node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
3,886 | 3 | Field-programmable_gate_array:field-programmable gate array field-programmable gate array fpga integrated circuit designed configured customer designer manufacturinghence term field-programmable fpga configuration generally specified using hardware description language hdl similar used application-specific integrated circuit asic circuit diagrams previously used specify configuration increasingly rare due advent electronic design automation tools fpgas contain array programmable logic blocks hierarchy reconfigurable interconnects allow blocks wired together like many logic gates inter-wired different configurations logic blocks configured perform complex combinational functions merely simple logic gates like xor fpgas logic blocks also include memory elements may simple flip-flops complete blocks memory many fpgas reprogrammed implement different logic functions allowing flexible reconfigurable computing performed computer software contemporary field-programmable gate arrays fpgas large resources logic gates ram blocks implement complex digital computations fpga designs employ fast i/o rates bidirectional data buses becomes challenge verify correct timing valid data within setup time hold time floor planning enables resource allocation within fpgas meet time constraints fpgas used implement logical function asic perform ability update functionality shipping partial re-configuration portion design low non-recurring engineering costs relative asic design notwithstanding generally higher unit cost offer advantages many applications fpgas analog features addition digital functions common analog feature programmable slew rate output pin allowing engineer set low rates lightly loaded pins would otherwise ring couple unacceptably set higher rates heavily loaded pins high-speed channels would otherwise run slowly also common quartz-crystal oscillators on-chip resistance-capacitance oscillators phase-locked loops embedded voltage-controlled oscillators used clock generation management high-speed serializer-deserializer serdes transmit clocks receiver clock recovery fairly common differential comparators input pins designed connected differential signaling channels mixed signal fpgas integrated peripheral analog-to-digital converters adcs digital-to-analog converters dacs analog signal conditioning blocks allowing operate system-on-a-chip soc devices blur line fpga carries digital ones zeros internal programmable interconnect fabric field-programmable analog array fpaa carries analog values internal programmable interconnect fabric fpga industry sprouted programmable read-only memory prom programmable logic devices plds proms plds option programmed batches factory field field-programmable however programmable logic hard-wired logic gates altera founded 1983 delivered industry first reprogrammable logic device 1984 – ep300 – featured quartz window package allowed users shine ultra-violet lamp die erase eprom cells held device configuration december 2015 intel acquired altera xilinx co-founders ross freeman bernard vonderschmitt invented first commercially viable field-programmable gate array 1985 – xc2064 xc2064 programmable gates programmable interconnects gates beginnings new technology market xc2064 64 configurable logic blocks clbs two three-input lookup tables luts 20 years later freeman entered national inventors hall fame invention 1987 naval surface warfare center funded experiment proposed steve casselman develop computer would implement 600,000 reprogrammable gates casselman successful patent related system issued 1992 altera xilinx continued unchallenged quickly grew 1985 mid-1990s competitors sprouted eroding significant market share 1993 actel microsemi serving 18 percent market 2013 altera 31 percent actel 10 percent xilinx 36 percent together represented approximately 77 percent fpga market 1990s period rapid growth fpgas circuit sophistication volume production early 1990s fpgas primarily used telecommunications networking end decade fpgas found way consumer automotive industrial applications companies like microsoft started use fpgas accelerate high-performance computationally intensive systems like data centers operate bing search engine due performance per watt advantage fpgas deliver microsoft began using fpgas accelerate bing 2014 2018 began deploying fpgas across data center workloads azure cloud computing platform 2012 coarse-grained architectural approach taken step combining logic blocks interconnects traditional fpgas embedded microprocessors related peripherals form complete system programmable chip work mirrors architecture created ron perlof hana potash burroughs advanced systems group 1982 combined reconfigurable cpu architecture single chip called sb24 examples hybrid technologies found xilinx zynq-7000 programmable soc includes 1.0 ghz dual-core arm cortex-a9 mpcore processor embedded within fpga logic fabric altera arria v fpga includes 800 mhz dual-core arm cortex-a9 mpcore atmel fpslic another device uses avr processor combination atmel programmable logic architecture microsemi smartfusion devices incorporate arm cortex-m3 hard processor core 512 kb flash 64 kb ram analog peripherals multi-channel analog-to-digital converters digital-to-analog converters flash memory-based fpga fabric alternate approach using hard-macro processors make use soft processor ip cores implemented within fpga logic nios ii microblaze mico32 examples popular softcore processors many modern fpgas programmed run time led idea reconfigurable computing reconfigurable systems – cpus reconfigure suit task hand additionally new non-fpga architectures beginning emerge software-configurable microprocessors stretch s5000 adopt hybrid approach providing array processor cores fpga-like programmable cores chip design start new custom design implementation fpga historically fpgas slower less energy efficient generally achieved less functionality fixed asic counterparts older study showed designs implemented fpgas need average 40 times much area draw 12 times much dynamic power run one third speed corresponding asic implementations recently fpgas xilinx virtex-7 altera stratix 5 come rival corresponding asic assp application-specific standard part standalone usb interface chip solutions providing significantly reduced power usage increased speed lower materials cost minimal implementation real-estate increased possibilities re-configuration 'on-the-fly design included 6 10 asics achieved using one fpga advantages fpgas include ability re-program already deployed i.e field fix bugs often include shorter time market lower non-recurring engineering costs vendors also take middle road via fpga prototyping developing prototype hardware fpgas manufacture final version asic longer modified design committed xilinx claimed several market technology dynamics changing asic/fpga paradigm february 2009 trends make fpgas better alternative asics larger number higher-volume applications historically used company attributes growing number fpga design starts see fpgas capability partial re-configuration lets one portion device re-programmed portions continue running primary differences complex programmable logic devices cplds fpgas architectural cpld comparatively restrictive structure consisting one programmable sum-of-products logic arrays feeding relatively small number clocked registers result cplds less flexible advantage predictable timing delays fpga architectures hand dominated interconnect makes far flexible terms range designs practical implementation also far complex design least requiring complex electronic design automation eda software practice distinction fpgas cplds often one size fpgas usually much larger terms resources cplds typically fpgas contain complex embedded functions adders multipliers memory serializer/deserializers another common distinction cplds contain embedded flash memory store configuration fpgas usually require external non-volatile memory always design requires simple instant-on logic already configured power-up cplds generally preferred applications fpgas generally preferred sometimes cplds fpgas used single system design designs cplds generally perform glue logic functions responsible “ booting ” fpga well controlling reset boot sequence complete circuit board therefore depending application may judicious use fpgas cplds single design fpgas advantages disadvantages compared asics secure microprocessors concerning hardware security fpgas flexibility makes malicious modifications fabrication lower risk previously many fpgas design bitstream exposed fpga loads external memory typically every power-on major fpga vendors offer spectrum security solutions designers bitstream encryption authentication example altera xilinx offer aes encryption 256-bit bitstreams stored external flash memory fpgas store configuration internally nonvolatile flash memory microsemi proasic 3 lattice xp2 programmable devices expose bitstream need encryption addition flash memory lookup table provides single event upset protection space applications customers wanting higher guarantee tamper resistance use write-once antifuse fpgas vendors microsemi stratix 10 fpgas socs altera introduced secure device manager physically uncloneable functions provide high levels protection physical attacks 2012 researchers sergei skorobogatov christopher woods demonstrated fpgas vulnerable hostile intent discovered critical backdoor vulnerability manufactured silicon part actel/microsemi proasic 3 making vulnerable many levels reprogramming crypto access keys accessing unencrypted bitstream modifying low-level silicon features extracting configuration data fpga used solve problem computable trivially proven fact fpgas used implement soft microprocessor xilinx microblaze altera nios ii advantage lies significantly faster applications parallel nature optimality terms number gates used certain processes fpgas originally began competitors cplds implement glue logic printed circuit boards size capabilities speed increased fpgas took additional functions point marketed full systems chips socs particularly introduction dedicated multipliers fpga architectures late 1990s applications traditionally sole reserve digital signal processor hardware dsps began incorporate fpgas instead another trend use fpgas hardware acceleration one use fpga accelerate certain parts algorithm share part computation fpga generic processor search engine bing noted adopting fpga acceleration search algorithm 2014. fpgas seeing increased use ai accelerators including microsoft so-termed project catapult accelerating artificial neural networks machine learning applications traditionally fpgas reserved specific vertical applications volume production small low-volume applications premium companies pay hardware cost per unit programmable chip affordable development resources spent creating asic new cost performance dynamics broadened range viable applications common fpga architecture consists array logic blocks i/o pads routing channels generally routing channels width number wires multiple i/o pads may fit height one row width one column array application circuit must mapped fpga adequate resources number clbs/labs i/os required easily determined design number routing tracks needed may vary considerably even among designs amount logic example crossbar switch requires much routing systolic array gate count since unused routing tracks increase cost decrease performance part without providing benefit fpga manufacturers try provide enough tracks designs fit terms lookup tables luts i/os routed determined estimates derived rent rule experiments existing designs network-on-chip architectures routing interconnection developed general logic block consists logical cells called alm le slice etc. typical cell consists 4-input lut full adder fa d-type flip-flop shown luts figure split two 3-input luts normal mode combined 4-input lut left multiplexer mux arithmetic mode outputs fed adder selection mode programmed middle mux output either synchronous asynchronous depending programming mux right figure example practice entire parts adder stored functions luts order save space modern fpga families expand upon capabilities include higher level functionality fixed silicon common functions embedded circuit reduces area required gives functions increased speed compared building logical primitives examples include multipliers generic dsp blocks embedded processors high speed i/o logic embedded memories higher-end fpgas contain high speed multi-gigabit transceivers hard ip cores processor cores ethernet medium access control units pci/pci express controllers external memory controllers cores exist alongside programmable fabric built transistors instead luts asic-level performance power consumption without consuming significant amount fabric resources leaving fabric free application-specific logic multi-gigabit transceivers also contain high performance analog input output circuitry along high-speed serializers deserializers components built luts higher-level physical layer phy functionality line coding may may implemented alongside serializers deserializers hard logic depending fpga circuitry built inside fpga synchronous circuitry requires clock signal fpgas contain dedicated global regional routing networks clock reset delivered minimal skew also fpgas generally contain analog phase-locked loop and/or delay-locked loop components synthesize new clock frequencies well attenuate jitter complex designs use multiple clocks different frequency phase relationships forming separate clock domains clock signals generated locally oscillator recovered high speed serial data stream care must taken building clock domain crossing circuitry avoid metastability fpgas generally contain block rams capable working dual port rams different clocks aiding construction building fifos dual port buffers connect differing clock domains shrink size power consumption fpgas vendors tabula xilinx introduced 3d stacked architectures following introduction 28 nm 7-series fpgas xilinx said several highest-density parts fpga product lines constructed using multiple dies one package employing technology developed 3d construction stacked-die assemblies xilinx approach stacks several three four active fpga dies side-by-side silicon interposer – single piece silicon carries passive interconnect multi-die construction also allows different parts fpga created different process technologies process requirements different fpga fabric high speed 28 gbit/s serial transceivers fpga built way called heterogeneous fpga altera heterogeneous approach involves using single monolithic fpga die connecting die/technologies fpga using intel embedded multi-die interconnect bridge emib technology labview define behavior fpga user provides design hardware description language hdl schematic design hdl form suited work large structures possible specify high-level functional behavior rather drawing every piece hand however schematic entry allow easier visualization design component modules using electronic design automation tool technology-mapped netlist generated netlist fit actual fpga architecture using process called place-and-route usually performed fpga company proprietary place-and-route software user validate map place route results via timing analysis simulation verification validation methodologies design validation process complete binary file generated typically using fpga vendor proprietary software used re- configure fpga file transferred fpga/cpld via serial interface jtag external memory device like eeprom common hdls vhdl verilog well extensions systemverilog however attempt reduce complexity designing hdls compared equivalent assembly languages moves raise abstraction level introduction alternative languages national instruments labview graphical programming language sometimes referred g fpga add-in module available target program fpga hardware simplify design complex systems fpgas exist libraries predefined complex functions circuits tested optimized speed design process predefined circuits commonly called intellectual property ip cores available fpga vendors third-party ip suppliers rarely free typically released proprietary licenses predefined circuits available developer communities opencores typically released free open source licenses gpl bsd similar license sources designs known open-source hardware typical design flow fpga application developer simulate design multiple stages throughout design process initially rtl description vhdl verilog simulated creating test benches simulate system observe results synthesis engine mapped design netlist netlist translated gate-level description simulation repeated confirm synthesis proceeded without errors finally design laid fpga point propagation delays added simulation run values back-annotated onto netlist recently opencl open computing language used programmers take advantage performance power efficiencies fpgas provide opencl allows programmers develop code c programming language target fpga functions opencl kernels using opencl constructs information see high-level synthesis c hdl 2016 long-time industry rivals xilinx altera intel subsidiary fpga market leaders time controlled nearly 90 percent market xilinx altera provide proprietary electronic design automation software windows linux ise/vivado quartus enables engineers design analyze simulate synthesize compile designs manufacturers include march 2010 tabula announced fpga technology uses time-multiplexed logic interconnect claims potential cost savings high-density applications march 24 2015 tabula officially shut june 1 2015 intel announced would acquire altera approximately 16.7 billion completed acquisition december 30 2015 | [
516,
5636,
7173,
1032,
9739,
7699,
5655,
8732,
10781,
10789,
8231,
2605,
3629,
7218,
6716,
1087,
2623,
2113,
7234,
7745,
11333,
3142,
2638,
10833,
3159,
3168,
1122,
4194,
3175,
107,
11374,
8815,
630,
8822,
6268,
8326,
4743,
6797,
7313,
93... | None |
3,887 | 4 | Security_testing:security testing security testing process intended reveal flaws security mechanisms information system protect data maintain functionality intended due logical limitations security testing passing security testing indication flaws exist system adequately satisfies security requirements typical security requirements may include specific elements confidentiality integrity authentication availability authorization non-repudiation actual security requirements tested depend security requirements implemented system security testing term number different meanings completed number different ways security taxonomy helps us understand different approaches meanings providing base level work integrity information refers protecting information modified unauthorized parties might involve confirming identity person tracing origins artifact ensuring product packaging labeling claims assuring computer program trusted one common terms used delivery security testing | [
5636,
10756,
9356,
3473,
8978,
5245,
10392,
4892,
5404,
2975,
2213,
8998,
939,
3629,
9646,
7855,
2737,
1970,
7989,
5433,
7739,
7228,
3262,
9791,
3525,
2558,
11333,
7368,
9160,
3796,
2262,
10070,
9688,
7515,
10718,
3941,
6373,
107,
11244,
... | Test |
3,888 | 1 | Database_Directive:database directive directive 96/9/ec european parliament council 11 march 1996 legal protection databases directive european union field copyright law made internal market provisions treaty rome harmonises treatment databases copyright law sui generis right creators databases qualify copyright article 1 2 defines database collection independent works data materials arranged systematic methodical way individually accessible electronic means non-electronic databases also covered para 14 preamble computer program used create database included para 23 preamble copyright protection software governed directive 91/250/eec article 3 databases reason selection arrangement contents constitute author intellectual creation protected copyright collections criterion may used member states may relaxation criterion protection collections berne convention protection literary artistic works covers collections literary artistic works requires creativity selection arrangement contents practice difference likely slight copyright database separate without prejudice copyright entries acts restricted copyright similar types work art 5 shall prevent lawful use database lawful user art 6 1 member states may provide following limitations art 6 2 well applying traditional limitations copyright copyright protection usually lasts seventy years death last publicly identified author anonymous pseudonymous works gain protection later 70 years work lawfully made available public 70 years creation national legislation makes particular provision collective works legal person i.e body corporate rights holder term protection calculated way anonymous pseudonymous works exception natural persons created work given credit versions made available public term protection calculated according lives authors art 1 directive 93/98/eec copyright protection available databases aim complete entries selected objective criteria covered sui generis database rights copyright protects creativity author database rights specifically protect qualitatively and/or quantitatively substantial investment either obtaining verification presentation contents substantial investment need financial database protected art 7 1 database rights held first instance person corporation made substantial investment long article 11 3 provides negotiation treaties ensure reciprocal treatment outside eu 2006 treaty exists holder database rights may prohibit extraction and/or re-utilization whole substantial part contents substantial part evaluated qualitatively and/or quantitatively reutilisation subject exhaustion rights public lending act extraction re-utilization lawful user database available public may freely extract and/or re-use insubstantial parts database art 8 holder database rights may place restrictions purpose insubstantial parts used however users may perform acts conflict normal exploitation database unreasonably prejudice legitimate interests maker database prejudice copyright entries limitations may provided database rights copyright databases art 9 database rights last fifteen years end year database made available public end year completion private databases art 10 substantial change could considered substantial new investment lead new term database rights could principle perpetual database rights independent copyright database two could principle held different people especially jurisdictions prohibit corporate ownership copyright database rights compared rights phonogram film producers | [
8440,
385,
10136,
2901
] | Validation |
3,889 | 2 | Sparse_image:sparse image sparse image type disk image file used macos grows size user adds data image taking much disk space stored encrypted sparse image files used secure user home directory filevault feature mac os x snow leopard earlier sparse images created using disk utility unlike full image file .dmg takes much actual space real disk represents regardless amount unused space sparse image file .sparseimage takes much actual disk space data contained within maximum capacity assigned creation two limitations therefore worth noting regarding use image file format mac os x leopard introduced concept sparse bundle instead single big file sparse bundle bundle directory containing number files called bands order 8 mb size means even though end user sparse bundle appears single file composed smaller files mac os x 10.8 bands 8 mib content image changes one band files changed created deleted allows backup software time machine operate efficiently sparse bundle advantages time machine | [
9762,
4615,
10857,
5482,
10765,
11221,
7422
] | Test |
3,890 | 2 | NSAKEY:nsakey computer security cryptography _nsakey variable name discovered windows nt 4 service pack 5 released unstripped symbolic debugging data august 1999 andrew d. fernandes cryptonym corporation variable contained 1024-bit public key microsoft operating systems require cryptography suites work operating systems digital signature since microsoft-approved cryptography suites installed used component windows possible keep export copies operating system products windows installed compliance export administration regulations ear enforced us department commerce bureau industry security bis already known microsoft used two keys primary spare either create valid signatures microsoft failed remove debugging symbols advapi32.dll security encryption driver released service pack 5 windows nt 4.0 andrew fernandes chief scientist cryptonym found primary key stored variable _key second key labeled _nsakey fernandes published discovery touching flurry speculation conspiracy theories including possibility second key owned united states national security agency nsa allowed intelligence agency subvert windows user security presentation computers freedom privacy 2000 cfp2000 conference duncan campbell senior research fellow electronic privacy information center epic mentioned _nsakey controversy example outstanding issue related security surveillance addition dr. nicko van someren found third key windows 2000 doubted legitimate purpose declared looks fishy microsoft denied speculations _nsakey report inaccurate unfounded key question microsoft key maintained safeguarded microsoft shared key nsa party microsoft said key symbol _nsakey nsa technical review authority u.s. export controls key ensures compliance u.s. export laws richard purcell microsoft director corporate privacy approached campbell presentation expressed wish clear confusion doubts _nsakey immediately conference scott culp microsoft security response center contacted campbell offered answer questions correspondence began cordially soon became strained campbell apparently felt culp evasive culp apparently felt campbell hostilely repeating questions already answered 28 april 2000 culp stated definitely reached end discussion ... rapidly spiraling realm conspiracy theory campbell inquiries went unanswered microsoft claimed third key beta builds windows 2000 purpose signing cryptographic service providers http //web.archive.org/web/19990422142445/http //www.mozilla.org:80/crypto-faq.html says fact possible certain circumstances obtain export license software invoking cryptographic functions api example microsoft implementation microsoft cryptographic api cryptoapi specification approved export us even though implements api third parties including third parties outside us add separate modules cryptographic service providers csps implementing cryptographic functionality export approval presumably made possible cryptoapi implementation requires third party csps digitally signed microsoft rejects attempts call csps signed b signing process microsoft ensure compliance relevant us export control regulations e.g. presumably would sign csp developed outside us implements strong cryptography c microsoft cryptoapi implementation available executable form thus presumed reasonably resistant user tampering disable csp digital signature check software industry question whether bxa ear specific requirements backup keys however none claim legal technical expertise necessary authoritatively discuss document following theories presented microsoft stated second key present backup guard possibility losing primary secret key fernandes doubts explanation pointing generally accepted way guard loss secret key secret splitting would divide key several different parts would distributed throughout senior management stated would far robust using two keys second key also lost microsoft would need patch upgrade every copy windows world well every cryptographic module ever signed hand microsoft failed think consequences key loss created first key without using secret splitting secure hardware n't allow protection weakened key generation nsa pointed problem part review process might explain microsoft weakened scheme second key new one called _nsakey second key might backed using secret splitting losing keys need n't problem another possibility microsoft included second key able sign cryptographic modules outside united states still complying bxa ear cryptographic modules signed multiple locations using multiple keys reasonable approach however cryptographic module ever found signed _nsakey microsoft denies certification authority exists microsoft denied nsa access _nsakey secret key possible remove second _nsakey using following note windows software 1999 good news among bad however turns flaw way crypto_verify function implemented way crypto verification occurs users easily eliminate replace nsa key operating system without modifying microsoft original components since nsa key easily replaced means non-us companies free install strong crypto services windows without microsoft nsa approval thus nsa effectively removed export control strong crypto windows demonstration program replaces nsa key found cryptonym website september 1999 anonymous researcher reverse-engineered primary key _nsakey pgp-compatible format published key servers | [
6150,
11283,
3605,
5666,
11301,
6697,
1581,
7215,
8757,
582,
1098,
9812,
8283,
8798,
4704,
10338,
8296,
617,
5225,
107,
8299,
7796,
6265,
8315,
636,
639,
641,
651,
6797,
655,
2196,
10900,
3224,
7838,
6827,
3250,
9910,
7359,
4289,
194,
1... | None |
3,891 | 0 | Manning's_Law:manning law manning law describes combination principles need balanced design growth universal linguistic dependencies dependencies used describe model syntactic relations languages supports natural language processing major topic event thousands linguistics ai researchers working widely-adopted law put forward christopher manning manning law described consisting six directives may necessarily apply simultaneously often conflict degree | [
7780
] | Test |
3,892 | 3 | Socket_A:socket socket also known socket 462 cpu socket used amd processors ranging athlon thunderbird athlon xp/mp 3200+ amd budget processors including duron sempron socket also supports amd geode nx embedded processors derived mobile athlon xp socket zero insertion force pin grid array type 462 pins nine pins blocked socket prevent accidental insertion socket 370 cpus hence number 462 front side bus frequencies supported amd athlon xp sempron 133 mhz 166 mhz 200 mhz socket supports 32-bit cpus socket replaced socket 754 socket 939 2003 2004 respectively except use geode nx processors initially launched 100 mhz fsb support earliest chipsets evolved stepwise faster 200 mhz fsb maintaining pin compatibility throughout lifetime however clock timing bios voltage differences restrict compatibility older chipsets later processors socket dimensions 5.59 cm 5.24 cm without lever x 6.55 cm 2.2 2.06 without lever x 2.58 amd recommends mass socket cpu cooler exceed 300 grams 10.6 ounces heavier coolers may result damage die system properly handled socket processors athlon sempron duron geode nx following mechanical maximum load limits exceeded heatsink assembly shipping conditions standard use load limits may crack processor die make unusable load limits quite small compared load limits socket 478 processors indeed small many users ended cracked processors trying remove attach heatsinks fragile processor core made installing non-standard non-certified heatsink solutions risky business | [
3586,
9475,
3588,
8452,
3464,
4872,
7058,
10260,
4246,
4767,
2463,
7712,
9122,
1322,
11183,
1329,
8629,
9400,
7744,
7105,
6978,
11331,
9157,
3783,
7247,
9551,
7122,
9427,
7002,
7132,
2525,
4451,
5859,
8035,
10468,
1260,
1005,
7788,
7151,
... | Validation |
3,893 | 0 | Julie_Beth_Lovins:julie beth lovins julie beth lovins computational linguist first published stemming algorithm word matching 1968 lovins stemmer single pass context sensitive stemmer removes endings based longest-match principle stemmer first published extremely well developed considering date release main influence large amount future work area -adam g. et al lovins born october 19th 1945 washington d.c. grew amherst massachusetts father gerald h. lovins worked engineer mother miriam lovins worked social services administrator lovins brother amory lovins environmental scientist co-founder chief scientist rocky mountain institute undergraduate degree lovins attended pembroke college women college brown university later combined brown university 1971 penbroke college lovins studied mathematics linguistics graduated honors thesis named study idioms received inaugural bloch fellowship 1970 linguistic society america attend graduate school lovins obtained 1970 phd 1973 university chicago studying linguistics university chicago dissertation titled loan phonology -- subject matter revision thesis loanwords phonological structure japanese published 1975 indiana university linguistics club following lovins phd spent year working linguist-at-large university tokyo language research institute english conversation teacher joined faculty tsuda college professor english linguistics taught seven years time faculty member tsuda college lovins also served guest researcher university tokyo research institute logopedics phoniatrics research center speech science teaching japanese phonology prestigious japanese universities abroad lovins moved back u.s. work computing industry worked early speech synthesis bell labs murray hill new jersey bell labs lovins worked osamu fujimura renown japanese linguist credited pioneer speech sciences lovins also worked software engineer various companies silicon valley served consultant computational linguistics throughout 1990s consultant called business language doctor lovins published article work developing stemming algorithm research laboratory electronics mit 1968 lovins stemming algorithm frequently referred lovins stemmer stemming algorithm process taking word suffixes reducing root base word stemming algorithms used improve accuracy information retrieval domain analysis algorithms help find variants terms looked stemming algorithms helpful likely users look particular word might interested related words stemming algorithms prevalent search engines google implement word stemming 2003 means 2003 google search word warm would returned related words like warmth warming first published stemming algorithm lovins work set precedent influenced future work stemming algorithms porter stemmer published martin porter 1980 recognized widely common stemming algorithm stemming english additionally dawson stemmer developed john dawson extension lovins stemmer lovins stemmer follows rule-based affix elimination approach removes longest suffix word word recoded convert stem valid words process split two phases first phase word compared pre-determined list endings word found contain one endings ending removed leaving stem word second phase standardizes spelling exceptions come first phase ensure words slightly different stems properly matched together example word dried phase one results dri match word dry second phase takes care exceptions compared stemmers lovins algorithm fast equipped handle irregular plural words like person people disadvantages many suffixes available table endings sometimes highly unreliable frequently fails form words stems match stems like-meaning words reason technical vocabulary used author lovins moved mountain view california 1979 later old mountain view 1981 partner later husband dr. greg fowler software engineer advocate environmental issues blind free time husband enjoyed taking walks volunteering local community lovins actively volunteered organizations like old mountain view neighborhood association mountain view friends library league women voters mountain view cool cities team mountain view sustainability task force 2016 lovins husband died unexpectedly following heart attack eighteen days husband died lovins diagnosed brain cancer passed away january 26th 2018 hospice surrounded friends caregivers | [
2488,
1890
] | None |
3,894 | 7 | Microsoft_BizTalk_Server:microsoft biztalk server microsoft biztalk server simply biztalk inter-organizational middleware system ioms biztalk server previously positioned application server microsoft changed strategy released appfabric server became official application server research firm gartner consider microsoft offering one 'leaders application integration suites discussion product direction biztalk especially cloud software becoming common microsoft continues support update product offer coverage popular conferences worldwide partner conference azure ipaas integration platform service equivalents biztalk api management logic apps service bus event grid 2013-11-21 2018-05-31 included azure biztalk services successor biztalk 2016 product roadmap slated completion approximately 9 months following general availability windows server 2019 common scenario biztalk enables companies integrate manage automated business processes exchanging business documents purchase orders invoices disparate applications within across organizational boundaries development biztalk server done microsoft visual studio developer create transformation maps transforming one message type another example xml file transformed sap idocs messages inside biztalk implemented xml documents defined xml schemas xsd standard maps implemented xslt standard orchestrations implemented ws-bpel compatible process language xlang schemas maps pipelines orchestrations created visually using graphical tools within microsoft visual studio additional functionality delivered .net assemblies called existing modules—including instance orchestrations maps pipelines business rules starting 2000 following versions released following incomplete list technical features biztalk server human-centric processes implemented directly biztalk server need additional applications like microsoft sharepoint server biztalk server runtime built publish/subscribe architecture sometimes called content-based publish/subscribe messages published biztalk transformed desired format routed one subscribers biztalk makes processing safe serialization called dehydration biztalk terminology placing messages database waiting external events thus preventing data loss architecture binds biztalk microsoft sql server processing flow tracked administrators using administration console biztalk supports transaction flow whole line one customer another biztalk orchestrations also implement long-running transactions biztalk uses adapters communications different protocols message formats specific software products adapters edi file http sftp ftp smtp pop3 soap sql msmq mllp azure logic app azure api management microsoft sharepoint server ibm mainframe zseries cics ims midrange iseries as/400 server ibm db2 ibm websphere mq adapters wcf adapter set added 2006 r2 includes wcf-wshttp wcf-basichttp wcf-nettcp wcf-netmsmq wcf-netnamedpipe wcf-custom wcf-customisolated adapters microsoft also ships biztalk adapter pack includes wcf-based adapters lob systems currently includes adapters sap oracle database oracle e-business suite microsoft sql server mysql peoplesoft enterprise siebel systems additional adapters active directory example available third party microsoft biztalk core partners | [
10624,
5380,
9225,
1935,
11024,
1041,
11030,
4505,
10020,
10413,
7983,
10675,
9909,
7364,
5210,
479,
10340,
7022,
3573,
502,
10486,
6522,
3323
] | None |
3,895 | 9 | ContentBox_Modular_CMS:contentbox modular cms contentbox modular cms open-source content management system cfml created ortus solutions corp. contentbox designed modular hmvc software based hibernate orm coldbox platform contentbox modular cms dual-licensed apache v2 commercial license contentbox modular cms cfml-powered web application runs modern cfml engine including adobe coldfusion 9 lucee 4.5 railo 2 contentbox modular cms also delivered war file standard java servlet container apache tomcat | [
4512,
5314,
8739,
9666,
102,
6860,
3469,
5677,
7983,
4529,
9618,
1363,
148,
7862,
9144,
5048,
4507
] | Test |
3,896 | 4 | John_Threat:john threat john lee a.k.a john threat used name corrupt member masters deception mod new york based hacker group early '90s result participation great hacker war mod rival hacker group legion doom indicted federal wiretapping charges 1992 pled guilty sentenced one year federal detention center participation great hacker war landed cover wired magazine 1994 lee born july 6 1973 brooklyn new york grew brownsville member decepticons brooklyn-based street gang formed early '80s named villains saturday morning cartoon transformers lee attended stuyvesant high school went new york university freshman year nyu lee sentenced prison role great hacker war lee also editing producing directing credits film television 2004 founded mediathreat llc film production company 2005 directed original documentary dead prez bigger hip hop 2011 co-directed music video make single ca n't friends everyone diane martel lee also gained notoriety 2001 revealed anonymous editor urbanexpose.com controversial entertainment gossip website | [
8974
] | Test |
3,897 | 4 | Cyber_Resilience_Review:cyber resilience review cyber resilience review crr assessment method developed united states department homeland security dhs voluntary examination operational resilience cyber security practices offered cost dhs operators critical infrastructure state local tribal territorial governments crr service-oriented approach meaning one foundational principles crr organization deploys assets people information technology facilities support specific operational missions services crr offered facilitated workshop format self-assessment package workshop version crr led dhs facilitator critical infrastructure facility workshop typically takes 6–8 hours complete draws cross section personnel critical infrastructure organization information collected facilitated crr protected disclosure protected critical infrastructure information act 2002 information disclosed freedom information act request used civil litigation used regulatory purposes crr self-assessment package allows organization conduct assessment without need direct dhs assistance available download dhs critical infrastructure cyber community voluntary program website package includes automated data answer capture report generation tool facilitation guide comprehensive explanation question crosswalk crr practices criteria national institute standards technology nist cybersecurity framework questions asked crr resulting report versions assessment dhs partnered cert division software engineering institute carnegie mellon university design deploy crr goals practices found assessment derived cert resilience management model cert-rmm version 1.0 crr introduced 2009 received significant revision 2014 crr comprises 42 goals 141 specific practices extracted cert-rmm organized 10 domains domain composed purpose statement set specific goals associated practice questions unique domain standard set maturity indicator level mil questions mil questions examine institutionalization practices within organization.the performance organization scored mil scale scale depicts capability divided five levels mil1-incomplete mil2-performed mil3-managed mil4-measured mil5-defined institutionalization means cybersecurity practices become deeper lasting part organization managed supported meaningful ways cybersecurity practices become institutionalized—or “ embedded ” —managers confidence practices ’ predictability reliability practices also become likely sustained times disruption stress organization maturity also lead tighter alignment cybersecurity activities organization ’ business drivers example mature organizations managers provide oversight particular domain evaluate effectiveness security activities domain comprises number goals practice questions varies domain set mil questions concepts encompass domains crr questions three possible responses “ yes ” “ ” “ incomplete crr measures performance organization practice goal domain mil levels scores calculated individual model elements aggregated totals scoring rubric establishes following conditions met organization said achieving domain performed state practices define domain observable determination made degree practices conditions tested applying common set 13 mil questions domain mil1 achieved consistent architecture mil scale mils cumulative achieve mil specific domain organization must perform practices level preceding mils example organization must perform domain practices mil1 mil2 achieve mil2 domain crr participants receive comprehensive report containing results question domains report also provides graphical summaries organization ’ performance goal domain levels depicted heat-map matrix detailed representation allows organizations target improvement fine-grained level organizations participating facilitated crrs receives additional set graphs depicting performance organization compared prior participants crr report includes potential path toward improving performance practice options consideration primarily sourced cert-rmm nist special publications organizations also use crr results measure perform relation criteria nist cybersecurity framework correlation feature introduced february 2014 | [
4936,
6019
] | Test |
3,898 | 6 | DCE_Distributed_File_System:dce distributed file system dce distributed file system dce/dfs remote file access protocol used distributed computing environment variant andrew file system afs based afs version 3.0 protocol developed commercially transarc corporation afs version 3.0 turn based afs version 2.0 protocol also used coda disconnected file system originally developed carnegie mellon university dce/dfs consisted multiple cooperative components provided network file system strong file system semantics attempting mimic behavior posix local file systems taking advantage performance optimizations possible dce/dfs client system utilized locally managed cache would contain copies regions original file client system would coordinate server system original copy file stored ensure multiple clients accessing file would re-fetch cached copy file data original file changed advantage approach provided good performance even slow network connections file access actually done local cached regions file server failed client could continue making changes file locally storing back server became available dce/dfs also divorced concept logical units management filesets underlying volume fileset stored allowed administrative control location fileset manner transparent end user support advanced dce/dfs features local journaling file system dce/lfs also known episode developed provide full range support options ibm maintained since 2005 http //www-306.ibm.com/software/stormgmt/dfs/ ibm working replacement dce/dfs called adfs advanced distributed file system one major goal project decouple dfs complexities dce cell directory services cds security services secd another key feature would elimination enctype limitations associated dce/rpc public mention effort made since 2005 leading many believe project killed dce distributed file system dfs adopted open software foundation 1989 part distributed computing environment | [
9189,
3018,
2314,
5580,
7789,
3826,
2395
] | Validation |
3,899 | 9 | Isomorphic_JavaScript:isomorphic javascript isomorphic javascript also known universal javascript describes javascript applications run client server isomorphic javascript works context single-page application spa typical spa application logic including routing encapsulated bundled javascript file sent client whilst frees server handle many requests also makes initial load slow client entire application needs sent client isomorphic javascript client web page first requested server view page generated server similar server-side dynamic web pages sent client client render view immediately initial view rendered complete spa downloaded background subsequent actions handled client-side naming term 'isomorphic javascript matter controversy term 'isomorphic first coined charlie robbins nodejitsu one company blog posts spike brehm software engineer airbnb wrote another blog post using term however others proposed use term universal javascript instead several isomorphic javascript frameworks libraries created notably meteor framework react library others includes next.js nuxt rendr derby miso ezel catberry | [
4490,
3462
] | None |
3,900 | 2 | OxygenOS:oxygenos oxygenos customized version android mobile operating system developed chinese smartphone manufacturer oneplus exclusively smartphones oxygenos developed overseas market also another version os designed specifically chinese home market called hydrogenos interview published 3 september 2016 xda developers revealed oneplus actively merging platforms oxygenos hydrogenos single cohesive operating system notable features version 2.0 2.1.1 include app permissions waves maxxaudio swiftkey keyboard off-screen gestures custom icons dark mode manual camera mode raw support 3rd party apps like camera fv-5 2.75 14 june 2016 oneplus released oxygenos 3.0 version android modifications internal tuning like gestures shelf dark mode oneplus 31 december 2016 oneplus released oxygenos 4.0.0 based android nougat includes features several modifications public via ota download 31 january 2018 oneplus released oxygenos 5.0.3 based android oreo public via ota download may 2018 oneplus launched oneplus 6 oxygenos based android oreo 8.1 29 october 2018 oneplus launched oneplus 6t oxygenos 9.0 based android pie 25 december 2018 oneplus released oxygenos 9.0.0 based android pie oneplus 5/5t public via ota download 10 october 2017 security researcher discovered oxygenos system service named devicemanagerservice collects sensitive data sends back oneplus servers service collects many data points including device serial number phone number imei network connections timestamped records user activity within every app users uninstall system service via adb later oneplus released statement data collection analytics claiming data used system improvement optimization shared third parties disabled users system settings oneplus also says revising data analysis mechanism longer collect certain data 2014 oneplus promised close stock bloat-free highly customizable experience soon held name rom contest search name 30 january 2015 oneplus officially announced names oxygenos hydrogenos winner contest midifire belgium flown headquarters shenzhen got meet team along ceo pete lau | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
5677,
1083,
6212,
69,
8262,
1608,
4685,
3664,
8280,
8285,
2658,
11391,
1670,
5262,
10393,
7835,
673,
8870,
1191,
196,
8907,
2259,
8413,
9949,
1255,
8940,
5892,
7428,
2828,
280,
10009,
10525,
798,... | Test |
3,901 | 9 | Apple_Media_Tool:apple media tool apple media tool multimedia authoring tool associated programming environment sold apple late 1990s primarily aimed producing multimedia presentations distribution cd-rom aimed graphic designers programming experience featured advanced user interface object-oriented user model made production rich complex presentations easy amt system developed patrick soquet developer belgium working arborescence french company later acquired havas 1993 onwards marketed apple development done independent team led soquet 1996 development tool taken apple 2.1 version program developed house team engineers california led dan crow 1997 apple decided concentrate multimedia offerings quicktime hypercard rights amt returned havas patrick soquet acquired rights co-founded tribeworks developed new tool based aml called ishell major features apple media tool graphical authoring tool amt associated programming environment apple media tool programming environment amtpe compiler debugger underlying apple media language aml also known key language amt notable one first authoring systems support embedding apple pioneering qtvr movie format aml object-oriented programming language based eiffel specialized multimedia programming although amt require programming experience use produced complete aml programs compiled byte code interpreted runtime interpreter ampte could used enhance aml code create complex programs example accessing database retrieve media aml conceptually similar java write run anywhere approach cross-platform development runtime interpreters classic mac os windows platforms | [
576,
4844,
6797,
8262
] | Test |
3,902 | 0 | Noisy_channel_model:noisy channel model noisy channel model framework used spell checkers question answering speech recognition machine translation model goal find intended word given word letters scrambled manner given alphabet formula_1 let formula_2 set finite strings formula_1 let dictionary formula_4 valid words subset formula_2 i.e. formula_6 noisy channel matrix formula_8 intended word formula_9 scrambled word actually received consider english alphabet formula_10 subset formula_6 makes dictionary valid english words several mistakes may occur typing including construct noisy channel matrix formula_12 must consider probability mistake given intended word formula_13 formula_8 formula_9 probabilities may gathered example considering levenshtein distance formula_16 formula_17 comparing draft essay one manually edited spelling goal noisy channel model find intended word given scrambled word received decision function formula_18 function given scrambled word returns intended word methods constructing decision function include maximum likelihood rule maximum posteriori rule minimum distance rule cases may better accept scrambled word intended word rather attempt find intended word dictionary example word schönfinkeling may dictionary might fact intended word | [
11538,
7164,
10557
] | None |
3,903 | 2 | Linpus_Linux:linpus linux linpus linux fedora-based operating system created taiwanese firm linpus technologies inc. linpus designed specifically fully support asian market full unicode support chinese japanese languages special version linpus lite written run devices lower-cost hardware netbooks icon tab-based simple mode designed new users conventional style pc mode wanting microsoft windows-like interface targeted handheld devices smaller screens supports resolutions low vga 640×480 acer aspire one norhtec gecko netbooks come linpus lite linux pre-installed also version acer revo 3610 3700 linpus linux pre-installed version normal desktop computers servers also available well multimedia version called linpus media center media center version offers upgrade pack purchase patent licenses mpeg-la dvd mp3 wmv codecs linpus system contains free open source operating system also acer-specific shareware users classify nagware asks register acer website purchase full version fact acer distribution contains software prevents system considered fully free/open operating system | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
5681,
56,
3129,
4153,
59,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
3162,
5721,
4192,
3685,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
6797,
9873,
11410,
... | Validation |
3,904 | 9 | Forth_(programming_language):forth programming language forth imperative stack-based computer programming language environment originally designed charles chuck moore language features include structured programming reflection ability examine modify program structure execution concatenative programming functions composed juxtaposition extensibility programmer create new commands although acronym language name sometimes spelled capital letters forth following customary usage earlier years procedural programming language without type checking forth features interactive execution commands making suitable shell systems lack formal operating system ability compile sequences commands later execution much forth existence standard technique compile threaded code modern implementations generate optimized machine code like language compilers forth used open firmware boot loader space applications philae spacecraft embedded systems involve interaction hardware bestselling 1986 computer game starflight electronic arts written custom forth free software gforth implementation actively maintained several commercially supported systems forth simple yet extensible language modularity extensibility permit writing significant programs forth environment combines compiler interactive shell user defines runs subroutines called words words tested redefined debugged source entered without recompiling restarting whole program syntactic elements including variables basic operators defined words forth environments vary resulting program stored ideally running program effect manually re-entering source programming environments recursive subroutines use stack control flow structure typically also stores local variables including subroutine parameters call value system c forth often local variables however call-by-value instead intermediate values kept another stack different one uses return addresses loop counters etc words operate directly topmost values first two stacks may therefore called parameter data stack often simply stack second function-call stack called linkage return stack abbreviated rstack special rstack manipulation functions provided kernel allow used temporary storage within word often used counted loops otherwise used pass parameters manipulate data words specified terms effect stack typically parameters placed top stack word executes execution parameters erased replaced return values arithmetic operators follows rule reverse polish notation see examples illustrating stack usage forth used successfully large complex projects applications developed competent disciplined professionals proven easily maintained evolving hardware platforms decades use forth niche astronomical space applications forth still used today many embedded systems small computerized devices portability efficient memory use short development time fast execution speed implemented efficiently modern risc processors processors use forth machine language produced uses forth include open firmware boot roms used apple ibm sun olpc xo-1 forth evolved charles h. moore personal programming system continuous development since 1968 forth first exposed programmers early 1970s starting elizabeth rather us national radio astronomy observatory work nrao charles moore elizabeth rather formed forth inc. 1973 refining porting forth systems dozens platforms next decade forth named 1968 file holding interpreter labeled fourth 4th next generation software—but ibm 1130 operating system restricted file names 5 characters moore saw forth successor compile-link-go third-generation programming languages software fourth generation hardware fourth-generation programming language term come used charles moore frequently moved job job career early pressure developing language ease porting different computer architectures forth system often used bring new hardware example forth first resident software new intel 8086 chip 1978 macforth first resident development system 128k macintosh 1984 forth inc. microforth developed intel 8080 motorola 6800 zilog z80 microprocessors starting 1976 microforth later used hobbyists generate forth systems architectures 6502 1978 wide dissemination finally led standardization language common practice codified de facto standards forth-79 forth-83 years 1979 1983 respectively standards unified ansi 1994 commonly referred ans forth forth became popular 1980s well suited small microcomputers time compact portable least one home computer british jupiter ace forth rom-resident operating system canon cat also used forth system programming rockwell produced single-chip microcomputers resident forth kernels r65f11 r65f12 complete family tree tu-wien insoft graforth version forth graphics extensions apple ii asyst forth expansion measuring controlling pcs 2018 source original 1130 version forth recovered updated run restored emulated 1130 system forth relies heavily explicit use data stack reverse polish notation rpn postfix notation commonly used calculators hewlett-packard rpn operator placed operands opposed common infix notation operator placed operands postfix notation makes language easier parse extend forth flexibility makes static bnf grammar inappropriate monolithic compiler extending compiler requires writing new word instead modifying grammar changing underlying implementation using rpn one could get result mathematical expression codice_1 way command line first puts numbers 25 10 implied stack br word codice_2 multiplies two numbers top stack replaces product number 50 placed stack br word codice_3 adds previous product codice_4 moves output new line formatting purposes could omitted but—in implementations—without output would occur line input would less readable example finally codice_5 command prints result user terminal everything completed successfully point text interpreter outputs prompt codice_6 moves new line get input without needing anything explicit even forth structural features stack-based example code defines new word word term used subroutine called codice_7 using following commands codice_8 duplicates number stack codice_9 places 6 top stack codice_10 compares top two numbers stack 6 codice_8ed input replaces true-or-false value codice_12 takes true-or-false value chooses execute commands immediately skip codice_13 codice_14 discards value stack codice_15 ends conditional text parentheses comment advising word expects number stack return possibly changed number codice_7 word equivalent function written c programming language using function written succinctly could run word follows first interpreter pushes number 1 8 onto stack calls codice_7 pops number pushes result codice_4 moves output new line readability finally call codice_5 pops result prints user terminal forth explicit grammar interpreter reads line input user input device parsed word using spaces delimiter systems recognise additional whitespace characters interpreter finds word looks word dictionary word found interpreter executes code associated word returns parse rest input stream word n't found word assumed number attempt made convert number push stack successful interpreter continues parsing input stream otherwise lookup number conversion fail interpreter prints word followed error message indicating word recognised flushes input stream waits new user input definition new word started word codice_20 colon ends word codice_21 semi-colon example compile word codice_22 makes name findable dictionary executed typing codice_23 console print codice_24 forth systems include assembler allows one specify words using processor facilities lowest level mostly assembler tucked away separate namespace wordlist relatively users want use forth assemblers may use reverse-polish syntax parameters instruction precede instruction designs vary widely specific forth implementation typical reverse-polish assembler prepares operands stack mnemonic copy whole instruction memory last step forth assembler nature macro assembler easy define alias registers according role forth system e.g datastackpointer register used stack pointer forth systems run host operating system microsoft windows linux version unix use host operating system file system source data files ansi forth standard describes words used i/o modern forth systems use normal text files source even embedded embedded system resident compiler gets source via serial line classic forth systems traditionally use neither operating system file system instead storing code files source code stored disk blocks written physical disk addresses word codice_25 employed translate number 1k-sized block disk space address buffer containing data managed automatically forth system block use become rare since mid-1990s hosted system blocks allocated normal file case multitasking commonly cooperative round-robin scheduling normally available although multitasking words support covered ansi forth standard word codice_26 used save current task execution context locate next task restore execution context task stacks private copies control variables scratch area swapping tasks simple efficient result forth multitaskers available even simple microcontrollers intel 8051 atmel avr ti msp430 non-standard facilities include mechanism issuing calls host os windowing systems many provide extensions employ scheduling provided operating system typically larger different set words stand-alone forth codice_26 word task creation suspension destruction modification priority full-featured forth system source code compile technique commonly called meta-compilation self-hosting forth programmers although term n't exactly match meta-compilation normally defined usual method redefine handful words place compiled bits memory compiler words use specially named versions fetch store redirected buffer area memory buffer area simulates accesses memory area beginning different address code buffer compilers define words access target computer memory host compiling computer memory fetch store operations redefined code space compiler assembler etc recompiled using new definitions fetch store effectively reuses code compiler interpreter forth system code compiled version stored buffer buffer memory written disk ways provided load temporarily memory testing new version appears work written previous version numerous variations compilers exist different environments embedded systems code may instead written another computer technique known cross compilation serial port even single ttl bit keeping word names non-executing parts dictionary original compiling computer minimum definitions forth compiler words fetch store byte word commands forth word executed often time-consuming part writing remote port constructing initial program implement fetch store execute many modern microprocessors integrated debugging features motorola cpu32 eliminate task basic data structure forth dictionary maps words executable code named data structures dictionary laid memory tree linked lists links proceeding latest recently defined word oldest sentinel value usually null pointer found context switch causes list search start different leaf linked list search continues branch merges main trunk leading eventually back sentinel root several dictionaries rare cases meta-compilation dictionary might isolated stand-alone effect resembles nesting namespaces overload keywords depending context defined word generally consists head body head consisting name field nf link field lf body consisting code field cf parameter field pf head body dictionary entry treated separately may contiguous example forth program recompiled new platform head may remain compiling computer body goes new platform environments embedded systems heads occupy memory unnecessarily however cross-compilers may put heads target target expected support interactive forth exact format dictionary entry prescribed implementations vary however certain components almost always present though exact size order may vary described structure dictionary entry might look way name field starts prefix giving length word name typically 32 bytes several bits flags character representation word name follows prefix depending particular implementation forth may one nul '\0 bytes alignment link field contains pointer previously defined word pointer may relative displacement absolute address points next oldest sibling code field pointer either address word execute code data parameter field beginning machine code processor execute directly colon defined words code field pointer points word save current forth instruction pointer ip return stack load ip new address continue execution words processor call/return instructions compiler monolithic program consists forth words visible system usable programmer allows programmer change compiler words special purposes compile time flag name field set words compile time behavior simple words execute code whether typed command line embedded code compiling compiler simply places code threaded pointer word classic examples compile-time words control structures codice_12 codice_29 almost forth control structures almost compiler implemented compile-time words apart rarely used control flow words found implementations conditional return forth control flow words executed compilation compile various combinations primitive words along branch addresses instance codice_12 codice_29 words match set codice_32 unconditional branch codice_33 pop value stack branch false counted loop control flow words work similarly set combinations primitive words work counter compilation data stack used support control structure balancing nesting back-patching branch addresses snippet would compiled following sequence inside definition numbers codice_32 represent relative jump addresses codice_35 primitive word pushing literal number onto data stack word codice_20 colon parses name parameter creates dictionary entry colon definition enters compilation state interpreter continues read space-delimited words user input device word found interpreter executes compilation semantics associated word instead interpretation semantics default compilation semantics word append interpretation semantics current definition word codice_21 semi-colon finishes current definition returns interpretation state example word whose compilation semantics differ default interpretation semantics codice_21 semi-colon control flow words several words undefined ans forth meaning must used inside definitions interactive command line interpreter state changed manually words codice_39 left-bracket codice_40 right-bracket enter interpretation state compilation state respectively words used word codice_41 calculate value compilation insert calculated value current colon definition codice_41 compilation semantics take object data stack append semantics current colon definition place object data stack ans forth current state interpreter read flag codice_43 contains value true compilation state false otherwise allows implementation so-called state-smart words behavior changes according current state interpreter word codice_44 marks recent colon definition immediate word effectively replacing compilation semantics interpretation semantics immediate words normally executed compilation compiled overridden programmer either state codice_21 example immediate word ans forth word codice_46 takes name parameter appends compilation semantics named word current definition even word marked immediate forth-83 defined separate words codice_47 codice_48 force compilation non-immediate immediate words respectively ans forth unnamed words defined word codice_49 compiles following words next codice_21 semi-colon leaves execution token data stack execution token provides opaque handle compiled semantics similar function pointers c programming language execution tokens stored variables word codice_51 takes execution token data stack performs associated semantics word codice_52 compile-comma takes execution token data stack appends associated semantics current definition word codice_53 tick takes name word parameter returns execution token associated word data stack interpretation state codice_54 equivalent codice_55 words codice_20 colon codice_46 codice_53 tick examples parsing words take arguments user input device instead data stack another example word codice_59 paren reads ignores following words including next right parenthesis used place comments colon definition similarly word codice_60 backslash used comments continue end current line parsed correctly codice_59 paren codice_60 backslash must separated whitespace following comment text forth systems body code definition consists either machine language form threaded code original forth follows informal fig standard forth interest group til threaded interpretive language also called indirect-threaded code direct-threaded subroutine threaded forths also become popular modern times fastest modern forths use subroutine threading insert simple words macros perform peephole optimization optimizing strategies make code smaller faster word variable data object cf points runtime code associated defining word created defining word characteristic defining behavior creating dictionary entry plus possibly allocating initializing data space also specifies behavior instance class words constructed defining word examples include forth also provides facility programmer define new application-specific defining words specifying custom defining behavior instance behavior examples include circular buffers named bits i/o port automatically indexed arrays data objects defined similar words global scope function provided local variables languages provided data stack forth although forth also real local variables forth programming style uses named data objects compared languages typically data objects used contain data used number words tasks multitasked implementation forth enforce consistency data type usage programmer responsibility use appropriate operators fetch store values perform operations data words written forth compiled executable form classical indirect threaded implementations compile lists addresses words executed turn many modern systems generate actual machine code including calls external words code others expanded place systems optimizing compilers generally speaking forth program saved memory image compiled program single command e.g. run executed compiled version loaded development programmer uses interpreter repl mode execute test little piece developed forth programmers therefore advocate loose top-down design bottom-up development continuous testing integration top-down design usually separation program vocabularies used high-level sets tools write final program well-designed forth program reads like natural language implements single solution also sets tools attack related problems one possible implementation word codice_4 carriage return causes following output displayed new line parsing word codice_69 dot-quote reads double-quote delimited string appends code current definition parsed string displayed execution space character separating word codice_69 string codice_71 included part string needed parser recognizes codice_69 forth word standard forth system also interpreter output obtained typing following code fragment forth console codice_73 dot-paren immediate word parses parenthesis-delimited string displays word codice_69 space character separating codice_73 codice_71 part string word codice_4 comes text print convention forth interpreter start output new line also convention interpreter waits input end previous line codice_78 prompt implied flush-buffer action forth codice_4 sometimes programming languages definition word codice_80 executed emits single character codice_81 definition written use ascii value codice_81 character 81 directly text parentheses comment ignored compiler word codice_83 takes value data stack displays corresponding character following redefinition codice_80 uses words codice_39 left-bracket codice_40 right-bracket codice_87 codice_41 temporarily switch interpreter state calculate ascii value codice_81 character return compilation state append calculated value current colon definition parsing word codice_87 takes space-delimited word parameter places value first character data stack word codice_91 immediate version codice_87 using codice_91 example definition codice_80 could rewritten like definition used codice_60 backslash describing comment codice_87 codice_91 predefined ans forth using codice_44 codice_46 codice_91 could defined like 1987 ron rivest developed rc4 cipher-system rsa data security inc code extremely simple written programmers description array 256 bytes different every time array used changes swapping two bytes swaps controlled counters j initially 0 get new add 1 get new j add array byte new exchange array bytes j code array byte sum array bytes j xored byte plaintext encrypt ciphertext decrypt array initialized first setting 0 255 step using j getting new j adding array byte key byte swapping array bytes j finally j set 0 additions modulo 256 following standard forth version uses core core extension words one many ways test code forth virtual machine simple implement standard reference implementation numerous implementations language addition supporting standard varieties desktop computer systems posix microsoft windows mac os x many forth systems also target variety embedded systems listed prominent systems conform 1994 ans forth standard | [
9345,
5634,
5510,
5384,
1673,
1804,
6797,
8973,
1552,
6160,
8720,
5395,
1685,
3733,
3613,
8479,
1184,
1952,
9762,
8868,
1702,
2345,
682,
1963,
4779,
9643,
7983,
5040,
10927,
8628,
6837,
823,
58,
4410,
2620,
1087,
7616,
9665,
1474,
963,
... | None |
3,905 | 8 | PostRank:postrank postrank social media analytics service used proprietary ranking algorithm measure social engagement published content based blog comments links internet bookmarks clicks page views activities social network services twitter digg facebook myspace june 2011 postrank acquired google company formerly called aiderss inc october 2008 aiderss re-launched website postrank.com focus company work core postrank technology july 2009 company officially changed name postrank inc company developed offered multiple services acquisition postrank functionality integrated google analytics | [
6576,
5524
] | Test |
3,906 | 1 | Elasticity_(data_store):elasticity data store elasticity data store relates flexibility data model clustering capabilities greater number data model changes tolerated easily clustering managed elastic data store considered clustering elasticity ease adding removing nodes distributed data store usually difficult delicate task done expert relational database system nosql data stores like apache cassandra easy solution node added/removed changes properties adding specifying least one seed relational databases often inelastic predefined data model adapted redesign nosql data stores however fixed schema row different number even different type columns concerning data store modifications schema problem makes kind data stores elastic concerning data model drawback programmer take account data model may change time | [
5034,
9286,
5047
] | Test |
3,907 | 8 | Sensor_Observation_Service:sensor observation service sensor observation service sos web service query real-time sensor data sensor data time series part sensor web offered sensor data comprises descriptions sensors encoded sensor model language sensorml measured values observations measurements encoding format web service well file formats open standards specifications name defined open geospatial consortium ogc sos supports transactional profile sos-t new sensors registered service interface measuring values inserted sos implementation used data in-situ well remote sensing sensors furthermore sensors either mobile stationary since 2007 sos official ogc standard advantage sos sensor data kind available standardized format using standardized operations thus web-based access sensor data simplified also allows easy integration existing spatial data infrastructures geographic information systems 2016 ogc approved sensorthings api standard specification new restful json-based standard provide functions similar sos sensorthings api sos based ogc/iso 19156:2011 two specifications demonstrated ogc iot pilot interoperate sos three so-called core operations must provided implementation getcapabilities operation allows query service description service interface available sensor data using sos getobservation function probably important utilized retrieve data specific sensors describesensor function returns detailed information sensor sensor system producing processes ogc sos well-defined terminology better understanding important terms sos standard ogc ultimately defines service interface implementation currently several open source implementations service also proprietary implementations exist | [
5700,
8582,
8554,
5677,
4058,
2045,
479
] | Test |
3,908 | 4 | POPFile:popfile popfile free open-source cross-platform mail filter originally written perl john graham-cumming maintained team volunteers uses naive bayes classifier filter mail allows filter learn classify mail according user preferences typically used filter spam mail also used sort mail user defined buckets categories example user may define bucket work email sorted program works several different modes popular mode sets proxy email client pop3 server mail downloaded via pop3 filter identifies classifies mail makes user defined modification subject line appending name appropriate bucket user sets rules mail client sort mail based subject line modification html based interface used instruct popfile allowing users correct errors classifications thus train system sensitive user specific requirements alternative subject-line modification supplement system also configured use custom mail headers instead another possible mode popfile work imap client monitors imap server incoming mail also messages moved user incoming emails categorized immediately moved folder corresponding categorization train popfile mode user needs move message correct folder i.e folder popfile moved message | [
8582,
6094,
7983,
4272,
4725
] | Test |
3,909 | 6 | Comparison_of_distributed_file_systems:comparison distributed file systems computing distributed file system dfs network file system file system allows access files multiple hosts sharing via computer network makes possible multiple users multiple machines share files storage resources distributed file systems differ performance mutability content handling concurrent writes handling permanent temporary loss nodes storage policy storing content researchers made functional experimental analysis several distributed file systems including hdfs ceph gluster lustre old 1.6.x version moosefs although document 4 years old lot information may outdated e.g moosefs time writing stable 2.0 beta 3.0 version ha metadata server since 2.0 mentioned document cloud based remote distributed storage major vendors different apis different consistency models | [
5120,
2564,
6669,
3598,
10257,
9236,
6677,
5142,
8214,
3611,
9249,
9762,
5158,
5677,
7225,
11323,
9277,
8772,
1109,
1118,
4708,
9836,
7789,
9333,
1142,
6263,
9335,
9343,
7818,
654,
2193,
2194,
6291,
2197,
2199,
11419,
6309,
1190,
5286,
10... | Test |
3,910 | 9 | Lucid_(programming_language):lucid programming language lucid dataflow programming language designed experiment non-von neumann programming models designed bill wadge ed ashcroft described 1985 book lucid dataflow programming language plucid first interpreter lucid lucid uses demand-driven model data computation statement understood equation defining network processors communication lines data flows variable infinite stream values every function filter transformer iteration simulated 'current values 'fby read 'followed operator allowing composition streams lucid based algebra histories history infinite sequence data items operationally history thought record changing values variable history operations first next understood ways suggested names lucid originally conceived kind disciplined mathematically pure single-assignment language verification would much simplified however dataflow interpretation important influence direction lucid evolved lucid dataflow languages expression contains variable yet bound waits variable bound proceeding expression like codice_1 wait x bound returning output expression important consequence explicit logic updating related values avoided results substantial code reduction compared mainstream languages variable lucid stream values expression codice_2 defines stream using operator 'fby mnemonic followed fby defines comes previous expression instance stream produces 1,2,3 ... values stream addressed operators assuming x variable used codice_3 fetches first value stream x codice_4 current value stream codice_5 fetches next value stream codice_6 operator thing 'as soon condition given becomes true codice_7 upon operator repeats old value stream x updates new values stream p makes codice_8 value available serves slow stream x i.e codice_9 stream x new values appearing upon truth p. computation carried defining filters transformation functions act time-varying streams data fac fib total running_avg prime qsort eof first else follow qsort b0 qsort b1 fi -- -- -- -- whenever -- -- qsort -- -- -- -- sqroot avg square h | [
4417,
1826,
9345,
6950,
8262,
11625,
655,
1333,
7769
] | Test |
3,911 | 3 | List_of_Linux-supported_computer_architectures:list linux-supported computer architectures basic components linux family operating systems based linux kernel gnu c library busybox forks thereof like μclinux uclibc programmed certain level abstraction mind also distinct code paths assembly language c source code support certain hardware therefore source code successfully compiled onor cross-compiled fora great number computer architectures furthermore required free open-source software also developed interface linux hardware linux executed example compilers available e.g gnu compiler collection gcc llvm/clang cross-compilation number complete toolchains available like gnu toolchain openwrt buildroot openembedded yocto project targeted embedded use cases portability section linux kernel article contains information references technical details note components like display server programs like blender present absent fundamentally software ported i.e specifically adapted kind hardware supposed executed level abstraction kept mind programming software first place dictates necessary effort relevant term porting target computer architecture comprises instruction set microarchitecture processor least cpu target also comprises system design entire system supercomputer desktop computer soc e.g case unique bus used former times memory controller part chipset motherboard cpu-die although support specific instruction set task compiler software must written certain level abstraction mind make portability possible code written assembly language specific instruction set support specific microarchitecture includes optimizations cpu cache hierarchy tlb etc additional processors particularly freescale 68000 coldfire supported mmu-less μclinux variant | [
1537,
9731,
516,
6151,
4616,
3082,
11282,
5139,
4124,
3101,
10780,
10785,
3618,
6180,
8237,
8242,
9266,
4664,
4161,
7234,
10817,
8772,
6213,
3142,
11333,
2635,
8268,
589,
10316,
593,
597,
6244,
5222,
10856,
10862,
4207,
9851,
5244,
4734,
... | Validation |
3,912 | 8 | Usage_data:usage data usage data effective way evaluating true relevancy value website example users arrive web site go back immediately high bounce rate chances ’ relevant query first place however user repeatedly visits web site spends long time site high likelihood extremely relevant comes search engines relevant valuable sites get promoted irrelevant sites get demoted search engines want results highly relevant web users make sure web users keep returning search engine future searches best way establish relevance users know use web sites cookies used search engines maintain history user ’ search activity | [
7965,
7047
] | Test |
3,913 | 4 | Tape_management_system:tape management system tape management system tms computer software manages usage retention computer backup tapes may done stand-alone function part broader backup software package modern tape management system tms usually used conjunction backup applications generally used manage magnetic tape media contains backup information electronically stored information tape management systems used organizations locate track rotate media according organizations internal policies well government regulations stand-alone tape management systems predominant mainframe platforms tape used backup base load storage medium mainframe systems ibm z/os provide basic support tape inventory control via os catalog cataloging files optional usually required additional software package following operations usually achieved using operating system hooks intercept file open close operations | [
9025,
3366,
1801,
1358,
7983,
8687,
2168
] | None |
3,914 | 4 | Time-of-check_to_time-of-use:time-of-check time-of-use software development time-of-check time-of-use toctou tocttou toc/tou class software bugs caused race condition involving checking state part system security credential use results check simple example follows consider web application allows user edit pages also allows administrators lock pages prevent editing user requests edit page getting form used alter content user submits form administrator locks page prevent editing however since editing already begun user submits form edits already made accepted user began editing appropriate authorization checked user indeed allowed edit however authorization used later time edits longer allowed toctou race conditions common unix operations file system occur contexts including local sockets improper use database transactions early 1990s mail utility bsd 4.3 unix exploitable race condition temporary files used codice_1 function early versions openssh exploitable race condition unix domain sockets remain problem modern systems 2019 toctou race condition docker allows root access filesystem host platform unix following c code used codice_2 program toctou bug access intended check whether real user executed codice_2 program would normally allowed write file i.e. codice_4 checks real userid rather effective userid race condition vulnerable attack example attacker exploit race condition codice_5 codice_6 trick codice_2 victim overwriting entry system password database toctou races used privilege escalation get administrative access machine although sequence events requires precise timing possible attacker arrange conditions without much difficulty implication applications assume state managed operating system case file system namespace change system calls exploiting toctou race condition requires precise timing ensure attacker operations interleave properly victim example attacker must execute codice_8 system call precisely codice_5 codice_6 general attack attacker must scheduled execution operation victim also known single-stepping victim case bsd 4.3 mail utility mktemp attacker simply keep launching mail utility one process keep guessing temporary file names keep making symlinks another process attack usually succeed less one minute techniques single-stepping victim program include file system mazes algorithmic complexity attacks cases attacker manipulates os state control scheduling victim file system mazes force victim read directory entry os cache os puts victim sleep reading directory disk algorithmic complexity attacks force victim spend entire scheduling quantum inside single system call traversing kernel hash table cached file names attacker creates large number files names hash value file victim look despite conceptual simplicity toctou race conditions difficult avoid eliminate one general technique use exception handling instead checking philosophy eafp – easier ask forgiveness permission rather lbyl – look leap – case check failure assumptions hold detected use time exception context file system toctou race conditions fundamental challenge ensuring file system changed two system calls 2004 impossibility result published showing portable deterministic technique avoiding toctou race conditions since impossibility result libraries tracking file descriptors ensuring correctness proposed researchers alternative solution proposed research community unix systems adopt transactions file system os kernel transactions provide concurrency control abstraction os used prevent toctou races production unix kernel yet adopted transactions proof-of-concept research prototypes developed linux including valor file system txos kernel microsoft windows added transactions ntfs file system microsoft discourages use indicated may removed future version windows file locking common technique preventing race conditions single file extend file system namespace metadata locking work well networked filesystems prevent toctou race conditions setuid binaries possible solution use codice_11 system call change effective user perform codice_12 differences codice_13 operating systems problematic | [
9762,
6813,
10631,
6184,
6797,
2193,
2322,
3473,
5492,
7446,
5658,
2045,
2910,
8671
] | Validation |
3,915 | 3 | Game_Over_II:game ii game ii known phantis spain action game developed published dinamic software 1987 amstrad cpc atari st commodore 64 ms-dos msx zx spectrum game ii mix scrolling shoot 'em game similar r-type platform game similar turrican four phases six levels versions game split two parts due size restrictions story begins arkon hero rebellion managed defeat evil empress gremla free galaxy oppressive rule original spanish version phantis player controls major locke tries rescue boyfriend arkon captured forces loyal vengeful unnamed heir gremla featured cover art imprisoned planet phantis english-language version titled game ii arkon job rescue commander serena game versions although originally conceived independent game title phantis became sequel game atari st version never published spain exists game ii title game promotion included appearance model dressed queen gremla trade convention pc show '88 game given generally mediocre reviews received scores 69 amstrad action 55 commodore user 60-63 games machine 62 sinclair user amstrad computer user gave 17/20 | [
680,
9166,
9006,
9303
] | Train |
3,916 | 2 | Spooling:spooling computing spooling specialized form multi-programming purpose copying data different devices contemporary systems usually used mediating computer application slow peripheral printer spooling allows programs hand work done peripheral proceed tasks begin input transcribed dedicated program spooler maintains orderly sequence jobs peripheral feeds data rate conversely slow input peripherals card reader spooler maintain sequence computational jobs waiting data starting job relevant input available see batch processing spool refers sequence jobs storage area held many cases spooler able drive devices full rated speed minimal impact processing spooling combination buffering queueing nowadays common use spooling printing documents formatted printing stored queue speed computer retrieved printed speed printer multiple processes write documents spool without waiting perform tasks spooler process operates printer example large organization prepares payroll cheques computation takes minutes even seconds printing process might take hours payroll program printed cheques directly would unable proceed computations cheques printed similarly spooling added pc operating systems word processors unable anything else including interact user printing spooler print management software often includes variety related features allowing priorities assigned print jobs notifying users documents printed distributing print jobs among several printers selecting appropriate paper document etc print server applies spooling techniques allow many computers share printer group printers print spoolers configured add banner page also called burst page job sheet printer separator front document separate documents identify document e.g title often also state printed e.g username job name banner pages valuable office environments many people share small number printers depending configuration banner pages might generated client computer centralized print server printer printers using fanfold continuous forms leading banner page would often printed twice one copy would always face-up jobs separated page might include lines printed fold would visible along edge stack printed output allowing operator easily separate jobs systems would also print banner page end job assuring users collected printout spooling also used mediate access punched card readers punches magnetic tape drives slow sequential i/o devices allows application run speed cpu operating peripheral devices full rates speed batch processing system uses spooling maintain queue ready-to-run tasks started soon system resources process store forward messaging systems uucp used spool refer inbound outbound message queues terminology still found documentation email usenet software even though messages often delivered immediately nowadays peripheral devices always much slower core processing units especially severe problem early mainframes example job read punched cards generated printed output directly forced run speed slow mechanical devices first spooling programs ibm spool system 7070-io-076 copied data punched cards magnetic tape tape back punched cards printers hard disks even faster support random access started replace use magnetic tape middle 1960s 1970s eliminated use tape unit record equipment ibm mainframes early 1960s slow common use small offline machine 1401 instead spooling term spool probably originates simultaneous peripheral operations on-line spool software derivation uncertain simultaneous peripheral operations on-line may backronym another explanation refers spools reels magnetic tape | [
4481,
9986,
3974,
9351,
1676,
11153,
3350,
6550,
4002,
8360,
2345,
4011,
1581,
2221,
7983,
1073,
4535,
4151,
8631,
10040,
1219,
8137,
7626,
340,
9814,
868,
11236,
1386,
10730,
8301,
2813
] | Test |
3,917 | 3 | Samantha_Fox_Strip_Poker:samantha fox strip poker samantha fox strip poker 1986 erotic video game developed software communications published martech games published commodore 64 amstrad cpc bbc micro msx zx spectrum game one first erotic video games include real human part theme erotic games players complete difficult tasks rewarded nudity video game programmed wolfgang smith graphics edited malcolm smith author music rob hubbard credited name john york music includes cover entertainer scott joplin stripper david rose players plays 5-card 7-card stud poker british model singer samantha fox beating results taking clothes topless zzap felt music well-suited style game commodore format magazine thought idea anybody using game way experience titillating content depressing due require effort player uvejuegos thought game prime example strange 1980s spiegel placed game within sub-genre early pixelated digi-ladies dubious beauty along artworx strip poker 1984 | [
9006
] | Test |
3,918 | 2 | Setuptools:setuptools setuptools package development process library designed facilitate packaging python projects enhancing python standard library distutils distribution utilities includes 2013 distribute fork setuptools merged back setuptools 0.7 python wheels replaced eggs python eggs way bundling additional information python project allows project dependencies checked satisfied runtime well allowing projects provide plugins projects python pip replaced easyinstall easyinstall package manager python provides standard format distributing python programs libraries based python eggs format easyinstall module bundled setuptools analogous rubygems ruby easyinstall fully fledged package manager list local packages update pip python package manager pypm python applications designed fulfill similar role easyinstall distribute fork created specifically due lack progress easyinstall development default easyinstall looks python package index pypi desired packages uses metadata download install package dependencies | [
8068,
11525,
3462,
8582,
10760,
2955,
7435,
6797,
7947,
9487,
788,
1813,
5397,
8213,
6680,
10900,
10394,
8476,
9245,
5155,
5670,
4775,
7722,
6828,
5677,
6446,
7983,
1842,
823,
2872,
6583,
5819,
10172,
190,
9151,
10817,
8644,
9671,
5578,
5... | Test |
3,919 | 3 | UltraSPARC_II:ultrasparc ii ultrasparc ii code-named blackbird microprocessor implementation sparc v9 instruction set architecture isa developed sun microsystems marc tremblay chief architect introduced 1997 development ultrasparc operating higher clock frequencies 250 mhz eventually reaching 650 mhz die contained 5.4 million transistors area 149 mm² fabricated texas instruments 0.35 µm process dissipated 25 w 205 mhz used 2.5 v power supply l2 cache capacity 1 4 mb 1999 ultrasparc ii ported 0.25 µm process version code-named sapphire-black operated 360 480 mhz possessed die area 126 mm² dissipated 21 w 400 mhz power supply voltage reduced 1.9 v. supported l2 cache capacity increased 1 8 mb ultrasparc ii basis four derivatives ultrasparc iie hummingbird embedded version introduced 2000 operated 400 500 mhz fabricated 0.18 µm process aluminium interconnects dissipated maximum 13 w 500 mhz used 1.5 1.7 v power supply 256 kb l2 cache ultrasparc iii sabre featuring on-chip pci controller low-cost version introduced 1997 operated 270 360 mhz fabricated 0.35 µm process possessed die size 156 mm² dissipated 21 w used 1.9 v power supply 256 kb 2 mb l2 cache 1998 version code-named sapphire-red fabricated 0.25 µm process enabling microprocessor operate 333 480 mhz dissipated 21 w 440 mhz used 1.9 v power supply ultrasparc iie+ iii introduced 2002 code-named phantom operated 550 650 mhz fabricated 0.18 µm process copper interconnect dissipated 17.6 w used 1.7 v power supply 512 kb l2 cache gemini first attempt sun produce multithreaded microprocessor taped cancelled introduced announcement ultrasparc t1 niagara microprocessor early 2004 consisted two ultrasparc ii cores on-die l2 cache single chip dac 2004 abstracts described dual-core ultrasparc ii processor session 40 dual-core ultrasparc 2003 based upon ultrasparc ii microarchitecture featured ddr-1 memory controller jbus interface parity protected l1 cache ecc protected dual 512kb on-chip level 2 cache 1.2 ghz clock frequency 80 million transistors 206mm^2 die size dissipated 23 watts power | [
9090,
9731,
1801,
4235,
1809,
4241,
1818,
8863,
7072,
1707,
2731,
10926,
3247,
6322,
2871,
4664,
4285,
6464,
7104,
9665,
8007,
2895,
597,
10837,
2269,
9955,
7270,
11626,
5358,
1776,
5233,
11636,
1399,
1788
] | None |
3,920 | 9 | Java_servlet:java servlet java servlet java software component extends capabilities server although servlets respond many types requests commonly implement web containers hosting web applications web servers thus qualify server-side servlet web api web servlets java counterpart dynamic web content technologies php asp.net java servlet processes stores java class java ee conforms java servlet api standard implementing java classes respond requests servlets could principle communicate client–server protocol often used http thus servlet often used shorthand http servlet thus software developer may use servlet add dynamic content web server using java platform generated content commonly html may data xml commonly json servlets maintain state session variables across many server transactions using http cookies url mapping java servlet api extent superseded two standard java technologies web services deploy run servlet web container must used web container also known servlet container essentially component web server interacts servlets web container responsible managing lifecycle servlets mapping url particular servlet ensuring url requester correct access rights servlet api contained java package hierarchy defines expected interactions web container servlet object receives request generates response based request basic servlet package defines java objects represent servlet requests responses well objects reflect servlet configuration parameters execution environment package defines http-specific subclasses generic servlet elements including session management objects track multiple requests responses web server client servlets may packaged war file web application servlets generated automatically javaserver pages jsp javaserver pages compiler difference servlets jsp servlets typically embed html inside java code jsps embed java code html direct usage servlets generate html shown example become rare higher level mvc web framework java ee jsf still explicitly uses servlet technology low level request/response handling via somewhat older usage use servlets conjunction jsps pattern called model 2 flavor model–view–controller current version servlet 4.0 java servlets api first publicly announced inaugural javaone conference may 1996 two months announcements conference first public implementation made available javasoft website first alpha java web server jws known codename jeeves would eventually shipped product june 5 1997 blog java.net sun veteran glassfish lead jim driscoll details history servlet technology james gosling first thought servlets early days java concept become product december 1996 sun shipped jws java platform enterprise edition made specification servlet1 specification created pavni diwanji worked sun microsystems version 1.0 finalized june 1997 starting version 2.2 specification developed java community process three methods central life cycle servlet codice_1 codice_2 codice_3 implemented every servlet invoked specific times server following typical user scenario methods following example servlet prints many times codice_2 method called note codice_16 subclass codice_17 implementation codice_18 interface codice_2 method codice_16 class dispatches requests methods codice_21 codice_22 codice_23 codice_24 according http request example codice_2 overridden distinguish http request method serves import java.io.ioexception import javax.servlet.servletconfig import javax.servlet.servletexception import javax.servlet.http.httpservlet import javax.servlet.http.httpservletrequest import javax.servlet.http.httpservletresponse public class servletlifecycleexample extends httpservlet specification servlet technology implemented many products see list implementations web container page | [
7176,
9229,
1556,
7212,
5677,
10284,
4658,
2106,
572,
64,
7750,
1095,
1128,
7784,
9834,
9841,
8825,
3705,
124,
3712,
2222,
4797,
6334,
11466,
6860,
3278,
5849,
6366,
225,
1250,
5872,
10486,
9988,
4358,
1802,
10506,
3341,
7965,
10526,
1002... | None |
3,921 | 2 | Media_type:media type media type formerly known mime type two-part identifier file formats format contents transmitted internet internet assigned numbers authority iana official authority standardization publication classifications media types originally defined request comments 2045 november 1996 part mime multipurpose internet mail extensions specification denoting type email message content attachments hence original name mime type media types also used internet protocols http document file formats html similar purpose media type consists type subtype structured tree media type optionally define suffix parameters currently registered types codice_2 codice_3 codice_4 codice_5 codice_6 codice_7 codice_8 codice_9 codice_10 codice_11 unofficial top-level name common use called chemical example html file might designated codice_12 example codice_10 type codice_14 subtype codice_15 optional parameter indicating character encoding subtype typically consists media format may must also contain content tree prefix producer product suffix according different rules registration trees types subtypes parameter names case-insensitive parameter values usually case-sensitive may interpreted case-insensitive fashion depending intended use media types registered using iana registration procedures efficiency flexibility media type registration process different structures subtypes registered registration trees distinguished use tree prefixes currently following trees created standard prefix vendor codice_44 prefix personal vanity codice_45 prefix unregistered codice_46 prefix registration trees first defined november 1996 obsoleted rfc 2048 currently rfc 6838 new registration trees may created ietf standards action external registration management well-known permanent organizations e.g scientific societies standards tree use tree prefix examples codice_16 codice_40 registrations standards tree must either associated ietf specifications approved directly iesg registered iana recognized standards-related organization vendor tree includes media types associated publicly available products uses codice_44 tree prefix examples codice_27 codice_31 terms vendor producer considered equivalent context industry consortia well non-commercial entities register media types vendor tree registration vendor tree may created anyone needs interchange files associated software product set products however registration belongs vendor organization producing software employs type registered vendor organization time elect assert ownership registration done third party personal vanity tree includes media types associated non publicly available products experimental media types uses codice_45 tree prefix examples codice_56 codice_57 unregistered tree includes media types intended exclusively use private environments active agreement parties exchanging uses codice_46 tree prefix examples codice_60 codice_61 media types tree registered according rfc 6838 published january 2013 use types unregistered tree strongly discouraged addition subtypes prefixed codice_62 codice_63 longer considered members tree according obsoleted rfc 2048 published november 1996 —it rarely ever necessary use unregistered types use codice_46 codice_62 codice_63 prefixes discouraged obsoleted rfc 1590 published september 1993 stated use codice_62 codice_63 prefix may used unregistered subtypes media types widely deployed subtype prefixed codice_62 codice_63 without registered possible re-registered proper prefixed subtype possible media type approval media types reviewer iesg registered standards tree unprefixed subtype suffix augmentation media type definition additionally specify underlying structure media type media types make use named structured syntax use appropriate iana registered codice_71 structured syntax registered unregistered suffixes used since january 2013 structured syntax suffix registration procedures defined rfc 6838 examples currently registered suffixes codice_72 codice_73 codice_74 codice_75 codice_76 codice_77 codice_78 codice_79 rfc 7049 codice_80 codice_72 suffix defined since january 2001 rfc 3023 formal registration codice_72 suffix suffixes defined since january 2013 rfc 6839 mailcap derived phrase mail capability type meta file used configure mime-aware applications mail clients web browsers render files different mime-types mailcap format defined rfc 1524 user agent configuration mechanism multimedia mail format information defined internet standard supported unix systems lines comments starting character mime-type followed handle mime type first part called content-type second part called view-command example codice_83 says file encoded mime type codice_84 run xmpeg program file name parameter associated file mime.types file associates filename extensions mime type mime type properly set unnecessary mime types may incorrectly set set generic type codice_85 codice_86 allows one fall back extension cases similarly since many file systems store mime type information instead rely filename extension mime.types file frequently used web servers determine mime type viewing file two work together follows codice_86 associates extension mime type codice_88 associates mime type program unix-type systems mime.types file usually located codice_89 and/or codice_90 format simply line space-delimited list mime type followed zero extensions example html type associated extensions codice_91 codice_92 following line mime.types file dates netscape used different format used key-value pairs comma-separated list extensions together standard header consisting specific comment identifies file mime.types file follows | [
11137,
10885,
3462,
8070,
6408,
11277,
9874,
5907,
3222,
8854,
7455,
5546,
10413,
8627,
8628,
3126,
9790,
10046,
1347,
7108,
11076,
73,
3659,
4045,
4174,
10317,
3280,
4561,
722,
8923,
479,
6880,
10857,
8426,
8940,
237,
10097,
2296,
9726
] | None |
3,922 | 2 | Windows_Desktop_Gadgets:windows desktop gadgets windows desktop gadgets called windows sidebar windows vista discontinued widget engine microsoft gadgets introduced windows vista features sidebar anchored side desktop widgets perform various tasks displaying time date windows vista widgets restricted sidebar windows 7 freely moved anywhere desktop windows desktop gadgets discontinued windows 8 windows 8 live tiles perform similar function visible start menu visible run restrictive environment making less risky also less useful purposes like system monitoring windows sidebar originated microsoft research project called sideshow confused windows sideshow developed summer 2000 used internally microsoft included clock traffic reports im integration windows sidebar appeared build 3683 windows vista circa september 2002 originally intended replace notification area quick launch toolbar windows plans scrapped development reset mid-2004 windows sidebar rebuilt began appear windows vista builds second half 2005 reviewers macintosh enthusiasts pointed sidebar similarities form function konfabulator yahoo widget engine appeared several years previously dashboard widget engine first included apple inc. mac os x v10.4 released months earlier windows 7 windows sidebar renamed windows desktop gadgets sidebar included windows 7 windows desktop gadgets included beta releases windows 8 make final release instead 10 july 2012 intervening time last beta windows 8 final release microsoft issued security advisory disable sidebar desktop gadgets windows vista 7 security vulnerability could allow remote code execution windows desktop gadgets feature windows vista windows 7 excluding windows server family operating system hosts mini-applications gadgets combination scripts html code use cases include displaying system time downloading displaying rss feeds controlling software windows media player windows vista gadgets run docked sidebar windows 7 float anywhere desktop also possible run multiple instances gadget simultaneously windows vista 7 sidebar also works windows xp windows vista ships eleven gadgets calendar clock contacts cpu meter currency conversion feed headlines notes picture puzzle slide show stocks weather several gadgets available vista beta app launcher feed viewer number puzzle recycle bin egg timer never made final release windows vista windows 7 adds media center gadget removes contacts notes stocks gadgets originally microsoft provided link web site called windows live gallery additional sidebar gadgets created third-party developers could downloaded site officially retired october 1 2011 | [
11270,
5643,
4624,
537,
540,
3102,
9762,
8227,
8740,
1577,
10281,
5682,
1077,
2101,
10812,
3648,
10310,
1098,
7754,
10828,
4173,
4174,
9808,
4178,
10839,
603,
2140,
9819,
8798,
3170,
622,
9839,
4210,
7796,
1656,
6265,
7290,
4731,
10879,
8... | Test |
3,923 | 3 | Forward_compatibility:forward compatibility forward compatibility upward compatibility design characteristic allows system accept input intended later version concept applied entire systems electrical interfaces telecommunication signals data communication protocols file formats computer programming languages standard supports forward compatibility product complies earlier versions gracefully process input designed later versions standard ignoring new parts understand objective forward compatible technology old devices recognise data generated new devices forward compatibility older system usually means backward compatibility new system i.e ability process data old system new system usually full compatibility older one able process generate data format older system forward compatibility extensibility forward compatible design process least data future version extensible design makes upgrading easy example design ideas found web browsers point time current browser forward compatible gracefully accepts newer version html whereas easily browser code upgraded process newer html determines extensible introduction fm stereo transmission color television allowed forward compatibility since monophonic fm radio receivers black-and-white tv sets still could receive signal new transmitter also allowed backward compatibility since new receivers could receive monophonic black-and-white signals generated old transmitters html designed treat tags way inert unstyled inline elements unless appearance behavior overridden either browser default settings scripts styles included page makes new features degrade gracefully older browsers one case work intended script style blocks whose content meant interpreted browser instead part page cases dealt enclosing content within comment blocks products designed forward compatible referred nuc upwardly compatible cases might intentional designers form vendor lock-in software regression example cubicle producer considers changing cubicle design one designer promotes changing footprint 4 foot square 1.2 meter square immediately sales manager calls nuc problem understood footprint changes existing customers considering buying producer fit different sized unit office designed 4 foot square cubicle planned obsolescence type upward compatibility rather adopting policy backwards compatibility companies adopt commercial policy backwards incompatibility newer apps require newer devices | [
6020,
139,
2193,
799,
10916,
7205,
8110,
6718,
7872,
8262,
9677,
5454,
6102,
5597,
1501,
736,
8161,
7269,
8937,
246,
2936,
6781
] | Validation |
3,924 | 4 | Covert_channel:covert channel computer security covert channel type attack creates capability transfer information objects processes supposed allowed communicate computer security policy term originated 1973 lampson defined channels intended information transfer service program effect system load distinguish legitimate channels subjected access controls compusec covert channel called hidden access control mechanisms secure operating systems since use legitimate data transfer mechanisms computer system typically read write therefore detected controlled security mechanisms underlie secure operating systems covert channels exceedingly hard install real systems often detected monitoring system performance addition suffer low signal-to-noise ratio low data rates typically order bits per second also removed manually high degree assurance secure systems well established covert channel analysis strategies covert channels distinct often confused legitimate channel exploitations attack low-assurance pseudo-secure systems using schemes steganography even less sophisticated schemes disguise prohibited objects inside legitimate information objects legitimate channel misuse steganography specifically form covert channel covert channels tunnel secure operating systems require special measures control covert channel analysis proven way control covert channels contrast secure operating systems easily prevent misuse legitimate channels distinguishing important analysis legitimate channels hidden objects often misrepresented successful countermeasure legitimate channel misuse amounts analysis large amounts software shown early 1972 impractical without informed misled believe analysis manage risk legitimate channels trusted computer security evaluation criteria tcsec set criteria deprecated established national computer security center agency managed united states national security agency lampson definition covert channel paraphrased tcsec specifically refer ways transferring information higher classification compartment lower classification shared processing environment difficult completely insulate one process effects another process operating environment covert channel created sender process modulates condition free space availability service wait time execute detected receiving process tcsec defines two kinds covert channels tcsec also known orange book requires analysis covert storage channels classified b2 system analysis covert timing channels requirement class b3 use delays packets transmitted computer networks first explored girling covert communication work motivated many works establish detect covert communication analyze fundamental limitations scenarios ordinary things existence file time used computation medium covert channel communicates covert channels easy find media numerous frequently used two relatively old techniques remain standards locating potential covert channels one works analyzing resources system works source-code level possibility covert channels completely eliminated although significantly reduced careful design analysis detection covert channel made difficult using characteristics communications medium legitimate channel never controlled examined legitimate users example file opened closed program specific timed pattern detected another program pattern interpreted string bits forming covert channel since unlikely legitimate users check patterns file opening closing operations type covert channel remain undetected long periods similar case port knocking usual communications timing requests irrelevant unwatched port knocking makes significant handel sandford presented research study covert channels within general design network communication protocols employ osi model basis development characterize system elements potential used data hiding adopted approach advantages standards opposed specific network environments architectures considered study aim present foolproof steganographic schemes rather establish basic principles data hiding seven osi layers besides suggesting use reserved fields protocols headers easily detectable higher network layers also propose possibility timing channels involving csma/cd manipulation physical layer work identifies covert channel merit covert channel analysis consider issues interoperability data hiding techniques network nodes covert channel capacity estimation effect data hiding network terms complexity compatibility moreover generality techniques fully justified practice since osi model exist per se functional systems girling first analyzes covert channels network environment work focuses local area networks lans three obvious covert channels two storage channel one timing channel identified demonstrates real examples bandwidth possibilities simple covert channels lans specific lan environment author introduced notion wiretapper monitors activities specific transmitter lan covertly communicating parties transmitter wiretapper covert information according girling communicated following obvious ways scenario transmits covert information when-is-sent ” strategy therefore termed timing covert channel time transmit block data calculated function software processing time network speed network block sizes protocol overhead assuming block various sizes transmitted lan software overhead computed average novel time evaluation used estimate bandwidth capacity covert channels also presented work paves way future research focusing ip tcp headers tcp/ip protocol suite article published craig rowland devises proper encoding decoding techniques utilizing ip identification field tcp initial sequence number acknowledge sequence number fields techniques implemented simple utility written linux systems running version 2.0 kernels rowland provides proof concept well practical encoding decoding techniques exploitation covert channels using tcp/ip protocol suite techniques analyzed considering security mechanisms like firewall network address translation however non-detectability covert communication techniques questionable instance case sequence number field tcp header manipulated encoding scheme adopted every time alphabet covertly communicated encoded sequence number moreover usages sequence number field well acknowledgment field made specific ascii coding english language alphabet proposed since fields take account receipt data bytes pertaining specific network packet rowland several authors academia published work covert channels tcp/ip protocol suite including plethora countermeasures ranging statistical approaches machine learning research network covert channels overlaps domain network steganography emerged later | [
10170,
4067,
5060,
4389,
6877,
9289,
5402,
4303,
7887,
9233,
6162,
4883,
6772,
10968,
2426,
6653,
2558
] | Test |
3,925 | 7 | Unified_communications_as_a_service:unified communications service unified communications service ucaas category service cloud delivery mechanisms enterprise communications similar platform service paas data center capacity made available enterprise consumption model service provider ucaas unified communications services made available cloud businesses smb enterprise ucaas part global industry trend towards cloud services also known digital transformation ucaas first came prominence 2014 heels cloud movement traditionally enterprises acquired deployed communications infrastructure far economical approach enterprises could deploy pbx switches avoid cost individual phone lines employee advent ip virtualization data center economics shifted back favour service provider model service provider invests virtualized data centre negating need enterprise offers flexible consumption model prior cloud service providers offered ip centrex hosted communications services almost identical ucaas capability except fact “ virtualization ” meant economics ucaas much compelling examples prominent ucaas providers include telserv twilio voxbone telnyx 8x8 zoom video communications primary rationale ucaas fact allows company shift capital investment capex operating cost model opex addition provides companies ability rapidly increase consumption i.e consume licenses decrease consumption without need capital traditional communications model companies must acquire capacity ahead demand rarely get totally correct means over-capacity secondly growing sophistication enterprise unified communications meant companies must invest capital must invest staff order able support growing sophistication adding new features upgrades non-trivial communications critical success business productivity staff maintenance infrastructure requires high level expertise continues grow companies able off-load complexity service providers ucaas model well ensuring always latest versions features historically enterprise government organizations needed keep carriage provider i.e access pstn highly competitive position allowed service provider lock centrex solution may able achieve best carriage rates carriage becoming commodity uc license becoming premium much less risk moving sp ucaas solution features benefits ucaas platform gartner considers uc encompassing six functions significant level internal competition within organizations whether retain existing enterprise communications platform move cloud-based ucaas model number arguments moving ucaas security one common reasons given – companies cautious putting data cloud show sps better placed combat security breach much likely discipline around redundancy data perhaps valid reason concern level customization achieved generally understood on-premises communications platform staff achieve much higher levels customization enterprise course totally dependent capabilities company ’ staff without highly experienced staff organizations easily fall behind sophistication features productivity communications tools jury still total cost ownership tco on-premises ucaas many studies topic difficult compare two solutions given many enterprise companies rarely appreciate true tco on-premises | [
0,
4194,
467,
8471
] | None |
3,926 | 9 | ALF_(proof_assistant):alf proof assistant alf another logical framework structure editor monomorphic martin-löf type theory developed chalmers university predecessor alfa agda cayenne coq proof assistants dependently typed programming languages first language support inductive families dependent pattern matching | [
6306,
5796,
4791,
11641,
1019,
8924,
5885
] | Validation |
3,927 | 3 | High-availability_cluster:high-availability cluster high-availability clusters also known ha clusters fail-over clusters groups computers support server applications reliably utilized minimum amount down-time operate using high availability software harness redundant computers groups clusters provide continued service system components fail without clustering server running particular application crashes application unavailable crashed server fixed ha clustering remedies situation detecting hardware/software faults immediately restarting application another system without requiring administrative intervention process known failover part process clustering software may configure node starting application example appropriate file systems may need imported mounted network hardware may configured supporting applications may need running well ha clusters often used critical databases file sharing network business applications customer services electronic commerce websites ha cluster implementations attempt build redundancy cluster eliminate single points failure including multiple network connections data storage redundantly connected via storage area networks ha clusters usually use heartbeat private network connection used monitor health status node cluster one subtle serious condition clustering software must able handle split-brain occurs private links go simultaneously cluster nodes still running happens node cluster may mistakenly decide every node gone attempt start services nodes still running duplicate instances services may cause data corruption shared storage ha clusters often also use quorum witness storage local cloud avoid scenario witness device shared two halves split cluster event cluster members communicate e.g. failed heartbeat member access witness become active every application run high-availability cluster environment necessary design decisions need made early software design phase order run high-availability cluster environment application must satisfy least following technical requirements last two critical reliable function cluster difficult satisfy fully common size ha cluster two-node cluster since minimum required provide redundancy many clusters consist many sometimes dozens nodes attached diagram good overview classic ha cluster caveat make mention quorum/witness functionality see configurations sometimes categorized one following models terms logical host cluster logical host used describe network address used access services provided cluster logical host identity tied single cluster node actually network address/hostname linked service provided cluster cluster node running database goes database restarted another cluster node ha clusters usually use available techniques make individual systems shared infrastructure reliable possible include features help minimize chances clustering failover systems required failover service provided unavailable least little measures avoid failover preferred systems handle failures distributed computing different strategies cure failure instance apache cassandra api hector defines three ways configure failover several free commercial solutions available | [
903,
4616,
4505,
1049,
9243,
6433,
6564,
1701,
3237,
11428,
8233,
4274,
4149,
5047,
5437,
1990,
7750,
3784,
4817,
6483,
6615,
2395,
2913,
3042,
7649,
11618,
9706,
3181,
10733,
4852,
8181,
3450
] | Train |
3,928 | 3 | Wizzy_Active_Lifestyle_Telephone:wizzy active lifestyle telephone wizzy active lifestyle telephone w.a.l.t prototype phone companion created apple computer collaboration bellsouth w.a.l.t featured touchscreen fax functionality on-display caller id built-in address book customizable ringtones online banking access system based powerbook 100 included touchscreen stylus handwriting recognition operating system based system 6 hypercard gui announced 1993 system mass-produced prototype machine sold ebay 2012 2019 video demonstration prototype machine uploaded internet | [
9732,
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
8783,
4180,
10838,
10840,
9312,
9826,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
2735,
4283,
... | Train |
3,929 | 9 | Logic_of_Computable_Functions:logic computable functions logic computable functions lcf deductive system computable functions proposed dana scott 1969 memorandum unpublished 1993 inspired | [
10049,
6306,
11020,
10031,
11032
] | Validation |
3,930 | 4 | Guard_(information_security):guard information security information security guard device system allowing computers otherwise separate networks communicate subject configured constraints many respects guard like firewall guards may similar functionality gateway whereas firewall designed limit traffic certain services guard aims control information exchange network communication supporting business level unlike firewall guard provides assurance effective providing control even attack failure conditions guard typically sit protected network external network ensure protected network safe threats posed external network leaks sensitive information external network guard usually dual-homed though guards connect two networks acts full application layer proxy engaging separate communications interface guard pass business information carried protocols one network another information passes configured checks provide required protection development guards began late 1970s creation several secure communications processors guard applications secure communications processors high assurance operating systems security kernels developed support controlled plain-text bypasses packet network encryption devices guard applications designed sanitise data exported classified system remove sensitive information honeywell secure communications processor scomp early guard platform evaluated dod computer security center orange book evaluation criteria level a1 rsre secure user environment sue ran pdp-11/34 simple separation kernel designed constructed t4 division royal signals radar establishment rsre malvern england advanced command control architectural testbed accat guard developed export email classified system human review stage later developments guards addressed problem automatic downgrading information exported classified system secure network server sns mail guard smg enforced source/destination address whitelists security label checks attachment type filtering digital signatures ensure sensitive information released firewalls later development arriving around 1987 time functionality firewalls increased provide similar capabilities guards main difference remaining guards built way provide assurance effective protecting network swipsy firewall toolkit developed defence evaluation research agency act general guard platform swipsy layered top trusted solaris 8 guards initially designed control release information classified systems protecting confidentiality sensitive information handled protected system since scope extended cover controls import data order protect integrity information availability services protected network guards generally provide following functionality guards functionally equivalent bastion host acting application proxy placed within dmz network proxy imposes necessary controls data exchanged provide protection external threats internal leaks distinguished way constructed dmz network relies outer packet filtering firewalls route traffic bastion host firewalls function incorrectly may pass traffic dmz without passing bastion host checks imposed proxies bypassed also networking stack bastion host behaves incorrectly may route traffic dmz without passing proxies guard constructed software needs function correctly minimised work needed demonstrate third party also minimised guards engineered provide assurance apply appropriate checks guards use trusted operating system separate security critical checker components less critical protocol handling components way failure protocol handling components cause data bypass checker example security-enhanced linux used nexor guards solaris 10 trusted extensions used radiant mercury isse guard deep-secure type enforcement controls developed lock operating system used sidewinder guards also use physically separate computers ensure critical components bypassed government-off-the-shelf products commercial-off-the-shelf products | [
800,
6337,
10210,
4067,
4806,
8998,
5608,
11046,
11022,
11502,
4404,
4725,
5373,
2426,
4573,
6110,
4895
] | Test |
3,931 | 6 | RozoFS:rozofs rozofs free software distributed file system comes free software licensed gnu gpl v2 rozofs uses erasure coding redundancy rozo provides open source posix filesystem built top distributed file system architecture similar google file system lustre ceph rozo specificity lies way data stored data stored translated several chunks using mojette transform distributed across storage devices way retrieved even several pieces unavailable hand chunks meaningless alone redundancy schemes based coding techniques like one used rozofs allow achieve significant storage savings compared simple replication file system comprises three components rozo systems invited snia data storage innovation conference june 2016 | [
3328,
11363,
11323,
2314,
8554,
7983,
3795,
823,
3450,
2395,
2045,
3582,
6591
] | Test |
3,932 | 3 | Motorola_68012:motorola 68012 motorola mc68012 processor 16/32-bit microprocessor early 1980s 84-pin pga version motorola mc68010 memory space extended 2 gb read-modify-write cycle rmc pin indicating indivisible read-modify-write cycle progress added order help design multiprocessor systems virtual memory processors hold memory accesses cycle complete features mc68010 preserved expansion memory space caused issue programs used high byte address store data programming trick successful processors 24-bit address bus 68000 68010 similar problem affected 68020 | [
7299,
3844,
4868,
1158,
7302,
10501,
7305,
3467,
1548,
6415,
2073,
7065,
8102,
5297,
11314,
11447,
8761,
6715,
1983,
10945,
3017,
336,
8530,
3540,
3936,
7269,
9964,
8048,
3185,
10224,
5235,
7286,
3319,
8058,
8700
] | Test |
3,933 | 4 | Cybergeddon:cybergeddon cybergeddon tech cyber- lit computer hebrew megiddo extracted har megiddo mountain final battle refers cataclysm resulting large-scale sabotage computerized networks systems activities combines cyberterrorism cyberwarfare cybercrime hacktivism scenarios wide-scale internet disruption economic collapse economic industrial infrastructure could targeted banks industrial control systems since 2012 amount internet-based attacks complexity increased cybergeddon possibility fireeye ceo ashar aziz explained interview bloomberg attacks critical infrastructures power grid financial institutions could wreak havoc united states economy fact world economy | [
9688,
4945,
5563
] | Test |
3,934 | 1 | Skyline_operator:skyline operator skyline operator subject optimization problem used query filter results database keep objects worse operator extension sql proposed börzsönyi et al classic example application skyline operator involves selecting hotel holiday user wants hotel cheap close beach however hotels close beach may also expensive case skyline operator would present hotels worse hotel price distance beach give example sql börzsönyi et al proposed following syntax skyline operator ... denote dimensions skyline min max diff specify whether value dimension minimised maximised simply different skyline operator implemented directly sql using current sql constructs however shown slow algorithms proposed make use divide conquer indices mapreduce general-purpose computing graphics cards skyline queries data streams i.e continuous skyline queries studied context parallel query processing multicores owing wide diffusion real-time decision making problems data streaming analytics | [
8514,
9290,
11343,
10413
] | Test |
3,935 | 4 | Microsoft_Forefront:microsoft forefront microsoft forefront discontinued family line-of-business security software microsoft corporation microsoft forefront products designed help protect computer networks network servers microsoft exchange server microsoft sharepoint server individual devices 2015 actively developed forefront product forefront identity manager forefront includes following products predecessor forefront server protection products antigen line antivirus products created sybari software sybari acquired microsoft 2005 first microsoft-branded version product called microsoft forefront security sharepoint fssp version 10 fssp version 10 supports microsoft office sharepoint server 2007 microsoft windows sharepoint services version 3 whereas fpsp last version product supports microsoft office sharepoint server 2010 microsoft sharepoint foundation 2010 microsoft office sharepoint server 2007 sp1 windows sharepoint services version 3 sp1 | [
7809,
2309,
1417,
4490,
2443,
537,
3482,
2213,
8998,
5799,
5673,
3629,
7473,
5057,
10828,
467,
5082,
9695,
4704,
11248
] | Train |
3,936 | 3 | Motorola_68008:motorola 68008 motorola 68008 8/16/32-bit microprocessor made motorola version motorola 68000 8-bit external data bus well smaller address bus original 68000 introduced 1979 24-bit address bus 16-bit data bus relatively large buses made hard design low-cost system based 68000 difficult lay circuit board needed lot supporting circuitry 16-bit data bus also required twice many memory chips 8-bit one 68008 introduced 1982 designed work low-cost 8-bit memory systems smaller data bus half fast 68000 clock speed however still faster competing 8-bit microprocessors 68008 internally based 32-bit data registers 16-bit data bus except smaller data address buses 68008 behaved identically 68000 internal organization microarchitecture 68008 hmos chip came speed grade two distinct versions chip original version came 48-pin dual in-line package 20-bit address bus allowing use 1 megabyte memory later version came 52-pin plastic leaded chip carrier version provided 22-bit address bus could support ram computer systems used 68008 main processor sinclair ql personal computer best known however 68008 popular embedded systems motorola ended production 68008 1996 | [
7299,
3844,
4868,
1158,
7302,
10501,
7305,
3467,
1548,
398,
6415,
2073,
7065,
8102,
5297,
11314,
11447,
8761,
2874,
6715,
1983,
10945,
3017,
5455,
336,
8530,
3540,
3932,
3680,
7269,
9964,
8048,
3185,
10224,
5235,
7286,
3319,
8058,
8700
] | Test |
3,937 | 4 | Crack_(password_software):crack password software crack unix password cracking program designed allow system administrators locate users may weak passwords vulnerable dictionary attack crack first standalone password cracker unix systems later first introduce programmable dictionary generation crack began 1990 alec muffett unix system administrator university wales aberystwyth trying improve dan farmer 'pwc cracker cops found re-engineering memory management got noticeable performance increase led total rewrite became crack v2.0 development improve usability first public release crack version 2.7a posted usenet newsgroups alt.sources alt.security 15 july 1991 crack v3.2a+fcrypt posted comp.sources.misc 23 august 1991 introduced optimised version unix crypt function still really faster version already available packages release crack v4.0a 3 november 1991 however introduced several new features made formidable tool system administrators arsenal crack v5.0a released 2000 introduce new features instead concentrated improving code introducing flexibility ability integrate crypt variants needed attack md5 password hashes used modern unix linux windows nt systems also bundled crack v6 minimalist password cracker crack v7 brute force password cracker randal l. schwartz notable perl programming expert 1995 prosecuted using crack password file system intel case verdict eventually expunged crack also used kevin mitnick hacking sun microsystems 1993 traditional password cracking tools simply fed pre-existing dictionary words crypt function crack v4.0a introduced ability apply rules word list generate modified versions word lists could range simple change extremely complex documentation gives example rules could also process gecos field password file allowing program use stored names users addition existing word lists crack dictionary generation rule syntax subsequently borrowed extended solar designer john ripper dictionary generation software crack subsequently reused muffett create cracklib proactive password checking library bundled debian red hat enterprise linux-derived linux distributions password cracking inherently embarrassingly parallel crack v4.0a introduced ability use network heterogeneous workstations connected shared filesystem parts distributed password cracking effort required provide crack configuration file containing machine names processing power rates flags required build crack machines call -network option | [
7426,
6916,
3845,
7556,
7557,
8582,
8976,
3350,
10135,
2716,
413,
8612,
4140,
7983,
823,
8513,
9665,
8137,
8787,
8152,
6617,
733,
3172,
4580,
5492,
8827,
2558
] | None |
3,938 | 2 | Project_Trillian:project trillian project trillian effort industry consortium port linux kernel itanium processor project started may 1999 goal releasing distribution time initial release itanium scheduled early 2000 end 1999 project included caldera systems cern cygnus solutions hewlett-packard ibm intel red hat sgi suse turbolinux va linux systems project released resulting code february 2000 code became part linux baseline kernel year release first itanium processor trillian project able two reasons successful completion project trillian resulting linux kernel used manufacturers itanium systems hp ibm dell sgi fujitsu unisys hitachi groupe bull notable exception hp linux either primary os os manufacturer supports itanium ongoing free open source software support linux itanium subsequently coalesced gelato | [
10883,
4996,
6148,
5384,
7053,
5523,
9619,
11673,
6557,
3359,
10273,
6442,
7983,
9137,
9139,
6325,
823,
573,
1219,
964,
10051,
6342,
863,
5603,
868,
3429,
5220,
9829,
9455,
375,
2168,
3323,
2172,
2813
] | Train |
3,939 | 2 | Freeciv:freeciv freeciv single- multiplayer turn-based strategy game workstations personal computers inspired proprietary sid meier civilization series available desktop computer operating systems available online browser based version released gnu general public license freeciv free open source software game default settings closest civilization ii gameplay graphics including units isometric grid players take role tribal leaders 4000 b.c must guide peoples centuries time new technologies discovered allow construction new city buildings deployment new units players wage war one another form diplomatic relationships game ends one civilization eradicated others accomplished goal space colonization given deadline one civilization remains deadline player highest score wins points awarded size civilization wealth cultural scientific advances computer science department aarhus university three students avid players xpilot sid meier civilization stand-alone pc game ms-dos decided find whether two could fused x-based multiplayer civilization-like strategy game students—peter unold claus leth gregersen allan ove kjeldbjerg—started development november 1995 first playable version released january 1996 bugfixing small enhancements april rules game close civilization client/server architecture basically xpilot developers freeciv 1.0 successful proof concept rather boring game went back xpilot players developers took made game available many operating systems including linux solaris ultrix amiga os microsoft windows linux distributions started include freeciv main development goal remained make civilization-like game playable internet participants different continents even connected 14400 bit/s modems freeciv achieved using asynchronous client-server protocol turn human users play concurrently actions sent server processing without awaiting results kept game playable network latency hundreds milliseconds 1998 computer players added could soon beat newcomers game ease using minor forms cheating computer players implemented directly server play concurrently human players separately turns game grew popularity public server installed games could played around clock retained games published post-game analysis webpage per-player statistics animated map replay subsequent 1.x releases improved gui improved gameplay added many small features time winning strategy proved city smallpox sprawling map many small cities fast possible whoever could develop fastest would win game growing developing individual cities n't worthwhile practice around 2002 experienced players would form teams start game fork freeciv included specific features team play version 2.0 released 2005 introduced several important changes became beneficial develop large cities full trade routes advanced technologies re-balancing various costs benefits introduction team playing features advanced diplomacy made coop gaming attractive developing one empire necessitated careful plan city development including phases rapture city populations grow quickly relatively peaceful conditions hence games almost always played teams typically took longer finish compared 1.x games 2006 tcp udp port number 5556 assigned freeciv iana 2017 hosted gna 15 years freeciv moved source repository github freeciv configurable specific rules played freeciv default mode civilization mode civilization ii mode custom mode one several players act game administrators configure game rules typically modified rules order play game freeciv user must start freeciv client connect freeciv server initially server pre-game phase phase clients connect game configuration parameters changed point server may ordered start game response creates game players nations game map assigns every player either freeciv client computer player specified configuration point game run ends terminated server never get back pre-game state user also start game directly client automatically starts freeciv server connects starts game freeciv graphics system configurable originally map display always overhead mode like civ isometric mode like civ ii iii optionally hexagonal tiling like civ v vi added later modes look customized switching alternative set graphics called tileset sounds replaced well freeciv supports human-to-human multiplayer gameplay artificial intelligence ai computer players game turn based human players move simultaneously ai players move separately partly start turn partly end releases 2.0 ai players could engage diplomatic relationships human players current releases ai players engage predictable rules-based diplomacy version 2.2.0 included map editor termed civworld create new scenarios well edit map currently played basic scripting available freeciv available civworld version 2.3 increased limit players 30 126 different clients available sdl gtk+ version3 xaw3d qt client added version 2.5 freeciv interface available 30 different languages addition gaelic covered bbc tv originally developed irix freeciv ported many different operating systems distributed many linux distributions offers installers microsoft windows known run mac os x morphos solaris ultrix qnx os/2 cygwin amigaos aros risc os maemo zeta skyos various bsds smartphones tablets running android version 2.4 mac os x version 2.3 windows versions older windows xp sp3 longer supported freeciv available portableapps format freeciv-web version freeciv playable online modern web browser supports 2d isometric graphics 3d graphics using webgl 3d version referred freeciv webgl 3d game fork freeciv project goal redesigning desktop game version played online freeciv-web introduced several new features play-by-email support freely available anyone online support playing game real-world map location choosing map using mapbox available commercial games genre game default settings closest civilization ii gameplay graphics including units isometric grid proposal create web-version freeciv made 6 april 2007 freeciv mailing lists documented freeciv.org wiki freeciv-web originally created andreas røsdal maintained several freeciv developers github freeciv-web free open source software freeciv c server released gnu general public license freeciv-web client released gnu affero general public license freeciv-web supports human-to-human multiplayer gameplay artificial intelligence ai computer players features similar freeciv c client although user-interface ported c client yet freeciv-web played online number servers two frequented http //www.freecivweb.org/ http //freeciv.xyz/ features required play full game freeciv place including rendering isometric map technology research many dialogs managing cities units players game also supports scenario-games includes maps world north america france italy japan iberian peninsula servers offer multiple varieties game single-player multiplayer free-for-all play-by-email longturn freeciv-web formerly playable play.freeciv.org march 3 2018 play.freeciv.org shut project revived april 8 group volunteers freecivweb.org freeciv longturn specialized large-group-multiplayer-online-strategy lagmos variant freeciv featuring daylong game turns large amounts human opponents per map allowing optimal timing build strategic plans readapt circumstances turn matches last anytime weeks months commonly involve 20 30 players one longturn first game called lt0 started around 2004 polish civilization fanpage civ.org.pl conducted longturn.net decided game bit slow paced new 3x movement ruleset devised – basically units movement points vision radius tripled july 2019 latest game lt47 changes settings rulesets discussed longturn forum greatturn similar concept another server since 2017 freeciv-web offers similar one turn per day variant gacivs mmo-rts variant freeciv ruleset devised support time-based instead turn-based strategy 2000 cnn placed freeciv among top 10 linux games holidays 2005 o'reilly article open source mac gaming freeciv recommended 2008 apcmag.com named freeciv among top 5 best free open source games linux format selected hotpick april 2010 october 2014 freeciv described example art unix programming eric s. raymond studies courses used freeciv platform experimenting design programming intelligent agents 2016 freeciv used challenge chess go commercial ai | [
3462,
3848,
4490,
6797,
5397,
11413,
4777,
10924,
7983,
823,
9151,
7872,
9166,
6993,
11221,
1121,
3939,
10480,
370,
2045
] | Validation |
3,940 | 2 | OmniROM:omnirom omnirom open-source operating system smartphones tablet computers based android mobile platform involves number prominent developers projects omnirom founded reaction commercialisation rom project cyanogenmod launch project provided custom firmware based android jelly bean moved android kitkat shortly release kitkat firmware included support galaxy note ii galaxy note galaxy s3 galaxy s4 nexus 4 nexus 5 nexus 7 2012 lg optimus g galaxy s2 htc one 2013 oppo find 5 sony xperia acer iconia a500 htc explorer lenovo a6000 june 2015 project started release nightly builds based android lollipop asus transformer pad asus transformer pad infinity nexus 4 nexus 5 nexus 6 nexus 7 nexus 10 oppo find 7/7a oneplus one sony xperia z sony xperia zl project working new version firmware based android pie | [
5637,
8719,
3600,
7700,
9244,
11294,
1578,
5677,
1083,
6212,
69,
8262,
4685,
3664,
8280,
8285,
2658,
11391,
1670,
5262,
10393,
7835,
673,
8870,
1191,
7857,
196,
8907,
8413,
9949,
1255,
8940,
5363,
5892,
7428,
2828,
280,
10009,
10525,
798,... | Test |
3,941 | 4 | Internet_security:internet security internet security branch computer security specifically related internet often involving browser security world wide web also network security applies applications operating systems whole objective establish rules measures use attacks internet internet represents insecure channel exchanging information leads high risk intrusion fraud phishing online viruses trojans worms many methods used protect transfer data including encryption from-the-ground-up engineering current focus prevention much real time protection well known new threats internet user tricked forced downloading software malicious intent onto computer software comes many forms viruses trojan horses spyware worms denial-of-service attack dos attack distributed denial-of-service attack ddos attack attempt make computer resource unavailable intended users another way understanding ddos seeing attacks cloud computing environment growing due essential characteristics cloud computing although means carry motives targets dos attack may vary generally consists concerted efforts prevent internet site service functioning efficiently temporarily indefinitely according businesses participated international business security survey 25 respondents experienced dos attack 2007 16.8 experienced one 2010 dos attacks often use bots botnet carry attack phishing attack targets online users extraction sensitive information username password credit card information phishing occurs attacker pretends trustworthy entity either via email web page victims directed fake web pages dressed look legitimate via spoof emails instant messenger/social media avenues often tactics email spoofing used make emails appear legitimate senders long complex subdomains hide real website host insurance group rsa said phishing accounted worldwide losses 10.8 billion 2016 applications used access internet resources may contain security vulnerabilities memory safety bugs flawed authentication checks severe bugs give network attackers full control computer security applications suites incapable adequate defense kinds attacks common widespread web-browser application vulnerability so-called cross-origin resource sharing vulnerability- maximum security privacy make sure adopt adequate countermeasures example patches provided webkit-based browsers tcp/ip protocols may secured cryptographic methods security protocols protocols include secure sockets layer ssl succeeded transport layer security tls web traffic pretty good privacy pgp email ipsec network layer security ipsec designed protect tcp/ip communication secure manner set security extensions developed internet task force ietf provides security authentication ip layer transforming data using encryption two main types transformation form basis ipsec authentication header ah esp two protocols provide data integrity data origin authentication anti-replay service protocols used alone combination provide desired set security services internet protocol ip layer basic components ipsec security architecture described terms following functionalities set security services provided ip layer includes access control data origin integrity protection replays confidentiality algorithm allows sets work independently without affecting parts implementation ipsec implementation operated host security gateway environment giving protection ip traffic multi-factor authentication mfa method computer access control user granted access successfully presenting several separate pieces evidence authentication mechanism – typically least two following categories knowledge something know possession something inherence something internet resources websites email may secured using multi-factor authentication online sites offer customers ability use six-digit code randomly changes every 30–60 seconds security token keys security token built mathematical computations manipulate numbers based current time built device means every thirty seconds certain array numbers possible would correct validate access online account website user logging would made aware device serial number would know computation correct time built device verify number given indeed one handful six-digit numbers works given 30-60 second cycle 30–60 seconds device present new random six-digit number log website email messages composed delivered stored multiple step process starts message composition user finishes composing message sends message transformed standard format rfc 2822 formatted message afterwards message transmitted using network connection mail client referred mail user agent mua connects mail transfer agent mta operating mail server mail client provides sender ’ identity server next using mail server commands client sends recipient list mail server client supplies message mail server receives processes message several events occur recipient server identification connection establishment message transmission using domain name system dns services sender ’ mail server determines mail server recipient server opens connection recipient mail server sends message employing process similar used originating client delivering message recipient pretty good privacy provides confidentiality encrypting messages transmitted data files stored using encryption algorithm triple des cast-128 email messages protected using cryptography various ways following first two methods message signing message body encryption often used together however encrypting transmissions mail servers typically used two organizations want protect emails regularly sent example organizations could establish virtual private network vpn encrypt communications mail servers internet unlike methods encrypt message body vpn encrypt entire messages including email header information senders recipients subjects cases organizations may need protect header information however vpn solution alone provide message signing mechanism provide protection email messages along entire route sender recipient mime transforms non-ascii data sender site network virtual terminal nvt ascii data delivers client simple mail transfer protocol smtp sent internet server smtp receiver side receives nvt ascii data delivers mime transformed back original non-ascii data message authentication code mac cryptography method uses secret key encrypt message method outputs mac value decrypted receiver using secret key used sender message authentication code protects message data integrity well authenticity computer firewall controls access networks generally consists gateways filters vary one firewall another firewalls also screen network traffic able block traffic dangerous firewalls act intermediate server smtp hypertext transfer protocol http connections firewalls impose restrictions incoming outgoing network packets private networks incoming outgoing traffic must pass firewall authorized traffic allowed pass firewalls create checkpoints internal private network public internet also known choke points borrowed identical military term combat limiting geographical feature firewalls create choke points based ip source tcp port number also serve platform ipsec using tunnel mode capability firewall used implement vpns firewalls also limit network exposure hiding internal network system information public internet packet filter first generation firewall processes network traffic packet-by-packet basis main job filter traffic remote ip host router needed connect internal network internet router known screening router screens packets leaving entering network stateful firewall circuit-level gateway proxy server operates network level open systems interconnection osi model statically defines traffic allowed circuit proxies forward network packets formatted unit data containing given port number port permitted algorithm main advantage proxy server ability provide network address translation nat hide user ip address internet effectively protecting internal information internet application-level firewall third generation firewall proxy server operates top osi model ip suite application level network packet forwarded connection established using known protocol application-level gateways notable analyzing entire messages rather individual packets data data sent received web browser statistics tend affect amount web browser exploited example internet explorer 6 used majority web browser market share considered extremely insecure vulnerabilities exploited due former popularity since browser choice evenly distributed internet explorer 28.5 firefox 18.4 google chrome 40.8 vulnerabilities exploited many different browsers antivirus software internet security programs protect programmable device attack detecting eliminating malware antivirus software mainly shareware early years internet several free security applications internet choose platforms password manager software application helps user store organize passwords password managers usually store passwords encrypted requiring user create master password single ideally strong password grants user access entire password database top bottom called security suites first offered sale 2003 mcafee contain suite firewalls anti-virus anti-spyware also offer theft protection portable storage device safety check private internet browsing cloud anti-spam file shredder make security-related decisions answering popup windows several free charge | [
3072,
2049,
5636,
6149,
9221,
10245,
10756,
9227,
9233,
4119,
9242,
9761,
2084,
4648,
9256,
6699,
9771,
1069,
46,
3629,
6193,
10801,
5172,
569,
10297,
571,
3643,
7739,
9791,
1088,
4165,
81,
11345,
8789,
8283,
5724,
2654,
9313,
4194,
101,
... | Test |
3,942 | 4 | Shorewall:shorewall shorewall open source firewall tool linux builds upon netfilter iptables/ipchains system built linux kernel making easier manage complex configuration schemes providing higher level abstraction describing rules using text files daemon since run continuously rather configures rules kernel allow disallow traffic system shorewall configured group plain-text configuration files graphical user interface though webmin module available separately monitoring utility packaged shorewall used watch status system operates assist testing shorewall mainly used network installations opposed personal computer firewall since strength lies ability work zones dmz 'net zone zone would different rules making easy example relaxed rules company intranet yet clamp traffic coming internet plain-text configuration files usually well-commented easy use though shorewall may difficult new users handle firewall systems graphical front-ends recent stable version 5.2.3 18 february 2019 primary developer tom eastep announced retiring project 5.2.3 would final release starting version 4 shorewall began using perl-based compiler frontend previously used shell-based compiler frontend support ipv6 firewalling included since version 4.2.4 | [
1792,
2049,
4480,
2563,
8582,
6797,
1172,
9496,
3482,
1436,
4511,
6431,
10531,
5924,
550,
8998,
10790,
3243,
1708,
3885,
7983,
8753,
823,
569,
5178,
11577,
9279,
5057,
1858,
10433,
11073,
2118,
4814,
9423,
10574,
7121,
10451,
10708,
4568,
... | Test |
3,943 | 3 | Compaq_Portable_III:compaq portable iii compaq portable iii pc/at-compatible computer released compaq computer corporation 1987 advertised much smaller lighter previous portable x86-pcs however still quite large today standards three models announced release model 1 list price equipped intel 80286 ram floppy colored gas-plasma display options included model 20 added model 40 upgraded also optional isa expansion chassis allowed 2 full length 16-bit isa add-in cards power supplied using mains electricity outlet battery exists | [
5348,
780,
9166,
2383,
1776,
7983,
8786,
499,
1461,
5368,
11100
] | None |
3,944 | 4 | Zero-day_(computing):zero-day computing zero-day also known 0-day vulnerability computer-software vulnerability unknown unaddressed interested mitigating vulnerability including vendor target software vulnerability mitigated hackers exploit adversely affect computer programs data additional computers network exploit directed zero-day called zero-day exploit zero-day attack jargon computer security day zero day interested party presumably vendor targeted system learns vulnerability leading vulnerability called zero-day vendor learns vulnerability vendor usually create patches advise workarounds mitigate fewer days since day zero higher chance fix mitigation developed even fix developed fewer days since day zero higher probability attack afflicted software successful every user software applied fix zero-day exploits unless vulnerability inadvertently fixed e.g unrelated update happens also obviate need fix specific vulnerability probability user applied vendor-supplied patch fixes problem zero exploit would remain available zero-day attacks severe threat malware writers exploit zero-day vulnerabilities several different attack vectors sometimes users visit rogue websites malicious code site exploit vulnerabilities web browsers web browsers particular target criminals widespread distribution usage cybercriminals well international vendors spyware israel ’ nso group also send malicious e-mail attachments via smtp exploit vulnerabilities application opening attachment exploits take advantage common file types numerous frequent evidenced increasing appearances databases like us-cert criminals engineer malware take advantage file type exploits compromise attacked systems steal confidential data time software exploit first becomes active time number vulnerable systems shrinks insignificance known window vulnerability wov time-line software vulnerability defined following main events thus formula length window vulnerability – formulation always true ≤ ≤ t. note day zero example hacker first discover vulnerability vendor might learn much later day zero normal vulnerabilities – 0 implies software vendor aware vulnerability time publish security patch hacker could craft workable exploit zero-day exploits – ≤ 0 exploit became active patch made available disclosing known vulnerabilities software vendor hopes reach reached thus avoiding exploits however vendor guarantees hackers find vulnerabilities furthermore hackers analyze security patches thereby discover underlying vulnerabilities automatically generate working exploits exploits used effectively time t. practice size wov varies systems vendors individual vulnerabilities often measured days one report 2006 estimating average 28 days zero-day protection ability provide protection zero-day exploits since zero-day attacks generally unknown public often difficult defend zero-day attacks often effective secure networks remain undetected even launched thus users so-called secure systems must also exercise common sense practice safe computing habits many techniques exist limit effectiveness zero-day memory corruption vulnerabilities buffer overflows protection mechanisms exist contemporary operating systems macos windows vista beyond see also security safety features new windows vista solaris linux unix unix-like environments windows xp service pack 2 includes limited protection generic memory corruption vulnerabilities previous versions include even less desktop server protection software also exists mitigate zero-day buffer overflow vulnerabilities typically technologies involve heuristic termination analysis—stopping cause harm suggested solution kind may reach algorithmically impossible general case analyze arbitrary code determine malicious analysis reduces halting problem linear bounded automaton unsolvable however unnecessary address general case sort programs categories malicious non-malicious circumstances order eliminate wide range malicious behaviors suffices recognize safety limited set programs e.g. access modify given subset machine resources rejecting safe unsafe programs require integrity safe programs maintained may prove difficult face kernel level exploit zeroday emergency response team zert group software engineers worked release non-vendor patches zero-day exploits march 9 2017 press release vault 7 documents released wikileaks 2 days previously julian assange states much leak remainder included unpatched vulnerabilities working companies microsoft google get vulnerabilities patched would release information would put public risk fixes released manufacturers would release details vulnerabilities zero-day worms take advantage surprise attack still unknown computer security professionals recent history shows increasing rate worm propagation well designed worms spread fast devastating consequences internet systems differing ideologies exist relative collection use zero-day vulnerability information many computer security vendors perform research zero-day vulnerabilities order better understand nature vulnerabilities exploitation individuals computer worms viruses alternatively vendors purchase vulnerabilities augment research capacity example program tippingpoint zero day initiative selling buying vulnerabilities technically illegal parts world lot controversy method disclosure 2006 german decision include article 6 convention cybercrime eu framework decision attacks information systems may make selling even manufacturing vulnerabilities illegal formal programs follow form rain forest puppy disclosure guidelines recent ois guidelines security vulnerability reporting response general rules forbid public disclosure vulnerabilities without notification vendor adequate time produce patch zero-day virus also known zero-day malware next-generation malware previously unknown computer virus malware specific antivirus software signatures yet available traditionally antivirus software relies upon signatures identify malware effective defend malware unless samples already obtained signatures generated updates distributed users signature-based approaches effective zero-day viruses modern antivirus software still uses signatures also carries types analysis code analysis machine code file analysed see anything looks suspicious typically malware characteristic behaviour code analysis attempts detect present code although useful code analysis significant limitations always easy determine section code intended particularly complex deliberately written intention defeating analysis another limitation code analysis time resources available competitive world antivirus software always balance effectiveness analysis time delay involved one approach overcome limitations code analysis antivirus software run suspect sections code safe sandbox observe behavior orders magnitude faster analyzing code must resist detect attempts code detect sandbox generic signatures signatures specific certain behaviour rather specific item malware new malware totally novel variation earlier malware contains code one earlier examples malware thus results previous analysis used new malware generally accepted antivirus industry vendors signature-based protection identically effective signature available item malware every product unless dysfunctional detect however vendors significantly faster others becoming aware new viruses and/or updating customers signature databases detect wide range effectiveness terms zero-day virus protection german computer magazine c't found detection rates zero-day viruses varied 20 68 primarily area zero-day virus performance manufacturers compete mid-april 2017 hackers known shadow brokers tsb —allegedly linked russian government—released files nsa initially regarded alleged nsa later confirmed internal details snowden include series 'zero-day exploits targeting microsoft windows software tool penetrate society worldwide interbank financial telecommunication swift service provider ars technica reported shadow brokers hacking claims mid-january 2017 april shadow brokers posted exploits proof vulnerabilities equities process first revealed publicly 2016 process used u.s. federal government determine case-by-case basis treat zero-day computer security vulnerabilities whether disclose public help improve general computer security keep secret offensive use government adversaries process criticized number deficiencies including restriction non-disclosure agreements lack risk ratings special treatment nsa less whole-hearted commitment disclosure default option virus signature unique pattern code used detect identify specific viruses antivirus scans file signatures compares database known malicious codes match file flagged treated threat major limitation signature-based detection capable flagging already known malware making completely useless zero-day attacks chronological order | [
3843,
5636,
6917,
11400,
6797,
3473,
4755,
3092,
8212,
8726,
9364,
10392,
6169,
7578,
3742,
1440,
5024,
2213,
3495,
297,
2734,
2737,
10110,
5173,
6326,
823,
9909,
11577,
6586,
7739,
711,
10442,
971,
9424,
3286,
1496,
1242,
7515,
11611,
48... | Validation |
3,945 | 3 | DEC_Multia:dec multia multia later re-branded universal desktop box line desktop computers introduced digital equipment corporation 7 november 1994 line notable units offered either alpha axp intel pentium processor cpu hardware backplane cpu interchangeable alpha intel versions intended run windows nt multia compact case left little room expansion cards restricted air flow cause premature hardware failure due overheating properly cared enthusiasts remedy placing multia vertically instead horizontally allowing heated air escape via vents top although still requires preventing multia overheating due factors e.g environmental alpha multias included either alpha 21066 alpha 21066a microprocessor running 166 mhz 233 mhz respectively came 16 24 mb ram standard expandable 128 mb officially practice 256 mb 21066 budget version alpha 21064 processor narrower 64-bit versus 128-bit slower bus thus performance roughly equivalent pentium running 100 mhz integer operations superior floating-point furthermore standard ram capacity severe restriction performance workstations alpha-based multias came tga dec 21030 graphics adapter standard peripherals alpha intel models included scsi host adapter dec 21040 ethernet controller two pcmcia slots two rs-232 ports bi-directional parallel port 2.5 3.5 scsi ata hard disk 340 mb 1.6 gb ps/2 keyboard mouse ports pci slot models 2.5-inch hard disks multia models comprised 1996 digital began offering alpha multia without windows nt renamed line universal desktop box nicknamed udb prices quite low first time many enthusiasts hobbyists could afford alpha axp-based computer multia udb run windows nt alpha windows nt 4.0 service pack 6 although windows 2000 never officially released alpha platform windows 2000 beta released fact runs multia linux netbsd available multia additionally digital unix openvms configured run multia certain limitations although initially operating systems disabled running budget multia line alpha-based multia came configured arc firmware console running windows nt although srm also available intel-based multia used bios | [
780,
9742,
8976,
8851,
2452,
8474,
8732,
6942,
3250,
823,
7234,
3142,
8390,
2383,
11604,
10220,
1776,
5873,
499,
9723
] | Test |
3,946 | 0 | Audio-visual_speech_recognition:audio-visual speech recognition audio visual speech recognition avsr technique uses image processing capabilities lip reading aid speech recognition systems recognizing undeterministic phones giving preponderance among near probability decisions system lip reading speech recognition works separately results mixed stage feature fusion name suggests two parts first one audio part second one visual part audio part use features like log mel spectogram mfcc etc raw audio samples build model get feature vector visual part generally use variant convolutional neural network compress image feature vector concatenate two vectors audio visual try predict target object | [
5648,
1890,
10557
] | None |
3,947 | 0 | Synchronous_context-free_grammar:synchronous context-free grammar synchronous context-free grammars syncfg scfg confused stochastic cfgs type formal grammar designed use transfer-based machine translation rules grammars apply two languages time capturing grammatical structures translations theory syncfgs borrows syntax-directed transduction syntax-based machine translation modeling reordering clauses occurs translating sentence correspondences phrase-structure rules source target languages performance scfg-based mt systems found comparable even better state-of-the-art phrase-based machine translation systems several algorithms exist perform translation using syncfgs rules syncfg superficially similar cfg rules except specify structure two phrases time one source language language translated one target language numeric indices indicate correspondences non-terminals constituent trees chiang gives chinese/english example rule indicates phrase formed chinese structure yu variables standing subphrases corresponding structure english independently translated english | [
1490,
2578
] | Test |
3,948 | 2 | IOS_4:ios 4 ios 4 fourth major release ios mobile operating system developed apple inc. successor iphone os 3 announced company worldwide developers conference june 7 2010 released june 21 2010. ios 4 first ios version issued ios rebranding dropping iphone os naming convention previous versions succeeded ios 5 october 12 2011. ios 4 introduced folders home screen significantly increasing number apps displayed support custom wallpapers also added although limited newer devices due animation performance requirements operating system also added multitasking feature letting apps dealing internet calling location audio playback function background whereas similar restricted fast app switching technology enabled app left inactive background users switch apps ios 4 also added system-wide spell checking feature enabled ibooks iphone unified mail inbox combine content different email providers introduced game center social gaming facetime video calling ios 4 update introduced performance battery problems iphone 3g devices apple investigating matter promising then-upcoming updates however company became subject lawsuit unsatisfied customer issues around time release iphone 4 subsequent antenna problems made apple focus unsuccessfully attempting patch issues software updates ios 4 introduced apple worldwide developers conference keynote address june 7 2010 notably first ios release named simply ios ditched iphone os naming pattern previous versions ios 4 officially released june 21 2010. ios 4.0.1 released july 15 2010 first update ios 4 update changed method calculating carrier signal strength improved accuracy ios 4.0.2 released august 11 2010 fix exploit taking advantage pdf file format vulnerabilities ios 4.1 released september 8 2010 update included high dynamic range hdr technology improved quality photos captured iphone 4 added game center social gaming network ability upload high definition videos captured iphone 4 youtube mobileme also featured bug fixes performance improvements ios 4.2.1 released november 22 2010 first version bring major ios 4 features introduced iphone ipad although ios 4.2 released developers testing purposes bugs discovered replaced 4.2.1 consumer release also last version ios run iphone 3g ipod touch 2nd generation due hardware limitations performance issues ios 4.2.5 announced january 11 2011 adding exclusive wi-fi hotspot support cdma version iphone 4. ios 4.3 released march 4 2011 adding support personal wi-fi hotspots itunes home sharing improvements airplay minor improvements ipad 1 run ios 4.3 due hardware restrictions ios 4.3.1 released march 25 2011 fix ipod touch screen glitches along stability improvements cellular connectivity iphone models ios 4.3.2 released april 14 2011 fixes frozen calls facetime connectivity issues cellular models ipad ios 4.3.3 released may 4 2011 fix location bugs ios 4.3.4 released july 15 2011 fixing security vulnerabilities ios 4.3.5 released july 25 2011 security update fix certificate validation ios 4 raised maximum number home screen apps 180 2,160 due addition folders folders would automatically named based containing apps respective app store category ability add custom wallpapers home screen also added though feature notably absent iphone 3g second-generation ipod touch due poor performance icon animations ios 4 introduced multitasking feature allowed users switch apps instantly double-clicking home button implemented way cause excessive battery drain multitasking limited apps dealing internet calling location audio playback similar fast app switching technology meant users could leave app enter another original app remaining background user returns feature notably absent iphone 3g second-generation ipod touch due performance issues ios 4 introduced spell checking feature underlined misspelled words red tapping word would provide pop-up recommended replacement camera app could take pictures 5 times digital zoom ios 4 introduced iphone ipod touch support ibooks already included ipad though default app available app store mail app featured unified inbox ios 4 allowing users see messages email accounts displayed together single inbox also gained support mobileme e-mail aliases multiple exchange accounts business users ios 4.1 added new app called game center online multiplayer social gaming network allows users invite friends play games compare scores leaderboard available iphone 3g ios 4 introduced facetime videotelephony app uses device camera allow user make video calls facetime users feature absent iphone 3gs third-generation ipod touch lower due lack required features front-facing camera safari mobile web browser ios 4 added bing search option addition google yahoo ios 4.2 specific words phrases page searched iphone 3g users reported performance battery issues upgrading ios 4 apple started investigation matter july 2010 november apple sued issues unsatisfied customer alleging violating consumer legal remedies act unfair business practices false deceptive advertising allegations apple knew software would cause problems older models apple n't responded allegations wrote reply another unsatisfied customer august updates coming soon versions ios 4 alarm clock clock app problem dst would go hour early late upon release iphone 4 users reported technical problems phone antennas apple attempted fix issue ios 4.0.1 failed first-generation iphone first-generation ipod touch run ios 4 due hardware limitations marked first time apple dropped support older devices | [
10755,
9732,
1549,
4111,
5647,
7697,
6675,
11289,
6186,
4139,
6700,
1074,
8754,
9784,
8253,
8767,
576,
5696,
8774,
8783,
4180,
10838,
1623,
3672,
9308,
8285,
3167,
3681,
9826,
8806,
3691,
2673,
6264,
7292,
2686,
6783,
7806,
10878,
10888,
... | Validation |
3,949 | 2 | BlackBerry_Enterprise_Server:blackberry enterprise server blackberry enterprise server designates middleware software package part blackberry wireless platform supplied blackberry limited software service connects messaging collaboration software mdaemon messaging server microsoft exchange lotus domino novell groupwise enterprise networks redirects emails synchronizes contacts calendaring information servers desktop workstations mobile devices third-party connectors exist including scalix zarafa zimbra google apps bes connector although supported blackberry limited june 2018 blackberry enterprise server renamed blackberry unified endpoint manager uem prior version 4.0 bes largely two separate codebases 2.2 version domino 3.6 version exchange version 4.0 beyond much code integrated separate distributions still remain supported mail platform beginning version 4.1.2 company introduced new option blackberry enterprise server applications provides secure wireless gateway blackberry devices without requiring device owner possess email account latest major revision version 5.0 released 2009 exchange domino support groupwise added 2010 support growing number multiple devices ownership models operating environments blackberry reinvented enterprise mobility management emm bringing together mobile device management security unified communications applications launching blackberry enterprise service 10 bes 10 represents unification simplification products deliver integrated end-to-end solution mobile device management enables enterprises manage entire device fleet ever types devices brands ownership operating system blackberry 10 ios android type usage security enables enterprises secured end-to-end mobility unified communication enables enterprises integrate voice messaging pim apps social experiences applications enables enterprises manage business productivity personal apps bes 5 consists set windows services carry basic operations system windows services include additional services may installed depending configuration bes also produces set log files operation called bes event log log files include bes v4.0 4.1 system connecting microsoft exchange bes typically deployed managed within enterprise messaging administrators example individuals already responsible managing microsoft exchange lotus domino novell groupwise sometimes dedicated person usually called blackberry bes administrator 2010 rim offering blackberry enterprise server express edition user limitations free minor feature limitations requires data plan bes plan enables near-instant seamless mail calendar integration existing exchange server incoming emails often appear blackberry handset appear outlook owa clients advantage existing outlook web access model blackberry internet service offers.the free download requires license code may delayed due demand january 2007 rim offering free version bes called blackberry professional software free download blackberry website includes 1 user license bpse provides ... wireless communications collaboration solution designed specifically small medium-sized businesses comes one cal client access license meaning one blackberry handheld activated server add 29 additional cals total 30 upgrade blackberry enterprise server time.it available notes exchange environments bps based 4.1 code simplified management tool limited amount patches released bps stuck v 4.1.4 full bes 4.1.6 plus maintenance releases bps missing functions full bes get sp6 onwards rich content email free/busy search remote search blackberry professional software originally called blackberry enterprise server express first appeared version 4 bes full bes express full cost limited maximum number clients 1 cal included free renamed bes express bps still thing later introduced bes express 5 rather different previous bes express bps primarily allows non-bes devices/subscribers full-fat blackberry experience finally cost/feature competitive exchange activesync devices i.e provides full synchronisation read/unread status deletions mail subfolders including sent items contacts calendar without license costs without requirement expensive sometimes extremely difficult acquire bes tariff example orange uk may make difficult supply bes package/provisioning less 10 handsets time operators often extreme difficulty applying bes package handsets/subscribers originally bis supplied groupwise rim offered blackberry enterprise server version 5.0 available blackberry enterprise server resource kit brk collection useful tools resources released expand manageability blackberry enterprise server tools available free download brk release developed certified compatible particular bes service pack version brk includes tools also special support tools available contact support group bes 10 helps enterprises manage different devices unified interface components deliver experience | [
2208,
8122,
6271,
9408,
2892,
3053,
9101,
3152,
6993,
7857,
724,
410,
9341,
2431
] | Test |
3,950 | 2 | GPD_Win:gpd win gpd win windows-based handheld computer equipped keyboard gaming controls x86-based device runs full version windows 10 home device envisioned primarily video game console emulation pc gaming mind capable running x86 windows-based application run within confines device technical specifications first announced october 2015 crowd funded via indiegogo two crowdfunding sites japan china released october 2016 gamepad digital gpd technology company based shenzhen china among products created several handheld video game consoles run android arm architecture instance gpd xd gpd win meant way play pc games pc-based video game console emulators hypervisors vmware virtualbox clients handheld device appeal win intended x86 windows handheld pc console offers far pc emulator gaming support architectures operating systems widely used mobile devices linux android arm hardware proprietary systems gpd widely touts ability device indiegogo page video demonstrations gamepad digital first pitched idea gpd win community october 2015 concept market research planning november december physical design hardware specifications determined march 2016 initial prototypes finished debugged shipped select sources gpd started accepting pre-orders june 2016 several online retailers including indiegogo page pre-order backers offered device discounted price 330 estimated final retail price 499 settling price 330 release initial stated goal 100,000 april 2016 project well exceeded said goal 535 616,000 raised july 2016 august 2016 small batch shipment industry personnel shipped september pre-order promotional pricing ceased gpd started shipping final product october 2016 pre-order backers receiving devices first gpd win runs windows 10 home gpd stated per april 2014 microsoft decision windows free devices screens smaller 9 inches however devices shipped backers windows 10 product key input initial boot setup device unlike windows smartphones win able run x86 windows application also run pc laptops desktops april 2017 several patches available linux kernel allow mostly complete functionality win full desktop gnu/linux like ubuntu.. also ways get android work gpd win guide install make dual-boot https //www.black-seraph.com gpd win full qwerty keyboard includes 67 standard keys 10 expanded function keys gaming controller stylized similar openpandora dragonbox pyra style keyboard controller layout one d-pad two analog sticks four face buttons four shoulder buttons two shoulder gpd win initially intended use intel atom x5-z8500 cherry trail cpu however gpd eventually upgraded intended cpu likely due availability concerns instead win came intel atom x7-z8750 64-bit quad-core cpu base clock speed around 1.60 ghz turbo boost 2.56 ghz graphics processor intel hd graphics integrated gpu base clock speed 200 mhz turbo boost 600 mhz gpd win uses 4gb lpddr3-1600 ram 64gb rom emmc 4.51 single microsd slot officially support maximum 128gb storage however unofficially support microsd card 256gb gpd win 15.5×9.7cm size 5.5-inch 1280×720 720p h-ips multi-directional touch screen 16:9 ratio reinforced gorilla glass 3 audio system consists built-in speaker using realtek alc5645 driver microphone jack supports popular audio video image formats including mp3 mp4 3gp wmv/wma flac avi mov jpg png bmp gpd win 6700mah polymer lithium-ion battery usb c charging interface 5 v/2.5 stated ability play 80 continuous hours music 6–8 hours online video online gaming bluetooth 4.0 802.11 b/g/n/ac 5 ghz 2.4 ghz wifi capable gamepad digital continued support gpd win past release taking user feedback account driver hardware updates january 10 2017 gpd revised gpd win hardware providing fix intel graphics driver stability issues fixing ac charging/boot bug described reviews section improved cooling well improving tactile feedback d-pad buttons keyboard includes software update improves buttons responsiveness makes changes built-in mouse functionality gamepad digital began shipping gpd win backers october 2016 jc torres slashgear gave win 7/10 stating solid technical specs per expected needs ambitious windows 10-based handheld console industry dominated linux-based handhelds well rounded features however also noted inconsistent build quality among models mediocre sound quality loud low ultimately calls exceptional device brad linder liliputing gave quick review noting unit sent review overheating issues benchmarking speaker placement typically caused user cover fingers however noted solid device price niche capable playing surprising amount pc games video game console emulators windows store steam given tablet-pc specs however meant high-end gaming strongly resource-intensive emulation linus sebastian made video review gpd win linustechtips youtube page complimented gaming multitasking capabilities impressed hardware specs hardware design features overall include i/o ports features instance common macbook lament system flaws among shoulder buttons felt cheaply assembled 5.5 720p screen friendly scaling device bug must plugged ac adapter pressing power button order boot otherwise simply loads charging screen must plugged back system boot starts issue since fixed subsequent releases official verdict deciding whether worth price user win made excited prospect umpcs capable near future hardware progresses compared apple first iphone stating revolutionary great concept flaws execution ambitious practical set much better future gamepad digital announced gpd win 2 early 2017 win 2 significant upgrade able run aaa spec games well better video game console emulation intel core m3 cpu intel hd 615 graphics 8gb lpddr3 ram 128gb m.2 solid-state drive well i/o ports gpd win external hardware changes including moving analog knobs outward d-input dropped additional shoulder button shoulder six total price crowdfunding backers 649 tentative retail price 899 indiegogo campaign launched january 15 2018 final release date may 2018 indiegogo campaign saw rapid success far surpassing stated goal within days | [
9732,
582,
6153,
9964,
7983,
1776,
499,
10900,
823,
1624
] | None |
3,951 | 1 | Toad_Data_Modeler:toad data modeler toad data modeler database design tool allowing users visually create maintain document new existing database systems deploy changes data structures across different platforms used construct logical physical data models compare synchronize models generate complex sql/ddl create modify scripts reverse forward engineer databases data warehouse systems toad data modelling software used database design maintenance documentation toad data modeler previously called case studio 2 acquired charonware quest software 2006 quest software acquired dell september 28 2012 october 31 2016 dell finalized sale dell software francisco partners elliott management relaunched november 1 2016 quest software toad products typically 2 releases per year | [
7523,
10340,
8808,
1560,
1037,
7022,
7983,
10413,
11472,
2901,
4630,
4919,
1400,
9177,
5210,
8539,
6780
] | Test |
3,952 | 8 | RSDL:rsdl restful service description language rsdl machine- human-readable xml description http-based web applications typically rest web services language defined michael pasternak work ovirt restful api allows documenting model resource provided service relationships operations parameters must supplied operations specifies parameters mandated describes possible overloads parameters sets rsdl intended simplify reuse web services based http architecture web platform- language-independent aims promote reuse applications beyond basic use web browser humans machines unlike wadl concentrates describing uris stand-alone entry points application invoked different ways require traversing uri components figure uri structure supports uri/headers/body parameters overloads makes human-readable easily consumed humans machines rsdl represents different uris stand-alone entry points application following resource uris one figure methods available given resources resources consumed uri rsdl contains necessary information generate http request easily consumed accessing uri internals uri rsdl contains rel description attributes describing meaning given operation uri humans easily fetch available operations given collection/resource simply locating different descriptors within uri | [
10465,
7592,
10193,
1266,
479
] | Test |
3,953 | 2 | BIOS_parameter_block:bios parameter block computing bios parameter block often shortened bpb data structure volume boot record vbr describing physical layout data storage volume partitioned devices hard disks bpb describes volume partition whereas unpartitioned devices floppy disks describes entire medium basic bpb appear used partition including floppy disks presence often necessary however certain filesystems also make use describing basic filesystem structures filesystems making use bios parameter block include fat12 except dos 1.x fat16 fat32 hpfs ntfs due different types fields amount data contain length bpb different fat16 fat32 ntfs boot sectors detailed discussion various fat bpb versions entries found fat article combined 11-byte data structure start volume boot records immediately preceding bpb ebpb also called fdc descriptor extended fdc descriptor ecma-107 iso/iec 9293 describes fat flexible/floppy optical disk cartridges format standard dos 2.0 bpb fat12 13 bytes format standard dos 3.0 bpb fat12 fat16 19 bytes already supported versions ms-dos 2.11 format standard dos 3.2 bpb fat12 fat16 21 bytes format standard dos 3.31 bpb fat12 fat16 fat16b 25 bytes format pc dos 3.4 os/2 1.0-1.1 extended bpb fat12 fat16 fat16b 32 bytes format dos 4.0 os/2 1.2 extended bpb fat12 fat16 fat16b hpfs 51 bytes format short dos 7.1 extended bios parameter block 60 bytes fat32 format full dos 7.1 extended bios parameter block 79 bytes fat32 format extended bpb ntfs 73 bytes | [
5413,
2055,
1801,
6506,
7244,
8301,
9166,
2193,
9907,
2811
] | Validation |
3,954 | 9 | Java_API_for_XML_Processing:java api xml processing computing java api xml processing jaxp one java xml application programming interfaces api provides capability validating parsing xml documents three basic parsing interfaces addition parsing interfaces api provides xslt interface provide data structural transformations xml document jaxp developed java community process jsr 5 jaxp 1.0 jsr 63 jaxp 1.1 1.2 jsr 206 jaxp 1.3 jaxp version 1.4.4 released september 3 2010 jaxp 1.3 declared end-of-life february 12 2008 dom interface parses entire xml document constructs complete in-memory representation document using classes modeling concepts found document object model dom level 2 core specification dom parser called codice_1 builds in-memory codice_2 representation javax.xml.parsers.documentbuilder created javax.xml.parsers.documentbuilderfactory codice_1 creates instance tree structure containing nodes xml document tree node structure implements interface among many different types tree nodes representing type data found xml document important include javax.xml.parsers.saxparserfactory creates sax parser called saxparser unlike dom parser sax parser create in-memory representation xml document runs faster uses less memory instead sax parser informs clients xml document structure invoking callbacks invoking methods org.xml.sax.helpers.defaulthandler instance provided parser way accessing document called streaming xml codice_4 class implements contenthandler errorhandler dtdhandler entityresolver interfaces clients interested methods defined codice_5 interface called sax parser encounters corresponding elements xml document important methods interface clients provide subclass codice_4 overrides methods processes data may involve storing data database writing stream parsing parser may need access external documents possible store local cache frequently used documents using xml catalog introduced java 1.3 may 2000 stax designed median dom sax interface metaphor programmatic entry point cursor represents point within document application moves cursor forward 'pulling information parser needs different event based api sax 'pushes data application requiring application maintain state events necessary keep track location within document xml stylesheet language transformations xslt allows conversion xml document forms data jaxp provides interfaces package javax.xml.transform allowing applications invoke xslt transformation interface originally called trax transformation api xml developed informal collaboration developers number java xslt processors main features interface two abstract interfaces source result defined represent input output transformation somewhat unconventional use java interfaces since expectation processor accept class implements interface processor choose kinds source result prepared handle practice jaxp processors support three standard kinds source codice_12 codice_13 codice_14 three standard kinds result codice_15 codice_16 codice_17 possibly implementations primitive complete example xslt transformation launching may look like applies following hardcoded xslt transformation following hardcoded xml document result execution | [
9988,
3341,
10526,
6067,
6328,
2106,
3517,
6334,
3518,
3008,
11582,
1095,
3278,
3920,
4959,
4960,
479,
3558,
1128,
3560,
3562,
502
] | Test |
3,955 | 4 | G_Data_Software:g data software g data software ag german software company focuses computer security company founded 1985 headquartered bochum known creators world first antivirus software g data use multiple scanning engines one developed in-house bitdefender engine g data provides several security products targeted home business markets company north american subsidiary located atlanta georgia g data founded bochum germany 1985 company introduced first computer security product anti-virus kit avk 1988 atari st. beside focus security market g data also created software voice recognition invox speech synthesis logox g data computer security products use two scan-engines originally avast bitdefender 2014 release introduced scan-engine closegap replaced avast however upgrade new version painless users weaker computers experienced system slowdowns company promptly solved issue update september 2015 g data launched new messaging app called secure chat used signal protocol application based fork signal source code published gplv3 license g data discontinued service may 2018 features g data solutions support | [
2049,
7809,
131,
5891,
1417,
4746,
7948,
3981,
10637,
4374,
10392,
665,
1052,
156,
6431,
2721,
5924,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8615,
6834,
4403,
9523,
10166,
5305,
7103,
704,
9537,
7362,
10308,
4421,
202,
1355,
... | None |
3,956 | 4 | Goatse_Security:goatse security goatse security goatsec loose-knit nine-person grey hat hacker group specializes uncovering security flaws division anti-blogging internet trolling organization known gay nigger association america gnaa group derives name goatse.cx shock site chose gaping holes exposed slogan june 2010 goatse security obtained email addresses approximately 114,000 apple ipad users led fbi investigation filing criminal charges two group members gnaa several security researchers within membership according goatse security spokesperson leon kaiser gnaa could fully utilize talents since group believed would anyone would take security data published gnaa seriously order create medium gnaa members publish security findings gnaa created goatse security december 2009 order protect web browser inter-protocol exploitation mozilla blocked several ports html forms would normally access january 2010 gnaa discovered mozilla blocks cover port 6667 left mozilla browsers vulnerable cross-protocol scripts gnaa crafted javascript-based exploit order flood irc channels although efnet oftc able block attacks freenode struggled counteract attacks goatse security exposed vulnerability one members andrew auernheimer aka weev posted information exploit encyclopedia dramatica march 2010 goatse security discovered integer overflow vulnerability within apple web browser safari posted exploit encyclopedia dramatica found person could access blocked port adding 65,536 port number vulnerability also found arora icab omniweb stainless although apple fixed glitch desktop versions safari march company left glitch unfixed mobile versions browser goatse security claimed hacker could exploit mobile safari flaw order gain access cause harm apple ipad june 2010 goatse security uncovered vulnerability within website provider 3g service apple ipad united states time signing 3g service ipad retrieves icc-id ipad sim card associates email address provided sign-up order ease log-in process ipad website receives sim card icc-id pre-populates email address field address provided sign-up goatse security realized sending http request valid icc-id embedded inside website website would reveal email address associated icc-id june 5 2010 daniel spitler aka jacksonbrown began discussing vulnerability possible ways exploit including phishing irc channel goatse security constructed php-based brute force script would send http requests random icc-ids website legitimate icc-id entered would return email address corresponding icc-id script dubbed ipad 3g account slurper goatse security attempted find appropriate news source confide leaked information weev attempted contact news corporation thomson reuters executives including arthur siskind security problems june 6 2010 weev sent emails icc-ids recovered order verify claims chat logs period also reveal attention publicity may incentives group contrary first claimed group initially revealed security flaw gawker media notifying also exposed data 114,000 ipad users including celebrities government military tactics re-provoked significant debate proper disclosure security flaws weev maintained goatse security used common industry standard practices said tried good guys jennifer granick electronic frontier foundation also defended tactics used goatse security june 14 2010 michael arrington techcrunch awarded group crunchie award public service first time crunchie awarded outside annual crunchies award ceremony fbi opened investigation incident leading criminal complaint january 2011 raid andrew weev auernheimer house search related investigation auernheimer subsequently detained released bail state drug charges later dropped release bail broke gag order protest dispute legality search house denial access public defender also asked donations via paypal defray legal costs 2011 department justice announced charged one count conspiracy access computer without authorization one count fraud co-defendant daniel spitler released bail november 20 2012 auernheimer found guilty one count identity fraud one count conspiracy access computer without authorization tweeted would appeal ruling alex pilosov friend also present ruling tweeted auernheimer would remain free bail sentencing least 90 days november 29 2012 auernheimer authored article wired magazine entitled forget disclosure hackers keep security holes advocating disclosure zero-day exploit individuals use interests social justice april 11 2014 third circuit issued opinion vacating auernheimer conviction basis venue new jersey improper judges address substantive question legality site access released prison late april 11 may 2011 dos vulnerability affecting several linux distributions disclosed goatse security group discovered lengthy advanced packaging tool url would cause compiz crash september 2012 goatse security credited microsoft helping secure online services | [
1024,
5636,
2579,
4117,
8726,
535,
9761,
4644,
4133,
7734,
575,
1608,
3657,
8779,
4703,
8288,
8292,
10875,
4733,
3711,
8320,
5251,
5764,
2187,
4240,
1688,
2717,
9375,
9904,
9395,
8886,
8386,
3789,
4304,
4310,
4314,
9435,
4830,
3807,
5349,... | Test |
3,957 | 3 | Flash_Gordon_(video_game):flash gordon video game flash gordon video game based comic book character name game published 1986 mastertronic amstrad cpc commodore 64 zx spectrum msx personal computers zzap 64 praised commodore 64 version game reviewers appreciated gameplay variety offered three different sections game quality graphics sound rated 89 overall also 1982 game tie 1980 film released atari 2600 oct. 7 2015 mobile game also based film released infinite runner type game developed boluga limited featured three songs queen flash ’ theme vultan ’ theme football fight flash gordon also 1990 defenders earth video game enigma variations | [
9006
] | Test |
3,958 | 2 | WHQL_Testing:whql testing windows hardware quality labs testing whql testing microsoft testing process involves running series tests third-party hardware software submitting log files tests microsoft review procedure may also include microsoft running tests wide range equipment different hardware different microsoft windows editions products pass whql tests get use certified windows logotype certifies hardware software share testing microsoft ensure compatibility actual logo used depends version microsoft windows device drivers passing whql tests microsoft creates digitally signed certification file included driver installation package allows installation 64-bit versions windows prevents 32-bit versions versions displaying warning message driver certified microsoft see screenshot right new since june 2007 requirement audio fidelity test equipment audio precision sys-2722-a-m system submissions company choose sign drivers rather go whql testing process drivers would qualify certified windows logos would install 64-bit versions windows install without warning message 32-bit versions however install without warning message device drivers passed whql tests also made available download using windows update microsoft update catalog detects new device built-in drivers show found new hardware wizard see screenshot right one way avoid found new hardware wizard popping pre-installing whql certified driver device plugged microsoft longer requires whql testing fee used usd 250 per operating system family fee covers 32-bit x86 64-bit x64 versions submitted simultaneously non-refundable fee include expenses windows server 2008 x64 license necessary running whql tests verisign certificate necessary submitting test results sometimes ambiguity responsible providing drivers supported case industry standard devices used much broadly pc platform microsoft supply drivers example whql bluetooth stereo headsets | [
608,
8161,
11584,
6797,
1656
] | Test |
3,959 | 5 | Matrix_(protocol):matrix protocol matrix open standard lightweight protocol real-time communication designed allow users accounts one communications service provider communicate users different service provider via online chat voice ip videotelephony aims make real-time communication work seamlessly different service providers like standard simple mail transfer protocol email store-and-forward email service technical perspective application layer communication protocol federated real-time communication provides http apis open source reference implementations securely distributing persisting messages json format open federation servers integrate standard web services via webrtc facilitating browser-to-browser applications initial project created inside amdocs building chat tool called amdocs unified communications matthew hodgson amandine le pape amdocs funded development work 2014 october 2017 matrix winner innovation award webrtc 2014 conference expo best show award webrtc world 2015 protocol received praise mixed cautionary notes launched 2014 reviewers noted attempts defining open instant messaging multimedia signalling protocol type difficulties becoming widely adopted—e.g xmpp ircv3—and highlighted challenges involved technological political unclear enough demand among users services interoperate among providers 2015 subsidiary amdocs created named vector creations limited matrix staff moved july 2017 funding amdocs announced cut following weeks core team created uk-based company new vector mainly built support matrix riot development time period multiple calls support community companies build matrix help pay wages least part core team patreon liberapay crowdfunding accounts created core team started video podcast called matrix live keep contributors speed ongoing developments expanded weekly blog format called week matrix interested community members could read submit matrix-related news company created goal offering consultancy services matrix paid hosting matrix servers platform called modular.im generate income early weeks creation matrix team company purism published plans collaborate creation librem 5 phone librem 5 intended matrix native phone default pre-installed messaging caller app use matrix audio video calls instant messaging 2017 kde announced working including support protocol irc client konversation late january 2018 company received investment us 5 million status ethereum based startup april 2018 french government announced plans create instant messaging tool later confirmed matrix team based riot matrix new vector said provide support government endeavour october 2018 private company limited guarantee called matrix.org foundation incorporated serve neutral legal entity development standard february 2019 kde community announced adopt matrix internal communications needs decentralized alternative modern tools like telegram slack discord operate server instance april 2019 matrix.org suffered security breach production servers compromised breach issue matrix protocol directly affect homeservers matrix.org june 2019 matrix protocol beta version 1.0 across apis synapse time reference homeserver matrix foundation officially launched matrix targets use cases like voice ip internet things instant messaging including group communication along longer-term goal generic messaging data synchronization system web protocol supports security replication maintaining full conversation history single points control failure existing communication services integrate matrix ecosystem client software available open-federated instant messaging im voice ip voip internet things iot communication matrix standard specifies restful http apis securely transmitting replicating json data matrix-capable clients servers services clients send data puting ‘ room ’ server replicates data matrix servers participating ‘ room ’ data signed using git-style signature mitigate tampering federated traffic encrypted https signed server ’ private key avoid spoofing replication follows eventual consistency semantics allowing servers function even offline data-loss re-synchronizing missing history participating servers olm library provides optional end-to-end encryption room-by-room basis via double ratchet algorithm implementation ensure conversation data rest readable room participants configured data transmitted matrix visible ciphertext matrix servers decrypted authorized participants room olm megolm expansion olm better suit need bigger rooms libraries subject cryptographic review ncc group whose findings publicly available addressed matrix team review sponsored open technology fund matrix support bridging messages different chat applications matrix rooms bridges programs run server communicate non-matrix servers bridges either acting puppets relays former individual users account visibly posting messages latter bot posts messages non puppeteered user accounts currently official bridges following bridges maintained community riot reference implementation client fractal official client gnome desktop many clients bots bridges servers implementations matrix protocol also exist | [
2050,
5251,
10242,
5382,
10631,
2057,
4746,
8331,
1036,
11408,
3350,
2458,
3228,
10271,
3105,
9511,
1962,
7723,
9519,
1969,
2994,
9909,
8758,
1467,
1083,
2111,
6208,
8640,
1218,
7490,
9281,
2760,
2892,
6993,
11221,
7384,
8283,
4318,
3168,
... | None |
3,960 | 9 | Fortran:fortran fortran formerly fortran derived formula translation general-purpose compiled imperative programming language especially suited numeric computation scientific computing originally developed ibm 1950s scientific engineering applications fortran came dominate area programming early continuous use six decades computationally intensive areas numerical weather prediction finite element analysis computational fluid dynamics computational physics crystallography computational chemistry popular language high-performance computing used programs benchmark rank world fastest supercomputers fortran encompasses lineage versions evolved add extensions language usually retaining compatibility prior versions successive versions added support structured programming processing character-based data fortran 77 array programming modular programming generic programming fortran 90 high performance fortran fortran 95 object-oriented programming fortran 2003 concurrent programming fortran 2008 fortran design basis many programming languages among better known basic based fortran ii number syntax cleanups notably better logical structures changes work easily interactive environment names earlier versions language fortran 77 conventionally spelled all-capitals fortran 77 last version use lowercase letters keywords strictly non-standard capitalization dropped referring newer versions beginning fortran 90 official language standards refer language fortran rather all-caps fortran late 1953 john w. backus submitted proposal superiors ibm develop practical alternative assembly language programming ibm 704 mainframe computer backus historic fortran team consisted programmers richard goldberg sheldon f. best harlan herrick peter sheridan roy nutt robert nelson irving ziller harold stern lois haibt david sayre concepts included easier entry equations computer idea developed j. halcombe laning demonstrated laning zierler system 1952 programmers chess players chosen work ibm thought logical minds draft specification ibm mathematical formula translating system completed november 1954 first manual fortran appeared october 1956 first fortran compiler delivered april 1957 first optimizing compiler customers reluctant use high-level programming language unless compiler could generate code performance comparable hand-coded assembly language community skeptical new method could possibly outperform hand-coding reduced number programming statements necessary operate machine factor 20 quickly gained acceptance john backus said 1979 interview think ibm employee magazine much work come lazy n't like writing programs working ibm 701 writing programs computing missile trajectories started work programming system make easier write programs language widely adopted scientists writing numerically intensive programs encouraged compiler writers produce compilers could generate faster efficient code inclusion complex number data type language made fortran especially suited technical applications electrical engineering 1960 versions fortran available ibm 709 650 1620 7090 computers significantly increasing popularity fortran spurred competing computer manufacturers provide fortran compilers machines 1963 40 fortran compilers existed reasons fortran considered first widely used cross-platform programming language development fortran paralleled early evolution compiler technology many advances theory design compilers specifically motivated need generate efficient code fortran programs initial release fortran ibm 704 contained 32 statements including arithmetic statement reminiscent readily implementable three-way comparison instruction cas compare accumulator storage available 704 statement provided way compare numbers testing difference attendant risk overflow deficiency later overcome logical facilities introduced fortran iv statement used originally optionally give branch probabilities three branch cases arithmetic statement first fortran compiler used weighting perform compile time monte carlo simulation generated code results used optimize placement basic blocks memory sophisticated optimization time monte carlo technique documented backus et al paper original implementation fortran automatic coding system fundamental unit program basic block basic block stretch program one entry point one exit point purpose section 4 prepare section 5 table predecessors pred table enumerates basic blocks lists every basic block basic blocks immediate predecessor flow together absolute frequency basic block link table obtained running program monte-carlo fashion outcome conditional transfers arising if-type statements computed go determined random number generator suitably weighted according whatever frequency statements provided many years later statement effect code treated comment statement since compilers longer kind compile-time simulation similar fate befallen compiler hints several programming languages example c keyword first fortran compiler reported diagnostic information halting program error found outputting error code console code could looked programmer error messages table operator manual providing brief description problem later error handling subroutine handle users error division zero developed nasa incorporated giving users feedback line code error appeared development disk files text editors terminals programs often entered keypunch keyboard onto 80-column punched cards one line card resulting deck cards would fed card reader compiled punched card codes included lower-case letters many special characters special versions ibm 026 keypunch offered would correctly print re-purposed special characters used fortran reflecting punched card input practice fortran programs originally written fixed-column format first 72 columns read twelve 36-bit words letter c column 1 caused entire card treated comment ignored compiler otherwise columns card divided four fields columns 73 80 could therefore used identification information punching sequence number text could used re-order cards stack cards dropped though practice reserved stable production programs ibm 519 could used copy program deck add sequence numbers early compilers e.g. ibm 650 additional restrictions due limitations card readers keypunches could programmed tab column 7 skip column 72 later compilers relaxed fixed-format restrictions requirement eliminated fortran 90 standard within statement field whitespace characters blanks ignored outside text literal allowed omitting spaces tokens brevity including spaces within identifiers clarity example valid identifier equivalent 101010do101i=1,101 valid statement equivalent 10101 101 1 101 zero column 6 treated space 101010do101i=1.101 instead 10101 do101i 1.101 assignment 1.101 variable called do101i note slight visual difference comma period hollerith strings originally allowed format data statements prefixed character count letter h e.g. allowing blanks retained within character string miscounts problem ibm fortran ii appeared 1958 main enhancement support procedural programming allowing user-written subroutines functions returned values parameters passed reference common statement provided way subroutines access common global variables six new statements introduced next years fortran ii would also add support data types early fortran compilers supported recursion subroutines early computer architectures supported concept stack directly support subroutine calls return location often stored one fixed location adjacent subroutine code e.g ibm 1130 specific machine register ibm 360 et seq allows recursion stack maintained software return address stored stack call made restored call returns although specified fortran 77 many f77 compilers supported recursion option burroughs mainframes designed recursion built-in default became standard fortran 90 via new keyword recursive program heron formula reads data tape reel containing three 5-digit integers b c input type declarations available variables whose name starts j k l n fixed-point i.e integers otherwise floating-point since integers processed example names variables start letter name variable must start letter continue letters digits limit six characters fortran ii b c represent sides triangle plane geometry program execution end error code stop 1 otherwise output line printed showing input values b c followed computed area triangle floating-point number occupying ten spaces along line output showing 2 digits decimal point .2 f10.2 format statement label 601 c area triangle standard square root function c input tape reader unit 5 integer input c output line printer unit 6 real output c input error display error output code 1 job control listing c ia ib ic may negative zero c furthermore sum two sides triangle c must greater third side check c using heron formula calculate c area triangle ibm also developed fortran iii 1958 allowed inline assembly code among features however version never released product like 704 fortran fortran ii fortran iii included machine-dependent features made code written unportable machine machine early versions fortran provided vendors suffered disadvantage fortran provided ibm 1401 computer innovative 63-phase compiler ran entirely core memory 8000 six-bit characters compiler could run tape 2200-card deck used tape disk storage kept program memory loaded overlays gradually transformed place executable form described haines article reprinted edited editions anatomy compiler ibm manual fortran specifications operating procedures ibm 1401 executable form entirely machine language rather floating-point arithmetic sub-scripting input/output function references interpreted preceding ucsd pascal p-code two decades ibm later provided fortran iv compiler 1400 series computers starting 1961 result customer demands ibm began development fortran iv removed machine-dependent features fortran ii adding new features data type logical boolean expressions logical statement alternative arithmetic statement fortran iv eventually released 1962 first ibm 7030 stretch computer followed versions ibm 7090 ibm 7094 later ibm 1401 1966 1965 fortran iv supposed compliant standard developed american standards association x3.4.3 fortran working group 1966 1968 ibm offered several fortran iv compilers system/360 named letters indicated minimum amount memory complier needed run letters f g h matched codes used system/360 model numbers indicate memory size letter increment factor two larger time fortran iv started become important educational tool implementations university waterloo watfor watfiv created simplify complex compile link processes earlier compilers perhaps significant development early history fortran decision american standards association american national standards institute ansi form committee sponsored bema business equipment manufacturers association develop american standard fortran resulting two standards approved march 1966 defined two languages fortran based fortran iv served de facto standard basic fortran based fortran ii stripped machine-dependent features fortran defined first standard officially denoted x3.9-1966 became known fortran 66 although many continued term fortran iv language standard largely based fortran 66 effectively became first industry-standard version fortran fortran 66 included release fortran 66 standard compiler vendors introduced several extensions standard fortran prompting ansi committee x3j3 1969 begin work revising 1966 standard sponsorship cbema computer business equipment manufacturers association formerly bema final drafts revised standard circulated 1977 leading formal approval new fortran standard april 1978 new standard called fortran 77 officially denoted x3.9-1978 added number significant features address many shortcomings fortran 66 revision standard number features removed altered manner might invalidate formerly standard-conforming programs removal allowable alternative x3j3 time since concept deprecation yet available ansi standards 24 items conflict list see appendix a2 x3.9-1978 addressed loopholes pathological cases permitted prior standard rarely used small number specific capabilities deliberately removed dimension 10,5 control data corporation computers another version fortran 77 called minnesota fortran mnf designed especially student use variations output constructs special uses commons data statements optimizations code levels compiling detailed error listings extensive warning messages debugs development revised standard succeed fortran 77 would repeatedly delayed standardization process struggled keep rapid changes computing programming practice meantime standard fortran nearly fifteen years fortran 77 would become historically important dialect important practical extension fortran 77 release mil-std-1753 1978 specification developed u.s. department defense standardized number features implemented fortran 77 compilers included ansi fortran 77 standard features would eventually incorporated fortran 90 standard ieee 1003.9 posix standard released 1991 provided simple means fortran 77 programmers issue posix system calls 100 calls defined document allowing access posix-compatible process control signal handling file system control device control procedure pointing stream i/o portable manner much-delayed successor fortran 77 informally known fortran 90 prior fortran 8x finally released iso/iec standard 1539:1991 1991 ansi standard 1992 addition changing official spelling fortran fortran major revision added many new features reflect significant changes programming practice evolved since 1978 standard unlike prior revision fortran 90 removed features appendix b.1 says list deleted features standard empty standard-conforming fortran 77 program also standard-conforming fortran 90 either standard usable define behavior small set features identified obsolescent expected removed future standard functionalities early version features performed new fortran 95 features kept simplify porting old programs may eventually deleted fortran 95 published officially iso/iec 1539-1:1997 minor revision mostly resolve outstanding issues fortran 90 standard nevertheless fortran 95 also added number extensions notably high performance fortran specification number intrinsic functions extended example argument added intrinsic several features noted fortran 90 obsolescent removed fortran 95 important supplement fortran 95 iso technical report tr-15581 enhanced data type facilities informally known allocatable tr specification defined enhanced use arrays prior availability fully fortran 2003-compliant fortran compilers uses include arrays derived type components procedure dummy argument lists function return values arrays preferable -based arrays arrays guaranteed fortran 95 deallocated automatically go scope eliminating possibility memory leakage addition elements allocatable arrays contiguous aliasing issue optimization array references allowing compilers generate faster code case pointers another important supplement fortran 95 iso technical report tr-15580 floating-point exception handling informally known ieee tr specification defined support ieee floating-point arithmetic floating point exception handling addition mandatory base language defined iso/iec 1539-1 1997 fortran 95 language also includes two optional modules together compose multi-part international standard iso/iec 1539 according standards developers optional parts describe self-contained features requested substantial body users and/or implementors deemed sufficient generality required standard-conforming fortran compilers nevertheless standard-conforming fortran provide options must provided accordance description facilities appropriate part standard fortran 2003 officially published iso/iec 1539-1:2004 major revision introducing many new features comprehensive summary new features fortran 2003 available fortran working group iso/iec jtc1/sc22/wg5 official web site article major enhancements revision include important supplement fortran 2003 iso technical report tr-19767 enhanced module facilities fortran report provided sub-modules make fortran modules similar modula-2 modules similar ada private child sub-units allows specification implementation module expressed separate program units improves packaging large libraries allows preservation trade secrets publishing definitive interfaces prevents compilation cascades iso/iec 1539-1:2010 informally known fortran 2008 approved september 2010 fortran 95 minor upgrade incorporating clarifications corrections fortran 2003 well introducing select new capabilities new capabilities include final draft international standard fdis available document n1830 important supplement fortran 2008 iso technical specification ts 29113 interoperability fortran c submitted iso may 2012 approval specification adds support accessing array descriptor c allows ignoring type rank arguments latest revision language fortran 2018 earlier referred fortran 2015 significant revision released november 28 2018 fortran 2018 incorporates two previously published technical specifications additional changes new features include support iso/iec/ieee 60559:2011 latest version ieee floating point standard 2019 hexadecimal input/output implicit none enhancements changes although 1968 journal article authors basic already described fortran old-fashioned fortran use several decades vast body fortran software daily use throughout scientific engineering communities jay pasachoff wrote 1984 physics astronomy students simply learn fortran much exists fortran seems unlikely scientists change pascal modula-2 whatever 1993 cecil e. leith called fortran mother tongue scientific computing adding replacement possible language may remain forlorn hope primary language intensive super-computing tasks astronomy climate modeling computational chemistry computational economics computational fluid dynamics computational physics data analysis hydrological modeling numerical linear algebra numerical libraries lapack imsl nag optimization satellite simulation structural engineering weather prediction many floating-point benchmarks gauge performance new computer processors cfp2006 floating-point component spec cpu2006 benchmarks written fortran apart modern codes computational science generally use large program libraries metis graph partitioning petsc trilinos linear algebra capabilities dune fenics mesh finite element support generic libraries since early 2000s many widely used support libraries also implemented c recently c++ hand high-level languages matlab python r become popular particular areas computational science consequently growing fraction scientific programs also written higher-level languages reason facilities inter-operation c added fortran 2003 enhanced iso/iec technical specification 29113 incorporated fortran 2018 shift popularity programming languages also evident selection applications spec cpu 2000 spec cpu 2006 floating point benchmarks software nasa probes voyager 1 voyager 2 originally written fortran 5 later ported fortran 77. software still written fortran ported c. precise characteristics syntax fortran 95 discussed fortran 95 language features portability problem early days agreed upon standard even ibm reference manual computer companies vied differentiate offerings others providing incompatible features standards improved portability 1966 standard provided reference syntax semantics vendors continued provide incompatible extensions although careful programmers coming realize use incompatible extensions caused expensive portability problems therefore using programs pfort verifier 1977 standard national bureau standards nist published fips pub 69 processors purchased u.s. government required diagnose extensions standard rather offer two processors essentially every compiler eventually least option diagnose extensions incompatible extensions portability problem numerical calculations important take account characteristics arithmetic addressed fox et al context 1966 standard port library ideas therein became widely used eventually incorporated 1990 standard way intrinsic inquiry functions widespread almost universal adoption ieee 754 standard binary floating-point arithmetic essentially removed problem access computing environment e.g. program command line environment variables textual explanation error conditions remained problem addressed 2003 standard large collections library software could described loosely related engineering scientific calculations graphics libraries written c therefore access presented portability problem addressed incorporation c interoperability 2003 standard possible relatively easy write entirely portable program fortran even without recourse preprocessor fortran 5 marketed data general corp late 1970s early 1980s nova eclipse mv line computers optimizing compiler quite good minicomputers time language closely resembles fortran 66 name pun earlier fortran iv fortran v distributed control data corporation 1968 cdc 6600 series language based upon fortran iv univac also offered compiler 1100 series known fortran v. spinoff univac fortran v athena fortran fortran 6 visual fortran 2001 licensed compaq microsoft licensed compaq visual fortran provided visual studio 5 environment interface compaq v6 v6.1 vendors high-performance scientific computers e.g. burroughs control data corporation cdc cray honeywell ibm texas instruments univac added extensions fortran take advantage special hardware features instruction cache cpu pipelines vector arrays example one ibm fortran compilers h extended iup level optimization reordered machine code instructions keep multiple internal arithmetic units busy simultaneously another example cfd special variant fortran designed specifically illiac iv supercomputer running nasa ames research center ibm research labs also developed extended fortran-based language called vectran processing vectors matrices object-oriented fortran object-oriented extension fortran data items grouped objects instantiated executed parallel available sun iris ipsc ncube longer supported machine-specific extensions either disappeared time elements incorporated main standards major remaining extension openmp cross-platform extension shared memory programming one new extension coarray fortran intended support parallel programming transit name reduced version ibm 704 fortran language implemented ibm 650 using translator program developed carnegie late 1950s following comment appears ibm reference manual transit automatic coding system c28-4038 copyright 1957 1959 ibm fortran system designed complex machine 650 consequently 32 statements found fortran programmer reference manual acceptable transit system addition certain restrictions fortran language added however none restrictions make source program written transit incompatible fortran system 704 permissible statements ten subroutines could used one program transit statements limited columns 7 56 punched cards used input output ibm 650 three passes required translate source code language compile statements soap assembly language finally produce object program could loaded machine run program using punched cards data input outputting results onto punched cards two versions existed 650s 2000 word memory drum transit transit ii latter machines equipped indexing registers automatic floating point decimal bi-quinary arithmetic appendix manual included wiring diagrams ibm 533 card reader/punch control panel prior fortran 77 number preprocessors commonly used provide friendlier language advantage preprocessed code could compiled machine standard fortran compiler preprocessors would typically support structured programming variable names longer six characters additional data types conditional compilation even macro capabilities popular preprocessors included flecs iftran mortran sftran s-fortran ratfor ratfiv ratfor ratfiv example implemented c-like language outputting preprocessed code standard fortran 66 despite advances fortran language preprocessors continue used conditional compilation macro substitution one earliest versions fortran introduced '60s popularly used colleges universities developed supported distributed university waterloo watfor based largely fortran iv student using watfor could submit batch fortran job syntax errors program would move straight execution simplification allowed students concentrate program syntax semantics execution logic flow rather dealing submission job control language jcl compile/link-edit/execution successive process es complexities mainframe/minicomputer environment side simplified environment watfor good choice programmers needing expanded abilities host processor e.g. watfor typically limited access i/o devices watfor succeeded watfiv later versions lrltran developed lawrence radiation laboratory provide support vector arithmetic dynamic storage among extensions support systems programming distribution included ltss operating system fortran-95 standard includes optional part 3 defines optional conditional compilation capability capability often referred coco many fortran compilers integrated subsets c preprocessor systems simscript application specific fortran preprocessor modeling simulating large discrete systems f programming language designed clean subset fortran 95 attempted remove redundant unstructured deprecated features fortran statement f retains array features added fortran 90 removes control statements made obsolete structured programming constructs added fortran 77 fortran 90 f described creators compiled structured array programming language especially well suited education scientific computing lahey fujitsu teamed create fortran microsoft .net framework silverfrost ftn95 also capable creating .net code following program illustrates dynamic memory allocation array-based operations two features introduced fortran 90 particularly noteworthy absence loops statements manipulating array mathematical operations applied array whole also apparent use descriptive variable names general code formatting conform contemporary programming style example computes average data entered interactively program average end program average fortran standards committee meeting name fortran 77 chosen satirical technical proposal incorporated official distribution bearing title letter considered harmful proposal purported address confusion sometimes arises letter numeral zero eliminating letter allowable variable names however method proposed eliminate letter character set entirely thereby retaining 48 number lexical characters colon increased 49 considered beneficial would promote structured programming making impossible use notorious statement troublesome statements would also eliminated noted might invalidate existing programs probably non-conforming anyway assumed-length arrays added dispute appropriate character separate upper lower bounds comment examining arguments dr. walt brainerd penned article entitled astronomy vs. gastroenterology proponents suggested using star asterisk others favored colon fortran 77 earlier versions variable names beginning letters i–n default type integer variables starting letters defaulted real although programmers could override defaults explicit declaration led joke fortran god real unless declared integer | [
7684,
7173,
10757,
9224,
3594,
6157,
15,
6160,
9231,
5651,
4630,
10776,
3613,
9245,
3104,
10786,
547,
10280,
45,
5677,
6705,
5172,
5684,
1591,
3642,
2620,
6718,
577,
3650,
3138,
9794,
10819,
1606,
5703,
2120,
8262,
8775,
1611,
9804,
1613,... | Validation |
3,961 | 5 | Veronica_(search_engine):veronica search engine veronica search engine system gopher protocol released november 1992 steven foster fred barrie university nevada reno existence veronica constantly updated database names almost every menu item thousands gopher servers veronica database could searched major gopher menus although original veronica database longer accessible various local veronica installations least one complete rewrite veronica-2 still exist search engine named character veronica lodge archie comics intentional analogy naming archie search engine search engine ftp servers backronym veronica easy rodent-oriented net-wide index computer archives | [
6657,
7943,
9757,
10910,
3110,
10791,
9905,
9908,
4661,
10808,
5054,
10174,
7364,
10057,
10060,
4310,
5078,
6231,
10722,
494,
1520,
9843,
6133,
3191,
5114,
8443,
637
] | Test |
3,962 | 4 | Stonesoft_Corporation:stonesoft corporation stonesoft corporation public company developed sold network security solutions based helsinki finland publicly owned 2013 acquired intel subsidiary mcafee stonesoft business globally regional headquarters atlanta georgia united states sales offices throughout europe middle east china july 2013 mcafee part intel security completed tender offer acquire stonesoft products technologies stonesoft became part mcafee network security business unit stonesoft firewall products renamed mcafee next generation firewall mcafee sold stonesoft forcepoint january 2016 stonesoft started systems integrator nordic regions europe 1994 introduced stonebeat technology creating high availability pair firewalls active-passive configuration 1999 company extended stonebeat patented load balancing clustering technology launching stonebeat fullcluster one first technologies certified check point opsec program 2001 stonesoft expanded product set firewall/vpn space becoming direct competitor check point stonegate firewall/vpn launched march 19 2001 january 2003 company introduced first virtual firewall/vpn solution ibm mainframes 2010 company released information via cert-fi advanced evasion technique aets met skepticism community aets released 2011 eventually verified independent labs researchers 2012 “ stonesoft ” replaced “ stonegate ” product name stonesoft used company product name stonesoft corporation product sales q3 2012 circa 5.6 million euros product sales grew approximately 18 q3 net sales approximately 9.2–9.3 million euros equals growth by14-16 growth lower expected product portfolio includes firewall/vpn devices ips intrusion detection prevention systems ssl vpn systems available hardware appliances software vmware-certified virtual appliances components well third-party devices managed stonesoft management center product portfolio differentiates unique clustering load balancing technologies based company older stonebeat technology originally developed check point firewall-1 stonesoft current product portfolio divided five major categories stonesoft firewall/vpn placed gartner magic quadrant enterprise network firewalls several years currently placed niche quadrant gartner notes stonesoft serves set placements well – usually high availability key leaders otherwise welcome stonesoft firewall/vpn regarded robust performance feature set relative company resources loyal customer base stonesoft ips also placed gartner magic quadrant network intrusion prevention currently “ visionaries ” quadrant also certified icsa labs network intrusion prevention detection category one four vendors consortium achieve certification stonesoft also received favorable reviews nss labs next generation firewall capability 2012 intrusion detection prevention system 2008 helsinki court appeal issued decision case brought stonesoft several members management team court held two members company board directors former ceo gross negligence failed give profit warning due time issue hand discrepancies profitability forecasted company year 2000 interim reports actual state company time reports indicated company sound profitable yet profit warning fact issued district court helsinki originally dismissed claims decision november 15 2006 2010 stonesoft informed public new evasion technique bypass security defences stonesoft defines advanced evasion techniques aets ” virtually limitless quantity unrecognizable conventional detection methods work levels tcp/ip stack work across many protocols protocol combinations. ” according max nyman stonesoft corporation senior marketing manager aets deliver malicious code without detection without leaving trace july 23 2012 stonesoft released free tool enables organisations test network security | [
704,
2721,
9764,
8998,
6153,
779,
939,
6516,
5749,
10772,
7097,
3162,
4475,
1916
] | Train |
3,963 | 5 | MacJournal:macjournal macjournal journaling blogging software originally developed mac os x published dan schimpf software macjournal offers basic text formatting limited page layout features macjournal audience includes diarists bloggers podcasters macjournal supports online blog tools including livejournal blogger movable type wordpress also contains powerful searching capabilities allows keeping multiple nested journals includes password protection aes-256 encryption palm pda syncing macjournal written dan schimpf awarded best mac os x student product 2002 apple design awards initially distributed freeware made shareware 2004 project purchased mariner software schimpf hired continue development 2012 macjournal given editors choice award macworld early 2019 development distribution macjournal reverted mariner software back original developer dan schimpf march 2019 dan schimpf software released version 7.0.0 macjournal freeware may 2019 schimpf continuing active development macjournal releasing occasional beta updates | [
576,
7983
] | Test |
3,964 | 4 | Guided_tour_puzzle_protocol:guided tour puzzle protocol guided tour puzzle gtp protocol cryptographic protocol mitigating application layer denial service attacks aims overcome shortcoming computation-based puzzle protocols clients required compute hard cpu memory-bound puzzles favor clients abundant computational resources guided tour puzzle protocol seen form proof-of-work pow protocol protocol steps guided tour puzzle protocol similar client puzzle protocol clients required complete guided tour puzzle prior receiving service server server suspects currently denial service attack load exceeds pre-defined threshold simply put guided tour puzzle tour needs completed taking multiple round-trips set special nodes called tour guides sequential order called guided tour order tour guides visited unknown client tour guide direct client towards next tour guide client complete tour correct order single tour guide may appear multiple times tour term stop used denote single appearance tour guide tour client knows tour guide next stop completing visit current stop solving guided tour puzzle essentially equal completing guided tour correct order starting first stop client contacts stop receives reply reply contains unique token token reply message current stop used computing address next stop tour guide address first stop tour guide computed using token contained server first reply message informs client start puzzle process client must send token received current stop tour guide next stop tour guide use input token calculation function token received last stop tour guide plus token server puzzle message sent server proof completion tour server efficiently validate two tokens grants service client proving validity guided tour puzzle start formula_1 tour guides set system formula_2 meanwhile server establishes shared secret formula_3 tour guide formula_4 using secure channel formula_5 server keeps short-lived secret formula_6 computing first hash value returned client part puzzle message puzzle message also contains length tour formula_7 used control difficulty guided tour puzzle figure shows example guided tour formula_8 formula_9 details protocol step guided tour puzzle protocol explained following cpu-bound computational puzzle protocols client puzzle protocol mitigate effect denial service attack attacker wants overwhelm server puzzles compute computational resources needs expend however due variation computational powers clients clients strong computational power solve puzzles much higher rate destitute clients unfairly take server resources another crucial shortcoming computational puzzle protocols clients including legitimate clients required perform cpu-intensive computations contribute meaningful service application guided tour puzzle protocol enforces delay clients round trip delays clients requests arrive rate sustainable server advantage using round-trip delays opposed hard computational problems round trip delay small packet determined mostly processing delays queuing delays propagation delays intermediate routers therefore beyond control end hosts clients even attacker abundant computational resources unfairly take advantage poorly provisioned legitimate clients furthermore guided tour puzzle protocol computation required client trivial since length guided tour usually small number order tens lower bandwidth overhead completing guided tour also trivial result clients burdened heavy computations usually required cpu-bound memory bound puzzle protocols | [
2409,
4490,
8731,
519
] | None |
3,965 | 1 | Report_Definition_Language:report definition language report definition language rdl standard proposed microsoft defining reports rdl xml application primarily used microsoft sql server reporting services rdl usually written using visual studio although also third-party tools may also created edited hand text editor sql server reporting services 3rd party reporting frameworks use rdl define charts graphs calculations text images links report objects render variety formats three high-level sections typical rdl file | [
11030,
1366,
479
] | None |
3,966 | 8 | IBM_WebSphere_Application_Server:ibm websphere application server websphere application server software product performs role web application server specifically software framework middleware hosts java-based web applications flagship product within ibm websphere software suite initially created donald f. ferguson later became cto software dell first version launched 1998 websphere application server built using open standards java ee xml web services supported following platforms windows aix linux solaris ibm z/os beginning version 6.1 version 9.0 open standard specifications aligned common across platforms platform exploitation extent takes place done open standard specification line works number web servers including apache http server netscape enterprise server microsoft internet information services iis ibm http server i5/os ibm http server z/os ibm http server aix/linux/microsoft windows/solaris uses port 9060 connection default administration port port 9080 default website publication port case install websphere instances values changed traditional opposed liberty variant websphere application server platform architected distributed computing platform could installed multiple operating system instances collectively referred websphere cell management instances could done management node called deployment manager within cell deployment applications including ability perform rolling updates could pushed subset cell nodes configuration information entire cell many nodes applications deployed applications configured session management details resources etc tracked xml configuration files distributed throughout cell every node product lifetime implementation configuration details went files database-based around v3.5 back files around v5 given distributed install given also management entire cell required management local effects deployment logging configuration etc overall effect security could often override local security configured properly example earlier versions management console option available specify location log file remote node could used read write arbitrary file remote node reason advisable run application server node agent processes root privileges starting v6 security configuration defaulted box secure state even meant enabling desired functions required manual changing defaults originally nodes cell single domain management well application security however v6.1 support multiple security domains introduced ability separate administrative application security many ibm products ibm infosphere datastage use websphere application server base platform infrastructure ibm shipped several versions editions websphere application server first beta versions websphere called servlet express although versioning scheme x.1 x.5 would usually indicate minor release software industry websphere v6.1 v5.1 major releases like websphere v8.5 v3.5 websphere liberty introduced websphere application server v8.5 originally referred websphere liberty profile version numbering scheme rest 2016 ibm introduced new fix pack numbering scheme liberty reflect move continuous delivery liberty single support stream v8.5.5.9 liberty numbering scheme rebased starting 16.0.0.2 reflect year quarter liberty fixpack release common level websphere liberty distributed part version 8.5 version 9.0 websphere application server liberty continuous delivery model introduced allow new capabilities features delivered frequent basis.. websphere application server v9.0 adds java ee 7 java se 8 default also provides configured run java se 7 brought application server traditional level java ee websphere liberty offered since 2015 first release made simultaneously available on-premises offering websphere service ibm cloud.. websphere liberty increasingly focus new cloud native applications liberty 16.0.0.2 version liberty included version 9.0.0.0 liberty 16.0.0.3 adds support new microprofile programming model simplifies cloud native application development using standard java ee technologies flexible access websphere liberty provided additional distributions docker image cloud foundry buildpack september 2017 ibm moved ongoing development liberty new open source project called open liberty open liberty source liberty runtime websphere application server distributions open liberty supported openliberty.io community ibm provides commercial support liberty websphere application server websphere application server v8.5.5 includes significant enhancements liberty profile including support java se 8 full java ee 7 compliance since v8.5.5.6 websphere intelligent management capabilities websphere liberty support java ee enabled configuration sets features different sets library features available edition liberty core edition includes liberty features required java ee webprofile editions add liberty features full java ee 7 network deployment edition adds liberty features intelligent management beyond z/os edition adds liberty features enable z/os platform capabilities websphere application server v8.5 offers java ee 6 java se 6 default v8.0 also provides configured run java se 7 primary new capabilities v8.5 liberty profile websphere application server intelligent management features liberty profile websphere application server included commercial editions server providing lightweight profile server web mobile osgi applications release functional subset full profile websphere application server development production use install size 50 mb startup time around 3 seconds new xml-based server configuration treated development artifact aid developer productivity server capabilities engaged set features defined server configuration features added removed dynamically internal use osgi services new model provided moving applications pipeline development production packaged server complete archive server server configuration application unzip deploy centralized managed install optionally available job manager component websphere application server network deployment edition intelligent management capability added network deployment z/os editions websphere application server integrates operational features previously available separate websphere virtual enterprise wve offering application editioning server health management dynamic clustering intelligent routing compute grid also included network deployment z/os editions websphere application server previously separately priced websphere xd compute grid feature scheduling managing java batch workloads version released september 9 2008 java ee 5 compliant application server following flagship features introduced websphere application server version 7 flexible management facilitates administration large number websphere application server base edition network deployment topologies might geographically distributed business-level application used managing application artifacts independent packaging programming models property based configuration feature simplifies experience automating administration administrator update websphere application server version 7 configuration using simple property file general availability websphere application server v7 websphere application server v8 2011 number additional capabilities made available v7 form feature packs optionally added v7 install feature pack content quality support main release content purpose feature pack deliver new innovation next major release following feature packs provided websphere application server v7 version released june 30 2006 september 11 2012 ibm extended end service v6.1 full year september 30 2013 announced new version-to-version migration incentives assistance java ee 1.4 compliant application server includes following function support ejb 3.0 technology support webservices standards provided ejb feature pack webservices feature packs respectively function feature packs folded main product version 7 functions webservices feature pack include version 6 functionality previously found websphere business integration server foundation wbisf moved new ibm websphere process server function moved editions express version released january 16 2004 j2ee 1.4 compliant application server version released november 19 2002 j2ee 1.3 certified application server major rewrite v3/v4 codebase first time websphere application server coded common codebase across deployment platforms intel x86 mainframe substantially code database-based configuration repository replaced replication xml file-based configuration repository service called deployment manager master copy cell configuration nodes file needed copied master server whenever changed v5 also included miniature version mq 5.3 called embedded java message service jms server j2ee 1.2 certified application server inherited database-based configuration model v3.x single-server edition already used xml datastore websphere 3.5 first widely used version websphere ibm adds javabean corba linux support comes two editions standard edition se advanced edition ae initial release june 1998 primarily java servlet engine websphere application server security model based services provided operating system java ee security model websphere application server provides implementations user authentication authorization mechanisms providing support various user registries authentication mechanisms supported websphere java ee application servers | [
9229,
7695,
10271,
2596,
44,
5677,
10800,
2106,
6714,
595,
8792,
2658,
7784,
9838,
11376,
2168,
3705,
11386,
6284,
6797,
8350,
3746,
3237,
6311,
7338,
9387,
11439,
9397,
6334,
6860,
225,
1250,
4837,
6379,
5356,
2287,
5872,
9455,
3323,
435... | Validation |
3,967 | 4 | Prefix_WhoIs:prefix whois prefix whois open source project develops operates free whois-compatible framework stockpiling querying various routing registry information prefix whois uses global bgp routing data learned many isp backbone routers information sources also supported imported data every regional internet registry afrinic apnic arin lacnic ripe geocoding information project mentioned number popular network security network engineering books articles many public servers around world operate mirrors prefix whois making information generally available worldwide service may used client using standard whois protocol dns address whois.pwhois.org resolves prefix whois server nearest client based anycast dns several client software packages available prefix whois commercial vendors include free open source utilities whob layer four traceroute prefix whois project distributes c php libraries direct access prefix whois servers http simplequery interface also available software made available custom license | [
3755,
8204,
6229
] | Test |
3,968 | 4 | Small_subgroup_confinement_attack:small subgroup confinement attack cryptography subgroup confinement attack small subgroup confinement attack cryptographic method operates large finite group attacker attempts compromise method forcing key confined unexpectedly small subgroup desired group several methods found vulnerable subgroup confinement attack including forms applications diffie–hellman key exchange dh-eke | [] | Test |
3,969 | 4 | Long-term_support:long-term support long-term support lts product lifecycle management policy stable release computer software maintained longer period time standard edition term typically reserved open-source software describes software edition supported months years longer software standard edition short term support sts term distinguishes support policy software standard edition sts software comparatively short life cycle may afforded new features omitted lts edition avoid potentially compromising stability compatibility lts release lts applies tenets reliability engineering software development process software release life cycle long-term support extends period software maintenance also alters type frequency software updates patches reduce risk expense disruption software deployment promoting dependability software necessarily imply technical support beginning long-term support period software developers impose feature freeze make patches correct software bugs vulnerabilities introduce new features may cause regression software maintainer either distributes patches individually packages maintenance releases point releases service packs conclusion support period product either reaches end-of-life receives reduced level support period time e.g. high-priority security patches upgrading software decision-maker might consider risk cost upgrade software developers add new features fix software bugs accidentally introduce new bugs break old functionality flaw occurs software called regression two ways software publisher maintainer reduce risk regression release major updates less frequently allow users test alternate updated version software lts software applies two risk-reduction strategies lts edition software published parallel sts short-term support edition since major updates sts edition published frequently offers lts users preview changes might incorporated lts edition changes judged sufficient quality using older versions software may avoid risks associated upgrading may introduce risk losing support old software long-term support addresses assuring users administrators software maintained specific period time updates selected publication carry significantly reduced risk regression maintainers lts software publish updates either low risk reduce risk security patches patches lts software published understanding installing less risky installing table lists specific lts version addition normal release cycle many projects centos provide long period support every release | [
5636,
10756,
10255,
1553,
6162,
2075,
4636,
9245,
5663,
546,
9253,
3114,
9771,
5677,
7223,
6718,
3654,
5703,
1101,
10317,
1107,
4192,
10851,
9320,
1646,
5747,
5755,
11388,
7810,
132,
6276,
9351,
4755,
10392,
11418,
3229,
4777,
692,
2236,
... | Test |
3,970 | 3 | MS-DOS_Editor:ms-dos editor ms-dos editor commonly called edit edit.com character-based text editor comes ms-dos since version 5 32-bit versions microsoft windows superseded edlin standard editor earlier versions ms-dos 6.22 actually qbasic running editor mode dos 7 windows 95 qbasic removed ms-dos editor became standalone program editor sometimes used substitute notepad windows 9x notepad limited small files editor edit files 65,279 lines approximately 5 mb size ms-dos versions limited approximately depending much conventional memory free editor launched typing run command dialog windows typing codice_1 command-line interface edit still included later versions windows windows xp windows vista 32 bit windows 7 32 bit windows 8 32 bit 16-bit dos application directly run 64-bit windows versions edit version 1.0 appeared ms-dos ibm pc dos 5.00 os/2 windows nt 4.0 early chicago betas included version editors rely qbasic 1.0 version open one file limit dos memory although editor open one file also open quick help file split window edit version 1.1 appeared ms-dos 6.0 new features added editor main difference qbasic 1.1 used show ms-dos 6.0 help version available also versions windows 9x although files unchanged 6.22 renaming help.hlp edit.hlp allows one access dos 6 help system inside editor including cut paste help system open file pc dos 6 include edit command instead dos e editor upgraded support mouse menus version 7.0 edit version 2.0 appeared windows 95 appears windows 2000 later using qbasic still 16-bit dos program included 64-bit version windows directly work one version edit run dos 3.30 higher requires 80286 nec v20/v30 processor higher run 8088 8086 processor cause system stop responding freedos version developed shaun raven licensed gpl ms-dos editor uses text user interface color scheme adjusted multiple document interface version 2.0 included dos 7 windows 9x open 9 files time earlier versions included dos 5 6 limited one file screen split vertically two panes used view two files simultaneously different parts file also open files binary mode fixed number characters displayed per line newlines treated like character mode shows characters hexadecimal characters 0-9 a-f editor converts unix newlines dos newlines mouse support features added 1995 version 2.0 release windows 95 | [
8834,
6148,
10631,
2568,
6281,
6797,
3856,
8976,
6674,
4248,
8729,
4001,
4771,
292,
7847,
808,
7983,
7088,
10033,
10289,
9907,
9780,
9525,
1978,
7356,
5437,
7486,
10428,
960,
8517,
1741,
4174,
9166,
1750,
9946,
10727,
6506,
8301,
9709,
16... | Validation |
3,971 | 5 | Vivaldi_(web_browser):vivaldi web browser vivaldi freeware cross-platform web browser developed vivaldi technologies company founded opera software co-founder former ceo jon stephenson von tetzchner tatsuki tomita officially launched april 6 2016 although intended general users first foremost targeted towards technically-inclined users well former opera users disgruntled transition presto layout engine chromium-based browser resulted loss many iconic features despite also chromium-based vivaldi aims revive features presto-based opera proprietary modifications march 2019 vivaldi 1.2 million active monthly users vivaldi began virtual community website replaced opera shut opera software march 2014 jon stephenson von tetzchner angered decision believed community helped make opera web browser tetzchner launched vivaldi community—a virtual community focused providing registered users discussion forum blogging service numerous practical web services—to make opera closure later january 27 2015 vivaldi technologies launched—with community mind—the first technical preview vivaldi web browser name comes italian composer antonio vivaldi according one creators easy name remembered understood worldwide vivaldi minimalistic user interface basic icons fonts color scheme changes based background design web page visited browser also allows users customize appearance ui elements background color overall theme address bar tab positioning start pages according ceo jon von tetzchner vivaldi vast unique customizability huge part browser caters experienced users vivaldi features ability stack tile tabs annotate web pages add notes bookmarks furthermore users place digital bookmarks speed dial page quick access harness quick commands search bookmarks browsing history open tabs settings vivaldi built around based web technologies html5 node.js react.js numerous npm modules technical preview 4 vivaldi also supports numerous mouse gestures actions like tab switching keyboard activation vivaldi also set chromeless ui gives users screen real-estate ability focus single page without distractions accommodate users prefer use large number tabs time vivaldi supports hibernation individual tabs tab stacks freeing resources user actively use tabs chromium-based browser vivaldi use many browser extensions developed google chrome users install directly chrome web store work properly vivaldi exception user interface customizations vivaldi interface quite different chrome company hopes integrate email client m3 future version vivaldi developers planning release extension platform vivaldi statcounter estimates vivaldi 0.05 market share desktop browsers december 2018 ars technica reviewer scott gilbertson wrote version 1.0 april 2016 praised innovative features tab handling noting likely remain niche browser see widespread uptake october 2018 gilbertson gave version 2.0 positive review stated vivaldi usual browser would hard put go back browser without unique features | [
513,
6657,
9736,
2579,
6171,
2076,
9757,
7713,
3109,
10791,
9768,
9770,
559,
4661,
3639,
10808,
3643,
9275,
64,
5707,
10834,
5205,
6231,
8281,
6747,
6237,
1642,
9834,
9841,
4722,
115,
9843,
119,
4728,
637,
1664,
2182,
11418,
10910,
8351,
... | Test |
3,972 | 4 | Physical_information_security:physical information security physical information security intersection common ground physical security information security primarily concerns protection tangible information-related assets computer systems storage media physical real-world threats unauthorized physical access theft fire flood typically involves physical controls protective barriers locks uninterruptible power supplies shredders information security controls physical domain complement logical domain encryption procedural administrative controls information security awareness compliance policies laws asset inherently valuable yet vulnerable wide variety threats malicious e.g theft arson accidental/natural e.g lost property bush fire threats materialize exploit vulnerabilities causing incidents likely adverse impacts organizations individuals legitimately utilize assets varying trivial devastating effect security controls intended reduce probability frequency occurrence and/or severity impacts arising incidents thus protecting value assets physical security involves use controls smoke detectors fire alarms extinguishers along related laws regulations policies procedures concerning use barriers fences walls doors obvious physical security controls designed deter prevent unauthorized physical access controlled area home office moats battlements mediaeval castles classic examples physical access controls bank vaults safes information security controls protect value information assets particularly information i.e intangible information content data intellectual property knowledge etc also computer telecommunications equipment storage media including papers digital media cables tangible information-related assets computer power supplies corporate mantra people greatest assets literally true sense so-called knowledge workers qualify extremely valuable perhaps irreplaceable information assets health safety measures even medical practice could therefore also classed physical information security controls since protect humans injuries diseases death perspective exemplifies ubiquity value information modern human society heavily reliant information information importance value deeper fundamental level principle subcellular biochemical mechanisms maintain accuracy dna replication could even classed vital information security controls given genes 'the information life malicious actors may benefit physical access information assets include computer crackers corporate spies fraudsters value information assets self-evident case say stolen laptops servers sold-on cash information content often far valuable example encryption keys passwords used gain access systems information trade secrets intellectual property inherently valuable valuable commercial advantages confer credit card numbers used commit identity fraud theft furthermore loss theft damage computer systems plus power interruptions mechanical/electronic failures physical incidents prevent used typically causing disruption consequential costs losses unauthorized disclosure confidential information even coercive threat disclosure damaging saw sony pictures entertainment hack end 2014 numerous privacy breach incidents even absence evidence disclosed personal information actually exploited fact longer secured control rightful owners potentially harmful privacy impact substantial fines adverse publicity/reputational damage noncompliance penalties impacts flow serious privacy breaches best avoided regardless cause several ways obtain information physical attacks exploitations examples described dumpster diving practice searching trash hope obtaining something valuable information carelessly discarded paper computer disks hardware sometimes attackers simply go building take information need frequently using strategy attacker masquerade someone belongs situation may pose copy room employee remove document someone desk copy document replace original leave copied document individuals pretending building maintenance may gain access otherwise restricted spaces might walk right building trash bag containing sensitive documents carrying portable devices storage media left desks perhaps memorized password sticky note stuck someone computer screen called colleague across open office literally shredding paper documents prior disposal commonplace physical information security control intended prevent information content media falling wrong hands digital data also shredded figurative sense either strongly encrypted repeatedly overwritten realistic probability information ever retrieved even using sophisticated forensic analysis constitutes physical information security control since purged computer storage media freely discarded sold without compromising original information content two techniques may combined high-security situations digital shredding data content followed physical shredding incineration destroy storage media many organizations restrict physical access controlled areas offices requiring people present valid identification cards proximity passes physical keys provided access tokens devices strictly controlled secure making hard unauthorized people obtain fabricate use associated electronic mechanical locks doors walls barriers etc sufficiently strong complete unauthorized physical entry controlled areas prevented protecting information assets within likewise office workers generally encouraged required obey clear desk policies protecting documents storage media including portable devices tidying away sight perhaps locked drawers filing cabinets safes vaults according risks requiring workers memorize passwords rather writing place might observed onlooker maybe colleague visitor intruder example risk avoidance computers plainly need electrical power hence vulnerable issues power cuts accidental disconnection flat batteries brown-outs surges spikes electrical interference electronic failures physical information security controls address associated risks include fuses no-break battery-backed power supplies electrical generators redundant power sources cabling remove warning signs plugs surge protectors power quality monitoring spare batteries professional design installation power circuits plus regular inspections/tests preventive maintenance ironic so-called uninterruptible power supplies often lead power interruptions inadequately specified designed manufactured used managed maintained illustration failure critical physical control | [
6494,
1475,
8997,
2534,
11368,
7369,
11695,
7090,
9086,
10195,
7606,
5373,
2558,
831
] | Test |
3,973 | 3 | Westmere_(microarchitecture):westmere microarchitecture westmere formerly nehalem-c code name given 32 nm die shrink nehalem sharing cpu sockets westmere included intel hd uhd iris graphics nehalem first westmere -based processors launched january 7 2010 intel corporation westmere architecture available intel brands core i3 core i5 core i7 pentium celeron xeon westmere feature improvements nehalem reported successor nehalem westmere sandy bridge | [
3459,
5380,
8325,
9095,
5386,
9611,
4108,
5901,
6924,
9741,
5649,
7313,
5523,
6804,
8851,
4886,
9111,
3352,
11417,
5883,
2088,
10669,
9391,
9649,
10675,
4276,
1461,
10548,
2237,
5309,
8125,
8126,
6339,
5444,
9541,
6730,
1998,
2638,
977,
5... | Test |
3,974 | 2 | Printer_driver:printer driver computers printer driver print processor piece software computer converts data printed format printer understand purpose printer drivers allow applications printing without aware technical details printer model printer drivers confused print spoolers queue print jobs send successively printer unix unix-like systems linux os x use cups short common unix printing system modular printing system unix-like computer operating systems allows computer act print server computer running cups host accept print jobs client computers process send appropriate printer printer drivers typically implemented filters usually named front end printing system printer spoolers constitute back end backends also used determine available devices startup backend asked list devices supports information available dos supports predefined character devices codice_1 codice_1 codice_1 codice_1 associated parallel printers supported system similarly serial printers used codice_1 codice_1 codice_1 codice_1 codice_1 users use commands like example codice_10 print content file printer contents transferred printer without interpretation therefore method printing either files already stored corresponding printer language generic text files without simple line-oriented formatting dos also provides dynamically loadable print spooler named print well optional support support screen captures also graphics mode graphics optional character device driver printer.sys loaded dos provides code page switching support also associated printers—different types dot matrix ink jet printers supported default beyond system-wide printer-specific drivers use application level ms-dos/pc dos dr-dos however script command loaded run background order intercept convert printer output applications postscript support ps-capable printers also applications supporting directly order support complex printing different models printers application e.g word processor may shipped printer drivers essentially descriptions printer escape sequences printers supplied drivers popular applications addition possible applications include tools editing printer description case ready driver days dos widely used many printers emulation modes epson fx-80 ibm proprinter commands many recent laser printers also emulation modes hp pcl hp laserjet postscript printers work dos appears also compatible windows 3.x microsoft windows systems printer drivers make use gdi unidrv pscript-based xps xpsdrv programs use standard apis draw text pictures screen paper printers use gdi natively commonly referred winprinters considered incompatible operating systems although software printfil make printers work dos prompt within windows win32 apis also allow applications send data directly spooler bypassing printer driver however applications actually use option printer driver usually located c \windows\system32\driverstore\filerepository folder windows machine original amigaos 1.3 supported printers standard series drivers stored required path devs printers printer drivers stored directory covered standard printers 1985-1989 circa included epson fx standard driver xerox 4020 hp etcetera amiga printer driver communicate though standard amiga printer.device default standard hardware device amiga dealing printers standard parallel.device controlled parallel port driver would control printer amiga printer drivers innovation time spared users individually configuring applications ability print 4096 colors use printer preferences program printers could connected serial port well amiga also support virtual device prt refer printer.device example command copy file prt caused file printed directly bypassing parallel.device default printer driver amiga used ansi escape codes special ones defined various printer manufacturers way every application amiga could use standard set control sequences would n't need know printer actually connected printer driver translated standard sequences special sequences certain printer understands amiga internal function pwrite printer.device writes 'length bytes directly printer function generally called printer drivers send buffer printer number buffers decided persons created driver amiga lacked standard printer spooler since amigaos 2.0 standard printer.device changed control various printers time printer preferences divided three main panels prefs printer selects main printer basic elements print spacing paper size printergfx controlled features like dithering scaling printerps controlled postscript printers printer drivers surprisingly remained almost workbench 1.3 4096 limits fact led amiga users prefer third party printer systems drivers like turboprint printstudio introduced recent drivers also featured functioning printer spooler amiga featured 16 millions colors printing morphos uses special version turboprint pilot recent printers many amiga programs like dtp programs pagestream featured past printer drivers usb printers automatically recognized poseidon usb stack stack capable detecting usb device class printers still require driver controlled addition install-able computer drivers could also present embedded firmware printers made available networking protocol e.g ipp embedded firmware printer could thus eliminate need install driver computer accepting print data general purpose format e.g pdf via networking protocol despite efforts standardize various stages printing pipeline printer interfaces largely still proprietary manufacturer-specific hence nature functions performed drivers vary nonetheless based function performed drivers classified follows drivers convert print data one general purpose format e.g pdf dvi etc another general purpose format e.g ps examples include ghostscript etc drivers convert print data one format e.g ps final device-specific format printer hardware process create print drivers act last stage delivering print job printer drivers likely embedded printer firmware examples manufacturer specific formats include install-able drivers packaged various formats ppd popular packaging format drivers accept postscript data pdf data input due dominance select operating systems operating system–driver interface standardized driver–printer interfaces hence standardization packaging formats drivers actual functions performed drivers | [
8832,
10885,
5384,
7561,
6797,
7696,
5397,
9258,
2221,
6830,
1073,
8628,
823,
9790,
576,
7626,
3916,
10960,
1877,
4836,
10352,
5492,
3323
] | Test |
3,975 | 6 | NTFS-3G:ntfs-3g ntfs-3g open-source cross-platform implementation microsoft windows ntfs file system read-write support ntfs-3g often uses fuse file system interface run unmodified many different operating systems runnable linux freebsd netbsd opensolaris illumos beos qnx wince nucleus vxworks haiku morphos minix macos openbsd licensed either gnu general public license proprietary license partial fork ntfsprogs active maintenance development ntfs-3g introduced one senior linux ntfs developers szabolcs szakacsits july 2006 first stable version released 2007-02-21 version 1.0 developers ntfs-3g later formed company tuxera inc. develop code ntfs-3g free community edition tuxera ntfs proprietary version ntfs-3g supports operations writing files files size created modified renamed moved deleted ntfs partitions transparent compression supported well system-level encryption support modify access control lists permissions available ntfs partitions mounted using filesystem userspace fuse interface according man page ntfs-3g supports hard links symbolic links ntfs-3g supports partial ntfs journaling unexpected computer failure leaves file system inconsistent state volume repaired 2009 volume unclean journal file recovered mounted default ‘ norecover ’ mount option used disable behavior benchmarks show driver performance via fuse comparable filesystems drivers in-kernel provided cpu powerful enough embedded old systems high processor usage severely limit performance | [
6797,
2193,
788,
5397,
8857,
9762,
8228,
7983,
11568,
1844,
823,
1978,
321,
3404,
4815,
5969,
10851,
1509,
5612,
9335,
2045
] | Test |
3,976 | 2 | System_V_printing_system:system v printing system printing subsystem unix system v one several standardized systems printing unix typical commercial system v-based unix versions solaris sco openserver system running print architecture could traditionally identified use user command primary interface print system opposed bsd command though systems provide alias typical user commands available system v printing system unix programming model device files special files act access points peripheral devices printers example first line printer unix system might represented file device directory i.e using file metaphor document could printed copying file onto device worked well enough case one printer per user model scale well multiple users share one printer solution create queue spool documents printed use daemon system process manage queue send documents printer order arrived system command send documents queue first introduced 1973 version 4 unix release system v release 4 suite utilities grown include commands canceling print jobs moving jobs among queues enabling disabling queues enabling disabling job scheduler daemon status reports print system command handled queue documents printed 20 different options controlled appearance document place queue even handled email notification user document finished printing command returned job id could used cancel lpstat commands remove job queue check progress respectively system considered quite complex set administer uses expected use three commands distribution influential unix system v interface implementation became standard users control printers command included requirement posix.2 standard command name appeared subsequent lpr lprng cups printing systems svr4 derivates like sco unix command simply alias command used bsd-based system late 1996 running linux stated linux printing software consists unix standard lp lpr software 1999 support lp waning third edition simply stated lpr command prints document linux 2003 survey debian mandrake red hat slackware suse distributions showed running combination lpr lprng cups original system v printing system remains proprietary however solaris print system heavily modified original released open source software part opensolaris project common unix printing system emulates system v berkeley print architectures interface level though internal architecture different introduction simplified configuration system lp author peter gray university wollongong described several weaknesses version shipping then-current solaris operating system version 2 result gray observed many administrators choose simply run old lpr/lpd system svr4 boxes | [
515,
9733,
9735,
5256,
521,
6281,
6664,
11663,
4369,
5397,
2198,
6812,
7196,
4001,
4002,
6138,
10149,
2599,
7847,
8360,
8236,
4398,
2995,
823,
1336,
8504,
7356,
9151,
451,
1987,
965,
2245,
8517,
9542,
11075,
5706,
3659,
7626,
1741,
8522,
... | Test |
3,977 | 3 | Macintosh_Quadra_700:macintosh quadra 700 macintosh quadra 700 personal computer designed manufactured sold apple computer inc. october 1991 march 1993 introduced alongside quadra 900 first computers quadra series using motorola 68040 processor also first computer apple housed mini-tower form factor 1991 becoming popular alternative standard desktop-on-monitor cases common 1980s quadra 700 originally list price 5,700 usd dropped 4,700 base model time replacement macintosh quadra 800 went sale early 1993 centris 650 also introduced around time offered incrementally performance quadra 700 desktop-style case price point closer 3,000 form factor quadra 700 case largely popular macintosh iicx macintosh iici models made possible users models upgrade powerful quadra 700 users sometimes placed older case vertically mini-tower orientation quadra 700 recognized apple logo model name printed vertical orientation iicx iici designed allow rubber feet moved side vertical orientation well cpu motorola 68040 25 mhz clock oscillator runs 50 mhz replacing faster oscillator 74 mhz results performance increase memory quadra 700 could upgraded 68 megabytes ram 25 mhz processor made useful computer scientific design work expansion two nubus slots pds slot processor upgrades apple manufacturers sold 700 powerpc 601 accelerator cards came along 1994 storage 80 160 mb hard disks available launch faster 230 mb unit became available mid-1993 quadra 950 introduced video like iici 700 integrated graphics built system board unlike earlier model uses dedicated vram video memory onboard video came 512 kilobytes vram soldered motherboard supported resolutions 1152x870 video memory expandable 2 megabytes via 6 256-kilobyte 100 ns vram simms vram simm expansion slots motherboard expanding video memory 2 megabytes allowed 24-bit millions color resolutions 832x624 sound sound 8-bit stereo ports i/o available dual serial ports aaui ethernet port mic db-25 scsi connector quadra 700 along 900 first macintosh models built-in support ethernet networking operating system system 7.0.1 included standard earliest macintosh model support mac os 8 | [
7697,
4114,
6165,
11289,
7706,
8222,
1057,
6183,
1576,
4139,
7211,
8253,
1090,
4180,
10838,
10840,
3167,
9312,
8806,
6258,
10357,
4220,
10365,
10878,
6783,
4741,
7305,
8842,
6283,
7824,
147,
7830,
6807,
4258,
7842,
7844,
3241,
7869,
8893,
... | None |
3,978 | 2 | Usage_share_of_operating_systems:usage share operating systems usage share operating systems percentage computing devices run operating system particular time figures necessarily estimates data operating system share difficult obtain reliable primary sources agreed methodologies collection personal computing platform area smartphones watches google android dominates 2.5 billion users mobile phone operating systems include apple ios kaios series 30+ area desktop laptop computers microsoft windows generally 70 markets 78 globally apple macos around 14 google chromeos 3 north america linux around 2 figures vary somewhat different markets depending gathered android battling windows used rank often popular past global scale ios never managed close half popularity windows however mobile operating systems android plus ios majority use non-mobile windows e.g macos close two years mostly android continues popular windows still countries continents mobile devices never anywhere near popular continents countries become mobile-majority still including ireland ios alone popular windows later android alone europe populous countries populous continent asia whole e.g china india excluding e.g russia still mobile-majority 56.37 public internet servers linux generally counted dominant powering twice number hosts windows server trailed many smaller players including traditional mainframe oses supercomputer field completely dominated linux 100 top500 running os according gartner following worldwide device shipments referring wholesale operating system includes smartphones tablets laptops pcs together shipments stores mean sales consumers necessarily year shipment therefore suggesting numbers indicate popularity and/or usage could misleading smartphones sell higher numbers traditional pcs also whole lot dollar value gap projected widen well double 2015 earlier gartner reports year worldwide pc shipments declined fourth consecutive year started 2012 launch tablets 8 decline pc sales 2015 including cumulative decline sales previous years gartner includes macs running macos pc sales numbers e.g ipads androids individually slight increase sales 2015 28 may 2015 google announced 1.4 billion android users 1 billion google play users active month changed 2 billion monthly active users may 2017 27 january 2016 paul thurrott summarized operating system market day apple announced one billion devices microsoft backed away goal one billion windows 10 devices three years middle 2018 reported 26 september 2016 windows 10 running 400 million devices march 2019 800 million late 2016 android e.g samsung smartphones explained killing apple ios market share i.e declining sales smartphones relatively also number units whole market increasing 9 may 2019 biggest smartphone companies market share samsung huawei apple respectively gartner press release said apple continued downward trend decline 7.7 percent second quarter 2016 decline based absolute number units underestimates relative decline market increasing along misleading 1.7 percent point decline point decline means 11.6 relative decline 14.6 12.9 although units sold apple declining almost vendor making profit smartphone sector hardware sales alone q3 2016 example captured 103.6 market profits mobile phone owners toothbrush owners mobile phones fastest growing technology history billion active mobile phones world people many 10 billion sold far less half still use explained fact people one extra work phones operating system fraction smartphones os capable running modern applications currently 3.1 billion smartphones tablets use across world tablets small fraction total generally running operating systems android ios latter popular tablets 2019 announced variant ios called ipados specifically ipad tablets development 2015 emarketer estimated beginning year tablet installed base would hit one billion first time china use 328 million google play n't serve track usa use second 156 million end year cheap tablets counted analysts goal met even excluding cumulative sales previous years conflicts statistics idc say tablet market contracted 10 2015 huawei ranked fifth big gains doubling share fourth quarter 2015 five biggest vendors except amazon fire tablets ranked third worldwide new list enabled quite tripling market share 7.9 fire os android-derivative recent data various sources published last twelve months summarized table sources monitor substantial number web sites statistics related one web site excluded android currently ranks highest windows incl xbox console systems every day week ios competes windows sweden depending day ios used ios windows 10 competing 13 windows mobile systems i.e windows phone accounts 0.51 web usage weekends ios alone topped windows us ios n't popular independent country guam unincorporated territory united states three consecutive quarters ios also highest ranked falkland islands british overseas territory one quarter plus one month overtaken android following quarter unknown strangely high countries madagascar 32.44 may due fact statcounter uses browser detection get os statistics common browsers often used version breakdown browsers madagascar shows 34.9 opera mini 4.4 popular known browser 22.1 plus e.g 3.34 opera 7.6 however browser statistics without version-breakdown opera 48.11 category small china android highest ranked operating system since january 2016 windows occasionally topped since asian continent whole android ranked highest since february 2016 android alone majority share large majority populous countries continent 84 bangladesh since august 2015 android ranked first 48.36 may 2016 african continent took big jump ahead windows 7 thereby africa joined asia mobile-majority continent china longer desktop-majority country joining india mobile-majority 71 confirming asia significant mobile-majority online usage linux kernel derivatives google systems gnu/linux exceeds windows true since time january april 2016 according w3counter statcounter however even figure unix-like oses including apple higher windows windows still dominant desktop os dominance varies region gradually lost market share desktop operating systems mobile slide noticeable us macos usage tripled 2009 2017 windows 72.76 chrome os 3.33 plus traditional linux 1.46 little openly published information device shipments desktop laptop computers gartner publishes estimates way estimates calculated openly published another source market share various operating systems statcounter basing estimate web use although may accurate also sales may overstate usage computers sold pre-installed operating system users replacing os different one due personal preference installing another os alongside using conversely sales underestimate usage counting unauthorized copies example 2009 approximately 80 software sold china comprised illegitimate copies 2007 statistics automated update ie7 registered windows computers differed observed web browser share leading one writer estimate 25–35 windows xp installations unlicensed usage share microsoft latest client operating system windows 10 slowly increasing since july/august 2016 windows 7 slight decrease time reaching around 27.15 december 2016 web analysis shows significant variation different parts world example north america usage windows xp dropped 2.06 africa still 11.02 asia 6.63 even higher china 18.21 tied windows 10 second going overtaken windows 10 conversely macos north america claims 16.82 17.52 us whereas asia 4.4 2019 stack overflow developer survey provides detail particular versions windows desktop operating system share among identifying professional developers june 2016 microsoft claimed windows 10 half market share windows installations usa uk quoted betanews digital video game distribution platform steam publishes monthly hardware software survey statistics q1 2018 mobile operating systems smartphones included google dominant android variants apple ios combined almost 100 market share smartphone penetration vs. desktop use differs substantially country countries like russia still smartphone use low 19 western countries smartphone use close 50 smartphone usage share developing countries much higher bangladesh example android smartphones 84 share mali smartphones 90 95 share year section information regional trends move smartphones clear correlation gdp per capita country country respective smartphone os market share richest countries much likely choose apple iphone google android predominant elsewhere tablet computers simply tablets became significant os market share category starting apple ipad q1 2018 ios 65.03 market share android 34.58 market share windows tablets may get classified analysts thus barely register e.g 2-in-1 pcs may get classified desktops tablets since 2016 south america cuba north america android tablets gained majority asia 2017 android slightly popular ipad 49.05 usage share october 2015 africa android tablets much popular elsewhere ipad safe margin android made steady gains becoming popular tablet operating system trend many countries already gained majority large countries india 63.25 indonesia 62.22 african continent android 62.22 first gain android majority late 2014 steady gains 20.98 august 2012 egypt 62.37 zimbabwe 62.04 south america 51.09 july 2015 peru 52.96 asia 46 nepal android gained majority lead november 2014 lost 41.35 ios 56.51 taiwan october 2016 android gained confident majority losing streak china major exception android gaining market share asia android phablets much popular android tablets similar devices get classified smartphones ipad/ios 82.84 march 2015 according statcounter web use statistics proxy use smartphones popular desktop computers globally android particular popular windows although desktop computers still popular many countries overall 44.9 first quarter 2017 smartphones popular even many developed countries countries continents desktop-minority android popular windows many e.g poland europe half countries south america many north america e.g guatemala honduras haiti countries asia africa smartphone-majority android poland turkey europe highest 57.68 62.33 respectively ireland smartphone use 45.55 outnumbers desktop use mobile whole gains majority including tablet share 9.12 spain also slightly desktop-minority july 2019 sweden desktop-minority eight weeks row range measured mobile web use varies lot country statcounter press release recognizes india amongst world leaders use mobile surf internet big countries share around 80 desktop 19.56 russia trailing 17.8 mobile use desktop rest smartphones discounting tablets first gained majority december 2016 desktop-majority lost month n't christmas-time fluke close majority smartphone majority happened march 2017 week 7–13 november 2016 smartphones alone without tablets overtook desktop first time albeit short period examples mobile-majority countries include paraguay south america poland europe turkey asia africa world still desktop-majority example united states 54.89 days however territories united states puerto rico desktop significantly majority windows 30 overtaken android 22 october 2016 subsequent weekends mobile showed majority since 27 october desktop n't majority including weekdays smartphones alone showed majority since 23 december end year share topping 58.22 christmas day mobile -majority share smartphones tablets could added giving 63.22 majority unusually high top similar high also occurred monday 17 april 2017 smartphone share slightly lower tablet share slightly higher combining 62.88 formerly according statcounter press release world turned desktop-minority 49 desktop use month mobile n't ranked higher tablet share added exceed desktop share christmas season i.e temporarily desktop-minority remains smartphone-majority weekends last two weeks december 2016 australia oceania general desktop-minority first time extended period i.e every day 23 december south america smartphones alone took majority desktops christmas day full-week-average desktop still least 58 uk desktop-minority dropped 44.02 christmas day eight days end year ireland joined european countries smartphone-majority three days christmas topping day 55.39 us desktop-minority happened three days around christmas longer four-day stretch happened november happens frequently weekends according statcounter web use statistics proxy use week 7–13 november 2016 mobile meaning smartphones alone without tablets overtook desktop first time highest ranked 52.13 27 november 2016 49.02 full week mobile-majority applies countries paraguay south america poland europe turkey continents asia africa large regions rest world still desktop-majority days united states north america whole n't us desktop-minority four days row five-day average examples desktop-minority days include uk ireland australia oceania whole fact least one country every continent turned desktop-minority least month 22 october 2016 subsequent weekends mobile shown majority previously according statcounter press release world turned desktop-minority 49 desktop use month desktop-minority stretching 18-weeks/4-months period 28 june 31 october 2016 whole july august september 2016 showed desktop-majority many long sub-periods long stretch showed desktop-minority similarly fridays saturdays sundays desktop-minority biggest continents asia africa shown vast mobile-majority long time day week well several individual countries elsewhere also turned mobile-majority poland albania turkey europe paraguay bolivia south america according statcounter web use statistics saturday 28 may 2016 day smartphones mobile statcounter counts tablets separately became used platform ranking first 47.27 desktops next day desktops slightly outnumbered mobile unless counting tablets analysts count tablets smartphones separately others desktops even tablets ipad android windows devices since sunday 27 march 2016 first day world dipped desktop-minority happened almost every week week 11–17 july 2016 world desktop-minority followed next week thereon also three-week period trend still stronger weekends e.g 17 july 2016 showed desktop 44.67 mobile 49.5 plus tablets 5.7 recent weekly data shows downward trend desktops according statcounter web use statistics proxy overall use weekends desktops worldwide lose 5 percent points e.g 51.46 15 august 2015 loss relative web use going mobile also minuscule increase tablets mostly windows 7 ranked 1st workdays declines web use shifting android lesser degree ios two continents already crossed mobile-majority android based statcounters web use statistics june 2015 asia became first continent mobile overtook desktop followed africa august nigeria mobile majority october 2011 symbian later 51 share series 40 dominating followed android dominating operating system far back october 2014 reported trend large scale press release mobile usage already overtaken desktop several countries including india south africa saudi arabia india desktop went majority july 2012 32 bangladesh desktop went majority may 2013 17 android alone accounting majority web use african countries still desktop-majority many large mobile majority including ethiopia kenya mobile usage 72 popularity mobile use worldwide driven huge popularity increase android asian countries android highest ranked operating system statistically virtually every south-east asian country also ranks popular almost every african country poland desktop-minority since april 2015 android vastly popular european countries albania turkey also crossed south america continent somewhat far losing desktop-majority paraguay lost android mobile browsing general also become hugely popular continents desktop large desktop base trend mobile clear fraction total web use analysts count tablets desktops run windows others count mobile phones vast majority tablets run so-called mobile operating system android operating system |android ios ipad ipad clear lead globally clearly lost majority android south america number eastern european countries poland lost virtually african countries lost majority twice asia gained majority back many individual countries e.g india middle east clear android majority tablets android tablets thus second popular ipad march 2015 first time us number mobile-only adult internet users exceeded number desktop-only internet users 11.6 digital population using mobile compared 10.6 using desktop also means majority 78 use desktop mobile access internet smaller countries north america haiti android gone mobile majority mobile went 72.35 64.43 february 2016 region largest android usage also largest mobile revenue file rack001.jpg|thumb| server computing |servers colocation centre |upright|right server computing |internet based servers market share measured statistical surveys publicly accessible servers web server mail server dns server internet operating systems powering servers found inspecting raw response messages method gives insight market share operating systems publicly accessible internet differences result depending sample done observations weighted usually surveys based random sample ip numbers domain names hosts organisations servers found method additionally many domains ip numbers may served one host domains may served several hosts one host several ip numbers file ibm system z10.jpg|thumb|upright|right|ibm ibm system z10|system z10 common operating system mainframes ibm z/os operating systems ibm system z generation hardware include ibm proprietary z/os linux z systems transaction processing facility|z/tpf vse operating system |z/vse z/vm gartner reported 23 december 2008 linux system z used approximately 28 customer z base expected increase 50 following five years linux system z red hat micro focus compete sell red hat enterprise linux|rhel suse linux enterprise server|sles respectively file operating systems used top 500 supercomputers.svg|thumb|upright=1.8|supercomputer os family 1993–2019 systems share according top500 field supercomputers always dominated unix unix-like operating systems linux predominating since 2017 top 500 fastest supercomputers run linux top500 project lists ranks 500 fastest supercomputer benchmark results submitted june 2017 two aix computers held rank 493 494 last non-linux systems dropped list last non-linux fastest supercomputer asci white also running aix held title november 2000 november 2001 decommissioned 2006 historically kinds unix operating systems dominated end ultimately linux remains category operating systems|*usage share operating systems category usage share|operating systems | [
2560,
6155,
6675,
7187,
10776,
25,
4637,
9762,
4643,
6180,
5158,
9768,
3626,
7217,
10803,
7733,
9784,
10809,
1083,
10303,
576,
2625,
6221,
3160,
10333,
97,
11363,
6760,
10856,
8298,
9835,
7285,
4727,
2168,
9335,
634,
1147,
3197,
1150,
524... | Test |
3,979 | 8 | Search/Retrieve_via_URL:search/retrieve via url search/retrieve via url sru standard search protocol internet search queries utilizing contextual query language cql standard query syntax representing queries sample code complete answer sru query-url url query version=1.1 operation=searchretrieve query=dc.title=darwinism cql query dc.title=darwinism | [
10313,
140,
2318,
8046,
113,
3191,
119,
8440,
1371,
8639
] | Train |
3,980 | 9 | GAUSS_(software):gauss software gauss matrix programming language mathematics statistics developed marketed aptech systems primary purpose solution numerical problems statistics econometrics time-series optimization 2d- 3d-visualization first published 1984 ms-dos currently also available linux macos windows range toolboxes available gauss additional cost see https //www.aptech.com/products/gauss-applications/ complete listing products | [
7301,
5129,
7945,
2317,
6797,
15,
7950,
8079,
2457,
5148,
7580,
7326,
5154,
7341,
9133,
7983,
6962,
823,
6718,
2242,
5830,
5703,
4808,
5833,
5450,
8262,
9166,
2000,
9944,
2652,
10848,
11239,
4840,
363,
5612,
5741,
7148,
7924
] | Test |
3,981 | 4 | Element_Anti-Virus:element anti-virus solution9 formerly known element anti-virus antivirus software personal firewall package made software house strayspark lab formerly element software uk llc element anti-virus aimed primarily home use microsoft windows operating systems version 6.0 2012 feature known collective intelligence introduced product use back-end server technology known element software network esnet technology enabled product collects suspicious files sends statistics using md5 patterns central database reviewed commonly due privacy concerns however disabled default technology 'trace made malware origins flag commonly found malicious software client machine via world map version 6.0 2012 personal firewall solution network topology analysis software introduced product along packet tracer analyzer administrative use confirmed company twitter account re-launched website solution9 strayspark replacing element anti-virus one first antimalware solutions use hypervisor means security real operating environment | [
2049,
7809,
131,
1417,
6797,
4374,
1052,
156,
2721,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8615,
7983,
8753,
6834,
4403,
10166,
704,
9537,
7362,
10308,
4421,
202,
1355,
5069,
10574,
10708,
2005,
11225,
1242,
2907,
8668,
2654... | None |
3,982 | 4 | Transient-key_cryptography:transient-key cryptography transient-key cryptography form public-key cryptography wherein keypairs generated assigned brief intervals time instead individuals organizations blocks cryptographic data chained time transient-key system private keys used briefly destroyed sometimes nicknamed “ disposable crypto. ” data encrypted private key associated specific time interval irrefutably linked interval making transient-key cryptography particularly useful digital trusted timestamping public-key transient-key systems used generate digital signatures assert given piece data changed since signed similarities end traditional public key system public/private keypair typically assigned individual server organization data signed private key asserts signature came indicated source keypairs persist years time private component must carefully guarded disclosure public-key system anyone access private key counterfeit person digital signature transient-key systems however keypair assigned brief interval time particular person entity data signed specific private key becomes associated specific time date keypair active minutes private key permanently destroyed therefore unlike public-key systems transient-key systems depend upon long-term security private keys transient-key system source time must consistent standard understood senders receivers since local system clock may changed user never used source time instead data digitally signed time value derived universal coordinated time utc accurate within millisecond accordance ansi asc x9.95 standard trusted timestamping whenever time interval transient-key system expires new public/private keypair generated private key previous interval used digitally certify new public key old private key destroyed key-chaining system immediate ancestor blockchain technology vogue today new interval time values obtained trusted third-party source specific moments time interpolated received times using time-biasing method based internal system timer trusted time source obtained running within specified tolerances transient private keys issued case time interval chain terminated fresh one begun old new chains connected network archives enable servers continue verify data integrity time protected data regardless often chain must restarted start times chain interval coupled together form unbroken sequence public keys used following extra security measure requests signatures made interval stored log concatenated appended public key start next interval mechanism makes impossible insert new “ signed events ” interval chain fact independently operating servers cross-certification provide third-party proof validity time interval chain irrefutable evidence consensus current time transient-key cryptographic systems display high byzantine fault tolerance web interconnected cross-certifying servers distributed environment creates widely witnessed chain trust strong strongest link contrast entire hierarchies traditional public key systems compromised single private key exposed individual transient key interval chain cross-certified transient key chains server instances cross-certification server signs server b interval chain signed data interval definition effect private keys server b used sign public keys server diagram server instance cross-certified two server instances blue orange cross-certification requires timestamp interval agree timestamp cross-certifying server within acceptable tolerances user-defined typically hundred milliseconds duration along intervals cross-certifications stored network archive within transient-key network archive logical database stored replicated system enable verification data timestamped signed transient keys map set accessible archives stored within every digital signature created system whenever cross-certifications completed beginning interval archive map updated published servers network interval transient private key used sign data concatenated trusted timestamps authenticity certificates verify data later time receiver accesses persistent public key appropriate time interval public key applied digital signature passed published cryptographic routines unpack hash original data compared fresh hash stored data verify data integrity signature successfully decrypts using particular interval published public key receiver assured signature originated time period decrypted fresh hashes match receiver assured data tampered since transient private key created timestamp signed data transient-key cryptography invented 1997 dr. michael d. doyle eolas technologies inc. later acquired productized proofspace inc protected us patents 6,381,696 7,017,046 7,047,415 7,210,035 included ansi asc x9.95 standard trusted timestamping transient-key cryptography predecessor forward secrecy despite appearance bitcoin blockchain technology derived transient-key cryptography dr. doyle publicly denied satoshi nakamoto | [
9248,
8674,
11684,
7085,
10831,
2901,
1941,
503,
1087
] | Test |
3,983 | 5 | Streaming_Text_Oriented_Messaging_Protocol:streaming text oriented messaging protocol simple streaming text oriented message protocol stomp formerly known ttmp simple text-based protocol designed working message-oriented middleware mom provides interoperable wire format allows stomp clients talk message broker supporting protocol protocol broadly similar http works tcp using following commands communication client server frame consisting number lines first line contains command followed headers form key value one per line followed blank line body content ending null character communication server client message receipt error frame similar format headers body content mom products support stomp list implementations also maintained stomp web site | [
1280,
10924,
142,
9365,
9270,
6522,
2971,
3708
] | Train |
3,984 | 4 | Rainbow_table:rainbow table rainbow table precomputed table reversing cryptographic hash functions usually cracking password hashes tables usually used recovering password credit card numbers etc certain length consisting limited set characters practical example space–time tradeoff using less computer processing time storage brute-force attack calculates hash every attempt processing time less storage simple lookup table one entry per hash use key derivation function employs salt makes attack infeasible rainbow tables invented philippe oechslin application earlier simpler algorithm martin hellman computer system requires password authentication must contain database passwords either hashed plaintext various methods password storage exist tables vulnerable theft storing plaintext password dangerous databases therefore store cryptographic hash user password database system one – including authentication system – determine user password merely looking value stored database instead user enters password authentication system computes hash value provided password hash value compared stored hash user authentication successful two hashes match gathering password hash using said hash password would fail since authentication system would hash second time learn user password password produces hashed value must found usually brute-force dictionary attack rainbow tables one type tool developed derive password looking hashed value rainbow tables always needed straightforward methods hash reversal available brute-force attacks dictionary attacks straightforward methods available however adequate systems use long passwords difficulty storing options available searching extensive database perform reverse lookup hash address issue scale reverse lookup tables generated stored smaller selection hashes reversed could make long chains passwords although reverse lookup hash chained table takes computational time lookup table much smaller hashes longer passwords stored rainbow tables refinement chaining technique provide solution problem called chain collisions source suppose password hash function h finite set passwords p. goal precompute data structure given output h hash function either locate element p p h p h determine p p. simplest way compute h p p p storing table requires θ |p| n bits space n size output h prohibitive large |p| hash chains technique decreasing space requirement idea define reduction function r maps hash values back values p. note however reduction function actually inverse hash function rather different function swapped domain codomain hash function alternating hash function reduction function chains alternating passwords hash values formed example p set lowercase alphabetic 6-character passwords hash values 32 bits long chain might look like requirement reduction function able return plain text value specific size generate table choose random set initial passwords p compute chains fixed length k one store first last password chain first password called starting point last one called endpoint example chain aaaaaa would starting point kiebgt would endpoint none passwords hash values would stored given hash value h want invert find corresponding password compute chain starting h applying r h r point observe value matching one endpoints table get corresponding starting point use recreate chain good chance chain contain value h immediately preceding value chain password p seek example 're given hash would compute chain first applying r since one endpoints table take corresponding starting password follow chain 920ecf10 reached thus password different password hash value note however chain always contain hash value h may happen chain starting h merges chain different starting point example may given hash value fb107e70 follow chain get kiebgt chain starting aaaaaa called false alarm case ignore match continue extend chain h looking another match chain h gets extended length k good matches password never produced chains table content depend hash value inverted created repeatedly used lookups unmodified increasing length chain decreases size table also increases time required perform lookups time-memory trade-off rainbow table simple case one-item chains lookup fast table big chains get longer lookup slows table size goes simple hash chains several flaws serious point two chains collide produce value merge consequently table cover many passwords despite paid computational cost generate previous chains stored entirety impossible detect efficiently example third value chain 3 matches second value chain 7 two chains cover almost sequence values final values hash function h unlikely produce collisions usually considered important security feature reduction function r need correctly cover likely plaintexts collision resistant difficulties result importance choosing correct function r. picking r identity little better brute force approach attacker good idea likely plaintexts choose function r makes sure time space used likely plaintexts entire space possible passwords effect r shepherds results prior hash calculations back likely plaintexts benefit comes drawback r likely wo n't produce every possible plaintext class attacker wishes check denying certainty attacker passwords came chosen class also difficult design function r match expected distribution plaintexts rainbow tables effectively solve problem collisions ordinary hash chains replacing single reduction function r sequence related reduction functions r r. way two chains collide merge must hit value iteration consequently final values chain identical final postprocessing pass sort chains table remove duplicate chains final value chains new chains generated fill table chains collision-free may overlap briefly merge drastically reducing overall number collisions using sequences reduction functions changes lookup done hash value interest may found location chain necessary generate k different chains first chain assumes hash value last hash position applies r next chain assumes hash value second-to-last hash position applies r h r last chain applies reduction functions alternating h. creates new way producing false alarm guess position hash value wrong may needlessly evaluate chain although rainbow tables follow chains make fewer tables simple hash chain tables grow beyond certain size without rapidly becoming inefficient due merging chains deal maintain multiple tables lookup must search table rainbow tables achieve similar performance tables k times larger allowing perform factor k fewer lookups rainbow tables use refined algorithm different reduction function link chain hash collision two chains chains merge long collision n't occur position chain increases probability correct crack given table size cost squaring number steps required per lookup lookup routine also needs iterate index first reduction function used chain rainbow tables specific hash function created e.g. md5 tables crack md5 hashes theory technique invented philippe oechslin fast form time/memory tradeoff implemented windows password cracker ophcrack powerful rainbowcrack program later developed generate use rainbow tables variety character sets hashing algorithms including lm hash md5 sha-1 simple case reduction function hash function collision given complete rainbow table one makes sure find corresponding password given hash size password set p time needed compute table length table l average time needed find password matching given hash directly related thus 8-character lowercase alphanumeric passwords case p ≃ 3×10 would easily tractable personal computer 16-character lowercase alphanumeric passwords case p ≃ 10 would completely intractable rainbow table ineffective one-way hashes include large salts example consider password hash generated using following function || concatenation operator codice_1 codice_2 salt value secret may generated random stored password hash large salt value prevents precomputation attacks including rainbow tables ensuring user password hashed uniquely means two users password different password hashes assuming different salts used order succeed attacker needs precompute tables possible salt value salt must large enough otherwise attacker make table salt value older unix passwords used 12-bit salt would require 4096 tables significant increase cost attacker impractical terabyte hard drives sha2-crypt bcrypt methods—used linux bsd unixes solaris—have salts 128 bits larger salt values make precomputation attacks systems infeasible almost length password even attacker could generate million tables per second would still need billions years generate tables possible salts another technique helps prevent precomputation attacks key stretching stretching used salt password intermediate hash values run underlying hash function multiple times increase computation time required hash password instance md5-crypt uses 1000 iteration loop repeatedly feeds salt password current intermediate hash value back underlying md5 hash function user password hash concatenation salt value secret final hash extra time noticeable users wait fraction second time log hand stretching reduces effectiveness brute-force attacks proportion number iterations reduces number attempts attacker perform given time frame principle applied md5-crypt bcrypt also greatly increases time needed build precomputed table absence salt needs done alternative approach called key strengthening extends key random salt unlike key stretching securely deletes salt forces attacker legitimate users perform brute-force search salt value although paper introduced key stretching referred earlier technique intentionally chose different name term key strengthening often arguably incorrectly used refer key stretching rainbow tables precomputation attacks work passwords contain symbols outside range presupposed longer precomputed attacker however tables generated take account common ways users attempt choose secure passwords adding number special character sizable investment computing processing rainbow tables beyond fourteen places length yet common choosing password longer fourteen characters may force attacker resort brute-force methods specific intensive efforts focused lm hash older hash algorithm used microsoft publicly available lm hash particularly vulnerable passwords longer 7 characters broken two sections hashed separately choosing password fifteen characters longer guarantees lm hash generated nearly distributions variations unix linux bsd use hashes salts though many applications use hash typically md5 salt microsoft windows nt/2000 family uses lan manager nt lan manager hashing method based md4 also unsalted makes one popularly generated tables | [
7426,
6916,
7556,
7557,
11144,
6797,
1941,
3477,
10135,
2714,
1315,
4389,
6954,
2357,
6905,
823,
5433,
1978,
8513,
9170,
1114,
10332,
8671,
8674,
9186,
5492,
11639,
7160,
1785,
10107,
2430
] | Validation |
3,985 | 1 | Islamic_World_Science_Citation_Database:islamic world science citation database islamic world science citation database isc citation index established iranian ministry science research technology approved organisation islamic conference indexes journals islamic world announced baku azerbaijan fourth islamic conference ministers higher education scientific research held october 2008 managed islamic world science citation center located shiraz 2009 isc partnered scopus allows isc publications indexed scopus | [] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.