth strategies hide user trojan opens back door victim computer allows attacker complete control computer trojan infects mbr allow start even operating system starts allows bypass safeguards embed deep within operating system known trojan intercept read/write operations embed deep within network drivers allows ability bypass firewalls communicate securely using custom encrypted tunnel command control server allows attacker install malware viruses applications trojan commonly steals information victim computer attempt small financial gain mebroot linked anserin another trojan logs keystrokes steals banking information gives evidence showing financial motive likely behind mebroot trojan tries avoid detection hooking atapi.sys also embeds ntoskrnl.exe mebroot executable files registry keys driver modules makes harder detect without antivirus software addition running antivirus software one also remove trojan wiping repairing master boot record hard drive operating system three variants mebroot discovered estimated first version compiled november 2007 december mebroot started drive-by downloads early 2008 second wave attacks arrived february 2008 second variant discovered accompanied modified installer march 2008 third variant discovered attacks became widespread since third variant trojan upgraded try outwit antivirus software unknown mebroot still wild mebroot currently known distributed visiting malicious websites way application exploit estimated 1,500 websites compromised mostly european region traffic websites infected mebroot reach 50,000 100,000 views per day
[ 3555, 10756, 4421, 8998, 9868, 3629, 9791, 7983, 3473, 8978, 7739, 7515, 988, 1791 ]
None
3,621
1
Inverse_Symbolic_Calculator:inverse symbolic calculator inverse symbolic calculator online number checker established july 18 1995 peter benjamin borwein jonathan michael borwein simon plouffe canadian centre experimental constructive mathematics burnaby canada user input number calculator use algorithm search calculate closed-form expressions suitable functions roots near number hence calculator great importance working numerical areas experimental mathematics isc contains 54 million mathematical constants plouffe inverter opened 1998 contains 214 million newer version tables 3.702 billion entries june 19 2010 exists 2016 plouffe released portable version plouffe inverter containing 3 billion entries
[ 2939 ]
None
3,622
3
Lunar_Pool:lunar pool lunar pool known japan video game combines pool pocket billiards aspects miniature golf created developed compile nintendo entertainment system msx stage differently shaped pool table object knock ball pocket using cue ball sixty levels choose friction table adjustable thus lunar reference title along moon-related background imagery within game japanese lunar ball appeared famicom clone systems pirated multi-game cartridges power player super joy iii released wii north american virtual console october 22 2007 lunar pool played boards different shapes wherein player shoot cue ball knock colored balls pockets player fails pocket least one colored ball three consecutive turns player lose one life also player pockets cue ball loses life player pockets colored balls level consecutively without failure player get perfect remark bonus points added player score lunar pool either played alone another player computer game played another player computer players take turns shooting cue ball one player fails knock least one colored balls pocket pockets cue ball opponent turn
[ 10931, 9006 ]
Test
3,623
3
Ghostbusters_(1984_video_game):ghostbusters 1984 video game ghostbusters licensed game activision based movie name designed david crane produced brad fregger released several home computer platforms 1984 later video game console systems including atari 2600 master system nes primary target platform commodore 64 programmer initial version game adam bellin versions game released usa except amstrad cpc version released europe msx version released europe south america japan early 1984 ghostbusters movie nearing completion tom lopez vice president activision product development contacted columbia pictures obtain license ghostbusters video game columbia gave activision specific rules requests design content game stipulating finished quickly possible order released movie peak popularity activision forced complete programming work six weeks contrast usual several months development time game activision time rough concept driving/maze game called car wars decided build ghostbusters game effort paid movie game proved huge successes player sets ghost busting franchise city rising psychokinetic pk energy level ability purchase equipment traps upgrade vehicle player negotiates grid representing city need stop roamers reaching temple zuul causes pk energy level jump player moves city block flashing red game mode switches overhead view player vehicle driving location player must move left right vacuum stray ghosts avoid cars player moves screen slimer ghost must guided two proton streams ghost trap ghost successfully captured player income increases aim 10,000 time city pk level reaches 9999 stay-puff marshmallow man appear wreak havoc city thereby ending game versions e.g commodore 64 version first successful game player given account number stores amount money player end game allowed purchasing expensive items use faster cars traps etc. order win games player required earned money initial account balance one earliest uses passwords used 'save game feature home computers versions game feature sampled rendition ghostbusters cry start movie theme song c64 atari 8bit versions produced within game using patented form compression similar adpcm ess electronic speech systems without requiring external hardware produce speech pcjr/tandy port feature antic may 1985 called ghostbusters first adaptation capture feel theme movie based ... enjoyable play edge 2007 called ghostbusters dauntingly good noting despite action sequences expected licensed title game polished intelligently-paced strategic business simulation ernie hudson said kids really hated commodore 64 game thought sucked 1985 print shop reportedly two widely pirated commodore 64 programs ii computing listed ghostbusters eighth magazine list top apple ii games late 1985 based sales market-share data activision best-selling commodore game late 1987 amstrad cpc zx spectrum versions game included 1986 compilation sold million 3 along fighter pilot rambo kung-fu master game also released story far volume iv december 1989 hollywood collection december 1990 knocked daley thompson decathlon top uk spectrum sales chart ghostbusters ported ibm pcjr tandy 1000 1985 due timing-sensitive raster effects game uses incompatible tandy machines 1000/1000a 1000hx 1000ex use 4.77mhz 8088 cpu nes version created association works later changed name bits laboratory version panned critics gamers fans alike monotonous gameplay sloppy controls lack connection original film game also released nintendo entertainment system 1988 1986 japan master system 1987 versions featured added gameplay ghostbusters sneak marshmallow man played like conventional vertical scrolling platform game actually climb stairs get roof however nes version ghostbusters could fire weapons trap ghosts instead sneak floors contrast master system version ghostbusters able shoot ghosts proton streams temporarily make go away nes version considered difficult reason end nes version final screen states conglaturation completed great game prooved justice culture go rest heroes version extremely negatively received critics monotonous gameplay poor graphics sound well unfair difficulty particularly stairway
[ 11557, 9006, 2159 ]
Test
3,624
4
Language-based_security:language-based security computer science language-based security lbs set techniques may used strengthen security applications high level using properties programming languages lbs considered enforce computer security application-level making possible prevent vulnerabilities traditional operating system security unable handle software applications typically specified implemented certain programming languages order protect attacks flaws bugs application ’ source code might vulnerable need application-level security security evaluating applications behavior respect programming language area generally known language-based security use large software systems scada taking place around world computer systems constitute core many infrastructures society relies greatly infrastructure water energy communication transportation rely fully functionally working computer systems several well known examples critical systems fail due bugs errors software shortage computer memory caused lax computers crash hundreds flights delayed april 30 2014 traditionally mechanisms used control correct behavior software implemented operating system level operating system handles several possible security violations memory access violations stack overflow violations access control violations many others crucial part security computer systems however securing behavior software specific level even stronger security achieved since lot properties behavior software lost compilation significantly difficult detect vulnerabilities machine code evaluating source code compilation theory implementation programming language also considered vulnerabilities uncovered developers keep making mistakes instead relying programmers memories strive produce tools codify known common security vulnerabilities integrate directly development process — d. evans d. larochelle 2002 using lbs security software increased several areas depending techniques used common programming errors allowing buffer overflows illegal information flows occur detected disallowed software used consumer also desirable provide proof consumer security properties software making consumer able trust software without receive source code self checking errors compiler taking source code input performs several language specific operations code order translate machine readable code lexical analysis preprocessing parsing semantic analysis code generation code optimization commonly used operations compilers analyzing source code using theory implementation language compiler attempt correctly translate high-level code low-level code preserving behavior program compilation programs written type-safe language java source code must type-check successfully compilation type-check fails compilation performed source code needs modified means given correct compiler code compiled successfully type-checked source program clear invalid assignment errors information value code consumer provides degree guarantee program crash due specific error goal lbs ensure presence certain properties source code corresponding safety policy software information gathered compilation used create certificate provided consumer proof safety given program proof must imply consumer trust compiler used supplier certificate information source code verified figure illustrates certification verification low-level code could established use certifying compiler software supplier gains advantage reveal source code consumer left task verifying certificate easy task compared evaluation compilation source code verifying certificate requires limited trusted code base containing compiler verifier main applications program analysis program optimization running time space requirements power consumption etc program correctness bugs security vulnerabilities etc. program analysis applied compilation static analysis run-time dynamic analysis language-based security program analysis provide several useful features type checking static dynamic monitoring taint checking control-flow analysis information flow analysis described set tools used analyze information flow control program order preserve confidentiality integrity regular access control mechanisms come short decoupling right access information right disseminate flow model goes beyond access matrix model ability specify secure information flow practical system needs access flow control satisfy security requirements — d. denning 1976 access control enforces checks access information concerned happens example system two users alice bob alice file secret.txt allowed read edited prefers keep information system also exists file public.txt free read edit users system suppose alice accidentally downloaded malicious program program access system alice bypassing access control check secret.txt malicious program copies content secret.txt places public.txt allowing bob users read constitutes violation intended confidentiality policy system noninterference property programs leak reveal information variables higher security classification depending input variables lower security classification program satisfies noninterference produce output whenever corresponding input lower variables used must hold every possible value input implies even higher variables program different values one execution another visible lower variables attacker could try execute program satisfy noninterference repeatedly systematically try map behavior several iterations could lead disclosure higher variables let attacker learn sensitive information example systems state whether program satisfies noninterference evaluated compilation assuming presence security type systems security type system kind type system used software developers order check security properties code language security types types variables expressions relate security policy application programmers may able specify application security policy via type declarations types used reason various kinds security policies including authorization policies access control capabilities information flow security security type systems formally related underlying security policy security type system sound programs type-check satisfy policy semantic sense example security type system information flow might enforce noninterference meaning type checking reveals whether violation confidentiality integrity program vulnerabilities low-level code bugs flaws lead program state behavior program undefined source programming language behavior low-level program depend compiler runtime system operating system details allows attacker drive program towards undefined state exploit behavior system common exploits insecure low-level code lets attacker perform unauthorized reads writes memory addresses memory addresses either random chosen attacker approach achieve secure low-level code use safe high-level languages safe language considered completely defined programmers manual bug could lead implementation-dependent behavior safe language either detected compile time lead well-defined error behavior run-runtime java accessing array bounds exception thrown examples safe languages c haskell scala compilation unsafe language run-time checks added low-level code detect source-level undefined behavior example use canaries terminate program discovering bounds violations downside using run-time checks bounds-checking impose considerable performance overhead memory protection using non-executable stack and/or heap also seen additional run-time checks used many modern operating systems general idea identify sensitive code application data analyzing source code done different data separated placed different modules assuming module total control sensitive information contains possible specify leave module example cryptographic module prevent keys ever leaving module unencrypted certifying compilation idea producing certificate compilation source code using information high-level programming language semantics certificate enclosed compiled code order provide form proof consumer source code compiled according certain set rules certificate produced different ways e.g proof-carrying code pcc typed assembly language tal main aspects pcc summarized following steps example certifying compiler touchstone compiler provides pcc formal proof type- memory safety programs implemented java tal applicable programming languages make use type system compilation object code carry type annotation checked ordinary type checker annotation produced many ways similar annotations provided pcc limitations however tal handle security policy may expressed restrictions type system include memory safety control flow among others
[ 3587, 5635, 5896, 5399, 3876, 5677, 2737, 1474, 5060, 8262, 4572, 6754, 10469, 8037, 8551, 9061, 9062, 5363, 9846 ]
None
3,625
8
GoAgent:goagent goagent gnu gpl open-source cross-platform network access software mainly written python supports windows os x linux linux-based os like android openwrt uses google app engine servers provide users free proxy service gain access blocked information normally used web browsers goagent eventually shut request chinese law enforcement project called xx-net claims reborn goagent first release january 2015
[ 4224, 5254, 138, 1692, 9117, 7983, 8630, 823, 8640, 3777, 2884, 3781, 11221, 5078, 2661, 10341, 9193, 8554, 5612, 4725, 5749, 5887 ]
Test
3,626
2
Series_40:series 40 series 40 often shortened s40 software platform application user interface ui software nokia broad range mid-tier feature phones well vertu line luxury phones one world widely used mobile phone platforms found hundreds millions devices nokia announced 25 january 2012 company sold 1.5 billion series 40 devices used smartphones nokia primarily uses windows phone 2012 symbian however 2012 2013 several series 40 phones asha line 308 309 311 advertised smartphones although actually support smartphone features like multitasking fully fledged html browser 2014 microsoft acquired nokia mobile phones business part licensing agreement company microsoft mobile allowed use nokia brand feature phones series 40 range however july 2014 company memo revealed microsoft would end future production series 40 devices replaced series 30+ series 40 underlying operating system called intelligent system architecture isa also called nokia operating system nos series 40 introduced 1999 release nokia 7110 96 × 65 pixel monochrome display first phone come wap browser years s40 ui evolved low-resolution ui high-resolution color ui enhanced graphical look third generation series 40 became available 2005 introduced support devices resolutions high qvga 240×320 possible customize look feel ui via comprehensive themes 2012 nokia asha mobile phones 200/201/210 302/306/305/308/310/311 303 311 released used series 40 final feature phone running series 40 nokia 515 2013 running 6th edition series 40 provides communication applications telephone internet telephony voip messaging email client pop3 imap4 capabilities web browser media applications camera video recorder music/video player fm radio phonebook personal information management pim applications calendar tasks basic file management like series 60 provided applications gallery folders subfolders gallery also default location files transferred bluetooth placed user-installed applications series 40 generally mobile java applications flash lite applications also supported mostly used screensavers integrated web browser access web content service provider xhtml/html gateway latest version series 40 called series 40 6th edition introduced new browser based webkit open source components webcore javascriptcore new browser delivers support html 4.01 css2 javascript 1.5 ajax also like higher-end series 60 series 40 run uc browser web browser enhance user web browsing experience latest feature phones asha lineup come nokia xpress browser uses proxy servers compress optimize web pages similar fashion opera mini support syncml synchronization address book calendar notes external services present however many s40 phones synchronization settings must sent via ota text message series 40 embedded software platform open software development via standard de facto content application development technologies supports java midlets i.e java midp cldc technology provide location communication messaging media graphics capabilities s40 also supports flash lite applications
[ 1537, 10754, 9732, 5637, 6, 11271, 529, 3089, 10770, 5143, 2072, 5659, 4132, 40, 3626, 5677, 9262, 7727, 10802, 7220, 5175, 9784, 1083, 1602, 9292, 7246, 1615, 5201, 7253, 3162, 5211, 6748, 607, 1633, 2658, 6763, 109, 8315, 8316, 8829, ...
Test
3,627
7
Nebula_(computing_platform):nebula computing platform nebula federal cloud computing platform originated nasa ames research center moffett field california nebula project run acits 2 contract originally held perot systems nebula hosted many advanced research projects one application open sourced nasa developed nebula project 'nova became one two founding projects openstack project ames internet exchange aix formerly mae-west one original nodes internet major peering location tier 1 isps well home e root name servers aix provides connectivity nebula cloud enabling 10gige connections nisn nebula-project uses variety free open-source software
[ 4194, 7983 ]
None
3,628
6
DataPlow_SAN_File_System:dataplow san file system san file system sfs high-performance clustered file system created company dataplow sfs enables fast access shared files located shared storage area network san -attached storage devices sfs utilizes high-speed scalable data transfers inherent storage area networks general-purpose file system wide variety environments including scientific computing finance healthcare entertainment defense broadcast aerospace supported linux solaris os x windows supports san-based block-level storage protocols including fibre channel iscsi interoperability security specifications limits
[ 7863, 2314, 2395, 823 ]
Test
3,629
4
Encryption:encryption cryptography encryption process encoding message information way authorized parties access authorized encryption prevent interference denies intelligible content would-be interceptor encryption scheme intended information message referred plaintext encrypted using encryption algorithm – cipher – generating ciphertext read decrypted technical reasons encryption scheme usually uses pseudo-random encryption key generated algorithm principle possible decrypt message without possessing key well-designed encryption scheme considerable computational resources skills required authorized recipient easily decrypt message key provided originator recipients unauthorized users symmetric-key schemes encryption decryption keys communicating parties must key order achieve secure communication example symmetric key german military enigma machine key settings day allies figured machine worked able decipher information encoded within messages soon could discover encryption key given day transmissions public-key encryption schemes encryption key published anyone use encrypt messages however receiving party access decryption key enables messages read public-key encryption first described secret document 1973 encryption schemes symmetric-key also called private-key although published subsequently work diffie hellman published journal large readership value methodology explicitly described method became known diffie hellman key exchange publicly available public key encryption application called pretty good privacy pgp written 1991 phil zimmermann distributed free charge source code purchased symantec 2010 regularly updated encryption long used militaries governments facilitate secret communication commonly used protecting information within many kinds civilian systems example computer security institute reported 2007 71 companies surveyed utilized encryption data transit 53 utilized encryption data storage encryption used protect data rest information stored computers storage devices e.g usb flash drives recent years numerous reports confidential data customers personal records exposed loss theft laptops backup drives encrypting files rest helps protect physical security measures fail digital rights management systems prevent unauthorized use reproduction copyrighted material protect software reverse engineering see also copy protection another somewhat different example using encryption data rest encryption also used protect data transit example data transferred via networks e.g internet e-commerce mobile telephones wireless microphones wireless intercom systems bluetooth devices bank automatic teller machines numerous reports data transit intercepted recent years data also encrypted transmitted across networks order protect eavesdropping network traffic unauthorized users conventional methods deleting data permanently storage device involve overwriting whole content zeros ones patterns – process take significant amount time depending capacity type medium cryptography offers way making erasure almost instantaneous method called crypto-shredding example implementation method found ios devices cryptographic key kept dedicated 'effaceable storage key stored device setup offer full confidentiality protection case unauthorized person gains physical access device encryption important tool sufficient alone ensure security privacy sensitive information throughout lifetime applications encryption protect information rest transit leaving sensitive data cleartext potentially vulnerable improper disclosure processing cloud service example homomorphic encryption secure multi-party computation emerging techniques compute encrypted data techniques general turing complete incur high computational and/or communication costs response encryption data rest cyber-adversaries developed new types attacks recent threats encryption data rest include cryptographic attacks stolen ciphertext attacks attacks encryption keys insider attacks data corruption integrity attacks data destruction attacks ransomware attacks data fragmentation active defense data protection technologies attempt counter attacks distributing moving mutating ciphertext difficult identify steal corrupt destroy encryption protect confidentiality messages techniques still needed protect integrity authenticity message example verification message authentication code mac digital signature authenticated encryption algorithms designed provide encryption integrity protection together standards cryptographic software hardware perform encryption widely available successfully using encryption ensure security may challenging problem single error system design execution allow successful attacks sometimes adversary obtain unencrypted information without directly undoing encryption see example traffic analysis tempest trojan horse integrity protection mechanisms macs digital signatures must applied ciphertext first created typically device used compose message protect message end-to-end along full transmission path otherwise node sender encryption agent could potentially tamper encrypting time creation secure encryption device correct keys tampered endpoint device configured trust root certificate attacker controls example attacker inspect tamper encrypted data performing man-in-the-middle attack anywhere along message path common practice tls interception network operators represents controlled institutionally sanctioned form attack countries also attempted employ attacks form control censorship even encryption correctly hides message content tampered rest transit message length form metadata still leak sensitive information message well-known crime breach attacks https side-channel attacks relied information leakage via length encrypted content example traffic analysis broad class techniques often employs message lengths infer sensitive implementation traffic flows many messages aggregate padding message payload encrypting help obscure cleartext true length cost increasing ciphertext size introducing bandwidth overhead messages may padded randomly deterministically approach different tradeoffs encrypting padding messages form padded uniform random blobs purbs practice guaranteeing cipher text leaks metadata cleartext content leaks asymptotically minimal formula_1 information via length
[ 10242, 5636, 9732, 510, 10756, 9225, 6159, 9745, 8211, 5142, 535, 4119, 7192, 3610, 9242, 4637, 5661, 10274, 2084, 3620, 7718, 4140, 7725, 2095, 6709, 7739, 3133, 8254, 9791, 64, 7235, 8265, 10831, 1618, 4691, 11349, 87, 1623, 5722, 8283,...
Test
3,630
3
Status_register:status register status register flag register condition code register ccr collection status flag bits processor examples registers include flags register x86 architecture flags program status word psw register ibm system/360 architecture z/architecture application program status register apsr arm cortex-a architecture status register hardware register contains information state processor individual bits implicitly explicitly read and/or written machine code instructions executing processor status register lets instruction take action contingent outcome previous instruction typically flags status register modified effects arithmetic bit manipulation operations example z bit may set result operation zero cleared nonzero classes instructions may also modify flags indicate status example string instruction may indicate whether instruction terminated found match/mismatch found end string flags read subsequent conditional instruction specified action depending processor jump call return occurs flags indicate specified result earlier instruction cpu architectures mips alpha use dedicated flag register others implicitly set and/or read flags machines either pass implicit status information instructions pass explicitly selected general purpose register status register may often fields well specialized flags interrupt enable bits similar types information interrupt status thread currently executing preserved later recalled storing current value status register along program counter active registers machine stack reserved area memory list common cpu status register flags implemented almost modern processors processors status register also contains flags status flags enable instruction act based result previous instruction pipelined processors superscalar speculative processors create hazards slow processing require extra hardware work around long instruction word processors dispense status flags single instruction performs test indicates outcome test take action compare b jump c equal result test saved subsequent instructions another alternative status register processor instructions deposit status information general-purpose register program requests mips amd 29000 dec alpha risc-v examples architectures provide comparison instructions store comparison result general-purpose register single bit numeric value 0 1 conditional branches act based value general-purpose register usually comparison instructions test equality signed/unsigned magnitude test conditions program uses equivalence formula example mips carry bit program performing multiple-word addition test whether single-word addition registers overflowed testing whether sum lower operand codice_1 instruction sets codice_2 1 0 based specified comparison two operands general-purpose register codice_2 used status register govern conditional jump rather possible value 1 indicating carry low-order addition added high-order word scheme becomes less convenient adding three words two additions computing codice_4 either may generate carry must detected two codice_1 instructions fortunately two carries may added without risk overflow situation stabilizes five instructions per word added
[ 7173, 9739, 2574, 7699, 5655, 10781, 8231, 7218, 2623, 2113, 7234, 3142, 2638, 3157, 602, 1122, 7269, 3175, 8815, 7281, 5234, 630, 8822, 11395, 7313, 1175, 663, 5786, 6815, 8352, 5793, 6818, 6821, 7852, 9391, 2224, 2226, 7858, 9911, 11447...
Train
3,631
2
BeOS_API:beos api beos api often called api inc. application programming interface required write graphical native applications beos hence derivatives haiku zeta api divided number kits collect related classes together bear relation library contains supporting code almost entirely c++ third-party bindings classes python tiny subset classes mostly storage kit related perl application kit contains basic classes required launch beos application well support global clipboard inter-application internal messaging timers rosters functions seen required support graphical application application kit classes supported libbe.so storage kit provides methods manipulating files creating managing symlinks way file open/save panels graphical applications well dealing file system attributes storage kit classes mostly libtracker.so tracker native file manager os interface kit provides large collection widgets building graphical applications main window class dialogue boxes including font handling rendering control majority libbe.so comprises kit kernel kit provides threading semaphores ability access system information also libbe.so support kit provides advanced functions readily fall another kit assisted memory allocation list support network kit provides either rudimentary beos r5 lower almost complete beos dano higher implementation berkeley sockets bind well native functions based nettle c++ networking library libnet.so provides berkeley sockets r5 later replaced common libsocket/libbind.so nomenclature libnetapi r5 later replaced libbnetapi provides modified version nettle mail kit provides native email format well way use system fetch receive email using standard protocols pop3 smtp mail kit supported libmail.so translation kit provides method whereby images plain text formats handled addons allowing applications support one format native intermediate one save/load addon-supported format api also allows video audio translation library although superseded beos r4 immediately disabled translation kit supported libtranslation.so media kit provides audio video input/output abstraction layer based pluggable addons well handling sound mixing audio video format translation media related functions media kit functions supported libmedia.so midi kit provides midi hardware input output abstraction well software synthesiser provided headspace beos r5 libmidi.so provides old beos r3 era midi api libmidi2.so provides r4+ api game kit provides number sound formats suited computer game audio output well ability run full-screen applications use video overlays opengl kit provides implementation opengl well supporting classes allow use native applications beos r5 supported opengl version 1.1 software accelerated although kit hardware-neutral fact outperformed many hardware implementations running competing platforms could deliver similar latency/bandwidth performance due underlying inefficiencies design implementation device kit provides platform-abstracted direct hardware access serial parallel ports well beboxs infamous geekport locale kit provides classes localize applications different languages timezones number formatting conventions etc kit found haiku implementation beos api services kit provides lightweight direct connection web services kit found haiku implementation beos api web kit provides means rendering web pages fork apple webkit kit found haiku implementation beos api package kit provides means package management kit found haiku implementation beos api majority api reimplemented haiku open-source beos replacement although effort catch intervening years since beos r5 additional functionality added ranging large changes mail kit support imap encrypted connections multiple accounts move opengl 1.5 support via mesa 3d alternative systems attempted draw inspiration syllable beos api making attempts provide base port applications private port much api microsoft windows later linux using gtk+ done gobe software enable port gobe productive office suite platforms beos originally developed entire api stage beos revision 3 documented two paper books developer guide advanced topics released o'reilly media inc imprint 1997/8 addition digital representation provided updated beos 2007 access co ltd owners inc intellectual property released text creative commons licence
[ 1666, 8582, 9491, 10654, 9128, 8618, 2603, 7983, 11184, 9909, 823, 1339, 1347, 1348, 8771, 4550, 7629, 4822, 10841, 6236, 1374, 8554, 9579, 5743, 3312, 6128, 370, 8303, 2804, 8304, 9848, 5754 ]
Test
3,632
4
Akismet:akismet akismet spam filtering service filters spam comments trackbacks contact form messages filter works combining information spam captured participating sites using spam rules block future spam akismet offered automattic company behind wordpress.com launched october 25 2005 akismet said captured 100 billion spam comments pings october 2013 founder automattic matt mullenweg decided create akismet mother could blog safety 2005 discussions deal comment spam plug-ins available mullenweg first attempt javascript plug-in modified comment form hid fields within hours launch spammers downloaded figured worked bypassed late 2005 mullenweg launched akismet plug-in wordpress akismet stands automatic kismet way dealing spam aggregate crowd-sourced spam-fighting tool time someone posts comment participating website akismet checks comments database spam deleted spam gets user marks spam comment added database pool spam comments widens making akismet increasingly effective time akismet originally developed integrate plug-in wordpress akismet plug-in included default wordpress builds since version 2.0 activated wordpress.com-hosted blogs public akismet api resulted third-party plug-ins platforms one official akismet plug-in release open source internet forum software discourse use akismet necessary obtain api key key necessary site communicate akismet servers released terms gnu general public license akismet plug-in free software although code akismet system nature algorithm used released akismet service free personal use march 2016 commercial plans start 5/month
[ 5489, 735 ]
None
3,633
7
Google_Cloud_Connect:google cloud connect google cloud connect free cloud computing plug-in windows microsoft office 2003 2007 2010 automatically store synchronize microsoft word document powerpoint presentation excel spreadsheet google docs google docs microsoft office formats google doc copy automatically updated time microsoft office document saved microsoft office documents edited offline synchronized later online google cloud sync maintains previous microsoft office document versions allows multiple users collaborate working document time google cloud connect discontinued april 30 2013 according google cloud connect features available google drive google cloud connect could automatically manually synchronize changes made microsoft office 2003 2007 2010 document google docs documents secured private access one user shared specific people collaboration made public anyone previous document versions retrieved
[ 4995, 5892, 7816, 6797, 5262, 8719, 5524, 7700, 10645, 8858, 1435, 10525, 2978, 4901, 1959, 3499, 10284, 7983, 1203, 5431, 7359, 196, 3269, 3782, 11590, 4683, 11343, 3664, 5202, 3795, 1240, 8413, 6367, 2658, 4194, 6632, 5483, 236, 9712, 9...
Test
3,634
7
Comm100_Live_Chat:comm100 live chat comm100 live chat free basic live support software product offered via saas software service model enables businesses organizations communicate website visitors real time improve conversions sales customer satisfaction first version comm100 live chat released august 5 2009 october 2011 comm100 live chat featured apps month techrepublic scott lowe company hit 200,000 registered business users mark october 2012 january 2013 comm100 live chat released version 7.0 features salesforce integration re-designed operator console month comm100 live chat ranked top 3 2013 best enterprise chat software category toptenreviews zero downtime upgrade comm100 live chat made possible march 2013 comm100 live chat consists 3 parts web chat window operator console control panel totally web-based version works major web browsers chrome ie firefox safari opera etc major operating systems windows mac linux operator console also cross-platform compatible desktop app apps mobile devices iphone ipad android blackberry key features comm100 live chat include comm100 live chat offers plugins integrations following
[ 2208, 9732, 8584, 1353, 10090, 6539, 5612, 7983, 6576, 467, 5524, 5078, 823, 8536 ]
Train
3,635
0
Heaps'_law:heaps law linguistics heaps law also called herdan law empirical law describes number distinct words document set documents function document length called type-token relation formulated v number distinct words instance text size n k β free parameters determined empirically english text corpora typically k 10 100 β 0.4 0.6 law frequently attributed harold stanley heaps originally discovered mild assumptions herdan–heaps law asymptotically equivalent zipf law concerning frequencies individual words within text consequence fact type-token relation general homogenous text derived distribution types heaps law means instance text gathered diminishing returns terms discovery full vocabulary distinct terms drawn heaps law also applies situations vocabulary set distinct types attributes collection objects example objects could people types could country origin person persons selected randomly selecting based country origin heaps law says quickly representatives countries proportion population become increasingly difficult cover entire set countries continuing method sampling
[ 1890, 3998, 3694, 7599 ]
None
3,636
1
Epictetus_Database_Client:epictetus database client epictetus free cross-platform multi-database administration tool used jvm run epictetus distributed freeware antilogic software discontinued since 2009
[ 10340, 1579, 5612, 9389, 7022, 7983, 11030, 3096, 9177, 8539, 9471 ]
Test
3,637
4
Endace:endace endace ltd privately owned network monitoring company based new zealand founded 2001 provides network visibility network recording products large organizations company listed london stock exchange 2005 delisted 2013 acquired emulex 2016 endace spun emulex currently private company october 2016 intercept revealed endace clients intelligence agencies including british gchq known conducting massive surveillance network communications moroccan dgst likewise known mass surveillance citizens endace founded dag project school computing mathematical sciences university waikato new zealand first cards designed university intended measure latency atm networks 2006 endace transitioned component manufacturer appliance manufacturer managed infrastructure provider company sells network visibility fabrics based range network recorders large corporations government agencies endace first new zealand company list london alternative investment market floated mid-june 2005 move without controversy poor share price performance early years seeming failure attract broad enough shareholder base lent weight criticism endace focused initially developing local profile via nzx rather pushing overseas investment via london aim endace headquartered auckland new zealand r centre hamilton new zealand offices australia united states great britain dag project grew academic research waikato university found software measurements atm cells packets unsatisfactory reasons accuracy lack certainty packet loss research group set developing hardware generate better quality recordings hardware subsequent iterations introduced two fundamental innovations hardware timestamping hardware accounting packet loss conventionally packet cell given timestamp host machine kernel i.e software kernel driver notified new packet arrived approach results poor quality timestamps several reasons among considerable latency jitter packet arriving network interface receipt kernel driver uncertainty caused interrupt coalescing wherein one host interrupt signifies arrival several packets poor quality limits research usefully done network performance related fields solve dag generates timestamps hardware close network interface possible obviate latency jitter problems caused interrupt coalescing hardware capable much greater accuracy precision software-generated timestamps precision comes freedom custom hardware assign many bits timestamp required accuracy assured reference external time source gps accurate ± 40 nanoseconds contrast accuracy ntp kernel clocks corrected internet order milliseconds 100,000 times less accurate depending conditions involved dag produces 64 bit timestamps fixed-point format 32 fractional bits giving potential precision formula_1 seconds 233 picoseconds actual precision offered varies particular model dag oldest giving 24 fractional bits 60 nanoseconds better precisions offered dags higher bandwidth networks timestamp derived free-running clock provided crystal oscillator accuracy crystals drift temperature age dag solution use direct digital synthesis using 1 hz pulse-per-second output many gps receivers provide reference clock mechanism described §5.5.3 stephen donnelly phd thesis also describes detail pre-commercial era models dag crucially academically significant contribution dag ability use external reference globally synchronised gps makes possible one-way time-of-flight measurements immense interest academic researchers packets flowing two points internet neither guaranteed follow path direction guaranteed timing characteristics direction outside academic world timestamp accuracy commercial applications enforcement compliance law eu markets financial instruments directive 2004 almost important timestamp accuracy guaranteeing 100 cell packet capture loss unavoidable knowing packets lost important analysing packet trace important able compensate lost packets calculating inter-arrival times commercial nics keep count dropped packets ca n't indicate packets lost dag prepends header amongst things indicates many packets dropped packet previously accepted packet dag also engineered deliver recorded packets host greatest possible efficiency together interstitial loss counter makes dag appealing surveillance applications interstitial loss counter also finds application forensics prosecutor needs able prove record complete october 2016 intercept published article showing endace customers include intelligence agencies including gchq canadian australian intelligence agencies dgst morocco ’ domestic surveillance agency edward snowden documents shown gchq installed massive surveillance network communications uk using over-sea cable europe north america
[ 9440, 3495, 10344, 3211, 10539, 7853, 1169, 5363, 343 ]
Validation
3,638
7
Recruitee:recruitee recruitee software service saas functions talent acquisition platform formerly known applicant tracking system ats includes careers site editor employer branding plugin sourcing personnel job board integration email calendar synchronization within 4 months public launch august 2015 recruitee attracted 1000 small medium-sized enterprises smes recruiting agencies worldwide 2011 perry oostdam met pawel smoczyk founder2be social network helps aspiring entrepreneurs find co-founder working remotely netherlands poland put together first product mobile activation game called georun 2014 oostdam smoczyk pivoted business built recruitee frustration hassles hiring believe hiring team effort founders hr alone launch recruitee quickly became popular got undisclosed amount seed funding september 1 2015 board members include dutch entrepreneurs robert pijselman luc brandts november 2015 recruitee announced partnership rockstart accelerator amsterdam recruitee set talent pool let applicants apply job openings startups affiliated rockstart recruitee current clients include vice magazine usabilla vlisco users customize hiring pipeline job opening users drag drop candidates profiles different stages move along hiring process users post job openings free paid job boards recruitee users bulk upload résumés synchronize emails calendars recruitee users send bulk emails candidates users import potential candidates websites using recruitee sourcing extension google chrome firefox users make careers sites showcase employer branding like company team culture
[ 467, 5078 ]
Test
3,639
5
MediaBrowser:mediabrowser mediabrowser mediabrowser.com inc. internet browser branding company started 2000 mark c. brown made specially branded versions internet explorer various company brands themes branded web browsers made mediabrowser require internet explorer 5 higher supported windows operating systems december 5 2001 mediabrowser.com inc. went bankrupt shut site branded web browsers windows 95 windows xp internet explorer 5.0 higher windows media player 6.4 higher macromedia flash 4.0 higher also 486 mhz higher processor 32 mb ram 5 mb free hard drive space active internet connection due compatibility issues mediabrowser compatible windows vista windows 7 however run windows xp compatibility mode upon new installation mediabrowser branded browser user required register web browser using mediabrowser online registration form asked name address etc 12 years old mediabrowser shut registration process broken registration form hosted defunct web site therefore users would able use unless modified value windows registry branding consisted various brand images background navigation buttons splash screen links specific web pages related brand company mediabrower also space ads display bottom web browser mediabrowser microtron also included every mediabrowser branding display brand-related video content user late 2000 video game company nintendo partnered mediabrowser make branded browsers new upcoming video games first two browsers released upcoming pokémon gold silver video games mario tennis retailers gave cd-rom copies branded pokémon gs browser anyone pre-ordered copy pokémon gold silver special promotion later 2001 browsers released branded nintendo games paper mario nintendo power branded browser released well mediabrowser.com inc. went bankrupt december 5 2001 chapter 7 filing due company debts 2.49 million various unpaid loans web site containing branded web browsers pulled nintendo posted notice downloads page stating nintendo custom browsers currently unavailable date return keep checking nintendo.com downloads page updates thanks
[ 513, 6657, 9736, 2579, 6171, 9757, 7713, 10791, 9770, 559, 4661, 10808, 3643, 9275, 64, 5707, 10834, 6231, 8281, 6747, 1642, 9834, 9841, 115, 9843, 119, 4728, 637, 1664, 2182, 10910, 8351, 7340, 9394, 9908, 185, 11449, 4797, 7364, 11466, ...
Test
3,640
6
Allocate-on-flush:allocate-on-flush allocate-on-flush also called delayed allocation file system feature implemented hfs+ xfs reiser4 zfs btrfs ext4 feature also closely resembles older technique berkeley ufs called block reallocation blocks must allocated hold pending writes disk space appended data subtracted free-space counter actually allocated free-space bitmap instead appended data held memory must flushed storage due memory pressure kernel decides flush dirty buffers application performs unix sync system call example effect batching together allocations larger runs delayed processing reduces cpu usage tends reduce disk fragmentation especially files grow slowly also help keeping allocations contiguous several files growing time used conjunction copy write zfs convert slow random writes fast sequential writes
[ 5120, 6434, 9762, 8772, 9343, 1801, 5293, 246, 3512, 3257, 7070, 2687 ]
None
3,641
1
Panorama_(database_engine):panorama database engine panorama database engine development environment macintosh microsoft windows one first applications available mac os 1984 panorama database software apple inc. macintosh microsoft windows product provue development according owner jim rea provue oldest third-party software company apart microsoft developing software macintosh personal computer panorama claim fame databases creates ram-based making extremely fast said disk speeds os application memory caching improved speed benefit becomes less less evident years go panorama popular filemaker main competitor though outlasted many similar products lacks conforming standard application conventions makes potential customisation incorporating powerful scripting language current version mac 6.0 snow leopard compatible intel cpu native windows 5.5 six years development time successor panorama x released november 2017
[ 576, 10286, 6797, 4598 ]
Test
3,642
9
Equals_sign:equals sign etymology word equal latin word æqualis meaning uniform identical equal aequus level even symbol universally accepted mathematics equality first recorded welsh mathematician robert recorde whetstone witte 1557 original form symbol much wider present form book recorde explains design gemowe lines meaning twin lines latin gemellus auoide tediouſe repetition theſe woordes equalle ſette doe often woorke vſe paire paralleles gemowe lines one lengthe thus bicauſe noe .2. thynges moare equalle avoid tedious repetition words equal set often work use pair parallels gemowe lines one length thus 2 things equal according scotland university st andrews history mathematics website symbol '= immediately popular symbol || used æ œ latin word aequalis meaning equal widely used 1700s mathematics equals sign used simple statement fact specific case x 2 create definitions let x 2 conditional statements x 2 … express universal equivalence codice_1 first important computer programming language use equals sign original version fortran fortran designed 1954 implemented 1957 fortran serves assignment operator codice_2 sets value codice_3 2 somewhat resembles use mathematical definition different semantics expression following evaluated first may refer previous value codice_3 example assignment codice_5 increases value codice_3 2 rival programming-language usage pioneered original version algol designed 1958 implemented 1960 algol included relational operator tested equality allowing constructions like codice_7 essentially meaning conditional usage mathematics equals sign reserved usage usages remained common different programming languages early 21st century well fortran used assignment languages c perl python awk descendants used equality assignment pascal family ada eiffel apl languages languages basic pl/i used equals sign mean assignment equality distinguished context however languages one meanings different character often sequence characters used meaning following algol languages use equality use assignment although apl special character set uses left-pointing arrow fortran equality operator possible compare expression zero using arithmetic statement fortran iv released 1962 since used four characters .eq test equality language b introduced use == meaning copied descendant c later languages means assignment equals sign also used defining attribute–value pairs attribute assigned value php triple equals sign codice_8 denotes value type equality meaning two expressions evaluate equal values also data type instance expression codice_9 true codice_10 number 0 integer value whereas false boolean value javascript semantics codice_8 referred equality without type coercion however javascript behavior codice_12 described simple consistent rules expression codice_9 true codice_14 false even though sides codice_12 act boolean context reason sometimes recommended avoid codice_12 operator javascript favor codice_8 ruby equality codice_12 requires operands identical type e.g codice_9 false codice_8 operator flexible may defined arbitrarily given type example value type codice_21 range integers codice_22 codice_23 false since types different range vs. integer however codice_24 true since codice_8 codice_21 values means inclusion range note semantics codice_8 non-symmetric e.g codice_28 false since interpreted mean codice_29 rather codice_30 equals sign also used grammatical tone letter orthographies budu congo-kinshasa krumen mwan dan ivory coast unicode character used tone letter u+a78a different mathematical symbol u+003d possibly unique case equals sign european usage person name specifically double-barreled name pioneer aviator alberto santos-dumont also known often used double hyphen resembling equals sign two surnames place hyphen also seems personally preferred practice display equal respect father french ethnicity brazilian ethnicity mother instead double hyphen equals sign sometimes used japanese separator names ojibwe readily-available equal sign keyboard used substitute double hyphen linguistic interlinear glosses equals sign conventionally used mark clitic boundaries equals sign placed clitic word clitic attached chemical formulas two parallel lines denoting double bond commonly rendered using equals sign recent years equals sign used symbolize lgbt rights symbol used since 1995 human rights campaign lobbies marriage equality subsequently united nations free equal promotes lgbt rights united nations symbols used denote items approximately equal include following symbol used denote inequation items equal slashed equals sign ≠ u+2260 2260 alt+x microsoft windows latex done \neq command programming languages limiting 7-bit ascii character set typeable characters use codice_31 codice_32 codice_33 codice_34 codice_35 codice_36 represent boolean inequality operator triple bar symbol ≡ u+2261 latex \equiv often used indicate identity definition also represented u+225d ≝ u+2254 ≔ congruence relation modular arithmetic symbol ≅ often used indicate isomorphic algebraic structures congruent geometric figures equality truth values i.e bi-implication logical equivalence may denoted various symbols including ⇔ additional symbols unicode related equals sign include equals sign sometimes used incorrectly within mathematical argument connect math steps non-standard way rather show equality especially early mathematics students example one finding sum step step numbers 1 2 3 4 5 one might incorrectly write structurally shorthand notation incorrect part equality different value interpreted strictly says implies correct version argument would difficulty results subtly different uses sign education early arithmetic-focused grades equals sign may operational like equals button electronic calculator demands result calculation starting algebra courses sign takes relational meaning equality two calculations confusion two uses sign sometimes persists university level related
[ 512, 3462, 8582, 6797, 10253, 6160, 10145, 428, 8502, 3767, 1087, 8644, 8524, 10579, 2519, 8554, 3051, 3443, 3960, 7292, 2045 ]
Test
3,643
4
Browser_security:browser security browser security application internet security web browsers order protect networked data computer systems breaches privacy malware security exploits browsers often use javascript — sometimes cross-site scripting xss — sometimes secondary payload using adobe flash security exploits also take advantage vulnerabilities security holes commonly exploited browsers including mozilla firefox google chrome opera microsoft internet explorer safari web browsers breached one following ways browser may aware breaches may show user safe connection made whenever browser communicates website website part communication collects information browser order process formatting page delivered nothing else malicious code inserted website content worst-case scenario website specifically designed host malicious code vulnerabilities specific particular browser allow malicious code run processes within browser application unintended ways remember one bits information website collects browser communication browser identity- allowing specific vulnerabilities exploited attacker able run processes visitor machine exploiting known security vulnerabilities allow attacker gain privileged access browser n't already running privileged access infected system order perform even greater variety malicious processes activities machine even victim whole network breaches web browser security usually purpose bypassing protections display pop-up advertising collecting personally identifiable information pii either internet marketing identity theft website tracking web analytics user using tools web bugs clickjacking likejacking facebook like button targeted http cookies zombie cookies flash cookies local shared objects lsos installing adware viruses spyware trojan horses gain access users personal computers via cracking malware including online banking theft using man-in-the-browser attacks vulnerabilities web browser software minimized keeping browser software updated sufficient underlying operating system compromised example rootkit subcomponents browsers scripting add-ons cookies particularly vulnerable confused deputy problem also need addressed following principle defence depth fully patched correctly configured browser may sufficient ensure browser-related security issues occur example rootkit capture keystrokes someone logs banking website carry man-in-the-middle attack modifying network traffic web browser dns hijacking dns spoofing may used return false positives mistyped website names subvert search results popular search engines malware rsplug simply modifies system configuration point rogue dns servers browsers use secure methods network communication help prevent attacks perimeter defenses typically firewalls use filtering proxy servers block malicious websites perform antivirus scans file downloads commonly implemented best practice large organizations block malicious network traffic reaches browser topic browser security grown point spawning creation entire organizations browser exploitation framework project creating platforms collect tools breach browser security ostensibly order test browsers network systems vulnerabilities although part browser per se browser plugins extensions extend attack surface exposing vulnerabilities adobe flash player adobe acrobat reader java plugin activex commonly exploited malware may also implemented browser extension browser helper object case internet explorer browsers like google chrome mozilla firefox block—or warn users of—insecure plugins august 2009 study social science research network found 50 websites using flash also employing flash cookies yet privacy policies rarely disclosed user controls privacy preferences lacking browsers cache history delete functions affect flash player writing local shared objects cache user community much less aware existence function flash cookies http cookies thus users deleted http cookies purged browser history files caches may believe purged tracking data computers fact flash browsing history remains well manual removal betterprivacy addon firefox remove flash cookies adblock plus used filter specific threats flashblock used give option allowing content otherwise trusted sites charlie miller recommended install flash computer security conference cansecwest several security experts also recommend either install adobe flash player block contents web page arbitrary controlled entity owning domain named displayed address bar https used encryption used secure attackers access network changing page contents en route presented password field web page user supposed look address bar determine whether domain name address bar correct place send password example google single sign-on system used e.g youtube.com user always check address bar says nowiki https //accounts.google.com /nowiki inputting password un-compromised browser guarantees address bar correct guarantee one reason browsers generally display warning entering fullscreen mode top address bar would normally fullscreen website make fake browser user interface fake address bar attempts market hardware-based browsers running non-writable read-only file systems data stored device media overwritten presenting clean executable time loads first device zeusgard secure hardware browser released late 2013 zeusgard website functional since mid-2016 another device icloak® stik icloak website provides complete live os completely replaces computer entire operating system offers two web browsers read-only system icloak provide tor browser anonymous browsing well regular firefox browser non-anonymous browsing non-secured web traffic using https example could still subject man-in-the-middle alteration network traffic-based manipulations livecds run operating system non-writable source typically come web browsers part default image original livecd image free malware software used including web browser load free malware every time livecd image booted one effective ways browse web safely use browser patches avoid cross-origin resource sharing vulnerability example patches provided webkit-based browsers browsing world wide web least-privilege user account i.e without administrator privileges limits ability security exploit web browser compromising whole operating system internet explorer 4 later allows blacklisting whitelisting activex controls add-ons browser extensions various ways internet explorer 7 added protected mode technology hardens browser application security sandboxing feature windows vista called mandatory integrity control google chrome provides sandbox limit web page access operating system suspected malware sites reported google confirmed google flagged hosting malware certain browsers third-party extensions plugins available harden even latest browsers older browsers operating systems whitelist-based software noscript block javascript adobe flash used attacks privacy allowing users choose sites know safe adblock plus also uses whitelist ad filtering rules subscriptions though software filtering list maintainers come controversy by-default allowing sites pass pre-set filters us-cert recommends block flash using noscript modern web browsers undergo extensive fuzzing uncover vulnerabilities chromium code google chrome continuously fuzzed chrome security team 15,000 cores microsoft edge internet explorer microsoft performed fuzzed testing 670 machine-years product development generating 400 billion dom manipulations 1 billion html files
[ 3072, 2049, 6657, 5636, 10245, 10756, 9227, 9744, 9233, 2579, 4119, 9242, 4637, 9761, 2084, 4648, 9256, 9770, 6699, 9771, 46, 559, 2611, 4661, 3639, 11319, 10297, 7739, 9791, 64, 1088, 4165, 5707, 10828, 81, 10834, 10835, 8789, 6231, 6747...
Test
3,644
1
OpenInsight:openinsight openinsight database application development tool revelation technologies first released 1992 current version 10.0.1 released march 2018 openinsight windows-based development tool contains database type post-relational database known multivalue database openinsight contains tools creating database applications run windows workstations windows linux novell networks browser-based applications tools include limited table builder database manager editor debugger programming language forms designer creating data entry forms user interface tools reporting tools deployment tools openinsight programming language called basic+ extension dialect basic programming language openinsight applications use data revelation software built-in database use data sql databases rocket software rocket u2 databases well tigerlogic d3 database
[ 5929, 8340, 6797, 7983 ]
None
3,645
4
Callback_verification:callback verification callback verification also known callout verification sender address verification technique used smtp software order validate e-mail addresses common target verification sender address message envelope address specified smtp dialogue mail mostly used anti-spam measure since large percentage e-mail spam generated forged sender mfrom addresses spam detected checking whether forging resulted invalid address using method related technique call forwards secondary firewall mail exchanger verify recipients primary mail exchanger domain order decide whether address deliverable receiving mail server verifies sender address verifying parts sender address domain name part character local part part character first step establish successful smtp connection mail exchanger sender address mail exchanger found looking mx records domain dns zone second step query exchanger make sure accepts address valid one done way sending email address however process stopped mail exchanger accepts rejects recipient address steps receiving mail server would take bounce mail back sender however case mail sent smtp commands sent equivalently mail rcpt commands replaced vrfy command however vrfy command required supported usually disabled modern mtas techniques technically compliant relevant smtp rfcs rfc 5321 however rfc 2505 best current practice recommends default disabling vrfy command prevent directory harvest attacks one widespread interpretation implies mail from/rcpt pair commands also respond way stated rfcs documentation postfix exim caution use technique mention many limitations smtp callbacks particular many situations either ineffective causes problems systems receive callbacks problems caused originating systems violating stretching limits rfcs verification problems reflecting problems back senders like unintentionally used invalid addresses rejection null sender greylisting example delay caused verifying recipient closely related delay caused originator many cases turn helps originator system detect problems fix like unintentionally able receive valid bounces several problems reduced caching verification results particular systems give useful information rejecting rcpt time catch-all e-email etc remembered future call backs systems need made also results positive negative specific e-mail addresses remembered mtas like exim caching built
[ 8224, 2339, 6762, 9053, 8337, 9909, 10906, 6492, 3549, 2527 ]
Test
3,646
0
Cache_language_model:cache language model cache language model type statistical language model occur natural language processing subfield computer science assign probabilities given sequences words means probability distribution statistical language models key components speech recognition systems many machine translation systems tell systems possible output word sequences probable improbable particular characteristic cache language model contains cache component assigns relatively high probabilities words word sequences occur elsewhere given text primary means sole use cache language models speech recognition systems understand good idea statistical language model contain cache component one might consider someone dictating letter elephants speech recognition system standard non-cache n-gram language models assign low probability word elephant rare word english speech recognition system contain cache component person dictating letter may annoyed time word elephant spoken another sequence words higher probability according n-gram language model may recognized e.g. tell plan erroneous sequences deleted manually replaced text elephant time elephant spoken system cache language model elephant still probably misrecognized first time spoken entered text manually however point system aware elephant likely occur – estimated probability occurrence elephant increased making likely spoken recognized correctly elephant occurred several times system likely recognize correctly every time spoken letter completely dictated increase probability assigned occurrence elephant example consequence machine learning specifically pattern recognition exist variants cache language model single words also multi-word sequences occurred previously assigned higher probabilities e.g. san francisco occurred near beginning text subsequent instances would assigned higher probability cache language model first proposed paper published 1990 ibm speech-recognition group experimented concept group found implementation form cache language model yielded 24 drop word-error rates first hundred words document dictated detailed survey language modeling techniques concluded cache language model one new language modeling techniques yielded improvements standard n-gram approach caching results show caching far useful technique perplexity reduction small medium training data sizes development cache language model generated considerable interest among concerned computational linguistics general statistical natural language processing particular recently interest applying cache language model field statistical machine translation success cache language model improving word prediction rests human tendency use words bursty fashion one discussing certain topic certain context frequency one uses certain words quite different frequencies one discussing topics contexts traditional n-gram language models rely entirely information small number four three two words preceding word probability assigned adequately model burstiness recently cache language model concept originally conceived n-gram statistical language model paradigm adapted use neural paradigm instance recent work continuous cache language models recurrent neural network rnn setting applied cache concept much larger contexts yielding significant reductions perplexity another recent line research involves incorporating cache component feed-forward neural language model fn-lm achieve rapid domain adaptation
[ 1890, 2339, 7780, 6798, 8688, 1044, 3323, 7164, 10557, 3998 ]
Test
3,647
7
Iamus_(computer):iamus computer iamus computer cluster half-cabinet encased custom shell located universidad de málaga powered melomics technology composing module iamus takes 8 minutes create full composition different musical formats although native representation obtained whole system less second average iamus composes full pieces contemporary classical music iamus opus one created october 15 2010 first fragment professional contemporary classical music ever composed computer style rather attempting emulate style existing composers previously done david cope iamus first full composition hello world premiered exactly one year creation opus one october 15 2011 four iamus works premiered july 2 2012 broadcast live school computer science universidad de málaga part events included alan turing year compositions performed event later recorded london symphony orchestra creating album iamus new scientist reported first complete album composed solely computer recorded human musicians commenting authenticity music stephen smoliar critic classical music san francisco examiner commented primary act making music engaged performers listener responds performers ... interesting documents generated iamus capacity challenge creative talents performing musicians
[ 8569, 7983, 823 ]
Test
3,648
2
Transactional_NTFS:transactional ntfs transactional ntfs abbreviated txf component introduced windows vista present later versions microsoft windows operating system brings concept atomic transactions ntfs file system allowing windows application developers write file-output routines guaranteed either succeed completely fail completely major operating system components including system restore task scheduler windows update rely txf stability development windows vista winfs also relied txf storing files due complexity various nuances developers need consider part application development microsoft considered deprecating txf application programming interfaces apis future version windows microsoft strongly recommended developers investigate using alternatives rather adopting transactional ntfs api platform may available future versions windows transactional ntfs allows files directories created modified renamed deleted atomically using transactions ensures correctness operation series file operations done transaction operation committed operations succeed case failure entire operation roll back fail transactional ntfs implemented top kernel transaction manager windows kernel component introduced windows vista provides transactioning objects kernel ntfs file system already supports journaling low-level operations writing block data transactional ntfs expands capability include exception read operations using transactional ntfs transactions encrypting file system files supported windows vista service pack 1 windows server 2008
[ 11270, 5643, 4624, 537, 540, 3102, 9762, 8227, 8740, 1577, 10281, 1581, 2101, 10812, 10310, 1098, 7754, 10828, 4173, 4174, 9808, 4178, 10839, 603, 9819, 3170, 622, 9839, 4210, 7796, 9335, 1656, 6265, 7290, 4731, 10879, 8841, 6797, 2193, 9...
None
3,649
2
Synaptic_(software):synaptic software synaptic gtk-based graphical user interface apt package manager used debian linux distribution derivatives synaptic usually used systems based deb packages also used systems based rpm packages used install remove upgrade software packages add repositories also following features package manager enables user install upgrade remove software packages install remove package user must search navigate package mark installation removal changes applied instantly user must first mark changes apply synaptic development funded conectiva asked alfredo kojima employee write graphical front-end apt continuing work initiated creation apt rpm back-end apt-rpm
[ 11394, 11525, 2310, 10760, 2955, 7435, 6413, 7181, 7947, 2448, 8209, 8848, 3859, 10255, 1813, 6934, 4887, 6680, 7450, 8476, 1822, 3745, 6691, 5670, 4775, 6694, 7847, 6828, 6445, 6446, 7341, 7854, 7983, 1842, 8621, 9908, 823, 2872, 6583, 3...
Test
3,650
2
TSS-8:tss-8 tss-8 discontinued time-sharing operating system co-written witcraft john everett digital equipment corporation 1967 dec also referred timeshared-8 edusystem 50 operating system ran 12-bit pdp-8 computer released 1968 timesharing system like ibm call/os implemented language variants also supported dec focal developed specifically pdp 8/e provided algebraic language also desk calculator mode
[ 512, 6529, 1804, 273, 6675, 8474, 8732, 9759, 7076, 8876, 7983, 6448, 6837, 8503, 11075, 8262, 2507, 10590, 1253, 9829, 10475, 5363, 3960 ]
Test
3,651
2
William_Jolitz:william jolitz william frederick jolitz born february 22 1957 commonly known bill jolitz american software programmer best known developing 386bsd operating system 1989 1994 along wife lynne jolitz jolitz received ba computer science uc berkeley wife reside los gatos california children rebecca benjamin sarah
[ 7552, 5506, 1927, 4745, 10761, 2061, 9743, 8725, 5534, 1316, 684, 4908, 1839, 7983, 1718, 1080, 9151, 9153, 7748, 10436, 9927, 8395, 850, 6361, 9306, 10202, 3551, 607, 9320, 873, 9452, 633, 8316 ]
Test
3,652
2
Lynx_Software_Technologies:lynx software technologies lynx software technologies inc. formerly lynuxworks san jose california software company founded 1988 lynx software technologies specializes secure virtualization open reliable real-time operating system rtos originally known lynx real-time systems company changed name lynuxworks 2000 acquiring merging isdcorp integrated software devices corporation nine-year-old embedded systems company strong linux background may 2014 company changed name lynx software technologies representation company ’ forward direction lynxos rtos family products lynxsecure hypervisor continued gain increased traction current customers markets new internet connected embedded world lynx software technologies created technology successfully deployed thousands designs millions products made leading communications industrial transportation avionics aerospace/defense consumer electronics companies 1989 lynxos company flagship real-time operating system selected use nasa/ibm space station freedom project lynx software technologies operating systems also used medical industrial communications systems around world lynx software technologies held private 2000 company filed registration statement initial public offering later withdrew plans due unfavourable economic conditions lynxos company real-time operating system unix-compatible posix-compliant features predictable worst-case response time preemptive scheduling real-time priorities romable kernel memory locking lynxos 7.0 marketed military grade general purpose multi-core hard real-time operating system intended developers embed security features design process rather adding security features development security used protect user accessible also machine machine m2m based embedded devices utilizing access control lists audit quotas local trusted path account management trusted menu manager openpam 2000 lynx software technologies released first embedded linux distribution bluecat linux 1.0 specialized paravirtualized linux embedded systems virtualization 2003 company introduced lynxos-178 real-time operating system specialized version lynxos geared toward avionics applications require certification industry standards do-178b lynxos-178 commercial off-the-shelf cots rtos fully satisfies objectives do-178b level specification meets requirements integrated modular avionics developers lynxsecure hypervisor bare metal type 1 separation kernel released 2005 lynxsecure programmable processor partitioning system uses hardware virtualization capabilities modern multi-core processors isolate computing resources lynx software technologies patents lynxos technology include patent 5,469,571 operating system architecture using multiple priority light weight kernel task-based interrupt handling november 21 1995 patent 5,594,903 operating system architecture reserved memory space resident program code identified file system name space january 14 1997
[ 1350, 998, 4914, 9366, 823, 8700, 5247 ]
None
3,653
4
Scientific_Working_Group_on_Digital_Evidence:scientific working group digital evidence scientific working group digital evidence swgde brings together organizations actively engaged field digital multimedia evidence foster communication cooperation well ensure quality consistency within forensic community formed 1998 scientific working group digital evidence brings together law enforcement academic commercial organizations actively engaged field digital forensics develop cross-disciplinary guidelines standards recovery preservation examination digital evidence originally named technical working group twg digital evidence became swgde twgs renamed scientific working groups swgs 1999 order distinguish federal bureau investigation-supported long-term working groups national institute justice-supported short-term twgs swgs ongoing groups meet least per year federal state local members goal groups open lines communication law enforcement agencies forensic laboratories around world providing guidance use new innovative technologies techniques initial members swgde made federal forensic laboratories well representatives several agencies performed digital forensics outside traditional forensic laboratory soon representatives state local agencies invited participate today members federal state local law enforcement agencies academic organizations commercial entities first meeting swgde held july 1998 group defined digital evidence information probative value stored transmitted binary form includes digitized text numerals sound images video binary later changed digital swgde ’ earliest work explored principles digital forensics developed baseline definitions 1999 request group eight g8 international organization computer evidence ioce longer functioning organization swgde contributions authored set principles definitions group felt close universal possible principles published forensic science communications journal submitted g8 principles adopted g8 2001 2003 swgde published guidelines training best practices result efforts american society crime laboratory directors ascld approved digital evidence part accreditation process crime laboratories 2003 today discipline referred digital multimedia evidence comprises sub-disciplines computer forensics audio video imaging swgde membership presently consists approximately seventy maximum 100 forensic examiners scientists managers two dozen federal state local law enforcement agencies well representatives academic private research communities membership elects officers within swgde composed executive board eight standing committees ad-hoc committees appointed as-needed basis standing committees audio forensics computer forensics imaging photography quality standards video membership outreach imaging photography video committees added june 2015 scientific working group imaging technology swgit terminated operations swgde provides guidance digital forensic community publication standards guidelines best practices website swgde also encourages number published documents used standard developing organizations e.g astm international creation national international standards digital multimedia evidence one document become astm standard standard practice computer forensics astm e2763 additionally swgde may answer direct inquiries using letters position statements also typically posted website due rapidly evolving field digital forensics great deal debate regarding accreditation certification proficiency testing legislation digital forensic labs personnel tools swgde accredit certify approve qualify laboratories individuals swgde promotes establishment maintenance robust quality system publication relevant guidance documents position papers guidelines validation testing minimum requirements quality assurance swgde documents seek provide framework agencies insert criteria describe included protocol requiring particular format content swgde documents freely available community-at-large goal agencies wishing create improve digital evidence programs thoughtfully examine consider guidance documents first published draft version comment public provides public opportunity provide feedback changes objections portion document becomes final feedback reviewed accepted incorporated document published final version swgde invites interested parties review comment published draft final documents available website swgde published 40 guidance documents including joint documents swgit since inception addition releasing documents swgde members disseminate best practices law enforcement professionals digital multimedia evidence concerned carried attending lecturing meetings conferences various forensic organizations include
[ 9319 ]
Test
3,654
2
Ubuntu_JeOS:ubuntu jeos ubuntu jeos pronounced juice discontinued variant ubuntu described efficient variant ... configured specifically virtual appliances concept operating system look like context virtual appliance jeos stands enough operating system first release ubuntu jeos 7.10 since release ubuntu 8.10 included option part standard ubuntu server edition latest version jeos optimized virtualization technologies vmware inc. linux kernel-based virtual machine specifications version 8.10 include
[ 6153, 546, 9253, 11305, 56, 59, 4673, 1101, 1107, 1110, 4192, 10851, 3685, 9320, 9324, 10860, 2671, 3189, 5755, 11388, 8837, 10394, 673, 3745, 3245, 7854, 2738, 4790, 8907, 8909, 10971, 5343, 4841, 6890, 7913, 5356, 9964, 7920, 5363, 9971...
Test
3,655
7
Kevin_L._Jackson:kevin l. jackson kevin l. jackson american business executive writer served us navy fifteen years becoming senior business executive computer industry jackson currently ceo founder govcloud network consultancy formed assist agencies businesses leverage parallel global nature cloud computing jackson graduated united states naval academy 1979 bs aerospace engineering later graduated naval war college national security strategic studies degree msee computer engineering navy postgraduate school 1979 1994 jackson officer united states navy specialized space systems engineering airborne logistics airborne command control aircraft carrier pilot time navy also served national reconnaissance office operational support office provides global logistical support marine corps navy also served us navy space technology program 1996 1999 jackson served chief technology officer sentel corporation winner nasa small business innovative research program direction 1997 jackson attended first annual international symposium wearable computers behalf company featured new york times coverage event january 1999 jackson wrote speech technology magazine first time nearly 40–year history wearable computers reality meet society expectations ... ideal wearable computer would provide seamless interface aural visual communication also remain accessible user mouth ears eyes throughout range daily activities leaving sentel jackson worked senior executive private sector including companies like ibm jp morgan chase also served vice president dataline llc february 2010 jackson became general manager cloud computing services njvc year jackson named cyber security visionary us black engineer magazine 1995-96 jackson co-produced interactive cd-rom black wings chronicle african americans aviation conjunction smithsonian institution cd covers contributions african-americans made aviation america narration montel williams since 2008 jackson run cloud-computing blog entitled cloud musings kevin jackson 2011 cloud computing journal named jackson blog one top 100 blogs cloud computing united states since march 2011 jackson also written cloud musing forbes blog forbes magazine covering growing use cloud computing public private sectors 2011 jackson co-authored government training book govcloud implementation cloud brokerage service philpott 2012 jackson released book follow-up govcloud ii implementation cloud brokerage service appeared author kansas city npr november 25 2012 discussed government mandates move us federal government cloud-based network jackson previously interviewed national npr regarding federal government push cloud-computing including december 2008 incoming us president barack obama made decision convert white house computer system cloud–computing kevin l. jackson globally recognized cloud computing expert dell powermore thought leader founder/author award winning “ cloud musings ” blog jackson also recognized “ top 100 cybersecurity influencer brand ” onalytica 2015 huffington post “ top 100 cloud computing experts twitter ” 2013 “ top 50 cloud computing blogger integrators ” crn 2015 “ top 5 must read cloud blog ” bmc software 2015 next publication “ practical cloud security cross industry view ” released taylor francis spring 2016
[ 4194, 3323 ]
None
3,656
6
Chiron_FS:chiron fs chiron filesystem fault-tolerant replication file system chiron fs fuse based filesystem implements replication filesystem level like raid 1 device level replicated filesystem may kind requisite mounted need special configuration files setup simple one mount command one line fstab specific communication protocol mount time invoking parameters indicate two paths directories replicated underlying filesystems must already sync allows client use kind underlying filesystems ext3 nfs sshfs even mix every write chiron fs mount point subtree echoed underlying filesystems read chiron fs mount point subtree made one underlying filesystems using prioritized round robin algorithm one underlying filesystems fails virtualized filesystem provided chiron fs continues operating long least one replica available case failures reported log file failure write operation failed replica disabled used chiron fs available resynchronized others synchronization implemented yet chiron fs must done manually replica fails calling application receives error message would receive accessing non replicated filesystem case log report
[ 9762, 2395, 2199 ]
Test
3,657
4
POODLE:poodle poodle attack stands padding oracle downgraded legacy encryption man-in-the-middle exploit takes advantage internet security software clients fallback ssl 3.0 attackers successfully exploit vulnerability average need make 256 ssl 3.0 requests reveal one byte encrypted messages bodo möller thai duong krzysztof kotowicz google security team discovered vulnerability disclosed vulnerability publicly october 14 2014 despite paper dated september 2014 december 8 2014 variation poodle vulnerability affected tls announced cve-id associated original poodle attack f5 networks filed well see poodle attack tls section poodle exemplifies vulnerability succeeds mechanism designed reducing security sake interoperability designing systems domains high levels fragmentation extra care appropriate domains graceful security degradation may become common mitigate poodle attack one approach completely disable ssl 3.0 client side server side however old clients servers support tls 1.0 thus authors paper poodle attacks also encourage browser server implementation tls_fallback_scsv make downgrade attacks impossible another mitigation implement anti-poodle record splitting splits records several parts ensures none attacked however problem splitting though valid according specification may also cause compatibility issues due problems server-side implementations full list browser versions levels vulnerability different attacks including poodle found article transport layer security opera 25 implemented mitigation addition tls_fallback_scsv google chrome browser servers already supported tls_fallback_scsv google stated october 2014 planning remove ssl 3.0 support products completely within months fallback ssl 3.0 disabled chrome 39 released november 2014 ssl 3.0 disabled default chrome 40 released january 2015 mozilla disabled ssl 3.0 firefox 34 esr 31.3 released december 2014 added support tls_fallback_scsv firefox 35 microsoft published security advisory explain disable ssl 3.0 internet explorer windows os october 29 2014 microsoft released fix disables ssl 3.0 internet explorer windows vista server 2003 announced plan disable ssl 3.0 default products services within months microsoft disabled fallback ssl 3.0 internet explorer 11 protect mode sites february 10 2015 sites april 14 2015 apple safari os x 10.8 ios 8.1 later mitigated poodle removing support cbc protocols ssl 3.0 however left rc4 also completely broken rc4 attacks ssl 3.0.. poodle completely mitigated os x 10.11 el capitan 2015 ios 9 2015 prevent poodle attack web services dropped support ssl 3.0 examples include cloudflare wikimedia network security services version 3.17.1 released october 3 2014 3.16.2.3 released october 27 2014 introduced support tls_fallback_scsv nss disable ssl 3.0 default april 2015 openssl versions 1.0.1j 1.0.0o 0.9.8zc released october 15 2014 introduced support tls_fallback_scsv libressl version 2.1.1 released october 16 2014 disabled ssl 3.0 default new variant original poodle attack announced december 8 2014 attack exploits implementation flaws cbc encryption mode tls 1.0 1.2 protocols even though tls specifications require servers check padding implementations fail validate properly makes servers vulnerable poodle even disable ssl 3.0 ssl pulse showed 10 servers vulnerable poodle attack tls vulnerability announced cve-id f5 networks implementation bug entry nist nvd states cve-id used f5 networks implementation tls vendors whose products failure validate padding mistake implementations like a10 networks cisco systems need issue cve-ids implementation errors flaw protocol flaw protocol implementation poodle attack tls found easier initiate initial poodle attack ssl need downgrade clients ssl 3.0 meaning fewer steps needed execute successful attack
[ 1024, 513, 5636, 517, 5647, 9744, 4117, 8726, 535, 9761, 2083, 4644, 4133, 7736, 9281, 1608, 8779, 10831, 11345, 4703, 7264, 8288, 8292, 10341, 2169, 3707, 10875, 3711, 8320, 5764, 1157, 2187, 6797, 4240, 1683, 2709, 1688, 2717, 3742, 937...
Test
3,658
3
Server_Base_System_Architecture:server base system architecture server base system architecture sbsa hardware system architecture servers based 64-bit arm processors attempts standardize pe arm processing element features key aspects system architecture specified features firmware os hypervisors rely enable suitably-built single os image run hardware compliant specification architecture compliance suite check system compliant sbsa specification available open source software downloaded https //github.com/arm-software/sbsa-acs
[ 9964 ]
Test
3,659
6
Ar_(Unix):ar unix archiver also known simply ar unix utility maintains groups files single archive file today codice_1 generally used create update static library files link editor linker uses generating .deb packages debian family used create archives purpose largely replaced codice_2 purposes static libraries implementation codice_1 included one gnu binutils linux standard base lsb codice_1 deprecated expected disappear future release standard rationale provided lsb include software development utilities specify .o .a file formats ar format never standardized modern archives based common format two main variants bsd system v initially known coff used well gnu elf windows historically variants including v6 v7 aix small big coherent vary significantly common format debian .deb archives use common format ar file begins global header followed header data section file stored within ar file data section 2 byte aligned would end odd offset newline '\n 0x0a used filler file signature single field containing magic ascii string codice_5 followed single lf control character 0x0a file stored ar archive includes file header store information file common format follows numeric values encoded ascii values right-padded ascii spaces 0x20 headers include printable ascii characters line feeds archive containing text files therefore still appears text file members aligned even byte boundaries archive file member begins even byte boundary newline inserted files necessary nevertheless size given reflects actual size file exclusive padding due limitations file name length format gnu bsd variants devised different methods storing long filenames although common format suffer year 2038 problem many implementations ar utility may need modified future handle correctly timestamps excess 2147483647 bsd ar stores filenames right-padded ascii spaces causes issues spaces inside filenames 4.4bsd ar stores extended filenames placing string 1/ followed file name length file name field storing real filename front data section bsd ar utility traditionally handle building global symbol lookup table delegates task separate utility named ranlib inserts architecture-specific file named codice_6 first archive member system v ar uses '/ character 0x2f mark end filename allows use spaces without use extended filename stores multiple extended filenames data section file name // record referred future headers header references extended filename storing followed decimal offset start filename extended filename data section format // file simply list long filenames separated one lf characters note decimal offsets number characters line string number within // file system v ar uses special filename denote following data entry contains symbol lookup table used ar libraries speed access symbol table built three parts recorded together contiguous data system v systems use format described symbol lookup table operating systems hp-ux 11.0 information stored data structure based som file format special file terminated specific sequence end assumed last symbol name read windows variation adds second special stores extended symbol cross-reference table stored sorted using little-endian integers overcome 4 gib file size limit operating system like solaris 11.2 use variant instead 32-bit integers 64-bit integers used symbol lookup tables furthermore string /sym64/ instead used identifier table create archive files class1.o class2.o class3.o following command would used unix linkers usually invoked c compiler codice_7 read codice_1 files extract object files codice_9 archive containing codice_10 codice_11 codice_12 libclass.a placed standard library path like /usr/local/lib linking
[ 515, 9733, 9735, 6664, 521, 7196, 2599, 3114, 8236, 2095, 10817, 5706, 10317, 4174, 5711, 10857, 8306, 5754, 5759, 5256, 6281, 4750, 2198, 3222, 6812, 7847, 7356, 2755, 2245, 1741, 722, 10967, 9946, 3804, 6369, 9444, 8940, 237, 4845, 1775...
Test
3,660
7
Managed_private_cloud:managed private cloud managed private cloud refers principle software architecture single instance software runs server serving single client organization tenant managed third-party third-party provider responsible providing hardware server also preliminary maintenance contrast multitenancy multiple client organizations share single server on-premises deployment client organization hosts software instance managed private clouds also fall larger umbrella cloud computing need private clouds arose due enterprises requiring dedicated service infrastructure cloud computing needs business critical operations improved security better control resources managed private cloud adoption popular choice among organizations rise due enterprises requiring dedicated cloud environment preferring avoid deal management maintenance future upgradation costs associated infrastructure services operational costs unavoidable on-premises private cloud data centers managed private cloud cuts upkeep costs outsourcing infrastructure management maintenance managed cloud provider easier integrate organization ’ existing software services applications dedicated cloud hosting infrastructure customized client ’ needs instead public cloud platform whose hardware infrastructure/software platform individualized client customers choose managed private cloud deployment usually choose desire efficient cloud deployment also need service customization integration available single-tenant environment chart shows key benefits different types deployments shows overlap cloud solutions chart shows key drawbacks since deployments done single-tenant environment usually cost-prohibitive small medium-sized businesses server upkeep maintenance handled service provider including network management security client charged services upto potential client determine managed private cloud solution aligns business objectives budget service-provider maintains upkeep servers network platform infrastructure sensitive data typically stored managed private clouds may leave business-critical information prone breaches via third-party attacks cloud service provider common customizations integrations include software companies taken variety strategies managed private cloud realm software organisations provided managed private cloud options internally microsoft companies offer on-premises deployment option definition enable third-party companies market managed private cloud solutions managed private cloud service providers others popular webconferencing products like cisco webex citrix go-to-meeting skype available via multitenancy available managed private cloud environment
[ 448, 929, 4194, 6018, 3819, 5371, 4604 ]
None
3,661
1
Bidirectionalization:bidirectionalization computer science bidirectionalization refers process given source-to-view transformation automatically finding mapping original source updated view updated source 589426
[ 9634, 11542 ]
None
3,662
6
Allocation_group:allocation group ag allocation group subvolume file system maintains track free blocks file data makes simultaneous file operations possible one write happen ag time multiple operations performed file system happening different ag smp systems multiple cpus write different ags enabling physically concurrent disk operations single file system hard disks one thing time however file systems span hard disks various ways raid stripe volume management etc. used file systems
[ 9762, 10051, 1801, 1776, 2197, 246, 2199 ]
None
3,663
0
Content_determination:content determination content determination subtask natural language generation involves deciding information communicated generated text closely related task document structuring consider nlg system summarises information sick babies suppose system four pieces information communicate bits information included generated texts three general issues almost always impact content determination task illustrated example perhaps fundamental issue communicative goal text i.e purpose reader example instance doctor wants make decision medical treatment would probably interested heart rate bradycardias parent wanted know child would probably interested fact baby given morphine crying second issue size level detail generated text instance short summary sent doctor 160 character sms text message might mention heart rate bradycarias longer summary printed multipage document might also mention fact baby morphine iv final issue unusual unexpected information example neither doctors parents would place high priority told baby temperature normal expected case regardless content determination important users indeed many cases quality content determination important factor user perspective determining overall quality generated text three basic approaches document structuring schemas content templates statistical approaches explicit reasoning schemas templates explicitly specify content generated text well document structuring information typically constructed manually analysing corpus human-written texts target genre extracting content template texts schemas work well practice domains content somewhat standardised work less well domains content fluid medical example statistical techniques use statistical corpus analysis techniques automatically determine content generated texts work infancy mostly applied contexts communicative goal reader size level detail fixed example generation newswire summaries sporting events explicit reasoning approaches probably attracted attention researchers basic idea use ai reasoning techniques knowledge-based rules planning pattern detection case-based reasoning etc examine information available communicated including unusual/unexpected communicative goal reader characteristics generated text including target size decide optimal content generated text wide range techniques explored consensus effective
[ 2440, 10847, 7599 ]
Test
3,664
2
Android_TV:android tv android tv version android operating system designed digital media players developed google replacement google tv features user interface designed around content discovery voice search surfacing content aggregated various media apps services integration recent google technologies assistant cast knowledge graph platform first unveiled june 2014 nexus player launch device unveiled october platform also adopted smart tv middleware companies sony sharp android tv products also adopted set-top boxes number iptv television providers android tv first announced google i/o june 2014 successor commercially unsuccessful google tv verge characterized line digital media player platforms leveraging google knowledge graph project chromecast compatibility larger emphasis search closer ties android ecosystem including google play store integration android families android wear focusing supporting video games platform support bluetooth gamepads google play games framework attendees received platform development kit adt-1 information reported adt-1 based scrapped nexus tv launch device developed internally google google unveiled first android tv device nexus player developed asus hardware event october 2014 android tv platform adaptation android os set-top boxes integrated software smart tv hardware home screen uses vertically-scrolling row-based interface including content discovery area populated suggested content followed watch rows surface media content installed apps android tv supports voice input commands universal search across multiple services selected devices also support google assistant android tv devices support google cast allowing media queued supported apps devices identical manner chromecast android tv supports software google play store including media apps games although google play apps compatible android tv thus available android tv devices nvidia shield razer forge tv also marketed microconsoles bundled bluetooth wireless gamepad version android tv provided service operators implement android tv device provide subscribers access consume media content operator customize home screen embedded services onto device running android tv google i/o 2014 google announced sharp sony tp vision would release smart tvs android tv integrated 2015 noted support handling tv-specific functions input switching tuning natively integrated android platform sony unveiled range bravia smart tvs running android tv ces 2015 sharp television sets became available june 10 2015 beginning release two models philips announced 80 2015 tvs run android tv first two models released june 2015 google announced television hardware partners january 2016 including arcelik bang olufsen hisense rca tcl corporation vestel several television providers released set-top boxes based android tv including lg uplus u+ tvg woofer u+ tvg 4k uhd french isp free freebox mini 4k bouygues telecom bbox miami dish network released android tv device 2017 known airtv player marketed companion sling tv service supporting optional adapter attaching antenna receive over-the-air television ericsson added android tv support mediafirst iptv platform used basis canadian services telus pik tv sasktel maxtv stream vodafone australia currently selling tv tuner media streaming device running android tv
[ 4096, 5637, 8719, 3600, 7700, 9244, 11294, 1578, 10284, 5677, 8237, 3633, 4147, 1083, 6212, 69, 8262, 4683, 4685, 11343, 1107, 8280, 8285, 2658, 8821, 11391, 1670, 7816, 1674, 5262, 6800, 11408, 10393, 8858, 7835, 673, 7841, 1700, 8870, 1...
Validation
3,665
9
FAUST_(programming_language):faust programming language faust functional audio stream domain-specific purely functional programming language implementing signal processing algorithms form libraries audio plug-ins standalone applications faust program denotes signal processor mathematical function applied input signal fed faust programming model combines functional programming approach block diagram syntax faust program ’ describe sound group sounds signal processor program source organized set definitions least definition keyword codice_1 equivalent codice_2 c faust compiler translates faust code c++ object may interface c++ code produce full program generated code works sample level therefore suited implement low-level dsp functions like recursive filters code may also embedded self-contained depend dsp library runtime system deterministic behavior constant memory size semantics faust driven simple well-defined allows faust compiler semantically driven instead compiling program literally compiles mathematical function denotes may promote component reuse moreover access exact semantics faust program simplify preservation issues faust textual language block diagram oriented combines two approaches functional programming algebraic block diagrams constructed via function composition faust relies block diagram algebra five composition operations faust programs define codice_1 function operates incoming data analogous codice_2 function programming languages following example produces silence second example copies input signal output involves codice_5 primitive denotes identity function signals another example sums stereo signal mono signal using codice_6 primitive faust primitives analogous c counterpart numbers lifted signals example faust primitive codice_7 operates signal x applying c function codice_7 sample x c numerical functions counterpart faust signal processing primitives specific faust example delay operator codice_9 takes two input signals x signal delayed delay applied produces output signal x − contrary max-like visual programming languages user manual connections faust primitives assembled block diagrams using set high-level block diagram composition operations using sequential composition operator codice_10 output codice_6 routed input codice_12 compute absolute value signal example parallel composition using codice_13 operator arranges left right expressions parallel analogous stereo cable operators arbitrarily combined following code multiplies input signal 0.5 may rewritten curried form recursive composition operator codice_14 used create block diagrams cycles include implicit one-sample delay example integrator takes input signal x computes output signal x t−1 using specific architecture files faust program used produce code variety platforms plug-in formats architecture files act wrappers describe interactions host audio gui system 10 architectures supported new ones may implemented anyone useful option makes possible generate block diagram representation program one svg graphic files useful note difference block diagram generated c++ code stated key idea compile block diagram literally mathematical function denotes modern c/c++ compilers also ’ compile programs literally complex semantics c/c++ due side effects pointer aliasing etc ’ go far direction distinct advantage purely functional language allows compilers advanced optimisations faust semantics almost haskell arrows type class however arrow type class bound signal processors arrow combinators restrictive faust counterparts e.g. nesting parallel composition preserved inputs operands codice_15 must match exactly
[ 7172, 8964, 9224, 6797, 8958, 7571, 6933, 6810, 1952, 3876, 5037, 7983, 823, 9783, 8262, 3665, 3413, 7769, 9565, 7535, 2804, 5492, 9210, 2045, 7550 ]
Test
3,666
4
E-Stewards:e-stewards e-stewards initiative electronics waste recycling standard created basel action network program organization created grew concern electronic waste generated wealthy countries dismantled poor countries often underage workers young workers exposed toxic metals working unsafe conditions 2009 ban published e-stewards standard responsible recycling reuse electronic equipment set forth requirements becoming certified e-stewards recycler—a program recognizes electronics recyclers adhere stringent environmentally socially responsible practices recovering hazardous electronic materials recyclers qualified older pledge program 1 september 2011 achieve certification standard e-stewards accredited certification body accredited anab ansi-asq national accreditation board e-stewards standard responsible recycling reuse electronic equipment developed basel action network industry-specific environmental management system standard basis e-stewards initiative 6 march 2012 ban released updated revised version 2.0 open public comment prior final adoption later spring 2012 certification available electronics recyclers refurbishers achieve e-stewards certification organizations subject initial stage stage ii audit passing audits accepted ban yearly surveillance audits take place ensure organizations standard registered iso 14001 environmental management system place well achieving numerous performance requirements including assuring export hazardous electronic wastes developing countries use prison labor dumping toxic materials municipal landfills
[ 6658, 1477, 11534, 2867, 403, 7579 ]
Test
3,667
2
OpenPKG:openpkg openpkg open source package management system unix based well known rpm-system allows easy unified installation packages onto common unix-platforms solaris linux freebsd project launched ralf s. engelschall november 2000 june 2005 offered 880 freely available packages
[ 8068, 11525, 3462, 8582, 10760, 2955, 7435, 6797, 7947, 9487, 788, 1813, 5397, 8213, 6680, 10900, 10394, 8476, 9245, 5155, 5670, 4775, 7722, 6828, 5677, 6446, 1842, 823, 2872, 6583, 5819, 10172, 190, 9151, 10817, 8644, 9671, 5578, 5067, 3...
Test
3,668
0
Martin_Kay:martin kay martin kay computer scientist born 1935 known especially work computational linguistics born raised united kingdom received m.a trinity college cambridge 1961 1958 started work cambridge language research unit one earliest centres research known computational linguistics 1961 moved rand corporation santa monica california us eventually became head research linguistics machine translation left rand 1972 become chair department computer science university california irvine 1974 moved xerox palo alto research center research fellow 1985 retaining position xerox parc joined faculty stanford university half-time currently professor linguistics stanford university honorary professor computational linguistics saarland university born edgeware middlesex great britain 1935 studied linguistics computational linguistics trinity college cambridge main interests translation people machines computational linguistic algorithms especially fields morphology syntax kay began career cambridge language research unit cambridge england margaret masterman 1961 david g. hays hired work rand corporation subsequently worked university california irvine xerox parc kay one pioneers computational linguistics machine translation responsible introducing notion chart parsing computational linguistics notion unification linguistics generally ron kaplan pioneered research application development finite-state morphology longtime contributor critic work machine translation seminal paper proper place men machines language translation kay argued mt systems tightly integrated human translation process reviewer critic eurotra verbmobil many mt projects kay former chair association computational linguistics president international committee computational linguistics research fellow xerox parc 2002 holds honorary doctorate gothenburg university kay received lifetime achievement award association computational linguistics sustained role intellectual leader nlp research 2005 1 martin kay proper paper 1 alpac report 1966 conclusion made immediate predictable prospect useful mt producing useful translation general scientific texts 2 result field machine translation entered dark period 1966 1976 almost ten years researches done however 1980s renaissance period coming 3 proper place men machines language translation attracted attention machine translation paper new thoughts achieved relationship machine translation human translation time application cheaper computers broad usage domains machine translation high quality outputs badly needed theory fully automatic high quality translation ideal level machine translation criticisms bar-hillel 1960s review mt progress goal mt fully automatic high quality translation fahqt replace human translators instead mt adopt less ambitious goals e.g cost-effective human-machine interaction aim enhancement human translation productivity 4 useful human translation promoted new higher level according thought martin kay proposed practical idea relationship human machine process machine translation called translator amanuensis 1.1 two arguments useful machine translation idea includes human machine time computer scientists linguists responsibilities mt never asked provide engineering solution problem dimly understand need achieve done absolute surety reliability …can virtually guaranteed concerned main parts translation two related arguments plausibility machine translation industrial enterprise point view linguistics computer science two arguments commonly made ad hoc solutions problems machine translation former argument ad hoc solutions tend based case-by-case analyses linguists call surface phenomena essentially strings words real imagined statistical properties particular styles writing domains discourse simple statistical claim dismissed second argument ad hoc solutions alluded understanding second language reading text called sorcerer apprentice kind argument effect kind incomplete theory linguists computer scientists able provide often worse base build practical devices theory theory know stop main problem sorcerer's-apprentice argument decision sentence could translated without analysis made fact example sentence shows one interpretation sentence level analysis shows single translation compatible short algorithm required decide analysis required would use results analysis designed avoid 1.2 translator amanuensis translation memory main part paper illustrate translator amanuensis author showed three aspects text editing translation aids machine translation suppose translators provided terminal consisting keyboard screen way pointing individual words letters display screen divided two windows text translated appears upper window translation composed bottom one form translator amanuensis real device never windows behave way using pointing device translator select letter word sentence line paragraph pressing appropriate key cause operation visited upon two figures show translation process initial display selection device simple two figures special service made translator translation aids author showed third figure relatively trivial addition would dictionary translator selects word sequence words gives command cause looked up…this new window gives effect overlaying portion windows already present case new window contains deceptively simple dictionary entry selected word device many features example simplicity dictionary entry words syntax semantics included pointing symbols modifiable dictionary entries temporary amendments make device practical machine translation explained one options offered user hypothetical system describing fairly early stage command direct program translate currently selected unit happen command given different different stages system development user system always empowered intervene translation process extent specifies elects intervene piece text purporting translate current unit displayed lower window screen able edit way likes post-editors done past alternatively may ask consulted whenever program confronted decision specified type certain kinds ambiguities detected whatever occasions system put question human translator may example ask consulted questions pronominal reference part idea translation memory shown dictionary operation suppose example word put local store – part dictionary persists long document worked – occurs text significantly frequently statistics stored main dictionary indicate phrase noted occurs two three times recognized idiom set phrase dictionary examining contents store embarking translation user may hope get preview difficulties ahead make decisions advance treat decisions course recorded store course indeed reason whatever translator call display units text contain certain word phrase string characters whatever important reference translating text text piece text translated next anything entirely straightforward translator might start issuing command causing system display anything store might relevant bring attention decisions made actual translation started statistically significant words phrases record anything attracted attention occurred going examine past future fragments text contain similar material 1.3 expectation better performance translator amanuensis end paper kay mentioned reasons expect better performance device first system position draw human collaborator attention matters likely need second decisions made course translating passage rarely independent third one important facilities system one keeps track words phrases used special way current text
[ 1890, 9379, 7724, 4942, 2831, 2326, 10456, 7164 ]
Test
3,669
2
Execute_Channel_Program_in_Real_Storage:execute channel program real storage ibm mainframe operating systems execute channel program real storage excpvr supervisor call low-level device access programmer responsible providing list device-specific ccws channel program executed i/o channels control units devices additionally programmer expected required ensure input/output data areas real storage fixed either prior invoking excpvr via page fix appendage excpvr situations provide improved performance compared excp excpvr may viewed historically v=r i.e. virtual=real version excp however excpvr restricted v=r applications indeed excpvr may refer non-v=r data areas provided data areas fixed channel command words reference data areas translated virtual real addresses programmer using lra load real address privileged instruction data channels deal real addresses virtual addresses excpvr first introduced svs continued mvs/370 later instances os support added format 1 ccws hence access data areas line format 0 ccws may access data areas line excpvr front-end always tcb mode excpvr type 1 svc mvs/370 subsequent instances os excpvr invokes startio schedule execution channel program hence excpvr back-end always srb mode back-end contains emulation code allows appendages developed earlier pre-mvs instances os function largely thereby appear tcb mode appendages originally designed distinction complicate conversion certain roll-your-own access methods applications mvs
[ 8290, 868, 7272, 8393, 4586, 11656, 10094, 7983, 7312, 8911, 10415, 10072, 10958, 6647, 2616, 11131, 7836, 2813 ]
Test
3,670
2
Screen_Sharing:screen sharing screen sharing vnc client apple inc. included part mac os x v10.5 allows remote observance control macintosh machine local network screen sharing activated may also used internet via ichat screen sharing vnc client may also used control computer running vnc server ip address target computer known accessible apple back mac feature mobileme service offers wide-area bonjour allow screen sharing file sharing access beyond lan
[ 4615, 5647, 1042, 6700, 4657, 1074, 576, 9802, 5713, 4184, 2141, 4702, 2149, 8303, 6771, 2676, 9343, 3719, 10888, 11402, 8852, 1686, 7318, 5784, 3228, 2207, 1699, 5292, 8877, 1710, 3766, 2232, 9912, 9406, 1729, 6849, 713, 9418, 3790, 9430...
Test
3,671
4
ARX_(Algorithmic_Research_Ltd.):arx algorithmic research ltd. arx algorithmic research ltd. digital security company headquartered san francisco ca offices uk netherlands australia israel creator cosign arx digital signature technology along related digital signature security technology products arx acquired docusign may 2015 acquisition builds three-year business partnership docusign arx bringing together arx cosign digital signature technology docusign digital transaction management dtm platform broadens docusign global trust network arx digital signature products based public key infrastructure pki technology digital signatures resulting cryptographic operation creates ‘ fingerprint ’ unique signer content copied forged tampered process provides proof signer identity data integrity non-repudiation signed documents verified without need proprietary verification software company cosign solution integrates large range document management workflow automation systems intended streamline workflow processes requiring signatures arx partners document management workflow solution providers including sharepoint opentext oracle alfresco nintex k2 industries focus include life science particularly research clinical trials engineering legal federal/local governments arx clients based north america africa europe asia-pacific italy cosign used ministry defence rai senate court accounts state police bank italy also used european court human rights digitize streamline application process arx solutions validated security standards nist fips 140-2 level 3 fips 186 etsi ts 101 733 2013 cosign named “ strongest digital signature solution ” 2013 report august 2014 cosign received common criteria eal4+ certification thus becoming first remote server-side digital signature solution fully compliant eu newly enacted electronic identification trust services regulation electronic transactions internal market eidas arx solutions also comply esign ueta fda 21 cfr part 11 sox hipaa usda among many signature-related country- industry-specific laws regulations arx founded 1987 prof. amos fiat yossi tulpan focused developing encryption-based products included rsa-smartcard developed canal+ 1989 secure-pin entry keyboard connected smartcard reader cryptographic toolkits network-attached cryptographic server hsm vpn september 1997 arx acquired cylink corp nasdaq cylk sunnyvale california 2001 company went management buy-out mbo initiated dr. gadi aharoni dr. aharoni served president ceo arx 14 years leadership company gradually switched focus newly developed cosign digital-signature solution may 2015 arx acquired u.s. competitor docusign
[ 7075, 420, 8904, 10831, 10962 ]
Test
3,672
2
Files_(Apple):files apple files file management app developed apple inc. devices run ios 11 later releases ios discovered placeholder title app store prior company 2017 worldwide developers conference app officially announced conference shortly thereafter files allows users browse local files stored within apps well files stored cloud storage services including icloud dropbox google drive onedrive allows saving opening organization files including placement structured folders sub-folders ipads able drag-and-drop files files apps iphone users limited drag-and-drop inside files organization done use color-coded custom-named tags persistent search bar allows finding files inside folders though inside apps list view enables different sorting options app offers exclusive playback high-quality flac audio files also offers support viewing text files images music memos zip archives well limited support video hours apple 2017 worldwide developers conference developer steve troughton-smith discovered placeholder title app store files app requiring ios 11 apple officially announced app conference shortly thereafter files allows users browse local files stored within apps well files stored cloud storage services including icloud box dropbox google drive onedrive users able save open organize files including placing files structured folders sub-folders ipad users drag-and-drop files files app apps iphone functionality limited inside respective app users add colored custom-named tags files adding dedicated tags section persistent search bar top enables finding files inside sub-folders though n't search within apps list view enables optional sorting according size date upon long-pressing file app offers several options including copy rename move share tags info delete files stored third-party services copied device offline access icloud sharing brought apple dedicated iwork apps become standardized feature across operating system enabling sharing file files dedicated icloud drive app removed replaced files icloud available one cloud storage providers users connect app to.. built-in player inside files app allows playback high-quality flac audio files app also supports viewing zip archives though extraction opportunities available compatible app installed files allows viewing text files experiments watching videos avi mov formats shown limited partially successful results images music memo files also previewed played
[ 10755, 9732, 4623, 5647, 7697, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8783, 4180, 10838, 1623, 3681, 9826, 8806, 3691, 2673, 7292, 2686, 6783, 10878, 5784, 1177, 3228, 2207, 11430, 2735, 3248, 4283, 3772, 7869, 3286, 9430, 3293, ...
None
3,673
4
IronPort:ironport ironport systems inc. headquartered san bruno california company designed sold products services protect enterprises internet threats ironport founded december 2000 scott banister scott weiss best known ironport antispam senderbase email reputation service email security appliances appliances ran modified freebsd kernel trademark asyncos november 24 2003 ironport acquired spamcop filtering reporting service ran stand-alone entity cisco systems announced january 4 2007 would buy ironport deal valued us 830 million completed acquisition june 25 2007 ironport integrated cisco security business unit senderbase renamed sensorbase take account input database cisco devices provide sensorbase allows devices build risk profile ip addresses therefore allowing risk profiles dynamically created http sites smtp email sources
[ 1088, 7552, 11104, 1667, 998, 6834, 9909, 4797, 2558 ]
None
3,674
2
Ricardo_Galli:ricardo galli dr. ricardo adolfo galli granada also known gallir doctor computer science university balearic islands teaches operating system design speaker free software foundation free software activist university project created system allows controlling airship parking son sant joan airport palma de mallorca balearic islands spain december 2005 programmed menéame clone well-known digg web site serves promote stories published blogs released source code meneame source code open source digg clone pligg cms based programmed cpudyn daemon used underclock portable computers reduce power consumption programmed wp-cache wordpress plugin purpose caching pages make one blog faster responsive 2001 nominated hispalinux prize published 200 technical articles bulma catalan linux user web site
[ 2050, 1028, 2180, 4230, 11654, 9865, 4493, 1939, 2332, 10012, 3744, 802, 3618, 4265, 11180, 7983, 6962, 5555, 2233, 9148, 10687, 8258, 10822, 5703, 5833, 4561, 8147, 1112, 2010, 7904, 8673, 9696, 10464, 3817, 9579, 1007, 8304, 1394, 8436, ...
Test
3,675
9
Emacs_Lisp:emacs lisp emacs lisp dialect lisp programming language used scripting language emacs text editor family commonly associated gnu emacs xemacs used implementing editing functionality built emacs remainder written c lisp interpreter emacs lisp also termed elisp although also older unrelated lisp dialect name users emacs commonly write emacs lisp code customize extend emacs options include customize feature gnu emacs since version 20 written emacs lisp customize provides set preferences pages allowing user set options preview effect running emacs session user saves changes customize simply writes necessary emacs lisp code user config file set special file customize uses avoid possibility altering user file emacs lisp also function scripting language much like unix bourne shell perl calling emacs batch mode way may called command line via executable file editing functions buffers movement commands available program normal mode user interface presented emacs started batch mode simply executes passed-in script exits displaying output script emacs lisp closely related maclisp later influence common lisp supports imperative functional programming methods richard stallman chose lisp extension language rewrite emacs original used text editor corrector teco extension language powerful features including ability treat functions data although common lisp standard yet formulated scheme existed time stallman rewriting gosling emacs gnu emacs chose use comparatively poor performance workstations opposed minicomputers emacs traditional home wanted develop dialect thought would easily optimized lisp dialect used emacs differs substantially modern common lisp scheme dialects used applications programming prominent characteristic emacs lisp use dynamic rather lexical scope default see function may reference local variables scope called scope defined understand logic behind emacs lisp important remember emphasis providing data structures features specific making versatile text editor implementing general-purpose programming language example emacs lisp easily read file line time—the entire file must read emacs buffer however emacs lisp provides many features navigating modifying buffer text sentence paragraph higher syntactic level defined modes follows simple example emacs extension written emacs lisp emacs editing area split separate areas called windows displaying different buffer buffer region text loaded emacs memory possibly file saved text document users press default c-x 2 key binding open new window runs emacs lisp function codice_1 normally new window appears displays buffer previous one suppose wish make display next available buffer order user writes following emacs lisp code either existing emacs lisp source file empty emacs buffer first statement codice_2 defines new function codice_3 calls codice_1 old window-splitting function tells new window display another new buffer second statement codice_5 re-binds key sequence c-x 2 new function also written using feature called advice allows user create wrappers around existing functions instead defining advantage requiring keybindings changed working wherever original function called well simpler write disadvantage making debugging complicated reason advice allowed source code gnu emacs user wishes advice feature used code reimplement code follows instructs codice_1 execute user-supplied code whenever called executing rest function advice also specified execute original function around it—literally wrapping original conditionally execute original function based results advice emacs 24.4 replaces codice_7 mechanism codice_8 claimed flexible simpler advice could reimplemented using new system changes take effect soon code evaluated necessary recompile restart emacs even rehash configuration file code saved emacs init file emacs load extension next time starts otherwise changes must reevaluated manually emacs restarted emacs lisp code stored filesystems plain text files convention filename suffix .el user init file exception often appearing .emacs despite evaluated emacs lisp code recent versions emacs recent 40-year-old program meaning roughly version released since mid-1990s also load ~/.emacs.el ~/.emacs.d/init.el additionally users may specify file load config file command line explicitly state config file loaded files loaded interpreter component emacs program reads parses functions variables storing memory available editing functions user commands functions variables freely modified redefined without restarting editor reloading config file order save time memory space much functionality emacs loads required set optional features shipped emacs implemented collection emacs code called package library example library highlighting keywords program source code library playing game tetris library implemented using one emacs lisp source files libraries define one major modes activate control function emacs developers write certain functions c. primitives also termed built-in functions subrs although primitives called lisp code modified editing c source files recompiling gnu emacs primitives available external libraries part emacs executable xemacs runtime loading primitives possible using operating system support dynamic linking functions may written primitives need access external data libraries otherwise available emacs lisp called often enough comparative speed c versus emacs lisp makes worthwhile difference however errors c code easily lead segmentation violations subtle bugs crash editor writing c code interacts correctly emacs lisp garbage collector error-prone number functions implemented primitives kept necessary minimum byte-compiling make emacs lisp code execute faster emacs contains compiler translate emacs lisp source files special representation termed bytecode emacs lisp bytecode files filename suffix .elc compared source files bytecode files load faster occupy less space disk use less memory loaded run faster bytecode still runs slowly primitives functions loaded bytecode easily modified re-loaded addition bytecode files platform-independent standard emacs lisp code distributed emacs loaded bytecode although matching source files usually provided user reference well user-supplied extensions typically byte-compiled neither large computationally intensive notably cl package implements fairly large subset common lisp emacs lisp unlike lisp implementations tail-call optimization without tail recursions eventually lead stack overflow apel library aids writing portable emacs lisp code help polysylabi platform bridge emacs lisp lisp-2 meaning function namespace separate namespace uses variables like maclisp emacs lisp uses dynamic scope offering static lexical option starting version 24 activated setting file local variable codice_9 dynamic scoping programmer declares variable within scope function available subroutines called within function originally intended optimization lexical scoping still uncommon uncertain performance asked rms implementing emacs lisp dynamically scoped exact reply lexical scope inefficient dynamic scoping also meant provide greater flexibility user customizations however dynamic scoping several disadvantages firstly easily lead bugs large programs due unintended interactions variables different functions secondly accessing variables dynamic scoping generally slower lexical scoping also codice_10 macro cl package provide effective lexical scope emacs lisp programmers cl widely used codice_10 rarely used
[ 10752, 11269, 2056, 2062, 9231, 7184, 2577, 9749, 8728, 4633, 4122, 8226, 3119, 564, 9780, 2102, 2105, 3132, 6717, 5694, 8258, 8771, 8778, 1613, 9299, 10841, 10333, 7267, 2660, 8293, 10855, 2666, 2166, 5751, 7805, 9345, 5251, 1159, 9865, ...
Test
3,676
6
Dat_(software):dat software dat data distribution tool version control feature tracking changes publishing data sets primarily used data-driven science used keep track changes data set distributed revision control system aimed speed simplicity security support distributed non-linear workflows dat created max ogden 2013 standardize way data analysts collaborate changes make data sets developed dat team funding support code science john s. james l. knight foundation alfred p. sloan foundation dat free software distributed terms revised bsd license 3-clause one main implementations beaker web browser seamlessly handles dat // urls allows building seeding dat websites homebase server-side permanent seeding tool dat
[ 4229, 3462, 4490, 11029, 3350, 534, 10522, 5026, 3366, 7983, 823, 3770, 8640, 11073, 708, 6351, 3792, 6991, 7761, 5085, 3428, 3813, 9320, 7921, 1908, 4725, 5749, 9332 ]
None
3,677
3
Roadrunner_(supercomputer):roadrunner supercomputer roadrunner supercomputer built ibm los alamos national laboratory new mexico usa us 100-million roadrunner designed peak performance 1.7 petaflops achieved 1.026 petaflops may 25 2008 become world first top500 linpack sustained 1.0 petaflops system november 2008 reached top performance 1.456 petaflops retaining top spot top500 list also fourth-most energy-efficient supercomputer world supermicro green500 list operational rate 444.94 megaflops per watt power used hybrid roadrunner design reused several energy efficient supercomputers roadrunner decommissioned los alamos march 31 2013 place los alamos commissioned supercomputer called cielo installed 2010 cielo smaller energy efficient roadrunner cost 54 million ibm built computer u.s. department energy doe national nuclear security administration hybrid design 12,960 ibm powerxcell 8i 6,480 amd opteron dual-core processors specially designed blade servers connected infiniband roadrunner used red hat enterprise linux along fedora operating systems managed xcat distributed computing software also used open mpi message passing interface implementation roadrunner occupied approximately 296 server racks covered became operational 2008 decommissioned march 31 2013 doe used computer simulating nuclear materials age order predict whether usa aging arsenal nuclear weapons safe reliable uses roadrunner included science financial automotive aerospace industries roadrunner differed contemporary supercomputers continued hybrid approach supercomputer design introduced seymour cray 1964 control data corporation cdc 6600 continued order magnitude faster cdc 7600 1969 however architecture peripheral processors used operating system functions applications ran one central processor previous supercomputers used one processor architecture since thought easier design program realize full potential roadrunner software written specially hybrid architecture hybrid design consisted dual-core opteron server processors manufactured amd using standard amd64 architecture attached opteron core ibm-designed -fabricated powerxcell 8i processor supercomputer roadrunner considered opteron cluster cell accelerators node consists cell attached opteron core opterons roadrunner development 2002 went online 2006 due novel design complexity constructed three phases became fully operational 2008 predecessor machine also developed los alamos named dark horse machine one earliest hybrid architecture systems originally based arm moved cell processor entirely 3d design design integrated 3d memory networking processors number technologies first phase roadrunner building standard opteron based cluster evaluating feasibility construct program future hybrid version phase 1 roadrunner reached 71 teraflops full operation los alamos national laboratory 2006 phase 2 known aais advanced architecture initial system included building small hybrid version finished system using older version cell processor phase used build prototype applications hybrid architecture went online january 2007 goal phase 3 reach sustained performance excess 1 petaflops additional opteron nodes new powerxcell processors added design powerxcell processors five times powerful cell processors used phase 2 built full scale ibm ’ poughkeepsie new york facility broke 1 petaflops barrier fourth attempt may 25 2008 complete system moved permanent location new mexico summer 2008 roadrunner used two different models processors first amd opteron 2210 running 1.8 ghz opterons used computational nodes feeding cells useful data system operations communication nodes passing data computing nodes helping operators running system roadrunner total 6,912 opteron processors 6,480 used computation 432 operation opterons connected together hypertransport links opteron two cores total 13,824 cores second processor ibm powerxcell 8i running 3.2 ghz processors one general purpose core ppe eight special performance cores spe floating point operations roadrunner total 12,960 powerxcell processors 12,960 ppe cores 103,680 spe cores total 116,640 cores logically triblade consists two dual-core opterons 16 gb ram four powerxcell 8i cpus 16 gb cell ram physically triblade consists one ls21 opteron blade expansion blade two qs22 cell blades ls21 two 1.8 ghz dual-core opterons 16 gb memory whole blade providing 8gb cpu qs22 two powerxcell 8i cpus running 3.2 ghz 8 gb memory makes 4 gb cpu expansion blade connects two qs22 via four pcie x8 links ls21 two links qs22 also provides outside connectivity via infiniband 4x ddr adapter makes total width four slots single triblade three triblades fit one bladecenter h chassis expansion blade connected opteron blade via hypertransport connected unit 60 bladecenter h full triblades 180 triblades triblades connected 288-port voltaire isr2012 infiniband switch cu also access panasas file system twelve system x3755 servers cu system information final cluster made 18 connected units connected via eight additional second-stage infiniband isr2012 switches cu connected twelve uplinks second-stage switch makes total 96 uplink connections overall system information ibm roadrunner shut march 31 2013 supercomputer one fastest world energy efficiency relatively low roadrunner delivered 444 megaflops per watt vs 886 megaflops per watt comparable supercomputer supercomputer dismantled researchers spend one month performing memory data routing experiments aid designing future supercomputers ibm roadrunner dismantled electronics shredded los alamos perform majority supercomputer destruction citing classified nature calculations parts retained historical purposes
[ 9472, 643, 7812, 1933, 10780, 9762, 6311, 7983, 306, 10675, 6072, 9277, 1985, 8899, 6597, 1480, 9932, 3025, 6738, 1115, 859, 11618, 9445, 4587, 1776, 6004, 1784, 3323, 6909 ]
Test
3,678
7
Popular_Power:popular power popular power company founded january 2000 sold distributed computing software cpu scavenging company led marc hedlund ceo nelson minar cto popular power worker software downloadable java-based application internet users could install onto computers allowed users computers participate non-profit project develop influenza vaccine although popular power able raise 1.6 million angel round funding unable close venture capital needed continue result permanently shut operations march 2001
[ 3449, 6421 ]
None
3,679
3
Ali_Baba_and_40_Thieves_(video_game):ali baba 40 thieves video game ali baba 40 thieves maze arcade game released sega 1982 players take role famous arabian hero must fend kill forty thieves trying steal money game based folk tale name ported msx platform vector-06c port made based msx version clone sinclair zx spectrum published suzy soft 1985 name ali baba
[ 1776, 10931, 9006 ]
None
3,680
3
Cycle_stealing:cycle stealing computing traditionally cycle stealing method accessing computer memory ram bus without interfering cpu similar direct memory access dma allowing i/o controllers read write ram without cpu intervention clever exploitation specific cpu bus timings permit cpu run full speed without delay external devices access memory actively participating cpu current activity complete operations possible cpu conflict systems nearly dual-port ram without expense high speed ram systems halt cpu steal essentially making form dma another name example system separate instruction data memory banks allow external devices one memory access data bank cpu fetching instruction instruction bank accesses initiated simultaneously memory management unit essential example zilog z80 m1 line used distinguish instruction data access cpu reading instruction instruction-ram rom data ram available devices without interfering cpu processing cycle stealing difficult achieve modern systems due many factors pipelining pre-fetch concurrent elements constantly accessing memory leaving predictable idle times sneak memory access dma formal predictable method external devices access ram term less common modern computer architecture 66-100 mhz various external buses controllers generally run different rates cpu internal operations longer closely coupled i/o bus operations unexpected cycle stealing rendezvous radar descent nearly caused apollo 11 landing aborted design apollo guidance computer allowed landing continue dropping low-priority tasks ibm 1130 cycle steal really dma cpu clock stopped memory access several i/o controllers access ram way self-arbitrate via fixed priority scheme controllers deliberately pace ram access minimize impact system ability run instructions others graphic video adapters operate higher speed may slow system cycle-stealing concept 1130 permits cpu program start operation i/o device continue mainline program i/o device performing operation i/o device operates manner takes steals cycle cpu needed cpu tied one cycle data character transferred frequency devices steal cycles depends type device since cpu much faster i/o device system cpu may performing another function arithmetic time i/o operation performed fact several i/o operations may overlapped cpu functions cycle stealing cause major performance degradation machine sinclair ql economy reasons video ram dual access consequently m68008 cpu denied access memory bus zx8301 master controller accessing memory machine performed poorly compared machines using similar processors similar speeds
[ 664, 8523, 3936, 9599 ]
Test
3,681
2
IOS_13:ios 13 ios 13 thirteenth major release ios mobile operating system developed apple inc. successor ios 12 announced company worldwide developers conference june 3 2019 scheduled released september 2019. ios 13 ipados 13 introduced software engineering director craig federighi apple worldwide developers conference keynote address june 3 2019 first beta made available registered developers following keynote second beta available registered developers june 18 2019 first public beta released june 24 2019 public releases ios 13 ipados 13 expected made available fall 2019. ios 13 contains changes handling location data app requests access location user choose whether grant access whenever using app user also receive similar prompts background location access app requests access bluetooth wi-fi august 2019 reported beginning april 2020 pushkit api voip restricted internet telephony usage closing loophole used apps background data collection system-wide dark mode implemented allowing users enable light-on-dark color scheme entire ios ipados user interface native applications well supported third-party apps manually turned set automatically switch light dark modes based time day ios 13 introduces updated volume indicator appears left side screen opposed previous versions indicator located center screen user slide finger volume indicator change system volume siri uses software-generated voice called neural tts instead using clips human voices allow siri sound natural siri also become functional new sound control available siri shortcuts app installed default siri also use homepods learn recognize voices different people also possible siri read messages aloud quicktype virtual keyboard features quickpath allowing user swipe finger across keyboard complete words phrases functionality previously exclusively available via certain third-party keyboard applications swiftkey gboard emoji stickers included emoji keyboard available use anywhere regular emoji input new systemwide gesture interface added cut copy paste undo redo ios 13 ipados 13 three-finger swipe left undo three fingers right redo single three-finger pinch copy second three-finger pinch cut three-finger spread pastes three-finger single tap bring shortcut menu five options blue text cursor moved around text fields pressing holding pick move many new options text selection also added – double tapping word select triple tapping selects sentence quadruple tapping paragraph selects new single sign-on implementation known sign apple implemented allowing users create accounts third-party services minimal amount information users option generate disposable email address site improving privacy anonymity reduces amount information associated single email address ios applications support third-party login methods facebook google must support sign apple system ios human interface guidelines recommend developers place sign apple option login methods several improvements performance ios13 implemented face id iphone x xs xs max iphone xr unlocks devices 30percent faster ios12 app downloads 50percent smaller due new format app updates 60percent smaller version ios available ipad devices renamed ipados noting platform functionality differences compared ios iphone ipod touch ios13 adds official support sony dualshock 4 microsoft xbox one controller ios13 also adds support wireless audio sharing airpods certain beats headphones new multi-select gesture available supported applications files mail multiple items files emails quickly selected dragging two fingers desired items user profiles created memoji used imessage profile picture ios devices a9 processor newer create custom memoji memoji animoji used sticker imessage apps also available regular emoji use anywhere emoji keyboard available variety new customization options memoji maps app features redesigned maps ui featuring detailed maps look around street level imagery implementation similar google street view redesigned rebuilt ground new features ability suggest reminder delivered user ability tag contacts references reminders surfaced elsewhere messages photos app includes redesigned ui uses machine learning auto-hide clutter images screenshots documents photos redesigned interface showing users photos took past year month week day bringing photos one page showing photos based device suggests ios13 drops support several devices including devices apple a8 chip earlier devices 1gb ram also marks first time 64-bit devices dropped devices longer supported ios13 include iphone 5s iphone 6 6 plus sixth-generation ipod touch differentiate features iphones ipads ios 13 specific iphone ipod touch apple rebranded tablet oriented platform operating system ipados
[ 10755, 9732, 1549, 4111, 5647, 7697, 11289, 6186, 4139, 6700, 1074, 8754, 9784, 8253, 8767, 576, 5696, 8774, 8783, 4180, 10838, 1623, 3672, 9308, 3167, 9826, 8806, 3691, 2673, 7292, 2686, 6783, 10878, 5784, 1177, 3228, 2207, 10406, 11430, ...
None
3,682
0
Jussi_Karlgren:jussi karlgren jussi karlgren swedish computational linguist adjunct professor kth co-founder text analytics company gavagai ab holds phd computational linguistics stockholm university title docent adjoint professor language technology helsinki university jussi karlgren known pioneered application computational linguistics stylometry continued work bringing non-topical features text attention information access research field karlgren research focused questions relating information access genre stylistics distributional pragmatics evaluation information access applications distributional models karlgren half finnish descent fluent finnish
[ 1890, 10452 ]
Test
3,683
9
Yamanner:yamanner yamanner worm computer worm written javascript targeted vulnerability yahoo mail service released june 12 2006 worm spread yahoo system infecting systems opened e-mails sending user address book remote server
[ 803, 3462, 2041, 7515, 8735 ]
Validation
3,684
2
PacBSD:pacbsd pacbsd formerly known arch bsd operating system based arch linux uses freebsd kernel instead linux kernel gnu userland pacbsd project began arch linux forum thread april 2012 aims provide arch-like user environment utilizing openrc init system pacman package manager rolling-release
[ 10016, 5067, 5356, 7983, 4978, 5363, 5397, 11573, 7483, 9151 ]
Test
3,685
2
HandyLinux:handylinux handylinux linux distribution originating france derived debian stable branch designed especially inexperienced computer users mind distribution low system requirements allowing used range older hardware longer supported latest versions proprietary operating systems aimed particularly older people dated hardware need possess skill use many features afforded state-of-the-art operating systems may also useful computer users disabilities visually impaired goal handylinux project provide stable debian-based os elderly novices people seeking freedom full functionality user-friendly desktop handylinux official debian derivative simple clear graphical user interface called handymenu features built-in tools facilitate handling home computing documentation teaches users desktop navigation helps learn handylinux distribution prospective users encouraged browse handylinux online forum ask questions operating system handylinux installed modern computer processor pentium 4 higher 512 mb ram system requires 3.7 gb available hard drive storage distribution run either two live versions live cd handylinuxlight live usb sample prepackaged software test compatibility installed hardware alternatively installed netbook equipped least 4 gb memory computers built 2005 handylinux i486 non pae computers built 2005 onward handylinux i686-pae choose users remove castors i.e. remove default handymenu substitute classical menu xfce desktop environment add software packages customize look feel distribution becoming experienced os reading documentation software needed functional desktop included disk image internet connection necessary install program bundle prepackaged handylinux operating system tools integrated improving accessibility inverter color filter screen direct access documentation screen magnifier copy paste button virtual keyboard voice synthesis integrated browser small practical programs also included screenshot calendar file search automatic sorting download folder bleachbit cleaning archive manager archive manager disk utility formatting hardinfo system information xl-wallpaper wallpaper changer handylinux native desktop environment based xfce compiz compositing window manager optional users may switch traditional xfce menu prefer handymenu seven-tab menu large computer icon enables users graphically launch applications single click necessary open files folders run program handylinux updates generally follow updates debian stable branch development fork handylinux finnish language published may 29 2014
[ 4611, 3079, 3089, 4113, 8209, 8727, 4637, 543, 11297, 7204, 9253, 11305, 5681, 56, 3129, 4153, 59, 8248, 9276, 3649, 4673, 3654, 5190, 3147, 2125, 1107, 1110, 89, 5721, 4192, 9324, 10860, 5742, 2671, 11388, 1150, 2692, 8837, 9353, 9873, ...
None