node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
3,786 | 4 | Phillip_Porras:phillip porras phillip a. porras computer scientist security researcher known work combating conficker worm porras leads internet security group sri international computer science laboratory previously manager trusted computer systems department aerospace corporation porras holds 12 u.s. patents named sri fellow 2013 porras attended university california irvine porras author patents involved 2008 case sri international inc. v. internet security systems inc.. conficker worm initial attack porras running honeypot one first security researchers notice part conficker cabal helped combat worm porras team sri published extensive analysis worm 2010 porras co-author blade collaboration sri georgia tech researchers designed prevent drive-by download malware attacks porras named sri fellow 2013 long-term work information security malware analysis recent research openflow | [
9256,
5373,
3555,
4275
] | Test |
3,787 | 3 | Ballblazer:ballblazer ballblazer 1984 futuristic sports game created lucasfilm games originally released atari 8-bit family ported atari 5200 apple ii zx spectrum amstrad cpc commodore 64 msx later atari 7800 nintendo famicom game called ballblaster development pirated versions game went name well principal creator programmer ballblazer david levine 1990 lucasarts rainbow arts released remake follow-up game called masterblazer game released amiga atari st ms-dos march 31 1997 remake original titled ballblazer champions released sony playstation ballblazer simple one-on-one sports-style game bearing similarities basketball soccer side represented craft called rotofoil controlled either human player computer-controlled droid ten levels difficulty game allows human vs. human human vs. droid droid vs. droid matches basic objective game score points either firing carrying floating ball opponent goal game takes place flat checkerboard playfield player half screen presented first-person perspective player gain possession ball simply running point held force field front craft opponent attempt knock ball away player using fire button player possession ball also fire ball toward goal player possession ball rotofoil automatically turns 90-degree intervals face ball possessing ball turns player toward opponent goal goalposts move side side end playfield goals scored goal becomes narrower pushing ball goal scores one point firing ball posts close range scores two points successfully scoring long range goalposts visible scores three points maximum number total points two players ten meaning points scored would take combined total ten cause opponent score reduced amount resulting kind tug war scoring system game ends either player successfully scores ten points timer runs time runs score tied game goes sudden death first player score wins ballblazer theme music called song grid heard matches algorithmically generated technique designed lucasfilm games team leader peter langston called riffology lead melody assembled predefined set 32 eight-note melody fragments riffs put together randomly algorithm also makes choices several parameters including fast play riff loud play omit elide notes insert rhythmic break melody accompanied bassline drums chords also assembled fly simplified version approach effect music plays forever without repeating without straying far original theme langston experienced jazz rock folk musician said ballblazer music one reviewer eminent jazz player nowiki /nowiki pat metheny said sounded like john coltrane think best compliment far atari 7800 version one rare releases system use pokey additional sound chip sample ballblazer music commodore 64 version computer gaming world stated quick intense ballblazer squeezes atari 400/800 game 've ever seen ... spectacular graphics info rated ballblazer four stars five stating undoubtedly fastest game available 64 recommending gamers strobe-like reflexes zzap 64 gave enthusiastic review commodore 64 version game criticism weak sound effects overall rating 98 game described best sports simulation hit 64 yet | [
9166,
9006
] | Test |
3,788 | 3 | General_Instrument_AY-3-8910:general instrument ay-3-8910 ay-3-8910 3-voice programmable sound generator psg designed general instrument 1978 initially use 16-bit cp1610 one pic1650 series 8-bit microcomputers ay-3-8910 variants used many arcade games—konami gyruss contains five—and pinball machines well sound chip intellivision vectrex video game consoles amstrad cpc oric-1 colour genie elektor tv games computer msx later zx spectrum home computers also used mockingboard cricket sound cards apple ii speech/sound cartridge trs-80 color computer general instrument spinoff microchip technology 1987 chip sold years microchip brand instead also produced license yamaha minor modifications i.e selectable clock divider pin double-resolution double-rate volume envelope table ym2149f atari st uses version produced similar results texas instruments sn76489 market similar period chips longer made functionally-identical clones still active production unofficial vhdl description freely available use fpgas ay-3-8910 essentially state machine state set series sixteen 8-bit registers programmed 8-bit bus used addressing data toggling one external pins instance typical setup cycle would put bus address mode select register switch data mode set contents register bus implemented natively gi cpus recreated glue logic help additional interface adapter mos technology 6522 chip used much common mos technology 6502 zilog z80 cpus six registers controlled pitches produced three primary channels wavelength generate held two eight-bit registers dedicated channel value limited 12-bits reasons total 4095 register value used frequency divider 0 treated 1 different pitches another register controlled period pseudo-random noise generator total 31 different cycle times another controlled mixing noise three primary channels three additional registers controlled volume channels well turning optional envelope controls finally last three registers controlled times envelope controller setting envelope type envelope cycle time total eight envelope types include sawtooth shape triangle shape starting either maximum minimum shape also set repeat cycling effect total 65535 different cycle times set one envelope shared three channels many programmers ignored programmed envelope controllers software controlling volume directly well known trick run hardware envelope cycle times 20hz produce sawtooth pulse-wave like bass sounds although 16 registers four msb bits 8-bit bus must set factory default '0000 value selecting register incorrectly setting msb bits causes chip ignore register change general instruments take orders customized msb bits factory set '0000 chips made customize-set msb register bits allow processor control one ay chip bus e.g mockingboard sound card apple turbosound zx spectrum many new-old-stock nos chips secondary market msb bits factory set non-'0000 value non-0000 value cause significant developmental troubles designers repair technicians software must written identify correct value msb bits given chip also software must changed hardware added allow factory set msb chips used place default '0000 chips ay-3-8910 generates tones base frequencies 125 khz 4 mhz input clock 8 mhz ym2149f well beyond human perception ultrasonic range existence ultrasonic values consequence frequency-divider design order adequate resolution audible frequencies necessary overall clock rate thus output small divisors considerably higher audible range divisors 5 give entirely-ultrasonic output frequencies frequencies equivalent top octave piano keyboard defined reasonable accuracy versus accepted note values even-tempered scale nearly 1 hz precision a440 range even finely lower pitches despite high maximum frequency ability divide figure 4096 means lowest directly definable output frequency 30.6 hz roughly equal b0 third lowest note normal 88-key piano good subsonic everyday speaker systems essence chip able produce decently musical output reasonable pitches found compositions contrast sn76489 10 bits precision frequency dividers base frequency 125 khz theory lack two lowest octaves psg get around sn76489 plays tone generators one octave lower calculated frequency giving one octave less bass one octave less top compared psg 8910 silicon chip sold three different packages ay-3-8910 two general-purpose 8-bit parallel i/o ports b available 40-pin package name ay-3-8912 chip 28-pin package parallel port b simply connected pins smaller packages save cost board space 8912 widely used variant ay-3-8913 chip 24-pin package parallel ports connected users thought small reduction pin count 8912 made less interesting however i/o registers rarely used designers general instruments created fully functional 24 pin alternative released approximately 6 months 8910 8912 chips goal reduce complexity designer reduce foot print pcb yamaha ym2149f 'ssg chip pinout ay-3-8910 minor difference pin 26 could halve master clock pulled low left unconnected would replacing ay-3-8910 chip internal resistor pulls pin high master clock halved yamaha ym3439 cmos version ym2149f available two packages 40-pin dip ym3439-d 44-pin qfp ym3439-f yamaha ymz294 one newest variants ym2149 18-pin package parallel ports one sound output three channels mixed yamaha ymz284 even smaller variation ym2149 16-pin package basically ymz294 without 4/6 mhz selection pin /test pin yamaha ymz285 28-pin package features built-in pcm parallel ports two sound outputs one three ssg channels mixed pcm output toshiba t7766a compatible chip pinout ay-3-8910 used msx models winbond wf19054 jfc 95101 file kc89c72 pinout ay-3-8910 also 100 software compatible 're still production used many slot machines ay-3-8914 pinout 40-pin package ay-3-8910 except control registers chip shuffled around 'expected input a9 pin may different otherwise exactly ay-3-8910 used mattel intellivision ay-3-8930 also known ay8930 enhanced mostly-backwards-compatible version ay-3-8910 function bc2 pin changed ignored assumed 0 regardless pin state otherwise pinout ay-3-8910 variant chip adds number major enhancements separate envelopes three channels opposed one shared envelope variable duty-cycles bits precision note frequency volume envelope frequency much configurable noise generator used covox sound master sound card ibm-pc games took advantage beyond normal ay-3-8910 features chip may produced microchip technology although chip n't designed handle raw pcm data digital sound effect could simulated chip used simple based mixing function combining noise tone three channels could persuaded produce level non-zero wave altering volume level wave could shaped waveform involved cpu usage chips designed purpose mos technology 8364 paula used amiga nevertheless technique widely used platforms atari st less frequently amstrad cpc play sampled music zx spectrum 128 msx play short audio samples games thing fewer times per second order 30 300 per second allows use arbitrary software-defined envelope three channels individually takes negligible cpu power provided timer interrupt vertical blank interrupt used games turn useless envelope functionality set high frequency actually generating waveform usual square wave thanks timbre-altering effects amplitude modulation however obtain harmonic results modulating envelope must related pitch desired note granularity high-frequency envelopes set low music composed chip generally uses technique bass lines another method set one channel output idle high use volume control simple logarithmic 4-bit digital-to-analog converter however resulted poor audio quality 16 output levels logarithmically spaced sophisticated method use three channels wired together exploit non-linearity mixing produce many intermediate output levels modeled non-linearity three channels developers find suitable values exhaustive search done produced 8-bit 3×4-bit lookup table allowed 8-bit audio samples played fairly adequately though well real 8-bit d/a converter problem technique player change volume three channels single operation implies unwanted output levels two successive samples yamaha used ym2149 core produce whole family music chips used mobile phones home computers home arcade video game systems etc example ym2203 also known opn ym2149 plus fm well far advanced successors ym2608 also known opna retained previous features greatly expanded upon ym2612 also known opn2 cut-down ym2608 removed many features including ym2149 sound channels i/o ports ym2610 opnb added features retained ym2149 sound i/o ports | [
7041,
8198,
5265,
786,
6547,
1958,
4518,
7591,
1194,
4524,
9006,
2226,
3762,
5942,
4666,
7108,
2642,
4690,
9947,
7651,
9957,
7281,
4082
] | None |
3,789 | 4 | Stars_virus:stars virus stars virus computer virus infects computers running microsoft windows named discovered iranian authorities april 2011 iran claimed used tool commit espionage western researchers came believe probably thing duqu virus part stuxnet attack iran stars virus studied laboratory iran – means major vendors antivirus software access samples therefore could assess potential relation duqu stuxnet foreign computer experts say seen evidence virus even doubt actual existence iran claiming stars harmful computer systems said inflict minor damage initial stage might mistaken executable files governmental organizations second attack claimed iran stuxnet computer worm discovered july 2010 targeted industrial software equipment researchers came believe stars virus found iranian computer specialists duqu virus duqu virus keylogger embedded jpeg file since file taken keylogger portion image remained turned image taken hubble telescope showing cluster stars aftermath two galaxies colliding symantec kaspersky crysys researchers came believe duqu stars virus | [
1024,
5636,
4117,
8726,
535,
9761,
4644,
4133,
7739,
10309,
1608,
3657,
8779,
4703,
8288,
8292,
10875,
3711,
8320,
5764,
2187,
6797,
4240,
1688,
2717,
9375,
2213,
9904,
9395,
8886,
4304,
6360,
4314,
9435,
4830,
3807,
5349,
1254,
10477,
94... | Test |
3,790 | 2 | Core_Foundation:core foundation core foundation also called cf c application programming interface api macos ios mix low-level routines wrapper functions apple releases open-source project called cflite used write cross-platform applications macos linux windows third-party open-source implementation called opencflite also exists extends apple distribution building windows linux environments core foundation routines follow certain naming convention deal opaque objects example cfdictionaryref functions whose names begin cfdictionary objects often reference counted manually codice_1 codice_2 internally core foundation forms base types objective-c standard library well prevalent use core foundation passing primitive types data including raw bytes unicode strings numbers calendar dates uuids well collections arrays sets dictionaries numerous macos c routines primarily gui-related operating system level core foundation also provides standardized application preferences management codice_3 bundle handling run loops interprocess communication codice_4 codice_5 basic graphical user interface message dialog codice_6 parts api include utility routines wrappers around existing apis ease use utility routines perform actions file system network i/o codice_7 codice_8 codice_9 endianness translation byte order utilities examples wrapper routines include core foundation wrapper routines unix sockets cfsocket api types core foundation toll-free bridged interchangeable simple cast foundation kit counterparts example one could create codice_10 core foundation type later simply use standard c cast convert objective-c counterpart codice_11 use desired objective-c methods object one normally would core foundation plug-in model cfplugin based microsoft component object model | [
10755,
9732,
4615,
1549,
10765,
5647,
7697,
1042,
11289,
9762,
6186,
6700,
4657,
1074,
9784,
8253,
576,
9802,
8783,
5713,
4180,
3670,
10838,
4184,
2141,
4702,
2146,
9826,
2149,
5733,
8806,
3691,
8303,
6771,
2676,
6264,
2686,
6783,
7806,
9... | Test |
3,791 | 2 | SUSE_Linux:suse linux suse linux computer operating system built top free open source linux kernel distributed system application software open source projects suse linux german origin basically acronym “ software und system-entwicklung ” software systems development mainly developed europe first version appeared early 1994 making suse one oldest existing commercial distributions known yast configuration tool novell bought suse suse brands trademarks 2003 novell one founding members open invention network decided make community important part development process opening widely distribution development outside contributors 2005 creating opensuse distribution opensuse project novell employed 500 developers working suse 2004 27 april 2011 novell suse acquired attachmate group made suse independent business unit later october 2014 entire attachmate group including suse acquired british firm micro focus international suse continues operate independent business unit 2 july 2018 announced micro focus would sell suse blitz 18-679 gmbh subsidiary eqt partners 2.535 billion gesellschaft für software und system entwicklung mbh lit company software system development founded 2 september 1992 nuremberg germany roland dyroff thomas fehr burchard steinbild hubert mantel three founders still mathematics students university fehr already graduated working software engineer original idea company would develop software function advisory unix group according mantel group decided distribute linux offering support name founding s.u.s.e chosen german acronym software und system-entwicklung meaning software systems development full name never used however company known s.u.s.e shortened suse october 1998 2003 capitalized suse official logo current mascot distribution veiled chameleon officially named geeko portmanteau gecko geek following competition company name geeko logo brand evolved time reflect name changes company started service provider among things regularly released software packages included softlanding linux system sls defunct slackware also printed unix/linux manuals offered technical assistance third party products suse initially used characteristics managed suse different fashions building distribution linux s.u.s.e used first slackware 1992 jurix distribution defunct 1996 starting point created florian la roche joined s.u.s.e team began develop yast installer configuration tool would become central point distribution 1996 first distribution name s.u.s.e linux published s.u.s.e linux 4.2 version number caused much discussion version 1.1 using number 4.2 intentional reference answer ultimate question life universe everything hitchhiker guide galaxy science fiction novels english writer douglas adams yast first version number 0.42 similar reference time suse linux incorporated many aspects red hat linux rpm package manager file structure s.u.s.e became largest linux distributor germany 1997 suse llc established direction president managing partner james gray oakland california enabled company develop linux markets americas asia red hat ubiquitous united states suse linux continued grow germany well nordic countries finland sweden october 1998 name changed officially suse without dots linus torvalds creator linux kernel used fairly often suse entered uk 1999 2001 company forced reduce staff significantly order survive 4 november 2003 novell announced would acquire suse linux ag 210 million acquisition finalized january 2004 move reach business audience effectively suse introduced suse linux enterprise server 2001 months novell purchase changed company name suse linux suse name acronym according j. philips novell corporate technology strategist asia pacific region novell would medium term alter way suse developed novell annual brainshare conference 2004 first time computers run suse linux announced proprietary suse administration program yast2 would released gpl license 4 august 2005 novell announced suse professional series would become open launch opensuse project community software always open source opensuse opened development process allowing developers users test develop previously development work accomplished in-house suse version 10.0 first version offered public beta testing suse linux 10.0 included open source proprietary applications retail boxed-set editions part change yast online update server access became free suse linux users also first time gnome desktop upgraded equal status traditional kde november 2005 suse founder hubert mantel announced resignation company stated novell acquisition changed suse beyond expectations believe company founded 13 years earlier resignation apparently stemmed dispute implementation ximian products gnome-based default desktop environment linux distribution re-joined year later 3 november 2006 renewed 25 july 2011 novell signed agreement microsoft covering improvement suse ability interoperate microsoft windows cross-promotion/marketing products patent cross-licensing agreement considered controversial free software community 22 november 2010 novell announced agreed acquisition attachmate group 2.2 billion attachmate group plans operate novell two units suse becoming stand-alone business anticipates change relationship suse business opensuse project result transaction u.s. department justice announced order proceed first phase acquisition certain patents patent applications novell inc. cptn holdings llc owners would alter original agreements address department antitrust concerns department said originally proposed deal would jeopardize ability open source software linux continue innovate compete development distribution server desktop mobile operating systems well middleware virtualization products stipulations regarding licensing patents acquisition completed 27 april 2011 subsequently 23 july 2011 attachmate group launched new website suse business 20 november 2014 attachmate group merged micro focus form micro focus group suse operated separate business unit dedicated product portfolio 2 july 2018 announced micro focus would sell suse business segment eqt partners 2.535 billion suse provides thirteen-year product life cycle suse linux enterprise 11 12 detailed eol eos eoxs end-of-extended-support information see suse linux available two brands opensuse suse linux enterprise opensuse free community distribution driven opensuse project includes latest bleeding edge linux technologies designed home users enthusiasts suse linux enterprise suse tested certified open-source solution major enterprises opensuse freely available community project releases versions comparatively frequent basis generally uses latest versions various open source projects includes suse linux enterprise suse commercial edition suse releases much less frequently enabling offer support effectively enterprise production deployments certified wide variety enterprise applications offers number special enterprise features including high availability point sale extensions suse historically uses heavily-tested subset packages opensuse linux basis suse linux enterprise suse offers suse linux enterprise server suse linux enterprise desktop focuses packages fit specific purpose example suse linux enterprise desktop include apache web server suse linux enterprise server include xgl/compiz contrast opensuse separate distributions server desktop tablets rather repositories contain needed software use installation patterns accomplish opensuse driven opensuse project community sponsored suse develop maintain suse linux components equivalent historic suse linux professional acquisition suse linux novell suse decided make community central development process theoretical development cycle 8 months lifetime duration critical updates 18 months date release fully freely available immediate download opensuse sixth popular linux distribution 2013 fourth popular 2014 according distrowatch suse develops multiple products enterprise business line business products target corporate environments higher life cycle 10 years extendable 13 longer development cycle 6 18 months guarantee stability potential expense development speed technical support certification independent hardware software vendors suse linux enterprise products available sale updates fees suse linux enterprise fewer packages opensuse distribution differences desktop applications suited consumers business enterprise products installed using linux kernel novell open enterprise server oes uses suse linux enterprise server platform product also known oes-linux suse linux enterprise included vmware vsphere licensing june 25 2014 'free noted suse partners website suse suse studio product web interface built using ruby rails opensuse kiwi open build service tools allowed users put together custom linux distribution graphically generate output including large variety virtual machine disk images suse studio merged open build service resulting project renamed suse studio express september 2017 | [
514,
6153,
3594,
15,
6675,
5142,
7204,
9253,
11305,
4145,
10804,
56,
5689,
59,
4673,
8772,
3142,
9799,
1110,
9827,
3685,
10860,
2671,
9839,
9332,
11388,
2689,
2179,
2693,
8837,
9353,
657,
5273,
10394,
10397,
673,
3745,
5800,
3245,
7854,
... | Test |
3,792 | 4 | NAT_traversal:nat traversal network address translator traversal computer networking technique establishing maintaining internet protocol connections across gateways implement network address translation nat nat traversal techniques required many network applications peer-to-peer file sharing voice ip nat devices allow use private ip addresses private networks behind routers single public ip address facing internet internal network devices communicate hosts external network changing source address outgoing requests nat device relaying replies back originating device leaves internal network ill-suited hosting servers nat device automatic method determining internal host incoming packets destined problem general web access email however applications peer-to-peer file sharing voip services video game consoles require clients servers well incoming requests easily correlated proper internal host furthermore many types services carry ip address port number information application data potentially requiring substitution deep packet inspection network address translation technologies standardized result methods used nat traversal often proprietary poorly documented many traversal techniques require assistance servers outside masqueraded network methods use server establishing connection others based relaying data increases bandwidth requirements latency detrimental real-time voice video communications nat traversal techniques usually bypass enterprise security policies enterprise security experts prefer techniques explicitly cooperate nat firewalls allowing nat traversal still enabling marshalling nat enforce enterprise security policies ietf standards based security model realm-specific ip rsip middlebox communications midcom following nat traversal techniques available recent proliferation symmetric nats reduced nat traversal success rates many practical situations mobile public wifi connections hole punching techniques stun ice fail traversing symmetric nats without help relay server practiced turn techniques traverse symmetric nats attempting predict next port opened nat device discovered 2003 yutaka takeda panasonic communications research laboratory 2008 researchers waseda university port prediction techniques effective nat devices use known deterministic algorithms port selection predictable yet non-static port allocation scheme uncommon large scale nats used 4g lte networks therefore port prediction largely ineffective mobile broadband networks ipsec virtual private network clients use nat traversal order encapsulating security payload packets traverse nat ipsec uses several protocols operation must enabled traverse firewalls network address translators many routers provide explicit features often called ipsec passthrough windows xp nat traversal enabled default windows xp service pack 2 disabled default case vpn server also behind nat device rare controversial security issue ipsec nat-t patches also available windows 2000 windows nt windows 98 nat traversal ipsec may used enable opportunistic encryption traffic systems nat traversal allows systems behind nats request establish secure connections demand hosted nat traversal hnt set mechanisms including media relaying latching used intermediaries ietf advises using latching internet recommends ice security reasons | [
4229,
10889,
4490,
1164,
1036,
14,
6541,
1942,
10522,
10908,
5405,
3742,
10271,
2985,
2093,
7214,
10417,
7859,
6964,
3770,
8640,
11073,
8386,
3011,
708,
3150,
6351,
6991,
6993,
7761,
5972,
3676,
5085,
3428,
3813,
9318,
755,
1908,
4084,
57... | Test |
3,793 | 3 | RetroArch:retroarch retroarch free open-source cross-platform front-end emulators game engines video games media players applications reference implementation libretro api designed fast lightweight portable without dependencies licensed gnu gplv3 retroarch runs programs converted dynamic libraries called libretro cores using several user interfaces command-line interface graphical user interfaces gui optimized gamepads famous one called xmb clone sony xmb several input audio video drivers plus sophisticated features like dynamic rate control audio filters multi-pass shaders netplay gameplay rewinding cheats etc retroarch ported many platforms run several pc operating systems windows macos linux home consoles playstation 3 xbox 360 wii u etc handheld consoles playstation vita nintendo 3ds etc smartphones android ios etc embedded systems raspberry pi odroid etc even web browsers using emscripten compiler formerly known ssnes initially based pseudonymous programmer byuu libretro predecessor libsnes began development 2010 hans-kristian themaister arntzen committing first change github intended replacement bsnes qt-based interface grew support emulation cores april 21 2012 ssnes officially renamed retroarch reflect change direction retroarch version 1.0.0.0 released january 11 2014 time available 7 distinct platforms february 16 2016 retroarch became one first ever applications implement support vulkan graphics api done day api official release day november 27 2016 libretro team announced alongside lakka libreelec-based retroarch operating system retroarch would patreon crowdfunding platform allow providing bounties developers fix specific software bugs cover costs matchmaking servers december 2016 gogames – company contracted video game developer publisher sega – approached retroarch developers intention using software sega forever project ultimately cooperation come fruition due licensing disagreements april 2018 input lag compensation added libretro team plans release retroarch onto steam free download integrating steamworks features platform july 2019 first major dedicated emulation title released platform major features include retroarch run libretro core retroarch available many platforms availability specific core varies per platform non-exhaustive table systems available retroarch project core based retroarch praised number systems games play single interface criticized difficult configure due extensive number options available user time praised advanced features possesses android praised fact overlays customized expandability libretro cores supports compatibility several usb bluetooth controller peripherals addition app free ads tyler loch writing ars technica said retroarch 'input lag compensation mode arguably biggest improvement experience retro gaming community yet seen | [
641,
6403,
5380,
8970,
6797,
921,
6311,
9006,
7983,
823,
1849,
8640,
3522,
7234,
8523,
10316,
2901,
11221,
8937,
5356,
5612,
1530,
8700,
2045
] | None |
3,794 | 4 | Duplicity_(software):duplicity software duplicity software suite provides encrypted digitally signed versioned remote backup files requiring little remote server released terms gnu general public license gpl duplicity free software duplicity devises scheme first archive complete full backup subsequent incremental backups add differences latest full incremental backup chains consisting full backup series incremental backups recovered point time incremental steps taken incremental backups missing incremental backups following reconstructed using gnupg librsync tar rdiff transmit data backup repository use ssh/scp/sftp local file access rsync ftp amazon s3 google cloud storage rackspace cloud files others duplicity works best unix-like operating systems linux bsd mac os x though used windows cygwin currently duplicity supports deleted files full unix permissions directories symbolic links fifos device files hard links | [
2050,
6280,
1801,
11410,
5397,
6565,
7983,
1844,
2487,
823,
9025,
11201,
7364,
1358,
5969,
10341,
5482,
8554,
5612
] | Test |
3,795 | 6 | Google_File_System:google file system google file system gfs googlefs proprietary distributed file system developed google provide efficient reliable access data using large clusters commodity hardware last version google file system codenamed colossus released 2010 gfs enhanced google core data storage usage needs primarily search engine generate enormous amounts data must retained google file system grew earlier google effort bigfiles developed larry page sergey brin early days google still located stanford files divided fixed-size chunks 64 megabytes similar clusters sectors regular file systems extremely rarely overwritten shrunk files usually appended read also designed optimized run google computing clusters dense nodes consist cheap commodity computers means precautions must taken high failure rate individual nodes subsequent data loss design decisions select high data throughputs even comes cost latency gfs cluster consists multiple nodes nodes divided two types one master node large number chunkservers file divided fixed-size chunks chunkservers store chunks chunk assigned globally unique 64-bit label master node time creation logical mappings files constituent chunks maintained chunk replicated several times throughout network default replicated three times configurable files high demand may higher replication factor files application client uses strict storage optimizations may replicated less three times order cope quick garbage cleaning policies master server usually store actual chunks rather metadata associated chunks tables mapping 64-bit labels chunk locations files make mapping files chunks locations copies chunks processes reading writing particular chunk taking snapshot chunk pursuant replicate usually instigation master server due node failures number copies chunk fallen beneath set number metadata kept current master server periodically receiving updates chunk server heart-beat messages permissions modifications handled system time-limited expiring leases master server grants permission process finite period time process granted permission master server modify chunk modifying chunkserver always primary chunk holder propagates changes chunkservers backup copies changes saved chunkservers acknowledge thus guaranteeing completion atomicity operation programs access chunks first querying master server locations desired chunks chunks operated i.e outstanding leases exist master replies locations program contacts receives data chunkserver directly similar kazaa supernodes unlike file systems gfs implemented kernel operating system instead provided userspace library google file system implement posix api files organized hierarchically directories identified pathnames file operations create delete open close read write supported supports record append allows multiple clients append data file concurrently atomicity guaranteed deciding benchmarking results used relatively small number servers 15 file system achieves reading performance comparable single disk 80–100 mb/s reduced write performance 30 mb/s relatively slow 5 mb/s appending data existing files authors present results random seek time master node directly involved data reading data passed chunk server directly reading client read rate increases significantly number chunk servers achieving 583 mb/s 342 nodes aggregating large number servers also allows big capacity somewhat reduced storing data three independent locations provide redundancy | [
4096,
5120,
2564,
6156,
6669,
3598,
8719,
3600,
10257,
7700,
6677,
5142,
8214,
9236,
3611,
9244,
9249,
9762,
5158,
10284,
3633,
5170,
7225,
11323,
8772,
4683,
11343,
3664,
1109,
8285,
2658,
4708,
9836,
7789,
8821,
9333,
119,
6263,
9335,
9... | Test |
3,796 | 4 | Vulnerability_assessment_(computing):vulnerability assessment computing vulnerability assessment process defining identifying classifying security holes information technology systems attacker exploit vulnerability violate security system known vulnerabilities authentication vulnerability authorization vulnerability input validation vulnerability deploying system first must go series vulnerability assessments ensure build system secure known security risks new vulnerability discovered system administrator perform assessment discover modules vulnerable start patch process fixes place another assessment run verify vulnerabilities actually resolved cycle assess patch re-assess become standard method many organizations manage security issues primary purpose assessment find vulnerabilities system assessment report conveys stakeholders system secured vulnerabilities intruder gained access network consisting vulnerable web servers safe assume gained access systems well assessment report security administrator able determine intrusion occurred identify compromised assets take appropriate security measures prevent critical damage system depending system vulnerability assessment many types level host assessment looks system-level vulnerabilities insecure file permissions application level bugs backdoor trojan horse installations requires specialized tools operating system software packages used addition administrative access system tested host assessment often costly term time thus used assessment critical systems tools like cops tiger popular host assessment network assessment one assess network known vulnerabilities locates systems network determines network services use analyzes services potential vulnerabilities process require configuration changes systems assessed unlike host assessment network assessment requires little computational cost effort vulnerability assessment penetration testing two different testing methods differentiated basis certain specific parameters | [
5636,
6473,
3887,
7887,
8399,
5490,
11567,
4600,
413
] | Test |
3,797 | 2 | MagiC:magic magic third party multitasking-capable tos-compatible operating system atari st range computers including newer clone machines also variants run part magicmac magicpc emulation environments kernel magic largely written hand-coded motorola 68000 assembly language offers magic originally released mag x 1992 time tos featured limited multitasking form desk accessory programs simple programs accessed desk menu multitasked using cooperative task switching contrast magic offered preemptive multitasking giving ability run multiple well-behaved gem applications well non-graphical software name changed mag x magic release version 3.0 added many improvements significant amount mint compatibility version 4.0 added support atari falcon finally 1995 version 5.0 brought significant addition loadable file system support along implementation vfat long file names number improvements gemdos layer including threads signals latest atari version 6.2 atari slow improve hardware systems apparent mid late 1990s apple mac superior hardware platform given two shared similar user interface mac logical upgrade many atari users 1995 variant magic known magicmac released allowing atari users run well-behaved software much newer mac hardware later versions magicmac offered improved integration mac os allowed well-behaved atari software access native graphics modes offered host machine addition emulations standard atari screen modes release mac os x original versions magicmac would longer run operated low level within mac os order function 2001 new version magicmac magicmacx released use mac os x updated 2004 recently september 2009 universal binary running natively powerpc intel macs summer 1996 another version released magicpc time allowing atari users run software top microsoft windows magic versions 6.0 6.2 released use clone machines manufactured medusa computer systems late 1990s include significant enhancements support fat32 increased mint compatibility support newer processors hardware found clone systems magic implementation gem desktop greatly enhanced version included original tos systems initially named magxdesk changing magicdesk release magic 3.0 offered features missing original desktop including unlike gem desktop magicdesk built magic instead could launched application startup possible start magic shell popular alternatives including jinnee thing | [
2290,
6100,
823
] | None |
3,798 | 3 | Slot_1:slot 1 slot 1 refers physical electrical specification connector used intel microprocessors including pentium pro celeron pentium ii pentium iii single dual processor configurations implemented intel switched back traditional socket interface socket 370 1999 introduction pentium ii cpu need greater access testing made transition socket slot necessary previously pentium pro intel combined processor cache dies socket 8 package connected full-speed bus resulting significant performance benefits unfortunately method required two components bonded together early production process testing possible result single tiny flaw either die made necessary discard entire assembly causing low production yield high cost intel subsequently designed circuit board cpu cache remained closely integrated mounted printed circuit board called single-edged contact cartridge secc cpu cache could tested separately final assembly package reducing cost making cpu attractive markets high-end servers cards could also easily plugged slot 1 thereby eliminating chance pins typical cpu bent broken installing socket form factor used slot 1 5-inch-long 242-contact edge connector named sc242 prevent cartridge inserted wrong way slot keyed allow installation one direction sc242 later used amd slot well two slots identical mechanically electrically incompatible discourage slot users trying install slot 1 cpu connector rotated 180 degrees slot motherboards new slot 1 intel added support symmetric multiprocessing smp maximum two pentium ii pentium iii cpus used dual slot motherboard celeron official smp support also converter cards known slotkets hold socket 8 pentium pro cpu used slot 1 motherboards specific converters however rare another kind slotket allows using socket 370 cpu slot 1 many latter devices equipped voltage regulator modules order supply new cpu lower core voltage motherboard would otherwise allow single edge contact cartridge secc used beginning slot 1-era pentium ii cpus inside cartridge cpu enclosed hybrid plastic metal case back housing plastic several markings name pentium ii intel logo hologram model number front consists black anodized aluminum plate used hold cpu cooler secc form solid cpu resting safely inside case compared socket-based cpus pins bent cpu less likely damaged improper installation cooler following secc sepp-form single edge processor package appeared market designed lower-priced celeron cpus form lacks case entirely consisting solely printed-circuit board holding components form factor called secc2 used late pentium ii pentium iii cpus slot 1 created accommodate switch flip chip packaging front plate carried coolers mounted straight pcb exposed cpu die incompatible secc cartridges historically three platforms intel p6-cpus socket 8 slot 1 socket 370 slot 1 successor socket 8 socket 8 cpus pentium pro directly l2-cache embedded cpu located outside core circuit board shared core exception later slot 1 cpus coppermine core l2-cache embedded die beginning 2000 pentium-iii-cpus fc-pga-housing appeared slot 1 slowly succeeded socket 370 intel already offered socket 370 slot 1 time since beginning 1999 socket 370 initially made low-cost celeron processors slot 1 thought platform expensive pentium ii early pentium iii models cache core embedded die slot 1 also obsoleted old socket 7 least regarding intel standard platform home-user superseding intel p5 pentium mmx cpu intel completely left socket 7 market | [
3588,
5901,
5523,
8851,
2455,
3992,
8855,
11417,
3995,
4252,
799,
6175,
7712,
7714,
10019,
4523,
2604,
2350,
6192,
9649,
4537,
7744,
7105,
4805,
7110,
3530,
3403,
4427,
8394,
4179,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
8442,
12... | Test |
3,799 | 2 | Calf_Studio_Gear:calf studio gear calf studio gear often referred calf plugins set open source lv2 plugins linux platform suite intends complete set plugins audio mixing virtual instruments mastering version 0.90.0 47 plugins suite calf studio gear development started late 2007 lv2 plugin standard infancy calf studio gear one first projects bring graphical audio plugins linux first versions 0.0.19 included support ladspa dssi well dropped december 2011 project initiated krzysztof foltman 2009 markus schmidt became interested development plugin suite due frustration proprietary software driving force behind plugins ever since responsible overall design calf studio gear well brains behind dsp many plugins calf studio gear complete suite plugins linux included plugins past calf plugins known cause crashes within ardour digital audio workstation primarily due use fftw library recently thread safe since october 2014 calf studio gear moved away using fftw library released version 0.0.60 may 2015 | [
596,
7983,
823
] | Test |
3,800 | 4 | CloudBerry_Backup:cloudberry backup cloudberry backup online backup software developed cloudberry lab software integrated 3rd-party cloud storage providers supports data backup restore windows desktop servers macos linux additionally offers support microsoft sql server microsoft exchange vmware hyper-v office 365 g suite google apps cloudberry backup available several licensed editions well free offering cloudberry backup desktop free licensed versions cloudberry managed backup saas solution designed help manage backup recovery across multiple computers servers cloudberry backup designed automate backup recovery files folders system images storage-agnostic meaning storage decoupled backup license customers work directly cloud storage providers pricing features need cloudberry backup supports 20 cloud storage providers including amazon s3 amazon glacier microsoft azure google cloud platform backblaze b2 wasabi openstack s3 compatible others cloudberry backup supports multiple data storage tiers including lower cost options like microsoft azure cool blob storage archive blob storage amazon s3 infrequent access glacier google cloud storage nearline coldline 2011 cloudberry backup released support amazon s3 subsequently updated support microsoft azure google cloud platform number cloud vendors late 2011 cloudberry lab released windows server edition followed support microsoft sql server microsoft exchange bare metal restore cloudberry backup added additional operating system support linux macos 2015 freeware version cloudberry backup also appeared year cloudberry backup written primarily c c++ programming languages windows versions also rely .net cloudberry managed backup built using c asp.net angular node.js cloudberry backup provides backup recovery functionality cloud local storage network shares backup recovery plans configured using graphical user interface command-line interface also available editions cloudberry backup supported operating systems windows macos linux cloudberry lab developed proprietary block-level algorithm speeds data uploads backups cloud addition company uses proprietary image-based algorithm back complete systems image files retaining ability recover specific files within images desired cloudberry backup supports recovery images directly cloud-based virtual server services amazon ec2 azure virtual machines google compute engine well bare-metal devices product restore system images computers operating system installed using bootable usb iso disk images cloudberry backup software supports synthetic full backup functionality amazon s3 wasabi hot storage performing typical incremental backup sequence advised perform full backups time time time resource consuming reduce bandwidth amount data uploaded synthetic full backup feature software scans data previously backed storage uploads new modified blocks instead full set files according cloudberry lab tests synthetic full backups 80 percent faster typical full image-based backup cloudberry backup perform backups microsoft sql server microsoft exchange databases recover active running state linux cloudberry backup allows users back files folders cloud storage product supports variety linux distributions including ubuntu debian suse red hat fedora centos oracle linux amazon linux cloudberry backup configured perform complete backup file directory disk image also supports incremental backup functionality block level meaning users able back new updated portions files initial backup completed backups executed manually via custom schedules cloudberry backup supports file compression 256-bit aes encryption server-side encryption encryption-at-rest cloud storage support filename encryption also available cloudberry backup provides flexible data recovery options backups restored physical virtual cloud virtual machines product restore files backup recover selected individual files product includes recovery wizard guides users data restoration process cloudberry lab features also include cloudberry backup available several editions designed address different use cases windows desktop edition intended file image-based backups whereas windows server microsoft exchange microsoft sql server ultimate editions designed meet needs businesses running windows server macos linux editions address backup needs platforms pricing cloudberry lab products based one-time purchase fee purchasers pay one-time fee computer server devices want operate cloudberry lab pricing per device per user license purchased device limit number users accounts operate product device long use product free versions cloudberry backup available personal use well cloudberry managed backup saas solution designed managed service providers msps businesses need way centrally manage backup customers within environments hosted saas solution provides means manage monitor large environments single dashboard cloudberry managed backup uses subscription-based licensing model supports white-labeling rebranded managed service providers sell backup service brand cloudberry managed backup integrated autotask connectwise optitune office 365 google g suite ninjarmm cloudberry backup received several awards including latest silver stevie award 2018 product constantly ranked one market leaders g2 crowd updates rankings every three months cloudberry lab developer cloudberry backup gold winner smb product year category best biz awards 2018 international addition awards cloudberry lab holds partnerships certifications microsoft vmware google cloud connectwise oracle openstack amazon web services | [
5504,
7905,
11201,
6565,
3366,
11178,
5612,
3629,
1358,
1935,
7983,
3573,
11030,
823
] | Train |
3,801 | 7 | Kerrighed:kerrighed kerrighed open source single-system image ssi cluster software project project started october 1998 paris research group french national institute research computer science control 2006 2011 project mainly developed kerlabs january 2012 linux clustering mission kerlabs adopted new company cluster inc. headquartered pacific grove california january 18 2012 kerrighed 3.0 ported ubuntu 12.04 linux kernel v3.2 kerrighed implemented extension linux operating system helps scientific applications numerical simulations use power applications may using openmp message passing interface and/or posix multithreaded programming model kerrighed implements set global resource management services aim making resource distribution transparent applications managing resource sharing applications taking benefit whole cluster resources demanding applications kerrighed provides development framework allowing easily implement dynamic scheduling policies without kernel modification kerrighed provides several features distributed shared memory sequential consistency model processes migration one cluster node another limited extent checkpointing kerrighed introduces container concept entity abstraction files memory kerrighed node starts 'root container local resources available access resources globally one must start kerrighed container one node add nodes kerrighed container | [
8992,
7812,
330,
118,
823,
2264,
8447
] | Test |
3,802 | 2 | Daniel_Robbins_(computer_programmer):daniel robbins computer programmer daniel robbins computer programmer consultant best known founder former chief architect gentoo linux project 2008 launched funtoo project free linux distribution based gentoo became project lead hacker organizer also currently works time albuquerque new mexico 'open source/community strategy lead zenoss president funtoo technologies time system administrator university new mexico albuquerque robbins formed distribution enoch linux later renamed gentoo 2002 however like many free software projects gentoo struggled create business model would support key developers robbins resigned chief architect 26 april 2004 citing considerable personal debt desire spend time family formed gentoo foundation transferred gentoo intellectual property gentoo run full community-based model rejoin project short time august 2006 becoming developer february 2007 joining amd64 team resigned early march 2007 several high-profile criticisms way gentoo run since robbins left ... since resignation gentoo founder benevolent dictator project 2004 newly established gentoo foundation battling lack clear directions frequent developer conflicts ... mid-july 2007 emerged robbins still technically legal president gentoo foundation ... would like see fun gentoo lot less politics apparent role president gentoo foundation may opportunity change things better need look ... 2008 robbins began work funtoo project created allow work extending technologies originally created gentoo robbins move microsoft may 2005 attracted attention within linux community historically combative relationship microsoft described role working bill hilf ... helping microsoft understand open source community-based projects ... however robbins resigned less year later 16 january 2006 due frustrations unable fully utilize technical skills position later 2006 joined fsmlabs socorro new mexico work rtlinux daniel robbins also president funtoo technologies consulting firm founded 2006 located albuquerque new mexico | [
1026,
515,
7812,
7938,
8326,
4360,
5644,
4493,
4367,
8848,
657,
10642,
1939,
2195,
1813,
2581,
2199,
3478,
6808,
7450,
11155,
10780,
1694,
6302,
7584,
802,
3618,
5410,
6691,
6947,
8354,
4011,
5931,
8364,
9646,
819,
1717,
823,
9660,
2109,
... | Test |
3,803 | 2 | Leaf_driver:leaf driver leaf driver refers device driver accesses logically physically existent devices i/o bus implements functions defined device transferring data device accessing device registers leaf devices requiring leaf drivers typical peripheral devices disks tapes network adapters framebuffer forth drivers devices export traditional character block driver interfaces use user processes read write data storage communication devices see also nexus driver | [
3842,
7983
] | Test |
3,804 | 6 | Shar:shar unix operating system shar abbreviation shell archive archive format created unix shar utility shar file type self-extracting archive valid shell script executing recreate files extract files standard unix bourne shell sh usually required note shar command specified single unix specification formally component unix legacy utility shar format advantage plain text poses risk due executable reason older general tar file format usually preferred even transferring text files gnu provides version shar gnu sharutils collection unshar programs written operating systems always reliable shar files shell scripts theoretically anything shell script including using incompatible features enhanced workalike shells limiting utility outside unix world drawback self-extracting shell scripts kind shar rely particular implementation programs shell archives created older versions makeself example original unreal tournament linux installer fails run bash 3.x due change missing arguments codice_1 built-in command handled james gosling generally credited writing first version shar utility also wrote early example concept form simple shell script version concept vms operating system written 1987 michael bednarek melbourne institute applied economic social research dcl script vms_shar.com later maintained extended james gray xerox andy harper king college london | [
9988,
10387,
1940,
3222,
3350,
3114,
7983,
2095,
4406,
823,
10817,
2755,
11076,
3659,
10317,
4174,
4561,
722,
2389,
5096,
10857,
8940,
237,
4845,
4850,
5492
] | None |
3,805 | 4 | Convergence_(SSL):convergence ssl convergence proposed strategy replacing ssl certificate authorities first put forth moxie marlinspike august 2011 giving talk titled ssl future authenticity black hat security conference demonstrated firefox addon server-side notary daemon talk marlinspike proposed current problems certificate authority ca system could reduced single missing property called trust agility convergence aimed provide strategy claimed agile secure distributed 2013 marlinspike focused ietf proposal called tack designed uncontroversial first step advocates dynamic certificate pinning instead full ca replacement reduces number times third party needs trusted development convergence continued convergence extra fork 2014 convergence based previous work perspectives project carnegie mellon university like perspectives convergence authenticated connections contacting external notaries unlike perspectives convergence notaries could use number different strategies beyond network perspective order reach verdict purpose certificate authority conventional ssl system vouch identity site checking ssl certificate without vouchsafing one open man-in-the-middle attack single site vouched single certificate authority ca ca trusted user web browsers typically include list default trusted certificate authorities display warning untrusted connection site vouchsafed trusted ca problem system user browser vendor loses trust ca removing ca browser list trusted authorities means losing trust sites used ca happened major browsers lost trust diginotar ca sites registered ca get new certificate authorities see certificate authority ca compromise examples trust breaches convergence however level redundancy single point failure several notaries could vouch single site user could choose trust several notaries would vouch sites notaries disagreed whether site identity correct user could choose go majority vote err side caution demand notaries agree content single notary voting method controlled setting browser addon user chose distrust certain notary non-malicious site could still trusted long remaining trusted notaries trusted thus longer single point failure september 2011 qualys announced would run two notary servers june 2016 servers appeared list notaries maintained convergence wiki | [
513,
517,
1157,
1288,
9744,
1683,
1688,
3742,
2083,
8358,
11693,
7983,
11569,
9394,
7736,
9281,
9412,
9285,
3657,
5834,
10831,
11345,
5590,
474,
8283,
4063,
7264,
8674,
2275,
7139,
10341,
1907,
5107,
501,
1526,
503,
2169,
3707,
510,
4863
... | Test |
3,806 | 3 | Milk_Race_(video_game):milk race video game milk race computer game released 1987 zx spectrum commodore 64 atari 8-bit family msx amstrad cpc developed phil berry stuart ruecroft composer david whittaker icon design based around internationally acclaimed event world cycle race milk race known tour britain simulator designed coincide 1987 event starting newcastle upon tyne north england midlands london finishing line basic premise game control bike using acceleration braking choosing correct gear conserve energy | [
10931,
9006
] | Test |
3,807 | 4 | Mirai_(malware):mirai malware mirai malware turns networked devices running linux remotely controlled bots used part botnet large-scale network attacks primarily targets online consumer devices ip cameras home routers mirai botnet first found august 2016 malwaremustdie whitehat malware research group used largest disruptive distributed denial service ddos attacks including attack 20 september 2016 computer security journalist brian krebs web site attack french web host ovh october 2016 dyn cyberattack according chat log anna-senpai robert coelho mirai named 2011 tv anime series mirai nikki source code mirai published hack forums open-source since source code published techniques adapted malware projects devices infected mirai continuously scan internet ip address internet things iot devices mirai includes table ip address ranges infect including private networks addresses allocated united states postal service department defense mirai identifies vulnerable iot devices using table 60 common factory default usernames passwords logs infect mirai malware infected devices continue function normally except occasional sluggishness increased use bandwidth device remains infected rebooted may involve simply turning device short wait turning back reboot unless login password changed immediately device reinfected within minutes upon infection mirai identify competing malware remove memory block remote administration ports victim iot devices identified “ first entering rapid scanning phase ① asynchronously “ statelessly ” sent tcp syn probes pseudo-random ipv4 addresses excluding hard-coded ip blacklist telnet tcp ports 23 2323 ” iot device responds probe attack enters brute-force login phase phase attacker tries establish telnet connection using predetermined username password pairs list credentials logins default usernames passwords iot vendor iot device allows telnet access victim ip along successfully used credential sent collection server hundreds thousands iot devices use default settings making vulnerable infection infected device monitor command control server indicates target attack reason use large number iot devices bypass anti-dos software monitors ip address incoming requests filters sets block identifies abnormal traffic pattern example many requests come particular ip address reasons include able marshall bandwidth perpetrator assemble alone avoid traced mirai internet things iot devices threat stopped arrest actors since actors utilizing mirai malware source code openly shared github use evolve mirai new variants expand botnet node networking previously untouched iot devices detail recent progress variants listed following paragraphs 12 december 2017 researchers identified variant mirai exploiting zero-day flaw huawei hg532 routers accelerate mirai botnets infection implementing two known soap related exploits routers web interface cve-2014–8361 cve-2017–17215 mirai version called satori 14 january 2018 new variant mirai dubbed “ okiru ” already targeting popular embedded processor like arm mips x86 powerpc others found targeting arc processors based linux devices first time argonaut risc core processor shorted arc processors second-most-popular embedded 32 bit processor shipped 1.5 billion products per year including desktop computers servers radio cameras mobile utility meters televisions flash drives automotive networking devices smart hubs tv modems routers wifi internet things noted however relatively small number arc-based devices run linux therefore exposed mirai 18 january 2018 successor mirai reported designed hijack cryptocurrency mining operations 26 january 2018 two similar mirai variant botnets reported modified version weaponizes edb 38722 d-link router exploit enlist vulnerable iot devices vulnerability router home network administration protocol hnap utilized craft malicious query exploited routers bypass authentication cause arbitrary remote code execution less modified version mirai called masuta japanese transliteration master modified version called puremasuta march 2018 new variant mirai dubbed omg emerged surface added configurations target vulnerable iot devices turning proxy servers new firewall rules allow traffic travel generated http socks ports added configurations mirai code ports open traffic omg sets 3proxy – open-source software available russian website may june 2018 another variant mirai dubbed wicked emerged added configurations target least three additional exploits including affecting netgear routers cctv-dvrs wicked scans ports 8080 8443 80 81 attempts locate vulnerable unpatched iot devices running ports researchers suspect author created wicked sora owari omni botnets early july 2018 reported least thirteen versions mirai malware detected actively infecting linux internet things iot internet three designed target specific vulnerabilities using exploit proof concept without launching brute-forcing attack default credential authentication month published report infection campaign mirai malware android devices android debug bridge tcp/5555 actually optional feature android operating system discovered feature appears enabled android phones end 2018 mirai variant dubbed miori started spread remote code execution vulnerability thinkphp framework affecting versions 5.0.23 5.1.31 vulnerability continuously abused evolved mirai variants dubbed hakai yowai january 2019 variant speakup february 2019 mirai used alongside bashlite ddos attack 20 september 2016 krebs security site reached 620 gbit/s ars technica also reported 1 tbit/s attack french web host ovh 21 october 2016 multiple major ddos attacks dns services dns service provider dyn occurred using mirai malware installed large number iot devices many still using default usernames passwords attacks resulted inaccessibility several high-profile websites including github twitter reddit netflix airbnb many others attribution dyn attack mirai botnet originally reported level 3 communications mirai later revealed used ddos attacks rutgers university 2014 2016 left faculty students campus unable access outside internet several days time additionally failure university central authentication service caused course registration services unavailable critical times academic semester university reportedly spent 300,000 consultation increased cyber-security budget university 1 million response attacks university cited attacks among reasons increase tuition fees 2015-2016 school year person alias exfocus claimed responsibility attacks stating reddit ama /r/rutgers subreddit user student school ddos attacks motivated frustrations university bus system user later claimed interview new jersey-based blogger lied affiliated university attacks funded anonymous client security researcher brian krebs later alleged user indeed student rutgers university latter interview given attempt distract investigators staff deep learning security observed steady growth mirai botnets 21 october attack mirai also used attack liberia internet infrastructure november 2016 according computer security expert kevin beaumont attack appears originated actor also attacked dyn security affairs website taken offline hour twenty minutes published article mirai okiru 14 january 2018 end november 2016 approximately 900,000 routers deutsche telekom produced arcadyan crashed due failed tr-064 exploitation attempts variant mirai resulted internet connectivity problems users devices talktalk later patched routers new variant mirai discovered talktalk routers british man suspected behind attack arrested luton airport according bbc january 17 2017 computer security journalist brian krebs posted article blog krebs security disclosed name person believed written malware krebs stated likely real-life identity anna-senpai named anna nishikinomiya character shimoneta author mirai actually paras jha owner ddos mitigation service company protraf solutions student rutgers university update original article paras jha responded krebs denied written mirai fbi reported questioned jha involvement october 2016 dyn cyberattack december 13 2017 paras jha josiah white dalton norman entered guilty plea crimes related mirai botnet daniel kaye 29 also known alias bestbuy popopret spiderman accused using infected network computers known mirai botnet attack blackmail lloyds banking group barclays banks according nca extradited germany uk according report kaye also pleaded guilty court hijacking 900,000 routers network deutsche telekom researchers pointing handle name nexus zeta responsible author new variants mirai dubbed okiru satori masuta puremasuta august 21 2018 grand jury indicted kenneth currin schuchman 20 aka nexus zeta knowingly causing transmission program information code commands result conduct intentionally caused damage without authorization protected computers according indictment filed u.s. district court anchorage followed arrest trial suspect american electronic musician composer james ferraro 2018 album four pieces mirai references mirai ongoing narrative | [
1024,
3072,
5636,
4117,
8726,
535,
9761,
4644,
4133,
4648,
46,
10297,
1087,
1608,
3657,
8779,
81,
8789,
4703,
8288,
8292,
8805,
10875,
3711,
8320,
9855,
5764,
2187,
3724,
4240,
1688,
9371,
2717,
9375,
9904,
9395,
8886,
10952,
3789,
4304,
... | Validation |
3,808 | 0 | Perplexity:perplexity information theory perplexity measurement well probability distribution probability model predicts sample may used compare probability models low perplexity indicates probability distribution good predicting sample perplexity discrete probability distribution p defined h p entropy bits distribution x ranges events base need 2 perplexity independent base provided entropy exponentiation use base measure also known domains order-1 true diversity perplexity random variable x may defined perplexity distribution possible values x special case p models fair k -sided die uniform distribution k discrete events perplexity k random variable perplexity k uncertainty fair k -sided die one said k -ways perplexed value random variable unless fair k -sided die k values possible overall uncertainty greater values probability greater 1/ k decreasing overall value summing perplexity sometimes used measure hard prediction problem always accurate two choices one probability 0.9 chances correct guess 90 percent using optimal strategy perplexity 2= 1.38 inverse perplexity case fair k-sided die represents probability guessing correctly 1/1.38 0.72 0.9 perplexity exponentiation entropy clearcut quantity entropy measure expected average number bits required encode outcome random variable using theoretical optimal variable-length code cf equivalently regarded expected information gain learning outcome random variable information measured bits model unknown probability distribution p may proposed based training sample drawn p given proposed probability model q one may evaluate q asking well predicts separate test sample x x ... x also drawn p perplexity model q defined formula_3 customarily 2 better models q unknown distribution p tend assign higher probabilities q x test events thus lower perplexity less surprised test sample exponent may regarded average number bits needed represent test event x one uses optimal code based q low-perplexity models better job compressing test sample requiring bits per test element average q x tends high exponent may also regarded cross-entropy formula_5 denotes empirical distribution test sample i.e. formula_6 x appeared n times test sample size n natural language processing perplexity way evaluating language models language model probability distribution entire sentences texts using definition perplexity probability model one might find example average sentence x test sample could coded 190 bits i.e. test sentences average log-probability -190 would give enormous model perplexity 2 per sentence however common normalize sentence length consider number bits per word thus test sample sentences comprised total 1,000 words could coded using total 7.95 bits per word one could report model perplexity 2 247 per word words model confused test data choose uniformly independently among 247 possibilities word lowest perplexity published brown corpus 1 million words american english varying topics genres 1992 indeed 247 per word corresponding cross-entropy log247 7.95 bits per word 1.75 bits per letter using trigram model often possible achieve lower perplexity specialized corpora predictable simply guessing next word brown corpus word accuracy 7 percent 1/247 0.4 percent naive use perplexity measure predictiveness might lead one believe guess based unigram statistics brown corpus trigram statistics yielded word perplexity 247 using trigram statistics would improve chances correct guess | [
7780,
3748,
7599,
6223,
3998
] | None |
3,809 | 9 | Variadic:variadic computer science operator function variadic take varying number arguments arity fixed specific articles see | [
692,
3733
] | Test |
3,810 | 4 | Thermal_attack:thermal attack thermal attack aka thermal imaging attack approach exploits heat traces uncover entered credentials attacks rely phenomenon heat transfer one object another authentication heat transfers users hands surface interacting leaving heat traces behind analyzed using thermal cameras operate far-infrared spectrum traces recovered used reconstruct passwords cases attack successful even 30 seconds user authenticated thermal attacks performed victim authenticated alleviating need in-situ observation attacks e.g. shoulder surfing attacks affected hand occlusions smudge attacks reveal order entries graphical passwords android lock patterns thermal attacks reveal order entries even case pins alphanumeric passwords reason thermal attacks leak information order entry keys buttons user touches first lose heat time recently touched ones maintain heat signature longer time results distinguishable heat patterns tell attacker entry entered first thermal attacks shown effective plastic keypads ones used enter credit card pins supermarkets restaurants handheld mobile devices smartphones tablets paper published conference human factors computing systems chi 2017 abdelrahman et al showed attack feasible today smartphones also proposed ways mitigate attack swiping randomly screen distort heat traces forcing maximum cpu usage seconds | [
7624
] | None |
3,811 | 0 | Arabic_Ontology:arabic ontology arabic ontology linguistic ontology arabic language used arabic wordnet ontologically-clean content people use also tree i.e classification concepts/meanings arabic terms formal representation concepts arabic terms convey content ontologically well-founded benchmarked scientific advances rigorous knowledge sources rather speakers ’ naïve beliefs wordnets typically ontology tree explored online ontology structure i.e. data model similar wordnet structure concept ontology given unique concept identifier uri informally described gloss lexicalized one synonymous lemma terms term-concept pair called sense given senseid set senses called synset concepts senses described attributes era area specify used lexicalization type example sentence example instances ontological analysis others semantic relations e.g. subtypeof partof others defined concepts important individuals included ontology individual countries seas individuals given separate individualids linked concepts instanceof relation concepts arabic ontology mapped synsets wordnet well bfo dolce terms used arabic ontology mapped lemmas ldc sama database arabic ontology seen next generation wordnet ontologically-clean arabic wordnet follows structure i.e. data model wordnet fully mapped wordnet however critical foundational differences arabic ontology used many application domains urls arabic ontology designed according w3c best practices publishing linked data described following url schemes allows one also explore whole database like exploring graph | [
416,
2948,
2414,
10452,
538,
7164
] | Validation |
3,812 | 5 | Skype_protocol:skype protocol skype protocol proprietary internet telephony network used skype protocol specifications made publicly available skype official applications using protocol closed-source skype network interoperable voice ip voip networks without proper licensing skype numerous attempts study and/or reverse engineer protocol undertaken reveal protocol investigate security allow unofficial clients june 20 2014 microsoft announced deprecation old skype protocol within several months date order continue using skype services skype users update skype applications released 2014 users able log older skype versions clients announcement made whether smarttv hardware phones built-in skype functionality continue work without interruptions new skype protocol—microsoft notification protocol 24—promised better offline messaging better messages synchronization across skype devices deprecation became effective second week august 2014 skype first peer-to-peer ip telephony network network contains three types entities supernodes ordinary nodes login server client maintains host cache ip address port numbers reachable supernodes skype user directory decentralized distributed among supernodes network supernodes grouped slots 9–10 supernodes slots grouped blocks 8 slots previously client good bandwidth restrictions due firewall network address translation nat adequate processing power could become supernode placed extra burden connected internet without nat skype used computers internet connections third parties udp hole punching directly connect two clients behind nat completely relay users calls 2012 microsoft altered design network brought supernodes control hosted servers data centres microsoft time defended move saying believe approach immediate performance scalability availability benefits hundreds millions users make skype community time concern regarding privacy implications change appear proven true revelation prism surveillance program june 2013 skype support use ipv6 protocol would greatly reduce complexity associated aforementioned ipv4 communication structure supernodes relay communications behalf two clients behind firewalls one-to-many network address translation without relaying supernodes two clients firewall nat difficulties would unable make receive calls one another skype tries get two ends negotiate connection details directly sometimes sum problems ends prevent direct conversation established problems firewalls nat signaling encrypted using rc4 however method obfuscates traffic key recovered packet voice data encrypted aes skype client application programming interface api opens network software developers skype api allows programs use skype network get white pages information manage calls skype code closed source protocol standardized parts client use internet direct indy open source socket communication library july 8 2012 researcher benin ouanilo medegan released articles proof concept code results reverse engineering skype client many networking security companies claim detect control skype protocol enterprise carrier applications specific detection methods used companies often proprietary pearson chi-squared test stochastic characterization naive bayes classifiers two approaches published 2007 rc4 encryption algorithm used obfuscate payload datagrams xor two 32-bit values transformed 80-byte rc4 key using unknown key engine notable misuse rc4 skype found tcp streams udp unaffected first 14 bytes 10 known user since consist hash username password xor-ed rc4 stream cipher reinitialized encrypt rest tcp stream tcp packets skype init tcp packet contains almost traffic ciphered command parameters appended object list object list compressed object number string ip port even another object list object id id identifies command parameter object packets compressed algorithm variation arithmetic compression uses reals instead bits reverse engineering skype protocol inspecting/disassembling binaries prohibited terms conditions skype license agreement however european union law allows reverse-engineering computer program without getting permission author inter-operability purposes united states digital millennium copyright act provides protections reverse engineering software purposes interoperability software also legal precedents united states reverse-engineering aimed interoperability file formats protocols addition countries specifically permit program copied purposes reverse engineering | [
10242,
5251,
3460,
5382,
4746,
1036,
11408,
3610,
3228,
10271,
3105,
9511,
1962,
9519,
8758,
3770,
1467,
10173,
6208,
8640,
1218,
6982,
6855,
2760,
6344,
1738,
2892,
3284,
4318,
5470,
4068,
6628,
9572,
3959,
7928,
10748
] | None |
3,813 | 5 | Micro_Transport_Protocol:micro transport protocol micro transport protocol µtp sometimes also utp open udp-based variant bittorrent peer-to-peer file sharing protocol intended mitigate poor latency congestion control problems found conventional bittorrent tcp providing reliable ordered delivery devised automatically slow rate packets data transmitted users peer-to-peer file sharing torrents interferes applications example protocol automatically allow sharing adsl line bittorrent application web browser µtp emerged research internet2 qos high-performance bulk transport adapted use background transport protocol plicto founded stanislav shalunov later acquired bittorrent inc. 2006 developed within new owner first introduced µtorrent 1.8.x beta branches publicized alpha builds µtorrent 1.9 implementation µtp used µtorrent later separated libutp library published mit license first free software client implement µtp ktorrent 4.0. libtorrent implements µtp since version 0.16.0 used qbittorrent since 2.8.0 tixati implements µtp since version 1.72 vuze formerly azureus implements µtp since version 4.6.0.0 transmission implements µtp since version 2.30 congestion control algorithm used µtp known low extra delay background transport ledbat aims decrease latency caused applications using protocol maximizing bandwidth latency excessive additionally information µtp congestion controller used choose transfer rate tcp connections ledbat described rfc 6817 2009 details µtp implementation different then-current internet draft µtp also adds support nat traversal using udp hole punching two port-restricted peers third unrestricted peer acts stun server | [
1541,
4229,
4490,
11029,
3350,
11413,
10522,
2075,
5531,
3366,
10924,
7214,
11566,
9909,
3770,
4797,
3006,
8640,
11073,
708,
2887,
6351,
3792,
6991,
7761,
3676,
5085,
5472,
609,
3428,
7017,
7921,
10995,
1908,
4725,
5749,
119,
9332,
4095
] | Test |
3,814 | 8 | Doppelganger_domain:doppelganger domain doppelganger domain domain spelled identical legitimate fully qualified domain name fqdn missing dot host/subdomain domain used malicious purposes typosquatting traditional attack vector web distribute malware harvest credentials vectors email remote access services ssh rdp vpn also leveraged whitepaper godai group doppelganger domains demonstrated numerous emails harvested without anyone noticing someone email address someone finance.somecompany.example doppelganger domain would financesomecompany.example hence someone trying send email user forget dot finance someone financesomecompany.example would go doppelganger domain instead legitimate user | [
7515,
10103,
2887
] | Validation |
3,815 | 2 | BackSlash_Linux:backslash linux backslash linux ubuntu debian-based operating system developed india kumar priyansh amd64 intel x64-based personal computers based free software every release operating system named characters 2013 disney film frozen since third major release backslash linux olaf backslash linux used custom version kde called backslash shell default user desktop backslash linux design hybrid resembles macos first glance kde bottom instead kde-based distribution ships many gnome-based applications moreover buttons title bar resemble macos arranged windows-like manner top bar resembles gnome first glance app opened displays universal menu bar looking similar macos unity development backslash linux started mid 2016 ubuntu-based compatible repositories ad packages uses discover software center handle installation/removal software user interface aims intuitive new users without consuming many resources backslash linux based ubuntu long term support releases developer actively maintains bugs security years even development continues next release three pre-release versions codenamed alpha beta gamma released first stable release still available download may 2017 taken website first stable version backslash linux backslash linux anna published 2 november 2016 based ubuntu 14.04 ran linux kernel 4.2 ran cinnamon desktop environment extra plugins plank dock provide new look support download option version still available backslash linux website article also published linux.com introducing backslash linux backslash linux anna complete system providing end-users types needed daily use software notable applications included font viewer pdf reader simple scan deluge bittorrent client dropbox google chrome google earth pidgin im skype wps office vlc media player clementine screen reader gdebi package manager wine pre-installed order support windows based applications games second release backslash linux published 20 december 2016 called backslash linux elsa elsa built atop ubuntu long-term support release — ubuntu 16.04 ran flagship desktop environment elementary os pantheon lot applications used backslash linux anna dropped release cut iso size also added lot additional applications besides core applications shipped elementary os replaced epiphany browser google chrome many additional utilities like skype wine deluge bittorrent client dictionary also shipped out-of-the-box inclusion gnome boxes virtualisation desktops another time-saver backslash linux elsa embarked inclusion many utilities like backups dvd burner teamviewer synaptic package manager pidgin im replaced empathy im also included firewall full libreoffice suite addition modem manager noticed helpful managing external modem cards albert present search companion backslash elsa easily activated using meta+space shortcut key tweaking desktop changing themes colors cursors also present desktop present pantheon default also introduced active desktop right-click options pantheon desktop backslash linux olaf third major current release backslash linux published 9 may 2017 introduced 150+ new features last versions backslash linux based ubuntu 16.04 ran backslash shell customised kde desktop due heavily modified beautiful desktop gained much attention received much praise earlier versions version backslash linux removed applications cut iso size also brought many refinements google chrome replaced open-source chromium wine upgraded version 2.0.1 applications like skype firewall modem manager dvd burner dropbox empathy im gnome boxes teamviewer deluge dictionary present earlier version backslash linux dropped version albert search companion replaced krunner search libreoffice lost position wps office back backslash linux series release olaf thunderbird also included version better email experience simple idea include best apps available instead kde-specific apps reason see gnome apps like calendar disks maps release backslash linux olaf also introduced full-screen applauncher resembled launchpad macos fork discontinued application slingshot reviewing backslash linux olaf souris procambodian said think best build distro feels complete ’ need much time config cause ’ everything working box backslash linux kristoff released public beta 13 august 2017 adding features like fingerprint hwe kernel support linux distro world followed deepin linux also added fingerprint support deepin 15.5 released 30 november 2017 stable release backslash linux kristoff made christmas december 25 2017 builds upon previous release backslash linux olaf fixing almost bugs also introduces backslash shell v2.0 performance improvements highly worked also introduces new app called multiview system optimizer installer issues fixed ui redesigned gtk+ support greatly worked backslash linux kristoff also supports fingerprint recognition lockscreen terminal authentication app authentications multitouch gesture support also implemented addition wine redshift night light also introduced better temperature controls additional components include sidebar better notification audio network management hardware-enabled hwe kernel includes support snaps new login screen video background also cover flow task switcher also includes desktop cube animation switching multiple virtual desktops applications included geary apache openoffice gparted dolphin file manager modem manager synaptic package manager vlc media player others security backslash based ubuntu security software updates provided canonical ltd. default programs run standard user privileges administrator privileges given whenever required increased security sudo tool used assign temporary privileges performing administrative tasks allows root account remain locked helps prevent inexperienced users inadvertently making catastrophic system changes opening security holes network ports closed default prevent hacking built-in firewall allows end-users install network servers control access gui available configure backslash compiles packages using gnu compiler collection features position-independent code buffer overflow protection hardening computing software backslash supports full disk encryption well encryption home private directories backslash linux installation simple fully graphical backslash linux booted run usb flash drive pc capable booting usb drive option saving settings flash drive ubuntu live usb creator program available install ubuntu-based distribution usb drive windows program unetbootin allows backslash linux usb burning installation supports logical volume manager lvm automatic partitioning disk encryption utf-8 default character encoding supports variety non-roman type script unicode backslash linux also released two official flavours mate gnome also server edition operating system soon development support versions flavous server edition discontinued development focused mainstream release | [
6797,
4623,
3859,
11418,
10525,
8998,
7983,
823,
7483,
3649,
5067,
2383,
1632,
1121,
485,
7914,
5356,
5363,
8954,
5755
] | None |
3,816 | 1 | IDMS:idms ca idms integrated database management system primarily network model codasyl database management system mainframes first developed b.f. goodrich later marketed cullinane database systems renamed cullinet 1983 since 1989 product owned computer associates ca technologies renamed advantage ca-idms later simply ca idms roots idms go back pioneering database management system called integrated data store ids developed general electric team led charles bachman first released 1964 early 1960s ids taken original form computer group b.f. goodrich chemical division re-written language called intermediate system language isl isl designed portable system programming language able produce code variety target machines since isl actually written isl able ported machine architectures relative ease produce code would execute chemical division computer group given thought selling copies idms companies told management software products business eventually deal struck john cullinane buy rights market product cullinane required remit royalties back b.f. goodrich add-on products listed billed separate products even mandatory core idms product work sometimes confused customers original platforms ge 235 computer ge datanet-30 message switching computer later product ported ibm mainframes dec icl hardware ibm-ported version runs ibm mainframe systems system/360 system/370 system/390 zseries system z9 mid-1980s claimed 2,500 idms licenses sold users included strategic air command ford canada ford europe jaguar cars clarks shoes uk axa/ppp mapfre royal insurance tesco manulife hudson bay company cleveland clinic bank canada general electric aetna bt uk version use decsystem series computers sold dec marketed dbms10 later dbms20 1976 source code licensed icl ported software run 2900 series mainframes subsequently also older 1900 range icl continued development software independently cullinane selling original ported product name icl 2900 idms enhanced version idmsx form used many large uk users example pay-as-you-earn system operated inland revenue many idmsx systems uk government still running 2013 early mid-1980s relational database management systems started become popular encouraged increasing hardware power move minicomputers client–server architecture relational databases offered improved development productivity codasyl systems traditional objections based poor performance slowly diminishing cullinet attempted continue competing ibm db2 relational databases developing relational front-end range productivity tools included automatic system facility asf made use pre-existing idms feature called lrf logical record facility asf fill-in-the-blanks database generator would also develop mini-application maintain tables difficult judge whether features may successful extending selling life product made little impact long term users stayed idms primarily interested high performance relational capabilities widely recognized helped high-profile campaign e. f. codd father relational model significant difference relational database network database relational veneer 1989 computer associates continued cullinet acquisition development released release 12.0 full sql 1992-93 nowadays ca technologies actively markets supports ca idms enhanced idms subsequent releases tcp/ip support two-phase commit support xml publishing ziip specialty processor support web-enabled access combination ca idms server sql option gui database administration via ca idms visual dba tool ca-idms systems today still running businesses worldwide many customers opted web-enable applications via ca-idms sql option part ca technologies dual database strategy one sophisticated features idms built-in integrated data dictionary idd idd primarily developed maintain database definitions idms database dbas database administrators users interfaced idd using language called data dictionary definition language dddl idd also used store definitions code products idms family ads/online idms-dc idd power extensible could used create definitions anything companies used develop in-house documentation data model offered users codasyl network model main structuring concepts model records sets records essentially follow cobol pattern consisting fields different types allows complex internal structure repeating items repeating groups distinctive structuring concept codasyl model set confused mathematical set codasyl set represents one-to-many relationship records one owner many members fact record member many different sets key factor distinguishes network model earlier hierarchical model records set belongs named set type different set types model different logical relationships sets fact ordered sequence records set used convey information record participate owner member number sets records identity identity represented value known database key idms codasyl implementations database key directly related physical address record disk database keys also used pointers implement sets form linked lists trees close correspondence logical model physical implementation strictly necessary part codasyl model characteristic successful implementations responsible efficiency database retrieval also makes operations database loading restructuring rather expensive records accessed directly database key following set relationships direct access using key values initially direct access hashing mechanism known codasyl model calc access idms calc access implemented internal set linking records share hash value owner record occupies first bytes every disk page subsequent years versions idms added ability access records using btree-like indexes idms organizes databases series files files mapped pre-formatted so-called areas areas subdivided pages correspond physical blocks disk database records stored within blocks dba allocates fixed number pages file area dba defines records stored area details stored idms intersperses special space-allocation pages throughout database pages used keep track free space available page database reduce i/o requirements free space tracked pages free space area falls 30 four methods available storing records idms database direct sequential calc via fujitsu/icl idmsx version extends two methods page direct random direct mode target database key specified user stored close possible db key actual db key record stored returned application program sequential placement confused indexed sequential simply places new record end area option rarely used calc uses hashing algorithm decide place record hash key provides efficient retrieval record entire calc area preformatted header consisting special calc owner record hashing algorithm determines page number physical disk address determined record stored page near possible linked header record page using calc set calc records linked page calc owner record using single link-list pointers calc owner located page header thus owns set records target particular page whether records stored page case overflow another page calc provides extremely efficient storage retrieval idms retrieve calc record 1.1 i/o operations however method cope well changes value primary key expensive reorganization needed number pages needs expanded work-around expand area run application program scans area sequentially calc record uses modify verb update record results calc record connected calc set correct target page calculated area new page range downside method vanishingly calc records target pages navigating page calc set likely involve many io operations result recommended use work-around extreme circumstances performance suffer via placement attempts store record near owner particular set usually records clustered physical page owner leads efficient navigation record accessed following set relationship via allows records stored different idms area stored separately owner yet remain clustered together efficiency within idmsx may also offset owner set number pages page direct idmsx similar direct mode however target database page number specified record connected calc chain page random idmsx allocates target page number record occurrence stored using calc algorithm either uses key within record case un-keyed random uses date time storage seed calc algorithm sets generally maintained linked lists using database key pointer every record includes forward link next record database designer choose whether include owner pointers prior pointers provided navigation directions slower versions idms subsequently included ability define indexes either record indexes allowing records located knowledge secondary key set indexes allowing members set retrieved key value idmsx page direct random placement records typically used conjunction record indexes described indexes subject placement rules either direct really means calc using index id key calc idms many non-profit user associations across globe composed information technology professionals use and/or support ca idms related products include | [
4998,
3594,
11024,
11153,
284,
10413,
10286,
7983,
7733,
9397,
10040,
1219,
11472,
479,
7650,
6627,
868,
10471,
2168,
3323
] | None |
3,817 | 2 | Jonas_Öberg:jonas öberg jonas öberg born 22 november 1977 norrköping sweden free open-source software activist describing instigator world free worked free software foundation europe gnu project fscons creative commons shuttleworth foundation started develop software 1991 installed first gnu/linux operating system 1993 eventually joined webmaster gnu project late 1990s spent time mit ai labs met richard stallman others free software foundation joining bazaar conference new york since 2002 award committee free software foundation free software awards 2001 founding member free software foundation europe took role vice president 22 november 2001 former vice president loïc dachary took step back focus gnu savannah worked creative commons several years including running course fundraising peer peer university became first regional coordinator europe 2011 work organisation eventually led position fellow shuttleworth foundation work focus creating tools prototypes embedding metadata licensing attribution requirements digital works company commons machinery featured one 12 winners tech stars 2014 competition european commission neelie kroes digital agenda 19th-century wooden house north sweden continuously renovating lives outside stockholm gnesta sweden married julia velkova media researcher member internet society bulgaria marriage took place ice hotel sweden 8 march 2013 | [
2050,
2180,
11654,
11659,
4493,
1939,
802,
3618,
5555,
9148,
10687,
10822,
5703,
5833,
8147,
3674,
2010,
10464,
743,
9579,
8304,
1394,
8436
] | Test |
3,818 | 3 | Acer_PICA:acer pica m6100 pica system logic chipset designed acer laboratories introduced 1993 pica stands performance-enhanced input-output cpu architecture based jazz architecture developed microsoft supported mips technologies r4000 r4400 microprocessors chipset designed computers run windows nt therefore used arc firmware boot windows nt chipset consisted six chips cpu secondary cache controller buffer i/o cache bus controller memory controller two data buffers pica used acer formula 4000 personal workstation nec sold oem name riscstation image | [
6854,
6252,
7215,
8976,
2452,
6942,
6879
] | Validation |
3,819 | 7 | Rackspace:rackspace rackspace inc. american managed cloud computing company based windcrest texas suburb san antonio company also offices australia united kingdom switzerland netherlands germany singapore mexico hong kong rackspace data centers operating texas chicago kansas city virginia united kingdom germany australia hong kong company rackspace email division operates blacksburg va offices located austin texas 2016 rackspace closed san francisco office rackspace became public 2008 2016 purchased taken private apollo global management llc 1996 richard yoo started small internet service provider called cymitar network systems garage apartment san antonio texas company began application development work addition offering basic internet access web hosting 1997 yoo brought dirk elmendorf company began develop internet applications primary business company re-formed cymitar technology group cymitar technology group grew patrick condon recruited california joined team 1998 coincidentally three company founders students one time trinity university san antonio although founders began application developers end users found companies either know want host applications founders wanted focus application development–not hosting–but unable find opportunity outsource hosting work eventually founders realized would better create product serve hosting need launch company rackspace launched october 1998 richard yoo ceo although hosting companies focused technology end hosting rackspace created fanatical support offering focus service support march 28 2000 rackspace received funding lead investor norwest venture partners sequoia capital george j still jr. managing partner norwest subsequently joined board directors 2008 rackspace moved headquarters building occupied datapoint corporation then-unoccupied windsor park mall windcrest texas rackspace chairman graham weston owned montgomery ward building mall 2006 sold developer city windcrest purchased south mall create residential retail complex facility located next roosevelt high school many roosevelt students intern rackspace fortune top 100 best companies work 2008 placed rackspace first year rackspace applied consideration company praised transparency regular open book meetings held top level leaders share in-depth financial information employees 2011 2013 company named one top 100 places work fortune august 8 2008 rackspace opened trading new york stock exchange ticker symbol rax initial public offering ipo raised 187.5 million initial public offering included 15,000,000 shares common stock price 12.50 per share ipo well public market lost 20 initial price almost immediately around 3:45pm cst december 18 2009 rackspace experienced outage customers using dallas–fort worth data center – including rackspace cloud september 8 2010 rackspace received national attention decided discontinue providing web hosting service one customers dove world outreach center reaction dove world pastor terry jones plan burn several copies qur'an anniversary september 11th attacks rackspace claims violated company policy move came criticism notably terry jones described indirect attack freedom speech others questioned appropriateness rackspace action stating absolutely reason web hosts editorial policy gives jones attention makes look persecuted june 3 2011 rackspace intervened application queensland host rack servers trademark business name australia may 26 2013 author bill schley book 'the unstoppables inspired culture rackspace became new york times bestseller may 15 2014 rackspace hired morgan stanley evaluate strategic options including selling merging technology companies october 2014 rackspace announced would sell support google work apps business customers august 2016 confirmed apollo global management reached agreement buy company 4.3 billion sale completed november 2016 rackspace officially ended trading new york stock exchange november 3 2016 may 2017 ceo taylor rhodes announced leaving company may 16 work smaller private company different city may 2017 rackspace named joe eazor new ceo april 2019 company named kevin jones new ceo october 22 2008 rackspace announced purchasing cloud storage provider jungle disk vps provider slicehost february 16 2012 rackspace acquired sharepoint911 microsoft sharepoint consulting company based cincinnati ohio may 25 2017 rackspace announced agreement acquire tricore solutions september 11 2017 rackspace announced plans acquire datapipe september 17 2018 rackspace announced acquired relationedge acquisitions include cloudkick anso labs mailgun objectrocket exceptional cloud services zerovm rackspace launched serverbeach san antonio january 2003 lower-cost alternative dedicated servers designed technology hobbyists want flexibility reliability richard yoo catalyst startup serverbeach bandwidth colocation provider peer 1 hosting known cogeco peer 1 purchased serverbeach october 2004 7.5 million peer 1 hosting entered uk managed hosting market january 2009 serverbeach brand competes directly uk arm rackspace run dominic monkhouse former managing director rackspace limited october 2006 mosso inc. launched experimented white-labeling hosting services eventually division became foundation rackspace cloud computing offering october 1 2007 rackspace acquired webmail.us private e-mail hosting firm located blacksburg va originally branded mailtrust may 20 2009 became part newly formed cloud office division rackspace october 22 2008 rackspace acquired slicehost provider virtual servers jungle disk provider online backup software services rackspace announced march 8 2017 plans expansion portfolio include managed service google cloud platform program began beta testing july 18 2017 planned full offering late 2017 rackspace partnered google customer reliability engineering group google site reliability engineers ensure cloud applications run speed reliability google widely-used products 2010 rackspace contributed source code cloud files product openstack project apache license become openstack object storage component april 2012 rackspace announced would implement openstack compute underlying technology cloud servers product change introduced new control panel well add-on cloud services offering databases server monitoring block storage virtual networking 2015 two rackspace executives elected board openstack foundation february 2016 interview cto john engates stated rackspace use openstack power public private cloud | [
1539,
526,
10265,
5662,
5666,
9766,
39,
3121,
5681,
5689,
5697,
10820,
7750,
4683,
3660,
590,
1102,
7248,
5202,
4194,
5732,
8295,
7280,
8826,
2170,
4236,
10893,
6307,
1705,
170,
2217,
5295,
176,
9906,
7352,
4289,
3269,
8921,
6367,
2795,
... | Validation |
3,820 | 2 | Remote_direct_memory_access:remote direct memory access computing remote direct memory access rdma direct memory access memory one computer another without involving either one operating system permits high-throughput low-latency networking especially useful massively parallel computer clusters rdma supports zero-copy networking enabling network adapter transfer data wire directly application memory application memory directly wire eliminating need copy data application memory data buffers operating system transfers require work done cpus caches context switches transfers continue parallel system operations reduces latency message transfer however strategy presents several problems related fact target node notified completion request single-sided communications 2018 rdma achieved broader acceptance result implementation enhancements enable good performance ordinary networking infrastructure example roce rdma converged ethernet able run either lossy lossless infrastructure addition iwarp enables ethernet rdma implementation physical layer using tcp/ip transport combining performance latency advantages rdma low-cost standards-based solution rdma consortium dat collaborative played key roles development rdma protocols apis consideration standards groups internet engineering task force interconnect software consortium hardware vendors started working higher-capacity rdma-based network adapters rates 100 gbit/s reported software vendors red hat oracle corporation support apis latest products engineers started developing network adapters implement rdma ethernet red hat enterprise linux red hat enterprise mrg support rdma microsoft supports rdma windows server 2012 via smb direct vmware esxi product also supports rdma 2015 common rdma implementations include virtual interface architecture rdma converged ethernet roce infiniband omni-path iwarp | [
3328,
5472,
3042,
2723,
8353,
9220,
710,
582,
8424,
7499,
10924,
10734,
7983,
1776,
9455,
11193,
4505,
2395
] | Validation |
3,821 | 1 | Entity_Framework:entity framework entity framework ef open source object-relational mapping orm framework ado.net part .net framework since entity framework version 6 separated .net framework entity framework set technologies ado.net support development data-oriented software applications architects developers data-oriented applications typically struggled need achieve two different objectives must model entities relationships logic business problems solving must also work data engines used store retrieve data data may span multiple storage systems protocols even applications work single storage system must balance requirements storage system requirements writing efficient maintainable application code entity framework enables developers work data form domain-specific objects properties customers customer addresses without concern underlying database tables columns data stored entity framework developers work higher level abstraction deal data create maintain data-oriented applications less code traditional applications first version entity framework efv1 included .net framework 3.5 service pack 1 visual studio 2008 service pack 1 released 11 august 2008 version widely criticized even attracting 'vote confidence signed approximately one thousand developers second version entity framework named entity framework 4.0 efv4 released part .net 4.0 12 april 2010 addressed many criticisms made version 1 third version entity framework version 4.1 released april 12 2011 code first support refresh version 4.1 named entity framework 4.1 update 1 released july 25 2011 includes bug fixes new supported types version 4.3.1 released february 29 2012 updates like support migration version 5.0.0 released august 11 2012 targeted .net framework 4.5 also version available .net framework 4 without runtime advantages version 4 version 6.0 released october 17 2013 open source project licensed apache license v2 like asp.net mvc source code hosted github using git version number improvements code-first support microsoft decided modernize componentize bring .net cross-platform linux osx elsewhere meaning next version entity framework would complete rewrite 27 june 2016 released entity framework core 1.0 alongside asp.net core 1.0 .net core 1.0 originally named entity framework 7 renamed highlight complete rewrite rather incremental upgrade n't replace ef6 ef core 1.0 licensed apache license v2 built entirely open github ef core 1.0 shares conceptual similarities prior versions entity framework completely new codebase designed efficient powerful flexible extensible run windows linux osx support new range relational nosql data stores ef core 2.0 released 14 august 2017 along visual studio 2017 15.3 asp.net core 2.0 architecture ado.net entity framework bottom consists following entity data model edm specifies conceptual model csdl data using modelling technique called entity data model extended version entity-relationship model data model primarily describes entities associations participate edm schema expressed schema definition language sdl application xml extended markup language addition mapping msl elements conceptual schema csdl storage schema ssdl must also specified mapping specification also expressed xml visual studio also provides entity designer visual creation edm mapping specification output tool xml file *.edmx specifying schema mapping edmx file contains ef metadata artifacts csdl/msl/ssdl content three files csdl msl ssdl also created edited hand entity data model wizard visual studio initially generates one-to-one 1:1 mapping database schema conceptual schema cases relational schema elements composed tables primary foreign keys gluing related tables together contrast entity types define conceptual schema data entity types aggregation multiple typed fields – field maps certain column database – contain information multiple physical tables entity types related independent relationships physical schema related entities also exposed similarly – via field whose name denotes relation participating accessing instead retrieving value column database traverses relationship returns entity collection entities related entity types form class objects entities conform entities instances entity types entities represent individual objects form part problem solved application indexed key example converting physical schema described two entity types logical schema mapping physical schema represented entity data model edm specified xml file ado.net entity framework uses edm actually perform mapping letting application work entities internally abstracting use ado.net constructs like dataset recordset ado.net entity framework performs joins necessary entity reference information multiple tables relationship traversed entity updated traces back table information came issues sql update statements update tables data updated ado.net entity framework uses esql derivative sql perform queries set-theoretic operations updates entities relationships queries esql required translated native sql flavor underlying database entity types entity sets form logical edm schema exposed anything ado.net entity framework includes object service presents entities objects elements relationships exposed properties thus entity objects front-end instances edm entity types lets object oriented languages access use similarly front-ends created expose entities via web services e.g. wcf data services xml used entities serialized persistence storage over-the-wire transfer entities** instances entitytype represent individual instances objects customer orders information pertains identity entity defined entity type instance sense entity type defines class entity belongs also defines properties entity properties describe aspect entity giving name type properties entity type ado.net entity framework fully typed fully compatible type system used dbms system well common type system .net framework property simpletype complextype multi-valued well entitytype belong namespace entitykey property uniquely identifies instance entity type different property types distinguished follows entity instances housed entitycontainers per-project containers entities project one named entitycontainers reference entities across multiple namespaces entity types multiple instances one entity type stored collections called entitysets one entity type multiple entitysets edm primitive types simple types two entity types related either association relation containment relation example shipment billed customer association whereas order contains order details containment relation containment relation also used model inheritance entities relation two entity types specified relationship type instances called relationships relate entity instances future releases kinds relationship types composition identification may introduced relationship types characterized degree arity count entity types relate multiplicity however initial release ado.net entity framework relationships limited binary degree two bi-directional relationship multiplicity defines many entity instances related together based multiplicity relationships either one-to-one one-to-many many-to-many relationships entities named name called role defines purpose relationship relationship type also operation action associated allows action performed entity event action performed related entity relationship specified take action operation done related entity example deleting entity forms part relation ondelete operation actions taken association relationships different semantics either ends different actions specified either end ado.net entity framework uses xml based data definition language called schema definition language sdl define edm schema sdl defines simpletypes similar cts primitive types including string int32 double decimal guid datetime among others enumeration defines map primitive values names also considered simple type enumerations supported framework version 5.0 onwards complextypes created aggregation types collection properties types define entity type definition written ebnf grammar facets used describe metadata property whether nullable default value also cardinality property i.e. whether property single valued multi valued multiplicity “ 1 ” denotes single valued property “ ” means multi-valued property example entity denoted sdl relationship type defined specifying end points multiplicities example one-to-many relationship customer orders defined ado.net entity framework uses variant structured query language named entity sql aimed writing declarative queries updates entities entity relationships – conceptual level differs sql explicit constructs joins edm designed abstract partitioning data across tables querying conceptual model facilitated entityclient classes accepts entity sql query query pipeline parses entity sql query command tree segregating query across multiple tables handed entityclient provider like ado.net data providers entityclient provider also initialized using connection object addition usual parameters data store authentication info requires sdl schema mapping information entityclient provider turn turns entity sql command tree sql query native flavor database execution query returns entity sql resultset limited tabular structure unlike ado.net resultsets entity sql enhances sql adding intrinsic support canonical functions supported entity framework compliant data providers used entity sql query also extension methods linq entities translated canonical functions independent specific database ado.net data provider receives function translates desired sql statement dbmss equivalent functionality set standard embedded functions also differences accuracy calculations therefore canonical functions supported databases canonical functions return results linq entities provider allows linq used query various rdbms data sources several database server specific providers entity framework support available entity framework v4 new methods executestorequery executestorecommand added class objectcontext visual studio feature called visualizer linq query written visual studio viewed native sql using visualizer debug session visualizer linq entities object query targeting rdbms available via visualstudiogallery | [
10243,
3080,
10769,
9234,
1043,
1055,
2083,
8227,
1577,
2603,
4143,
9263,
11316,
1077,
6709,
8246,
4174,
4178,
83,
9813,
603,
608,
2145,
632,
1656,
5754,
1146,
9340,
5761,
9348,
5765,
10886,
2183,
4231,
5259,
653,
10900,
10902,
11414,
322... | Train |
3,822 | 7 | Citrix_Virtual_Apps:citrix virtual apps citrix virtual apps formerly winframe metaframe presentation server xenapp application virtualization software produced citrix systems allows windows applications accessed via individual devices shared server cloud system citrix virtual apps application virtualization software delivers centrally-hosted windows applications local devices without necessity installing flagship product citrix formerly known names winframe metaframe presentation server citrix virtual apps software uses flexcast management architecture fma proprietary architecture citrix virtualization products delivers individual applications opposed entire desktops devices also used citrix workspace deliver apps part complete virtual desktop environment citrix virtual apps windows applications used devices typically could run including macintosh computers mobile devices google chromebooks conversely enables otherwise incompatible apps run windows desktops citrix virtual apps accessed devices via citrix receiver software delivered on-premises data centers public private hybrid clouds precursor virtual apps called winframe multi-user operating system based windows nt 3.51 released 1995 winframe one first products distributed citrix stage product development citrix systems licensed windows nt 3.51 base operating system microsoft core development citrix delivered multiwin engine allowed multiple users logon execute applications winframe server citrix later license multiwin technology microsoft forming basis microsoft terminal services repackaged versions windows 95 citrix winframe client included also available citrix metaframe superseded winframe 1998 product renamed several times became metaframe xp 2002 metaframe xp presentation server 2003 rebranded presentation server 2005 products focused remote access applications server-based computing 2008 product renamed xenapp xen taken company acquisition xensource 2007 2010 2012 citrix issued two updates xenapp xenapp 6 launched 2010 included new central management console called appcenter 2012 xenapp 6.5 released update included new feature called instant app access aimed reduce application launch time 2013 version 7.0 released update combined xendesktop xenapp one application called xendesktop flex management architecture fma prior versions xenapp used company independent management architecture ima 2014 version 7.5 released xenapp separate xendesktop also built fma 2018 xenapp rebranded citrix virtual apps | [
641,
4194,
5732,
5535,
4490,
6797,
7983,
8466,
9970,
4309,
5371,
2399
] | Test |
3,823 | 9 | Paul_Hudak:paul hudak paul raymond hudak july 15 1952 – april 29 2015 american professor computer science yale university best known involvement design haskell programming language well several textbooks haskell computer music chair department also master saybrook college died april 29 2015 leukemia | [
4769,
4578,
3876,
4392,
6536,
8116,
1783,
2938
] | None |
3,824 | 3 | GScube:gscube gscube hardware tool released sony intended use cgi production houses consisting custom variant sixteen playstation 2 motherboards running parallel playstation 2 ps2 video game console manufactured sony computer entertainment released march 4 2000 japan followed north america europe later year unveiled year siggraph name gscube short graphics synthesizer cube used two projects film incarnation resident evil according sources sent back sony japan subsequently dismantled used prototyping visual rendering final fantasy matrix antz well flight simulator although gscube good rendering capability major bottleneck connecting external computers transfer content | [
4098,
643,
9091,
3077,
11398,
10761,
6799,
9508,
6311,
9512,
684,
306,
1587,
1091,
9543,
10056,
6732,
10316,
6738,
6873,
859,
4060,
607,
359,
8937,
5746,
7028,
7801,
8316,
6781
] | None |
3,825 | 4 | Dmitri_Alperovitch:dmitri alperovitch dmitri alperovitch russian-american computer security industry executive co-founder chief technology officer crowdstrike august 2011 vice president threat research mcafee published operation shady rat report suspected chinese intrusions least 72 organizations including defense contractors businesses worldwide united nations international olympic committee alperovitch born moscow 1980 1990 parents moved maryland nuclear safety training program stayed behind ussr — law — make sure parents defect 1994 whole family moved chattanooga alperovitch earned b.s computer science 2001 m.s information security 2003 georgia institute technology alperovitch worked number computer security startups late 1990s early 2000s including e-mail security startup ciphertrust one leading inventors trustedsource reputation system upon acquisition ciphertrust secure computing 2006 led research team launched software-as-a-service business company alperovitch took vice president threat research mcafee company acquired secure computing 2008 january 2010 led investigation operation aurora chinese intrusions google two dozen companies subsequently led investigation night dragon espionage operation western multinational oil gas companies traced song zhiyue chinese national living heze city shandong province late 2011 along entrepreneur george kurtz gregg marston dmitri alperovitch co-founded became chief technology officer crowdstrike security technology company focused helping enterprises governments protect intellectual property secrets cyberespionage cybercrime crowdstrike brought board senior fbi executives shawn henry former executive assistant director ead fbi criminal cyber response services branch steve chabinsky former deputy assistant director fbi cyber division crowdstrike received 256 million funding warburg pincus accel partners google capital alperovitch awarded prestigious federal 100 award contributions u.s. federal information security recognized 2013 2015 one washingtonian magazine tech titans accomplishments field cybersecurity august 2013 selected one mit technology review top 35 innovators 35 award previously larry page sergey brin mark zuckerberg 2016 politico magazine featured one “ politico 50 ” influential thinkers doers visionaries transforming american politics 2017 fortune magazine listed alperovitch 40 40 annual ranking influential young people business along emmanuel macron mark zuckerberg serena williams senior fellow atlantic council think tank named december 2013 one foreign policy top 100 leading global thinkers along angela merkel john kerry ben bernanke jeff bezos | [
704,
8288,
1251,
176,
4625,
9817,
91,
5373
] | None |
3,826 | 6 | Andrew_File_System:andrew file system andrew file system afs distributed file system uses set trusted servers present homogeneous location-transparent file name space client workstations developed carnegie mellon university part andrew project originally named vice afs named andrew carnegie andrew mellon primary use distributed computing afs several benefits traditional networked file systems particularly areas security scalability one enterprise afs deployment morgan stanley exceeds 25,000 clients afs uses kerberos authentication implements access control lists directories users groups client caches files local filesystem increased speed subsequent requests file also allows limited filesystem access event server crash network outage afs uses weak consistency model read write operations open file directed locally cached copy modified file closed changed portions copied back file server cache consistency maintained callback mechanism file cached server makes note promises inform client file updated someone else callbacks discarded must re-established client server network failure including timeout re-establishing callback involves status check require re-reading file consequence file locking strategy afs support large shared databases record updating within files shared client systems deliberate design decision based perceived needs university computing environment example original email system andrew project andrew message system single file per message used like maildir rather single file per mailbox like mbox see afs buffered i/o problems handling shared databases significant feature afs volume tree files sub-directories afs mountpoints links afs volumes volumes created administrators linked specific named path afs cell created users filesystem may create directories files usual without concern physical location volume volume may quota assigned order limit amount space consumed needed afs administrators move volume another server disk location without need notify users operation even occur files volume used afs volumes replicated read-only cloned copies accessing files read-only volume client system retrieve data particular read-only copy point copy becomes unavailable clients look remaining copies users data unaware location read-only copy administrators create relocate copies needed afs command suite guarantees read-only volumes contain exact copies original read-write volume time read-only copy created file name space andrew workstation partitioned shared local name space shared name space usually mounted /afs unix filesystem identical workstations local name space unique workstation contains temporary files needed workstation initialization symbolic links files shared name space andrew file system heavily influenced version 4 sun microsystems popular network file system nfs additionally variant afs distributed file system dfs adopted open software foundation 1989 part distributed computing environment finally afs version two predecessor coda file system three major implementations transarc ibm openafs arla transarc software deprecated losing support fourth implementation exists linux kernel source code since least version 2.6.10 committed red hat fairly simple implementation still early stages development therefore incomplete january 2013 following access control list acl permissions granted permissions affect files subdirectories include additionally afs includes application acls h effect access files | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
4140,
7225,
11323,
8772,
7244,
1109,
5206,
10851,
4708,
9836,
7789,
9333,
6263,
9335,
9343,
7818,
654,
2193,
2194,
2197,
2199,
11419,
6309,
1190,
5286,
10405,
... | Test |
3,827 | 4 | Snare_(software):snare software snare sometimes also written snare acronym system intrusion analysis reporting environment collection software tools collect audit log data variety operating systems applications facilitate centralised log analysis enterprise agents available linux osx windows solaris microsoft sql server variety browsers snare enterprise epilog windows facilitates central collection processing windows text-based log files isa/iis snare enterprise epilog unix provides method collect text based log files linux solaris operating systems opensource agents available irix aix snare currently used hundreds thousands individuals organisations worldwide meet local federal information security guidelines associated auditing eventlog collection snare series agents began life 2001 team intersect alliance created linux kernel module implement trusted computer system evaluation criteria auditing c2 level agents windows solaris soon followed additional operating systems applications added mix time snare server software originally designed meet needs australian-based intelligence agency clients distribution restricted australia need server solution complement increasingly popular snare agents pushed intersect alliance team find overseas partners allow distribution internationally snare described 'de facto standard windows event retrieval deep roots open source movement coupled available commercial support options used small non-profit organisations right huge multinational fortune-500 companies organisations produce audit server software competes snare server software cisco sensage loglogic use recommend snare agents customers agents supported commercial open-source version available snare agents designed collect audit log data host system push data quickly possible central server servers archive analysis reporting central server either syslog server snare server appliance custom application snare agents also able push logs unidirectional network order facilitate log transfer networks low classification networks higher classification snare server appliance software-only solution provides variety analysis tools facilitate collection analysis reporting archival audit log data | [
4033,
4067,
4234,
6797,
3482,
11030,
823,
2426,
4439
] | Validation |
3,828 | 9 | Okular:okular okular multiplatform document viewer developed kde community based qt kde frameworks libraries distributed part kde applications bundle originally based kpdf replaced kpdf kghostview kfax kfaxview kdvi kde 4 functionality easily embedded applications okular started google summer code 2005 piotr szymański accepted student okular identified success story 2007 season usability season okular toolbar mockup created based analysis popular document viewers usage survey ported qt 5 december 2016 version numbering jumped 0.26 1.0 okular annotation features include commenting pdf documents highlighting drawing lines geometric shapes adding textboxes stamps annotations stored separately unmodified pdf file since version 0.15 poppler 0.20 saved document standard pdf annotations text extracted text file possible select parts document copy text image clipboard features include reading text aloud using qt speech module part qt since qt 5 previously using jovie trimming white page borders setting bookmarks supports following file formats official version obeys drm restrictions pdf files default may prevent copying printing converting pdf files turned options obey drm limitations however | [
6408,
6539,
7181,
1295,
5397,
1822,
543,
6694,
8621,
7983,
8627,
8628,
823,
1083,
9408,
196,
2886,
73,
9418,
3407,
6991,
2513,
2258,
10838,
7384,
8921,
8413,
5869,
6257,
6389,
4855
] | Validation |
3,829 | 3 | Klaiber's_law:klaiber law simply stated klaiber law proposes silicon wafer size dictate largest diameter ultrapure water supply piping needed within semiconductor wafer factory ultrapure water upw used extensively fabrication steps making computer microchips microchips fabricated round thin substrates silicon called wafer since 1990s pipes fittings valves used carry upw increased dramatically diameter consequently delivered volume gallons per minute usage polyvinylidene fluoride pvdf material choice larger conduits convey upw pvdf also referenced astm 5127 – 07 standard guide ultra-pure water used electronics semiconductor industries needed maintain highest qualities water early 1990s observation made dr. felix klaiber since referred klaiber ’ law recognized semiconductor jump using 100mm 150mm diameter silicon wafers largest conduits upw systems pvdf 110mm outer diameter soon followed need larger 160mm pvdf conduits next jump 200mm silicon wafers years later required 225mm pvdf conduits recently semiconductor jump 300mm wafers required need even larger upw systems using 315mm conduits since dr. klaiber earlier postulation relationship wafer size diameter pvdf conduits observed others unbeknownst libman et al. identical position klaiber law discussed 2010 presentation current hp high purity pvdf piping size limited 12 inch 305mm historically size wafer coincided diameter main lines libman questioned trend would continue 450mm wafers | [] | None |
3,830 | 9 | ExtendScript:extendscript extendscript scripting language associated toolkit developed adobe systems intended use creative suite technical communication suite products dialect ecmascript 3 standard therefore similar javascript actionscript toolkit comes bundled creative suite technical communication suite editions access tools within applications like photoshop framemaker indesign effects batch-processing projects | [
8262,
3462,
11625,
6797,
7983,
10097
] | Test |
3,831 | 9 | EusLisp_Robot_Programming_Language:euslisp robot programming language euslisp lisp-based programming system built basis object orientation designed specifically developing robotics software first version ran 1986 unix-system5/ustation-e20 | [
6502
] | Test |
3,832 | 9 | Domain-specific_modeling:domain-specific modeling domain-specific modeling dsm software engineering methodology designing developing systems computer software involves systematic use domain-specific language represent various facets system domain-specific modeling languages tend support higher-level abstractions general-purpose modeling languages require less effort fewer low-level details specify given system domain-specific modeling often also includes idea code generation automating creation executable source code directly domain-specific language models free manual creation maintenance source code means domain-specific language significantly improve developer productivity reliability automatic generation compared manual coding also reduce number defects resulting programs thus improving quality domain-specific language differs earlier code generation attempts case tools 1980s uml tools 1990s code generators modeling languages built tool vendors possible tool vendor create domain-specific language generators normal domain-specific language occur within one organization one expert developers creates modeling language generators rest developers use modeling language generator built organization use allows tight fit exact domain response changes domain domain-specific languages usually cover range abstraction levels particular domain example domain-specific modeling language mobile phones could allow users specify high-level abstractions user interface well lower-level abstractions storing data phone numbers settings likewise domain-specific modeling language financial services could permit users specify high-level abstractions clients well lower-level abstractions implementing stock bond trading algorithms domain-specific modeling also helpful reason low-level software artifacts define language one needs language write definition language model often called metamodel hence language defining modeling language meta-metamodel meta-metamodels divided two groups derived customizations existing languages developed specifically meta-metamodels derived meta-metamodels include entity relationship diagrams formal languages extended backus-naur form ebnf ontology languages xml schema meta-object facility mof strengths languages tend familiarity standardization original language ethos domain-specific modeling favors creation new language specific task unsurprisingly new languages designed meta-metamodels widely used family languages oprr goprr gopprr focus supporting things found modeling languages minimum effort many general-purpose modeling languages already tool support available form case tools domain-specific language languages tend small market size support construction bespoke case tool scratch instead tool support domain-specific language languages built based existing domain-specific language frameworks domain-specific language environments domain-specific language environment may thought metamodeling tool i.e. modeling tool used define modeling tool case tool resulting tool may either work within domain-specific language environment less commonly produced separate stand-alone program common case domain-specific language environment supports additional layer abstraction compared traditional case tool using domain-specific language environment significantly lower cost obtaining tool support domain-specific language since well-designed domain-specific language environment automate creation program parts costly build scratch domain-specific editors browsers components domain expert needs specify domain specific constructs rules domain-specific language environment provides modeling tool tailored target domain existing domain-specific language takes place domain-specific language environments either commercial metaedit+ actifsource open source gems academic gme increasing popularity domain-specific language led domain-specific language frameworks added existing ides e.g eclipse modeling project emp emf gmf microsoft dsl tools software factories unified modeling language uml general-purpose modeling language software-intensive systems designed support mostly object oriented programming consequently contrast domain-specific language languages uml used wide variety purposes across broad range domains primitives offered uml object oriented programming domain-specific languages offer primitives whose semantics familiar practitioners domain example domain automotive engineering software models represent properties anti-lock braking system steering wheel etc uml includes profile mechanism allows constrained customized specific domains platforms uml profiles use stereotypes stereotype attributes known tagged values uml 2.0 constraints restrict extend scope uml particular domain perhaps best known example customizing uml specific domain sysml domain specific language systems engineering | [
16,
2009,
2691,
9926
] | Test |
3,833 | 7 | Online_OS:online os online operating system fully multi-lingual free use web desktop written javascript using ajax windows-based desktop environment open-source applications system utilities developed upon rebox web application framework icube network solutions austrian company located vienna oos.cc short online operating system web application platform mimicked look feel classic desktop operating systems microsoft windows mac os x kde consisted various open source applications built upon so-called rebox web application framework applications could executed integrated parallel way oos could considered web desktop webtop provided basic services gui virtual file system access control management possibilities develop deploy applications online online operating system executed within web browser real operating system rather portal various web applications offering high usability flexibility project partly funded grants internetprivatstiftung austria ipa 01.08.2008 almost 20.000 users joined oos.cc community using offered featured applications development web desktop started icube network solutions 2005 followed first beta releases 2006 hence together youos eyeos considered one first publicly available systems kind first full version including core-level multi-language support file system basic set applications released public march 2007 occasion national exhibition itnt austria left beta state half year later october 2007 first release considered stable 1.0.0 published july 2007 project contained applications received several national innovation awards see gained attention mainly due comprehensive approach taken see oos.cc started national project full platform including offered applications currently available three languages german english well spanish receiving increasing coverage around world examples see current version 1.3.01 01.08.2008 project fully written javascript exclusively using dhtml techniques run web browser without additional software installation needed system implements modern kind web application model excessively using ajax communicating client components java server backend exclusively asynchronous manner aim offer users unique interaction behavior following desktop metaphor main idea web desktop also typical sort web application broadly use javascript-on-demand techniques cutting complete project source pieces loading instantly needed based technical basis rebox framework library applications oos.cc built fully flexible extensible api including gui widget set communication mechanisms server services offering general framework specific services online operating system consisted basic framework able launch javascript application using rebox library user interface based behavior windows desktop start menu task bar desktop background applications running environment server side java based web services ran serve client processes provide data relational database backend oos.cc also provided integrated development environment called developer suite allowed community build applications desktop environment based rebox see development section applications available oos.cc open source european union public licence eupl rebox development toolkit free use developing applications webtop mentioned applications published oos.cc open source based eupl installed deinstalled what-ever preferences user besides global services like multi-language support global theme support well minor tools games oos.cc offered four major services could used completely free charge next releases planned focus extensive security privacy suite dealing challenges like anonymous communication browsing well temporary mail-addresses well offering encrypted password file storage connectivity services since initial stable release oos.cc could accessed using https ensure secure communication one key focuses team right beginning offer flexible comprehensive api used develop custom applications within oos.cc also stand-alone web-applications integrate single components existing web-sites decoupling development web-related problems using rebox api web-applications development similar fashion java program elements positioned interact like high-level object oriented programming languages without taking care divs browser specific behavior communication handling framework also offers multi-language theme support existing well newly created applications allowing changing almost every aspect look feel used components according preferences users taking advantage approach one applications offered oos integrated development suite allowing directly writing executing code hence creating new programs within boundaries web computer applications oos.cc released open source thus existing programs offered imported reviewed changed locally deployed following idea every user free submit changed newly created applications included globally offered application set last release offered features like auto-completion outline-window | [
9762,
7364,
3462,
9286,
8616,
1802,
9772,
6797,
5677,
2737,
9495
] | None |
3,834 | 6 | ExFAT:exfat exfat extended file allocation table file system introduced microsoft 2006 optimized flash memory usb flash drives sd cards exfat proprietary microsoft owns patents several elements design exfat used ntfs feasible solution due data-structure overhead greater file-size limit standard fat32 file system i.e 4 gib required exfat adopted sd card association default file system sdxc cards larger 32 gib 2013 samsung published gpl linux driver exfat exfat first introduced late 2006 part windows ce 6.0 embedded windows operating system vendors signing licenses exfat either embedded systems device manufacturers produce media preformatted exfat entire file allocation table fat family exfat included used embedded systems lightweight better suited solutions low memory low power requirements easily implemented firmware specifications features requirements exfat file system include exfat format allows individual files larger 4 gb facilitating long continuous recording hd video exceed 4 gb limit less hour current digital cameras using fat32 break video files multiple segments approximately 2 4 gb increase capacity increase data transferred write operation needs made efficient sdxc cards running uhs-i minimum guaranteed write speed 10 mbps exfat plays factor achieving throughput reduction file system overhead cluster allocation achieved introduction cluster bitmap elimination reduction writes fat single bit directory record indicates file contiguous telling exfat driver ignore fat optimization analogous extent file systems except applies whole files opposed contiguous parts files exfat supported windows xp windows server 2003 update kb955704 windows embedded ce 6.0 windows vista service pack 1 windows server 2008 windows 7 windows 8 windows server 2008 r2 except windows server 2008 server core windows 10 mac os x starting 10.6.5 companies integrate exfat specific group consumer devices including cameras camcorders digital photo frames flat fee mobile phones pcs networks different volume pricing model exfat supported number media devices modern flat-panel tvs media centers portable media players vendors flash media including usb pen drives compact flash cf solid-state drives ssd ship high-capacity media pre-formatted exfat file system example sandisk ships 256 gb cf cards exfat microsoft entered licensing agreements blackberry panasonic sanyo sony canon aspen avionics audiovox continental harman lg automotive bmw mac os x snow leopard 10.6.5 later create read write verify repair exfat file systems fuse-based implementation named fuse-exfat exfat-fuse read/write support available freebsd multiple linux distributions older versions mac os x kernel implementation also released written samsung initially released github unintentionally later released officially samsung compliance gpl none solutions become official part linux due patent encumbered status exfat file system implementation called exfatfilesystem based fuse-exfat available amigaos 4.1 proprietary read/write solutions licensed derived microsoft exfat implementation available android linux operating systems paragon software group tuxera xcfiles datalight proprietary full-featured implementation intended portable 32-bit systems rtfs ebs embedded software full-featured implementation embedded devices two experimental unofficial solutions available dos loadable usbexfat driver requires panasonic usb stack dos works usb storage devices open-source exfat executable exfat file system reader requires hx dos extender work native exfat real-mode dos drivers would allow usage booting exfat volumes exfat employs filename hash-based lookup phase speed certain cases described us patent 8321439 quick file name lookup using name hash document perhaps contains additional details helpful understanding file system appendix like ntfs exfat pre-allocate disk space file marking arbitrary space disk 'allocated file exfat uses two separate 64-bit length fields directory valid data length vdl indicates real size file physical data length provide improvement allocation cluster storage new file microsoft incorporated method pre-allocate contiguous clusters bypass use updating fat table december 10 2013 us patent office granted patent us8606830 one feature exfat used exfat implementation within embedded systems provides atomic transactions multiple steps updating file system metadata feature called transaction safe fat texfat granted patent us patent office us7613738 november 3 2009. exfat rest fat family file systems use indexes file names unlike ntfs uses b-trees file searching file accessed directory must sequentially searched match found file names shorter 16 characters length one file name record required entire file represented three 32-byte directory records called directory file set 256 mib sub-directory hold 2,796,202 file sets files longer names number decrease maximum based minimum three-record file set help improve sequential searching directories including root hash value file name derived file stored directory record searching file file name first converted upper case using upcase table file names case insensitive hashed using proprietary patented algorithm 16-bit 2 byte hash value record directory searched comparing hash value match found file names compared ensure proper file located case hash collisions improves performance 2 bytes compared file significantly reduces cpu cycles file names 2 characters bytes size virtually every comparison performed 2 bytes time intended file located exfat introduces metadata integrity use checksums three checksums currently use volume boot record vbr 12 sector region contains boot records bios parameter block bpb oem parameters checksum sector two vbr type regions main vbr backup vbr checksum sector checksum previous 11 sectors exception three bytes boot sector flags percent used provides integrity vbr determining vbr modified common cause could boot sector virus would also catch corruption vbr second checksum used upcase table static table never change corruption table could prevent files located table used convert filenames upper case searching locate file third checksum directory file sets multiple directory records used define single file called file set file set metadata including file name time stamps attributes address first cluster location data file lengths file name checksum taken entire file set mismatch would occur directory file set accidentally maliciously changed file system mounted integrity check conducted hashes verified mounting also includes comparison version exfat file system driver make sure driver compatible file system trying mount make sure none required directory records missing example directory record upcase table allocation bitmap required file system ca n't run missing checks fail file system mounted although certain cases may mount read-only file system provides extensibility template-based metadata definitions using generic layouts generic patterns exfat proprietary file system microsoft released specification lack documentation hampered development free open-source drivers exfat accordingly exfat support effectively limited microsoft products microsoft licensees turn inhibited exfat adoption universal exchange format interoperability requires certain results achieved particular predefined way algorithm exfat potentially requires every implementation perform certain procedures exactly way microsoft implementation procedures used microsoft implementation patented patents owned microsoft license use algorithms purchased microsoft companies including apple google samsung done however open-source ecosystem financial incentive open-source vendors purchase license algorithms regardless whether open-source including samsung leaked kernel driver source initially fraudulently rebadged gpl-licensed microsoft stated license required order implement exfat use product device unlicensed distribution exfat driver would make distributor liable financial damages driver found violated microsoft patents patents may enforceable determined legal process expensive time consuming may also possible achieve intended results without infringing microsoft patents october 2018 microsoft released 60,000 patents open invention network members linux systems exfat patents included however discussion within microsoft whether microsoft allow exfat linux devices | [
5120,
2564,
11270,
5643,
6669,
3598,
4624,
10257,
9236,
6677,
5142,
8214,
537,
3611,
540,
3102,
9249,
9762,
8227,
8740,
5158,
1577,
10281,
2101,
7225,
11323,
10812,
3648,
10306,
8772,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
1109,
... | Test |
3,835 | 3 | ARM_Cortex-A72:arm cortex-a72 arm cortex-a72 microarchitecture implementing armv8-a 64-bit instruction set designed arm holdings austin design centre cortex-a72 3-wide decode out-of-order superscalar pipeline available sip core licensees design makes suitable integration sip cores e.g gpu display controller dsp image processor etc one die constituting system chip soc cortex-a72 announced 2015 serve successor cortex-a57 designed use 20 less power offer 90 greater performance | [
11282,
9235,
11289,
1057,
38,
4139,
8237,
9774,
2097,
8250,
8253,
7745,
7747,
2635,
99,
8812,
8815,
10361,
638,
644,
7300,
8842,
146,
659,
7833,
666,
5786,
6815,
4258,
4773,
9913,
8383,
10945,
4821,
2788,
3301,
9964,
6391,
2814,
781,
69... | Validation |
3,836 | 8 | Google_Search_Console:google search console google search console previously google webmaster tools web service google provided free charge webmasters allows check indexing status optimize visibility websites may 20 2015 google rebranded google webmaster tools google search console january 2018 google introduced new version search console refreshed user interface improvements tools let webmasters list inbound links google webmaster tools generally much larger list inbound links discovered using link example.com search query google google tight lipped discrepancy list google webmaster tools includes nofollow links convey search engine optimization authority linked site hand list links generated link example.com type query deemed google important links controversial way google webmaster tools well google index seems routinely ignore link spam manual penalty removed google webmaster tools still display penalty another 1–3 days google search console rebrand information produced demonstrating google search console creates data points reconcile google analytics ranking data particularly within local search market webmaster services hawaii | [
4096,
1409,
4995,
5892,
8455,
7816,
9610,
5262,
8719,
3600,
6800,
5522,
1427,
5524,
7700,
10645,
11408,
10009,
8858,
1435,
9244,
10393,
798,
10525,
288,
7841,
2978,
4901,
1959,
3499,
7595,
10284,
3633,
1203,
5431,
2875,
10045,
7359,
8639,
... | Test |
3,837 | 8 | Perlbal:perlbal perlbal perl-based reverse proxy load balancer web server perlbal maintained group connected danga interactive program common use large web sites distribute load number servers like perl perlbal distributed gnu general public license artistic license thus free software perlbal also features so-called re-proxy mechanism allows backend webapp send back small response perlbal acts internal redirect causes get response data elsewhere often used expensive application server processes defer much simpler faster http servers serve static files freeing application server computing work commonly used conjunction mogilefs additionally plugins written support various operations may traditionally performed application layer example filter plugin developed dynamically alter palette png gif image passes proxy allowing image tinted used livejournal provide predefined page templates whose colors including baked images customized user relatively simple filtering task load balancer layer avoids overhead passing request back full application servers | [
225,
5249,
11492,
4294,
8582,
2281,
6313,
8941,
4398,
3988,
7764,
9014,
7518
] | Test |
3,838 | 4 | Simultaneous_Authentication_of_Equals:simultaneous authentication equals cryptography simultaneous authentication equals sae secure password-based authentication password-authenticated key agreement method sae variant dragonfly key exchange defined based diffie–hellman key exchange using finite cyclic groups primary cyclic group elliptic curve problem using diffie–hellman key exchange authentication mechanism resulting key influenced pre-shared key mac addresses peers solve authentication problem sae originally implemented use peers ieee 802.11s peers discover security enabled take part sae exchange sae completes successfully peer knows party possesses mesh password by-product sae exchange two peers establish cryptographically strong key key used authenticated mesh peering exchange ampe establish secure peering derive session key protect mesh traffic including routing traffic january 2018 wi-fi alliance announced wpa3 replacement wpa2 new standard uses 128-bit encryption wpa3-personal mode 192-bit wpa3-enterprise forward secrecy wpa3 standard also replaces pre-shared key exchange simultaneous authentication equals defined ieee 802.11-2016 resulting secure initial key exchange personal mode wi-fi alliance also claims wpa3 mitigate security issues posed weak passwords simplify process setting devices display interface | [
7049,
5270,
5671,
6187,
4396,
3762,
434,
11321,
5439,
8640,
3780,
10332,
4581,
5863,
7411,
11125,
6904,
6779,
8828
] | Test |
3,839 | 8 | JSON-WSP:json-wsp json-wsp javascript object notation web-service protocol web-service protocol uses json service description requests responses inspired json-rpc lack service description specification documentation json-rpc sparked design json-wsp description format purpose json-wsp wsdl soap idl corba describe types methods used given service also describes inter-type relations i.e nested types defines types expected method arguments types user expect receive method return values finally description opens possibility add documentation service method parameter return levels communication clients json-wsp server carried using http post requests responses json objects data content-type application/json json-wsp consists four json object specifications note json-wsp specification 1.0 still final please refer real-world example article get idea specification going structured current state actual specification kept launchpad.net rfc proposal currently created hopefully accepted within couple months service-locator service endpoint url accepts json-wsp post request objects service-name service name case sensitive identifies specific service exposed specific server doc_lines doc-string contained doc_lines list reflects single line documentation relates parent object doc_lines.. request object contains information method invoke arguments invoke method also stores information type version optional mirror value used send information client reflected server returned unchanged response object reflection value feature allows clients send multiple requests method send request identification values intercepted client response handler often necessary javascript one request processed simultaneously server response order unknown client reflection value unchanged server reflection request object mirror value marked optional client controls via request whether fault-code meanings possible fault-codes attachment type new json-wsp used anywhere description primitive type requests responses involve attachments message format must multipart/related attachments transported mimeparts media type application/octet-stream content-transfer-encoding raw binary mimeparts must unique content-id entity headers attachment values json-wsp request/response objects must match regular expression ^cid .+ capture group maps one mimepart content-id following example shows simple json-wsp description attachments could look like request method upload described could look like | [
9441,
10465,
803,
10020,
7878,
6127,
10486
] | Test |
3,840 | 2 | Microsoft_Layer_for_Unicode:microsoft layer unicode microsoft layer unicode mslu software library windows software developers simplify creating unicode-aware applications windows 95 windows 98 windows also known unicows unicode windows 95/98/me systems unicows.dll even cows microsoft describes providing layer win32 api windows 95/98/me write single unicode version application run properly platforms previously software developers either provide two separate versions application perform complex string translations api decisions runtime mslu announced march 2001 first available july 2001 edition microsoft platform sdk arguably long peak popularity windows 95/98/me codename godot reference play waiting godot centered around failure man named godot appear endless wait felt long overdue normally windows api provides ansi w wide-character versions functions windows 95/98/me versions implemented attempting call w version fail error code indicates function unimplemented windows nt/2000/xp/2003 w versions implemented however operating system generally internally implements w version natively version usually translation thunk w version adding unicows.lib link command-line kernel32.lib advapi32.lib supported win32 system link library linker resolve referenced symbols one provided unicows.lib instead wide-character function called first time runtime function stub unicows.lib first receives control decides running windows 95/98/me system technique application linked mslu windows 95/98/me systems need unicows.dll runtime operating systems slight performance penalty first function call common problem encountered occurs updaters uninstallers rename delete file oledlg.dll preventing operating system loading unicows.dll results applications openoffice.org reporting application start one required libraries found occurs even unicows.dll installed system | [
5754,
11149
] | Test |
3,841 | 6 | Disk_formatting:disk formatting disk formatting process preparing data storage device hard disk drive solid-state drive floppy disk usb flash drive initial use cases formatting operation may also create one new file systems first part formatting process performs basic medium preparation often referred low-level formatting partitioning common term second part process making data storage device visible operating system third part process usually termed high-level formatting often refers process generating new file system operating systems parts three processes combined repeated different levels term format understood mean operation new disk medium fully prepared store files general rule formatting disk leaves existing data disk medium might recoverable special tools special tools remove user data single overwrite files free space block contiguous number bytes minimum unit storage read written disk disk driver earliest disk drives fixed block sizes e.g ibm 350 disk storage unit late 1950s block size 100 6 bit characters starting 1301 ibm marketed subsystems featured variable block sizes particular track could blocks different sizes disk subsystems ibm system/360 expanded concept form count key data ckd later extended count key data eckd however use variable block size hdds fell use 1990s one last hdds support variable block size ibm 3390 model 9 announced may 1993 modern hard disk drives serial attached scsi sas serial ata sata drives appear interfaces contiguous set fixed-size blocks many years 512 bytes long beginning 2009 accelerating 2011 major hard disk drive manufacturers began releasing hard disk drive platforms using advanced format 4096 byte logical blocks floppy disks generally used fixed block sizes sizes function host os interaction controller particular type media e.g. 5¼-inch dsdd would different block sizes depending upon host os controller optical discs generally use fixed block sizes formatting disk use operating system applications typically involves three different processes low-level format floppy disks early hard disks performed disk drive controller standard 1.44 mb floppy disk low-level formatting normally writes 18 sectors 512 bytes 160 tracks 80 side floppy disk providing 1,474,560 bytes storage disk physical sectors actually larger 512 bytes addition 512 byte data field include sector identifier field crc bytes cases error correction bytes gaps fields additional bytes normally included quoted figure overall storage capacity disk different low-level formats used media example large records used cut inter-record gap size several freeware shareware free software programs e.g gparted fdformat nformat 2m allowed considerably control formatting allowing formatting high-density 3.5 disks capacity 2 mb techniques used include linux supports variety sector sizes dos windows support large-record-size dmf-formatted floppy format hard disk drives prior 1990s typically separate disk controller defined data encoded media media drive and/or controller possibly procured separate vendors users often able perform low-level formatting separate procurement also potential incompatibility separate components subsystem would reliably store data user instigated low-level formatting llf hard disk drives common minicomputer personal computer systems 1990s ibm mainframe system vendors typically supplied hard disk drives media case removable media hdds low-level format typically involved subdividing track disk one blocks would contain user data associated control information different computers used different block sizes ibm notably used variable block sizes popularity ibm pc caused industry adopt standard 512 user data bytes per block middle 1980s depending upon system low-level formatting generally done operating system utility ibm compatible pcs used bios invoked using ms-dos debug program transfer control routine hidden different addresses different bioses starting late 1980s driven volume ibm compatible pcs hdds became routinely available pre-formatted compatible low-level format time industry moved historical dumb bit serial interfaces modern intelligent bit serial interfaces word serial interfaces wherein low level format performed factory today end-user cases never perform low-level formatting ide ata hard drive fact often possible modern hard drives formatting done servowriter disk assembled drive factory generally impossible perform complete llf modern hard drives since mid-1990s outside factory term low-level format still used could called reinitialization hard drive factory configuration even terms may misunderstood present ambiguity term low-level format seems due inconsistent documentation web sites belief many users process high-level file system format must called low-level format since much low level formatting process today performed factory various drive manufacturers describe reinitialization software llf utilities web sites since users generally way determine difference complete llf reinitialization simply observe running software results hard disk must high-level formatted misinformed user mixed signals various drive manufacturers perpetuated error note whatever possible misuse terms may exist search hard drive manufacturers web sites terms many sites make reinitialization utilities available possibly bootable floppy diskette cd image files overwrite every byte check damaged sectors hard disk reinitialization include identifying sparing possible sectors written read back drive correctly term however used refer portion process every sector drive written usually writing specific value every addressable location disk traditionally physical sectors initialized fill value codice_1 per int 1eh disk parameter table dpt format ibm compatible machines value also used atari portfolio 8-inch cp/m floppies typically came pre-formatted value codice_2 way digital research value also used atari st amstrad formatted floppies amstrad otherwise used codice_3 fill value modern formatters wipe hard disks value codice_4 instead sometimes also called zero-filling whereas value codice_5 used flash disks reduce wear latter value typically also default value used rom disks reformatted advanced formatting tools allow configuring fill value one popular method performing zero-fill operation hard disk writing zero-value bytes drive using unix dd utility /dev/zero stream input file drive specific partition output file command may take many hours complete erase files file systems another method scsi disks may use sg_format command issue low-level scsi format unit command zero-filling drive necessarily secure method erasing sensitive data preparing drive use encrypted filesystem zero-filling voids plausible deniability process partitioning process writing information blocks storage device medium allows access operating system operating systems allow device medium appear multiple devices i.e partitioned multiple devices ms-dos microsoft windows unix-based operating systems bsd linux mac os x normally done partition editor fdisk gnu parted disk utility operating systems support multiple partitions current ibm mainframe oss derived os/360 dos/360 z/os z/vse done init command ickdsf utility oss support single partition per device called volume ickdsf functions include creating volume label writing record 0 every track floppy disks partitioned however depending upon os may require volume information order accessed os partition editors ickdsf today handle low level functions hdds optical disc drives writing timing marks reinitialize modern disk degaussed otherwise lost factory formatting high-level formatting process setting empty file system disk partition logical volume pcs installing boot sector fast operation sometimes referred quick formatting entire logical drive partition may optionally scanned defects may take considerable time case floppy disks high- low-level formatting customarily performed one pass disk formatting software 8-inch floppies typically came low-level formatted filled format filler value codice_2 since 1990s 5.25-inch 3.5-inch floppies shipped pre-formatted factory dos fat12 floppies current ibm mainframe operating systems derived os/360 dos/360 may done part allocating file utility specific file system older access methods fly new data written host protected area sometimes referred hidden protected area area hard drive high level formatted area normally visible operating system os reformatting high-level formatting performed functioning disk drive free medium contents reformatting unique operating system actually done existing data varies os important aspect process frees disk space use data actually erase everything requires overwriting block data medium something done many high-level formatting utilities reformatting often carries implication operating system software reinstalled format complete rather fixing installation suffering malfunction security compromise may necessary simply reformat everything start scratch various colloquialisms exist process wipe reload nuke pave reimage etc format command ms-dos pc dos os/2 microsoft windows disk formatting performed codice_7 command codice_7 program usually asks confirmation beforehand prevent accidental removal data versions dos undocumented codice_9 option used usual confirmation skipped format begins right away wm/formatc macro virus uses command format drive c soon document opened unconditional format also codice_10 parameter performs unconditional format circumstances overwrites entire partition preventing recovery data software note however codice_10 switch works reliably floppy diskettes see image right technically unless codice_12 used floppies always low level formatted addition high-level formatted certain circumstances hard drive partitions however codice_10 switch merely prevents creation codice_14 information partition formatted otherwise leaving partition contents entirely intact still disk marked deleted cases user data remain ripe recovery specialist tools encase disk editors reliance upon codice_10 secure overwriting hard drive partitions therefore inadvisable purpose-built tools dban considered instead overwriting windows vista upwards non-quick format overwrite goes case windows xp os/2 os/2 use codice_16 parameter specifies long format format overwrite entire partition logical drive enhances ability chkdsk recover files high-level formatting disks systems traditionally done using codice_17 command linux potentially systems well codice_17 typically wrapper around filesystem-specific commands name codice_19 fsname name filesystem format disk filesystems supported certain implementations codice_17 manipulation tools example ntfsprogs provides format utility ntfs filesystem unix unix-like operating systems higher-level formatting tools usually purpose making disk formatting easier and/or allowing user partition disk tool examples include gnu parted various gui frontends gparted kde partition manager disk utility application mac os x file deletion operating system data disk fully erased every high-level format instead area disk containing data merely marked available retains old data overwritten disk formatted different file system one previously existed partition data may overwritten would n't file system used however file systems e.g. ntfs fat file indexes mfts ntfs inodes ext2/3 etc may written exact locations partition size increased even fat file systems overwrite data beginning new partition perspective preventing recovery sensitive data recovery tools data must either completely overwritten every sector random data format format program must perform overwriting dos codice_21 command floppy diskettes filling every data sector format filler byte value typically codice_1 however applications tools especially used forensic information technology recover data conventionally erased order avoid recovery sensitive data governmental organization big companies use information destruction methods like gutmann method average users also special applications perform complete data destruction overwriting previous information although applications perform multiple writes assure data erasure single write old data generally needed modern hard disk drives ata secure erase performed disk utilities quickly thoroughly wipe drives degaussing another option however may render drive unusable | [
1408,
2432,
10508,
6797,
7053,
2193,
6289,
3859,
9343,
1440,
9762,
8485,
8235,
5293,
7342,
7983,
11182,
9907,
823,
4408,
4409,
701,
7106,
1475,
10564,
10570,
7244,
9166,
975,
4815,
11598,
1235,
4563,
4441,
2395,
6494,
11368,
8951,
2545,
8... | Test |
3,842 | 2 | Nexus_driver:nexus driver term nexus driver refers bus device driver interfaces leaf drivers specific i/o bus provides low-level integration i/o bus | [
3803
] | Test |
3,843 | 4 | Stuxnet:stuxnet stuxnet malicious computer worm first uncovered 2010 thought development since least 2005 stuxnet targets scada systems believed responsible causing substantial damage iran nuclear program although neither country openly admitted responsibility worm believed jointly built american/israeli cyberweapon stuxnet specifically targets programmable logic controllers plcs allow automation electromechanical processes used control machinery industrial processes including centrifuges separating nuclear material exploiting four zero-day flaws stuxnet functions targeting machines using microsoft windows operating system networks seeking siemens step7 software stuxnet reportedly compromised iranian plcs collecting information industrial systems causing fast-spinning centrifuges tear apart stuxnet design architecture domain-specific could tailored platform attacking modern supervisory control data acquisition scada plc systems e.g. factory assembly lines power plants majority reside europe japan us stuxnet reportedly ruined almost one fifth iran nuclear centrifuges targeting industrial control systems worm infected 200,000 computers caused 1,000 machines physically degrade stuxnet three modules worm executes routines related main payload attack link file automatically executes propagated copies worm rootkit component responsible hiding malicious files processes preventing detection presence stuxnet typically introduced target environment via infected usb flash drive thereby crossing air gap worm propagates across network scanning siemens step7 software computers controlling plc absence either criterion stuxnet becomes dormant inside computer conditions fulfilled stuxnet introduces infected rootkit onto plc step7 software modifying code giving unexpected commands plc returning loop normal operations system values feedback users 2015 kaspersky lab noted equation group used two zero-day attacks prior use stuxnet commented similar type usage exploits together different computer worms around time indicates equation group stuxnet developers either working closely together stuxnet discovered sergey ulasen initially spread via microsoft windows targeted siemens industrial control systems first time hackers targeted industrial systems first publicly known intentional act cyberwarfare implemented first discovered malware spies subverts industrial systems first include programmable logic controller plc rootkit worm initially spreads indiscriminately includes highly specialized malware payload designed target siemens supervisory control data acquisition scada systems configured control monitor specific industrial processes stuxnet infects plcs subverting step-7 software application used reprogram devices different variants stuxnet targeted five iranian organizations probable target widely suspected uranium enrichment infrastructure iran symantec noted august 2010 60 infected computers worldwide iran siemens stated worm caused damage customers iran nuclear program uses embargoed siemens equipment procured secretly damaged stuxnet kaspersky lab concluded sophisticated attack could conducted nation-state support f-secure chief researcher mikko hyppönen asked possible nation-state support involved agreed would look like yes may 2011 pbs program need know cited statement gary samore white house coordinator arms control weapons mass destruction said 're glad iranians trouble centrifuge machine – us allies – everything make sure complicate matters offering winking acknowledgement us involvement stuxnet according daily telegraph showreel played retirement party head israel defense forces idf gabi ashkenazi included references stuxnet one operational successes idf chief staff 1 june 2012 article new york times said stuxnet part us israeli intelligence operation called operation olympic games started president george w. bush expanded president barack obama 24 july 2012 article chris matyszczyk cnet reported atomic energy organization iran e-mailed f-secure chief research officer mikko hyppönen report new instance malware 25 december 2012 iranian semi-official news agency announced cyberattack stuxnet time industries southern area country virus targeted power plant industries hormozgan province recent months according expert eugene kaspersky worm also infected nuclear power plant russia kaspersky noted however since power plant connected public internet system remain safe worm first identified security company virusblokada mid-june 2010 journalist brian krebs blog posting 15 july 2010 first widely read report worm original name given virusblokada rootkit.tmphider symantec however called w32.temphid later changing w32.stuxnet current name derived combination keywords software .stub mrxnet.sys reason discovery time attributed virus accidentally spreading beyond intended target natanz plant due programming error introduced update led worm spreading engineer computer connected centrifuges spreading engineer returned home connected computer internet kaspersky lab experts first estimated stuxnet started spreading around march april 2010 first variant worm appeared june 2009 15 july 2010 day worm existence became widely known distributed denial-of-service attack made servers two leading mailing lists industrial-systems security attack unknown source likely related stuxnet disabled one lists thereby interrupted important source information power plants factories hand researchers symantec uncovered version stuxnet computer virus used attack iran nuclear program november 2007 developed early 2005 iran still setting uranium enrichment facility second variant substantial improvements appeared march 2010 apparently authors believed stuxnet spreading fast enough third minor improvements appeared april 2010 worm contains component build time-stamp 3 february 2010 united kingdom 25 november 2010 sky news reported received information anonymous source unidentified security organization stuxnet variation worm traded black market study spread stuxnet symantec showed main affected countries early days infection iran indonesia india iran reported beefed cyberwar capabilities following stuxnet attack suspected retaliatory attacks us banks unlike malware stuxnet little harm computers networks meet specific configuration requirements attackers took great care make sure designated targets hit ... marksman job worm promiscuous makes inert siemens software found infected computers contains safeguards prevent infected computer spreading worm three others erase 24 june 2012 targets stuxnet contains among things code man-in-the-middle attack fakes industrial process control sensor signals infected system shut due detected abnormal behavior complexity unusual malware worm consists layered attack three different systems stuxnet attacked windows systems using unprecedented four zero-day attacks plus cplink vulnerability vulnerability used conficker worm initially spread using infected removable drives usb flash drives contain windows shortcut files initiate executable code worm uses exploits techniques peer-to-peer rpc infect update computers inside private networks directly connected internet number zero-day exploits used unusual highly valued malware creators typically make use thus simultaneously make visible four different zero-day exploits worm amongst exploits remote code execution computer printer sharing enabled lnk/pif vulnerability file execution accomplished icon viewed windows explorer negating need user interaction stuxnet unusually large half megabyte size written several different programming languages including c c++ also irregular malware windows component malware promiscuous spreads relatively quickly indiscriminately malware user-mode kernel-mode rootkit capability windows device drivers digitally signed private keys two certificates stolen separate well-known companies jmicron realtek located hsinchu science park taiwan driver signing helped install kernel-mode rootkit drivers successfully without users notified therefore remained undetected relatively long period time compromised certificates revoked verisign two websites denmark malaysia configured command control servers malware allowing updated industrial espionage conducted uploading information domain names subsequently redirected dns service provider dynadot part global effort disable malware according researcher ralph langner installed windows system stuxnet infects project files belonging siemens wincc/pcs 7 scada control software step 7 subverts key communication library wincc called codice_1 intercepts communications wincc software running windows target siemens plc devices software able configure program two connected via data cable way malware able install plc devices unnoticed subsequently mask presence wincc control software attempts read infected block memory plc system malware furthermore used zero-day exploit wincc/scada database software form hard-coded database password entirety stuxnet code yet disclosed payload targets scada configurations meet criteria programmed identify stuxnet requires specific slave variable-frequency drives frequency converter drives attached targeted siemens s7-300 system associated modules attacks plc systems variable-frequency drives two specific vendors vacon based finland fararo paya based iran furthermore monitors frequency attached motors attacks systems spin 807 hz 1,210 hz industrial applications motors parameters diverse may include pumps gas centrifuges stuxnet installs malware memory block db890 plc monitors profibus messaging bus system certain criteria met periodically modifies frequency 1,410 hz 2 hz 1,064 hz thus affects operation connected motors changing rotational speed also installs rootkit – first documented case platform – hides malware system masks changes rotational speed monitoring systems siemens released detection removal tool stuxnet siemens recommends contacting customer support infection detected advises installing microsoft updates security vulnerabilities prohibiting use third-party usb flash drives siemens also advises immediately upgrading password access codes worm ability reprogram external plcs may complicate removal procedure symantec liam o'murchu warns fixing windows systems may completely solve infection thorough audit plcs may necessary despite speculation incorrect removal worm could cause damage siemens reports first four months since discovery malware successfully removed systems 22 customers without adverse impact prevention control system security incidents viral infections like stuxnet topic addressed public private sector us department homeland security national cyber security division ncsd operates control system security program cssp program operates specialized computer emergency response team called industrial control systems cyber emergency response team ics-cert conducts biannual conference provides training publishes recommended practices provides self-assessment tool part department homeland security plan improve american computer security 2008 idaho national laboratory inl worked siemens identify security holes company widely used process control system 7 pcs 7 software step 7 july 2008 inl siemens publicly announced flaws control system chicago conference stuxnet exploited holes 2009 several industry organizations professional societies published standards best practice guidelines providing direction guidance control system end-users establish control system security management program basic premise documents share prevention requires multi-layered approach often referred defense-in-depth layers include policies procedures awareness training network segmentation access control measures physical security measures system hardening e.g. patch management system monitoring anti-virus intrusion prevention system ips standards best practices also recommend starting risk analysis control system security assessment experts believe stuxnet required largest costliest development effort malware history developing many capabilities would required team highly capable programmers in-depth knowledge industrial processes interest attacking industrial infrastructure eric byres years experience maintaining troubleshooting siemens systems told wired writing code would taken many man-months man-years symantec estimates group developing stuxnet would consisted five thirty people would taken six months prepare guardian bbc new york times claimed unnamed experts studying stuxnet believe complexity code indicates nation-state would capabilities produce self-destruct safeguards within code implied western government responsible least responsible development however software security expert bruce schneier initially condemned 2010 news coverage stuxnet hype stating almost entirely based speculation subsequent research schneier stated 2012 conclusively link stuxnet centrifuge structure natanz nuclear enrichment lab iran ralph langner researcher identified stuxnet infected plcs first speculated publicly september 2010 malware israeli origin targeted iranian nuclear facilities however langner recently ted talk recorded february 2011 stated opinion mossad involved leading force israel leading force behind stuxnet cyber superpower – one united states kevin hogan senior director security response symantec reported majority infected systems iran 60 led speculation may deliberately targeting high-value infrastructure iran including either bushehr nuclear power plant natanz nuclear facility langner called malware one-shot weapon said intended target probably hit although admitted speculation another german researcher spokesman german-based chaos computer club frank rieger first speculate natanz target according israeli newspaper haaretz september 2010 experts iran computer security specialists increasingly convinced stuxnet meant sabotage uranium enrichment facility natanz – centrifuge operational capacity dropped past year 30 percent 23 november 2010 announced uranium enrichment natanz ceased several times series major technical problems serious nuclear accident supposedly shutdown centrifuges occurred site first half 2009 speculated forced head iran atomic energy organization gholam reza aghazadeh resign statistics published federation american scientists fas show number enrichment centrifuges operational iran mysteriously declined 4,700 3,900 beginning around time nuclear incident wikileaks mentioned would occurred institute science international security isis suggests report published december 2010 stuxnet reasonable explanation apparent damage natanz may destroyed 1,000 centrifuges 10 percent sometime november 2009 late january 2010 authors conclude isis report notes iranian authorities attempted conceal breakdown installing new centrifuges large scale worm worked first causing infected iranian ir-1 centrifuge increase normal operating speed 1,064 hertz 1,410 hertz 15 minutes returning normal frequency twenty-seven days later worm went back action slowing infected centrifuges hundred hertz full 50 minutes stresses excessive slower speeds caused aluminium centrifugal tubes expand often forcing parts centrifuges sufficient contact destroy machine according washington post iaea cameras installed natanz facility recorded sudden dismantling removal approximately 900–1,000 centrifuges time stuxnet worm reportedly active plant iranian technicians however able quickly replace centrifuges report concluded uranium enrichment likely briefly disrupted 15 february 2011 institute science international security released report concluding associated press reported semi-official iranian students news agency released statement 24 september 2010 stating experts atomic energy organization iran met previous week discuss stuxnet could removed systems according analysts david albright western intelligence agencies attempting sabotage iranian nuclear program time head bushehr nuclear power plant told reuters personal computers staff plant infected stuxnet state-run newspaper iran daily quoted reza taghipour iran telecommunications minister saying caused serious damage government systems director information technology council iranian ministry industries mines mahmud liaii said electronic war launched iran ... computer worm designed transfer data production lines industrial plants locations outside iran response infection iran assembled team combat 30,000 ip addresses affected iran official said infection fast spreading iran problem compounded ability stuxnet mutate iran set systems clean infections advised using siemens scada antivirus since suspected antivirus actually embedded codes update stuxnet instead eradicating according hamid alipour deputy head iran government information technology company attack still ongoing new versions virus spreading reported company begun cleanup process iran sensitive centres organizations anticipated could root virus within one two months virus stable since started cleanup process three new versions spreading told islamic republic news agency 27 september 2010 29 november 2010 iranian president mahmoud ahmadinejad stated first time computer virus caused problems controller handling centrifuges natanz facilities according reuters told reporters news conference tehran succeeded creating problems limited number centrifuges software installed electronic parts day two iranian nuclear scientists targeted separate nearly simultaneous car bomb attacks near shahid beheshti university tehran majid shahriari quantum physicist killed fereydoon abbasi high-ranking official ministry defense seriously wounded wired speculated assassinations could indicate whoever behind stuxnet felt sufficient stop nuclear program wired article suggested iranian government could behind assassinations january 2010 another iranian nuclear scientist physics professor tehran university killed similar bomb explosion 11 january 2012 director natanz nuclear enrichment facility mostafa ahmadi roshan killed attack quite similar one killed shahriari analysis fas demonstrates iran enrichment capacity grew 2010 study indicated iran centrifuges appeared performing 60 better previous year would significantly reduce tehran time produce bomb-grade uranium fas report reviewed official iaea affirmed study european us officials along private experts told reuters iranian engineers successful neutralizing purging stuxnet country nuclear machinery given growth iranian enrichment capability 2010 country may intentionally put misinformation cause stuxnet creators believe worm successful disabling iranian nuclear program actually israel unit 8200 speculated country behind stuxnet many media reports experts richard a. falkenrath former senior director policy plans within us office homeland security yossi melman covers intelligence israeli daily newspaper haaretz writing book israeli intelligence also suspected israel involved noting meir dagan former 2011 head national intelligence agency mossad term extended 2009 said involved important projects additionally israel expects iran nuclear weapon 2014 2015 – least three years later earlier estimates – without need israeli military attack iranian nuclear facilities seem know something time originally thought added israel publicly commented stuxnet attack confirmed cyberwarfare among pillars defense doctrine military intelligence unit set pursue defensive offensive options questioned whether israel behind virus fall 2010 israeli officials broke wide smiles fueling speculation government israel involved genesis american presidential advisor gary samore also smiled stuxnet mentioned although american officials indicated virus originated abroad according telegraph israeli newspaper haaretz reported video celebrating operational successes gabi ashkenazi retiring idf chief staff shown retirement party included references stuxnet thus strengthening claims israel security forces responsible 2009 year stuxnet discovered scott borg united states cyber-consequences unit us-ccu suggested israel might prefer mount cyber-attack rather military strike iran nuclear facilities late 2010 borg stated israel certainly ability create stuxnet little downside attack would virtually impossible prove tool like stuxnet israel obvious weapon choice iran uses p-1 centrifuges natanz design a. q. khan stole 1976 took pakistan black market nuclear-proliferation network sold p-1s among customers iran experts believe israel also somehow acquired p-1s tested stuxnet centrifuges installed dimona facility part nuclear program equipment may united states received p-1s libya former nuclear program also referred several clues code concealed reference word myrtus believed refer myrtle tree hadassah hebrew hadassah birth name former jewish queen persia queen esther however may myrtus reference simply misinterpreted reference scada components known rtus remote terminal units reference actually rtus –a management feature scada also number 19790509 appears code might refer date 1979 may 09 day habib elghanian persian jew executed tehran another date appears code 24 september 2007 day iran president mahmoud ahmadinejad spoke columbia university made comments questioning validity holocaust data conclusive since noted symantec ... attackers would natural desire implicate another party also testimony involvement united states collaboration israel one report stating vanishingly little doubt played role creating worm reported united states one secret programs initiated bush administration accelerated obama administration sought destroy iran nuclear program novel methods undermining iranian computer systems diplomatic cable obtained wikileaks showed united states advised target iran nuclear capabilities 'covert sabotage new york times article early january 2009 credited unspecified program preventing israeli military attack iran efforts focused ways destabilize centrifuges wired article claimed stuxnet believed created united states fact john bumgarner former intelligence officer member united states cyber-consequences unit us-ccu published article prior stuxnet discovered deciphered outlined strategic cyber strike centrifuges suggests cyber attacks permissible nation states operating uranium enrichment programs violate international treaties gives credibility claims bumgarner pointed centrifuges used process fuel nuclear weapons key target cybertage operations made destroy manipulating rotational speeds march 2012 interview 60 minutes retired us air force general michael hayden – served director central intelligence agency national security agency – denying knowledge created stuxnet said believed good idea carried downside legitimized use sophisticated cyber weapons designed cause physical damage hayden said take look ... maybe even attempt turn purposes report sean mcgurk former cybersecurity official department homeland security noted stuxnet source code could downloaded online modified directed new target systems speaking stuxnet creators said opened box demonstrated capability ... something put back april 2011 iranian government official gholam reza jalali stated investigation concluded united states israel behind stuxnet attack frank rieger stated three european countries intelligence agencies agreed stuxnet joint united states-israel effort code windows injector plc payload differ style likely implying collaboration experts believe us-israel cooperation unlikely level trust two countries ’ intelligence military establishments high wired magazine article us general keith b. alexander stated cyber warriors already launched first attack cyber weapon came known stuxnet created built nsa partnership cia israeli intelligence mid-2000s china jordan france possibilities siemens may also participated langner speculated infection may spread usb drives belonging russian contractors since iranian targets accessible via internet sandro gaycken free university berlin argued attack iran ruse distract stuxnet real purpose according broad dissemination 100,000 industrial plants worldwide suggests field test cyber weapon different security cultures testing preparedness resilience reactions highly valuable information cyberwar unit united kingdom denied involvement worm creation stratfor documents released wikileaks suggest international security firm 'stratfor believe israel behind stuxnet – ca n't assume stuxnet capable blast well july 2013 edward snowden claimed stuxnet cooperatively developed united states israel according report reuters nsa also tried sabotage north korea nuclear program using version stuxnet operation reportedly launched tandem attack targeted iranian centrifuges 2009–10 north korean nuclear program shares many similarities iranian developed technology transferred pakistani nuclear scientist a.q khan effort failed however north korea extreme secrecy isolation made impossible introduce stuxnet nuclear facility gholamreza jalali iran chief national passive defence organisation npdo claims country fended stuxnet-like attack targeting country telecom infrastructure iran telecommunications minister mohammad-javad azari jahromi since accused israel orchestrating attack iran plans sue israel international court justice icj also willing launch retaliation attack latter n't mend ways november 2013 article foreign policy magazine claims existence earlier much sophisticated attack centrifuge complex natanz focused increasing centrifuge failure rate long time period stealthily inducing uranium hexafluoride gas overpressure incidents malware capable spreading physically installed probably previously contaminated field equipment used contractors working siemens control systems within complex clear whether attack attempt successful followed different simpler conventional attack indicative 1 september 2011 new worm found thought related stuxnet laboratory cryptography system security crysys budapest university technology economics analyzed malware naming threat duqu symantec based report continued analysis threat calling nearly identical stuxnet completely different purpose published detailed technical paper main component used duqu designed capture information keystrokes system information exfiltrated data may used enable future stuxnet-like attack 28 december 2011 kaspersky lab director global research analysis spoke reuters recent research results showing platform stuxnet duqu originated 2007 referred tilded due ~d beginning file names also uncovered research possibility three variants based tilded platform may 2012 new malware flame found thought related stuxnet researchers named program flame name one modules analysing code flame kaspersky lab said strong relationship flame stuxnet early version stuxnet contained code propagate infections via usb drives nearly identical flame module exploits vulnerability december 2017 reported safety systems unidentified power station believed saudi arabia compromised triconex industrial safety technology made schneider electric se targeted believed state sponsored attack computer security company symantec claimed malware known triton exploited vulnerability computers running microsoft windows operating system since 2010 extensive international media coverage stuxnet aftermath early commentary economist pointed stuxnet new kind cyber-attack 8 july 2011 wired published article detailing network security experts able decipher origins stuxnet piece kim zetter claimed stuxnet cost–benefit ratio still question later commentators tended focus strategic significance stuxnet cyber weapon following wired piece holger stark called stuxnet first digital weapon geopolitical importance could change way wars fought meanwhile eddie walsh referred stuxnet world newest high-end asymmetric threat ultimately claim extensive media coverage afforded stuxnet served advertisement vulnerabilities used various cybercriminal groups may case media coverage also increased awareness cyber security threats alex gibney 2016 documentary zero days covers phenomenon around stuxnet 2016 revealed general james cartwright former head u.s. strategic command leaked information related stuxnet later pleaded guilty lying fbi agents pursuing investigation leak 17 january 2017 granted full pardon case president obama thereby expunging conviction | [
1024,
513,
5636,
9744,
9233,
3092,
4117,
8726,
535,
6167,
9246,
5665,
9761,
4644,
4133,
6707,
575,
9791,
10309,
1608,
3657,
8779,
7759,
4689,
8797,
4703,
8288,
3170,
8292,
8805,
10348,
7798,
10875,
3711,
8320,
7809,
5764,
2187,
6797,
4240... | None |
3,844 | 3 | WIMG_(CPU):wimg cpu wimg acronym describes memory/cache attributes powerpc/power isa letter wimg represents one bit access attribute specifically write-through access w cache-inhibited access memory coherence guarded g set 1 indicates write-through access set 0 indicates access address non-write set 1 indicates cache-inhibited access set 0 indicates access address cacheable external caches look-aside directory protocols use bit determine actions value bit must accesses processors given address carried ax field.1 however i/o peripheral may access bit set 1 address accessed processors bit set 0 aliasing bit considered error combination w=i=1 supported set 1 requires memory coherence must enforced regardless values qualifiers specifically cache hierarchies must snoop transaction even bit set bit set presentation transaction snooper snooper must ignore transaction however originator transaction may ignore even 0 cache-inhibited guarded writes g 1 issued given processor must performed system order issuance processor regardless coherency qualifier regardless addresses carried transactions | [
7299,
10501,
1158,
7302,
7305,
3467,
1548,
6415,
2073,
7065,
8102,
5297,
11314,
11447,
8761,
6715,
1983,
10945,
3017,
8530,
3540,
3932,
3936,
8931,
7269,
10985,
9964,
8048,
3185,
10224,
5235,
7286,
3319,
8058,
8700
] | None |
3,845 | 4 | William_Cheswick:william cheswick william r. bill cheswick also known ches computer security networking researcher cheswick graduated lawrenceville school 1970 received b.s fundamental science 1975 lehigh university lehigh working doug price steve lidie cheswick co-authored senator line-oriented text editor cheswick early career included contracting bethlehem pa 1975 1977 programmer american newspaper publishers association research institute easton pa 1976 1977 systems programmer computer sciences corporation warminster pa 1977 1978 following cheswick joined systems computer technology corporation served systems programmer consultant 1978 1987 much cheswick early career related expertise control data corporation cdc mainframes operating systems scope nos related compass assembly language cheswick initially worked cdc systems student lehigh university cheswick joined bell labs 1987 shortly thereafter steven m. bellovin created one world first network firewalls resulting research papers lead publication seminal book firewalls internet security one first describe architecture firewall detail cheswick bellovin also created one world first honeypots course detecting trapping attempted intruder network 1998 cheswick still bell labs controlled lucent started internet mapping project assisted hal burch research allowed large scale mapping internet first time using tracerouting techniques learn connectivity graph global networks work ultimately led founding 2000 spinoff company lumeta cheswick co-founder held title chief scientist joined shannon lab 2007 remained 2012 cheswick currently lives new jersey wife two children home farmhouse flemington electronic smart house equipped voice synthesizer reports relevant information mailbox status evening stock news cheswick developed interactive exhibits science museums including liberty science center new jersey cheswick also enjoys model rocketry lock picking electronic physical interested developing better passwords discussed article rethinking passwords communications acm 56.2 2013 cheswick also seeking permission filmmakers publish visualizations movies | [
3937,
8998,
2118,
9256,
331,
11249,
9684
] | None |
3,846 | 3 | POWER4:power4 power4 microprocessor developed international business machines ibm implemented 64-bit powerpc powerpc instruction set architectures released 2001 power4 succeeded power3 rs64 microprocessors used rs/6000 as/400 computers ending separate development powerpc microprocessors as/400 power4 multicore microprocessor two cores single die first non-embedded microprocessor power4 chip first commercially available multiprocessor chip original power4 clock speed 1.1 1.3 ghz enhanced version power4+ reached clock speed 1.9 ghz powerpc 970 derivative power4 power4 unified l2 cache divided three equal parts independent l2 controller feed 32 bytes data per cycle core interface unit ciu connects l2 controller either data cache instruction cache either two processors non-cacheable nc unit responsible handling instruction serializing functions performing noncacheable operations storage topology l3 cache controller actual memory off-chip gx bus controller controls i/o device communications two 4-byte wide gx buses one incoming outgoing fabric controller master controller network buses controlling communications l1/l2 controllers communications power4 chips 4-way 8-way 16-way 32-way power4 mcm trace-and-debug used first failure data capture provided also built self test function bist performance monitoring unit pmu power-on reset por supported power4 implements superscalar microarchitecture high-frequency speculative out-of-order execution using eight independent execution units two floating-point units fp1-2 two load-store units ld1-2 two fixed-point units fx1-2 branch unit br conditional-register unit cr execution units complete eight operations per clock including br cr units pipeline stages power4 also came configuration using multi-chip module mcm containing four power4 dies single package 128 mb shared l3 ecc cache per mcm power4+ released 2003 improved version power4 ran 1.9 ghz contained 184 million transistors measured 267 mm fabricated 0.13 µm soi cmos process eight layers copper interconnect | [
6914,
4868,
10501,
4743,
6663,
5642,
1548,
1933,
398,
6926,
3472,
4881,
7065,
1563,
1309,
6815,
3493,
6949,
6311,
8102,
1321,
9391,
10543,
4017,
5297,
10675,
6072,
8120,
6715,
9020,
1725,
1983,
1985,
10180,
336,
8530,
3540,
342,
9302,
354... | Validation |
3,847 | 5 | Medium_access_control:medium access control ieee 802 lan/man standards medium access control mac sublayer layer controls hardware responsible interaction wired optical wireless transmission medium mac sublayer logical link control llc sublayer together make data link layer within data link layer llc provides flow control multiplexing logical link i.e ethertype 802.1q vlan tag etc mac provides flow control multiplexing transmission medium two sublayers together correspond layer 2 osi model compatibility reasons llc optional implementations ieee 802.3 frames raw compulsory implementations ieee 802 physical layer standards within hierarchy osi model ieee 802 standards mac sublayer provides control abstraction physical layer complexities physical link control invisible llc upper layers network stack thus llc sublayer higher layers may used mac turn medium access control block formally connected phy via media-independent interface although mac block today typically integrated phy within device package historically mac could used phy independent transmission medium sending data another device network mac sublayer encapsulates higher-level frames frames appropriate transmission medium i.e mac adds syncword preamble also padding necessary adds frame check sequence identify transmission errors forwards data physical layer soon appropriate channel access method permits topologies collision domain bus ring mesh point-to-multipoint topologies controlling data sent wait necessary avoid collisions additionally mac also responsible compensating collisions initiating retransmission jam signal detected receiving data physical layer mac block ensures data integrity verifying sender frame check sequences strips sender preamble padding passing data higher layers according ieee std 802-2001 section 6.2.3 mac sublayer primary functions performed mac layer case ethernet according 802.3-2002 section 4.1.4 functions required mac local network addresses used ieee 802 networks fddi networks called media access control addresses based addressing scheme used early ethernet implementations mac address intended unique serial number mac addresses typically assigned network interface hardware time manufacture significant part address identifies manufacturer assigns remainder address thus provide potentially unique address makes possible frames delivered network link interconnects hosts combination repeaters hubs bridges switches network layer routers thus example ip packet reaches destination sub network destination ip address layer 3 network layer concept resolved address resolution protocol ipv4 neighbor discovery protocol ipv6 mac address layer 2 concept destination host examples physical networks ethernet networks wi-fi networks ieee 802 networks use ieee 802 48-bit mac addresses mac layer required full-duplex point-to-point communication address fields included point-to-point protocols compatibility reasons channel access control mechanisms provided mac layer also known multiple access protocol makes possible several stations connected physical medium share examples shared physical media bus networks ring networks hub networks wireless networks half-duplex point-to-point links multiple access protocol may detect avoid data packet collisions packet mode contention based channel access method used reserve resources establish logical channel circuit-switched channelization-based channel access method used channel access control mechanism relies physical layer multiplex scheme widespread multiple access protocol contention based csma/cd protocol used ethernet networks mechanism utilized within network collision domain example ethernet bus network hub-based star topology network ethernet network may divided several collision domains interconnected bridges switches multiple access protocol required switched full-duplex network today switched ethernet networks often available equipment compatibility reasons use directional antennas millimeter-wave communication wireless personal area network increases probability concurrent scheduling non‐interfering transmissions localized area results immense increase network throughput however optimum scheduling concurrent transmission np-hard problem cellular networks gsm umts lte networks also use mac layer mac protocol cellular networks designed maximize utilization expensive licensed spectrum air interface cellular network layers 1 2 osi model layer 2 divided multiple protocol layers umts lte protocols packet data convergence protocol pdcp radio link control rlc protocol mac protocol base station absolute control air interface schedules downlink access well uplink access devices mac protocol specified 3gpp ts 25.321 umts ts 36.321 lte ts 38.321 5g new radio nr | [
10242,
11267,
8708,
1030,
2057,
1550,
6670,
7698,
8211,
11288,
6681,
6682,
10271,
5664,
6689,
10274,
9251,
2085,
38,
7208,
4650,
3115,
7723,
7214,
8238,
562,
1586,
9269,
11321,
3133,
5181,
4671,
6723,
3140,
9284,
11332,
7240,
8265,
4687,
... | None |
3,848 | 7 | Asynchrony_(computer_programming):asynchrony computer programming asynchrony computer programming refers occurrence events independent main program flow ways deal events may outside events arrival signals actions instigated program take place concurrently program execution without program blocking wait results asynchronous input/output example latter cause asynchrony lets programs issue commands storage network devices service requests processor continues executing program provides degree parallelism common way dealing asynchrony programming interface provide subroutines methods functions return caller object sometimes called future promise represents ongoing events object typically come synchronizing operation blocks operation completed programming languages cilk special syntax expressing asynchronous procedure call examples asynchrony include following | [
865,
3939,
3462,
4423,
9224,
5257,
1802,
10090,
8751,
1776,
479
] | Train |
3,849 | 7 | European_Middleware_Initiative:european middleware initiative european middleware initiative emi computer software platform high performance distributed computing developed distributed directly emi project base grid middleware distributions used scientific research communities distributed computing infrastructures world especially europe south america asia emi supports broad scientific experiments initiatives worldwide lhc computing grid large hadron collider emi middleware cooperation among three general purpose grid platforms advanced resource connector glite unicore dcache storage software purpose emi distribution consolidate harmonize support original software platforms evolve extend redundant duplicate services resulting merging deprecated favour new services added satisfy user requirements specific consolidation needs standardizing developing common interfaces include adoption common structure accounting resource information exchange authentication authorization input development activities taken users infrastructures projects standardization initiatives changing technological innovations software products adapted necessary comply standard open-source guidelines facilitate integration mainstream operating system distributions cooperation futuregrid us distributed testbed clouds grids high-performance computing announced december 2011 january 2012 emi project formalized partnership imarine project create open data e-infrastructure fisheries management marine conservation 2008 emi software distribution provided middleware components support execution completion millions computational jobs handled 350 centers european grid infrastructure tens petabytes data transfers occurring storage systems centers emi middleware used wlcg infrastructure supports example search higgs boson god particle new types matter searches physicists lhc together research astronomy biology computational chemistry sciences common emi license though licenses used emi open-source product long history behind license apache bsd dcache products released dcache software license adopted affero general public license 1 january 2012 emi products components release grouped four categories areas computing data security infrastructure first release software composed 56 products packaged scientific linux 5 32 64bit second release also made 56 products available scientific linux 5 64bit scientific linux 6 64bit subset services also available debian 6 64bit planned updates third final release contains 61 products scientific linux 5 64bit 480 packages scientific linux 6 64bit 474 packages debian 6 233 packages linux distributions components supported scientific linux platforms debian emi releases two types major releases include components component releases related single product collection components may released update major release major releases delivered per year three planned major releases named european mountains full support updates released address issues code new features provided lasts 12 months standard updates updates released address issues code new features provided lasts 6 months security updates support updates targeting security vulnerabilities provided 6 months older versions emi products superseded newer versions end-of-life announcement made coincides end security updates support period may 2013 24 updates released emi 1 kebnekaise 13 emi 2 matterhorn 3 emi 3 monte bianco minor releases contain interface functional changes backwards-compatible current major release issued times per year revision releases available every week two weeks contain bug fixes emergency releases contain specific bug fixes typically security-related available need using emergency release procedures | [
4194,
3331,
5956,
5414,
198,
11658,
7983,
9040,
3379
] | Test |
3,850 | 1 | UK_Educational_Evidence_Portal:uk educational evidence portal uk educational evidence portal eep online resource providing easy access published research evidence-based guidance across areas education related aspects children ’ services developed collaboration organisations make research evidence widely available range audiences including educational professionals practitioners policy makers research community portal went live september 2007 funded number organisations including cfbt education trust dcsf bis tda becta national college hosted eppi-centre institute education university london managed development group meets approximately bi-monthly subset group meets editorial group manages content portal cfbt education trust provides overall leadership portal cited useful information resource various academic government sources uk elsewhere eep searched following ways eep currently developing next release portal improve search results new experienced users subject list browsing database authors names british education thesaurus terms clickable related documents database linked new text mining tool provide automatic subject tags fly database website search | [] | Test |
3,851 | 4 | IF-MAP:if-map interface metadata access points if-map open specification client/server protocol developed trusted computing group tcg one core protocols trusted network connect tnc open architecture if-map provides common interface metadata access point map database server acting clearinghouse information security events objects elements tnc architecture if-map protocol defines publish/subscribe/search mechanism set identifiers data types if-map protocol first published tcg april 28 2008 originally if-map specification developed support data sharing across various vendor ’ devices applications network security specification also adopted additional use cases data-sharing including physical security 2.0 version if-map spec separated base protocol metadata definitions define different types information represented goal separating base protocol metadata definitions within specification allow specification adopted across technologies cloud computing industrial control systems smart grid leverage existing data models within map framework version 2.1 if-map spec published may 7 2012 primary new feature if-map 2.1 if-map identifier space became extensible reference implementation available gplv3 license google code repository if-map supported variety vendors | [
6560,
4194,
9225,
6282,
939,
2416,
6419
] | Test |
3,852 | 4 | Code_Red_(computer_worm):code red computer worm code red computer worm observed internet july 15 2001 attacked computers running microsoft iis web server code red worm first discovered researched eeye digital security employees marc maiffret ryan permeh exploited vulnerability discovered riley hassell named code red code red mountain dew drinking time although worm released july 13 largest group infected computers seen july 19 2001 day number infected hosts reached 359,000 worm showed vulnerability growing software distributed iis described microsoft security bulletin ms01-033 patch available month earlier worm spread using common type vulnerability known buffer overflow using long string repeated letter n overflow buffer allowing worm execute arbitrary code infect machine worm kenneth d. eichman first discover block invited white house discovery payload worm included scanning vulnerable machines worm test see server running remote machine running vulnerable version iis even see running iis apache access logs time frequently entries worm payload string following last n due buffer overflow vulnerable host interprets string computer instructions propagating worm august 4 2001 code red ii appeared although used injection vector completely different payload pseudo-randomly chose targets different subnets infected machines according fixed probability distribution favoring targets subnet often additionally used pattern repeating x characters instead n characters overflow buffer eeye believed worm originated makati city philippines origin vbs/loveletter aka iloveyou worm | [
3072,
5636,
9862,
3867,
2461,
9630,
675,
6520,
8363,
10872,
10297,
7739,
3390,
1474,
6097,
4439,
1113,
7515,
4830,
5087,
4063,
865,
2147,
1381,
1254,
8045,
4462,
3704,
2041,
10110
] | Test |
3,853 | 1 | Castor_(framework):castor framework castor data binding framework java features like java java-to-xml binding java-to-sql persistence paths java objects xml documents relational tables etc castor one oldest data binding projects basic process flows include class generation marshalling unmarshalling etc marshalling framework includes set classdescriptors fielddescription describe objects class generation similar jaxb zeus castor supports xml schema instead dtds dtds supported castor unmarshalling marshalling dealt marshall unmarshall methods respectively marshalling conversion process java xml carried unmarshalling conversion process xml java carried mapping files equivalent binding schema allows transforms names xml java vice versa castor offers additional features present jaxb additional features include code marshalling may look like follows code unmarshalling may look like follows sample mapping file may look like follows | [
3080,
5612,
5677,
7983,
5460,
11221,
6334,
479
] | Test |
3,854 | 9 | Control-flow_graph:control-flow graph computer science control-flow graph cfg representation using graph notation paths might traversed program execution control-flow graph due frances e. allen notes reese t. prosser used boolean connectivity matrices flow analysis cfg essential many compiler optimizations static-analysis tools control-flow graph node graph represents basic block i.e straight-line piece code without jumps jump targets jump targets start block jumps end block directed edges used represent jumps control flow presentations two specially designated blocks entry block control enters flow graph exit block control flow leaves construction procedure cfg every edge a→b property cfg thus obtained least conceptually starting program full flow graph—i.e graph every node represents individual instruction—and performing edge contraction every edge falsifies predicate i.e contracting every edge whose source single exit whose destination single entry contraction-based algorithm practical importance except visualization aid understanding cfg construction cfg efficiently constructed directly program scanning basic blocks consider following fragment code 4 basic blocks 0 1 b 2 3 c 4 5 particular case entry block exit block lines 4 5 jump targets graph fragment edges b c b c d. reachability graph property useful optimization subgraph connected subgraph containing entry block subgraph unreachable execution unreachable code normal conditions safely removed exit block unreachable entry block infinite loop may exist infinite loops detectable see halting problem halting order may also exist unreachable code infinite loops possible even programmer explicitly code optimizations like constant propagation constant folding followed jump threading collapse multiple basic blocks one cause edges removed cfg etc. thus possibly disconnecting parts graph block dominates block n every path entry reaches block n pass block m. entry block dominates blocks reverse direction block postdominates block n every path n exit pass block m. exit block postdominates blocks said block immediately dominates block n dominates n intervening block p dominates p p dominates n. words last dominator paths entry n. block unique immediate dominator similarly notion immediate postdominator analogous immediate dominator dominator tree ancillary data structure depicting dominator relationships arc block block n immediate dominator n. graph tree since block unique immediate dominator tree rooted entry block dominator tree calculated efficiently using lengauer–tarjan algorithm postdominator tree analogous dominator tree tree rooted exit block back edge edge points block already met depth-first dfs traversal graph back edges typical loops critical edge edge neither edge leaving source block edge entering destination block edges must split new block must created middle edge order insert computations edge without affecting edges abnormal edge edge whose destination unknown exception handling constructs produce edges tend inhibit optimization impossible edge also known fake edge edge added graph solely preserve property exit block postdominates blocks ever traversed loop header sometimes called entry point loop dominator target loop-forming back edge loop header dominates blocks loop body block may loop header one loop loop may multiple entry points case loop header suppose block dominator several incoming edges back edges loop header advantageous several optimization passes break two blocks m. contents back edges moved rest edges moved point new edge inserted immediate dominator beginning would empty passes like loop-invariant code motion could populate called loop pre-header would loop header reducible cfg one edges partitioned two disjoint sets forward edges back edges structured programming languages often designed cfgs produce reducible common structured programming statements break continue produce reducible graphs produce irreducible graphs statements goto needed irreducible graphs may also produced compiler optimizations loop connectedness cfg defined respect given depth-first search tree dfst cfg dfst rooted start node cover every node cfg edges cfg run node one dfst ancestors including called back edges loop connectedness largest number back edges found cycle-free path cfg reducible cfg loop connectedness independent dfst chosen loop connectedness used reason time complexity data-flow analysis | [
1952,
9152,
4930,
7940,
936,
778,
7978,
10796,
6478,
10703,
1459,
951,
2619,
2620
] | None |
3,855 | 3 | The_Black_Bass_(1986_video_game):black bass 1986 video game objective player catch many black bass possible sunrise sunset player may select beginner game ranking game ranking game requires password player may select location lake start begin fishing simply tossing lure desired power start process fish lured moving lure around bites player try reeling much constant reeling leads line breaking loss fish lure casting rounds player make certain selections among selections available option change type color lure used | [
9006
] | Validation |
3,856 | 2 | Cmd.exe:cmd.exe cmd cmd command name cmd.exe executable file name also known command prompt default window title command-line interpreter os/2 ecomstation windows nt windows ce reactos operating systems counterpart command.com dos windows 9x systems analogous unix shells used unix-like systems initial version cmd.exe windows nt developed therese stowell cmd.exe interacts user command-line interface windows interface implemented win32 console cmd.exe may take advantage features available native programs platform example os/2 use real pipes command pipelines allowing sides pipeline run concurrently result possible redirect standard error stream command.com uses temporary files runs two sides serially one windows cmd.exe mostly compatible command.com provides following extensions internal commands also improved | [
11270,
2568,
5643,
2060,
4624,
6674,
537,
8729,
540,
3102,
9762,
8227,
8740,
5158,
1577,
6697,
10281,
9780,
2101,
10297,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
621,
622,
1647,
2672,
9839,
42... | None |
3,857 | 2 | Comparison_of_Microsoft_Windows_versions:comparison microsoft windows versions microsoft windows name several families computer software operating systems created microsoft microsoft first introduced operating environment named windows november 1985 add-on ms-dos response growing interest graphical user interfaces guis versions microsoft windows commercial proprietary software basic general information windows windows embedded compact windows ce variation microsoft windows operating system minimalistic computers embedded systems windows ce distinctly different kernel rather trimmed-down version desktop windows supported intel x86 compatibles mips arm hitachi superh processors windows mobile microsoft discontinued line operating systems smartphones windows phone microsoft discontinued line operating systems smartphones possible install ms-dos variants 7.0 7.1 without graphics user interface windows independent installation dos windows desired dos ought installed prior windows start small partition system must transferred dangerous system dos-command files constituting dos simply copied files located dos-root entire command directory stand-alone installation ms-dos 8 possible designed work real mode windows nothing else windows nt kernel powers recent windows operating systems runs ia-32 x64 itanium processors various versions windows support various file systems including fat12 fat16 fat32 hpfs ntfs along network file systems shared computers iso 9660 udf file systems used cds dvds optical discs blu-ray file system usually limited application certain media example cds must use iso 9660 udf windows vista ntfs file system operating system installed windows embedded ce 6.0 windows vista service pack 1 windows server 2008 onwards support exfat file system suitable usb flash drives installing windows requires internal external optical drive keyboard mouse recommended input devices though versions support touchscreen operating systems prior vista drive must capable reading cd media windows vista onwards drive must dvd-compatible drive may detached installing windows maximum limits physical memory ram windows address vary depending windows version ia-32 x64 versions | [
11283,
10273,
9762,
11301,
1581,
7234,
582,
3142,
1632,
10338,
7796,
6265,
8315,
636,
7804,
1148,
639,
641,
2179,
6787,
651,
6797,
10896,
2193,
2196,
10900,
3235,
3250,
9910,
200,
10957,
3283,
3289,
4316,
1761,
9448,
5356,
9964,
3834,
538... | None |
3,858 | 4 | Personal_data:personal data personal data also known personal information personally identifying information pii sensitive personal information spi information relating identifying person abbreviation pii widely accepted united states phrase abbreviates four common variants based personal personally identifiable identifying equivalent legal purposes effective definitions vary depending jurisdiction purposes term used european data protection regimes centre primarily around general data protection regulation term personal data significantly broader determines scope regulatory regime national institute standards technology special publication 800-122 defines personally identifying information information individual maintained agency including 1 information used distinguish trace individual identity name social security number date place birth mother maiden name biometric records 2 information linked linkable individual medical educational financial employment information example user ip address classed pii classified linked pii however european union ip address internet subscriber may classed personal data concept pii become prevalent information technology internet made easier collect pii leading profitable market collecting reselling pii pii also exploited criminals stalk steal identity person aid planning criminal acts response threats many website privacy policies specifically address gathering pii lawmakers european parliament enacted series legislation general data protection regulation gdpr limit distribution accessibility pii personally identifying information legal concept technical concept utilised jurisdictions versatility power modern re-identification algorithms absence pii data mean remaining data identify individuals attributes may uniquely identifying attribute potentially identifying combination others attributes referred quasi-identifiers pseudo-identifiers data may constitute pii united states highly likely remain personal data european data protection law u.s. government used term personally identifiable 2007 memorandum executive office president office management budget omb usage appears us standards nist guide protecting confidentiality personally identifiable information sp 800-122 omb memorandum defines pii follows term similar pii personal data defined eu directive 95/46/ec purposes directive however eu rules clearer notion data subject potentially identified additional processing attributes—quasi- pseudo-identifiers gdpr personal data defined information relating identified identifiable natural person 'data subject identifiable natural person one identified directly indirectly particular reference identifier name identification number location data online identifier one factors specific physical physiological genetic mental economic cultural social identity natural person another term similar pii personal information defined section california data breach notification law sb1386 concept information combination given sb1386 definition key correctly distinguishing pii defined omb personal information defined sb1386 information name lacks context said sb1386 personal information must said pii defined omb example name john smith meaning current context therefore sb1386 personal information pii social security number ssn without name associated identity context information sb1386 personal information pii example ssn 078-05-1120 pii sb1386 personal information however combination valid name correct ssn sb1386 personal information combination name context may also considered pii example person name list patients hiv clinic however necessary name combined context order pii reason distinction bits information names although may sufficient make identification may later combined information identify persons expose harm according omb always case pii sensitive context may taken account deciding whether certain pii sensitive australia privacy act 1988 deals protection individual privacy using oecd privacy principles 1980s set broad principles-based regulatory model unlike us coverage generally based broad principles specific technologies business practices data items section 6 relevant definition critical detail definition 'personal information also applies individual indirectly identified raises question reasonableness assume theoretically possible identify person information include name address contain clues could pursued find relates much extra effort take make unreasonable information could identified instance information involves ip address relevant isp stores logs could easily inspected sufficient legal justification re-link ip address account holder identity reasonably ascertained linking used expensive slow difficult becomes easier change answer point appears definition significantly broader californian example given thus australian privacy law respects weakly enforced may cover broader category data information us law particular online behavioral advertising businesses based us surreptitiously collecting information people countries form cookies bugs trackers like may find preference avoid implications wanting build psychographic profile particular person using rubric 'we n't collect personal information may find make sense broader definition like australian privacy act european data protection law utilize concept personally identifiable information scope instead determined non-synonymous wider concept personal data examples found eu privacy website twelve information privacy principles privacy act 1993 apply federal act data protection 19 june 1992 force since 1993 set strict protection privacy prohibiting virtually processing personal data expressly authorized data subjects protection subject authority federal data protection information commissioner additionally person may ask writing company managing data files correction deletion personal data company must respond within thirty days privacy act 1974 pub.l 93–579 88 stat 1896 enacted december 31 1974 5 u.s.c § 552a united states federal law establishes code fair information practice governs collection maintenance use dissemination personally identifiable information individuals maintained systems records federal agencies one primary focuses health insurance portability accountability act hipaa protect patient protected health information phi similar pii u.s. senate proposed privacy act 2005 attempted strictly limit display purchase sale pii without person consent similarly proposed anti-phishing act 2005 attempted prevent acquiring pii phishing u.s. lawmakers paid special attention social security number easily used commit identity theft proposed social security number protection act 2005 proposed identity theft prevention act 2005 sought limit distribution individual social security number national institute standards technology physical sciences laboratory non-regulatory agency united states department commerce mission promote innovation industrial competitiveness following data often used express purpose distinguishing individual identity clearly classify personally identifiable information definition used national institute standards technology described detail following less often used distinguish individual identity traits shared many people however potentially pii may combined personal information identify individual person wishes remain anonymous descriptions often employ several 34-year-old white male works target note information still private sense person may wish become publicly known without personally identifiable moreover sometimes multiple pieces information none sufficient uniquely identify individual may uniquely identify person combined one reason multiple pieces evidence usually presented criminal trials shown 1990 87 population united states could uniquely identified gender zip code full date birth hacker internet slang practice finding releasing information called doxing sometimes used deter collaboration law enforcement occasion doxing trigger arrest particularly law enforcement agencies suspect doxed individual may panic disappear forensics particularly identification prosecution criminals personally identifiable information critical establishing evidence criminal procedure criminals may go great trouble avoid leaving pii personal data key component online identity exploited individuals instance data altered used create fake documents hijack mail boxes phone calls harass people like data breach ee limited company another key case referred financial identity theft usually bank account credit card information stolen used sold personal data also used create fake online identity including fake accounts profiles referred identity cloning identity fraud celebrities gather data users easily even individuals concerned especially personal purpose widely known sockpuppet critical information password date birth id documents social insurance number used log different websites see password reuse account verification gather information access content also several agencies ask discretion subject related work safety employees reason united states department defense dod strict policies controlling release personally identifiable information dod personnel many intelligence agencies similar policies sometimes point employees disclose friends work agency similar identity protection concerns exist witness protection programs women shelters victims domestic violence threats second half 20th century digital revolution introduced privacy economics trade personal data value data change time different contexts disclosing data reverse information asymmetry though costs unclear relation companies consumers often imperfect information regarding data collected purposes consequences writing 2015 alessandro acquisti curtis taylor liad wagman identified three waves trade personal data | [
2818,
4232,
1930,
5133,
3599,
1169,
10002,
8471,
3880,
9260,
9901,
7345,
8754,
6455,
11198,
10050,
7623,
9550,
1368,
4956,
7522,
4072,
6635,
4725,
10102
] | Test |
3,859 | 2 | GParted:gparted gparted acronym gnome partition editor gtk front-end gnu parted official gnome partition-editing application alongside disks gparted used creating deleting resizing moving checking copying disk partitions file systems useful creating space new operating systems reorganizing disk usage copying data residing hard disks mirroring one partition another disk imaging gparted uses libparted detect manipulate devices partition tables several optional file system tools provide support file systems included libparted optional packages detected runtime require rebuild gparted gparted written c++ uses gtkmm interface gtk general approach keep gui simple possible conformity gnome human interface guidelines gparted project provides live operating system including gparted written live cd live usb media operating system based debian gnu/linux gparted also available gnu/linux live cds including recent versions puppy knoppix systemrescuecd parted magic gparted preinstalled booting try ubuntu mode ubuntu installation media alternative software disks gnome disks gparted supports following operations file systems provided features enabled compile-time required tools present system 'copy field indicates whether gparted capable cloning mentioned filesystem gparted capable cloning using mouse gesture copy paste gparted capable cloning entire disk one partition time file system cloned mounted gparted clones partitions filesystem-level result capable cloning different target-size partitions source long size source filesystem exceed size target partition | [
3841,
11394,
7431,
2955,
6413,
6416,
2193,
2194,
8848,
9872,
2197,
11539,
2199,
8857,
4506,
6939,
7450,
4637,
1822,
7070,
7325,
9762,
6691,
6694,
3245,
6062,
7983,
8621,
8114,
9908,
823,
3649,
708,
8772,
3015,
9420,
4177,
4438,
1112,
9693... | Test |
3,860 | 2 | Advanced_SCSI_Programming_Interface:advanced scsi programming interface computing aspi advanced scsi programming interface adaptec-developed programming interface standardizes communication computer bus scsi driver module one hand scsi atapi peripherals aspi manager software provides interface aspi modules device drivers applications direct scsi support scsi host adapter scsi devices connected host adapter aspi manager specific host adapter operating system primary role abstract host adapter specifics provide generic software interface scsi devices windows 9x windows nt aspi manager generic relies services scsi miniport drivers systems aspi interface designed applications require scsi pass-through functionality cd-rom burning software primary operations supported aspi discovery host adapters attached devices submitting scsi commands devices via srbs scsi request blocks aspi supports concurrent execution scsi commands originally inspired driver architecture developed douglas w. goodall ampro computers 1983 aspi developed adaptec around 1990 initially designed support dos os/2 windows 3.x novell netware originally written support scsi devices support atapi devices added later scsi host adapter vendors example buslogic dpt ami future domain dtc shipped aspi managers hardware adaptec also developed generic scsi disk cd-rom drivers dos aspicd.sys aspidisk.sys microsoft licensed interface use windows 9x series time microsoft developed scsi pass interface spti in-house substitute worked nt platform microsoft include aspi windows 2000/xp favor spti users may still download aspi adaptec number cd/dvd applications also continue offer implementations aspi layer support usb drives dos panasonic developed universal aspi driver usbaspi.sys bypasses lack native usb support dos aspi provided following drivers | [
6240,
4409,
10155
] | Test |
3,861 | 4 | InfoSec_Institute:infosec institute infosec institute technology training company provides certification-based training courses security professionals enterprise-grade security awareness phishing training businesses agencies technology professionals company training library provides multi-course tracks job function certification-specific training short-form continuing education training course library includes 95 courses covering topics like ethical hacking network security mobile forensics infosec institute securityiq integrates security awareness training phishing simulations personalized learning scales employees ’ security aptitudes roles learning styles infosec institute founded 1998 team information security instructors | [] | Validation |
3,862 | 4 | Jamf_Pro:jamf pro jamf pro formerly casper suite apple device management solution used system administrators configure automate administration tasks mac os x ios tvos devices product includes server client agent software runs ios mac os x tvos jamf offers on-premises cloud-based mobile device management well agent managing mac os x. jamf pro flagship product company centralizes device management allows policy creation restricts device features software equipped features management tools remote setup remote lock wipe minneapolis-based jamf software started eau claire wisconsin zach halmstad chip pearson 2002 releasing casper suite casper suite rebranded jamf pro 2017.. vista equity partners acquired majority shares jamf december 2017 ibm selected jamf pro manage macs 2015 ibm chief technology officer fletcher previn announced surpassed 277,000 devices 2017 making largest mac deployment world ibm claimed mac cheaper manage windows counterparts jamf partnership microsoft allows jamf pro communicate intune | [
9784,
3323,
7983,
1935
] | None |
3,863 | 3 | Directory-based_coherence:directory-based coherence directory-based coherence mechanism handle cache coherence problem distributed shared memory dsm a.k.a non-uniform memory access numa another popular way use special type computer bus nodes shared bus a.k.a system bus directory-based coherence uses special directory serve instead shared bus bus-based coherence protocols designs use corresponding medium i.e directory bus tool facilitate communication different nodes guarantee coherence protocol working properly along communicating nodes directory based cache coherence done using directory keep track status cache blocks status block includes cache coherence state block nodes sharing block time used eliminate need broadcast signals nodes send nodes interested single block following advantages disadvantages directory based cache coherence protocol according discussion clear using bus based systems seems attractive relatively small systems however directory based systems become crucial system scale number nodes grows kind trade-off simplicity scalability comparing bus-based directory-based cache coherence designs idea directory-based cache coherence systems began long ago idea dash directory architecture shared-memory first proposed c.k tang mid 1970s however applying cache coherence proposed years later specifically 1978 researchers stanford university proposed first version coherence systems called stanford dash paper described system difficulties improvements associated designs beside approach several attempts done provide scalable systems instance bbn butterfly introduced 1985 ibm pr3 introduced 1987 examples scalable multiprocessor systems however systems drawback example bbn butterfly caches similarly ibm pr3 provide hardware cache coherence limits performance designs especially employing high performance processors limitations competitors made easier dash based systems get chosen designing cache coherence systems systems needing scalability cache-based nodes 1985 james archibald jean-loup baer university washington published paper proposes economical expandable modular variation global directory approach term hardware use design 1992 daniel lenoski stanford university published paper proposing advances cache coherence protocols directory-based systems 1996 paper introduced design sgi origin 2000 family server computers employing directory based cache coherence subsequent origin 3000 introduced july 2000 unlike snoopy coherence protocols directory based coherence approach information caches copy block maintained structure called directory directory based scheme participating caches broadcast requests sharing caches block order locate cached copies instead queries directory retrieve information block cached copies sends particular processors hence traffic saving compared snoopy protocol large well optimized applications data sharing data read little sharing data frequently read written directory approach result substantial traffic saving compared broadcast/snoopy approach applications shown data flow diagram actors involved distributed shared memory system implementing directory based coherence protocol requestor owner nodes maintain state transition similar snoopy coherence protocols like mesi protocol however unlike bus based implementation nodes communicate using common bus directory based implementation uses message passing model exchange information required maintaining cache coherence directory node acts serializing point communications directed node maintain correctness directory node keeps track overall state cache block entire cache system processors three states explanation directory state transition finite state machine refer image 1 captured table addition cache state directory must track processors data shared state required sending invalidation intervention requests individual processor caches cache block shared state popular implementation approaches please note protocol described basic implementation race conditions occur due fact directory sync caches also messages processors overlapping complex implementations available like scalable coherent interface multiple states dash cache coherence protocol another protocol uses directory-based coherence scheme dash protocol uses clustered approach processors inside cluster kept coherent using bus based snooping scheme clusters connected directory approach even though various protocols use different implementations tracking cache blocks however concept directory remains | [
3522,
7942,
6184,
2264,
7802
] | None |
3,864 | 2 | Filter_driver:filter driver filter driver microsoft windows driver extends modifies function peripheral devices supports specialized device personal computer driver program module inserted existing driver stack perform specific function filter driver affect normal working existing driver stack major way written either microsoft vendor hardware number filter drivers added windows upper level filter drivers sit primary driver device function driver lower level filter drivers sit function driver bus driver filters may work certain brand device mouse keyboard may perform operation class devices mouse keyboard windows dev center hardware pages explain upper lower filter drivers detail example generic usb camera uvc driver usbvideo.sys function driver bus driver handles usb data host controller devices lower level filter modifies behavior camera hardware e.g watching interrupt packets camera switch fits function bus drivers upper level filter typically provide added-value features camera additional processing video stream e.g colour changes identification objects applying overlays fit function driver user application connected camera another type filter driver bus e.g usb pci pcie filter driver may added top bus driver example acpi bus filter added support power management device | [
1049,
6797,
8161
] | Test |
3,865 | 2 | PrivatOS:privatos privatos operating system used blackphone june 1 2014 june 30 2016 targeted users sought improved privacy security provided encryption phone calls emails texts internet browsing privatos modified version android forked android 4.4.2 came bundle security-minded tools however contrast android privatos open source company shipped privatos sgp technologies joint venture makers geeksphone silent circle concept encrypted phone long interest silent circle founder pgp creator phil zimmerman video blackphone website zimmerman said company stated operating system able “ close backdoors ” usually found major mobile operating systems major features privatos anonymous search privacy-enabled bundled apps smart disabling wi-fi except trusted hotspots control app permissions private communication calling texting video chat browsing file sharing conference calls geeksphone also claimed phone would receive frequent secure updates blackphone directly ars technica praised blackphone security center privatos gave control app permissions liked privatos came bundled silent phone silent text disconnect vpn disconnect search services ars like phone ’ performance mediocre using custom os meant google play benefits google ecosystem spotty support sideloaded apps reliance amazon third-party app stores month using device joshua drake accuvant concluded blackphone security claims overstated criticizing closed-source nature os lack os kernel hardening features praising fast patching added features | [
8262,
8283,
5067,
8940,
9964,
9646,
7983,
7483,
5363,
5397,
8413,
1083,
2045
] | Test |
3,866 | 2 | Spin-up:spin-up spin-up refers process hard disk drive optical disc drive accelerating platters inserted optical disc stopped state operational speed period time taken drive perform process referred spin-up time average reported hard disks s.m.a.r.t attribute required operational speed depends design disk drive typical speeds hard disks 2400 3600 4200 5400 7200 10000 15000 revolutions per minute rpm achieving speeds require significant portion available power budget computer system application power disks must carefully controlled operational speed optical disc drives may vary depending type disc mode operation see constant linear velocity spin-up hard disks generally occurs beginning computer boot process however modern computers ability stop drive machine already running means energy conservation noise reduction machine running requires access stopped drive delay incurred drive spun also depends type mechanism used within drive process spun needs energy input drive already spinning operation speeds since effort required electric motor accelerate platters opposed maintaining speed computers multiple hard drives method called staggered spin-up employed prevent excessive power-consumption spin-up may result power shortage power consumption spin-up often highest power draw different operating states hard disk drive staggered spin-up typically starts one drive time either waiting drive signal ready allowing predefined period time pass starting next drive power supply able supply sufficient current start multiple drives time common staggered spin-up ssu power-up standby puis different features help control spin-up multiple drives within computer system disk subsystem defined ata specifications standards see serial ata information one feature called power-up standby puis also called pm2 used serial ata sata parallel ata sometimes called pata ide hard disk drives puis requires bios and/or driver support use power applied hard disk drive drive spin-up puis spin-up command issued computer system bios raid controller must issue command tell drive spin-up accessed puis enabled tools hdparm drives support feature another feature called staggered spin-up ssu used serial ata sata hard disk drives common power-up standby puis require special commands get drive spin-up drive electronics waits sata data phy physical i/f activate spin-up drive computer system bios and/or raid controller raid driver set delay control different drives spin-up western digital hard disk drives pin 11 sata power interface controls whether staggered spin-up ssu enabled pin 11 also used activity led connection drive initially powered drive senses whether pin 11 left floating high 1 logic state grounded low 0 logic state ssu disabled pin 11 grounded disabled drive spin-up soon power applied ssu enabled pin 11 left floating driven high high 1 logic state drive spin-up sata phy interface becomes active connection sata controller sata raid controller sata sata raid controller control many drives spun-up ssu puis features configured software firmware manufacturer information fujitsu serial ata interface mobile hard disk drives whitepaper note staggered spin-up disks feature many multi-drive systems using sata raid typically used mobile platforms | [
9137,
1515,
2811
] | None |
3,867 | 4 | Timeline_of_computer_viruses_and_worms:timeline computer viruses worms timeline computer viruses worms presents chronological timeline noteworthy computer viruses computer worms trojan horses similar malware related research events | [
3072,
10756,
10245,
9227,
9233,
535,
9242,
9761,
9256,
9771,
7217,
2045,
6707,
5173,
10297,
3643,
7739,
8767,
1088,
9791,
2114,
4165,
8789,
11351,
107,
8301,
3704,
10875,
5245,
11390,
2175,
9855,
6786,
5764,
9356,
4245,
10392,
1690,
156,
... | Test |
3,868 | 5 | RVU_protocol:rvu protocol rvu protocol rvu pseudo-acronym pronounced r-view application layer protocol combines pre-existing digital living network alliance dlna standards new remote user interface rui protocol works similar remote desktop protocol rdp rvu rui protocol intended allow rvu-enabled client tv receive pixel-accurate display user interface available rvu server rvu combined dlna ability transmit media video photos music across home network allows entire user experience media server transmitted rvu client makes user interface available via rui protocol processing done server software plug-ins happen host computer user interface streamed client devices protocol primarily intended operate home network rvu protocol developed focus passing broadcast video coming multichannel video programming distributor residential gateway dedicated media server consumer electronic devices home however protocol much broader applications rvu protocol defined solve problem provide consistent television user interface throughout home without requiring use dedicated set-top box television rvu protocol communications protocol runs media server device multiple client devices rvu uses open standards including dlna upnp already use consumer electronics field clients consist various manufacturer-branded tvs blu-ray players client devices server generates user guide data sends client display way clients low complexity thin client devices still providing full user interface experience user rvu compliant device connected rvu server tv viewer watch different content room home viewers access prerecorded live content server via client device set-top box present user guide experience rvu supports networking existing home infrastructure agnostic transport mechanism work wireless technologies 802.11 wired technologies ethernet moca rvu supports remote user interface rui allows user interactions trick play e.g. pause rewind running interactive applications device render interface even though media center specific software plug-ins might installed however media files streamed different protocol render media extender needs implementation codec used package media locally installed client works extender codec host computer enough alternatively media trans-coded fly host computer codec supported client rvu protocol specification v1.0 released 3 december 2009 rvu protocol specification v1.0 currently ratified board available members implementation rvu protocol specification v2.0 became available january 7 2013 specification large part dependent dlna specification specification uses dtcp/ip link protection copyright-protected commercial content one device another rvu certification devices subject certification rvu alliance certification procedures development rvu alliance | [
3441,
10747
] | None |
3,869 | 9 | Hy:hy hy alternately hylang programming language dialect language lisp designed interact language python translating expressions python abstract syntax tree ast hy introduced python conference pycon 2013 paul tagliamonte similar kawa clojure mapping s-expressions onto java virtual machine jvm hy meant operate transparent lisp front end python abstract syntax lisp allows operating code data metaprogramming thus hy used write domain-specific languages hy also allows python libraries including standard library imported accessed alongside hy code compiling step converting data structure python ast language documentation | [
10752,
11269,
2056,
2062,
9231,
7184,
2577,
9749,
8728,
4633,
4122,
8226,
3119,
2105,
3132,
6717,
8258,
8771,
8262,
1613,
9299,
10841,
3675,
7267,
2660,
8293,
2666,
5751,
7805,
9345,
1159,
9865,
9877,
5803,
2225,
6840,
7867,
4799,
9926,
7... | Train |
3,870 | 4 | Dropsuite:dropsuite dropsuite limited formerly branded dropmysite global cloud software platform founded 2011 provides cloud backup archiving recovery solutions based singapore public company listed australian securities exchange asx dse originally dropsuite provided website backup services expanded services include cloud backup office 365 cloud backup g suite gmail email archiving additional solutions include gdpr responder ediscovery insights bi ransomware protection dropsuite began development name dropmysite september 2011 john fearon ’ business website needed backup solution ’ find service met needs fearon raised 300,000 first round funding singaporean television show called angel ’ gate 2012 created email backup service called dropmyemail october 31 2013 charif elansari took ceo 2014 smartphone backup service called dropmymobile launched dropmysite local offices us singapore japan india entered partnership xpress hosting web-hosting company mexico getting access 100,000 customers 500,000 domains dropmysite also announced partnerships gmo cloud paperboy japan october 3 2015 godaddy launched cloud backup service websites powered dropmysite 2016 company rebranded name dropsuite dec 29 2016 company went public australia securities exchange via backdoor listing 2017 dropsuite entered distribution agreement ingram micro october 22 2018 dropsuite entered cloud distribution partnership pax8 2019 dsd europe announced partnership dropsuite adding dropsuite ’ microsoft office 365 cloud backup email backup cloud backup services management team consists people different continents including asia africa north america australia dropsuite limited dse asx publicly listed company australian securities exchange originally dropmysite privately held technology startup received seed funding crystal horse investments stanley street labs angel investors backend dropmysite originally based amazon aws infrastructure dropsuite provides data backup support many country-locations americas europe asia africa utilizes amazon web services data center support ensure data remains within country borders needed user data stored online user agents download install dropsuite ’ cloud services protect user ’ information military grade 256-bit advanced encryption allow legal grade email archiving compatible microsoft office 365 g suite gmail hosted exchange open-xchange imap/pop email servers | [
7248,
11482,
6367
] | Test |
3,871 | 2 | Manual_memory_management:manual memory management computer science manual memory management refers usage manual instructions programmer identify deallocate unused objects garbage mid-1990s majority programming languages used industry supported manual memory management though garbage collection existed since 1959 introduced lisp today however languages garbage collection java increasingly popular languages objective-c swift provide similar functionality automatic reference counting main manually managed languages still widespread use today c c++ – see c dynamic memory allocation programming languages use manual techniques determine allocate new object free store c uses codice_1 function c++ java use codice_2 operator many languages python allocate objects free store determination object ought created object creation generally trivial unproblematic though techniques object pools mean object may created immediate use fundamental issue object destruction – determination object longer needed i.e garbage arranging underlying storage returned free store re-use manual memory allocation also specified manually programmer via functions codice_3 c codice_4 operator c++ – contrasts automatic destruction objects held automatic variables notably non-static local variables functions destroyed end scope c c++ manual memory management known enable several major classes bugs program used incorrectly notably violations memory safety memory leaks significant source security bugs languages exclusively use garbage collection known avoid last two classes defects memory leaks still occur bounded leaks frequently occur generational conservative garbage collection generally less severe memory leaks manual systems manual memory management one correctness advantage allows automatic resource management via resource acquisition initialization raii paradigm arises objects scarce system resources like graphics resources file handles database connections must relinquished object destroyed – lifetime resource ownership tied lifetime object languages manual management arrange acquiring resource object initialization constructor releasing object destruction destructor occurs precise time known resource acquisition initialization also used deterministic reference counting c++ ability put use automate memory deallocation within otherwise-manual framework use codice_5 template language standard library perform memory management common paradigm codice_5 suitable object usage patterns however approach usable garbage collected languages – notably tracing garbage collectors advanced reference counting – due finalization non-deterministic sometimes occurring difficult define determine finalizer method might called commonly known finalizer problem java gc 'd languages frequently use manual management scarce system resources besides memory via dispose pattern object manages resources expected implement codice_7 method releases resources marks object inactive programmers expected invoke codice_7 manually appropriate prevent leaking scarce graphics resources depending codice_9 method java implements finalizers release graphics resources widely viewed poor programming practice among java programmers similarly analogous codice_10 method python relied releasing resources stack resources resources acquired released within single block code automated various language constructs python codice_11 c codice_12 java codice_13-with-resources many advocates manual memory management argue affords superior performance compared automatic techniques garbage collection traditionally latency biggest advantage longer case manual allocation frequently superior locality reference manual allocation also known appropriate systems memory scarce resource due faster reclamation memory systems frequently thrash size program working set approaches size available memory unused objects garbage-collected system remain unreclaimed state longer manually managed systems immediately reclaimed increasing effective working set size manual management number documented performance disadvantages latency debated point changed time early garbage collectors simple implementations performing poorly compared manual memory management sophisticated modern garbage collectors often performing well better manual memory management manual allocation suffer long pause times occur simple stop-the-world garbage collection although modern garbage collectors collection cycles often noticeable manual memory management garbage collection suffer potentially unbounded deallocation times – manual memory management deallocating single object may require deallocating members recursively members members etc. garbage collection may long collection cycles especially issue real time systems unbounded collection cycles generally unacceptable real-time garbage collection possible pausing garbage collector real-time manual memory management requires avoiding large deallocations manually pausing deallocation | [
2304,
4747,
5008,
9490,
11539,
541,
1954,
5677,
814,
7983,
1715,
7091,
3512,
2625,
1474,
5059,
8773,
8262,
1736,
4424,
6730,
716,
5325,
6221,
5840,
5074,
6868,
9300,
86,
9559,
5080,
9432,
10333,
1247,
8545,
8573,
6502,
8551,
2152,
10470,
... | Test |
3,872 | 4 | Christmas_tree_packet:christmas tree packet information technology christmas tree packet packet every single option set whatever protocol use term derives fanciful image little option bit header represented different-colored light bulb turned packet lit like christmas tree also known kamikaze packet nastygram lamp test segment christmas tree packets used method tcp/ip stack fingerprinting exposing underlying nature tcp/ip stack sending packets awaiting analyzing responses used part scanning system tcp header christmas tree packet flags fin urg psh set many operating systems implement compliance internet protocol standard rfc 791 varying incomplete ways observing host responds odd packet christmas tree packet inferences made regarding host operating system versions microsoft windows bsd/os hp-ux cisco ios mvs irix display behaviors differ rfc standard queried said packets large number christmas tree packets also used conduct dos attack exploiting fact christmas tree packets require much processing routers end-hosts usual packets christmas tree packets easily detected intrusion-detection systems advanced firewalls network security point view christmas tree packets always suspicious indicate high probability network reconnaissance activities | [
5472,
5506,
5979,
2409,
939,
6540,
6797,
7053,
10924,
1304,
9146,
5531,
5245
] | Test |
3,873 | 2 | Wheel_(computing):wheel computing computing term wheel refers user account wheel bit system setting provides additional special system privileges empower user execute restricted commands ordinary user accounts access term wheel first applied computer user privilege levels introduction tenex operating system later distributed name tops-20 1960s early 1970s term derived slang phrase big wheel referring person great power influence 1980s term imported unix culture due migration operating system developers users tenex/tops-20 unix modern unix systems generally use user groups security protocol control access privileges wheel group special user group used unix systems mostly bsd systems control access su sudo command allows user masquerade another user usually super user .. ubuntu creates group called codice_1 similar purpose wheel group phrase wheel war originated stanford university first documented 1983 version jargon file 'wheel war characterized part immature 'larval phase wherein students administrative privileges would attempt lock university multi-user see also multiseat computer system sometimes causing unintentional harm users | [
7804,
1379,
7983,
273,
5492,
11390,
5179,
700,
9438,
2399
] | None |
3,874 | 0 | Chinese_speech_synthesis:chinese speech synthesis chinese speech synthesis application speech synthesis chinese language usually standard chinese poses additional difficulties due chinese characters frequently different pronunciations different contexts complex prosody essential convey meaning words sometimes difficulty obtaining agreement among native speakers concerning correct pronunciation certain phonemes recordings concatenated desired combination joins sound forced usual simple concatenation-based speech synthesis severely affect prosody synthesizers also inflexible terms speed expression however synthesizers rely corpus noticeable degradation performance given unusual awkward phrases ekho open source tts simply concatenates sampled syllables currently supports cantonese mandarin experimentally korean mandarin syllables pitched-normalised praat modified version used gradint synthesis partials cjkware.com used ship product called keytip putonghua reader worked similarly contained 120 megabytes sound recordings gsm-compressed 40 megabytes evaluation version comprising 10,000 multi-syllable dictionary words plus single-syllable recordings 6 different prosodies 4 tones neutral tone extra third-tone recording use end phrase lightweight open-source speech project espeak approach synthesis experimented mandarin cantonese espeak used google translate may 2010 december 2010 commercial product yuet also lightweight intended suitable resource-constrained environments like embedded systems written scratch ansi c starting 2013 yuet claims built-in nlp model require separate dictionary speech synthesised engine claims clear word boundaries emphasis appropriate words communication author required obtain copy espeak yuet synthesis speech cantonese mandarin input text output corresponding romanisation cantonese yuet uses yale espeak uses jyutping use pinyin mandarin espeak concern word boundaries n't change question syllable spoken corpus-based approach sound natural cases err dealing unusual phrases ca n't matched corpus synthesiser engine typically large hundreds even thousands megabytes due size corpus anhui ustc iflytek co. ltd iflytek published w3c paper adapted speech synthesis markup language produce mark-up language called chinese speech synthesis markup language cssml include additional markup clarify pronunciation characters add prosody information amount data involved disclosed iflytek seen commercial products iflytek licensed technology example bider speechplus 1.3 gigabyte download 1.2 gigabytes used highly compressed data single chinese voice iflytek synthesiser also synthesise mixed chinese english text voice e.g chinese sentences containing english words claim english synthesis average iflytek corpus appears heavily dependent chinese characters possible synthesize pinyin alone sometimes possible means cssml add pinyin characters disambiguate multiple possible pronunciations always work online interactive demonstration neospeech speech synthesis accepts chinese characters also pinyin enclosed proprietary vtml markup mac os chinese speech synthesizers available version 9 removed 10.0 reinstated 10.7 lion corpus-based approach taken tsinghua university sinosonic harbin dialect voice data taking 800 megabytes planned offered download link never activated nowadays references found internet archive bell labs approach demonstrated online 1997 subsequently removed described monograph multilingual text-to-speech synthesis bell labs approach springer october 31 1997 former employee responsible project chilin shih subsequently worked university illinois put notes methods website | [
7780,
3533,
6838,
9787,
2428
] | Validation |
3,875 | 8 | Msnbot:msnbot msnbot web-crawling robot type internet bot deployed microsoft collect documents web build searchable index msn search engine went beta 2004 full public release 2005 month october 2010 saw official retirement msnbot active web crawling duties replacement bingbot september 2015 msnbot still active microsoft bing webmaster help howto documentation still indicated msnbot active would retire soon verification tool bingbot previously recognise msnbot ip addresses test executed 2016-02-22 resulted yes verdict ip address 157.55.39.150 yes ip address verified bingbot ip address name msnbot-157-55-39-150.search.msn.com | [
4356,
11524,
2566,
6797,
782,
1935,
2318,
10900,
11284,
1913,
2459,
11549,
3744,
7970,
1832,
6827,
944,
3890,
8757,
4289,
8769,
9033,
714,
10957,
4051,
11221,
11605,
1240,
11103,
10338,
617,
8681,
113,
119,
4473
] | Test |
3,876 | 9 | Haskell_(programming_language):haskell programming language haskell statically typed purely functional programming language type inference lazy evaluation type classes enable type-safe operator overloading originated haskell main implementation glasgow haskell compiler named logician haskell curry haskell based semantics syntax miranda programming language served focus efforts initial haskell working group haskell used widely academia industry latest standard haskell haskell 2010. haskell committee working next standard haskell 2020 following release miranda research software ltd. 1985 interest lazy functional languages grew 1987 dozen non-strict purely functional programming languages existed miranda widely used proprietary software conference functional programming languages computer architecture fpca '87 portland oregon strong consensus committee formed define open standard languages committee purpose consolidate existing functional languages common one serve basis future research functional-language design first version haskell haskell 1.0 defined 1990 committee efforts resulted series language definitions 1.0 1.1 1.2 1.3 1.4 late 1997 series culminated haskell 98 intended specify stable minimal portable version language accompanying standard library teaching base future extensions committee expressly welcomed creating extensions variants haskell 98 via adding incorporating experimental features february 1999 haskell 98 language standard originally published haskell 98 report january 2003 revised version published haskell 98 language libraries revised report language continues evolve rapidly glasgow haskell compiler ghc implementation representing current de facto standard early 2006 process defining successor haskell 98 standard informally named haskell prime began intended ongoing incremental process revise language definition producing new revision per year first revision named haskell 2010 announced november 2009 published july 2010 haskell 2010 incremental update language mostly incorporating several well-used uncontroversial features previously enabled via compiler-specific flags haskell features lazy evaluation lambda expressions pattern matching list comprehension type classes type polymorphism purely functional language means functions generally side effects distinct construct exists represent side effects orthogonal type functions pure function return side effect subsequently executed modeling impure functions languages haskell strong static type system based hindley–milner type inference principal innovation area type classes originally conceived principled way add overloading language since finding many uses construct represents side effects example monad monads general framework model different kinds computation including error handling nondeterminism parsing software transactional memory monads defined ordinary datatypes haskell provides syntactic sugar use haskell open published specification multiple implementations exist main implementation glasgow haskell compiler ghc interpreter native-code compiler runs platforms ghc noted rich type system incorporating recent innovations generalized algebraic data types type families computer language benchmarks game also highlights high-performance implementation concurrency parallelism active growing community exists around language 5,400 third-party open-source libraries tools available online package repository hackage hello world program haskell last line strictly necessary factorial function haskell defined different ways integer type arbitrary-precision code compute values codice_10 456,574-digit number loss precision implementation algorithm similar quick sort lists first element taken pivot haskell logo top page generated haskell code listed implementations distributed open source licenses implementations fully nearly comply haskell 98 standard include implementations longer actively maintained include implementations fully haskell 98 compliant using variant haskell language include several web frameworks written haskell including jan-willem maessen 2002 simon peyton jones 2003 discussed problems associated lazy evaluation also acknowledging theoretical motives addition purely practical considerations improved performance note addition adding performance overhead lazy evaluation makes difficult programmers reason performance code particularly space use bastiaan heeren daan leijen arjan van ijzendoorn 2003 also observed stumbling blocks haskell learners subtle syntax sophisticated type system haskell double edged sword – highly appreciated experienced programmers also source frustration among beginners since generality haskell often leads cryptic error messages address researchers utrecht university developed advanced interpreter called helium improved user-friendliness error messages limiting generality haskell features particular removing support type classes ben lippmeier designed disciple strict-by-default lazy explicit annotation dialect haskell type-and-effect system address haskell difficulties reasoning lazy evaluation using traditional data structures mutable arrays argues p. 20 destructive update furnishes programmer two important powerful tools ... set efficient array-like data structures managing collections objects ... ability broadcast new value parts program minimal burden programmer robert harper one authors standard ml given reasons using haskell teach introductory programming among difficulty reasoning resource use non-strict evaluation lazy evaluation complicates definition data types inductive reasoning inferiority haskell old class system compared ml module system haskell build tool cabal historically criticised poorly handling multiple versions library problem know cabal hell stackage server stack build tool made response criticisms.. clean close slightly older relative haskell biggest deviation haskell use uniqueness types instead monads i/o side-effects series languages inspired haskell different type systems developed including java virtual machine jvm based related languages include haskell served testbed many new ideas language design many haskell variants produced exploring new language ideas including haskell community meets regularly research development activities main events since 2006 series organized hackathons occurred hac series aimed improving programming language tools libraries | [
5635,
4101,
9224,
9,
12,
2576,
6160,
8722,
5651,
1556,
2069,
7187,
2585,
3613,
8221,
9245,
8738,
8739,
4134,
3624,
2603,
5677,
5168,
2045,
5680,
5684,
9780,
2103,
9783,
10813,
6718,
64,
8771,
10819,
8262,
8775,
10317,
9808,
3665,
595,
8... | Test |
3,877 | 7 | Apache_Oozie:apache oozie apache oozie server-based workflow scheduling system manage hadoop jobs workflows oozie defined collection control flow action nodes directed acyclic graph control flow nodes define beginning end workflow start end failure nodes well mechanism control workflow execution path decision fork join nodes action nodes mechanism workflow triggers execution computation/processing task oozie provides support different types actions including hadoop mapreduce hadoop distributed file system operations pig ssh email oozie also extended support additional types actions oozie workflows parameterised using variables codice_1 within workflow definition submitting workflow job values parameters must provided properly parameterized using different output directories several identical workflow jobs run concurrently oozie implemented java web application runs java servlet container distributed apache license 2.0 | [
3462,
10377,
8460,
7567,
1296,
6161,
1047,
8217,
11161,
6555,
8860,
10661,
11303,
5677,
1327,
7983,
4919,
5047,
4538,
1851,
6074,
7485,
7742,
9789,
7233,
6338,
4419,
1222,
1991,
4294,
7750,
5066,
8139,
11343,
3920,
4944,
1363,
8408,
9179,
... | Train |
3,878 | 7 | Remote_component_environment:remote component environment remote component environment rce integration environment scientists engineers analyze design simulate complex systems e.g. aircraft satellites space vehicle focusses collaboration multidisciplinary teams treating complex systems requires many experts several analysis design simulation tools rce tools integrated coupled workflows rce executes workflows fetches results involved tool servers rce extensible supports different scientific applications slightly different requirements rce built upon eclipse rich client platform rcp open source published eclipse public license epl development rce platform took place sesis project previously platform known reconfigurable computing environment since open sourced name changed remote component environment | [
7149,
5612,
5677,
7983
] | Train |
3,879 | 5 | Back_to_My_Mac:back mac back mac feature introduced mac os x leopard 10.5 uses wide-area bonjour securely discover services across internet automatically configure ad hoc on-demand point-to-point encrypted connections computers using ipsec current version feature requires users icloud set well apple id due generality back mac work many bonjour-enabled services screen sharing similar apple remote desktop file sharing users must router supports either universal plug play upnp nat port mapping protocol nat-pmp either features enabled connected router uses udp port 4500 point-to-point ipsec connections may mapped different udp ports public side nat router october 12 2011 apple included back mac icloud service rather previously used mobileme thus making free use august 9 2018 apple updated support document note back mac would part macos mojave 10.14 release.the support document updated may 31 2019 indicate back mac services would discontinued versions macos july 1 2019 back mac used edit transfer files one mac another one instance apple store employee used technology capture image person stole macbook using built isight webcam | [
576,
4457,
3371,
6993,
3670,
11606,
5784,
3742
] | None |
3,880 | 4 | Data_security:data security data security means protecting digital data database destructive forces unwanted actions unauthorized users cyberattack data breach disk encryption refers encryption technology encrypts data hard disk drive disk encryption typically takes form either software see disk encryption software hardware see disk encryption hardware disk encryption often referred on-the-fly encryption otfe transparent encryption software-based security solutions encrypt data protect theft however malicious program hacker could corrupt data order make unrecoverable making system unusable hardware-based security solutions prevent read write access data hence offer strong protection tampering unauthorized access hardware based security assisted computer security offers alternative software-only computer security security tokens using pkcs 11 may secure due physical access required order compromised access enabled token connected correct pin entered see two-factor authentication however dongles used anyone gain physical access newer technologies hardware-based security solves problem offering full proof security data working hardware-based security hardware device allows user log log set different privilege levels manual actions device uses biometric technology prevent malicious users logging logging changing privilege levels current state user device read controllers peripheral devices hard disks illegal access malicious user malicious program interrupted based current state user hard disk dvd controllers making illegal access data impossible hardware-based access control secure protection provided operating systems operating systems vulnerable malicious attacks viruses hackers data hard disks corrupted malicious access obtained hardware-based protection software manipulate user privilege levels impossible hacker malicious program gain access secure data protected hardware perform unauthorized privileged operations assumption broken hardware malicious contains backdoor hardware protects operating system image file system privileges tampered therefore completely secure system created using combination hardware-based security secure system administration policies backups used ensure data lost recovered another source considered essential keep backup data industries process recommended files importance user data masking structured data process obscuring masking specific data within database table cell ensure data security maintained sensitive information exposed unauthorized personnel may include masking data users example banking customer representatives see last 4 digits customers national identity number developers need real production data test new software releases able see sensitive financial data outsourcing vendors etc data erasure method software based overwriting completely destroys electronic data residing hard drive digital media ensure sensitive data lost asset retired reused uk data protection act used ensure personal data accessible concerns provides redress individuals inaccuracies particularly important ensure individuals treated fairly example credit checking purposes data protection act states individuals companies legitimate lawful reasons process personal information shared data privacy day international holiday started council europe occurs every january 28 since general data protection regulation gdpr european union eu became law may 25 2018 organizations may face significant penalties €20million 4 annual revenue comply regulation intended gdpr force organizations understand data privacy risks take appropriate measures reduce risk unauthorized disclosure consumers ’ private information international standards iso/iec 27001:2013 iso/iec 27002:2013 covers data security topic information security one cardinal principles stored information i.e data owned clear whose responsibility protect control access data following examples organizations help strengthen standardize computing security trusted computing group organization helps standardize computing security technologies payment card industry data security standard proprietary international information security standard organizations handle cardholder information major debit credit prepaid e-purse atm pos point sale cards general data protection regulation gdpr proposed european commission strengthen unify data protection individuals within european union eu whilst addressing export personal data outside eu | [
2818,
1161,
522,
1801,
1930,
141,
5133,
3599,
9488,
1169,
3858,
6929,
9745,
8085,
10002,
5404,
672,
3366,
1961,
9129,
1324,
2733,
9260,
9901,
10801,
1918,
3382,
6455,
7739,
3133,
3262,
11470,
4689,
4435,
2901,
598,
1368,
7515,
4956,
8668,... | None |
3,881 | 2 | Universal_Windows_Platform:universal windows platform universal windows platform uwp api created microsoft first introduced windows 10 purpose platform help develop universal apps run windows 10 windows 10 mobile xbox one hololens without need re-written supported windows app development using c++ c vb.net xaml api implemented c++ supported c++ vb.net c f javascript designed extension windows runtime platform first introduced windows server 2012 windows 8 uwp allowed developers create apps would potentially run multiple types devices uwp part windows 10 windows 10 mobile uwp apps run earlier windows versions apps capable implementing platform natively developed using visual studio 2015 visual studio 2017 older metro-style apps windows 8.1 windows phone 8.1 universal 8.1 needed modifications migrate uwp 2015 build keynote microsoft announced collection uwp bridges allow android ios apps ported windows 10 mobile windows bridge android codenamed astoria runtime environment would allow android apps written java c++ run windows 10 mobile published windows store kevin gallo technical lead windows developer platform explained layer contained limitations google mobile services certain core apis available apps deep integration background tasks messaging software would run well environment windows bridge ios codenamed islandwood open-source middleware toolkit allows ios apps developed objective-c ported windows 10 mobile using visual studio 2015 convert xcode project visual studio project early build windows bridge ios released open-source software mit license august 6 2015 android version closed beta february 2016 microsoft announced ceased development windows bridge android citing redundancies due ios already primary platform multi-platform development windows bridge ios produced native code require os-level emulator instead microsoft encouraged use c multi-platform app development using tools xamarin acquired prior announcement windows platform features later versions exclusive uwp software specifically packaged usable architectures existing win32 platform xaml windows forms however 2019 microsoft taken steps reduce parity application platforms make uwp features usable inside non-uwp software microsoft introduced xaml islands method embedding uwp controls widgets non-uwp software part windows 10 may 2019 update stated would also allow uwp functions windows runtime components invoked within non-packaged software uwp extension windows runtime universal windows apps created using uwp longer indicate written specific os manifest build instead target one device families pc smartphone tablet xbox one using universal windows platform bridges extensions allow app automatically utilize capabilities available particular device currently running universal app may run either mobile phone tablet provide suitable experiences universal app running smartphone may start behaving way would running pc phone connected desktop computer suitable docking station games developed uwp subject technical restrictions including incompatibility multi-video card setups difficulties modding game using game programs fraps overlays gaming-oriented chat clients key binding managers uwp support directx 11.1 later games built older directx versions work build 2016 microsoft xbox division head phil spencer announced company attempting address issues would improve viability uwp pc games stating microsoft committed ensuring meet exceed performance expectations full-screen games well additional features including support overlays modding support amd freesync nvidia g-sync technologies disabling v-sync later added uwp epic games founder tim sweeney criticized uwp walled garden since default uwp software may published installed via windows store default requiring changes system settings enable installation external software similarly android additionally certain operating system features exclusive uwp used non-uwp software video games sweeney characterized moves aggressive move microsoft ever made attempting transform pcs closed platform felt moves meant put third-party gaming storefronts steam disadvantage microsoft curtailing users freedom install full-featured pc software subverting rights developers publishers maintain direct relationship customers sweeney argued end-users able download uwp software install manner non-uwp software windows vp kevin gallo addressed sweeney concerns stating windows 10 november update enabled people easily side-load apps default ux required want make windows best development platform regardless technologies used offer tools help developers existing code bases html/javascript .net win32 c++ objective-c bring code windows integrate uwp capabilities xamarin uwp developers reach windows 10 devices use large percentage c code deliver fully native mobile app experiences ios android live interview giant bomb e3 2016 coverage spencer defended mixed reception uwp-exclusive releases stating n't gone swimmingly gone well still definitely concern uwp store somehow linked way nefarious also discussed microsoft relationships third-party developers distributors steam considering service critical part gaming success windows stating microsoft planned continue releasing games platform well going areas cooperate going areas compete end result better gamers spencer also stated friend sweeney frequent contact may 30 2019 microsoft announced would support distribution win32 games microsoft store spencer since promoted head gaming operations microsoft reporting directly ceo satya nadella explained developers preferred architecture allow customization control developers players come expect open windows gaming ecosystem also announced future xbox game studios releases windows would made available third-party storefronts steam rather exclusive microsoft store verge considered developments consistent executives larger strategies surrounding interoperability collaboration competitors admissions microsoft uwp ecosystem failure also citing microsoft efforts decouple uwp-exclusive features platform allow distribution win32 software microsoft store unsuccessful windows 10 mobile | [
11270,
5643,
4623,
4624,
7701,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
2603,
5677,
2101,
10812,
3648,
1089,
582,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
9819,
3170,
8296,
8299,
622,
9839,
4210,
7796,
1656,
626... | None |
3,882 | 3 | CPU_power_dissipation:cpu power dissipation central processing unit power dissipation cpu power dissipation process central processing units cpus consume electrical energy dissipate energy form heat due resistance electronic circuits designing cpus perform tasks efficiently without overheating major consideration nearly cpu manufacturers date cpu implementations use little power example cpus mobile phones often use watts electricity microcontrollers used embedded systems may consume milliwatts even little microwatts comparison cpus general-purpose personal computers desktops laptops dissipate significantly power higher complexity speed microelectronic cpus may consume power order watts hundreds watts historically early cpus implemented vacuum tubes consumed power order many kilowatts cpus desktop computers typically use significant portion power consumed computer major uses include fast video cards contain graphics processing units power supplies laptops lcd backlight also uses significant portion overall power energy-saving features instituted personal computers idle overall consumption today high-performance cpus considerable strong contrast much lower energy consumption cpus designed low-power devices one cpu intel xscale run 600 mhz consuming 1 w power whereas intel x86 pc processors performance bracket consume times energy engineering reasons pattern processor manufacturers usually release two power consumption numbers cpu example pentium 4 2.8 ghz 68.4 w typical thermal power 85 w maximum thermal power cpu idle draw far less typical thermal power datasheets normally contain thermal design power tdp maximum amount heat generated cpu cooling system computer required dissipate intel advanced micro devices amd defined tdp maximum heat generation thermally significant periods running worst-case non-synthetic workloads thus tdp reflecting actual maximum power processor ensures computer able handle essentially applications without exceeding thermal envelope requiring cooling system maximum theoretical power would cost favor extra headroom processing power many applications cpu components idle much time idle power contributes significantly overall system power usage cpu uses power management features reduce energy use components motherboard chipset take larger proportion computer energy applications computer often heavily loaded scientific computing performance per watt much computing cpu per unit energy becomes significant several factors contributing cpu power consumption include dynamic power consumption short-circuit power consumption power loss due transistor leakage currents formula_1 dynamic power consumption originates activity logic gates inside cpu logic gates toggle energy flowing capacitors inside charged discharged dynamic power consumed cpu approximately proportional cpu frequency square cpu voltage capacitance frequency voltage logic gates toggle transistors inside may change states takes finite amount time may happen brief amount time transistors conducting simultaneously direct path source ground results short-circuit power loss magnitude power dependent logic gate rather complex model macro level power consumption due leakage power emanates micro-level transistors small amounts currents always flowing differently doped parts transistor magnitude currents depend state transistor dimensions physical properties sometimes temperature total amount leakage currents tends inflate increasing temperature decreasing transistor sizes dynamic short-circuit power consumption dependent clock frequency leakage current dependent cpu supply voltage shown energy consumption program shows convex energy behavior meaning exists optimal cpu frequency energy consumption minimal power consumption reduced several ways including following historically processor manufacturers consistently delivered increases clock rates instruction-level parallelism single-threaded code executed faster newer processors modification recently order manage cpu power dissipation processor makers favor multi-core chip designs thus software needs written multi-threaded multi-process manner take full advantage hardware many multi-threaded development paradigms introduce overhead see linear increase speed compared number processors particularly true accessing shared dependent resources due lock contention effect becomes noticeable number processors increases recently ibm exploring ways distribute computing power efficiently mimicking distributional properties human brain | [
3596,
3352,
6815,
2081,
10658,
10664,
4270,
4276,
7604,
5948,
2492,
1480,
2516,
10966,
2273,
229,
10601,
3565,
4334,
1776,
499,
4596,
1911
] | Test |
3,883 | 3 | VIA_Technologies:via technologies via technologies inc. taiwanese manufacturer integrated circuits mainly motherboard chipsets cpus memory world largest independent manufacturer motherboard chipsets fabless semiconductor company via conducts research development chipsets in-house subcontracts actual silicon manufacturing third-party merchant foundries tsmc company founded 1987 fremont california usa cher wang 1992 decided move headquarters taipei taiwan order establish closer partnerships substantial growing manufacturing base taiwan neighbouring china 1999 via acquired cyrix division national semiconductor year via acquired centaur technology integrated device technology marking entry x86 microprocessor market via maker via c3 via c7 via nano processors epia platform cyrix mediagx platform remained national semiconductor 2001 via established s3 graphics joint venture january 2005 via began via pc-1 initiative develop information communication technology systems benefit access computers internet february 2005 via celebrated production 100 millionth via amd chipset 29 august 2008 via announced would release official 2d accelerated linux drivers chipsets would also release 3d accelerated drivers 2013 via entered agreement shanghai municipal government create fabless semiconductor company called zhaoxin joint venture producing x86 compatible cpus chinese market via business focuses integrated chipsets pc market among pc users via best known motherboard core-logic chipsets however via products include audio controllers network/connectivity controllers low-power cpus even cd/dvd-writer chipsets pc peripheral vendors asus buy chipsets inclusion product brands late 1990s via began diversifying core-logic business company since made business acquisitions form cpu division graphics division sound division advances silicon manufacturing continue increase level integration functionality chipsets via need divisions remain competitive core-logic market via produced multiple x86 compatible cpus acquisitions cyrix centaur technology via still produces cpus zhaoxin joint venture via x86 processors also contain undocumented alternate instruction set via established important supplier pc components chipsets socket 7 platform apollo vp3 chipset via pioneered agp support socket 7 processors via present market position derives success pentium iii chipsets intel discontinued development sdram chipsets stated policy rdram memory would supported going forward since rdram expensive offered obvious performance advantages manufacturers found could ship performance-equivalent pcs lower cost using via chipsets response increasing market competition via decided buy ailing s3 graphics business savage chipset fast enough survive discrete solution low manufacturing cost made ideal integrated solution part via northbridge via s3 brand generally held onto 10 share pc graphics market behind intel amd nvidia via also includes via envy soundcard motherboards offers 24-bit sound pentium 4 chipset designs struggled win market share face legal threats intel k8t800 chipset athlon 64 popular via also continued development via c3 via c7 processors targeting small light low power applications market space via successful january 2008 via unveiled via nano 11 mm × 11 mm footprint vm-enabled x86-64 processor debuted may 2008 ultra-mobile pcs basis idt centaur acquisition via appears come possession least three patents cover key aspects processor technology used intel basis negotiating leverage patents offered 2003 via arrived agreement intel allowed ten-year patent cross license enabling via continue design manufacture x86 compatible cpus via also granted three-year grace period could continue use intel socket infrastructure | [
3459,
3588,
4228,
5380,
9863,
6924,
1677,
6670,
7311,
11405,
7442,
405,
3352,
9851,
4252,
799,
5028,
4902,
2088,
8237,
4270,
5681,
9137,
8250,
10820,
9541,
455,
3911,
7113,
2506,
977,
9042,
10966,
4569,
9307,
10715,
2525,
10971,
9567,
700... | Validation |
3,884 | 4 | Usenet_Death_Penalty:usenet death penalty usenet usenet death penalty udp final penalty may issued internet service providers single users produce much spam fail adhere usenet standards messages fall jurisdiction usenet death penalty cancelled cancelled messages deleted usenet servers allowed propagate causes users affected isp unable post usenet puts pressure isp change policies notable cases include actions taken uunet compuserve excite home three types usenet death penalty effective udp must supported large number servers majority major transit servers otherwise articles propagate throughout smaller slower peerings udps casual acts announced beforehand owner offending server contacted given several chances correct perceived problem since effects users server udp significant users want post impact udp induce operators offending server address problems quickly udps issued america online bbn planet compuserve erols internet netcom tiac uunet first udp software written karl kleinpaste 1990 though disagreement term coined net abuse faq claims 1993 message posted 18 august year claims coined years earlier eliot lear udp implemented uunet 1 august 1997 became host many spammers unresponsive abuse complaints forced provider implement antispam policies tools close open relays executives called udp digital terrorism threatened legal action asserted planning move spammers anyway volume spam uunet decreased organizers called penalty august 6 though announcement stifled cancel messages udp opponents active udp implemented compuserve 18 november 1997 lifted following day company implemented anti-spamming measures instituted new acceptable use policy addressing spamming udp scheduled begin excite home 19 january 2000 lifted day scheduled begin isp began scanning misconfigured proxy servers home users computers blamed spam originating network | [
4331,
1188,
3350
] | Test |
3,885 | 4 | Comparison_of_firewalls:comparison firewalls following comparison notable firewalls starting simple home firewalls sophisticated enterprise-level firewalls firewall solutions provided software solutions run general purpose operating systems following table lists different firewall software installed configured different general purpose operating systems general computer appliance computing device specific function limited configuration ability software appliance set computer programs might combined enough operating system jeos run optimally industry standard computer hardware virtual machine firewall appliance combination firewall software operating system purposely built run firewall system dedicated hardware virtual machine include following table lists different firewall appliances features strictly firewall features sometimes bundled firewall software exist platform note features marked yes even implemented separate module comes platform firewall sits ids real-time firewall logs/sniffs/blocks suspicious connections part rule-set vpn virtual private network types pptp l2tp mpls ipsec ssl/ssh profile selection user switch sets firewall settings e.g use work home public connections | [
2049,
2563,
4611,
10772,
550,
10790,
6699,
8753,
4659,
569,
5178,
9279,
2118,
9806,
8784,
9817,
9320,
8816,
5749,
10872,
5245,
6797,
1172,
3732,
2721,
3243,
1708,
704,
10433,
9927,
5322,
4814,
9423,
10451,
1242,
6364,
3299,
5860,
4843,
10... | Train |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.